first year review wp5 dissemination
play

First year review WP5: Dissemination Trento - September 24th, 2007 - PowerPoint PPT Presentation

First year review WP5: Dissemination Trento - September 24th, 2007 WP5 Tasks 5.1 Kickoff workshop and plenary 5.2 Public website 5.3 Dissemination Plan 5.4 Dissemination Final Report 5.5 Final workshop and plenary 2


  1. First year review WP5: Dissemination Trento - September 24th, 2007

  2. WP5 Tasks • 5.1 Kickoff workshop and plenary • 5.2 Public website • 5.3 Dissemination Plan • 5.4 Dissemination Final Report • 5.5 Final workshop and plenary 2

  3. Activities • Web-Site • First Year Workshops: 1. Kick-off Workshop 1 st Quarterly Workshop 2. 2 nd Quarterly Workshop 3. 3 rd Quarterly Workshop 4. • Conferences and workshops • Publications • Presentations 3

  4. Web-Site • Link: http://www.re-trust.org • Overview of the project • Participant university and people • Project meeting • Project advertisement • Publications

  5. Workshops Four workshops during the first year with three primary objectives: • Stimulate discussion – brain-storming with external experts • Problem definition • Project work/tasks planning

  6. Kick-Off Workshop • Location: Trento, ITALY • Date: 18-19 September, 2006 • Link to webpage http://re-trust.dit.unitn.it/workshop.html • Link to Technical Program http://re-trust.dit.unitn.it/tp.html 6

  7. Kick-Off Workshop - Program Monday 18, 2006 Morning Session Chair: Moti Yung • Yoram Ofek – UNITN – Re-Trust Project Overview • Moti Yung – Columbia U. / RSA, USA – Authentication: Present Overview and FutureChallenges • Christian Collberg – U. of Arizona, USA – Dynamic Algorithms for Software Watermarking - How to Store a Secret in Software • Bart Preneel – KUL – Open Research Issue in Cryptography • Klaus Kursawe – Philips Research – Trusted Computing in Re-Trust • Mario Baldi – POLITO – Trust in Network Protocols Afternoon Session Chair: Bart Preneel • Riccardo Scandariato – KUL – Entrusting by replacing: past experiences and open questions • Stefano Di Carlo – POLITO – On-line integrity checking through Software Implemented Hardware Fault Tolerance (SHIFT) techniques • Paolo Tonella – ITC-IRST – Reverse engineering and mutation analysis in the context of software tampering and authentication • Mariano Ceccato – ITC-IRST – Reverse Engineering Attacks to Remote Software Entrusting • Srijith – VUA – Policy binding and enforcement in Java 7

  8. Kick-Off Workshop - Agenda Tuesday 19, 2006 Morning Session Chair: Christian Collberg • Willem Jonker – Philips Research – Security Needs of the Digital Society • Ginger Myles – IBM Research – The use of software-based integrity checks in software tamper resistance techniques • Brecht Wyseur – KUL – Code Obfuscation, White-Box Cryptography, and HW/SW Co-obfuscation • Igor Kotenko – SPIIRAS – Team background and Preliminary analysis of tasks to be solved • Jean-Daniel Aussel – Gemalto – Smart-Card Assistance to Software Authentication • Amitabh Saxena – La Trobe U., Australia – Black-Box Groups with Infeasible Inversion Afternoon Session Chair: Yoram Ofek Project Kick-Off Meeting • WP1 – UNITN – Architectural Framework • WP2 – POLITO – Software-based Tamper Resistance Methods for Remote Entrusting • WP3 – KUL – Hardware/Software-based Tamper Resistance Method for Remote Entrusting • WP4 – UNITN – Trust and Security Analysis • WP1 – UNITN – Milestones/Deliverables • WP2 – POLITO – Milestones/Deliverables • WP3 – KUL – Milestones/Deliverables • WP4 – UNITN – Milestones/Deliverables 8

  9. First Quarterly Workshop • Location: Trento, ITALY • Date: 19-20 December, 2006 • Link to web page http://re-trust.dit.unitn.it/meeting20061219.html 9

  10. 1 st Quarterly Workshop - Program December 19, 2006 – Morning • Louis Goubin – GEMALTO – Secure computations using smart cards • Mila Dalla Preda – UNITN – Code obfuscation and malware detection by abstract interpretation • Igor Kotenko – SPIIRAS – State of the Art in Modeling of Computer Attacks • Antonio Durante – POLITO – Generic Applications • Davide D'Aprile – POLITO – Providing a RE-TRUST SDK: a (Semi) Formal Approach December 19, 2006 – Afternoon • Ceccato Mariano – UNITN – Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems • Paolo Falcarin – POLITO – Design alternatives • Paolo Tonella – UNITN – Trust and attack model • Vasily Desnitsky, Igor Kotenko – SPIIRAS – Trust Model Supplements and Taxonomy • Vasily Desnitsky, Igor Kotenko – SPIIRAS – Attack Model: Graph based Attack Representation and Taxonomy 10

