CySeP'18 Technical Program

 

 

 

 

Sessions

 

 

Day 1, June 11, PROTASIS Session 1 (9:00-9:45)

Speaker: Marcello Poglianni

Title: Breaking the "Laws" of Robotics: Attacking Industrial Robots

Abstract: TBA.

Day 1, June 11, PROTASIS Session 2 (9:45-10:30)

Speaker: Davide Quarta

Title: Stranger Connected Things: The Upside Down of Trendy M2M Protocols

Abstract: TBA.

 

Day 1, June 11, PROTASIS Session 3 (11:00-12:30)

Speaker: George Vasiliadis

Title: Security Applications of GPUs

Abstract: TBA.

 

Day 1, June 11, Hands-on Exercises 1 (13:30-15:00)

Speaker: Antonios Chariton

Title: EDUCTF (Educational CTF)

Abstract: TBA.

 

Day 1, June 11, Hands-on Exercises 2 (15:30-17:00)

Speaker: Antonios Chariton

Title: EDUCTF (Educational CTF)

Abstract: TBA.

 

Day 2, June 12, PROTASIS Session 4 (9:00-10:30)

Speaker: Thorsten Holz

Title: Overview of Recent Runtime Attacks and Defenses

Abstract: TBA.

 

Day 2, June 12, PROTASIS Session 5 (11:00-12:30)

Speaker: Cornelius Aschermann

Title: Feedback Fuzzing for x86 / x86-64 Hypervisors and Beyond

Abstract: TBA.

 

Day 2, June 12, Hands-on Exercises 3 (13:30-15:00)

Speaker: Cornelius Aschermann and Thorsten Holz

Title: Hands-on fuzzing

Abstract: Many kinds of memory safety vulnerabilities have been endangering software systems for decades. Amongst other approaches, fuzzing is a promising technique to unveil various software faults. Recently, feedback-guided fuzzing demonstrated its power, producing a steady stream of security-critical software bugs. In this session, we will provide a general introduction to fuzzing and several exercises will demonstrate the usage of fuzzing in different contexts.

 

Day 2, June 12, Hands-on Exercises 4 (15:30-17:00)

Speaker: Cornelius Aschermann and Thorsten Holz

Title: Hands-on fuzzing

Abstract: Many kinds of memory safety vulnerabilities have been endangering software systems for decades. Amongst other approaches, fuzzing is a promising technique to unveil various software faults. Recently, feedback-guided fuzzing demonstrated its power, producing a steady stream of security-critical software bugs. In this session, we will provide a general introduction to fuzzing and several exercises will demonstrate the usage of fuzzing in different contexts.

 

Day 2, June 12, SURPRISE – project meeting (17:00-18:00)

 

Day 3, June 13, Talk 1 (9:00-10:30)

Speaker: Prof. Yvo G. Desmedt (University of Texas at Dallas, TX, USA)

Title: The fundamental reasons information technological systems are insecure

Abstract: To achieve cyber security, we need besides research and education, implementations, but even more important are deployment and proper regulations. The lecture surveys the state of the art in these five aspects of real life cyber security. Although we see a lot of research in the field, its impact might be smaller than ever before. For example, we see a lot of research on privacy, but the population at large is indifferent to the almost total loss of privacy. Regulations that have been put in place are often ineffective (such as the one of the EU regarding cookies). Worse, deregulation has made the West so vulnerable that hackers from a Chinese IP address stole information about all US federal employees. The lecture concludes with some positive notes and surveys positive applications of cyber security technology and the impact of education.

 

Day 3, June 13, Talk 2 (11:00-12:30)

Speaker: Prof. Ivan Bjerre Damgård (Aarhus University, Denmark)

Title: Multiparty Computation, past, present and future

Abstract: This talk will contain first a general introduction to Multiparty Computation (MPC), what it is and what problems it can solve. We also give a very brief overview of the most important feasibility and impossibility results in the area. Then we take a closer look at one example of a recent MPC protocol that is illustrative and also has practical relevance: the so-called SPDZ protocol. Finally, we give an outlook for the future and mention some open problems.

 

Day 3, June 13, Talk 3 (13:30-15:00)

Speaker: Dr. Moti Yung (Columbia University, NY, USA)

Title: Why and How to Deploy "Secure Computation Protocols" for Industrial Use

Abstract: Modern Cryptography can be characterized as having three major technologies: (1) Symmetric Cryptography (started with DES in 1973) for secure communication among entities sharing a key; (2) Public Key Cryptography in 1976-77 (DH and RSA), allowing secure authentic communication among parties that do not share a key: by means of digital signature and key exchange; and (3) Cryptographic protocols (which go beyond communication and actually are computations on data that must remain private (started with the Mental Poker protocol of 1978). The first two technologies are heavily used while the third one has been in the domain of theory for about 40 years. I will discuss when deployment of this technology of secure computing is possible, and when to pursue its deployment I will describe an actual application that has been deployed and is used daily to achieve business needs.

