Accepted Papers

  • Adam Mårtensson, Edvin Nielsson and Simon Hacks: Foreign Disinformation on Swedish Facebook: A Mixed-Methods Thematic Analysis of Manipulative Narratives and Societal Resilience
  • Julian Sturm, Daniel Bücheler, Oliver Zeidler, Daniel Fraunholz, Wolfgang Kellerer and Hartmut Koenig: MP-LFM: Breaking Subscriber Privacy (even more) by Exploiting Linkability in 5G AKA
  • Marc Damie, Florian Hahn, Andreas Peter and Jan Ramon: DDH-based schemes for multi-party Function Secret Sharing
  • Akif Mehmood and Nicola Tuveri: Integrating PQC in OpenSSL via Shallow Providers for Cryptographic Agility
  • Jonas Röckl, Julian Funk and Tilo Müller: WireTrust: A TrustZone-Based Non-Bypassable VPN Tunnel
  • Bruno Kreyssig, Sabine Houy, Hantang Zhang, Timothée Riom and Alexandre Bartel: GadgetBuilder: An Overhaul of the Greatest Java Deserialization Exploitation Tool
  • Karolina Jablonska and Emmanouil Vasilomanolakis: Targeted AI-based password guessing leveraging email-derived user attributes
  • George Teselean: Attacking an RSA-like Cryptosystem Using Continued Fractions and Latices
  • János Kövér, Roberto Guanciale and György Dán: Mitigating traffic analysis attacks while maintaining on-path network observability
  • Mario Lins, Stefan Rass and René Mayrhofer: Software Supply Chain Security: Can we beat the kill-chain? A Case Study on the XZ backdoor
  • Raymond Hagen, Kirsi Helkala and Lasse Øverlier: Understanding APT Defense Through Expert Eyes: A Critical Exploration of Perceived Needs and Gaps
  • Jonathan Magnusson: Privacy and Security of DNS Resolvers used in the Nordics and Baltics
  • Alexandre Bartel: Ofbugscation
  • Majid Mollaeefar, Amir Sharif, Zahra Ebadi Ansaroudi, Giada Sciarretta, Francesco Antonio Marino and Silvio Ranise: Multi-entity Control-based Risk Assessment: A European Digital Identity Wallet Use Case
  • Mohamad Gharib: From Perception to Protection: A Mental Model-Based Framework for Capturing Usable Security and Privacy Requirements
  • Mads Bisgaard Schmidt, Ashutosh Dhar Dwivedi and Jens Myrup Pedersen: Exploiting Quantum Point-to-Point Protocol (Q3P) for Denial-of-Service (DoS) Attacks
  • Lalie Arnoud, Victor Breux, Pierre-Henri Thevenon and Eric Gaussier: An Empirical Evaluation of Intrusion Detection Systems based on System Calls
  • Niels Voorneveld: Threshold Trust Logic
  • Karthikeya S M Yelisetty, Gaurav Madkaikar, Anna Bamberger, Maribel Fernandez and Shamik Sural: Mining Attribute-based Access Control Policies via Categorisation
  • Viktor Rovinskyi, Vitalii Horielov and Serhii Sharyn: Key-Gated Generative Obfuscation for Embedded Strings
  • Ilse Harmers and Mina Alishahi: Fairness under Noise: How Differential Privacy Affects Bias in GANs-Generated Data
  • Samuel Wairimu and Leonardo Iwaya: On the Security and Privacy of AI-based Mobile Health Chatbots
  • Mohsin Khan, Håvard Dagenborg and Dag Johansen: A Comparative Software Benchmark of Lightweight Hash Functions on 8-bit AVR Using ChipWhisperer
  • Oğuz Narlı, Meltem Kurt Pehlivanoğlu and Sedat Akleylek: A New Optimized Implementation of SMAUG-T for Lightweight Devices
  • Zoé Lagache, Pierre-Henri Thevenon, Maxime Puys and Oum-El-Kheir Aktouf: Dissecting Mirai: Spatio-Sequential Analysis and Restoration Strategies Using MITRE ATT&CK and D3FEND
  • Anastasia Safargalieva, Artur Rüffer and Emmanouil Vasilomanolakis: OHRA: dynamic multi-protocol LLM-based cyber deception
  • Aliyu Tanko Ali, Leonard Chidiebere Eze, Damas Gruska and Martin Leucker: Graph Reduction to Attack Trees for (Unobservable) Target Analysis
  • Andreas Wrisley, Roberto Guanciale, Simin Nadjm Tehrani and Ingemar Söderquist: Timing Interference in Multi-Core RISC-V Systems: Security Risks and Mitigations
  • Bas van der Zandt, Senna van Hoek, Durba Chatterjee and Ileana Buhan: A walk down memory lane: Timing Analysis of Load and Store Instructions on ARM Cortex-M3 devices