  11. 1 st Quarterly Workshop - Program December 20, – Morning • Jerome D'Annoville – GEMALTO – Generic applications • Jerome D'Annoville – GEMALTO – Trust model ingredients • Jerome D'Annoville – GEMALTO – Smartcard & PC applications • Jerome D'Annoville – GEMALTO – Design alternative • Jerome D'Annoville – GEMALTO – Open session on the architecture December 20, 2006 – Afternoon • Brecht Wyseur – KUL – White Box Cryptography • Thomas Herlea – KUL – Attack model 11

  12. Second Quarterly Workshop • Location: Paris, FRANCE • Date: 20-21 March, 2007 • Link to web page http://re-trust.dit.unitn.it/meeting20070320.html 12

  13. 2 nd Quarterly Workshop - Program March 20, 2007 – Morning • Rick Kennell – PURDUE University, IN / USA – Genuinity • Juan Garay – Bell Labs – Alcatel-Lucent, NJ / USA – TEAS • David Plaquin – HP Labs, Bristol / UK – Hypervisor+TC • Mariano Ceccato – UNITN – SWATT/Pioneer March 20, 2007 - Afternoon • Mila Dalla Preda – UNITN – Hiding program slices for software security • Paolo Tonella – UNITN – Checksum ineffectiveness & assertion based protection • Stefano Di Carlo – POLITO – Increasing the integration between the untrusted application and the mobile module • Jasvir Nagra – UNITN – Dynamic watermarking • Amir Herzberg – Bar-Ilan Univeristy, ISRAEL – White-box secure remote procedure call • Louis Goubin – GEMALTO – Cryptography 13

  14. 2 nd Quarterly Workshop - Program March 21, 2007 – Morning • Jan Cappaert – KUL – Attack Model in the Presence of Trusted Hardware • Pierre Girard – GEMALTO – Java obfuscator • Jean-Daniel Aussel – GEMALTO – Usb secure token • Paolo Falcarin – POLITO – Overview about design alternative (WP2) • Stefano Di Carlo – POLITO – Overview about generic application (WP2) • Mariano Ceccato – UNITN – Overview about trust & attack model (WP2) • Jerome d'Annoville – GEMALTO – Overview about design alternative (WP3) • Jerome d'Annoville – GEMALTO – Overview about generic application (WP3) • Dries Schellekens – KUL – Overview about trust model (WP3) • Brecht Wyseur – KUL – Overview about attack model (WP3) • WP leadres – Workpackage discussion 14

  15. 3 rd Quarterly Workshop - Program • Location: Torino, ITALY • Date: 19-20 June, 2007 • Link to web pag http://re-trust.dit.unitn.it/meeting20070619.html 15

  16. 3 rd Quarterly Workshop - Program June 19, 2007 - Morning Session • Jerome D'Annoville – GEMALTO – Architecture meeting reporting (Paris, June 8, 2007) • Brecht Wyseur – KUL – Task 3.2 - Hw/Sw co-obfuscation meeting (Torino, June 18, 2007) June 19, 2007 - Afternoon Session Subgroup Break-Out • WP2: Software-based Tamper Resistance Methods for Remote Entrusting • WP3: Hardware/Software-based Tamper Resistance Methods for Remote Entrusting • WP4: Trust and Security Analysis Subgroup Reporting • WP2: Software-based Tamper Resistance Methods for Remote Entrusting • WP3: Hardware/Software-based Tamper Resistance Methods for Remote Entrusting • WP4: Trust and Security Analysis 16

  17. 3 rd Quarterly Workshop - Program June 20, 2007 - Morning Session • Mariano Ceccato – UNITN – Barrier Slicing for Remote Software Trusting • Vasily Desnitsky, Igor Kotenko – SPIIRAS – Review of Aspect Oriented Approaches and their Use in RE-TRUST for Mobile Module Implementation • Jasvir Nagra – UNITN – Is Obfuscation Really Impossible? • Amitabh Saxena – UNITN – Techniques for Obfuscation: more Notions and Definition June 20, 2007 - Afternoon Session • Roberta Guidolin – UNITN – Presentation about Financial Planning • Mariano Ceccato – UNITN – Formal Review Process for Deliverables 17

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend