Sie sind auf Seite 1von 5

M ARCH 2018, N O 17

Cryptacus Newsletter

March 2018
Cryptacus Newsletter
Welcome to the March 2018 edition of the monthly
Cryptacus.eu newsletter, offering a glimpse into re-
cent developments in the cryptanalysis of IoT & re-
lated areas. Send your contributions, comments &
feedback at cryptacus.newsletter@irisa.fr

News from the Chair Many top-level researchers from this Matthias J. Kannwischer (UK to NL),
by G ILDAS AVOINE field accepted to give a talk. Esteban Armas Vega (ES to UK), Yu
The key idea is to make theoreticians Long Chen (BE to NL).
and practitioners discussing together.
The program has been prepared by In total, these STSMs represent
Ioana Boureanu, Stéphanie Delaune, 318 funded days. It is worth noting
and Cristina Onete, and the event that inclusiveness target countries
is co-funded by the ERC POPSTAR (ITC) are under-represented in spite
headed by Stéphanie. of our effort to promote this scientific
tool.
Dear Cryptacus Members, The Workshop web site is https:
//www.surrey.ac.uk/futuredb. Finally, I would like to stress
Our next Cyptacus event will be In this March newsletter, I would that the next Grant Period will
held in less than a month in São also like to recap the short-term sci- start on May 1st, 2018. Crypta-
Miguel. entific missions (STSMs) that were cus’ members will then be able
funded by Cryptacus during the cur- to apply again to STSM grants
I would like to remind you that rent Grant Period (May 2017 to April (https://www.cryptacus.eu/en/stsm/how-
the training school program is avail- 2018). to-apply/) and to ITC conference
able online and grants to attend the grants (check https://goo.gl/
event are still available for students. We indeed received many STSM qfNrmL).
applications during the last months,
Ricardo Chaves and his team did much more than usual, and Crypta- The Work & Budget Plan of the
a great job to make this event suc- cus has been able to fund all of next Grant Period has been recently
cessful, and I would already like to them after refilling the STSM bud- approved, and the last Cryptacus’
thank them for the organization. get. We so far funded: Sam Thomas events will be announced in the April
(UK to FR), Milena Djukanovic (ME newsletter.
The Training School web site to IT), Veelasha Moonsamy (NL to
is https://www.cryptacus.eu/en/ ES), Elena Pagnin (SE to FR), David
events/training-school-2018/). GÃl’rault (FR to UK), Hannes Gross In the meanwhile, have fun with
Jointly located with the training (AT to BE), Ioana Boureanu (UK to the March newsletter!
school, Cryptacus organizes a work- FR), Bogdan Dina (DE to FR), Ana Best regards,
shop on distance-bounding protocols. Lucila Sandoval Orozco (ES to UK), Gildas Avoine

Cryptacus Newsletter
m Cryptacus.eu B cryptacus.newsletter@irisa.fr Page 1
Recommended reading: the course of 18 months. The event is organized by the
Predicting mergers via Network of Secure Societies National
aviation traffic Additionally, they illustrate the Contact Points - SEREN3, in collab-
ease with which one could analyze oration with the European Commis-
the behavior and relationships of sion. This information day and bro-
aviation users through the exam- kerage event gives details on the
ple of foreign governments visiting calls for proposals H2020-CIP 2018,
Europe. In an even more interest- H2020-SEC 2018 and H2020-DS-
ing and practical application of their 2018, published on 27 October 2017
findings, they exploit similar travel under the societal challenge Secure
date to predict potential merger and Societies - Protecting freedom and
acquisition (M&A) activities by 36 security of Europe and its citizens.
corporations listed on the US and
European stock markets. His findings These calls offer new research
This month we will be reporting could potentially lead to a very prof- funding opportunities to research
on particularly nice and insightful itable investing strategy, as they iden- institutions, universities, industries,
paper author by a security team at tify seven M&A cases, in all of which SMEs, civil society organizations and
Oxford and Armasuisse, which is a the buyer has used corporate aircraft other security stakeholders.
Swiss federal agency specialised on to visit the target prior to the official
the procurement of armament. announcement, on average 61 days Participation to the event is free
It is titled "The Real First Class? Infer- before. This period of time give am- of charge and the number of partici-
ring Confidential Corporate Mergers ple time to take financial positions to pants is limited due to the capacity of
and Government Relations from Air benefit from the information leakage. the rooms.
Traffic Communication".
Finally, they try to find solutions The main topics to be covered
Authors are Martin Strohmeier, to stop this massive information leak- are Critical Infrastructure Protection,
Matthew Smith, Vincent Lenders and age from occurring, quantifying their Disaster Resilience, Safeguarding and
Ivan Martinovic. This paper contin- popularity and effectiveness, and securing society, Fight Against Crime
ues the research from the Oxford finding them mostly ineffective. and Terrorism, Border Security and
team on aircraft security communica- External Security, General Matters on
tion. For a previous work on a closely This work has recently been ac- Security and Digital Security. There
related topic, you can watch the cepted for the 3rd IEEE European are many reasons to participate, in-
video of Matthew Smith on ACARS Symposium on Security and Privacy, cluding: receiving information about
insecurity titled "Modern jets, retro that is going to take place on April the calls, networking possibilities, to
ciphers: how monoalphabetic sub- 24-26, 2018 in London, United King- get answers to your questions linked
stitution ciphers are still in use" at dom. to call areas and to get details on the
this year’s Real World Crypto, acces- legal and procedural conditions.
sible at https://www.youtube.com/ Funding News
watch?v=hEqcITbBNh4. One of the great benefits of these
Warsaw Brockerage Event events is that you can present project
As stated in their abstract, this ideas briefly (you generally get 2 min
paper exploits publicly available air- for a lightning presentation) to all
craft meta data and unfiltered air participants and explicitly seek col-
traffic communication gathered from laboration from organisations with a
a global collaborative sensor net- given set of skills. There will be also
work to study the privacy impact of face to face meetings that you can
large-scale aircraft tracking on gov- ask for on the web of the event. Ping
ernments and public corporations. me if you plan to attend, as I will be
there.
They track travel data from 542
aircraft used by 113 different gov- The registration is open until 1
ernments to identify events and re- April 2018. The event venue is the
lationships in ’the real world’. They Copernicus Science Centre in War-
develop a spatio-temporal clustering There is an interesting Info Day saw.
method which returns 47 public and and Brokerage Event on the Horizon
18 non-public meetings attended by 2020 Secure Societies call. You can register at https://goo.
dedicated government aircraft over gl/vogvYw

