Second Year Review WP5: Dissemination Trento 17 October 2008 - - PowerPoint PPT Presentation

second year review wp5 dissemination
SMART_READER_LITE
LIVE PREVIEW

Second Year Review WP5: Dissemination Trento 17 October 2008 - - PowerPoint PPT Presentation

Second Year Review WP5: Dissemination Trento 17 October 2008 WP5 Tasks 5.4 Dissemination Final Report (M36) 5.5 Final workshop and plenary (M36) Activities Conferences and workshops Publications Presentations


slide-1
SLIDE 1

Second Year Review WP5: Dissemination

Trento –17 October 2008

slide-2
SLIDE 2

WP5 Tasks

5.4 Dissemination Final Report (M36) 5.5 Final workshop and plenary (M36)

slide-3
SLIDE 3

Activities

 Conferences and workshops  Publications  Presentations

slide-4
SLIDE 4

Workshops

 Four workshops during the second year  with three primary objectives:

 Stimulate discussion – brain-storming with external

experts

 Problem definition  Project work/tasks planning

slide-5
SLIDE 5

Workshops

 Plenary Workshop - September 25-26, 2007

September 2007 Workshop - Trento - Italy

 Fifth Quarterly Meeting - December 18-19, 2007

December 2007 Workshop - Leuven - Belgium

 Sixth Quarterly Meeting - March 11, 2008

March 2008 Workshop - Villach - Austria – as part of Trust 2008 event with several other EC funded projects

 Seventh Quarterly Meeting - June 19-20, 2008

June 2008 Workshop - St. Petersburg - Russia

slide-6
SLIDE 6

Plenary Meeting Workshop

Villa Madruzzo - Trento - Italy

Site:

Trento - Italy

Location:

25-26 September 2007

Date:

Plenary Workshop 4th Quarterly Meeting

Workshop:

slide-7
SLIDE 7

Plenary Meeting - Program

Presentations

Bertrand Anackert Diversity for Software Protection

Jan Cappaert Self-encryption Code to Protect against Analysis and Tampering

Claudio Orlandi Introduction to Secure Multiparty Computation techniques

Jean-Daniel Aussel Security of Smartcards

Mariano Ceccato Distributing Trust Verification

Haya Shulman/Amir Herzberg White-box Remote Procedure Call

Moti Yung Conference Call on Interlocking

Paul von Oorchot Conference Call on Architecture, Undebuggability

Christian Collberg Conference Call on Implementation issues

Amir Herzberg Conference Call Discussion of WBRPC

Yoram Ofek Introduction

Bart van Rijnsoever White box cryptography and secure storage

Brecht Wyseur Remote Attestation on legacy operating systems with trusted platform modules

Dennis Hofheinz Obfuscation from a cryptographic perspective

Brief review of the work package presentations

Tasks and deliverables for 2nd year WP1 - Yoram Ofek WP2 - Stefano Di Carlo WP3 - Brecht Wyseur WP4 - Bruno Crispo

Structured discussion on open research challenges

slide-8
SLIDE 8

5th Quarterly Workshop - Program

Novotel Conference Hotel - Leuven - Belgium

Site:

Leuven - Belgium

Location:

18-19 December 2007

Date:

Fifth Quarterly Meeting

Workshop:

slide-9
SLIDE 9

5th Quarterly Workshop

Presentations

Sebastian Faust Physically Observable Cryptography

Ahmadreza Sadeghi Property Based Attestation

Dennis HofheinzI Publickey encryption with noninteractive

  • pening

Brecht Wyseur Computing in the Encrypted Domain

Mariano Ceccato Emperical Evaluation of Protection Offered by Obfuscation

Thomas Herlea RETRUST Trust Model

Chair: Jasvir Nagras Open Discussion about the RETRUST Trust Model

Haya Shulman and Amir Herzberg WhiteBox Remote Program Execution

Chair: Amir Herzberg Open Discussion about WhiteBox Cryptography and Mobile Code

Stefano Di Carlo Remote Entrusting by Remote Invariants Monitoring

Paolo Falcarin Improvements Using Mobility for Remote Entrusting

Chair: Mariano Ceccato Open Discussion about Generic Applications

Vasily Desnitsky Entrusting Protocol Design: problem settlement, requirements and related protocols

Amitabh Saxena Analysis Model

Christian Collberg Analysis Model

Discussion led by Yoram and the active participants of all WP leaders

Discussion on Tasks

Discussion on Deliverables

Discussion on Milestones

slide-10
SLIDE 10

6th Quarterly Workshop - Program

Congress Center Villach (CCV)

Site:

Villach - Austria

Location:

11 March 2008

Date:

Sixth Quarterly Meeting

Workshop:

slide-11
SLIDE 11

6th Quarterly Workshop - Program

Presentations

Invited speakers

Clark Thomborson (University of Auckland) Could Software Watermarks Express Both Rules and Assurances?

