second year review wp5 dissemination
play

Second Year Review WP5: Dissemination Trento 17 October 2008 - PowerPoint PPT Presentation

Second Year Review WP5: Dissemination Trento 17 October 2008 WP5 Tasks 5.4 Dissemination Final Report (M36) 5.5 Final workshop and plenary (M36) Activities Conferences and workshops Publications Presentations


  1. Second Year Review WP5: Dissemination Trento –17 October 2008

  2. WP5 Tasks  5.4 Dissemination Final Report (M36)  5.5 Final workshop and plenary (M36)

  3. Activities  Conferences and workshops  Publications  Presentations

  4. Workshops  Four workshops during the second year  with three primary objectives:  Stimulate discussion – brain-storming with external experts  Problem definition  Project work/tasks planning

  5. Workshops  Plenary Workshop - September 25-26, 2007 September 2007 Workshop - Trento - Italy  Fifth Quarterly Meeting - December 18-19, 2007 December 2007 Workshop - Leuven - Belgium  Sixth Quarterly Meeting - March 11, 2008 March 2008 Workshop - Villach - Austria – as part of Trust 2008 event with several other EC funded projects  Seventh Quarterly Meeting - June 19-20, 2008 June 2008 Workshop - St. Petersburg - Russia

  6. Plenary Meeting Workshop Plenary Workshop Workshop: 4th Quarterly Meeting Date: 25-26 September 2007 Location: Trento - Italy Site: Villa Madruzzo - Trento - Italy

  7. Plenary Meeting - Program  Presentations  Bertrand Anackert Diversity for Software Protection  Jan Cappaert Self-encryption Code to Protect against Analysis and Tampering  Claudio Orlandi Introduction to Secure Multiparty Computation techniques  Jean-Daniel Aussel Security of Smartcards  Mariano Ceccato Distributing Trust Verification  Haya Shulman/Amir Herzberg White-box Remote Procedure Call  Moti Yung Conference Call on Interlocking  Paul von Oorchot Conference Call on Architecture, Undebuggability  Christian Collberg Conference Call on Implementation issues  Amir Herzberg Conference Call Discussion of WBRPC  Yoram Ofek Introduction  Bart van Rijnsoever White box cryptography and secure storage  Brecht Wyseur Remote Attestation on legacy operating systems with trusted platform modules  Dennis Hofheinz Obfuscation from a cryptographic perspective  Brief review of the work package presentations  Tasks and deliverables for 2nd year WP1 - Yoram Ofek WP2 - Stefano Di Carlo WP3 - Brecht Wyseur WP4 - Bruno Crispo  Structured discussion on open research challenges

  8. 5 th Quarterly Workshop - Program Workshop: Fifth Quarterly Meeting Date: 18-19 December 2007 Location: Leuven - Belgium Site: Novotel Conference Hotel - Leuven - Belgium

  9. 5th Quarterly Workshop  Presentations  Sebastian Faust Physically Observable Cryptography  Ahmadreza Sadeghi Property Based Attestation  Dennis HofheinzI Publickey encryption with noninteractive opening  Brecht Wyseur Computing in the Encrypted Domain  Mariano Ceccato Emperical Evaluation of Protection Offered by Obfuscation  Thomas Herlea RETRUST Trust Model  Chair: Jasvir Nagras Open Discussion about the RETRUST Trust Model  Haya Shulman and Amir Herzberg WhiteBox Remote Program Execution  Chair: Amir Herzberg Open Discussion about WhiteBox Cryptography and Mobile Code  Stefano Di Carlo Remote Entrusting by Remote Invariants Monitoring  Paolo Falcarin Improvements Using Mobility for Remote Entrusting  Chair: Mariano Ceccato Open Discussion about Generic Applications  Vasily Desnitsky Entrusting Protocol Design: problem settlement, requirements and related protocols  Amitabh Saxena Analysis Model  Christian Collberg Analysis Model  Discussion led by Yoram and the active participants of all WP leaders  Discussion on Tasks  Discussion on Deliverables  Discussion on Milestones

  10. 6 th Quarterly Workshop - Program Workshop: Sixth Quarterly Meeting Date: 11 March 2008 Location: Villach - Austria Site: Congress Center Villach (CCV)

  11. 6 th Quarterly Workshop - Program  Presentations  Invited speakers  Clark Thomborson (University of Auckland) Could Software Watermarks Express Both Rules and Assurances?  Ahmad Sadeghi (Ruhr-University Bochum) Property-Based Attestation and Virtual TPM  Wulf Harder (Syncrosoft) White-box cryptography and obfuscation  Re-Trust speakers  Vasily Desnitsky (SPIIRAS) Development and initial analysis of entrusting protocol  Stefano Di Carlo (POLITO) Remote Control Flow Checking for Remote Entrusting of Software Applications  Pierre Girard (GEM) Javacard obfuscation  Anirban Majumdar (UNITN) Slicing computations  Jerome d'Annoville (GEM) VoIP client & demo environment  Stefano Di Carlo (POLITO) Candidate application / prototype  Open discussion about project's final prototype  Second year project's deliverables organization

