 {"id":433,"date":"2025-05-29T16:07:52","date_gmt":"2025-05-29T16:07:52","guid":{"rendered":"https:\/\/sola.kau.se\/swits\/?page_id=433"},"modified":"2025-06-01T21:51:26","modified_gmt":"2025-06-01T21:51:26","slug":"swits-2025-25th-seminar-of-the-swedish-it-security-network-programme","status":"publish","type":"page","link":"https:\/\/sola.kau.se\/swits\/swits-2025-25th-seminar-of-the-swedish-it-security-network-programme\/","title":{"rendered":"SWITS 2025 \u2013 25th Seminar of the Swedish IT Security Network \u2013Programme"},"content":{"rendered":"\n<p>3-4 June, Location: Cybercampus Sweden, Valhallav\u00e4gen 79 (KTH Campus), Stockholm<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-9def12f220c596e9b86fc5fb34b1bbef\">Tuesday, 3rd June 2025:<\/h2>\n\n\n\n<p>10:30: Arrival, Coffee for early arrivals<\/p>\n\n\n\n<p>11:00: <strong>Welcome &amp; Introduction &#8211;<\/strong> Paola Lund\u00e9n &amp; Felix Knutas (Cybercampus), Simone Fischer-H\u00fcbner (SWITS Coordinator) <strong>\u2013<\/strong> Lecture hall on 5<sup>th<\/sup> floor<\/p>\n\n\n\n<p><strong>Short research group presentations<\/strong> (2-3 minutes each):<\/p>\n\n\n\n<p>BTH, University of Bor\u00e5s, Chalmers University of Technology, F\u00f6rsvarsh\u00f6gskola, J\u00f6nk\u00f6ping University, KAU, KTH, Link\u00f6ping University, Lule\u00e5 University, Lund University, MDU, MSB, University of Sk\u00f6vde, Stockholm University, Ume\u00e5 University, Uppsala University, \u00d6rebro University, RISE, NTNU<\/p>\n\n\n\n<p>12:15: Lunch<\/p>\n\n\n\n<p>13:15 -14:00:<strong> PhD student presentations \u2013 Session 1: Cybersecurity and AI <\/strong>(Chair: Christian Rohner) \u2013 Lecture hall on the 5<sup>th<\/sup> floor<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Christian-Gustavsson_Abstract-SWITS-2025-The-Alchemy-Papers.pdf\" data-type=\"link\" data-id=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Christian-Gustavsson_Abstract-SWITS-2025-The-Alchemy-Papers.pdf\">The Alchemy of AI and Cybersecurity: Who Shapes, Frames, and Evaluates AI for Cybersecurity<\/a>?<a href=\"http:\/\/media\"> <\/a><\/strong>Christian Gustavsson (Link\u00f6ping University)<\/p>\n\n\n\n<p><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_SWITS_Aro-Sati.pdf\" data-type=\"link\" data-id=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_SWITS_Aro-Sati.pdf\"><strong>Application of Generative AI in Information Security Research \u2013 a Systematic Literature Review<\/strong>,<\/a> Leila Aro-Sati, Fredrik Karlsson, Shang Gao, Elham Rostami (\u00d6rebro University)<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Adil_Bin_Bhutto_SWITS_Presentation.pdf\">Securing the Edge AI: Opportunities and Challenges in the Serverless World<\/a><\/strong>, Adil Bin Bhutto, Monowar Bhuyan (Ume\u00e5 University)<\/p>\n\n\n\n<p>14:00: Short Break<\/p>\n\n\n\n<p>14:05-14:35:<strong>PhD student presentations \u2013 Session 2: Web Security <\/strong>(Chair: Mikael Asplund) <strong>\u2013<\/strong> &nbsp;Lecture hall on the &nbsp;5<sup>th<\/sup> floor<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Eric_Olsson_abstract.pdf\" data-type=\"link\" data-id=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Eric_Olsson_abstract.pdf\">SpiderSapien: Client-Centric Crawler and Security Scanner<\/a>, <\/strong>Eric Olsson, Benjamin Eriksson (Chalmers University of Technology), Adam Doup\u00e9 (University of Arizona), Andrei Sabelfeld (Chalmers University of Technology)<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Mojtaba-Moazen-Swits-short-talk.pdf\" data-type=\"link\" data-id=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Mojtaba-Moazen-Swits-short-talk.pdf\">Securing GitHub Workflows Against API Abuse in Software Supply Chains<\/a><\/strong>, Mojtaba Moazen, KTH<\/p>\n\n\n\n<p>14:35: Coffee<\/p>\n\n\n\n<p>15:00 -15:30: <strong>PhD student presentations \u2013 Session 3: Hardware &amp; IoT Security <\/strong>(Chair: Farzaneh Karegar) <strong>\u2013<\/strong> Lecture hall on the 5<sup>th<\/sup> floor<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_SWITS-s2025.AsrinAbdollahi.pdf\">Trusted Execution Environment (TEE) for Low-Power RISC-V Devices,<\/a> <\/strong>Asrin Abdollahi (RISE)<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Daniel_-Freiermuth_swits_abstract.pdf\" data-type=\"link\" data-id=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Daniel_-Freiermuth_swits_abstract.pdf\">EagerTAP \u2014 Pre-evaluation for data minimization on TAPs,<\/a> <\/strong>Daniel Freiermuth, Andrei Sabelfeld and Daniel Hedin (Chalmers University of Technology)<\/p>\n\n\n\n<p>Short Break<\/p>\n\n\n\n<p>15:35-16:05:<strong> PhD student presentations \u2013 Session4: Network Security I<\/strong> (Chair: Panos Papadimitratos) <strong>\u2013<\/strong> Lecture hall on the 5<sup>th<\/sup> floor<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Samuel_Bach_-Abstract___SWITS2025.pdf\" data-type=\"link\" data-id=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Samuel_Bach_-Abstract___SWITS2025.pdf\">Evaluating the Viability of Computational Offloading for Vehicles Under Adverse Network Conditions <\/a><\/strong>(Samuel Bach (AztaZero &amp; KAU), Victor Jarlow (AstaZero), Anna Brunstr\u00f6m, Leonardo Martucci (KAU), and Timo Kero (AstaZero)<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Khalil_ICCCN___DDoSimu5G-10.pdf\" data-type=\"link\" data-id=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Khalil_ICCCN___DDoSimu5G-10.pdf\">DDoSimu5G: A Simulation-Based Study of Temporal Botnet DDoS Attack Impact on 5G+ Network KPIs<\/a>, <\/strong>Karim Khalil, Christian Gehrmann, Sara Ramezanian (Lund University)<\/p>\n\n\n\n<p>Or in parallel (15:35-16:05):<\/p>\n\n\n\n<p><strong>Visit Cybercampus \u201cRoyal Hacking Lab\u201d \u2013 tour and demonstrations <\/strong>(Emre S\u00fcren) \u2013 4<sup>th<\/sup> floor<strong><\/strong><\/p>\n\n\n\n<p>16:10: <strong>Diversity matters: shaping an inclusive future in cybersecurity <\/strong>(Chair: Paola Lund\u00e9n, Cybercampus) <strong>\u2013<\/strong> &nbsp;Lecture hall on the 5<sup>th<\/sup> floor:<\/p>\n\n\n\n<p>Panelists: Louise Yngstr\u00f6m (SU \/ DSV), Ala Sarah Alaqra (KAU), Navya Sivaraman (Link\u00f6ping University), Pernilla R\u00f6nn (Women4Cyber), Joakim K\u00e4vrestad (J\u00f6nk\u00f6ping University).<\/p>\n\n\n\n<p>16:50 &#8211; Welcome by David Olgart (Director of Cybercampus Sweden)<\/p>\n\n\n\n<p>17:00 &#8211; 17:30:<strong> Visit Cybercampus \u201cRoyal Hacking Lab\u201d \u2013 tour and demonstrations<\/strong> (Emre S\u00fcren) \u2013 4<sup>th<\/sup> floor<\/p>\n\n\n\n<p>19:00 Social event (Boat Tour) &amp; Dinner \u2013 Departure from: Skeppsbron near the Gustav III statue, below the royal castle. (Note: The boat will leave at 19:00 \u2013 so please arrive at the boat some time before 19:00). <a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/Homequai-RF-RH-Rex-Blidosund-Sjogull-Bris.pdf\">See map.