SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
Secure and Distributed
Software
Wouter Joosen, IBBT-DistriNet
Context

Rapid growth of the Internet:

“not just network applications but
distributed software with
new and complex applications
crossing the boundaries
of organisations…”

Hence a boom of
security challenges.....
(focus of this talk)
Secu
Mission             Middl rity
                         eware


              Privacy       Crypt
                                 ograp
                                      hy


                  Watermarking
                                  DRM
             Secure
                      g
          Programmin      Biometric




                                                nt
                    es




                                       Developme
           Languag
                                                     “To be a one stop


                                       Secure
                             Risk
                          Management

                                                      shop for security
                                                          research”
Expertise (1/2)
Secure programming languages (Piessens, Joosen)
Security middleware and component frameworks (Piessens, Desmet, Joosen)
Secure development process (Scandariato, Joosen)
Security monitoring and management (Huygens, Joosen)
Security for computer networks and pervasive systems
(Verbaeten, Huygens, Preneel, Verbauwhede)

Security for ad-hoc and wireless networks (Preneel, Verbauwhede)
Privacy enhancing technologies, identity management (De Decker, Preneel)
Cryptographic software and software obfuscation (Piessens, Preneel)
Cryptographic hardware and embedded systems (Verbauwhede, Preneel, Rijmen)
Document security, watermarking and perceptual hashing (Preneel)
Trusted computing (Verbauwhede, Preneel)
Expertise (2/2)
Cryptographic algorithms and protocols, foundations of cryptography and
provable security (Rijmen, Preneel)
Risk management (Huygens)
Authorisation technologies (Piessens, Joosen, Desmet)
Secure System Software (Piessens, Joosen)
HW implementation of DRM, watermarking and perceptual hashing
(Verbauwhede, Preneel)

Side-channel attacks and countermeasures (Verbauwhede, Rijmen, Preneel)
Embedded biometry (Verbauwhede, Tuyls)
Security for RFID’s, smart-cards, sensor nodes (Verbauwhede, Batina, Preneel)
Evaluation of system security, including requirements, security
architectures, software, hardware, cryptographic libraries and smart cards
(All)
Relevance

                   Tradition in Flanders: security
                     companies have flourished

 Resulting in a competitive education
 in a European context


            Thus a continuous “stream” of human
              capital can enter the labour market

In addition, society urgently
needs solutions – e.g. privacy
Evolution and Trends
Systems and applications of growing scale, heterogeneity and
pervasiveness ... “Towards the Internet of Things”
Loosely-coupled ecosystems of services, multi-tenant
systems, outsourced deployment, Software as a Service
(SaaS).
High frequency of change – dynamic adaptations are required.
Support for long term evolution


     “All these trends impose challenges for the development and
                  deployment of software and systems,
   the challenge of securing these co-evolves with these trends....”
From the FP7 Work Programme:
”Technology and Tools for Trustworthy ICT”

In highly distributed networked process control systems and in
networks of very high number of things. Understanding threat patterns
for pro-active protection.

For user-centric and privacy preserving identity management,
including for management of risks and policy compliance verification.

For management and assurance of security, integrity and availability,
also at very long term, of data and knowledge in business processes
and services.

For assurance and assessment of the trustworthiness of complex and
continuously evolving software systems and services.

In enabling technologies for trustworthy ICT. This includes
cryptography, biometrics; trustworthy communication; virtualisation;
and certification methodologies.
Security Team: 9 professors, 80 researchers



Prof. Bart Preneel         Prof. Dave Clarke
Prof. Vincent Rijmen       Prof. Bart De Decker
Prof. Ingrid Verbauwhede   Prof. Christophe Huygens
 7 postdocs                Prof. Wouter Joosen
 40+ doctoral students     Prof. Frank Piessens
                             5 postdocs
                             30+ doctoral students




                                                      9
Illustration

AES                            PeCMan
[Open Competition1997-2001]    [IBBT] 2007-2009

