Connecting Academic Security Research to Applied Systems in the Field
- Dr. Danny De Cock
Connecting Academic Security Research to Applied Systems in the - - PowerPoint PPT Presentation
Connecting Academic Security Research to Applied Systems in the Field Dr. Danny De Cock 6 October 2016 COSIC Staff Department Electrical Engineering-ESAT COSIC = COmputer Security and Industrial Cryptography ( o 1978) 5 full-time 90
10 20 30 40 50 60 70 80 90 20092010201120122013201420152016 zap atp postdoc phd researcher visiting VMW
professors
20 nationalities
COSIC = COmputer Security and Industrial Cryptography (o1978)
KU Leuven Humanities and social sciences Science, engineering and technology Sciences Bioscience engineering Engineering science Computer Science Electrical Engineering- ESAT MICAS COSIC STADIUS TELEMIC ELECTA Engineering technology Biomedical sciences
Fundamental research in discrete mathematics Cryptographic algorithms: Design and cryptanalysis Cryptographic protocols: Design and cryptanalysis Efficient and secure implementations
Number theoretic algorithms, Boolean functions, secure multi-party computation, secret sharing Block ciphers, stream ciphers, hash functions, MAC algorithms, (hyper)- elliptic curve cryptography e.g.: AES, RIPEMD-160, HAMSI Entity authentication, credentials,
and electromagnetic analysis, fault attacks
Creating electronic equivalent of the real world:
Confidentiality, digital signature, anonymity, payments, DRM, elections
Technologies:
Applications:
Key Schedule round
round round round S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S
MixColumns MixColumns MixColumns MixColumns
> 3100 NIST-certified products
Trust4Cloud Security4IoT Data Protection & Privacy Resilience Security & Privacy Dependability Performance Robustness Availability TRUST!
8
Trust4Cloud
Cloud is about outsourcing, about trusting third parties
Security4IoT
Researching and developing up-to-date security solutions for IoT
Data Protection & Privacy
Deep engagement in the digital revolution demands for precaution
10
Source: Gartner (July 2015)
11
EU H2020/ECRYPT-NET
PERIOD
From 01/03/2015 till 28/02/2019
OBJECTIVE
To develop advanced cryptographic techniques for the Internet of Things and the Cloud and to create efficient and secure implementations of those techniques on a broad range of platforms.
PARTNERS
Marie Skłodowska-Curie ITN (Integrated Training Network)
12
detect and prevent
14
COSIC, CiTip (former ICRI) and DistriNet wrote a technical report on online tracking by Facebook Social Plug-ins, such as the “Like Button”. The 23-page technical report titled “Facebook Tracking Through Social Plug-ins” is prepared at the request of the Belgian Privacy Commission in the context of its Facebook investigation.
15
16
17
KIC InnoEnergy - SAGA
PERIOD
From 01/01/2014 till 31/03/2017
OBJECTIVE
To develop security services and privacy solutions for the next generations of smart meters.
PARTNERS
18
COSIC INTERNATIONAL COURSE Biannual 4-day training, Q2 2017 Offers a broad overview of cryptography and industrial applications in banking, government, e-health, .. SECAPPDEV March 2017 – 1 week training How to develop secure software
comprises several faculty members of COSIC and DistriNet and some free- lance software security trainers and consultants. IPICS 2016: July 4-11 Introductory course for advanced Master students and beginning PhD students as well as industry experts
20
iMinds/TruBliss
PERIOD
From 01/04/2014 till 31/03/2016
OBJECTIVE
The TruBliss project aims to support financial institutions in optimizing their security capabilities. This comprehensive approach encompasses innovation on the technical, procedural and legal levels
PARTNERS
suspects
key words
may require further analysis
21
Gigabytes for Java)
GOCR
images, emails…
are encountered
22
23
NAS Investigator TruBliss Engine Investigator Investigator Investigator Investigator TB Indexer TB Indexer TB Indexer TB Indexer TB Indexer TB Indexer
1. Researchers upload information to NAS 2. Trubliss Indexers perform analysis for each file
7zip…
24
1. Text extraction tools based on open-source tools available free of charge
and extraction tools 2. Text search
25
1. Files are analyzed only once
files several times
information is 2. Search terms of interest are processed in batch
3. Open source & versatile
26
Senior Research Manager Applied Cryptography KULeuven ESAT/COSIC Contact: danny.decock@esat.kuleuven.be
Internet of Things