Ahmad Sadeghi (Ruhr-University Bochum) Property-Based Attestation and Virtual TPM

Wulf Harder (Syncrosoft) White-box cryptography and obfuscation

Re-Trust speakers

Vasily Desnitsky (SPIIRAS) Development and initial analysis of entrusting protocol

Stefano Di Carlo (POLITO) Remote Control Flow Checking for Remote Entrusting of Software Applications

Pierre Girard (GEM) Javacard obfuscation

Anirban Majumdar (UNITN) Slicing computations

Jerome d'Annoville (GEM) VoIP client & demo environment

Stefano Di Carlo (POLITO) Candidate application / prototype

Open discussion about project's final prototype

Second year project's deliverables organization

slide-12
SLIDE 12

7th Quarterly Workshop - Program

Novotel Hotel

Site:

  • St. Petersburg - Russia

Location:

19-20 June 2008

Date:

Seventh Quarterly Meeting

Workshop:

slide-13
SLIDE 13

7th Quarterly Workshop - Program

  • Prof. Valery Korzhik

(Invited Talk) State University of Telecommunications, Russia Identification and Key Distribution Based on Biometric Information

  • Prof. Nikolay Moldovyan

(Invited Talk) Specialized Center of Program Systems "SPECTR", Russia Cryptographic mechanisms for information authentication and unathorized copying software protection

Mariano Ceccato, Mila Dalla Preda, Anirban Majumdar, Paolo Tonella ITC-Irst, UNITN Remote Entrusting Remote Entrusting by OrthogonalClient Replacement

Sebastian Faust Katholieke Universiteit Leuven Private Circuits Revisited: Provable Security Guarantees on Boolean Circuits

Mariano Ceccato, Jasvir Nagra, Massimiliano Di Penta, Marco Torchiano, Paolo Tonella, Paolo Falcarin, Filippo Ricca ITC-Irst, UNITN, POLITO Preliminary Analysis of the Reverse Engineering Complexity

Vasily Desnitsky, Igor Kotenko SPIIRAS Design and Analysis of Entrusting Protocol

Sergey Reznik, Igor Kotenko SPIIRAS Analysis of Verification Tools for Security Protocols

Sergey Reznik SPIIRAS Verification of Entrusting Protocol using AVISPA and Isabelle

Alessandro Zorat UNITN Open discussion on Second Year Review reports

Deliverable D2.3 Methods to dynamically replace the secure software module and to securely interlock applications with secure SW module.

Deliverable D2.4 Protection methods for hardening the secure software module

Deliverable D3.2 First Analysis Encrypted Code and HW assisted SW Protection

Deliverable D4.2 Trust analysis of SW-based method

Deliverable D4.3 Analysis of the Reverse Engineering Complexity

Stefano Di Carlo POLITO Open discussion on prototype

slide-14
SLIDE 14

Publications

Jean-Daniel Aussel, "Smart Cards and Digital Security", in V. Gorodetsky, I. Kotenko, and V.A. Skormin (Eds.): MMM-ACNS 2007, CCIS 1, pp. 42–56, 2007. Invited Talk Christian Collberg, Jasvir Nagra and Fei-Yue Wang, "Surreptitious Software: Models from Biology and History" in MMM-ACNS 2007, September 13-15, 2007, St Petersburg, Russia. Invited Talk Brecht Wyseur, “White-Box Cryptography”. At AscureTV customer business seminar 2008, May 8th, 2008, Brussels, Belgium. Invited Talk Brecht Wyseur, “Introduction to White-Box Cryptography”. At Special Summer School hosted by the ECRYPT Network of Excellence, May 16th, 2008, Crete, Greece Invited Talk

slide-15
SLIDE 15

Publications

  • D. Schellekens, B. Wyseur, and B. Preneel, "Remote attestation on legacy operating systems

with trusted platform modules," In 1st International Workshop on Run Time Enforcement for Mobile and Distributed Systems (REM 2007), Electronic Notes in Theoretical Computer Science197(1), F. Massacci , and F. Piessens (eds.), Elsevier, pp. 59-72, 2008. Paper Mariano Ceccato, Yoram Ofek and Paolo Tonella, “Remote entrusting by run-time software authentication”, Proc. of the 34th Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2008), volume 4910 of Lecture Notes, pp. 83-97. V. Geffert, J. Karhumaki, A. Bertoni, B. Preneel, P. Navrat, and M. Bielikova, editors, Computer Science,. Springer, 2008. Paper