            S3MS
            [FP6+] 2006-2009   Secure Change
                               [FP7] 2009-2012


            Turbine
            [FP7] 2008-2011    HATS
                               [FP7] 2009-2013
           TAS3
           [FP7] 2008-2011
Cryptographic algorithms: Rijndael/AES


                         S S S S S S S S S S S S S S S S
               round


               round    MixColumns MixColumns MixColumns MixColumns
                        S S S S S S S S S S S S S S S S
Key Schedule




               round     key length: 16/24/32 bytes
                         block length:
                .
                .
                .           Rijndael: 16/24/32 bytes
                .
                .           AES: 16 bytes
               round

                        From 2009 onwards all Intel
                           processors will have a
                       hardware AES implementation
S3MS:
Security of Software and Services for Mobile Systems


FP6 STREP and beyond
Objective:
   creation of framework and technological solutions for
   secure deployment and execution of mobile
   applications
Outcomes:
   Definition of the Security by Contract (SxC) paradigm
   Java ME and .NET CF realizations of all the necessary
   supporting technologies for SxC
S3MS:
Security by contract in a nutshell
Turbine:
Innovative Digital Identity Solutions
TURBINE aims to develop
innovative digital identity
solutions, combining:
    secure, automatic user                       Name: SMITH
    identification thanks to                     Date of birth: .....

    electronic fingerprint                       Identity managed by issuance
                                                 State, including biometrics,
    authentication                               certificates & data protection
                                                 mechanism

    reliable protection of the
    biometrics data through
    advanced cryptography
    technology.                       Mr SMITH   +                                 ID1 + I0I 0II I0I 0II II0 00II 0I
                                                                                   ID2 + I0I I0I II0 I0I II0 I0I0 I0
                                                                                   ID3 + II0 0II 0II I0I I0I 0II0 I0
                                                                                   .....
Research efforts focus on
transformation of a description
of fingerprints, so that the result
can only be re-generated by
the person with the fingerprints.

                                                             Identities are not invertible
PecMan:
Introducing Security Service Bus




          Application       Application        Application
           Binding           Binding            Binding

                 Authorization & Attribute Requests



                        Security Service Bus                 Manager Service


             Authorization &
            Attribute Requests



                             Authorization
                                Service
                               (XACML)
PecMan:
An Open Deployment Architecture




                                             AZN Server
                                                 PDP 1




                                                     Metadata   Metadata           3P PIP   3P PEP
                                 3P PIP              PIP        PEP

     PeCMan       PeCMan                                 Metadata             3rd Party
                                 3rd Party
      Client       Server                                 Service              Service
                                  Service
Client
                                           MP1 PEP


     PeCMan        Middleware platform 1                 Middleware platform 2
      Client                                                               PDP 2

Client         PeCMan Server 1                       PeCMan Server 2
TAS3

TAS3 focuses on federated identity management

 TAS3 consolidates scattered research inSecurity, Trust,
 Privacy, Digital identities, Authorization, Authentication…

 TAS3 integrates adaptive business-driven end2end Trust
 Services based on personal information:Semantic integration
 of Security, Trust, Privacy components

 TAS3 provides dynamic view on application-level end2end
 exchange of personal data:Distributed data repositories
TAS3

                    Employability    Employability
Companies                              Portfolio
                     Repository

                                                       Schools
     Private
   Employment
    Services                Trusted
                          Employability
                            Platform                    Universities
 Training
Institutes
                                                         Public
        Employability                                  Employment
                                     Social             Services
          Service                   Network
         Providers
                                                      Social
                   Certification                     Security
                    Services                         Services
HATS:
Advanced software validation tools


 Advanced software validation tools need rigorous
 and unambiguous models

 Abstract Behavioural Specification Language
    Adaptability concerns drive its design
    Formalises successful SWPF development method
    Behavioural model: concurrency, composability,
    modularity, deployment
    Abstract away from programming languages, system
    architecture
HATS:
   Scaling Formal Methods to Adaptable Systems


