First year review WP5: Dissemination
Trento - September 24th, 2007
First year review WP5: Dissemination Trento - September 24th, 2007 - - PowerPoint PPT Presentation
First year review WP5: Dissemination Trento - September 24th, 2007 WP5 Tasks 5.1 Kickoff workshop and plenary 5.2 Public website 5.3 Dissemination Plan 5.4 Dissemination Final Report 5.5 Final workshop and plenary 2
Trento - September 24th, 2007
2
3
1. Kick-off Workshop 2. 1st Quarterly Workshop 3. 2nd Quarterly Workshop 4. 3rd Quarterly Workshop
http://www.re-trust.org
Four workshops during the first year with three primary objectives:
external experts
6
7
Monday 18, 2006 Morning Session Chair: Moti Yung
to Store a Secret in Software
Afternoon Session Chair: Bart Preneel
Fault Tolerance (SHIFT) techniques
tampering and authentication
8
Tuesday 19, 2006 Morning Session Chair: Christian Collberg
techniques
Afternoon Session Chair: Yoram Ofek Project Kick-Off Meeting
9
http://re-trust.dit.unitn.it/meeting20061219.html
10
December 19, 2006 – Morning
interpretation
Approach December 19, 2006 – Afternoon
Untampered Code Execution on Legacy Systems
Representation and Taxonomy
11
December 20, – Morning
December 20, 2006 – Afternoon
12
http://re-trust.dit.unitn.it/meeting20070320.html
13
March 20, 2007 – Morning
March 20, 2007 - Afternoon
protection
untrusted application and the mobile module
remote procedure call
14
March 21, 2007 – Morning
15
http://re-trust.dit.unitn.it/meeting20070619.html
16
June 19, 2007 - Morning Session
(Paris, June 8, 2007)
(Torino, June 18, 2007) June 19, 2007 - Afternoon Session Subgroup Break-Out
Subgroup Reporting
17
June 20, 2007 - Morning Session
Trusting
Oriented Approaches and their Use in RE-TRUST for Mobile Module Implementation
Notions and Definition June 20, 2007 - Afternoon Session
18
"Mathematical Methods, Models and Architectures for Computer Networks Security." The Forth
International Conference, MMM-ACNS 2007. St. Petersburg, Russia.
Special Session on "Security in Networked and Distributed Systems" on 16th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2008). Toulouse, France.
"Event Calculus based Checking of Filtering Policies. Mathematical Methods, Models and Architectures for
Computer Networks Security." MMM-ACNS 2007. St. Petersburg, Russia,
"Multi-agent Modelling and Simulation of Cyber-Attacks and Cyber-Defense for Homeland Security." IEEE
IDAACS’2007, Dortmund, Germany, 6-8 September, 2007.
"Models of Remote Authentication for Program Protection." IEEE AIS'07/CAD-2007. Moscow, Fizmatlit,
2007
"Remote Authentication for software protection against unauthorized modification." Proceedings of Russian
Scientific symposium “National information systems and state security”. Moscow, 2007.
"Policy-based Proactive Monitoring of Security Policy Performance. Mathematical Methods, Models and
Architectures for Computer Networks Security." MMM-ACNS 2007. St. Petersburg, Russia..
19
"Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings", in SAC 2007, Ottawa, Canada.
"Remote Attestation on Legacy Operating Systems with Trusted Platform Modules" in REM 2007, Dresden, Germany.
"Barrier Slicing for Remote Software Trusting" in SCAM 2007, Paris, France.
"Surreptitious Software: Models from Biology and History" in MMM-ACNS 2007, Russia.
"Smart Cards and Digital Security", in MMM-ACNS 2007, St Petersburg, Russia.
"Additive Proofs of Knowledge: A New Notion for Non-Interactive Proofs", in SECRYPT 07, Barcelona, Spain
"Distributing Trust Verification to Increase Application Performance", in PDP2008, Toulouse,
trust in distributed computing " (To be announced)
20
Belgium
University of Trento, Italy
University of Auckland, NZ
University of Verona, Italy
University of Trento, Italy
Protection” at SPI Conference, Brno, Czech Republic
Black-box constructions and Applications”, KUL, Belgium