 

Day 3, June 13, Welcome, Short research overview presentations by all SWITS partners (15:30-16:30)

Day 3, June 13, SWITS Session 1a: Vehicular Security (Chair: Martin Hell) (16:30-17:00)

1. Thomas Rosenstatter (Chalmers University of Technology), Towards a Standardized Mapping from Automotive Security Levels to Security Mechanisms


2. Hongyu Jin and Panos Papadimitratos (KTH Royal Institute of Technology), Expedited Beacon Verification for VANET


Day 3, June 13, SWITS Session 1b: Infrastructure Protection (Chair: Pontus Johnson) (16:30-17:00)

3. Andrei Gurtov (Linköping University), Analyzing Internet-Connected Industrial Equipment


4. Yuning Jiang, Yacine Atif and Jianguo Ding (Skövde University), Data Driven Testbed Design for Cyber Vulnerability Assessment in Smart Grid

 

Day 4, June 14, Talk 1 (9:00-10:30)

Speaker: Prof. Salvatore J Stolfo (Columbia University, NY, USA)

Title: Deception in Depth: How to Protect Your Data for Real

Abstract: Market watchers estimate the Cybersecurity marketplace is now valued at over $600 Billion and expected to reach $1 Trillion worldwide by 2020. A great deal of hardcore science in academia has studied security for decades. Why after all this investment is data still lost? Encryption, Data Loss Prevention, Endpoint Detection and Response, User Behavior Analytics technologies all lead the markets in prevention of data loss, but fail to deliver. It is clear new methods and techniques are needed to do a far better job at protecting data. The goal of our early work was to defend against data loss by a principled approach to integrating several security methodologies including deception and user de-authentication. In this talk we will provide a brief history of our work on the Deception Security and Active Authentication technology we developed, and the transition from academic research to practical use in commercial products.

 

Day 4, June 14, Talk 2 (11:00-12:30)

Speaker: Prof. N. Asokan (Aalto University, Finland)

Title: Securing cloud-assisted services

Abstract: All kinds of previously local services are being moved to a cloud setting. While this is justified by the scalability and efficiency benefits of cloud-based services, it also raises new security and privacy challenges. Solving them by naive application of standard security/privacy techniques can conflict with other functional requirements. In this talk, I will outline some cloud-assisted services and the apparent conflicts that arise while trying to secure these services. Taking the case of cloud-assisted malware scanning as an example scenario, I will discuss the privacy concerns that arise and how we can address them effectively. I will then discuss a more general setting of using cloud-hosted machine learning models in a privacy-preserving manner.

 

Day 4, June 14, Invited presentation by Carina Olsson (MSB) – MSB’s Research Initiatives/Programmes and Information Security Strategies (13:30-14:00)

 

Day 4, June 14, SWITS Session 2a: Network & Hardware Security (Chair: Tomas Olovsson) (14:00-15:00)


1. Zeeshan Afzal (Karlstad University), Slice Distance

2. Rasmus Dahlberg (Karlstad University), Aggregating Certificate Transparency Gossip Using Programmable Packet Processors

3. Andreas Lindner (KTH Royal Institute of Technology), Towards microkernel-based temporal isolation

4. Nurul Momen (Karlstad University), Towards a Privacy Preserving App Recommendation Scheme

Day 4, June 14, SWITS Session 2b: Privacy and Usability (Session Chair: Nahid Shahmehri) (14:00-15:00)


1. Vida Ahmadi Mehri (Blekinge Institute of Technology), Toward privacy requirements for Collaborative development of AI

2. Daniel Bosk and Sonja Buchegger (KTH Royal Institute of Technology), Privacy-Preserving Verifiable Crowd Counting for Protests

3. Farzaneh Karegar (Karlstad University), Habituation and different modes of affirmative actions to achieve informed consent

4. Agnieszka Kitkowska (Karlstad University), Measuring privacy attitudes and behaviors

Day 4, June 14, SWITS Session 3a: Privacy & Transparency (Chair: Sonja Buchegger) (15:30-16:15)


1. Navoda Senavirathne and Vicenc Torra (Skövde University), Model selection for privacy preserving machine learning under transparency

2. Patrick Murmann (Karlstad University), Usable Transparency for Enhancing Privacy in Mobile Health

Day 4, June 14, SWITS Session 3b: Software Security & Testing (Chair: Simin Nadjm-Tehrani) (15:30-16:15)