                   Software Family
                                             models

                       describes                               ABS Modeling
                       variability                              Language
                                             Parameter
                                               space
                 Domain Feature model

                    System derivation
    spatial          & customization
   variability




                                                      models   Existing Formal Methods
                            System Product                     SPEC#, JML, UML, OCL, State
                                                                       Diagrams, ...
temporal
evolution
Secure Change:
Lifelong Development Cycle
4 Research Programs for ICT Security

Embedded Security

Privacy and Identity Management

Secure Software:
support at the implementation level


Security Engineering:
support throughout the software/hardware engineering
process
Obvious collaborations


Enabling technologies

Application domains

Industrial collaboration
   Europe
   Flanders
2019 WILL BRING...
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET-  	  Comparative Study on Video Steganography in Spatial and IWT DomainIRJET-  	  Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT DomainIRJET Journal
 
Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...IOSR Journals
 
Image Encoding to Short Text Message
Image Encoding to Short Text MessageImage Encoding to Short Text Message
Image Encoding to Short Text Messageijtsrd
 
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...IRJET Journal
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingCSCJournals
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
 
Secure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptographySecure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptographyMaizatul Auni Bt Mazhar
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...ijsrd.com
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
 

Was ist angesagt? (20)

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET-  	  Comparative Study on Video Steganography in Spatial and IWT DomainIRJET-  	  Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
 
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
 
Nz2422822287
Nz2422822287Nz2422822287
Nz2422822287
 
Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...
 
Image Encoding to Short Text Message
Image Encoding to Short Text MessageImage Encoding to Short Text Message
Image Encoding to Short Text Message
 
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 
280 284
280 284280 284
280 284
 
CNS Solution
CNS SolutionCNS Solution
CNS Solution
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio Watermarking
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
 
Secure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptographySecure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptography
 
Websense DLP 產品-DSS 型錄
Websense DLP 產品-DSS 型錄Websense DLP 產品-DSS 型錄
Websense DLP 產品-DSS 型錄
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...
 
S4501105108
S4501105108S4501105108
S4501105108
 
CryptoQR System based on RSA
CryptoQR System based on RSACryptoQR System based on RSA
CryptoQR System based on RSA
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
 

Andere mochten auch

2 deus leaflet wp2
2 deus leaflet wp22 deus leaflet wp2
2 deus leaflet wp2imec.archive
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystemsimec.archive
 
Xerrada Tarragona Espurna
Xerrada Tarragona EspurnaXerrada Tarragona Espurna
Xerrada Tarragona Espurnaguest87d137b
 
бизнес рекомендаций
бизнес рекомендацийбизнес рекомендаций
бизнес рекомендацийTVIRICH
 
Brokerage2006 ict ter ondersteuning van de thuiszorg da vinci of big brother
Brokerage2006 ict ter ondersteuning van de thuiszorg  da vinci of big brotherBrokerage2006 ict ter ondersteuning van de thuiszorg  da vinci of big brother
Brokerage2006 ict ter ondersteuning van de thuiszorg da vinci of big brotherimec.archive
 
tviexpress
tviexpresstviexpress
tviexpressTVIRICH
 
Evaluation: Music Magazine
Evaluation: Music MagazineEvaluation: Music Magazine
Evaluation: Music Magazinelyricalbeatt
 
Exposición
 Exposición Exposición
Exposiciónluisk4
 
Ecrea3h Shameen Mahmud Paper
Ecrea3h Shameen Mahmud PaperEcrea3h Shameen Mahmud Paper
Ecrea3h Shameen Mahmud Paperimec.archive
 
VACF6-Eddy Naert en Karen Vander Plaetse van Vooruit stelden de nieuwe www.vo...
VACF6-Eddy Naert en Karen Vander Plaetse van Vooruit stelden de nieuwe www.vo...VACF6-Eddy Naert en Karen Vander Plaetse van Vooruit stelden de nieuwe www.vo...
VACF6-Eddy Naert en Karen Vander Plaetse van Vooruit stelden de nieuwe www.vo...imec.archive
 
