Program

DAY 0:

  • 11 November 2025
  • Address: Address: Narva mnt 18 (1st floor), Tartu
17:30-18:00Registration
18:00-24:00Welcome reception and networking dinner at the Delta Research Centre
Address: Narva mnt 18, 1st floor

DAY 1:

  • 12 November 2025
  • Address: University of Tartu Library, W. Struve 1, Tartu
8:00-9:00Registration
9:00-9:30Conference opening
9:30-10:30Keynote talk
Vashek Matyas (Masaryk University, Brno, Czechia):
How to Set a Manufacturing Line for Fingerprint Faking
Session chair: Raimundas Matulevičius
Room: Conference Hall
10:30-11:00Coffee break
11:00-12:30Session 1: Cryptography
Session chair: Peeter Laud
Room: Conference Hall
Session 2: Artificial Intelligence and Software Security
Session chair: Lothar Fritsch
Room: Tõstamaa
Marc Damie, Florian Hahn, Andreas Peter and Jan Ramon: DDH-based schemes for multi-party Function Secret Sharing

George Teselean: Attacking an RSA-like Cryptosystem Using Continued Fractions and Lattices

Akif Mehmood and Nicola Tuveri: Integrating PQC in OpenSSL via Shallow Providers for Cryptographic Agility
Anastasia Safargalieva, Artur Rüffer and Emmanouil Vasilomanolakis: OHRA: dynamic multi-protocol LLM-based cyber deception

Samuel Wairimu and Leonardo Iwaya: On the Security and Privacy of AI-based Mobile Health Chatbots

Bruno Kreyssig, Sabine Houy, Hantang Zhang, Timothée Riom and Alexandre Bartel: GadgetBuilder: An Overhaul of the Greatest Java Deserialization Exploitation Tool
12:30-14:00Lunch
14:00-15:30Session 3: Cryptography
Session chair: Lukas Malina
Room: Conference Hall
Session 4: Artificial Intelligence and Software Security
Session chair: Tuomas Aura
Room: Tõstamaa
Mohsin Khan, Håvard Dagenborg and Dag Johansen: A Comparative Software Benchmark of Lightweight Hash Functions on 8-bit AVR Using ChipWhisperer

Oğuz Narlı, Meltem Kurt Pehlivanoğlu and Sedat Akleylek: A New Optimized Implementation of SMAUG-T for Lightweight Devices

Mads Bisgaard Schmidt, Ashutosh Dhar Dwivedi and Jens Myrup Pedersen: Exploiting Quantum Point-to-Point Protocol (Q3P) for Denial-of-Service (DoS) Attacks
Karolina Jablonska and Emmanouil Vasilomanolakis: Targeted AI-based password guessing leveraging email-derived user attributes

Ilse Harmers and Mina Alishahi: Fairness under Noise: How Differential Privacy Affects Bias in GANs-Generated Data

Mario Lins, Stefan Rass and René Mayrhofer: Software Supply Chain Security: Can we beat the kill-chain? A Case Study on the XZ backdoor
15:30-16:00Coffee break
16:00-17:30Session 5: Network and Communication Security
Session chair: Lukas Daubner
Room: Conference Hall
Session 6: Obfuscation
Session chair: Sedat Akleylek
Room: Tõstamaa
Julian Sturm, Daniel Bücheler, Oliver Zeidler, Daniel Fraunholz, Wolfgang Kellerer and Hartmut Koenig: MP-LFM: Breaking Subscriber Privacy (even more) by Exploiting Linkability in 5G AKA

János Kövér, Roberto Guanciale and György Dán: Mitigating traffic analysis attacks while maintaining on-path network observability

Jonathan Magnusson: Privacy and Security of DNS Resolvers used in the Nordics and Baltics
Viktor Rovinskyi, Vitalii Horielov and Serhii Sharyn: Key-Gated Generative Obfuscation for Embedded Strings

Alexandre Bartel: Bugfuscation
18:30-24:00Conference dinner at Vilde Ja Vine

DAY 2:

  • 13 November 2025
  • Address: University of Tartu Library, W. Struve 1, Tartu
8:30-9:30Registration
9:30-10:30Keynote talk
Kalev Pihl (SK ID Solutions, CEO, Estonia):
Can We Be Secure Without Innovation?
Session chair: Mubashar Iqbal
Room: Conference Hall
10:30-11:00Coffee break
11:00-12:30Session 7: System and Hardware Security
Session chair: Mariia Bakhtina
Room: Conference Hall
Session 8: Threat Analysis
Session chair: Simon Hacks
Room: Tõstamaa
Jonas Röckl, Julian Funk and Tilo Müller: WireTrust: A TrustZone-Based Non-Bypassable VPN Tunnel

Andreas Wrisley, Roberto Guanciale, Simin Nadjm Tehrani and Ingemar Söderquist: Timing Interference in Multi-Core RISC-V Systems: Security Risks and Mitigations

Bas van der Zandt, Senna van Hoek, Durba Chatterjee and Ileana Buhan: A walk down memory lane: Timing Analysis of Load and Store Instructions on ARM Cortex-M3 devices
Lalie Arnoud, Victor Breux, Pierre-Henri Thevenon and Eric Gaussier: An Empirical Evaluation of Intrusion Detection Systems based on System Calls

Aliyu Tanko Ali, Leonard Chidiebere Eze, Damas Gruska and Martin Leucker: Graph Reduction to Attack Trees for (Unobservable) Target Analysis

Zoé Lagache, Pierre-Henri Thevenon, Maxime Puys and Oum-El-Kheir Aktouf: Dissecting Mirai: Spatio-Sequential Analysis and Restoration Strategies Using MITRE ATT&CK and D3FEND
12:30-14:00Lunch
14:00-15:30Session 9: Access Control and Policy Management
Session chair: Audun Jøsang
Room: Conference Hall
Session 10: Usable Security and Societal Resilience
Session chair: Nicola Dragoni
Room: Tõstamaa
Karthikeya S M Yelisetty, Gaurav Madkaikar, Anna Bamberger, Maribel Fernandez and Shamik Sural: Mining Attribute-based Access Control Policies via Categorisation

Niels Voorneveld: Threshold Trust Logic

Majid Mollaeefar, Amir Sharif, Zahra Ebadi Ansaroudi, Giada Sciarretta, Francesco Antonio Marino and Silvio Ranise: Multi-entity Control-based Risk Assessment: A European Digital Identity Wallet Use Case
Mohamad Gharib: From Perception to Protection: A Mental Model-Based Framework for Capturing Usable Security and Privacy Requirements

Raymond Hagen, Kirsi Helkala and Lasse Øverlier: Understanding APT Defense Through Expert Eyes: A Critical Exploration of Perceived Needs and Gaps

Adam Mårtensson, Edvin Nielsson and Simon Hacks: Foreign Disinformation on Swedish Facebook: A Mixed-Methods Thematic Analysis of Manipulative Narratives and Societal Resilience
15:30-16:00Coffee break
16:00-17:30Panel discussion
The 30 years of NordSec
Panel chair: Liina Kamm
Room: Conference Hall
17:30-18:00Conference closing
18:30-24:00Networking on the terrace of the Delta Research Centre
Address: Narva mnt 18, 4th floor