About me
Publications
Conference and Workshop Papers
Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices
Norrman, Sundararajan and Bruni (SECRYPT 2021 - CoRR abs/2007.11427)
PDF Norrman, Sundararajan and Bruni (SECRYPT 2021 - CoRR abs/2007.11427)
Secure Federated Learning in 5G Mobile Networks
Isaksson and Norrman (GLOBECOMM 2020 - CoRR abs/2004.06700)
PDF DOI Isaksson and Norrman (GLOBECOMM 2020 - CoRR abs/2004.06700)
OpenSAW: Open Security Analysis Workbench
Ben Henda, Johansson, Lantz, Norrman, Saarinen and Segersvärd (FASE 2017)
PDF DOI Ben Henda, Johansson, Lantz, Norrman, Saarinen and Segersvärd (FASE 2017)
Subscription identifier privacy in 5G systems
Jimenez, Nakarmi, Näslund and Norrman (MoWNet 2017)
PDF DOI Jimenez, Nakarmi, Näslund and Norrman (MoWNet 2017)
Error-Correcting Message Authentication for 5G
Dubrova, Näslund, Selander and Norrman (MobiMedia 2016)
PDF DOI PRESENTATION Dubrova, Näslund, Selander and Norrman (MobiMedia 2016)
Protecting IMSI and User Privacy in 5G Networks
Norrman, Näslund and Dubrova (MobiMedia 2016)
PDF DOI PRESENTATION Norrman, Näslund and Dubrova (MobiMedia 2016)
Formal Verification of the Security for Dual Connectivity in LTE
Ben Henda, Norrman and Pfeffer (FormaliSE at ICSE 2015)
PDF DOI Ben Henda, Norrman and Pfeffer (FormaliSE at ICSE 2015)
USIM Compatible 5G AKA Protocol with Perfect Forward Secrecy
Arkko, Norrman, Näslund and Sahlin (TrustCom/BigDataSE/ISPA 2015)
PDF DOI PRESENTATION Arkko, Norrman, Näslund and Sahlin (TrustCom/BigDataSE/ISPA 2015)
Formal Analysis of Security Procedures in LTE - A Feasibility Study
Ben Henda and Norrman (RAID 2014)
PDF DOI PRESENTATION Ben Henda and Norrman (RAID 2014)
Conversational IP multimedia security
Blom, Carrara, Lindholm, Norrman and Näslund (MWCN 2002)
PDF DOI Blom, Carrara, Lindholm, Norrman and Näslund (MWCN 2002)
PDFs of papers available from local links are post peer review, pre copy edit versions or pre-prints. DOIs are provided for the final versions.
Book Chapters
IMS Multimedia Telephony over Cellular Systems: VoIP Evolution in a Converged Telecommunication World (Chapter 6)
Blom, Cheng, Lehtovirta, Norrman and Schultz (John Wiley & Sons Ltd 2007)
DOI Blom, Cheng, Lehtovirta, Norrman and Schultz (John Wiley & Sons Ltd 2007)
Key management and Protection for IP Multimedia (Chapther 5) in Multimedia Security Handbook
Blom, Carrara, Lindholm, Norrman and Näslund (CRC Press 2005)
DOI Blom, Carrara, Lindholm, Norrman and Näslund (CRC Press 2005)
White Papers
Security in 5G RAN and core deployments
Teppo and Norrman (Ericsson Whitepaper 2019)
LINK Teppo and Norrman (Ericsson Whitepaper 2019)
5G security - enabling a trustworthy 5G system
Norrman, Nakarmi and Fogelström (Ericsson Whitepaper 2018 and 2020)
LINK Norrman, Nakarmi and Fogelström (Ericsson Whitepaper 2018 and 2020)
Setting the standard: methodology counters security threats
Norrman, Teppo, Mononen and Nilsson (Ericsson Review 2014)
LINK Norrman, Teppo, Mononen and Nilsson (Ericsson Review 2014)
Blogs and Presentations
Detecting false base stations in mobile networks
Norrman and Nakarmi
LINK Norrman and Nakarmi
Protecting 5G against IMSI catchers
Norrman and Nakarmi
LINK Norrman and Nakarmi
Safety, Security and Privacy in Our Connected Society
Norrman (IEEE/ICES Workshop on Safety and Security for Autonomous Systems 2017)
LINK Norrman (IEEE/ICES Workshop on Safety and Security for Autonomous Systems 2017)
5G Security Standardization
Norrman (SICS, Ericsson and KTH Security Seminar 2016)
LINK Norrman (SICS, Ericsson and KTH Security Seminar 2016)
Education
PhD candidate
KTH Royal Institute of Technology
Department of Theoretical Computer Science
I investigate formal modeling and proofs for cryptographic protocols and primitives. My supervisor is Mads Dam.
The research is partially supported by the Wallenberg AI, Autonomous Systems and Software Program (WASP) fundedby the Knut and Alice Wallenberg Foundation.
Master's degree in computer science
Stockholm University
Department of Mathematics
RTP Security in 3G Networks LINK
Norrman (Stockholm University 2000)
I was part of the development team for the Secure Real-time Transport Protocol (SRTP) standardized in IETF as RFC 3711.
Employment
Security researcher at Ericsson
Formal title: Expert Mobile Network Security
I am primarily working security architectures and cryptographic protocol analysis and design, and also with software security.