1. Ulf Kargén (Linköping University), Focused Fuzzing: Fine-Grained Dynamic Analysis to Speed Up Bug Discovery

2. Marco Vassena (Chalmers University of Technology), MAC - A Verified Information-Flow Control Library

 

Day 4, June 14, SAAB, Ericsson, NiXU, ICES 5-minute presentations (16:25-16:45)

 

Day 4, June 14, Poster and demo teaser talks (16:45-18:20)

List of accepted posters/demo

 

Day 4, June 14, Poster & Demo Session (18:20-20:30)

List of accepted posters/demo

 

Day 5, June 15, Talk 1 (9:00-10:30)

Speaker: Prof. John S. Baras (University of Maryland College Park, MD, USA)

Title: Physical Layer Security Schemes for Wireless Devices and Cyber-Physical Systems

Abstract: Wireless devices and networks continue to evolve rapidly. Their heterogeneity is also rapidly increasing. Current and future systems that depend on mobile wireless devices include communication and sensor networks, autonomous vehicles, autonomous drones, smart factories, smart grids, e-payment systems, traffic control infrastructures, healthcare, industry 4.0 systems, industrial Internet, human-robot collaboration, and many others. Our main position is that appropriate levels of security, privacy, trust, for wireless devices and networks can be achieved only if these functions exploit physical layer characteristics and schemes. The inclusion of physical layer techniques is even more needed for Cyber-Physical Systems (CPS), where the physics of the physical layer, being immutable, provide a basis for security, privacy, trust. We describe several physical layer schemes we have developed, implemented and evaluated for mobile wireless devices including low power watermarking of modulation, trusted platform module, secure biometrics and their integration. We discuss various performance characteristics of these schemes and their applications to provide secure wireless routing, defense against wormhole attacks, location privacy in LTE, secure authentication of wireless devices. We next discuss the need for analyzing jointly the security, reliability and safety of CPS. We describe a framework for this joint analysis and performance evaluation that utilizes formal models. Finally we provide examples demonstrating that such “physical layer hardened” devices facilitate securing control systems, filtering systems, and provide a foundation for composable security, privacy, trust. We close by discussing future research challenges and directions.

 

Day 5, June 15, Talk 2 (11:00-12:30)

Speaker: Prof. Susan Landau (Tufts University, MA, USA)

Title: Listening In: Cybersecurity in an Insecure Age

Abstract: What makes us most secure? Is it enabling the police and intelligence agencies to unlock digital devices and listen to communications? Or is it securely protecting devices and communications against intrusions? Two events in 2016 painted this issue in sharp contrast. In February 2016, the FBI tried to compel Apple to open the locked iPhone of a San Bernardino terrorist. Apple refused, citing threats to iPhone security. Eventually the phone was unlocked without Apple's help; the battle over encryption continued. Then, in October 2016, the US government announced that Russia had interfered with the 2016 presidential campaign, attacking not only the Democratic National Committee and the Clinton campaign, but also research institutions and civil society organizations. Nor was the US the only target of Russian government attacks; the 2016 French presidential election was similarly targeted. What makes us most secure? In this talk, I will discuss our most serious threats and what's needed to protect against them.

 

Day 5, June 15, Talk 3 (13:30-15:00)

Speaker: Prof. Michalis Faloutsos (University of California Riverside, CA, USA)

Title: Can we reduce the first-mover-advantage of cyber-hackers?

Abstract: Can we do better than just waiting for the next attack to happen? We argue that security should become more proactive in order to minimize the damage that an attack, such as a DDoS or a virus, can have. This is a very ambitious goal, but we believe that we are making significant first steps towards it. Specifically, our work focuses on the following questions:
        a. Can we improve network security by mining social media?
        b. Can we analyze malware to detect artifacts that can help us block or even eliminate them?

We present our efforts that attempt to address the above questions. First, we develop a systematic approach to extract actionable information from social media, focusing on security forums. Specifically, we develop RIPEx, a hands-free method to extract IP addresses, that are reported as malicious in the forums. The results are very encouraging: a handful of such forums can provide 4 times more malicious IP addresses compared to the well-known VirusTotal repository. Second, we present the value of the information that we can extract by analyzing malware binaries that target routers and IoT devices. To automate the study of such malware, we develop, RARE, a systematic and comprehensive system to extract patterns and communication artifacts that can help detect and contain malware, and also point us to the communication and control points of botnets.

 

Day 5, June 15, SWITS presentation and Closing Panel (15:30-16:30)

Simin Nadjm-Tehrani (Linköping University), The RICS Project (15:30- 15:45)

Future Research Challenges (Panelists from SWITS and invited speakers - TBA) (15:45-16:30)

Navigation

Registration

Venue

Accommodation

Social event

List of accepted posters

Important Dates

Support