The research leading to my PhD was mostly focused on Trusted Computing, with a special interest in the TPM and Intel SGX. I also made occasional detours into other areas such as Cryptography or Malware detection.

Doctoral dissertation

L. Karlsson: “Contributions to Preventive Measures in Cyber Security”.
Date of defence: 2019-10-24.
[PDF]

Peer-reviewed publications

L. Karlsson, P. Nikbakht Bideh, M. Hell: “A Recommender System for User-Specific Vulnerability Scoring”. CRiSIS 2019, Hammamet, Tunisia, pp. 355–364, Springer. DOI: 10.1007/978-3-030-41568-6_23
[PDF] [PDF (full version)]

L. Karlsson, N. Paladi: “Privacy-enabled Recommendations for Software Vulnerabilities”. DASC 2019, Fukuoka, Japan, pp. 564–571, IEEE. DOI: 10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00111
[PDF]

N. Paladi, L. Karlsson, K. Elbashir: “Trust Anchors in Software Defined Networks”. ESORICS 2018, Barcelona, Spain, LNCS Vol. 11009, pp. 485–504, Springer. DOI: 10.1007/978-3-319-98989-1_24
[PDF]

A. Cobleigh, M. Hell, L. Karlsson, O. Reimer, J. Sönnerup, D. Wisenhoff: “Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code”. IEEE EDOCW 2018, Stockholm, Sweden, pp. 208–211, IEEE. DOI: 10.1109/EDOCW.2018.00038

L. Karlsson, M. Hell, P. Stankovski: “Not So Greedy: Enhanced Subset Exploration for Nonrandomness Detectors”. Information Systems Security and Privacy. ICISSP 2017, Revised Selected Papers, CCIS Vol. 867, pp. 273–294, Springer. DOI: 10.1007/978-3-319-93354-2_13
[PDF]

N. Paladi, L. Karlsson: “Safeguarding VNF Credentials with Intel SGX”. SIGCOMM Posters and Demos ’17, Los Angeles, CA, USA, ACM. DOI: 10.1145/3123878.3132016

L. Karlsson, M. Hell, P. Stankovski: “Improved Greedy Nonrandomness Detectors for Stream Ciphers”. 3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal, pp. 225–232, SCITEPRESS. DOI: 10.5220/0006268202250232
[PDF]

L. Karlsson, M. Hell: “Enabling Key Migration Between Non-Compatible TPM Versions”. Trust and Trustworthy Computing, TRUST 2016, Vienna, Austria, LNCS Vol. 9824, pp. 101–118, Springer. DOI: 10.1007/978-3-319-45572-3_6
[PDF]

M. Hell, L. Karlsson, B. Smeets, J. Mirosavljevic: “Using TPM Secure Storage in Trusted High Availability Systems”. The 6th International Conference on Trusted Systems, INTRUST 2014, Beijing, China, LNCS Vol. 9473, pp. 243–258, Springer. DOI: 10.1007/978-3-319-27998-5_16
[PDF]

C. Jämthagen, L. Karlsson, P. Stankovski, M. Hell: “eavesROP: Listening for ROP Payloads in Data Streams”. Information Security Conference, ISC 2014, Hong Kong, LNCS Vol. 8783, pp. 413–424, Springer. DOI: 10.1007/978-3-319-13257-0_25
[PDF]