Pre-conference social gathering: For those of you who arrive on Tuesday, we have a welcome reception at Clarion Collection Hotel Plaza, 19:00-21:00, Västra Torggatan 2. 🍷🍺🥂
The program starts on Wednesday at 10:30 and ends on Thursday at 12:45. A light breakfast is available for those that arrive on Wednesday morning and lunch is available at the end of the conference on Thursday.
The main room is Eva Eriksson. The second room for parallel sessions is 21A 345.
Wednesday, November 6th
09:00 - 10:30 Registration, drop-in coffee ☕🍪 and sandwiches 🥪🥪
10:30 - 12:00 Conference opening and welcome speech by NordSec 2024 General Chair Leonardo Martucci, followed by the keynote on Security - Always good for data protection (and fulfilling the GDPR)? by Marit Hansen, the State Data Protection Commissioner of Land Schleswig-Holstein and Chief of Unabhängiges Landeszentrum für Datenschutz (ULD)
12:00 - 13:15 Lunch 🥗 at Claesson’s Andra (5 minute walk)
13:15 - 14:45 Parallel presentation sessions
Privacy Eva Eriksson, Chair Simone Fischer-Hübner |
Cryptography 21A 345, Chair Liina Kamm |
---|---|
Enhancing Noise Estimation for Statistical Disclosure Attacks using the Artificial Bee Colony Algorithm Alperen Aksoy (Friedrich-Alexander University of Erlangen-Nuremberg) and Dogan Kesdogan (University of Regensburg) |
Determining the A5 encryption algorithms used in 2G (GSM) networks Danielle Morgan (University of Tartu) |
Left Alone Facing a Difficult Choice: An Expert Analysis of Websites Promoting Selected Privacy-Enhancing Technologies Shirin Shams (University of Göttingen), Sebastian Reinke (University of Göttingen), and Delphine Reinhardt (University of Göttingen) |
Misbinding Raw Public Keys to Identities in TLS Mariam Moustafa (Aalto University), Mohit Sethi (Aalto University), and Tuomas Aura (Aalto University) |
Optimizing Onionbalance: Improving Scalability and Security for Tor Onion Services Laura Donah (FernUniversität in Hagen) and Pascal Tippe (FernUniversität in Hagen) |
Small Private Exponent Attacks on Takagi Family Schemes George Teşeleanu (Advanced Technologies Institute & Simion Stoilow Institute of Mathematics of the Romanian Academy) |
14:45 - 15:15 Coffee ☕🍪
15:15 - 17:15 Parallel presentation sessions
Authentication & Formal Verification Eva Eriksson, Chair Christian Rohner |
Cyber-Physical Systems 21A 345, Chair Lothar Fritsch |
---|---|
Are Swedish Passwords Tougher Than the Rest? Casper Jensen (Linköping University & FOI), Martin Karresand (FOI), Gurjot Singh Gaba (Linköping University), Andrei Gurtov (Linköping University), and Erik Öhrn (NFC) |
A Comparison of Deep Learning Approaches for Power-based Side-channel Attacks Roberto Capoferri (Politecnico di Milano), Alessandro Barenghi (Politecnico di Milano), Luca Breveglieri (Politecnico di Milano), Niccolò Izzo (Micron Semiconductor Italia Srl), and Gerardo Pelosi (Politecnico di Milano) |
Towards Exploring Cross-Regional and Cross-Platform Differences in Login Throttling Minjie Cai (Carleton University), Xavier de Carné de Carnavalet (Hong Kong Polytechnic University), Siqi Zhang (Vrije Universiteit Amsterdam), Lianying Zhao (Carleton University), and Mengyuan Zhang (Vrije Universiteit Amsterdam) |
Binary-Level Code Injection for Automated Tool Support on the ESP32 Platform Benjamin Plach (FZI Research Center for Information Technology), Matthias Börsig (FZI Research Center for Information Technology), Maximilian Müller (FZI Research Center for Information Technology), Roland Gröll (FZI Research Center for Information Technology), Martin Dukek (FZI Research Center for Information Technology), and Ingmar Baumgart (FZI Research Center for Information Technology) |
Analysing TLS Implementations using Full-Message Symbolic Execution Johannes Wilson (Linköping University & Sectra Communications) and Mikael Asplund (Linköping University) |
Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study Levente Nyusti (Institute for Energy Technology), Sabarathinam Chockalingam (Institute for Energy Technology), Patrick Bours (Norwegian University of Science and Technology), and Terje Bodal (Institute for Energy Technology) |
Formal Verification of Browser Fingerprinting and Mitigation with Inlined Reference Monitors Nathan Joslin (University of Dayton), Phu H. Phung (University of Dayton), and Luan Viet Nguyen (University of Dayton) |
17:15 - 17:20 Wrap-up
17:30 - 18:30 Steering Committee Meeting
19:00 Welcome drinks 🍷🍺🥂 at Olssons Bazar, downtown, inner harbor (5 minute walk from hotel)
19:30 Dinner 🍕 at Olssons Bazar
Thursday, November 7th
08:30 - 08:45 Registration, coffee ☕🍪
08:45 - 09:00 Conference opening day two
09:00 - 10:30 Parallel presentation sessions
LLMs for Security Eva Eriksson, Chair Amal Nammouchi |
Cybersecurity and Policy 21A 345, Chair Meiko Jensen |
---|---|
Evaluating Large Language Models in Cybersecurity Knowledge with Cisco Certificates Gustav Keppler (Karlsruhe Institute of Technology), Jeremy Kunz (Karlsruhe Institute of Technology), Veit Hagenmeyer (Karlsruhe Institute of Technology), and Ghada Elbez (Karlsruhe Institute of Technology) |
A Gamified Learning Approach for IoT Security Education using Capture-the-Flag Competitions: Architecture and Insights Mohammad Hamad (Technical University of Munich), Andreas Finkenzeller (Technical University of Munich), Monowar Hasan (Washington State University), Marc-Oliver Pahl (IMT Atlantique), and Sebastian Steinhorst (Technical University of Munich) |
How to Train Your Llama - Efficient Grammar-Based Application Fuzzing Using Large Language Models Ibrahim Mhiri (1&1 Mail & Media), Matthias Börsig (FZI Research Center for Information Technology), Akim Stark (FZI Research Center for Information Technology), and Ingmar Baumgart (FZI Research Center for Information Technology) |
NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure Ebba Rehnstam (Stockholm University), Wera Winquist (Stockholm University), and Simon Hacks (Stockholm University) |
The Dual-Edged Sword of Large Language Models in Phishing Alec Siemerink (Utrecht University), Slinger Jansen (Utrecht University & LUT University), and Katsiaryna Labunets (Utrecht University) |
The Cyber Alliance Game: How Alliances Influence Cyber-Warfare Gergely Benkő (Budapest University of Technology and Economics) and Gergely Biczók (Budapest University of Technology and Economics & BME-HUN-REN Information Systems Research Group & University of Michigan) |
10:30 - 11:00 Coffee ☕🍪
11:00 - 12:30 Parallel presentation sessions
Network Security Eva Eriksson, Chair Martin Karresand |
Mobile & IoT 21A 345, Chair Mikael Asplund |
---|---|
CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic Christian Lindenmeier (Friedrich-Alexander-Universität Erlangen-Nürnberg), Sven Gebhard (Friedrich-Alexander-Universität Erlangen-Nürnberg), Jonas Röckl (Friedrich-Alexander-Universität Erlangen-Nürnberg), and Felix Freiling (Friedrich-Alexander-Universität Erlangen-Nürnberg) |
Beware of the Rabbit Hole - A Digital Forensic Case Study of DIY Drones Samantha Klier (University of the Bundeswehr Munich) and Harald Baier (University of the Bundeswehr Munich) |
Fingerprinting DNS Resolvers using Query Patterns from QNAME Minimization Jonathan Magnusson (Karlstad University) |
GOTCHA: Physical Intrusion Detection with Active Acoustic Sensing using a Smart Speaker Hoang Quoc Viet Pham (University College Cork), Hoang D. Nguyen (University College Cork), amd Utz Roedig (University College Cork) |
Formally Discovering and Reproducing Network Protocols Vulnerabilities Christophe Crochet (Université catholique de Louvain), John Aoga (Université catholique de Louvain), and Axel Legay (Université catholique de Louvain) |
Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study Albin Forsberg (Karlstad University) and Leonardo Horn Iwaya (Karlstad University) |
12:30 - 12:45 Conference wrap-up
12:45 Lunch 🥗 and coffee ☕🍪 served at the conference area