We are proud to announce the confirmed speakers (to be completed):
A Next-generation Secure Internet for the 21st Century
Adrian Perrig, ETH Zürich
Abstract: The Internet has been successful beyond even the most optimistic expectations. It permeates and intertwines with almost all aspects of our society and economy. The success of the Internet has created a dependency on communication as many of the processes underpinning the foundations of modern society would grind to a halt should communication become unavailable. However, much to our dismay, the current state of safety and availability of the Internet is far from commensurate given its importance.
Although we cannot conclusively determine what the impact of a 1-day, or 1-week outage of Internet connectivity on our society would be, anecdotal evidence indicates that even short outages have a profound negative impact on society, businesses, and government. Unfortunately, the Internet has not been designed for high availability in the face of malicious actions by adversaries. Recent patches to improve Internet security and availability have been constrained by the current Internet architecture, business models, and legal aspects. Moreover, there are fundamental design decisions of the current Internet that inherently complicate secure operation.
Given the diverse nature of constituents in today’s Internet, another important challenge is how to scale authentication of entities (e.g., AS ownership for routing, name servers for DNS, or domains for TLS) to a global environment. Currently prevalent PKI models (monopoly and oligarchy) do not scale globally because mutually distrusting entities cannot agree on a single trust root, and because everyday users cannot evaluate the trustworthiness of each of the many root CAs in their browsers.
To address these issues, we propose SCION, a next-generation Internet architecture that is secure, available, and offers privacy by design; that provides incentives for a transition to the new architecture; and that considers economic and policy issues at the design stage. We have implemented SCION and deployed it in the production networks of several ISPs.
Adrian Perrig is a Professor at the Department of Computer Science at ETH Zürich, Switzerland, where he leads the network security group. He is also a Distinguished Fellow at CyLab, and an Adjunct Professor of Electrical and Computer Engineering, and Engineering and Public Policy at Carnegie Mellon University. From 2002 to 2012, he was a Professor of Electrical and Computer Engineering, Engineering and Public Policy, and Computer Science (courtesy) at Carnegie Mellon University, becoming Full Professor in 2009. From 2007 to 2012, he served as the technical director for Carnegie Mellon’s Cybersecurity Laboratory (CyLab). He earned his MS and PhD degrees in Computer Science from Carnegie Mellon University, and spent three years during his PhD at the University of California at Berkeley. He received his BSc degree in Computer Engineering from EPFL. Adrian’s research revolves around building secure systems — in particular his group is working on the SCION secure Internet architecture.
He is a recipient of the NSF CAREER award in 2004, IBM faculty fellowships in 2004 and 2005, the Sloan research fellowship in 2006, the Security 7 award in the category of education by the Information Security Magazine in 2009, the Benjamin Richard Teare teaching award in 2011, the ACM SIGSAC Outstanding Innovation Award in 2013. He is an IEEE senior member and became an ACM Fellow in 2017.
Dr. Joan Daemen
Radboud University, Security Architect at ST Microelectronics
Joan Daemen is professor at Radboud University as well as cryptographer and security architect at ST Microelectronics, and in his work as a symmetric cryptography expert he has designed a variety of block ciphers over the past 25 years.
Dr. Daemen is probably best known for his work on the Rijndael cipher, which was selected as the Advanced Encryption Standard (AES) in 2001. He also co-invented Sponge functions and specifically the Keccak hash, which in 2012 has been chosen to become the new SHA-3 hash function. Joan Daemen’s work is thus at the core of much of the cryptography and network security protocols in use today, and in 2017 he was recognized for his contribution with the Levchin Prize for Real World Cryptography.
Steganography in the World of IoT
Workshop IoT-SECFOR 2018, Wednesday, August 29 2018, 11.00 – 12.30
Abstract: Steganography, as a subfield of information hiding, is an art of hiding a message in a legitimate carrier, so that no one suspects it exists. When the carrier is some transmission in communication networks, we speak about network steganography. And when we have a communication channel that can be exploited by a process to transfer information in a manner that violates the system’s security policy, we speak about the covert channel. In this talk, a recent trends and achievements of network steganography and covert channels in the world of Internet of Things and Cyber Physical Systems will be presented.
