First year review WP5: Dissemination Trento - September 24th, 2007 - - PowerPoint PPT Presentation

first year review wp5 dissemination
SMART_READER_LITE
LIVE PREVIEW

First year review WP5: Dissemination Trento - September 24th, 2007 - - PowerPoint PPT Presentation

First year review WP5: Dissemination Trento - September 24th, 2007 WP5 Tasks 5.1 Kickoff workshop and plenary 5.2 Public website 5.3 Dissemination Plan 5.4 Dissemination Final Report 5.5 Final workshop and plenary 2


slide-1
SLIDE 1

First year review WP5: Dissemination

Trento - September 24th, 2007

slide-2
SLIDE 2

2

WP5 Tasks

  • 5.1 Kickoff workshop and plenary
  • 5.2 Public website
  • 5.3 Dissemination Plan
  • 5.4 Dissemination Final Report
  • 5.5 Final workshop and plenary
slide-3
SLIDE 3

3

Activities

  • Web-Site
  • First Year Workshops:

1. Kick-off Workshop 2. 1st Quarterly Workshop 3. 2nd Quarterly Workshop 4. 3rd Quarterly Workshop

  • Conferences and workshops
  • Publications
  • Presentations
slide-4
SLIDE 4

Web-Site

  • Link:

http://www.re-trust.org

  • Overview of the project
  • Participant university and people
  • Project meeting
  • Project advertisement
  • Publications
slide-5
SLIDE 5

Four workshops during the first year with three primary objectives:

  • Stimulate discussion – brain-storming with

external experts

  • Problem definition
  • Project work/tasks planning

Workshops

slide-6
SLIDE 6

6

Kick-Off Workshop

  • Location: Trento, ITALY
  • Date: 18-19 September, 2006
  • Link to webpage

http://re-trust.dit.unitn.it/workshop.html

  • Link to Technical Program

http://re-trust.dit.unitn.it/tp.html

slide-7
SLIDE 7

7

Kick-Off Workshop - Program

Monday 18, 2006 Morning Session Chair: Moti Yung

  • Yoram Ofek – UNITN – Re-Trust Project Overview
  • Moti Yung – Columbia U. / RSA, USA – Authentication: Present Overview and FutureChallenges
  • Christian Collberg – U. of Arizona, USA – Dynamic Algorithms for Software Watermarking - How

to Store a Secret in Software

  • Bart Preneel – KUL – Open Research Issue in Cryptography
  • Klaus Kursawe – Philips Research – Trusted Computing in Re-Trust
  • Mario Baldi – POLITO – Trust in Network Protocols

Afternoon Session Chair: Bart Preneel

  • Riccardo Scandariato – KUL – Entrusting by replacing: past experiences and open questions
  • Stefano Di Carlo – POLITO – On-line integrity checking through Software Implemented Hardware

Fault Tolerance (SHIFT) techniques

  • Paolo Tonella – ITC-IRST – Reverse engineering and mutation analysis in the context of software

tampering and authentication

  • Mariano Ceccato – ITC-IRST – Reverse Engineering Attacks to Remote Software Entrusting
  • Srijith – VUA – Policy binding and enforcement in Java
slide-8
SLIDE 8

8

Kick-Off Workshop - Agenda

Tuesday 19, 2006 Morning Session Chair: Christian Collberg

  • Willem Jonker – Philips Research – Security Needs of the Digital Society
  • Ginger Myles – IBM Research – The use of software-based integrity checks in software tamper resistance

techniques

  • Brecht Wyseur – KUL – Code Obfuscation, White-Box Cryptography, and HW/SW Co-obfuscation
  • Igor Kotenko – SPIIRAS – Team background and Preliminary analysis of tasks to be solved
  • Jean-Daniel Aussel – Gemalto – Smart-Card Assistance to Software Authentication
  • Amitabh Saxena – La Trobe U., Australia – Black-Box Groups with Infeasible Inversion

Afternoon Session Chair: Yoram Ofek Project Kick-Off Meeting

  • WP1 – UNITN – Architectural Framework
  • WP2 – POLITO – Software-based Tamper Resistance Methods for Remote Entrusting
  • WP3 – KUL – Hardware/Software-based Tamper Resistance Method for Remote Entrusting
  • WP4 – UNITN – Trust and Security Analysis
  • WP1 – UNITN – Milestones/Deliverables
  • WP2 – POLITO – Milestones/Deliverables
  • WP3 – KUL – Milestones/Deliverables
  • WP4 – UNITN – Milestones/Deliverables
slide-9
SLIDE 9

