Accepted Posters - Peer-reviewed
1. Wenjie Liu and Panos Papadimitratos. (KTH Royal Institute of Technology). Probabilistic Detection of GNSS Spoofing Using Opportunistic Information 2. Aman Sharma and Martin Wittlinger. (KTH Royal Institute of Technology). Software Bill of Materials: Ingredients of your Software 3. Niclas Finne (Research Institutes of Sweden (RISE), Sweden) and Thiemo Voigt (Research Institutes of Sweden (RISE), Sweden, and Uppsala University, Sweden). [Demo:] Multi-Trace: Multi-level Data Trace Generation with the Cooja Simulator 4. Mohammed B. M. Kamel (Eotvos Lorand Univ., Furtwangen University of Applied Sciences, and University of Kufa), Massimo Morello (European Central Bank) and Petri Sainio (University of Turku, Finland). GDPR Compliance Management: A Privacy Preserving Approach 5. Alexandros Milolidakis. (KTH Royal Institute of Technology). BGP Hijackers That Evade Public Route Collectors 6. Usama Zafar, Salman Toor and André Teixeira. (Uppsala University). Using Generative Adversarial Networks to Detect Model Poisoning Attacks in Federated Machine Learning 7. Lejla Islami (Karlstad University), Simone Fischer-Hübner (Karlstad University), Agnieszka Kitkowska (Jönköping University). Privacy Preferences for future VANETs: A Survey-Based Analysis 8. Filip Geib (KTH Royal Institute of Technology), Marco Spanghero (KTH Royal Institute of Technology), Ronny Panier (Wingtra AG) and Panos Papadimitratos (KTH Royal Institute of Technology). Uncovering GNSS interference with aerial mapping UAV 9. Konstantinos Kalogiannis and Panos Papadimitratos. (KTH Royal Institute of Technology). Misbehavior in Vehicular Cooperation: Analyzing Impact and Mitigation 10. Simon Althaus. (TU Darmstadt). Investigating Information Flows of Android Apps 11. Mahdi Akil (Karlstad University), Sujash Naskar (Mid Sweden University), Leonardo Martucci (Karlstad University) and Jaap-Henk Hoepman (Radboud University). Secure and Private Communication in VANETs 12. Zhenlu Sun, Salman Toor and André Teixeira. (Uppsala University). Data-driven Vulnerability Analysis for Critical Infrastructures 13. Eduardo Stefani and Ivanir Costa. (Nove de Julho University). Digital Transformation Risks: Dimensions and impacts from a systemic and structural perspective 14. Mojtaba Eshghie (KTH Royal Institute of Technology), Cyrille Artho (KTH Royal Institute of Technology), Wolfgang Ahrendt (Chalmers University of Technology), Thomas Hildebrandt (University of Copenhagen), and Gerardo Schneider (University of Gothenburg). CLawK: Monitoring Business Processes in Smart Contracts 15. Wenhao Jiang, Marco Spanghero and Panos Papadimitratos. (KTH Royal Institute of Technology). Ultraportable FPGA based advanced GPS spoofer 16. Di Wu and Panos Papadimitratos. (KTH Royal Institute of Technology). Blockchain secured networks: architecture and mechanism 17. Sheela Hariharan (Volvo, and Mälardalen University), Thomas Nolte (Mälardalen University), Alessandro Papadopoulos (Volvo, and Mälardalen University), and Andreas Erséus (Volvo). Security testing methodologies in construction machinery – Testing Process and framework 18. Frank Reyes, Gabriel Skoglund, Yogya Gamage, Martin Monperrus and Benoit Baudry. (KTH Royal Institute of Technology). Mining breaking updates of software dependencies 19. Milan Jolic, Zahra Alimadadi and Panagiotis Papadimitratos. (KTH Royal Institute of Technology). Assessing data trustworthiness in participatory sensing systems 20. Rodothea Myrsini Tsoupidi, Elena Troubitsyna and Panos Papadimitratos. (KTH Royal Institute of Technology). Compiler-based Mitigation against Code-Reuse and Side-Channel Attacks 21. Marco Spanghero and Panos Papadimitratos. (KTH Royal Institute of Technology). Repeatability and testing in GNSS security: challenges of reliable data 23. Leyla Sadighi, Marija Furdek Prekratic and Stefan Karlsson. (Chalmers University). Investigating Eavesdropping Security Attacks in Optical Networks Leveraging Machine Learning Techniques 24. Sara Saeidian (KTH Royal Institute of Technology), Giulia Cervia (IMT Lille Douai), Tobias J. Oechtering and Mikael Skoglund (KTH Royal Institute of Technology). PML: Robust and Explainable Privacy