Events

Previous

Image may contain: Text, Logo, Font, Electric blue.
Time and place: Oct. 4, 2019 2:00 PM3:00 PM, IFI, UiO

This case-study-based presentation demonstrates how open-source information can be collected and leveraged to attack critical infrastructure assets. Speaker: Sujeet Shenoi (University of Tulsa).

Image may contain: Text, Logo, Font, Electric blue.
Time and place: Oct. 4, 2019 10:00 AM11:00 AM, IFI, UiO

This presentation describes various electronic, physical and chemical techniques for extracting data and firmware from embedded devices. Speaker: Sujeet Shenoi (University of Tulsa).

AFSecurity
Time and place: Sep. 10, 2019 2:00 PM3:30 PM, IFI / OJD Level 5

5G networks promise to transform industries and our digital society by providing enhanced capacity, higher data rates, lower battery for machine-type devices, higher availability and reduced power consumption. In this talk, we visit 5G security architecture & outline potential security challenges in deployed networks.

AFSecurity Seminar
Time and place: Sep. 4, 2019 3:30 PM5:00 PM, IFI/UIO

This talk by Mauno Pihelgas is about building an availability scoring system for NATO CCDCOE's annual international cyber defence exercise Locked Shields.

Sikkerhetsfestivalen 2019
Time and place: Aug. 26, 2019 9:00 AMAug. 28, 2019 5:00 PM, Lillehammer

Norsk Informasjonssikkerhetsforum (ISF) arrangerer Sikkerhetsfestivalen 2019 i dagene 26. - 28. august på Lillehammer.

AFSecurity
Time and place: Aug. 21, 2019 2:00 PM4:00 PM, Kristen Nygaards sal, OJD

Privacy Threat of Keystroke Profiling on the Web

In a browser environment, Keystroke Dynamics (the way of typing on a keyboard) is a biometric modality which can be used by any Web service to profile users. The collection of keystroke dynamics does not require any additional sensors and can be done without the users' knowledge. Keystroke Dynamics can be used to authenticate users, but also to profile otherwise anonymous web users, and thereby represents a privacy threat. This talk first discusses the performance of Keystroke Dynamics and how it poses a serious threat to users privacy. The talk then discusses several potential real-time methods for anonymization of Keystroke Dynamics, and gives some recommendations for building and implementing Keystroke Dynamics Anonymization Systems.

AFSecurity
Time and place: June 6, 2019 3:00 PM5:00 PM, Kristan Nygaards sal (Room 5370), IFI.

Cyber Defense Exercises have received much attention in recent years. Crossed Swords is a NATO exercise directed at training Red Team members for responsive cyber defense.  This presentation is about the tools and techniques used, as well as challenges encountered, while building Frankenstack, an open source toolbox for providing feedback to Red Teams during exercises.

AFSecurity Seminar
Time and place: Apr. 26, 2019 2:00 PM4:00 PM, Kristan Nygaards sal (Room 5370), IFI.

This talk presents experiences from using various CTI (CyberThreat Intelligence) tools and methods for prediction, prevention and attribution of attacks in private-sector networks.

Time and place: Dec. 10, 2018Dec. 13, 2018, Seattle, WA, USA

International Workshop on Big Data Analytics for Cyber Threat Hunting 

In conjunction with the IEEE International Conference on Big Data 2018

Time and place: Nov. 28, 2018Nov. 30, 2018, Oslo

The 23rd Nordic Conference on Secure IT Systems

Time and place: June 28, 2018June 29, 2018, Oslo

The 17th European Conference on Cyber Warfare and Security

Time and place: Nov. 2, 2017Nov. 29, 2017, Oslo

Norsk Informasjonssikkerhetskonferanse 2017