Brokerage2006 home networks gebruikersgerichte netwerken-conclusion
Brokerage2006 home networks gebruikersgerichte netwerken-conclusionBrokerage2006 home networks gebruikersgerichte netwerken-conclusion
Brokerage2006 home networks gebruikersgerichte netwerken-conclusionimec.archive
 
The Library's "Place"
The Library's "Place"The Library's "Place"
The Library's "Place"LHPeaden
 
Brokerage 2007presentation user
Brokerage 2007presentation userBrokerage 2007presentation user
Brokerage 2007presentation userimec.archive
 
Arnhem Cultuurdebat 2 - Erik Vos - Het Lab
Arnhem Cultuurdebat 2 - Erik Vos - Het LabArnhem Cultuurdebat 2 - Erik Vos - Het Lab
Arnhem Cultuurdebat 2 - Erik Vos - Het Labhetlab
 
Ecrea2b Mbala Pascal Ppt
Ecrea2b Mbala Pascal PptEcrea2b Mbala Pascal Ppt
Ecrea2b Mbala Pascal Pptimec.archive
 
Wba1 Ibbt General Presentation
Wba1  Ibbt General PresentationWba1  Ibbt General Presentation
Wba1 Ibbt General Presentationimec.archive
 
Tr@Ins7 Heterogeneous Access Daan Pareit
Tr@Ins7 Heterogeneous Access   Daan PareitTr@Ins7 Heterogeneous Access   Daan Pareit
Tr@Ins7 Heterogeneous Access Daan Pareitimec.archive
 
Break out: Collaboration tools - Peter Mechant
Break out: Collaboration tools - Peter MechantBreak out: Collaboration tools - Peter Mechant
Break out: Collaboration tools - Peter Mechantimec.archive
 

Andere mochten auch (20)

2 deus leaflet wp2
2 deus leaflet wp22 deus leaflet wp2
2 deus leaflet wp2
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
 
Xerrada Tarragona Espurna
Xerrada Tarragona EspurnaXerrada Tarragona Espurna
Xerrada Tarragona Espurna
 
бизнес рекомендаций
бизнес рекомендацийбизнес рекомендаций
бизнес рекомендаций
 
Brokerage2006 ict ter ondersteuning van de thuiszorg da vinci of big brother
Brokerage2006 ict ter ondersteuning van de thuiszorg  da vinci of big brotherBrokerage2006 ict ter ondersteuning van de thuiszorg  da vinci of big brother
Brokerage2006 ict ter ondersteuning van de thuiszorg da vinci of big brother
 
tviexpress
tviexpresstviexpress
tviexpress
 
e-Health 2015
e-Health 2015e-Health 2015
e-Health 2015
 
Evaluation: Music Magazine
Evaluation: Music MagazineEvaluation: Music Magazine
Evaluation: Music Magazine
 
Japanese paper
Japanese paperJapanese paper
Japanese paper
 
Exposición
 Exposición Exposición
Exposición
 
Ecrea3h Shameen Mahmud Paper
Ecrea3h Shameen Mahmud PaperEcrea3h Shameen Mahmud Paper
Ecrea3h Shameen Mahmud Paper
 
VACF6-Eddy Naert en Karen Vander Plaetse van Vooruit stelden de nieuwe www.vo...
VACF6-Eddy Naert en Karen Vander Plaetse van Vooruit stelden de nieuwe www.vo...VACF6-Eddy Naert en Karen Vander Plaetse van Vooruit stelden de nieuwe www.vo...
VACF6-Eddy Naert en Karen Vander Plaetse van Vooruit stelden de nieuwe www.vo...
 