9

First Quarterly Workshop

  • Location: Trento, ITALY
  • Date: 19-20 December, 2006
  • Link to web page

http://re-trust.dit.unitn.it/meeting20061219.html

slide-10
SLIDE 10

10

1st Quarterly Workshop - Program

December 19, 2006 – Morning

  • Louis Goubin – GEMALTO – Secure computations using smart cards
  • Mila Dalla Preda – UNITN – Code obfuscation and malware detection by abstract

interpretation

  • Igor Kotenko – SPIIRAS – State of the Art in Modeling of Computer Attacks
  • Antonio Durante – POLITO – Generic Applications
  • Davide D'Aprile – POLITO – Providing a RE-TRUST SDK: a (Semi) Formal

Approach December 19, 2006 – Afternoon

  • Ceccato Mariano – UNITN – Pioneer: Verifying Code Integrity and Enforcing

Untampered Code Execution on Legacy Systems

  • Paolo Falcarin – POLITO – Design alternatives
  • Paolo Tonella – UNITN – Trust and attack model
  • Vasily Desnitsky, Igor Kotenko – SPIIRAS – Trust Model Supplements and Taxonomy
  • Vasily Desnitsky, Igor Kotenko – SPIIRAS – Attack Model: Graph based Attack

Representation and Taxonomy

slide-11
SLIDE 11

11

1st Quarterly Workshop - Program

December 20, – Morning

  • Jerome D'Annoville – GEMALTO – Generic applications
  • Jerome D'Annoville – GEMALTO – Trust model ingredients
  • Jerome D'Annoville – GEMALTO – Smartcard & PC applications
  • Jerome D'Annoville – GEMALTO – Design alternative
  • Jerome D'Annoville – GEMALTO – Open session on the architecture

December 20, 2006 – Afternoon

  • Brecht Wyseur – KUL – White Box Cryptography
  • Thomas Herlea – KUL – Attack model
slide-12
SLIDE 12

12

Second Quarterly Workshop

  • Location: Paris, FRANCE
  • Date: 20-21 March, 2007
  • Link to web page

http://re-trust.dit.unitn.it/meeting20070320.html

slide-13
SLIDE 13

13

2nd Quarterly Workshop - Program

March 20, 2007 – Morning

  • Rick Kennell – PURDUE University, IN / USA – Genuinity
  • Juan Garay – Bell Labs – Alcatel-Lucent, NJ / USA – TEAS
  • David Plaquin – HP Labs, Bristol / UK – Hypervisor+TC
  • Mariano Ceccato – UNITN – SWATT/Pioneer

March 20, 2007 - Afternoon

  • Mila Dalla Preda – UNITN – Hiding program slices for software security
  • Paolo Tonella – UNITN – Checksum ineffectiveness & assertion based

protection

  • Stefano Di Carlo – POLITO – Increasing the integration between the

untrusted application and the mobile module

  • Jasvir Nagra – UNITN – Dynamic watermarking
  • Amir Herzberg – Bar-Ilan Univeristy, ISRAEL – White-box secure

remote procedure call

  • Louis Goubin – GEMALTO – Cryptography
slide-14
SLIDE 14

14

2nd Quarterly Workshop - Program

March 21, 2007 – Morning

  • Jan Cappaert – KUL – Attack Model in the Presence of Trusted Hardware
  • Pierre Girard – GEMALTO – Java obfuscator
  • Jean-Daniel Aussel – GEMALTO – Usb secure token
  • Paolo Falcarin – POLITO – Overview about design alternative (WP2)
  • Stefano Di Carlo – POLITO – Overview about generic application (WP2)
  • Mariano Ceccato – UNITN – Overview about trust & attack model (WP2)
  • Jerome d'Annoville – GEMALTO – Overview about design alternative (WP3)
  • Jerome d'Annoville – GEMALTO – Overview about generic application (WP3)
  • Dries Schellekens – KUL – Overview about trust model (WP3)
  • Brecht Wyseur – KUL – Overview about attack model (WP3)
  • WP leadres – Workpackage discussion
slide-15
SLIDE 15

15

3rd Quarterly Workshop - Program

  • Location: Torino, ITALY
  • Date: 19-20 June, 2007
  • Link to web pag

http://re-trust.dit.unitn.it/meeting20070619.html

slide-16
SLIDE 16

16

3rd Quarterly Workshop - Program

June 19, 2007 - Morning Session

  • Jerome D'Annoville – GEMALTO – Architecture meeting reporting

(Paris, June 8, 2007)

  • Brecht Wyseur – KUL – Task 3.2 - Hw/Sw co-obfuscation meeting

(Torino, June 18, 2007) June 19, 2007 - Afternoon Session Subgroup Break-Out

  • WP2: Software-based Tamper Resistance Methods for Remote Entrusting
  • WP3: Hardware/Software-based Tamper Resistance Methods for Remote Entrusting
  • WP4: Trust and Security Analysis

Subgroup Reporting

  • WP2: Software-based Tamper Resistance Methods for Remote Entrusting
  • WP3: Hardware/Software-based Tamper Resistance Methods for Remote Entrusting
  • WP4: Trust and Security Analysis
slide-17
SLIDE 17

17

3rd Quarterly Workshop - Program

June 20, 2007 - Morning Session

  • Mariano Ceccato – UNITN – Barrier Slicing for Remote Software

Trusting

  • Vasily Desnitsky, Igor Kotenko – SPIIRAS – Review of Aspect

Oriented Approaches and their Use in RE-TRUST for Mobile Module Implementation

  • Jasvir Nagra – UNITN – Is Obfuscation Really Impossible?
  • Amitabh Saxena – UNITN – Techniques for Obfuscation: more

Notions and Definition June 20, 2007 - Afternoon Session

  • Roberta Guidolin – UNITN – Presentation about Financial Planning
  • Mariano Ceccato – UNITN – Formal Review Process for Deliverables
slide-18
SLIDE 18

18

Publications

  • Igor Kotenko

"Mathematical Methods, Models and Architectures for Computer Networks Security." The Forth

International Conference, MMM-ACNS 2007. St. Petersburg, Russia.

  • Igor Kotenko

Special Session on "Security in Networked and Distributed Systems" on 16th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2008). Toulouse, France.

  • Artem Tishkov, Ekaterina Sidelnikova, Igor Kotenko

"Event Calculus based Checking of Filtering Policies. Mathematical Methods, Models and Architectures for

Computer Networks Security." MMM-ACNS 2007. St. Petersburg, Russia,

  • Igor Kotenko

"Multi-agent Modelling and Simulation of Cyber-Attacks and Cyber-Defense for Homeland Security." IEEE

IDAACS’2007, Dortmund, Germany, 6-8 September, 2007.

  • Vasily Desnitsky, Igor Kotenko

"Models of Remote Authentication for Program Protection." IEEE AIS'07/CAD-2007. Moscow, Fizmatlit,

2007

  • Vasily Desnitsky, Igor Kotenko

"Remote Authentication for software protection against unauthorized modification." Proceedings of Russian

Scientific symposium “National information systems and state security”. Moscow, 2007.

  • Vitaly Bogdanov, Igor Kotenko

"Policy-based Proactive Monitoring of Security Policy Performance. Mathematical Methods, Models and

Architectures for Computer Networks Security." MMM-ACNS 2007. St. Petersburg, Russia..

slide-19
SLIDE 19

19

Publications (contd.)

  • Brecht Wyseur, Wil Michiels, Paul Gorissen and Bart Preneel

"Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings", in SAC 2007, Ottawa, Canada.

  • Dries Schellekens, Brecht Wyseur and Bart Preneel

"Remote Attestation on Legacy Operating Systems with Trusted Platform Modules" in REM 2007, Dresden, Germany.

  • Mariano Ceccato, M. Preda, Jasvir Nagra, C. Collberg and P. Tonella

"Barrier Slicing for Remote Software Trusting" in SCAM 2007, Paris, France.

  • Christian Collberg, Jasvir Nagra and Fei-Yue Wang

"Surreptitious Software: Models from Biology and History" in MMM-ACNS 2007, Russia.

  • Jean-Daniel Aussel

"Smart Cards and Digital Security", in MMM-ACNS 2007, St Petersburg, Russia.

  • Amitabh Saxena

"Additive Proofs of Knowledge: A New Notion for Non-Interactive Proofs", in SECRYPT 07, Barcelona, Spain

  • Jasvir Nagra, Mariano Ceccato and Paolo Tonella

"Distributing Trust Verification to Increase Application Performance", in PDP2008, Toulouse,

  • France. (Acceptance pending)
  • Riccardo Scandariato, Yoram Ofek, Paolo Falcarin and Mario Baldi. "Application-oriented

trust in distributed computing " (To be announced)

slide-20
SLIDE 20

20

Presentations

  • Sebastian Faust Seminar on “Observable Cryptography” at KUL,

Belgium

  • Mila dalla Preda Seminar series on “Abstract Intepretation” at

University of Trento, Italy

  • Jasvir Nagra Seminar on “Is Obfuscation Really Impossible?” at

University of Auckland, NZ

  • Jasvir Nagra Seminar on “Threading Software Watermarks” at

University of Verona, Italy

  • Amitabh Saxena Seminar on “The Impossibility of Obfuscation” at

University of Trento, Italy

  • Amitabh Saxena Seminar on “Code Obfuscation and Software

Protection” at SPI Conference, Brno, Czech Republic

  • Amitabh Saxena Seminar on “Groups with Infeasible Inversion:

Black-box constructions and Applications”, KUL, Belgium