Second Year Review WP5: Dissemination
Trento –17 October 2008
Second Year Review WP5: Dissemination Trento 17 October 2008 - - PowerPoint PPT Presentation
Second Year Review WP5: Dissemination Trento 17 October 2008 WP5 Tasks 5.4 Dissemination Final Report (M36) 5.5 Final workshop and plenary (M36) Activities Conferences and workshops Publications Presentations
Trento –17 October 2008
Conferences and workshops Publications Presentations
Four workshops during the second year with three primary objectives:
Stimulate discussion – brain-storming with external
experts
Problem definition Project work/tasks planning
Plenary Workshop - September 25-26, 2007
September 2007 Workshop - Trento - Italy
Fifth Quarterly Meeting - December 18-19, 2007
December 2007 Workshop - Leuven - Belgium
Sixth Quarterly Meeting - March 11, 2008
March 2008 Workshop - Villach - Austria – as part of Trust 2008 event with several other EC funded projects
Seventh Quarterly Meeting - June 19-20, 2008
June 2008 Workshop - St. Petersburg - Russia
Villa Madruzzo - Trento - Italy
Site:
Trento - Italy
Location:
25-26 September 2007
Date:
Plenary Workshop 4th Quarterly Meeting
Workshop:
Presentations
Bertrand Anackert Diversity for Software Protection
Jan Cappaert Self-encryption Code to Protect against Analysis and Tampering
Claudio Orlandi Introduction to Secure Multiparty Computation techniques
Jean-Daniel Aussel Security of Smartcards
Mariano Ceccato Distributing Trust Verification
Haya Shulman/Amir Herzberg White-box Remote Procedure Call
Moti Yung Conference Call on Interlocking
Paul von Oorchot Conference Call on Architecture, Undebuggability
Christian Collberg Conference Call on Implementation issues
Amir Herzberg Conference Call Discussion of WBRPC
Yoram Ofek Introduction
Bart van Rijnsoever White box cryptography and secure storage
Brecht Wyseur Remote Attestation on legacy operating systems with trusted platform modules
Dennis Hofheinz Obfuscation from a cryptographic perspective
Brief review of the work package presentations
Tasks and deliverables for 2nd year WP1 - Yoram Ofek WP2 - Stefano Di Carlo WP3 - Brecht Wyseur WP4 - Bruno Crispo
Structured discussion on open research challenges
Novotel Conference Hotel - Leuven - Belgium
Site:
Leuven - Belgium
Location:
18-19 December 2007
Date:
Fifth Quarterly Meeting
Workshop:
Presentations
Sebastian Faust Physically Observable Cryptography
Ahmadreza Sadeghi Property Based Attestation
Dennis HofheinzI Publickey encryption with noninteractive
Brecht Wyseur Computing in the Encrypted Domain
Mariano Ceccato Emperical Evaluation of Protection Offered by Obfuscation
Thomas Herlea RETRUST Trust Model
Chair: Jasvir Nagras Open Discussion about the RETRUST Trust Model
Haya Shulman and Amir Herzberg WhiteBox Remote Program Execution
Chair: Amir Herzberg Open Discussion about WhiteBox Cryptography and Mobile Code
Stefano Di Carlo Remote Entrusting by Remote Invariants Monitoring
Paolo Falcarin Improvements Using Mobility for Remote Entrusting
Chair: Mariano Ceccato Open Discussion about Generic Applications
Vasily Desnitsky Entrusting Protocol Design: problem settlement, requirements and related protocols
Amitabh Saxena Analysis Model
Christian Collberg Analysis Model
Discussion led by Yoram and the active participants of all WP leaders
Discussion on Tasks
Discussion on Deliverables
Discussion on Milestones
6th Quarterly Workshop - Program
Congress Center Villach (CCV)
Site:
Villach - Austria
Location:
11 March 2008
Date:
Sixth Quarterly Meeting
Workshop:
6th Quarterly Workshop - Program
Presentations
Invited speakers
Clark Thomborson (University of Auckland) Could Software Watermarks Express Both Rules and Assurances?
Ahmad Sadeghi (Ruhr-University Bochum) Property-Based Attestation and Virtual TPM
Wulf Harder (Syncrosoft) White-box cryptography and obfuscation
Re-Trust speakers
Vasily Desnitsky (SPIIRAS) Development and initial analysis of entrusting protocol
Stefano Di Carlo (POLITO) Remote Control Flow Checking for Remote Entrusting of Software Applications
Pierre Girard (GEM) Javacard obfuscation
Anirban Majumdar (UNITN) Slicing computations
Jerome d'Annoville (GEM) VoIP client & demo environment
Stefano Di Carlo (POLITO) Candidate application / prototype
Open discussion about project's final prototype
Second year project's deliverables organization
7th Quarterly Workshop - Program
Novotel Hotel
Site:
Location:
19-20 June 2008
Date:
Seventh Quarterly Meeting
Workshop:
7th Quarterly Workshop - Program
(Invited Talk) State University of Telecommunications, Russia Identification and Key Distribution Based on Biometric Information
(Invited Talk) Specialized Center of Program Systems "SPECTR", Russia Cryptographic mechanisms for information authentication and unathorized copying software protection
Mariano Ceccato, Mila Dalla Preda, Anirban Majumdar, Paolo Tonella ITC-Irst, UNITN Remote Entrusting Remote Entrusting by OrthogonalClient Replacement
Sebastian Faust Katholieke Universiteit Leuven Private Circuits Revisited: Provable Security Guarantees on Boolean Circuits
Mariano Ceccato, Jasvir Nagra, Massimiliano Di Penta, Marco Torchiano, Paolo Tonella, Paolo Falcarin, Filippo Ricca ITC-Irst, UNITN, POLITO Preliminary Analysis of the Reverse Engineering Complexity
Vasily Desnitsky, Igor Kotenko SPIIRAS Design and Analysis of Entrusting Protocol
Sergey Reznik, Igor Kotenko SPIIRAS Analysis of Verification Tools for Security Protocols
Sergey Reznik SPIIRAS Verification of Entrusting Protocol using AVISPA and Isabelle
Alessandro Zorat UNITN Open discussion on Second Year Review reports
Deliverable D2.3 Methods to dynamically replace the secure software module and to securely interlock applications with secure SW module.
