Events

Previous

Time and place: , IFI, Gaustadalleen 23b, Oslo
Time and place: , Ole-Johan Dahls hus, Kristen Nygaards sal (rom 5370)

Kirsten Ullbæk Selvig fra Samferdselsdepartementet presenterer i dette foredraget internasjonale perspektiver på luftrommet og det ytre rom,   og vår økende avhengighet av satellittinfrastruktur i form av GNSS / GPS. Kunne denne infrastrukturen bryte sammen, og i hvilken grad er vi forberedt hvis det skulle skje? Alle interesserte er velkommen. Foredraget er på engelsk.

Time and place: , Store aud (rom 2116), Kristen Nygaards hus

Dette foredraget av Mia Landsem handler om hvor bilder havner når de urettmessig deles på nett, og hva som kan være konsekvensene for offer og gjerningsperson. Alle interesserte er velkommen.

Time and place: , IFI, UiO

This case-study-based presentation demonstrates how open-source information can be collected and leveraged to attack critical infrastructure assets. Speaker: Sujeet Shenoi (University of Tulsa).

Time and place: , IFI, UiO

This presentation describes various electronic, physical and chemical techniques for extracting data and firmware from embedded devices. Speaker: Sujeet Shenoi (University of Tulsa).

Time and place: , IFI / OJD Level 5

5G networks promise to transform industries and our digital society by providing enhanced capacity, higher data rates, lower battery for machine-type devices, higher availability and reduced power consumption. In this talk, we visit 5G security architecture & outline potential security challenges in deployed networks.

Time and place: , IFI/UIO

This talk by Mauno Pihelgas is about building an availability scoring system for NATO CCDCOE's annual international cyber defence exercise Locked Shields.

Time and place: , Lillehammer

Norsk Informasjonssikkerhetsforum (ISF) arrangerer Sikkerhetsfestivalen 2019 i dagene 26. - 28. august på Lillehammer.

Time and place: , Kristen Nygaards sal, OJD

Privacy Threat of Keystroke Profiling on the Web

In a browser environment, Keystroke Dynamics (the way of typing on a keyboard) is a biometric modality which can be used by any Web service to profile users. The collection of keystroke dynamics does not require any additional sensors and can be done without the users' knowledge. Keystroke Dynamics can be used to authenticate users, but also to profile otherwise anonymous web users, and thereby represents a privacy threat. This talk first discusses the performance of Keystroke Dynamics and how it poses a serious threat to users privacy. The talk then discusses several potential real-time methods for anonymization of Keystroke Dynamics, and gives some recommendations for building and implementing Keystroke Dynamics Anonymization Systems.

Time and place: , Kristan Nygaards sal (Room 5370), IFI.

Cyber Defense Exercises have received much attention in recent years. Crossed Swords is a NATO exercise directed at training Red Team members for responsive cyber defense.  This presentation is about the tools and techniques used, as well as challenges encountered, while building Frankenstack, an open source toolbox for providing feedback to Red Teams during exercises.

Time and place: , Kristan Nygaards sal (Room 5370), IFI.

This talk presents experiences from using various CTI (CyberThreat Intelligence) tools and methods for prediction, prevention and attribution of attacks in private-sector networks.

Time and place: , Seattle, WA, USA

International Workshop on Big Data Analytics for Cyber Threat Hunting 

In conjunction with the IEEE International Conference on Big Data 2018

Time and place: , Oslo

The 23rd Nordic Conference on Secure IT Systems

Time and place: , Oslo

The 17th European Conference on Cyber Warfare and Security

Time and place: , Oslo

Norsk Informasjonssikkerhetskonferanse 2017