  • J. Cappaert, B. Preneel, B. Anckaert, M. Madou, and K. De Bosschere, “Towards Tamper

Resistant Code Encryption: Practice and Experience”, In Information Security Practice and Experience Conference LNCS 4991, L. Chen, Y. Mu, and W. Susilo (eds.), pp. 86-100, 2008 Paper J-D. Aussel, “Smart Cards and remote entrusting”, to be published in the proceedings of The Future of Trust in Computing, 2nd conference, Berlin, Germany, June 30-July 2, 2008. Paper Christian Collberg, Jasvir Nagra and Fei-Yue Wang, "Surreptitious Software: Models from Biology and History" in V. Gorodetsky, I. Kotenko, and V.A. Skormin (Eds.): Communications in Computer and Information Scienc , Vol.1, Springer Verlag, pp. 1–21, 2007. Paper Jean-Daniel Aussel, "Smart Cards and Digital Security", in V. Gorodetsky, I. Kotenko, and V.A. Skormin (Eds.): Communications in Computer and Information Science, Vol.1, Springer Verlag, pp. 42–56, 2007. Paper

slide-16
SLIDE 16

Publications

Seventh IEEE International Working Conference on Source Code Analysis and Manipulation, Paris, France, 30th September-1st October 2007, Presented by Mariano Ceccato (attended also by co-authors Jasvir Nagra, Mila dalla Preda and Paolo Tonella) Paper Jasvir Nagra, Mariano Ceccato and Paolo Tonella, "Distributing Trust Verification to Increase Application Performance", in PDP2008, February 13-15, 2008, Toulouse, France. Paper "Application-oriented trust in distributed computing" Riccardo Scandariato (KUL), Yoram Ofek (Trento), Paolo Falcarin, Mario Baldi (Politecnico Torino). Paper Mariano Ceccato, M. Preda, J. Nagra, C. Collberg, P. Tonella, "Barrier Slicing for Remote Software Trusting" in SCAM 2007, September 30-October 1, 2007, Paris, France. Paper Dries Schellekens, and Brecht Wyseur, and Bart Preneel, "Remote Attestation on Legacy Operating Systems with Trusted Platform Modules" in REM 2007 workshop Paper

  • D. Schellekens, B. Wyseur, and B. Preneel, "Remote attestation on legacy operating systems

with trusted platform modules," Submitted for printing in Special Issue on Science of Computer Programming, 2008. Paper

slide-17
SLIDE 17

Publications

[pdp2008] 16th Euromicro International Conference on Parallel, Distributed and network- based Processing, Toulouse, France, 13-15 February 2008, Presented by Mariano Ceccato. Workshop Presentation Special Session on "Security in Networked and Distributed Systems" (Chair - Igor Kotenko)

  • n 16th Euromicro International Conference on Parallel, Distributed and network-based

Processing (PDP 2008). Toulouse, France. February 13-15 2008. IEEE Computer Society. 2008. Workshop Presentation Yoram Ofek; 2008 EuroTRUSTAmI 2nd edition; “Remote-Entrusting Paradigm for Protecting and Entrusting the Internet Infrastructure and Applications” Workshop Presentation Presentation by Yoram Ofek “Remote-Entrusting Paradigm for Protecting and Entrusting the Internet Infrastructure and Applications”, Israel-Italy Scientific Meeting, Tel-Aviv, Israel – May 2008 Scientific Meeting

  • B. Wyseur, M. Deng, and T. Herlea, "A Survey of Homomorphic Encryption Schemes,"

COSIC internal report, 15 pages, 2007. Report

  • N. Kisserli, and B. Preneel, "Surgical fuzzing of open source applications using static

analysis," COSIC internal report, 5 pages, 2008. Report

slide-18
SLIDE 18

Summary of Presentations

3 Workshop Presentations 2 Reports 1 Scientific Meetings 12 Papers 4 Invited talks