Deliverable D2.4 Protection methods for hardening the secure software module
Deliverable D3.2 First Analysis Encrypted Code and HW assisted SW Protection
Deliverable D4.2 Trust analysis of SW-based method
Deliverable D4.3 Analysis of the Reverse Engineering Complexity
Stefano Di Carlo POLITO Open discussion on prototype
Jean-Daniel Aussel, "Smart Cards and Digital Security", in V. Gorodetsky, I. Kotenko, and V.A. Skormin (Eds.): MMM-ACNS 2007, CCIS 1, pp. 42–56, 2007. Invited Talk Christian Collberg, Jasvir Nagra and Fei-Yue Wang, "Surreptitious Software: Models from Biology and History" in MMM-ACNS 2007, September 13-15, 2007, St Petersburg, Russia. Invited Talk Brecht Wyseur, “White-Box Cryptography”. At AscureTV customer business seminar 2008, May 8th, 2008, Brussels, Belgium. Invited Talk Brecht Wyseur, “Introduction to White-Box Cryptography”. At Special Summer School hosted by the ECRYPT Network of Excellence, May 16th, 2008, Crete, Greece Invited Talk
with trusted platform modules," In 1st International Workshop on Run Time Enforcement for Mobile and Distributed Systems (REM 2007), Electronic Notes in Theoretical Computer Science197(1), F. Massacci , and F. Piessens (eds.), Elsevier, pp. 59-72, 2008. Paper Mariano Ceccato, Yoram Ofek and Paolo Tonella, “Remote entrusting by run-time software authentication”, Proc. of the 34th Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2008), volume 4910 of Lecture Notes, pp. 83-97. V. Geffert, J. Karhumaki, A. Bertoni, B. Preneel, P. Navrat, and M. Bielikova, editors, Computer Science,. Springer, 2008. Paper
Resistant Code Encryption: Practice and Experience”, In Information Security Practice and Experience Conference LNCS 4991, L. Chen, Y. Mu, and W. Susilo (eds.), pp. 86-100, 2008 Paper J-D. Aussel, “Smart Cards and remote entrusting”, to be published in the proceedings of The Future of Trust in Computing, 2nd conference, Berlin, Germany, June 30-July 2, 2008. Paper Christian Collberg, Jasvir Nagra and Fei-Yue Wang, "Surreptitious Software: Models from Biology and History" in V. Gorodetsky, I. Kotenko, and V.A. Skormin (Eds.): Communications in Computer and Information Scienc , Vol.1, Springer Verlag, pp. 1–21, 2007. Paper Jean-Daniel Aussel, "Smart Cards and Digital Security", in V. Gorodetsky, I. Kotenko, and V.A. Skormin (Eds.): Communications in Computer and Information Science, Vol.1, Springer Verlag, pp. 42–56, 2007. Paper
Seventh IEEE International Working Conference on Source Code Analysis and Manipulation, Paris, France, 30th September-1st October 2007, Presented by Mariano Ceccato (attended also by co-authors Jasvir Nagra, Mila dalla Preda and Paolo Tonella) Paper Jasvir Nagra, Mariano Ceccato and Paolo Tonella, "Distributing Trust Verification to Increase Application Performance", in PDP2008, February 13-15, 2008, Toulouse, France. Paper "Application-oriented trust in distributed computing" Riccardo Scandariato (KUL), Yoram Ofek (Trento), Paolo Falcarin, Mario Baldi (Politecnico Torino). Paper Mariano Ceccato, M. Preda, J. Nagra, C. Collberg, P. Tonella, "Barrier Slicing for Remote Software Trusting" in SCAM 2007, September 30-October 1, 2007, Paris, France. Paper Dries Schellekens, and Brecht Wyseur, and Bart Preneel, "Remote Attestation on Legacy Operating Systems with Trusted Platform Modules" in REM 2007 workshop Paper
with trusted platform modules," Submitted for printing in Special Issue on Science of Computer Programming, 2008. Paper
[pdp2008] 16th Euromicro International Conference on Parallel, Distributed and network- based Processing, Toulouse, France, 13-15 February 2008, Presented by Mariano Ceccato. Workshop Presentation Special Session on "Security in Networked and Distributed Systems" (Chair - Igor Kotenko)
Processing (PDP 2008). Toulouse, France. February 13-15 2008. IEEE Computer Society. 2008. Workshop Presentation Yoram Ofek; 2008 EuroTRUSTAmI 2nd edition; “Remote-Entrusting Paradigm for Protecting and Entrusting the Internet Infrastructure and Applications” Workshop Presentation Presentation by Yoram Ofek “Remote-Entrusting Paradigm for Protecting and Entrusting the Internet Infrastructure and Applications”, Israel-Italy Scientific Meeting, Tel-Aviv, Israel – May 2008 Scientific Meeting
COSIC internal report, 15 pages, 2007. Report
analysis," COSIC internal report, 5 pages, 2008. Report
3 Workshop Presentations 2 Reports 1 Scientific Meetings 12 Papers 4 Invited talks