


default search action
29th NordSec 2024: Karlstad, Sweden
- Leonardo Horn Iwaya
, Liina Kamm
, Leonardo A. Martucci
, Tobias Pulls
:
Secure IT Systems - 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6-7, 2024 Proceedings. Lecture Notes in Computer Science 15396, Springer 2025, ISBN 978-3-031-79006-5
Authentication
- Casper Jensen, Martin Karresand, Gurjot Singh Gaba
, Andrei V. Gurtov, Erik Öhrn:
Are Swedish Passwords Tougher Than the Rest? 3-21 - Minjie Cai, Xavier de Carné de Carnavalet
, Siqi Zhang
, Lianying Zhao
, Mengyuan Zhang
:
Towards Exploring Cross-Regional and Cross-Platform Differences in Login Throttling. 22-41
Cryptography
- Danielle Morgan
:
Determining the A5 Encryption Algorithms Used in 2G (GSM) Networks. 45-61 - Mariam Moustafa
, Mohit Sethi
, Tuomas Aura
:
Misbinding Raw Public Keys to Identities in TLS. 62-79 - George Teseleanu
:
Small Private Exponent Attacks on Takagi Family Schemes. 80-98
Cyber-Physical Systems
- Roberto Capoferri
, Alessandro Barenghi
, Luca Breveglieri
, Niccolò Izzo
, Gerardo Pelosi
:
A Comparison of Deep Learning Approaches for Power-Based Side-Channel Attacks. 101-120 - Benjamin Plach, Matthias Börsig
, Maximilian Müller, Roland Gröll, Martin Dukek, Ingmar Baumgart:
Binary-Level Code Injection for Automated Tool Support on the ESP32 Platform. 121-138 - Levente Nyusti, Sabarathinam Chockalingam
, Patrick Bours, Terje Bodal:
Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study. 139-157
Cybersecurity and Policy
- Mohammad Hamad
, Andreas Finkenzeller
, Monowar Hasan
, Marc-Oliver Pahl
, Sebastian Steinhorst
:
A Gamified Learning Approach for IoT Security Education Using Capture-the-Flag Competitions: Architecture and Insights. 161-175 - Ebba Rehnstam, Wera Winquist, Simon Hacks
:
NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure. 176-195 - Gergely Benko, Gergely Biczók
:
The Cyber Alliance Game: How Alliances Influence Cyber-Warfare. 196-216
LLMs for Security
- Gustav Keppler
, Jeremy Kunz, Veit Hagenmeyer
, Ghada Elbez
:
Evaluating Large Language Models in Cybersecurity Knowledge with Cisco Certificates. 219-238 - Ibrahim Mhiri, Matthias Börsig
, Akim Stark, Ingmar Baumgart:
How to Train Your Llama - Efficient Grammar-Based Application Fuzzing Using Large Language Models. 239-257 - Alec Siemerink, Slinger Jansen
, Katsiaryna Labunets
:
The Dual-Edged Sword of Large Language Models in Phishing. 258-279
Formal Verification
- Johannes Wilson
, Mikael Asplund
:
Analysing TLS Implementations Using Full-Message Symbolic Execution. 283-302 - Nathan Joslin
, Phu H. Phung
, Luan Viet Nguyen
:
Formal Verification of Browser Fingerprinting and Mitigation with Inlined Reference Monitors. 303-321
Mobile and IoT
- Samantha Klier
, Harald Baier
:
Beware of the Rabbit Hole - A Digital Forensic Case Study of DIY Drones. 325-344 - Hoang Quoc Viet Pham
, Hoang D. Nguyen
, Utz Roedig
:
GOTCHA: Physical Intrusion Detection with Active Acoustic Sensing Using a Smart Speaker. 345-363 - Albin Forsberg, Leonardo Horn Iwaya
:
Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study. 364-381
Network Security
- Christian Lindenmeier
, Sven Gebhard, Jonas Röckl
, Felix C. Freiling
:
CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic. 385-404 - Jonathan Magnusson
:
Fingerprinting DNS Resolvers Using Query Patterns from QNAME Minimization. 405-423 - Christophe Crochet
, John O. R. Aoga, Axel Legay
:
Formally Discovering and Reproducing Network Protocols Vulnerabilities. 424-443
Privacy
- Alperen Aksoy
, Dogan Kesdogan:
Enhancing Noise Estimation for Statistical Disclosure Attacks Using the Artificial Bee Colony Algorithm. 447-466 - Shirin Shams
, Sebastian Reinke, Delphine Reinhardt
:
Left Alone Facing a Difficult Choice: An Expert Analysis of Websites Promoting Selected Privacy-Enhancing Technologies. 467-487 - Laura Donah, Pascal Tippe
:
Optimizing Onionbalance: Improving Scalability and Security for Tor Onion Services. 488-499

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.