Cryptacus Newsletter
m Cryptacus.eu B cryptacus.newsletter@irisa.fr Page 2
This is an interesting position learning, risk management
in one of the growing cyberse- and threat modelling, trusted
curity teams in the UK systems, verification, and dis-
tributed systems.
It is a full time, permanent po- The deadline for applications is
sition with a starting salary of the 23rd April 2018.
between £37,706 and £47,722 More info available at https:
per annum. The deadline for //goo.gl/fgg22s.
submission of candidatures is
the 18th April.

They are looking for scholars


EIBURS Call for Proposals in the broad area of cyber se-
curity, covering science and en-
The European Investment Bank gineering of cyber security and • A position as (full) profes-
Institute has just launched a new information assurance. Specific sor of Computer Science is
EIBURS sponsorship under its knowl- topics of interest include the se- available as soon as possible
edge programme. curity and privacy of emerging at the Department of Com-
applications of the internet-of- puter Science, Aarhus Univer-
The EIB University Research things and cloud computing, sity (www.cs.au.dk). The de-
Sponsorship Programme (EIBURS) the protection of cyber-physical partment has research groups
provides research grants of up to systems, system and network within ’Algorithms and Data
e100,000 a year for a period of three security, computer forensics, Structures’, ’Data-Intensive Sys-
years, to interested university de- intrusion detection, authenti- tems’, ’Cryptography and Secu-
partments or research centres with cation systems, cyber risk and rity’, ’Mathematical Computer
expertise in that year’s topic. The economics, usability and hu- Science’, ’Logic and Semantics’,
EIBURS topic for this year is "The man aspects of cyber security. ’Ubiquitous Computing and In-
economic effects of a joint European teraction’, ’Computer-Mediated
security and defence policy". More info at https://goo.gl/ Activity’, ’Use, Design and Inno-
tgKdH6 vation’, and ’Programming Lan-
The deadline for submission of guages’. Moreover, they wish
proposals is 15 April 2018. to build competencies within
Machine Learning and Sys-
Further information on this call tems Security. The deadline is
can be found at the European Jour- 03.05.2018. More information
nal, C60 (16.02.18) at https://goo.gl/rnJYSh.

Open Positions • Senior Lecturer or Reader in Se-


cure Systems at the University
of Surrey, Department of Com-
puter Science. Surrey is a good For other interesting positions all
UK university not far from Lon- across Europe, please check the re-
don, which has international cently revamped “Researchers in Mo-
visibility in Cybersecurity and tion” portal at https://euraxess.
is consistently growing and in- ec.europa.eu/. It currently has close
vesting in the area. to 60 open positions in computer se-
This position would be located curity and related areas, including
in Guildford, with a salary of in Poland, the UK, Finland, Slovenia,
Please send us any employment £49,149 to £69,984 per an- Italy, Norway, Switzerland, and even
opportunities you may want to publi- num. This is, of course, a full in Spain!
cize in the newsletter. time permanent position. Suit-
able areas of expertise that
complement current strengths
• Lecturer in Cyber Security at of the group include (but are
the University of Southampton not limited to): antimalware
security, adversarial machine

