Karl Norrman photo

Karl Norrman Security Researcher

Contact: k orrman@kth.se

About me

I am a security researcher at Ericsson and an industrial PhD student in the Theoretical Computer Science group (TCS) at KTH Royal Institute of Technology. My research topic is modelling, verification and proof techniques for cryptographic protocols. In particular, I am interested in mechanization of these techniques, since that enables us to build tools, which increase the chances for industrial uptake of the technology. My supervisor is Mads Dam. I spend 20% of my time working for Ericsson Research, mainly with security protocol design and analysis, as well as software security.

Publications

Conference and Workshop Papers

Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices
Norrman, Sundararajan and Bruni (SECRYPT 2021 - CoRR abs/2007.11427)
PDF
Secure Federated Learning in 5G Mobile Networks
Isaksson and Norrman (GLOBECOMM 2020 - CoRR abs/2004.06700)
PDF DOI
OpenSAW: Open Security Analysis Workbench
Ben Henda, Johansson, Lantz, Norrman, Saarinen and Segersvärd (FASE 2017)
PDF DOI
Subscription identifier privacy in 5G systems
Jimenez, Nakarmi, Näslund and Norrman (MoWNet 2017)
PDF DOI
Error-Correcting Message Authentication for 5G
Dubrova, Näslund, Selander and Norrman (MobiMedia 2016)
PDF DOI PRESENTATION
Protecting IMSI and User Privacy in 5G Networks
Norrman, Näslund and Dubrova (MobiMedia 2016)
PDF DOI PRESENTATION
Formal Verification of the Security for Dual Connectivity in LTE
Ben Henda, Norrman and Pfeffer (FormaliSE at ICSE 2015)
PDF DOI
USIM Compatible 5G AKA Protocol with Perfect Forward Secrecy
Arkko, Norrman, Näslund and Sahlin (TrustCom/BigDataSE/ISPA 2015)
PDF DOI PRESENTATION
Formal Analysis of Security Procedures in LTE - A Feasibility Study
Ben Henda and Norrman (RAID 2014)
PDF DOI PRESENTATION
Conversational IP multimedia security
Blom, Carrara, Lindholm, Norrman and Näslund (MWCN 2002)
PDF DOI

PDFs of papers available from local links are post peer review, pre copy edit versions or pre-prints. DOIs are provided for the final versions.


Book Chapters

IMS Multimedia Telephony over Cellular Systems: VoIP Evolution in a Converged Telecommunication World (Chapter 6)
Blom, Cheng, Lehtovirta, Norrman and Schultz (John Wiley & Sons Ltd 2007)
DOI
Key management and Protection for IP Multimedia (Chapther 5) in Multimedia Security Handbook
Blom, Carrara, Lindholm, Norrman and Näslund (CRC Press 2005)
DOI

White Papers

Security in 5G RAN and core deployments
Teppo and Norrman (Ericsson Whitepaper 2019)
LINK
5G security - enabling a trustworthy 5G system
Norrman, Nakarmi and Fogelström (Ericsson Whitepaper 2018 and 2020)
LINK
Setting the standard: methodology counters security threats
Norrman, Teppo, Mononen and Nilsson (Ericsson Review 2014)
LINK

Blogs and Presentations

Detecting false base stations in mobile networks
Norrman and Nakarmi
LINK
Protecting 5G against IMSI catchers
Norrman and Nakarmi
LINK
Safety, Security and Privacy in Our Connected Society
Norrman (IEEE/ICES Workshop on Safety and Security for Autonomous Systems 2017)
LINK
5G Security Standardization
Norrman (SICS, Ericsson and KTH Security Seminar 2016)
LINK

Education

PhD candidate

KTH Royal Institute of Technology

Department of Theoretical Computer Science

-

I investigate formal modeling and proofs for cryptographic protocols and primitives. My supervisor is Mads Dam.


The research is partially supported by the Wallenberg AI, Autonomous Systems and Software Program (WASP) fundedby the Knut and Alice Wallenberg Foundation.

Master's degree in computer science

Stockholm University

Department of Mathematics

-

RTP Security in 3G Networks
Norrman (Stockholm University 2000)
LINK

I was part of the development team for the Secure Real-time Transport Protocol (SRTP) standardized in IETF as RFC 3711.

Employment

Security researcher at Ericsson

Formal title: Expert Mobile Network Security

-

I am primarily working security architectures and cryptographic protocol analysis and design, and also with software security.