First year review WP5: Dissemination Trento - September 24th, 2007
WP5 Tasks • 5.1 Kickoff workshop and plenary • 5.2 Public website • 5.3 Dissemination Plan • 5.4 Dissemination Final Report • 5.5 Final workshop and plenary 2
Activities • Web-Site • First Year Workshops: 1. Kick-off Workshop 1 st Quarterly Workshop 2. 2 nd Quarterly Workshop 3. 3 rd Quarterly Workshop 4. • Conferences and workshops • Publications • Presentations 3
Web-Site • Link: http://www.re-trust.org • Overview of the project • Participant university and people • Project meeting • Project advertisement • Publications
Workshops Four workshops during the first year with three primary objectives: • Stimulate discussion – brain-storming with external experts • Problem definition • Project work/tasks planning
Kick-Off Workshop • Location: Trento, ITALY • Date: 18-19 September, 2006 • Link to webpage http://re-trust.dit.unitn.it/workshop.html • Link to Technical Program http://re-trust.dit.unitn.it/tp.html 6
Kick-Off Workshop - Program Monday 18, 2006 Morning Session Chair: Moti Yung • Yoram Ofek – UNITN – Re-Trust Project Overview • Moti Yung – Columbia U. / RSA, USA – Authentication: Present Overview and FutureChallenges • Christian Collberg – U. of Arizona, USA – Dynamic Algorithms for Software Watermarking - How to Store a Secret in Software • Bart Preneel – KUL – Open Research Issue in Cryptography • Klaus Kursawe – Philips Research – Trusted Computing in Re-Trust • Mario Baldi – POLITO – Trust in Network Protocols Afternoon Session Chair: Bart Preneel • Riccardo Scandariato – KUL – Entrusting by replacing: past experiences and open questions • Stefano Di Carlo – POLITO – On-line integrity checking through Software Implemented Hardware Fault Tolerance (SHIFT) techniques • Paolo Tonella – ITC-IRST – Reverse engineering and mutation analysis in the context of software tampering and authentication • Mariano Ceccato – ITC-IRST – Reverse Engineering Attacks to Remote Software Entrusting • Srijith – VUA – Policy binding and enforcement in Java 7
Kick-Off Workshop - Agenda Tuesday 19, 2006 Morning Session Chair: Christian Collberg • Willem Jonker – Philips Research – Security Needs of the Digital Society • Ginger Myles – IBM Research – The use of software-based integrity checks in software tamper resistance techniques • Brecht Wyseur – KUL – Code Obfuscation, White-Box Cryptography, and HW/SW Co-obfuscation • Igor Kotenko – SPIIRAS – Team background and Preliminary analysis of tasks to be solved • Jean-Daniel Aussel – Gemalto – Smart-Card Assistance to Software Authentication • Amitabh Saxena – La Trobe U., Australia – Black-Box Groups with Infeasible Inversion Afternoon Session Chair: Yoram Ofek Project Kick-Off Meeting • WP1 – UNITN – Architectural Framework • WP2 – POLITO – Software-based Tamper Resistance Methods for Remote Entrusting • WP3 – KUL – Hardware/Software-based Tamper Resistance Method for Remote Entrusting • WP4 – UNITN – Trust and Security Analysis • WP1 – UNITN – Milestones/Deliverables • WP2 – POLITO – Milestones/Deliverables • WP3 – KUL – Milestones/Deliverables • WP4 – UNITN – Milestones/Deliverables 8
First Quarterly Workshop • Location: Trento, ITALY • Date: 19-20 December, 2006 • Link to web page http://re-trust.dit.unitn.it/meeting20061219.html 9
1 st Quarterly Workshop - Program December 19, 2006 – Morning • Louis Goubin – GEMALTO – Secure computations using smart cards • Mila Dalla Preda – UNITN – Code obfuscation and malware detection by abstract interpretation • Igor Kotenko – SPIIRAS – State of the Art in Modeling of Computer Attacks • Antonio Durante – POLITO – Generic Applications • Davide D'Aprile – POLITO – Providing a RE-TRUST SDK: a (Semi) Formal Approach December 19, 2006 – Afternoon • Ceccato Mariano – UNITN – Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems • Paolo Falcarin – POLITO – Design alternatives • Paolo Tonella – UNITN – Trust and attack model • Vasily Desnitsky, Igor Kotenko – SPIIRAS – Trust Model Supplements and Taxonomy • Vasily Desnitsky, Igor Kotenko – SPIIRAS – Attack Model: Graph based Attack Representation and Taxonomy 10