Cryptacus Newsletter
m Cryptacus.eu B cryptacus.newsletter@irisa.fr Page 3
Proposals for STSMs Purdue University researchers of a number of weaknesses in the de-
By now, you should be already have developed a way to protect vice have shocked its customer base.
familiar with what Short Term Scien- against wipers. Their idea is to anal- All the technical details and a video
tific Missions (or STSMs, for short) yse write buffers before they reach showing the hack can be accessed at
are. Please make your willingness to storage, and decide whether the https://goo.gl/BT6JVa, but to cut
receive STSMs proposals known by intended write is destructive, and a long story short, it seems all Ledger
sending me an email. Until I do not stop it if so. Wipers cause substan- hardware wallets are vulnerable to a
have any more, I’ll just publish mine: tial damage by overwriting critical relatively simple man in the middle
digital assets on compromised ma- attack.
chines, denying users access to com-
puting resources. They interpose an
inspection step in the Virtual Machine
Monitor (VMM) through a technique
known as Virtual Machine Introspec-
tion (VMI). This has the benefit that
it does not rely on the entire OS as a
root of trust. The prototype seems to
be effective (99.8%) against malware
such as Shamoon and Stonedrill, and
• I will be very happy to receive
some other secure delete tools. The
anyone interested in investigat-
authors acknowledge that the perfor-
ing randomness generation and
mance of their tool needs to be in-
testing, particularly on IoT de-
vestigated further, but the approach
vices.
seems quite promising. More info at
https://goo.gl/pnJEDC.
Blogs, posts and other
recommended reads Low-cost hacking of a road
Irresponsible disclosure speed radar :-)

More info at https://goo.gl/


Event calendar
Dvyy7w
SSR 2018, The 4th Conference
’R2D2’ stops disk-wipe malware on Security Standards Research, will
before it executes evil commands take place in Darmstadt Germany,
Ledger security problems on 3-4 December 2018. The pur-
pose of this conference is to discuss
The Ledger Nano is quite possi- the many research problems deriving
bly, the most popular hardware wal- from studies of existing standards,
let in the market. It’s manufactured the development of revisions to exist-
in France and has sold more than ing standards, and the exploration of
1,000,000 copies. Hardware wallets completely new areas of standardisa-
are used by cryptocurrency holders to tion. The deadline for submissions is
keep their coins off the markets, se- 22 June 2018 (3pm UTC). The Gen-
curely stored in an off-line device for eral Chair is Marc Fischlin. More info
extra security. So news of the finding at https://ssr2018.net/.

Cryptacus Newsletter
m Cryptacus.eu B cryptacus.newsletter@irisa.fr Page 4
The 21st Information Security
Conference (ISC 2018), will take
place in London (Guildford), from
September 9 to September 12, 2018.
The submission deadline is 16
April, with notification on the 18
June. The General Chair will be Steve
Schneider.

The 3rd International Workshop


The 23rd European Symposium on Boolean Functions and their Ap-
on Research in Computer Secu- plications (BFA) is organized by the
rity (ESORICS) will be held in Selmer Center of the University of
Barcelona, at the Universitat Politec- Bergen.
nica de Catalunya - BarcelonaTech, The ’IoT Autentication 2018’
on September 3-7 2018. Several co- It will take place at the Alexandra Conference will take place in Mel-
located workshops will be held in Hotel, Loen, in Norway during June bourne, Australia on November 28-
conjunction with the Symposium. 17-22, 2018. 30, 2018. It will feature invited
The submission deadline is April 18, presentations from Auto-ID Labs,
2018 (11:59 p.m. American Samoa The deadline for submission is IoT Alliance Australia, IoT (Inter-
time). General Chair is Miguel Sori- April 1st, 2018 (no kidding) and the net of Things) Security, Prof. Michael
ano. notification will be one week later, on Sheng, Prof. Margreta Kuijper, Dr.
April 7th. Omid Kavahei, Prof. Seng Loke,and
Prof. Lejla Batina. The Keynote
speaker is Dr. Veena Pureswaran
from IBM. If you want to attend,
check http://www.authiot2018.
conferences.academy/.

This workshop occurs imme-


diately after a related one called
WAIFI (International Workshop on
the Arithmetic of Finite Fields 2018)
in Bergen, which is on June 14-16,
with a deadline on April 1st, and
acceptance notification on May 11th,
2018.

More info at http://waifi.org.


The 2nd IMA Conference on The-
oretical and Computational Discrete
Mathematics accepts abstracts of up See you all back in April!
to 500 words to be submitted for ei-
ther oral or poster presentation via Best,
https://my.ima.org.uk by Friday Julio Hernandez-Castro
13 April 2018.

Cryptacus Newsletter
m Cryptacus.eu B cryptacus.newsletter@irisa.fr Page 5

Das könnte Ihnen auch gefallen