<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-65bb4a9c56e175dd3658c0228e15c8be\">Wednesday, 4th June 2025:<\/h2>\n\n\n\n<p>8:30: &nbsp;Status: Cybercampus Graduate School (Simone Fischer-H\u00fcbner) <strong>\u2013<\/strong> &nbsp;Lecture hall on the 5<sup>th<\/sup> floor<\/p>\n\n\n\n<p>8:50: Session 5: <strong>PhD student presentations \u2013 Session 5: Network Security II<\/strong> (Chair: Sara Ramezanian) <strong>\u2013<\/strong> &nbsp;Lecture hall on the 5<sup>th<\/sup> floor<strong><em><\/em><\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Emil-Larsson-Understanding-Corporate-Ransomware-abstract.pdf\" data-type=\"link\" data-id=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Emil-Larsson-Understanding-Corporate-Ransomware-abstract.pdf\"><strong>Understanding Corporate Ransomware \u2013 A Case Study in the Nordics<\/strong>, <\/a>Emil Larsson (FHS, KAU), Meiko Jensen (KAU)<\/p>\n\n\n\n<p><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Arlette-Houndji-swits_abstract_1.pdf\"><strong>PKI for 6G Satellite Communication<\/strong>, Arlette Houndji<\/a> (RISE, KAU), Giuseppe Caso (KAU), Alfonso Iacovazzi (RISE), Simone Fischer-H\u00fcbner, Shahid Raza (RISE)<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Rikard-Hoglund-SWITS-2025-abstract.pdf\" data-type=\"link\" data-id=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Rikard-Hoglund-SWITS-2025-abstract.pdf\">Tor4IoT: Enabling Onion Routing for the IoT<\/a><\/strong>, Rikard H\u00f6glund, Marco Tiloca, Christian Ams\u00fcss, Simon Bouget, and Shahid Raza (RISE)<\/p>\n\n\n\n<p>9:35:<strong> Invited Talk: Preparing for EU Horizon Europe, Digital Europe and National Calls <\/strong>\u2013 Senja Nordstr\u00f6m, Veronica Fransson (NCC-SE, MSB) &#8211; Lecture hall on the 5<sup>th<\/sup> floor<\/p>\n\n\n\n<p>10:00 &#8211; 11:30: &nbsp;Poster Session (Chair: Christine Grosse):<\/p>\n\n\n\n<p>Poster Pitches by PhD students &amp; Cybersecurity projects \u2013 Poster Exhibition \u2013 5<sup>th<\/sup> and 4<sup>th<\/sup> floor <strong>(2 minutes per pitch)<\/strong><\/p>\n\n\n\n<p><em>PhD Student posters:<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025-Berglund-Sandor-Poster.pdf\" data-type=\"link\" data-id=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025-Berglund-Sandor-Poster.pdf\">First Person Attacker Simulation in MAL<\/a><\/strong>, Sandor Berglund, Matthias Ekstedt (KTH)<\/li>\n\n\n\n<li><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025-Zamanian-Digital_Twin_SWITS_2025.pdf\" data-type=\"link\" data-id=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025-Zamanian-Digital_Twin_SWITS_2025.pdf\"><strong>Intrusion Detection System in Digital Twins for Industrial Control System<\/strong>s<\/a>, Sahar Zamanian, Maria Kuhl (Lund University)<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025-Berthilsson-Exposing_confidential_WASM_code_in_AMD_SEV.pdf\" data-type=\"link\" data-id=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025-Berthilsson-Exposing_confidential_WASM_code_in_AMD_SEV.pdf\">Exposing confidential WASM code in AMD