Brokerage2006 home networks gebruikersgerichte netwerken-conclusion
Brokerage2006 home networks gebruikersgerichte netwerken-conclusionBrokerage2006 home networks gebruikersgerichte netwerken-conclusion
Brokerage2006 home networks gebruikersgerichte netwerken-conclusion
 
The Library's "Place"
The Library's "Place"The Library's "Place"
The Library's "Place"
 
Brokerage 2007presentation user
Brokerage 2007presentation userBrokerage 2007presentation user
Brokerage 2007presentation user
 
Arnhem Cultuurdebat 2 - Erik Vos - Het Lab
Arnhem Cultuurdebat 2 - Erik Vos - Het LabArnhem Cultuurdebat 2 - Erik Vos - Het Lab
Arnhem Cultuurdebat 2 - Erik Vos - Het Lab
 
Ecrea2b Mbala Pascal Ppt
Ecrea2b Mbala Pascal PptEcrea2b Mbala Pascal Ppt
Ecrea2b Mbala Pascal Ppt
 
Wba1 Ibbt General Presentation
Wba1  Ibbt General PresentationWba1  Ibbt General Presentation
Wba1 Ibbt General Presentation
 
Tr@Ins7 Heterogeneous Access Daan Pareit
Tr@Ins7 Heterogeneous Access   Daan PareitTr@Ins7 Heterogeneous Access   Daan Pareit
Tr@Ins7 Heterogeneous Access Daan Pareit
 
Break out: Collaboration tools - Peter Mechant
Break out: Collaboration tools - Peter MechantBreak out: Collaboration tools - Peter Mechant
Break out: Collaboration tools - Peter Mechant
 

Ähnlich wie I Minds2009 Secure And Distributed Software Prof Wouter Joosen (Ibbt Distrinet Ku Leuven)

Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1CloudExpoEurope
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013 Mark Skilton
 
Encrypting an audio file based on integer wavelet transform and hand geometry
Encrypting an audio file based on integer wavelet transform and hand geometryEncrypting an audio file based on integer wavelet transform and hand geometry
Encrypting an audio file based on integer wavelet transform and hand geometryTELKOMNIKA JOURNAL
 
Protecting Your Data in the Cloud - CSO - Conference 2011
Protecting Your Data in the Cloud - CSO - Conference 2011 Protecting Your Data in the Cloud - CSO - Conference 2011
Protecting Your Data in the Cloud - CSO - Conference 2011 Ulf Mattsson
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfssuser57b3e5
 
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...IRJET Journal
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-JM code group
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilAndris Soroka
 
New enterprise application and data security challenges and solutions apr 2...
New enterprise application and data security challenges and solutions   apr 2...New enterprise application and data security challenges and solutions   apr 2...
New enterprise application and data security challenges and solutions apr 2...Ulf Mattsson
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...IRJET Journal
 
Ch12(revised 20071226)
Ch12(revised 20071226)Ch12(revised 20071226)
Ch12(revised 20071226)華穗 徐
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCase IQ
 
What i learned at gartner summit 2019
What i learned at gartner summit 2019What i learned at gartner summit 2019
What i learned at gartner summit 2019Ulf Mattsson
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET Journal
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.pptAliSalman110
 

Ähnlich wie I Minds2009 Secure And Distributed Software Prof Wouter Joosen (Ibbt Distrinet Ku Leuven) (20)

Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1
 
CEH
CEHCEH
CEH
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013
 
Encrypting an audio file based on integer wavelet transform and hand geometry
Encrypting an audio file based on integer wavelet transform and hand geometryEncrypting an audio file based on integer wavelet transform and hand geometry
Encrypting an audio file based on integer wavelet transform and hand geometry
 
Protecting Your Data in the Cloud - CSO - Conference 2011
Protecting Your Data in the Cloud - CSO - Conference 2011 Protecting Your Data in the Cloud - CSO - Conference 2011
Protecting Your Data in the Cloud - CSO - Conference 2011
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
 
V9I1202028.pdf
V9I1202028.pdfV9I1202028.pdf
V9I1202028.pdf
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
E2matrix
E2matrixE2matrix
E2matrix
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_April
 
