Skip to the content.

NordSec 2022

The 27th Nordic Conference on Secure IT Systems

30 November 2022 - 02 December 2022 | Reykjavik University, Iceland

About the Conference

NordSec is an annual research conference series that has been running since 1996. The NordSec conferences address a broad range of topics on IT security. The events bring together security researchers from the Nordic countries, Northern Europe, and beyond. In addition to being a venue for academic publishing, NordSec is an important meeting place for university faculty, students, and industry researchers and experts from the region.

Call for Papers

Background, aim, and scope

NordSec addresses a broad range of topics within IT security with the aim of bringing together computer security researchers and encouraging interaction between academia and industry.

Possible topics include, but are not limited to:

Contributions should reflect original research, developments, studies and experience. Submitted papers should not exceed 16 pages (excluding references and appendices) in Springer LNCS format. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings.

Submission Guidelines

All submitted papers will be judged based on their quality and relevance through double-blind reviewing, where the identities of the authors are withheld from the reviewers. As an author, you are required to make a good-faith effort to preserve the anonymity of your submission, while at the same time allowing the reader to fully grasp the context of related past work, including your own. Minimally, please take the following steps when preparing your submission:

All submissions will be peer-reviewed by the program committee listed below.

Papers must be written in English, and submitted online in PDF format, via Easychair, at https://easychair.org/conferences/?conf=nordsec2022.

Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers must agree with Springer LNCS copyright and guarantee that their papers will be presented at the conference.

Preliminary Conference Schedule

Time 30. Nov | Room V102 01. Dec | Room M101 02. Dec | Room V101
08:30 Registration Registration Registration
09:00
Opening

Marcel Kyas (General Chair): Logistics
Luca Aceta (Dean of CS Dept): Welcome note
Elín Sif Kjartansdóttir (Ministry of Higher Education, Science and Innovation): Icelandic National Cybersecurity Strategy and Action Plan
Keynote 2
Electronic voting: design, attacks and proofs
Véronique Cortier (LORIA)
Session 7 - Secure Protocols
Session chair: Utz Roedig

Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models
Camille Sivelle, Lorys Debbah, Maxime Puys, Pascal Lafourcade and Thibault Franco-Rondisson
09:30
Keynote 1
A New Age of Cyber Security in Peace and Conflict
Sigurđur Emil Pálsson (CCDCOE)
How to Avoid Repetitions in Lattice-based Deniable Zero-Knowledge Proofs
Xavier Arnal, Abraham Cano, Tamara Finogina and Javier Herranz
10:00 Coffee Break Coffee Break
10:30 Coffee Break
Session 4 - Attacks & Attack Detection I
Session chair: Marios Anagnostopoulos

Honeysweeper: Towards Stealthy Honeytoken Fingerprinting Techniques
Mohamed Msaad, Shreyas Srinivasa, Mikkel M. Andersen, David H. Audran, Charity U. Orji and Emmanouil Vasilomanolakis
Session 8 - Secure Systems
Session chair: Mikael Asplund

Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage
Matthew Cole and Aravind Prakash
11:00
Session 1 - Privacy 1
Session chair: Hans P. Reiser

On the Effectiveness of Intersection Attacks in Anonymous Microblogging
Sarah Abdelwahab Gaballah, Lamya Abdullah, Minh Tung Tran, Ephraim Zimmer and Max Mühlhäuser
Towards Self-Monitoring Enclaves: Side-Channel Detection using Performance Counters
David Lantz, Felipe Boeira and Mikael Asplund
Malware Analysis with Symbolic Execution and Graph Kernel
Charles-Henry Bertrand Van Ouytsel and Axel Legay
11:30
Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement of User Awareness
Carsten Hesselmann, Delphine Reinhardt, Jan Gertheiss and Jörg P. Müller
DeCrypto: Finding Cryptocurrency Miners on ISP networks
Richard Plný, Karel Hynek and Tomáš Čejka
Closing
12:00 Lunch Lunch Lunch
12:30
13:00
13:15 Optional excursion to the Blue Lagoon. The excursion is not included in the registration fee, see the tour description here for more detail.
13:30
Session 2 - Privacy 2
Session chair: Tomas Olovsson

Location Privacy, 5G AKA, and Enhancements
Mohamed Taoufiq Damir and Valtteri Niemi
Session 5 - Attacks & Attack Detection II
Session chair: Sebastian Schrittwieser

Detection of Voice Conversion Spoofing Attacks using Voiced Speech
Arun Sankar M. S., Phillip L. De Leon and Utz Roedig
14:00
Local Differential Privacy for Private Construction of Classification Algorithms
Mina Alishahi, Daan Gast and Sam Vermeiren
A Wide Network Scanning for Discovery of UDP-based Reflectors in the Nordic Countries
Alexander Bjerre, Andreas Philip Westh, Emil Villefrance, A S M Farhan Al Haque, Jonas Bukrinski Andersen, Lucas K. Helgogaard and Marios Anagnostopoulos
14:30
IMSI Probing: Possibilities and Limitations
Daniel Fraunholz, Dominik Brunke, Simon Beidenhauser, Sebastian Berger, Hartmut Koenig and Daniel Reti
GPU-FAN: Leaking Data From Air-Gapped Machines via Covert Noise from GPUFans
Mordechai Guri
15:00 Coffee Break Coffee Break
15:30
Session 3 - Security Evaluation
Session chair: Marcel Kyas