SEV<\/a><\/strong>, Markus Berthilsson, Christian Gehrmann (Lund University)<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025-Stoppkotte-poster.pdf\" data-type=\"link\" data-id=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025-Stoppkotte-poster.pdf\">PrivTAP: A usable privacy assistant for Trigger-Action Platforms<\/a><\/strong>, Janek Stoppkotte (Chalmers University of Technology)<\/li>\n\n\n\n<li><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025-Ramin_Abstract_Poster_Presentation.pdf\" data-type=\"link\" data-id=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025-Ramin_Abstract_Poster_Presentation.pdf\"><strong>A Physical Layer Security Framework for Industrial Sensor Network Utilizing Integrated Infrared Handshaking and Visual Light Communication<\/strong>, <\/a>Ramin Irani (BTH, ArkiPelag), Siamak Khatibi (ArkiPelag)<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025-Nijdam-SWITS__Computers___Security__Pedagogy_paper__Lund__Helsinki__and_NIST.pdf\" data-type=\"link\" data-id=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025-Nijdam-SWITS__Computers___Security__Pedagogy_paper__Lund__Helsinki__and_NIST.pdf\">CurricuLLM: Designing a Personalized and Future-Proof Cybersecurity Curriculum using Fine-Tuned LLMs,<\/a> <\/strong>Arthur Nijdam, Sara Ramezanian, Valtteri Niemi, Harri K\u00e5hk\u00f6nen, Paul Stankovski Wagner (Lund University)<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025-Reethika.pdf\" data-type=\"link\" data-id=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025-Reethika.pdf\">Adversarial Malware Generation<\/a>, <\/strong>Reethika Ambatipudi (RISE, KAU)<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025-Anton-Israelsson.pdf\">Multi-party Hybrid Homomorphic Encrypti<\/a>on<\/strong>, Anton Israelsson (RISE)<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Anton_Holmstrom_Abstract-Swits.pdf\" data-type=\"link\" data-id=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Anton_Holmstrom_Abstract-Swits.pdf\">Starting Where It Hurts: Identifying Critical Business Processes for Value-Driven Risk Management<\/a>, <\/strong>Anton Holmstr\u00f6m, Simon Andersson (Lule\u00e5 University of Technology), and Tero P\u00e4iv\u00e4rinta (University of Oulu)<\/li>\n\n\n\n<li>Graph Neural Networks for intrusion\/anomaly detection, Zenlu Sun (Uppsala University)<\/li>\n<\/ul>\n\n\n\n<p><em>Project posters:<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li> <a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025-Morel-poster_swits_cybersecit.pdf\" data-type=\"link\" data-id=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025-Morel-poster_swits_cybersecit.pdf\"><strong>CyberSecIT<\/strong>,<\/a> Victor Morel (Chalmers University of Technology)<\/li>\n\n\n\n<li><strong>&nbsp;Incredilab<\/strong>, Ala Sarah Alaqra (KAU)<\/li>\n\n\n\n<li><strong>Cross-border Cyber Capacity (CBCC) <\/strong>\u2013 Neshe Tuna (Compare), Ala Sarah Alaqra, Farzaneh Karegar, Meiko Jensen (KAU), Mudassar (NTNU)<\/li>\n\n\n\n<li><strong>VR Lab<\/strong>, Meiko Jensen, Jonathan Magnusson (KAU) &#8211; demo<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/06\/2025-Martucci-poster.pdf\" data-type=\"link\" data-id=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/06\/2025-Martucci-poster.pdf\">Cyber Range Lite (CRL)<\/a><\/strong>, Leonardo