


default search action
29th NordSec 2024: Karlstad, Sweden
- Leonardo Horn Iwaya

, Liina Kamm
, Leonardo A. Martucci
, Tobias Pulls
:
Secure IT Systems - 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6-7, 2024 Proceedings. Lecture Notes in Computer Science 15396, Springer 2025, ISBN 978-3-031-79006-5
Authentication
- Casper Jensen, Martin Karresand, Gurjot Singh Gaba

, Andrei V. Gurtov, Erik Öhrn:
Are Swedish Passwords Tougher Than the Rest? 3-21 - Minjie Cai

, Xavier de Carné de Carnavalet
, Siqi Zhang
, Lianying Zhao
, Mengyuan Zhang
:
Towards Exploring Cross-Regional and Cross-Platform Differences in Login Throttling. 22-41
Cryptography
- Danielle Morgan

:
Determining the A5 Encryption Algorithms Used in 2G (GSM) Networks. 45-61 - Mariam Moustafa

, Mohit Sethi
, Tuomas Aura
:
Misbinding Raw Public Keys to Identities in TLS. 62-79 - George Teseleanu

:
Small Private Exponent Attacks on Takagi Family Schemes. 80-98
Cyber-Physical Systems
- Roberto Capoferri

, Alessandro Barenghi
, Luca Breveglieri
, Niccolò Izzo
, Gerardo Pelosi
:
A Comparison of Deep Learning Approaches for Power-Based Side-Channel Attacks. 101-120 - Benjamin Plach, Matthias Börsig

, Maximilian Müller, Roland Gröll, Martin Dukek, Ingmar Baumgart:
Binary-Level Code Injection for Automated Tool Support on the ESP32 Platform. 121-138 - Levente Nyusti, Sabarathinam Chockalingam

, Patrick Bours, Terje Bodal:
Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study. 139-157
Cybersecurity and Policy
- Mohammad Hamad

, Andreas Finkenzeller
, Monowar Hasan
, Marc-Oliver Pahl
, Sebastian Steinhorst
:
A Gamified Learning Approach for IoT Security Education Using Capture-the-Flag Competitions: Architecture and Insights. 161-175 - Ebba Rehnstam, Wera Winquist, Simon Hacks

:
NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure. 176-195 - Gergely Benko, Gergely Biczók

:
The Cyber Alliance Game: How Alliances Influence Cyber-Warfare. 196-216
LLMs for Security
- Gustav Keppler

, Jeremy Kunz, Veit Hagenmeyer
, Ghada Elbez
:
Evaluating Large Language Models in Cybersecurity Knowledge with Cisco Certificates. 219-238 - Ibrahim Mhiri, Matthias Börsig

, Akim Stark, Ingmar Baumgart:
How to Train Your Llama - Efficient Grammar-Based Application Fuzzing Using Large Language Models. 239-257 - Alec Siemerink, Slinger Jansen

, Katsiaryna Labunets
:
The Dual-Edged Sword of Large Language Models in Phishing. 258-279
Formal Verification
- Johannes Wilson

, Mikael Asplund
:
Analysing TLS Implementations Using Full-Message Symbolic Execution. 283-302 - Nathan Joslin

, Phu H. Phung
, Luan Viet Nguyen
:
Formal Verification of Browser Fingerprinting and Mitigation with Inlined Reference Monitors. 303-321
Mobile and IoT
- Samantha Klier

, Harald Baier
:
Beware of the Rabbit Hole - A Digital Forensic Case Study of DIY Drones. 325-344 - Hoang Quoc Viet Pham

, Hoang D. Nguyen
, Utz Roedig
:
GOTCHA: Physical Intrusion Detection with Active Acoustic Sensing Using a Smart Speaker. 345-363 - Albin Forsberg, Leonardo Horn Iwaya

:
Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study. 364-381
Network Security
- Christian Lindenmeier

, Sven Gebhard, Jonas Röckl
, Felix C. Freiling
:
CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic. 385-404 - Jonathan Magnusson

:
Fingerprinting DNS Resolvers Using Query Patterns from QNAME Minimization. 405-423 - Christophe Crochet

, John O. R. Aoga, Axel Legay
:
Formally Discovering and Reproducing Network Protocols Vulnerabilities. 424-443
Privacy
- Alperen Aksoy

, Dogan Kesdogan:
Enhancing Noise Estimation for Statistical Disclosure Attacks Using the Artificial Bee Colony Algorithm. 447-466 - Shirin Shams

, Sebastian Reinke, Delphine Reinhardt
:
Left Alone Facing a Difficult Choice: An Expert Analysis of Websites Promoting Selected Privacy-Enhancing Technologies. 467-487 - Laura Donah, Pascal Tippe

:
Optimizing Onionbalance: Improving Scalability and Security for Tor Onion Services. 488-499

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