1 st Quarterly Workshop - Program December 20, – Morning • Jerome D'Annoville – GEMALTO – Generic applications • Jerome D'Annoville – GEMALTO – Trust model ingredients • Jerome D'Annoville – GEMALTO – Smartcard & PC applications • Jerome D'Annoville – GEMALTO – Design alternative • Jerome D'Annoville – GEMALTO – Open session on the architecture December 20, 2006 – Afternoon • Brecht Wyseur – KUL – White Box Cryptography • Thomas Herlea – KUL – Attack model 11
Second Quarterly Workshop • Location: Paris, FRANCE • Date: 20-21 March, 2007 • Link to web page http://re-trust.dit.unitn.it/meeting20070320.html 12
2 nd Quarterly Workshop - Program March 20, 2007 – Morning • Rick Kennell – PURDUE University, IN / USA – Genuinity • Juan Garay – Bell Labs – Alcatel-Lucent, NJ / USA – TEAS • David Plaquin – HP Labs, Bristol / UK – Hypervisor+TC • Mariano Ceccato – UNITN – SWATT/Pioneer March 20, 2007 - Afternoon • Mila Dalla Preda – UNITN – Hiding program slices for software security • Paolo Tonella – UNITN – Checksum ineffectiveness & assertion based protection • Stefano Di Carlo – POLITO – Increasing the integration between the untrusted application and the mobile module • Jasvir Nagra – UNITN – Dynamic watermarking • Amir Herzberg – Bar-Ilan Univeristy, ISRAEL – White-box secure remote procedure call • Louis Goubin – GEMALTO – Cryptography 13
2 nd Quarterly Workshop - Program March 21, 2007 – Morning • Jan Cappaert – KUL – Attack Model in the Presence of Trusted Hardware • Pierre Girard – GEMALTO – Java obfuscator • Jean-Daniel Aussel – GEMALTO – Usb secure token • Paolo Falcarin – POLITO – Overview about design alternative (WP2) • Stefano Di Carlo – POLITO – Overview about generic application (WP2) • Mariano Ceccato – UNITN – Overview about trust & attack model (WP2) • Jerome d'Annoville – GEMALTO – Overview about design alternative (WP3) • Jerome d'Annoville – GEMALTO – Overview about generic application (WP3) • Dries Schellekens – KUL – Overview about trust model (WP3) • Brecht Wyseur – KUL – Overview about attack model (WP3) • WP leadres – Workpackage discussion 14
3 rd Quarterly Workshop - Program • Location: Torino, ITALY • Date: 19-20 June, 2007 • Link to web pag http://re-trust.dit.unitn.it/meeting20070619.html 15
3 rd Quarterly Workshop - Program June 19, 2007 - Morning Session • Jerome D'Annoville – GEMALTO – Architecture meeting reporting (Paris, June 8, 2007) • Brecht Wyseur – KUL – Task 3.2 - Hw/Sw co-obfuscation meeting (Torino, June 18, 2007) June 19, 2007 - Afternoon Session Subgroup Break-Out • WP2: Software-based Tamper Resistance Methods for Remote Entrusting • WP3: Hardware/Software-based Tamper Resistance Methods for Remote Entrusting • WP4: Trust and Security Analysis Subgroup Reporting • WP2: Software-based Tamper Resistance Methods for Remote Entrusting • WP3: Hardware/Software-based Tamper Resistance Methods for Remote Entrusting • WP4: Trust and Security Analysis 16
3 rd Quarterly Workshop - Program June 20, 2007 - Morning Session • Mariano Ceccato – UNITN – Barrier Slicing for Remote Software Trusting • Vasily Desnitsky, Igor Kotenko – SPIIRAS – Review of Aspect Oriented Approaches and their Use in RE-TRUST for Mobile Module Implementation • Jasvir Nagra – UNITN – Is Obfuscation Really Impossible? • Amitabh Saxena – UNITN – Techniques for Obfuscation: more Notions and Definition June 20, 2007 - Afternoon Session • Roberta Guidolin – UNITN – Presentation about Financial Planning • Mariano Ceccato – UNITN – Formal Review Process for Deliverables 17
Recommend
More recommend