Martucci, Jonathan Magnusson (KAU) &#8211; demo<\/li>\n<\/ul>\n\n\n\n<p>In parallel (10:00-11:30):<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Visit Cybercampus \u201cRoyal Hacking Lab\u201d \u2013 tour and demonstrations <\/strong>(Emre S\u00fcren) \u2013 4<sup>th<\/sup> floor<\/li>\n\n\n\n<li><strong>Coaching \/advising research proposal writers <\/strong>(Isaac Mintz, Senja Nordstr\u00f6m, Veronica Fransson, NCC-SE) \u2013 4<sup>th<\/sup> floor (room 429) and if more rooms are for several talks, there are also more meeting rooms in the first floor<\/li>\n<\/ul>\n\n\n\n<p>(Coffee and snacks are served in between)<\/p>\n\n\n\n<p>11:30-12:00: <strong>PhD student presentations \u2013 Session 6: Security Management &amp; Communication <\/strong>(Chair: Ali Padyab) <strong>\u2013<\/strong> Lecture hall on the &nbsp;5<sup>th<\/sup> floor<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Neshe-Tunna_Communicating-Cybersecurity-Challenges-and-Procuring-Cybersecurity-Solutions.pdf\" data-type=\"link\" data-id=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Neshe-Tunna_Communicating-Cybersecurity-Challenges-and-Procuring-Cybersecurity-Solutions.pdf\">Communicating Cybersecurity Challenges and Procuring Cybersecurity Solutions. <\/a><\/strong>Neshe Tuna (Compare, KAU), Ala Sarah Alaqra (KAU)<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Aous-Al-Salek-Cybersecurity-Economic-Model-A-Path-to-Adoption.pdf\">Cybersecurity Economic Models: A Path to Adoption.<\/a> <\/strong>Aous Al Salek (University of Sk\u00f6vde)<\/p>\n\n\n\n<p>In parallel (11:30-12:00):<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Meeting of SIGS-CyberSec Graduate School students<\/strong><strong><em> <\/em><\/strong>\u2013 1<sup>st<\/sup> floor (\u201c\u201cGungstol rum\u201d)<\/li>\n\n\n\n<li><strong>Coaching \/advising research proposal writers <\/strong>(Isaac Mintz, Senja Nordstr\u00f6m, Veronica Fransson, NCC-SE)- \u2013 4<sup>th<\/sup> floor (room 429) and if more rooms are for several talks, there are also more meeting rooms in the first floor<\/li>\n<\/ul>\n\n\n\n<p>12:00: Lunch<\/p>\n\n\n\n<p>13:00 &#8211; 14:00:<strong> PhD student presentations \u2013 Session 7: Attacks, Anomaly Detec<\/strong><strong>tion <\/strong>and Defenses &nbsp;(Chair: Kurt Tuschku) \u2013 Lecture hall on the 5<sup>th<\/sup> floor<\/p>\n\n\n\n<p><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Filip-Natvig_AbstractSWITS.pdf\" data-type=\"link\" data-id=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Filip-Natvig_AbstractSWITS.pdf\"><strong>Generating Synthetic Substation Communication Profiles for Cross-Substation Transfer Learning<\/strong>,<\/a> Filip Natvig (Uppsala University), Lars Nordstr\u00f6m (KTH), G\u00f6ran N. Ericsson (Uppsala University)<\/p>\n\n\n\n<p><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_swits2025_samuel_kajava_talk.pdf\" data-type=\"link\" data-id=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_swits2025_samuel_kajava_talk.pdf\"><strong>Detecting Client Side Prototype Pollution<\/strong>,<\/a> Samuel KajavaSamuel Kajava, SiKai Lu, Eric Cornelissen, Benjamin Eriksson, Musard Balliu and Andrei Sabelfeld (Joint work between Chalmers and KTH)<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Abstract_Mauricio_ByrdVictorica.pdf\">Saliuitl: Ensemble Salience