Ole Johan Dahls hus (map)
Gaustadalléen 23 B
This case-study-based presentation demonstrates how open-source information can be collected and leveraged to attack critical infrastructure assets. Speaker: Sujeet Shenoi (University of Tulsa).
This presentation describes various electronic, physical and chemical techniques for extracting data and firmware from embedded devices. Speaker: Sujeet Shenoi (University of Tulsa).
5G networks promise to transform industries and our digital society by providing enhanced capacity, higher data rates, lower battery for machine-type devices, higher availability and reduced power consumption. In this talk, we visit 5G security architecture & outline potential security challenges in deployed networks.
This talk by Mauno Pihelgas is about building an availability scoring system for NATO CCDCOE's annual international cyber defence exercise Locked Shields.
Norsk Informasjonssikkerhetsforum (ISF) arrangerer Sikkerhetsfestivalen 2019 i dagene 26. - 28. august på Lillehammer.
Privacy Threat of Keystroke Profiling on the Web
In a browser environment, Keystroke Dynamics (the way of typing on a keyboard) is a biometric modality which can be used by any Web service to profile users. The collection of keystroke dynamics does not require any additional sensors and can be done without the users' knowledge. Keystroke Dynamics can be used to authenticate users, but also to profile otherwise anonymous web users, and thereby represents a privacy threat. This talk first discusses the performance of Keystroke Dynamics and how it poses a serious threat to users privacy. The talk then discusses several potential real-time methods for anonymization of Keystroke Dynamics, and gives some recommendations for building and implementing Keystroke Dynamics Anonymization Systems.
Cyber Defense Exercises have received much attention in recent years. Crossed Swords is a NATO exercise directed at training Red Team members for responsive cyber defense. This presentation is about the tools and techniques used, as well as challenges encountered, while building Frankenstack, an open source toolbox for providing feedback to Red Teams during exercises.
This talk presents experiences from using various CTI (CyberThreat Intelligence) tools and methods for prediction, prevention and attribution of attacks in private-sector networks.
International Workshop on Big Data Analytics for Cyber Threat Hunting
In conjunction with the IEEE International Conference on Big Data 2018
The 23rd Nordic Conference on Secure IT Systems
The 17th European Conference on Cyber Warfare and Security