


default search action
29th NordSec 2024: Karlstad, Sweden
- Leonardo Horn Iwaya
, Liina Kamm
, Leonardo A. Martucci
, Tobias Pulls
:
Secure IT Systems - 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6-7, 2024 Proceedings. Lecture Notes in Computer Science 15396, Springer 2025, ISBN 978-3-031-79006-5
Authentication
- Casper Jensen, Martin Karresand, Gurjot Singh Gaba, Andrei V. Gurtov, Erik Öhrn:
Are Swedish Passwords Tougher Than the Rest? 3-21 - Minjie Cai, Xavier de Carné de Carnavalet, Siqi Zhang, Lianying Zhao, Mengyuan Zhang:
Towards Exploring Cross-Regional and Cross-Platform Differences in Login Throttling. 22-41
Cryptography
- Danielle Morgan:
Determining the A5 Encryption Algorithms Used in 2G (GSM) Networks. 45-61 - Mariam Moustafa, Mohit Sethi, Tuomas Aura:
Misbinding Raw Public Keys to Identities in TLS. 62-79 - George Teseleanu:
Small Private Exponent Attacks on Takagi Family Schemes. 80-98
Cyber-Physical Systems
- Roberto Capoferri, Alessandro Barenghi, Luca Breveglieri, Niccolò Izzo, Gerardo Pelosi:
A Comparison of Deep Learning Approaches for Power-Based Side-Channel Attacks. 101-120 - Benjamin Plach, Matthias Börsig, Maximilian Müller, Roland Gröll, Martin Dukek, Ingmar Baumgart:
Binary-Level Code Injection for Automated Tool Support on the ESP32 Platform. 121-138 - Levente Nyusti, Sabarathinam Chockalingam, Patrick Bours, Terje Bodal:
Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study. 139-157
Cybersecurity and Policy
- Mohammad Hamad, Andreas Finkenzeller, Monowar Hasan, Marc-Oliver Pahl, Sebastian Steinhorst:
A Gamified Learning Approach for IoT Security Education Using Capture-the-Flag Competitions: Architecture and Insights. 161-175 - Ebba Rehnstam, Wera Winquist, Simon Hacks:
NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure. 176-195 - Gergely Benko, Gergely Biczók:
The Cyber Alliance Game: How Alliances Influence Cyber-Warfare. 196-216
LLMs for Security
- Gustav Keppler, Jeremy Kunz, Veit Hagenmeyer, Ghada Elbez:
Evaluating Large Language Models in Cybersecurity Knowledge with Cisco Certificates. 219-238 - Ibrahim Mhiri, Matthias Börsig, Akim Stark, Ingmar Baumgart:
How to Train Your Llama - Efficient Grammar-Based Application Fuzzing Using Large Language Models. 239-257 - Alec Siemerink, Slinger Jansen, Katsiaryna Labunets:
The Dual-Edged Sword of Large Language Models in Phishing. 258-279
Formal Verification
- Johannes Wilson, Mikael Asplund:
Analysing TLS Implementations Using Full-Message Symbolic Execution. 283-302 - Nathan Joslin, Phu H. Phung, Luan Viet Nguyen:
Formal Verification of Browser Fingerprinting and Mitigation with Inlined Reference Monitors. 303-321
Mobile and IoT
- Samantha Klier, Harald Baier:
Beware of the Rabbit Hole - A Digital Forensic Case Study of DIY Drones. 325-344 - Hoang Quoc Viet Pham, Hoang D. Nguyen, Utz Roedig:
GOTCHA: Physical Intrusion Detection with Active Acoustic Sensing Using a Smart Speaker. 345-363 - Albin Forsberg, Leonardo Horn Iwaya:
Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study. 364-381
Network Security
- Christian Lindenmeier, Sven Gebhard, Jonas Röckl, Felix C. Freiling:
CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic. 385-404 - Jonathan Magnusson:
Fingerprinting DNS Resolvers Using Query Patterns from QNAME Minimization. 405-423 - Christophe Crochet, John O. R. Aoga, Axel Legay:
Formally Discovering and Reproducing Network Protocols Vulnerabilities. 424-443
Privacy
- Alperen Aksoy, Dogan Kesdogan:
Enhancing Noise Estimation for Statistical Disclosure Attacks Using the Artificial Bee Colony Algorithm. 447-466 - Shirin Shams, Sebastian Reinke, Delphine Reinhardt:
Left Alone Facing a Difficult Choice: An Expert Analysis of Websites Promoting Selected Privacy-Enhancing Technologies. 467-487 - Laura Donah, Pascal Tippe:
Optimizing Onionbalance: Improving Scalability and Security for Tor Onion Services. 488-499

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.