Aleksandra Mileva is an associate professor and a vice dean at the Faculty of Computer Science, University “Goce Delčev” in Štip, Republic of Macedonia and Head of the Laboratory of computer security and digital forensics. She received her PhD degree in Computer Science from the Faculty of Natural Sciences and Mathematics Skopje, “Ss. Cyril and Methodius” University in Skopje in 2010. Her research interests include: cryptography, network steganography, computer and network security, IoT protocols and security, and digital forensics. She is a member of the Criminal Use of Information Hiding (CUing) initiative.
Where we are in 5G Security – from early requirements until today
Peter Schneider, Nokia Bell Labs, Germany
Workshop 5G-NS 2018, Monday, August 27 2018, 11.45 – 12.45
Abstract: 5G mobile networks will have to support a variety of services, including control of critical infrastructures, Industry 4.0 factory communication or vehicular communication. There is no doubt that supreme, built-in security is required for maintaining the availability and integrity of the communication network and ensure the dependability that is essential for such mission critical services. Accordingly, demanding security requirements have been raised in early stages of the conceptual work. Since then, various research projects investigated 5G security aspects, and standardization is well on the way, with the first release of the 3GPP 5G System mostly frozen in June 2018. This talk will briefly revisit 5G security requirements, give an overview of what has been achieved until now, and point out some areas for future 5G security research.
Biography: After receiving his diploma in mathematics, Peter started his professional career at Siemens, as a researcher on new software architectures. For several years, he worked on the research and prototyping of innovative communication solutions. Later, he became a system engineer for the IP based mobile core network, working on various aspects of the IP technology, in particular on IP security, deep packet inspection and IP network reliability. Since 2007, he is focusing on network security research. Currently, he is a senior expert for mobile network security in the Security Research Team at Nokia Bell Labs. In this position, he has been involved in various security research projects including publicly funded international projects. He has published his research results at various conferences and has given many invited talks and tutorials on network security topics. His research interests include all aspects of mobile network security, in particular security for programmable, cloud-based networks and the overall security architecture of future 5G networks.
Europol EC3 – Europol’s European Cybercrime Centre – a networked approach
Philipp Amann, Europol European Cyber Crime Centre (EC3)
Workshop CUING 2018, Tuesday, August 28 2018, 09.00 – 10.30
Abstract: There is a service-based underground industry that fuels cybercrime, turning it into a growth business in terms of scope and volume of attacks, number of victims and economic damage. This calls for a networked, intelligence-led, adaptive and pro-active response that includes law enforcement. Prioritised and coordinated joint actions against the key cyber threats supported by adequate legislation can change the rules of the game by increasing the risks for cybercriminals and imposing real consequences. Effective prevention and disruption activities can further tip the scales to the detriment of criminals. The multi-stakeholder model and networked approach used by Europol’s European Cybercrime Centre is a successful example of how this can be put in practice by leveraging the power of the network.
Philipp Amann is the Head of Strategy of the European Cybercrime Centre (EC3). EC3 Strategy is responsible for the delivery of strategic, situational and tactical cyber-related products such as the Internet Organised Crime Threat Assessment (IOCTA). Other key areas of responsibility include prevention and awareness, outreach, stakeholder management, training management and internet governance.
Prior to joining the EC3, he held management positions with the Organization for Security and Co-operation in Europe, the Organisation for the Prohibition of Chemical Weapons and the International Criminal Court. Philipp has more than 17 years of relevant working experience and hands-on skills in information and cyber security management, policy development, combatting cybercrime, electronic evidence management and the analysis and management of intelligence. He has worked in various fields, including the financial sector, global disarmament and arms control, CBRNe, law enforcement and international law. He is also a member of ENISA’s Permanent Stakeholder Group and the program advisory board of the Cyber Akademie. Philipp’s professional experience is complemented by a PhD degree and a Master’s degree in business informatics from the University of Vienna. He also holds an MSc in Forensic Computing and Cybercrime Investigation from the University College Dublin.
