NordSec 2024

Program

Pre-conference social gathering: For those of you who arrive on Tuesday, we have a welcome reception at Clarion Collection Hotel Plaza, 19:00-21:00, Västra Torggatan 2. 🍷🍺🥂

The program starts on Wednesday at 10:30 and ends on Thursday at 12:45. A light breakfast is available for those that arrive on Wednesday morning and lunch is available at the end of the conference on Thursday.

The main room is Eva Eriksson. The second room for parallel sessions is 21A 345.

Wednesday, November 6th

09:00 - 10:30 Registration, drop-in coffee ☕🍪 and sandwiches 🥪🥪

10:30 - 12:00 Conference opening and welcome speech by NordSec 2024 General Chair Leonardo Martucci, followed by the keynote on Security - Always good for data protection (and fulfilling the GDPR)? by Marit Hansen, the State Data Protection Commissioner of Land Schleswig-Holstein and Chief of Unabhängiges Landeszentrum für Datenschutz (ULD)

12:00 - 13:15 Lunch 🥗 at Claesson’s Andra (5 minute walk)

13:15 - 14:45 Parallel presentation sessions

Privacy
Eva Eriksson, Chair Simone Fischer-Hübner
Cryptography
21A 345, Chair Liina Kamm
Enhancing Noise Estimation for Statistical Disclosure Attacks using the Artificial Bee Colony Algorithm
Alperen Aksoy (Friedrich-Alexander University of Erlangen-Nuremberg) and Dogan Kesdogan (University of Regensburg)
Determining the A5 encryption algorithms used in 2G (GSM) networks
Danielle Morgan (University of Tartu)
Left Alone Facing a Difficult Choice: An Expert Analysis of Websites Promoting Selected Privacy-Enhancing Technologies
Shirin Shams (University of Göttingen), Sebastian Reinke (University of Göttingen), and Delphine Reinhardt (University of Göttingen)
Misbinding Raw Public Keys to Identities in TLS
Mariam Moustafa (Aalto University), Mohit Sethi (Aalto University), and Tuomas Aura (Aalto University)
Optimizing Onionbalance: Improving Scalability and Security for Tor Onion Services
Laura Donah (FernUniversität in Hagen) and Pascal Tippe (FernUniversität in Hagen)
Small Private Exponent Attacks on Takagi Family Schemes
George Teşeleanu (Advanced Technologies Institute & Simion Stoilow Institute of Mathematics of the Romanian Academy)

14:45 - 15:15 Coffee ☕🍪

15:15 - 17:15 Parallel presentation sessions

Authentication & Formal Verification
Eva Eriksson, Chair Christian Rohner
Cyber-Physical Systems
21A 345, Chair Lothar Fritsch
Are Swedish Passwords Tougher Than the Rest?
Casper Jensen (Linköping University & FOI), Martin Karresand (FOI), Gurjot Singh Gaba (Linköping University), Andrei Gurtov (Linköping University), and Erik Öhrn (NFC)
A Comparison of Deep Learning Approaches for Power-based Side-channel Attacks
Roberto Capoferri (Politecnico di Milano), Alessandro Barenghi (Politecnico di Milano), Luca Breveglieri (Politecnico di Milano), Niccolò Izzo (Micron Semiconductor Italia Srl), and Gerardo Pelosi (Politecnico di Milano)
Towards Exploring Cross-Regional and Cross-Platform Differences in Login Throttling
Minjie Cai (Carleton University), Xavier de Carné de Carnavalet (Hong Kong Polytechnic University), Siqi Zhang (Vrije Universiteit Amsterdam), Lianying Zhao (Carleton University), and Mengyuan Zhang (Vrije Universiteit Amsterdam)
Binary-Level Code Injection for Automated Tool Support on the ESP32 Platform
Benjamin Plach (FZI Research Center for Information Technology), Matthias Börsig (FZI Research Center for Information Technology), Maximilian Müller (FZI Research Center for Information Technology), Roland Gröll (FZI Research Center for Information Technology), Martin Dukek (FZI Research Center for Information Technology), and Ingmar Baumgart (FZI Research Center for Information Technology)
Analysing TLS Implementations using Full-Message Symbolic Execution
Johannes Wilson (Linköping University & Sectra Communications) and Mikael Asplund (Linköping University)
Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study
Levente Nyusti (Institute for Energy Technology), Sabarathinam Chockalingam (Institute for Energy Technology), Patrick Bours (Norwegian University of Science and Technology), and Terje Bodal (Institute for Energy Technology)
Formal Verification of Browser Fingerprinting and Mitigation with Inlined Reference Monitors
Nathan Joslin (University of Dayton), Phu H. Phung (University of Dayton), and Luan Viet Nguyen (University of Dayton)