New enterprise application and data security challenges and solutions apr 2...
New enterprise application and data security challenges and solutions   apr 2...New enterprise application and data security challenges and solutions   apr 2...
New enterprise application and data security challenges and solutions apr 2...
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
 
Ch12(revised 20071226)
Ch12(revised 20071226)Ch12(revised 20071226)
Ch12(revised 20071226)
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
What i learned at gartner summit 2019
What i learned at gartner summit 2019What i learned at gartner summit 2019
What i learned at gartner summit 2019
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 

Mehr von imec.archive

iMinds-iLab.o, Open Innovation in ICT
iMinds-iLab.o, Open Innovation in ICTiMinds-iLab.o, Open Innovation in ICT
iMinds-iLab.o, Open Innovation in ICTimec.archive
 
Accio presentation closing event
Accio presentation closing eventAccio presentation closing event
Accio presentation closing eventimec.archive
 
PRoF+ Patient Room of the Future
PRoF+ Patient Room of the FuturePRoF+ Patient Room of the Future
PRoF+ Patient Room of the Futureimec.archive
 
Results of the Apollon pilot in homecare and independent living
Results of the Apollon pilot in homecare and independent livingResults of the Apollon pilot in homecare and independent living
Results of the Apollon pilot in homecare and independent livingimec.archive
 
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...imec.archive
 
NMMU-Emmanuel Haven Living Lab
NMMU-Emmanuel Haven Living LabNMMU-Emmanuel Haven Living Lab
NMMU-Emmanuel Haven Living Labimec.archive
 
The Humanicité workshops
The Humanicité workshopsThe Humanicité workshops
The Humanicité workshopsimec.archive
 
A Real-World Experimentation Platform
A Real-World Experimentation PlatformA Real-World Experimentation Platform
A Real-World Experimentation Platformimec.archive
 
ENoLL @ AAL Forum 2012
ENoLL @ AAL Forum 2012ENoLL @ AAL Forum 2012
ENoLL @ AAL Forum 2012imec.archive
 
ENoLL 6th Wave Results Ceremony (Jesse Marsh)
ENoLL 6th Wave Results Ceremony (Jesse Marsh)ENoLL 6th Wave Results Ceremony (Jesse Marsh)
ENoLL 6th Wave Results Ceremony (Jesse Marsh)imec.archive
 
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...imec.archive
 
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value  Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value imec.archive
 
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersApollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersimec.archive
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internetimec.archive
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internetimec.archive
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internetimec.archive
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internetimec.archive
 
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersApollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersimec.archive
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystemsimec.archive
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystemsimec.archive
 

Mehr von imec.archive (20)

iMinds-iLab.o, Open Innovation in ICT
iMinds-iLab.o, Open Innovation in ICTiMinds-iLab.o, Open Innovation in ICT
iMinds-iLab.o, Open Innovation in ICT
 
Accio presentation closing event
Accio presentation closing eventAccio presentation closing event
Accio presentation closing event
 
PRoF+ Patient Room of the Future
PRoF+ Patient Room of the FuturePRoF+ Patient Room of the Future
PRoF+ Patient Room of the Future
 
Results of the Apollon pilot in homecare and independent living
Results of the Apollon pilot in homecare and independent livingResults of the Apollon pilot in homecare and independent living
Results of the Apollon pilot in homecare and independent living
 
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
 
NMMU-Emmanuel Haven Living Lab
NMMU-Emmanuel Haven Living LabNMMU-Emmanuel Haven Living Lab
NMMU-Emmanuel Haven Living Lab
 
The Humanicité workshops
The Humanicité workshopsThe Humanicité workshops
The Humanicité workshops
 
A Real-World Experimentation Platform
A Real-World Experimentation PlatformA Real-World Experimentation Platform
A Real-World Experimentation Platform
 
ENoLL @ AAL Forum 2012
ENoLL @ AAL Forum 2012ENoLL @ AAL Forum 2012
ENoLL @ AAL Forum 2012
 
