Accepted Papers
- Adam Mårtensson, Edvin Nielsson and Simon Hacks: Foreign Disinformation on Swedish Facebook: A Mixed-Methods Thematic Analysis of Manipulative Narratives and Societal Resilience
- Julian Sturm, Daniel Bücheler, Oliver Zeidler, Daniel Fraunholz, Wolfgang Kellerer and Hartmut Koenig: MP-LFM: Breaking Subscriber Privacy (even more) by Exploiting Linkability in 5G AKA
- Marc Damie, Florian Hahn, Andreas Peter and Jan Ramon: DDH-based schemes for multi-party Function Secret Sharing
- Akif Mehmood and Nicola Tuveri: Integrating PQC in OpenSSL via Shallow Providers for Cryptographic Agility
- Jonas Röckl, Julian Funk and Tilo Müller: WireTrust: A TrustZone-Based Non-Bypassable VPN Tunnel
- Bruno Kreyssig, Sabine Houy, Hantang Zhang, Timothée Riom and Alexandre Bartel: GadgetBuilder: An Overhaul of the Greatest Java Deserialization Exploitation Tool
- Karolina Jablonska and Emmanouil Vasilomanolakis: Targeted AI-based password guessing leveraging email-derived user attributes
- George Teselean: Attacking an RSA-like Cryptosystem Using Continued Fractions and Latices
- János Kövér, Roberto Guanciale and György Dán: Mitigating traffic analysis attacks while maintaining on-path network observability
- Mario Lins, Stefan Rass and René Mayrhofer: Software Supply Chain Security: Can we beat the kill-chain? A Case Study on the XZ backdoor
- Raymond Hagen, Kirsi Helkala and Lasse Øverlier: Understanding APT Defense Through Expert Eyes: A Critical Exploration of Perceived Needs and Gaps
- Jonathan Magnusson: Privacy and Security of DNS Resolvers used in the Nordics and Baltics
- Alexandre Bartel: Ofbugscation
- Majid Mollaeefar, Amir Sharif, Zahra Ebadi Ansaroudi, Giada Sciarretta, Francesco Antonio Marino and Silvio Ranise: Multi-entity Control-based Risk Assessment: A European Digital Identity Wallet Use Case
- Mohamad Gharib: From Perception to Protection: A Mental Model-Based Framework for Capturing Usable Security and Privacy Requirements
- Mads Bisgaard Schmidt, Ashutosh Dhar Dwivedi and Jens Myrup Pedersen: Exploiting Quantum Point-to-Point Protocol (Q3P) for Denial-of-Service (DoS) Attacks
- Lalie Arnoud, Victor Breux, Pierre-Henri Thevenon and Eric Gaussier: An Empirical Evaluation of Intrusion Detection Systems based on System Calls
- Niels Voorneveld: Threshold Trust Logic
- Karthikeya S M Yelisetty, Gaurav Madkaikar, Anna Bamberger, Maribel Fernandez and Shamik Sural: Mining Attribute-based Access Control Policies via Categorisation
- Viktor Rovinskyi, Vitalii Horielov and Serhii Sharyn: Key-Gated Generative Obfuscation for Embedded Strings
- Ilse Harmers and Mina Alishahi: Fairness under Noise: How Differential Privacy Affects Bias in GANs-Generated Data
- Samuel Wairimu and Leonardo Iwaya: On the Security and Privacy of AI-based Mobile Health Chatbots
- Mohsin Khan, Håvard Dagenborg and Dag Johansen: A Comparative Software Benchmark of Lightweight Hash Functions on 8-bit AVR Using ChipWhisperer
- Oğuz Narlı, Meltem Kurt Pehlivanoğlu and Sedat Akleylek: A New Optimized Implementation of SMAUG-T for Lightweight Devices
- Zoé Lagache, Pierre-Henri Thevenon, Maxime Puys and Oum-El-Kheir Aktouf: Dissecting Mirai: Spatio-Sequential Analysis and Restoration Strategies Using MITRE ATT&CK and D3FEND
- Anastasia Safargalieva, Artur Rüffer and Emmanouil Vasilomanolakis: OHRA: dynamic multi-protocol LLM-based cyber deception
- Aliyu Tanko Ali, Leonard Chidiebere Eze, Damas Gruska and Martin Leucker: Graph Reduction to Attack Trees for (Unobservable) Target Analysis
- Andreas Wrisley, Roberto Guanciale, Simin Nadjm Tehrani and Ingemar Söderquist: Timing Interference in Multi-Core RISC-V Systems: Security Risks and Mitigations
- Bas van der Zandt, Senna van Hoek, Durba Chatterjee and Ileana Buhan: A walk down memory lane: Timing Analysis of Load and Store Instructions on ARM Cortex-M3 devices