  12. 7 th Quarterly Workshop - Program Workshop: Seventh Quarterly Meeting Date: 19-20 June 2008 Location: St. Petersburg - Russia Site: Novotel Hotel

  13. 7 th Quarterly Workshop - Program  Prof. Valery Korzhik (Invited Talk) State University of Telecommunications, Russia Identification and Key Distribution Based on Biometric Information  Prof. Nikolay Moldovyan (Invited Talk) Specialized Center of Program Systems "SPECTR", Russia Cryptographic mechanisms for information authentication and unathorized copying software protection  Mariano Ceccato, Mila Dalla Preda, Anirban Majumdar, Paolo Tonella ITC-Irst, UNITN Remote Entrusting Remote Entrusting by OrthogonalClient Replacement  Sebastian Faust Katholieke Universiteit Leuven Private Circuits Revisited: Provable Security Guarantees on Boolean Circuits  Mariano Ceccato, Jasvir Nagra, Massimiliano Di Penta, Marco Torchiano, Paolo Tonella, Paolo Falcarin, Filippo Ricca ITC-Irst, UNITN, POLITO Preliminary Analysis of the Reverse Engineering Complexity  Vasily Desnitsky, Igor Kotenko SPIIRAS Design and Analysis of Entrusting Protocol  Sergey Reznik, Igor Kotenko SPIIRAS Analysis of Verification Tools for Security Protocols  Sergey Reznik SPIIRAS Verification of Entrusting Protocol using AVISPA and Isabelle  Alessandro Zorat UNITN Open discussion on Second Year Review reports  Deliverable D2.3 Methods to dynamically replace the secure software module and to securely interlock applications with secure SW module.  Deliverable D2.4 Protection methods for hardening the secure software module  Deliverable D3.2 First Analysis Encrypted Code and HW assisted SW Protection  Deliverable D4.2 Trust analysis of SW-based method  Deliverable D4.3 Analysis of the Reverse Engineering Complexity  Stefano Di Carlo POLITO Open discussion on prototype

  14. Publications Brecht Wyseur, “Introduction to White-Box Cryptography”. At Special Summer School Invited Talk hosted by the ECRYPT Network of Excellence, May 16th, 2008, Crete, Greece Brecht Wyseur, “White-Box Cryptography”. At AscureTV customer business seminar 2008, Invited Talk May 8th, 2008, Brussels, Belgium. Christian Collberg, Jasvir Nagra and Fei-Yue Wang, "Surreptitious Software: Models from Invited Talk Biology and History" in MMM-ACNS 2007, September 13-15, 2007, St Petersburg, Russia. Jean-Daniel Aussel, "Smart Cards and Digital Security", in V. Gorodetsky, I. Kotenko, and Invited Talk V.A. Skormin (Eds.): MMM-ACNS 2007, CCIS 1, pp. 42–56, 2007.

  15. Publications Jean-Daniel Aussel, "Smart Cards and Digital Security", in V. Gorodetsky, I. Kotenko, and Paper V.A. Skormin (Eds.): Communications in Computer and Information Science, Vol.1, Springer Verlag, pp. 42–56, 2007. Christian Collberg, Jasvir Nagra and Fei-Yue Wang, "Surreptitious Software: Models from Biology and History" in V. Gorodetsky, I. Kotenko, and V.A. Skormin (Eds.): Paper Communications in Computer and Information Scienc , Vol.1, Springer Verlag, pp. 1–21, 2007. J-D. Aussel, “Smart Cards and remote entrusting”, to be published in the proceedings of The Paper Future of Trust in Computing, 2nd conference, Berlin, Germany, June 30-July 2, 2008. J. Cappaert, B. Preneel, B. Anckaert, M. Madou, and K. De Bosschere, “Towards Tamper Paper Resistant Code Encryption: Practice and Experience”, In Information Security Practice and Experience Conference LNCS 4991, L. Chen, Y. Mu, and W. Susilo (eds.), pp. 86-100, 2008 Mariano Ceccato, Yoram Ofek and Paolo Tonella, “Remote entrusting by run-time software authentication”, Proc. of the 34th Conference on Current Trends in Theory and Practice of Paper Computer Science (SOFSEM 2008), volume 4910 of Lecture Notes, pp. 83-97. V. Geffert, J. Karhumaki, A. Bertoni, B. Preneel, P. Navrat, and M. Bielikova, editors, Computer Science,. Springer, 2008. D. Schellekens, B. Wyseur, and B. Preneel, "Remote attestation on legacy operating systems with trusted platform modules," In 1st International Workshop on Run Time Enforcement for Paper Mobile and Distributed Systems (REM 2007), Electronic Notes in Theoretical Computer Science197(1), F. Massacci , and F. Piessens (eds.), Elsevier, pp. 59-72, 2008.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend