 {"id":278,"date":"2024-05-18T19:22:15","date_gmt":"2024-05-18T19:22:15","guid":{"rendered":"https:\/\/sola.kau.se\/swits\/?page_id=278"},"modified":"2025-04-07T07:01:27","modified_gmt":"2025-04-07T07:01:27","slug":"swits2024","status":"publish","type":"page","link":"https:\/\/sola.kau.se\/swits\/swits2024\/","title":{"rendered":"SWITS 2024"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>&nbsp;24th Seminar of the Swedish IT Security Network (SWITS 2024) Program, Lund University, 27-28 May 2024<\/strong><\/h2>\n\n\n\n<p>Location: Location: Teknodromen in the M-building at LTH, Lund University, <a href=\"https:\/\/maps.app.goo.gl\/kNFycJ8x5PLXAkwb8\">https:\/\/maps.app.goo.gl\/kNFycJ8x5PLXAkwb8<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Monday, 27<sup>th<\/sup> May 2024:<\/strong><\/h2>\n\n\n\n<p>10:30 Arrival, Coffee for early arrivers<\/p>\n\n\n\n<p>11:00 Welcome, Research group presentations (3-4 minutes each)<\/p>\n\n\n\n<p>11:50-12:20 PhD student presentations\/discussion \u2013 Session I<\/p>\n\n\n\n<p><strong>Web security &amp; Software Security (Moderator: Shahid Raza)<\/strong><\/p>\n\n\n\n<p>Eric Olsson (Chalmers): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Eric_Olsson.pdf\" data-type=\"attachment\" data-id=\"328\">FakeX: A Framework for Detecting Fake Reviews of Browser Extensions<\/a>\u201d<\/p>\n\n\n\n<p>Eric Cornelissen (KTH): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/eric-cornelissen.pdf\" data-type=\"attachment\" data-id=\"330\">GHunter: Universal Prototype Pollution Gadgets in JavaScript Runtimes<\/a>\u201d<\/p>\n\n\n\n<p>12:25-13:25 Lunch<\/p>\n\n\n\n<p><strong>13:25-13:50: Sharing Cyberrange Infrastructures &amp; Experiences \u2013 Towards a Swedish\/Nordic Cyberrange (Moderator: Simone Fischer-H\u00fcbner)<\/strong><\/p>\n\n\n\n<p>Presentations from Emre S\u00fcren (Cybercampus Sweden\/KTH), Mikael Asplund (LiU) and Jonathan Magnusson (KAU)<\/p>\n\n\n\n<p><strong>13:50-14:30: Cybercampus Sweden<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Status &#8211; Partnership program (David Olgart \u2013 15 min)<\/li>\n\n\n\n<li>Research agenda (Shahid Raza \u2013 20 min)<\/li>\n\n\n\n<li>Cybercampus graduate school &amp; SWITS (Simone &#8211; 5 min)<\/li>\n<\/ul>\n\n\n\n<p>14:30-14:35 Short Break<\/p>\n\n\n\n<p>14:35-15:20: PhD student presentations\/discussion \u2013 Session II<\/p>\n\n\n\n<p><strong>Vulnerabilities (Moderator: Leonardo Martucci)<\/strong><\/p>\n\n\n\n<p>Yekatierina Churakova (KTH):&nbsp; &#8220;<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Churakova.pdf\" data-type=\"attachment\" data-id=\"324\">Generation of Vulnerability Exploitability Exchange (VEX) reports tailored specifically for containers<\/a>&#8220;<\/p>\n\n\n\n<p>Rikard H\u00f6glund (RISE) \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Rikard_Hogklund.pdf\" data-type=\"attachment\" data-id=\"377\">Method for Adaptive Robustness to Denial-of-Service Attacks in Internet of Things Devices<\/a>\u201d<\/p>\n\n\n\n<p>Rohon Kundu (Lund University): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Rohon_Kundu.pdf\" data-type=\"attachment\" data-id=\"379\">A Comprehensive Robustness Analysis of Storj DCS Under Coordinated DDoS Attack<\/a>\u201d<\/p>\n\n\n\n<p>15:20-15:45: Coffee Break with Cake<\/p>\n\n\n\n<p>15:45-16:30: PhD student presentations\/discussion \u2013 Session III<\/p>\n\n\n\n<p><strong>AI and Cybersecurity (Moderator: Mikael Asplund)<\/strong><\/p>\n\n\n\n<p>Sonakshi Garg (Ume\u00e5 University): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Sonakshi_Garg.pdf\" data-type=\"attachment\" data-id=\"383\">Optimizing Inference Time in Private Learning of Large Language Models<\/a>\u201d<\/p>\n\n\n\n<p>Zhou Zhou (Ume\u00e5 University): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Zhou_Zhou.pdf\" data-type=\"attachment\" data-id=\"387\">Securing Serverless Edge AI for the Cloud-Edge Continuum<\/a>\u201d<\/p>\n\n\n\n<p>Mohamed Hashim Changrampadi (Chalmers): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/M_Hashim-1.pdf\" data-type=\"attachment\" data-id=\"371\">Context-aware pre-trained model&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; for intrusion detection systems<\/a>\u201d<\/p>\n\n\n\n<p>16:30-16:35 Short Break<\/p>\n\n\n\n<p>16:35 \u2013 17:20 PhD student presentations\/discussion \u2013 Session IV<\/p>\n\n\n\n<p><strong>Crypto &amp; Protocols (Moderator: Andr\u00e9 Teixeria)<\/strong><\/p>\n\n\n\n<p>Adrian Perez Keilty (Chalmers) \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Adrian_Perez.pdf\" data-type=\"attachment\" data-id=\"347\">AmorE: Amortized Efficiency for Pairing Delegation<\/a>\u201d<\/p>\n\n\n\n<p>Denis Nabokov (Lund University): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Denis_Nabokov-1.pdf\" data-type=\"attachment\" data-id=\"355\">Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures<\/a>\u201d<\/p>\n\n\n\n<p>Navya Sivaraman (LiU): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/06\/Julia_Key_Agreement_Abstract_2024.pdf\" data-type=\"attachment\" data-id=\"417\">Formal analysis of Julia Key Agreement protocol<\/a>\u201d<\/p>\n\n\n\n<p>18:00: Social event &#8211; Meeting at Domkyrkan<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Tuesday, 28<sup>th<\/sup> May 2024:<\/strong><\/h2>\n\n\n\n<p>8:45-9:45 PhD student presentations\/discussion \u2013 Session V<\/p>\n\n\n\n<p><strong>Privacy, PETS &amp; Authentication (Moderator: Ella Kolkowska)<\/strong><\/p>\n\n\n\n<p>Piero Romare (Chalmers): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Piero_Romare.pdf\" data-type=\"attachment\" data-id=\"375\">Privacy Profiles for Enhanced Privacy Permission Management in Trigger-Action Platforms<\/a>\u201d<\/p>\n\n\n\n<p>Samuel Wairimu (KAU): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Samuel_Wairimu.pdf\" data-type=\"attachment\" data-id=\"381\">On the Evaluation of Privacy Impact Assessment and Privacy Risk Assessment Methodologies: A Systematic Literature Review<\/a>\u201d<\/p>\n\n\n\n<p>Madhi Akil (KAU): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Mahdi_Akil.pdf\" data-type=\"attachment\" data-id=\"336\">Privacy-Preserving Vehicle Renting in VANETs<\/a>\u201d<\/p>\n\n\n\n<p>Sujash Naskar (Mid Sweden University): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Sujah_Naskar.pdf\" data-type=\"attachment\" data-id=\"385\">Distributed Authentication in Decentralized VANETS<\/a>\u201d<\/p>\n\n\n\n<p>9:45-10:15 <strong>Poster pitches&nbsp; \u2013 2-3 min each (Moderator: Paul Stankovsky Wagner)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Arthur A. Nijdam (Lund University): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Arthus-Nijdam.pdf\" data-type=\"attachment\" data-id=\"289\">Generative Federated Learning<\/a>\u201d<\/li>\n\n\n\n<li>Filip Natvig (Uppsala University): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Filip_Natvik.pdf\" data-type=\"attachment\" data-id=\"291\">Enhancing Cybersecurity in Electrical Power Substations via Cross-Substation Transfer Learning<\/a>\u201d<\/li>\n\n\n\n<li>Leyla Sadighi (Chalmers): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Leyla_Sadighi.pdf\" data-type=\"attachment\" data-id=\"293\">Machine Learning-Based Polarization Signature Analysis for Detection and Categorization of Eavesdropping and Malicious Attacks<\/a>\u201d<\/li>\n\n\n\n<li>Motjaba Eshghie (KTH): \u201cSmart Contract Invariant Synthesis and Mining\u201d<\/li>\n\n\n\n<li>Motjaba Eshghie (KTH): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Motjaba_dcr-modeling-verification.pdf\" data-type=\"attachment\" data-id=\"295\">Formalization and Verification of Smart Contracts Using DCR Graphs<\/a>\u201d<\/li>\n\n\n\n<li>Sudipta Paul (Ume\u00e5 University): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Sudipta_Paul.pdf\" data-type=\"attachment\" data-id=\"317\">Community Detection on Dynamic Graphs with Edge Local Differential Privacy<\/a>\u201d<\/li>\n\n\n\n<li>Reyhane Falanji (Link\u00f6ping University): &#8220;<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Reyhane_Falanji.pdf\" data-type=\"attachment\" data-id=\"319\">Provable Entity Accountability for Protocols with Modifiable Signed Messages<\/a>&#8220;<\/li>\n\n\n\n<li>Bolaji Gbadamosi (KAU): &#8220;<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Bolaji_G.pdf\" data-type=\"attachment\" data-id=\"401\">The eBPF Verifier: Ensuring Safety and Security in Programmable Linux<\/a>&#8220;<\/li>\n\n\n\n<li>Hanna Ek (Chalmers): &#8220;<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Abstract_SWITS_HannaEk.pdf\" data-type=\"attachment\" data-id=\"287\">Advanced properties for digital signatures<\/a>&#8220;<\/li>\n\n\n\n<li>Syed Umer Bukhari (Chalmers): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Syed_Umer_Bukhani.pdf\" data-type=\"attachment\" data-id=\"299\">Moving Target Defense in Distributed Systems<\/a>\u201d<\/li>\n\n\n\n<li>Kshira Sagar Sahoo (Ume\u00e5 University), &#8220;<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Poster_KshiraSagar_Sahoo.pdf\" data-type=\"attachment\" data-id=\"406\">Securing P4-SDN Data Plane against Flow Table Modification Attack<\/a>&#8220;<\/li>\n\n\n\n<li>Hendarmawan (RISE): hCODE 2.0\uff1aAn Open-source Toolkit for Building Efficient FPGA-enabled Clouds<\/li>\n\n\n\n<li>Ala Sarah Alaqra (KAU): Interreg Sweden \u2013 Norway Project \u201dCross Border Cyber Capacity- CBCC)<\/li>\n\n\n\n<li>Victor Morel: WASP NEST Project CyberSecIT<\/li>\n<\/ul>\n\n\n\n<p>10:15-11:30 Poster session (coffee is served)<\/p>\n\n\n\n<p>11:30-12:00: <strong>Christian Gehrmann (Lund University) \u2013 invited talk (Moderator: Qian Guo)<\/strong><\/p>\n\n\n\n<p>12:00-12:30 PhD student presentations\/discussion \u2013 Session VI<\/p>\n\n\n\n<p><strong>Hardware Security &amp; TEEs (Moderator: Simin Nadjm-Tehrani)<\/strong><\/p>\n\n\n\n<p>Asrin Abdollahi (RISE, M\u00e4lardalens University (MDU)): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Asrin_Abdollahi.pdf\" data-type=\"attachment\" data-id=\"322\">Building a Secure Open-Source Hardware Architecture with Trusted&nbsp; Execution Environments (TEEs)<\/a>\u201d<\/p>\n\n\n\n<p>Marcus Birgersson (KTH): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Marcus_Birgersson.pdf\" data-type=\"attachment\" data-id=\"338\">Formally verified and upgradable trusted functions<\/a>\u201d<\/p>\n\n\n\n<p>12:30-13:30: Lunch<\/p>\n\n\n\n<p>13:30 \u2013 14:30 PhD student presentations\/discussion \u2013 Session VI<\/p>\n\n\n\n<p><strong>Network Security (Moderator: Magnus Almgren)<\/strong><\/p>\n\n\n\n<p>Arlette Houndji (RISE &amp; KAU): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Arlette_Houndji.pdf\" data-type=\"attachment\" data-id=\"349\">Cybersecurity in 6G Satellite Communication<\/a>\u201d<\/p>\n\n\n\n<p>Johannes Oleg\u00e5rd (Stockholm University): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Johannes_Olegard.pdf\" data-type=\"attachment\" data-id=\"332\">When is logging sufficient?\u201d<\/a><\/p>\n\n\n\n<p>Jonathan Magnusson (KAU): \u201c<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Jonathan_Magnusson-1.pdf\" data-type=\"attachment\" data-id=\"363\">Fingerprinting DNS Resolvers using Query Patterns from QNAMEMinimization<\/a>\u201d<\/p>\n\n\n\n<p>Marcus Dansarie (FHS &amp; Sk\u00f6vde University): \u201dS<a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2024\/05\/Marcus_Dansarie-1.pdf\" data-type=\"attachment\" data-id=\"369\">ecurity Aspects of TETRA Networks in Sweden: Preliminary results from a case study<\/a>\u201d<\/p>\n\n\n\n<p>14:30-14:50 Summing up &amp; Outlook<\/p>\n\n\n\n<p>14:50 Coffee, Farewell<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp;24th Seminar of the Swedish IT Security Network (SWITS 2024) Program, Lund University, 27-28 May 2024 Location: Location: Teknodromen in the M-building at LTH, Lund University, https:\/\/maps.app.goo.gl\/kNFycJ8x5PLXAkwb8 Monday, 27th May 2024: 10:30 Arrival, Coffee for early arrivers 11:00 Welcome, Research group presentations (3-4 minutes each) 11:50-12:20 PhD student presentations\/discussion \u2013 Session I Web security &amp; &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/sola.kau.se\/swits\/swits2024\/\" class=\"more-link\">Forts\u00e4tt l\u00e4sa<span class=\"screen-reader-text\"> \u201dSWITS 2024\u201d<\/span><\/a><\/p>\n","protected":false},"author":726,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-278","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/sola.kau.se\/swits\/wp-json\/wp\/v2\/pages\/278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sola.kau.se\/swits\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sola.kau.se\/swits\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sola.kau.se\/swits\/wp-json\/wp\/v2\/users\/726"}],"replies":[{"embeddable":true,"href":"https:\/\/sola.kau.se\/swits\/wp-json\/wp\/v2\/comments?post=278"}],"version-history":[{"count":26,"href":"https:\/\/sola.kau.se\/swits\/wp-json\/wp\/v2\/pages\/278\/revisions"}],"predecessor-version":[{"id":428,"href":"https:\/\/sola.kau.se\/swits\/wp-json\/wp\/v2\/pages\/278\/revisions\/428"}],"wp:attachment":[{"href":"https:\/\/sola.kau.se\/swits\/wp-json\/wp\/v2\/media?parent=278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}