Reality of malware author attribution
Natalia Stakhanova, University of New Brunswick, Canada
Workshop IWCC 2018, Wednesday, August 29 2018, 11.00 – 12.30
Abstract: Since the first computer virus hit the DARPA network in the early 1970s, the security community interest revolved around ways to expose identities of malware writers. Knowledge of the adversary’s identity promised additional leverage to security experts in their ongoing battle against perpetrators. At the dawn of computing era, when malware writers and malicious software were characterized by the lack of experience and relative simplicity, the task of uncovering the identities of virus writers was more or less straightforward. Manual analysis of source code often revealed personal, identifiable information embedded by authors themselves. But these times have long gone. Modern days’ malware writers extensively use numerous malware code generators to mass produce new malware variants and employ advanced obfuscation techniques to hide their identities. As a result the work of security experts trying to uncover the identities of malware writers became significantly more challenging and time consuming. With introduction of more and more advanced obfuscation techniques and malware writing kits, we face the challenging questions: Is it even feasible to reveal adversary’s identity? In this talk, we will explore this question in the context of authorship attribution research. Well-established in social science, authorship attribution offers a broad spectrum of techniques that allow author’s characterization based on the analysis of the textual features of documents and an author’s writing style. Drawing analogy between literature and software domain, in this talk we investigate our ability to attribute malware code.
Natalia Stakhanova is the New Brunswick Innovation Research Chair in Cyber Security at the University of New Brunswick, Canada. Her work revolves around building secure systems and includes mobile security, IoT security, software obfuscation & reverse engineering, and malicious software. Working closely with industry on a variety of R&D projects, she developed a number of technologies that resulted in 3 patents in the field of computer security. Natalia Stakhanova is the recipient of the UNB Merit Award, the McCain Young Scholar Award and the Anita Borg Institute Faculty Award. She is a strong advocate of Women in IT and co-founder of CyberLaunch Academy, an initiative that aims to promote science and technology among children.
Machine learning and AI for the sciences – towards understandingProf. Dr. Klaus-Robert MÜLLER
Machine Learning Group TU Berlin, MPI for Informatics, Saarbrücken, and Korea University, Seoul
Tuesday, August 28 2018, 11.00 – 12.30
Abstract: In recent years, machine learning (ML) and artificial intelligence (AI) methods have begun to play a more and more enabling role in the sciences and in industry. In particular, the advent of large and/or complex data corpora has given rise to new technological challenges and possibilities. In his talk, Müller will touch upon the topic of ML applications in the sciences, in particular in neuroscience, medicine and physics. He will also discuss possibilities for extracting information from machine learning models to further our understanding by explaining nonlinear ML models. E.g. Machine Learning Models for Quantum Chemistry can, by applying interpretable ML, contribute to furthering chemical understanding. Finally, Müller will briefly outline perspectives and limitations.
Klaus-Robert Müller studied physics (Master-1989) and computer science (PhD-1992) in Karlsruhe, did a Postdoc at GMD FIRST (1992-1994) and at the University of Tokyo (1994/95), then founded the Intelligent Data Analysis group at GMD FIRST (1995) and became Professor at the University of Potsdam (1999). Since 2006 he is Machine Learning Professor at TU Berlin; directing the Bernstein Center for Neurotechnology Berlin (-2014) and from 2014 co-directing the Berlin Big Data Center. He was awarded the Olympus Prize for Pattern Recognition (1999), the SEL Alcatel Communication Award (2006), the Science Prize of Berlin by the Governing Mayor of Berlin (2014), the Vodafone Innovations Award (2017). In 2012, he was elected member of the German National Academy of Sciences-Leopoldina, in 2017 of the Berlin Brandenburg Academy of Sciences and also in 2017 external scientific member of the Max Planck Society. His research interests are intelligent data analysis and Machine Learning in the sciences (Neuroscience, Physics, Chemistry).
More information can be found here.
Dr. Joan Daemen: https://alchetron.com/Joan-Daemen