Obfuscation-resilient Semantic Functionality Identification Through ProgramSimulation
Sebastian Schrittwieser, Patrick Kochberger, Michael Pucher, Caroline Lawitschka, Philip König and Edgar R. Weippl.
Session 6 - Forensics
Session chair: Emmanouil Vasilomanolakis

Maraudrone’s Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data
Tobias Latzo, Andreas Hellmich, Annika Knepper, Lukas Hardi, Tim Phillip Castello-Waldow, Felix Freiling and Andreas Attenberger
16:00
WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices
Bernhards Blumbergs, Ēriks Dobelis, Peteris Paikens, Krišj ̄anis Nesenbergs, Kirils Solovjovs and Artis Rušinš
VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack
Azadeh Tabiban, Heyang Zhao, Yosr Jarraya, Makan Pourzandi and Lingyu Wang
16:30 Poster Teaser
Actionable Cyber Threat Intelligence for Automated Incident Response
Cristoffer Leite, Jerry den Hartog, Daniel Ricardo dos Santos and Elisa Costante
17:00
17:30
18:00 Reception & Poster Session
19:00 Dinner at Hotel Marina, Mýrargata 2, 101 Reykjavík
Keynote 1: A New Age of Cyber Security in Peace and Conflict

The growth of capability of computers has been exponential for more than half a century and it has been the backbone of the economic growth we have enjoyed. But has security been addressed as well as in other fields relying on new inventions and technology? What could we learn from other fields for better security and resilience? Computers and networks now play a key role in conflicts, both as targets and weapons. How do modern militaries view cyber weapons and what is the framework for their use? How can we take this into account in our approach to cyber security?

Keynote 2: Electronic voting: design, attacks and proofs

Electronic voting aims to achieve the same properties as traditional paper based voting. Even when voters vote from their home, they should be given the same guarantees, without having to trust the election authorities, the voting infrastructure, and/or the Internet network. The two main security goals are vote privacy: no one should know how I voted; and verifiability: a voter should be able to check that the votes have been properly counted. In this talk, we will explore how these properties can be realized, attacked, and proved. We will in particular illustrate our presentation with the Belenios protocol.

Accepted Papers

Accepted Posters

Proceedings

The proceedings are available to be accessed here.

Registration Information

The registration can be done here.

For student registration, please send copy of the student certificate to nordsec2022@easychair.org.

Early Registration Fee (before 02 November 2022)
Student 57.000 ISK
Regular 70.000 ISK
Normal Registration Fee (from 02 November 2022)
Student 67.000 ISK
Regular 80.000 ISK

Location

NordSec 2022 takes place at Reykjavik University, Menntavegur 1, 102 Reykjavik.

Accomodation

Hotel reservations in the Icelandair Hotel Reykjavik Natura can be made at a special rate at this Synxis.com site. Reykjavik Natura is only a 10 minute walk from the university.

Prices (including breakfast):

There are limited number of rooms with that discount.

Booking.com or Expedia.com also have other options. It takes about 20-30 minutes (2.6 km) to walk from Reykjavik city center to Reykjavik University.

Airport Transportation

Iceland’s international airport (KEF) is at Keflavik, a 40-45 minutes drive from Reykjavik (not to be confused with Reykjavik city airport).

Arrivals

A Flybus operates all day from Keflavik Airport to Reykjavik in connection with all incoming international flights. Tickets can be bought inside the terminal building at the Flybus booth, online, or at a ticket automaton located by the exit door of the terminal building. The Flybus brings passengers to the BSÍ Bus Station in Reykjavik near the center of town. At the terminal passengers with Flybus Plus tickets board smaller buses which take them to selected hotels and guest houses in Reykjavík. List of hotels and guesthouses with drop-off/pick-up service available can be found here: www.re.is/flybus/flybusplus.

Departures

The Flybus operates all day in connection with all outgoing flights. Scheduled departures are from the BSÍ Bus Station in Reykjavík. Pick-up service is available from selected hotels and guest houses in Reykjavík for passengers holding Flybus Plus tickets. The day before departure, passengers need to inform the reception desk staff of their hotel/guest house that they want the Flybus to pick them up the following day.

All further Flybus information under www.re.is/flybus

Taxi service between Keflavik and Reykjavík is also available, but more expensive.

Local Transportation

Reykjavik University is located next to Öskjuhlíð hill, one of Reykjavík’s green areas shaped by the Ice Age. Bus line 8 departs at BSI and stops in front of the university (stop HR). You can buy single trip tickets on the bus for 550 ISK (cash only, no change given), or use the Straeto app (with registered credit card). For more information on local buses, check http://www.straeto.is/english/. You can use the trip planner to check the best route from your hotel to Reykjavik University.

Electric scooters are available as means of local transportation as well (see https://hopp.bike/).

Important dates

Publication

Nordsec 2022 proceedings will be published in Springer Lecture Notes in Computer Science series.

Committees

General Chair

PC Chair

Website Chair

PC Members

Contact

PC chair: Hans P. Reiser - hansr(_at_)ru.is

Hosted By

RU Logo