17:15 - 17:20 Wrap-up

17:30 - 18:30 Steering Committee Meeting

19:00 Welcome drinks 🍷🍺🥂 at Olssons Bazar, downtown, inner harbor (5 minute walk from hotel)

19:30 Dinner 🍕 at Olssons Bazar


Thursday, November 7th

08:30 - 08:45 Registration, coffee ☕🍪

08:45 - 09:00 Conference opening day two

09:00 - 10:30 Parallel presentation sessions

LLMs for Security
Eva Eriksson, Chair Amal Nammouchi
Cybersecurity and Policy
21A 345, Chair Meiko Jensen
Evaluating Large Language Models in Cybersecurity Knowledge with Cisco Certificates
Gustav Keppler (Karlsruhe Institute of Technology), Jeremy Kunz (Karlsruhe Institute of Technology), Veit Hagenmeyer (Karlsruhe Institute of Technology), and Ghada Elbez (Karlsruhe Institute of Technology)
A Gamified Learning Approach for IoT Security Education using Capture-the-Flag Competitions: Architecture and Insights
Mohammad Hamad (Technical University of Munich), Andreas Finkenzeller (Technical University of Munich), Monowar Hasan (Washington State University), Marc-Oliver Pahl (IMT Atlantique), and Sebastian Steinhorst (Technical University of Munich)
How to Train Your Llama - Efficient Grammar-Based Application Fuzzing Using Large Language Models
Ibrahim Mhiri (1&1 Mail & Media), Matthias Börsig (FZI Research Center for Information Technology), Akim Stark (FZI Research Center for Information Technology), and Ingmar Baumgart (FZI Research Center for Information Technology)
NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure
Ebba Rehnstam (Stockholm University), Wera Winquist (Stockholm University), and Simon Hacks (Stockholm University)
The Dual-Edged Sword of Large Language Models in Phishing
Alec Siemerink (Utrecht University), Slinger Jansen (Utrecht University & LUT University), and Katsiaryna Labunets (Utrecht University)
The Cyber Alliance Game: How Alliances Influence Cyber-Warfare
Gergely Benkő (Budapest University of Technology and Economics) and Gergely Biczók (Budapest University of Technology and Economics & BME-HUN-REN Information Systems Research Group & University of Michigan)

10:30 - 11:00 Coffee ☕🍪

11:00 - 12:30 Parallel presentation sessions

Network Security
Eva Eriksson, Chair Martin Karresand
Mobile & IoT
21A 345, Chair Mikael Asplund
CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic
Christian Lindenmeier (Friedrich-Alexander-Universität Erlangen-Nürnberg), Sven Gebhard (Friedrich-Alexander-Universität Erlangen-Nürnberg), Jonas Röckl (Friedrich-Alexander-Universität Erlangen-Nürnberg), and Felix Freiling (Friedrich-Alexander-Universität Erlangen-Nürnberg)
Beware of the Rabbit Hole - A Digital Forensic Case Study of DIY Drones
Samantha Klier (University of the Bundeswehr Munich) and Harald Baier (University of the Bundeswehr Munich)
Fingerprinting DNS Resolvers using Query Patterns from QNAME Minimization
Jonathan Magnusson (Karlstad University)
GOTCHA: Physical Intrusion Detection with Active Acoustic Sensing using a Smart Speaker
Hoang Quoc Viet Pham (University College Cork), Hoang D. Nguyen (University College Cork), amd Utz Roedig (University College Cork)
Formally Discovering and Reproducing Network Protocols Vulnerabilities
Christophe Crochet (Université catholique de Louvain), John Aoga (Université catholique de Louvain), and Axel Legay (Université catholique de Louvain)
Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study
Albin Forsberg (Karlstad University) and Leonardo Horn Iwaya (Karlstad University)

12:30 - 12:45 Conference wrap-up

12:45 Lunch 🥗 and coffee ☕🍪 served at the conference area