ENoLL 6th Wave Results Ceremony (Jesse Marsh)
ENoLL 6th Wave Results Ceremony (Jesse Marsh)ENoLL 6th Wave Results Ceremony (Jesse Marsh)
ENoLL 6th Wave Results Ceremony (Jesse Marsh)
 
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
 
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value  Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
 
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersApollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
 
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersApollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
 

I Minds2009 Secure And Distributed Software Prof Wouter Joosen (Ibbt Distrinet Ku Leuven)

  • 1. Secure and Distributed Software Wouter Joosen, IBBT-DistriNet
  • 2. Context Rapid growth of the Internet: “not just network applications but distributed software with new and complex applications crossing the boundaries of organisations…” Hence a boom of security challenges..... (focus of this talk)
  • 3. Secu Mission Middl rity eware Privacy Crypt ograp hy Watermarking DRM Secure g Programmin Biometric nt es Developme Languag “To be a one stop Secure Risk Management shop for security research”
  • 4. Expertise (1/2) Secure programming languages (Piessens, Joosen) Security middleware and component frameworks (Piessens, Desmet, Joosen) Secure development process (Scandariato, Joosen) Security monitoring and management (Huygens, Joosen) Security for computer networks and pervasive systems (Verbaeten, Huygens, Preneel, Verbauwhede) Security for ad-hoc and wireless networks (Preneel, Verbauwhede) Privacy enhancing technologies, identity management (De Decker, Preneel) Cryptographic software and software obfuscation (Piessens, Preneel) Cryptographic hardware and embedded systems (Verbauwhede, Preneel, Rijmen) Document security, watermarking and perceptual hashing (Preneel) Trusted computing (Verbauwhede, Preneel)
  • 5. Expertise (2/2) Cryptographic algorithms and protocols, foundations of cryptography and provable security (Rijmen, Preneel) Risk management (Huygens) Authorisation technologies (Piessens, Joosen, Desmet) Secure System Software (Piessens, Joosen) HW implementation of DRM, watermarking and perceptual hashing (Verbauwhede, Preneel) Side-channel attacks and countermeasures (Verbauwhede, Rijmen, Preneel) Embedded biometry (Verbauwhede, Tuyls) Security for RFID’s, smart-cards, sensor nodes (Verbauwhede, Batina, Preneel) Evaluation of system security, including requirements, security architectures, software, hardware, cryptographic libraries and smart cards (All)
  • 6. Relevance Tradition in Flanders: security companies have flourished Resulting in a competitive education in a European context Thus a continuous “stream” of human capital can enter the labour market In addition, society urgently needs solutions – e.g. privacy
  • 7. Evolution and Trends Systems and applications of growing scale, heterogeneity and pervasiveness ... “Towards the Internet of Things” Loosely-coupled ecosystems of services, multi-tenant systems, outsourced deployment, Software as a Service (SaaS). High frequency of change – dynamic adaptations are required. Support for long term evolution “All these trends impose challenges for the development and deployment of software and systems, the challenge of securing these co-evolves with these trends....”
  • 8. From the FP7 Work Programme: ”Technology and Tools for Trustworthy ICT” In highly distributed networked process control systems and in networks of very high number of things. Understanding threat patterns for pro-active protection. For user-centric and privacy preserving identity management, including for management of risks and policy compliance verification. For management and assurance of security, integrity and availability, also at very long term, of data and knowledge in business processes and services. For assurance and assessment of the trustworthiness of complex and continuously evolving software systems and services. In enabling technologies for trustworthy ICT. This includes cryptography, biometrics; trustworthy communication; virtualisation; and certification methodologies.