Guided Recovery of Adversarial Patches against CNNs<\/a>, <\/strong>Mauricio Byrd Victorica, Gy\u00f6rgy D\u00e1n, Henrik Sandberg (KTH)<\/p>\n\n\n\n<p><a href=\"https:\/\/sola.kau.se\/swits\/wp-content\/uploads\/sites\/257\/2025\/05\/2025_Y-Zhang_Defending-the-Cloud\u2013Edge-Continuum_-LLM-Based-Approaches-to-DDoS-Detection-and-Mitigation.pdf\"><strong>Defending the Cloud\u2013Edge Continuum against DDoS Attacks: Opportunities and Challenges<\/strong>, <\/a>Yinuo Zhang, Monowar Bhuyan (Ume\u00e5 University)<\/p>\n\n\n\n<p>In parallel: <strong>Workshop: Innovation and Exploitation of Cybersecurity Research <\/strong>\u2013 \u201cMultihallen\u201d in the first floor<strong><\/strong><\/p>\n\n\n\n<p>Lead: G\u00f6ran Olofsson (Cybercampus) \u2013 with Tobias Pulls (Karlstad Internet Privacy Lab \u2013 KIPL), Mathias Ekstedt (KTH), Neshe Tuna (Compare), Christian Gehrmann (Lund University), Magnus Almgren (Chalmers).<\/p>\n\n\n\n<p>14:00: <strong>Panel: Future Cybersecurity Research Directions<\/strong> \u2013 Panelists: Andrei Sabelfeld (Chalmers University of Technology &amp; KTH), Christian Gehrmann (Lund University), Agnieszka Kitkowska (J\u00f6nk\u00f6ping University), Shahid Raza (RISE, Cybercampus), Senja Nordstr\u00f6m (MSB, NCC-SE) \u2013 Lecture hall on the 5<sup>th<\/sup> floor<\/p>\n\n\n\n<p>14:45: Next steps \u2013 Cybercampus \u2013 SWITS 2026 and Graduate School, Upcoming Cybercampus PostDoc &amp; project calls, CyberSweden 2025 conference  &amp; Summing up \u2013 Lecture hall on the 5<sup>th<\/sup> floor<\/p>\n\n\n\n<p>15:00: Coffee, end of SWITS 2025<\/p>\n","protected":false},"excerpt":{"rendered":"<p>3-4 June, Location: Cybercampus Sweden, Valhallav\u00e4gen 79 (KTH Campus), Stockholm Tuesday, 3rd June 2025: 10:30: Arrival, Coffee for early arrivals 11:00: Welcome &amp; Introduction &#8211; Paola Lund\u00e9n &amp; Felix Knutas (Cybercampus), Simone Fischer-H\u00fcbner (SWITS Coordinator) \u2013 Lecture hall on 5th floor Short research group presentations (2-3 minutes each): BTH, University of Bor\u00e5s, Chalmers University of &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/sola.kau.se\/swits\/swits-2025-25th-seminar-of-the-swedish-it-security-network-programme\/\" class=\"more-link\">Forts\u00e4tt l\u00e4sa<span class=\"screen-reader-text\"> \u201dSWITS 2025 \u2013 25th Seminar of the Swedish IT Security Network \u2013Programme\u201d<\/span><\/a><\/p>\n","protected":false},"author":726,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-433","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/sola.kau.se\/swits\/wp-json\/wp\/v2\/pages\/433","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sola.kau.se\/swits\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sola.kau.se\/swits\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sola.kau.se\/swits\/wp-json\/wp\/v2\/users\/726"}],"replies":[{"embeddable":true,"href":"https:\/\/sola.kau.se\/swits\/wp-json\/wp\/v2\/comments?post=433"}],"version-history":[{"count":27,"href":"https:\/\/sola.kau.se\/swits\/wp-json\/wp\/v2\/pages\/433\/revisions"}],"predecessor-version":[{"id":536,"href":"https:\/\/sola.kau.se\/swits\/wp-json\/wp\/v2\/pages\/433\/revisions\/536"}],"wp:attachment":[{"href":"https:\/\/sola.kau.se\/swits\/wp-json\/wp\/v2\/media?parent=433"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}