  • 9. Security Team: 9 professors, 80 researchers Prof. Bart Preneel Prof. Dave Clarke Prof. Vincent Rijmen Prof. Bart De Decker Prof. Ingrid Verbauwhede Prof. Christophe Huygens 7 postdocs Prof. Wouter Joosen 40+ doctoral students Prof. Frank Piessens 5 postdocs 30+ doctoral students 9
  • 10. Illustration AES PeCMan [Open Competition1997-2001] [IBBT] 2007-2009 S3MS [FP6+] 2006-2009 Secure Change [FP7] 2009-2012 Turbine [FP7] 2008-2011 HATS [FP7] 2009-2013 TAS3 [FP7] 2008-2011
  • 11. Cryptographic algorithms: Rijndael/AES S S S S S S S S S S S S S S S S round round MixColumns MixColumns MixColumns MixColumns S S S S S S S S S S S S S S S S Key Schedule round key length: 16/24/32 bytes block length: . . . Rijndael: 16/24/32 bytes . . AES: 16 bytes round From 2009 onwards all Intel processors will have a hardware AES implementation
  • 12. S3MS: Security of Software and Services for Mobile Systems FP6 STREP and beyond Objective: creation of framework and technological solutions for secure deployment and execution of mobile applications Outcomes: Definition of the Security by Contract (SxC) paradigm Java ME and .NET CF realizations of all the necessary supporting technologies for SxC
  • 13. S3MS: Security by contract in a nutshell
  • 14. Turbine: Innovative Digital Identity Solutions TURBINE aims to develop innovative digital identity solutions, combining: secure, automatic user Name: SMITH identification thanks to Date of birth: ..... electronic fingerprint Identity managed by issuance State, including biometrics, authentication certificates & data protection mechanism reliable protection of the biometrics data through advanced cryptography technology. Mr SMITH + ID1 + I0I 0II I0I 0II II0 00II 0I ID2 + I0I I0I II0 I0I II0 I0I0 I0 ID3 + II0 0II 0II I0I I0I 0II0 I0 ..... Research efforts focus on transformation of a description of fingerprints, so that the result can only be re-generated by the person with the fingerprints. Identities are not invertible
  • 15. PecMan: Introducing Security Service Bus Application Application Application Binding Binding Binding Authorization & Attribute Requests Security Service Bus Manager Service Authorization & Attribute Requests Authorization Service (XACML)
  • 16. PecMan: An Open Deployment Architecture AZN Server PDP 1 Metadata Metadata 3P PIP 3P PEP 3P PIP PIP PEP PeCMan PeCMan Metadata 3rd Party 3rd Party Client Server Service Service Service Client MP1 PEP PeCMan Middleware platform 1 Middleware platform 2 Client PDP 2 Client PeCMan Server 1 PeCMan Server 2
  • 17. TAS3 TAS3 focuses on federated identity management TAS3 consolidates scattered research inSecurity, Trust, Privacy, Digital identities, Authorization, Authentication… TAS3 integrates adaptive business-driven end2end Trust Services based on personal information:Semantic integration of Security, Trust, Privacy components TAS3 provides dynamic view on application-level end2end exchange of personal data:Distributed data repositories
  • 18. TAS3 Employability Employability Companies Portfolio Repository Schools Private Employment Services Trusted Employability Platform Universities Training Institutes Public Employability Employment Social Services Service Network Providers Social Certification Security Services Services
  • 19. HATS: Advanced software validation tools Advanced software validation tools need rigorous and unambiguous models Abstract Behavioural Specification Language Adaptability concerns drive its design Formalises successful SWPF development method Behavioural model: concurrency, composability, modularity, deployment Abstract away from programming languages, system architecture
  • 20. HATS: Scaling Formal Methods to Adaptable Systems Software Family models describes ABS Modeling variability Language Parameter space Domain Feature model System derivation spatial & customization variability models Existing Formal Methods System Product SPEC#, JML, UML, OCL, State Diagrams, ... temporal evolution
  • 22. 4 Research Programs for ICT Security Embedded Security Privacy and Identity Management Secure Software: support at the implementation level Security Engineering: support throughout the software/hardware engineering process
  • 23. Obvious collaborations Enabling technologies Application domains Industrial collaboration Europe Flanders