Tag: UCL

Jan 05

IFIP SEC 2012 – Deadline extended to January 17, 2012

* Deadline extended to January 17, 2012 (22:00 UTC) *

27th IFIP International Information Security and Privacy Conference 
(SEC 2012)
Creta Maris Hotel, Heraklion, Crete, Greece – June 4-6, 2012

Papers offering novel research contributions in any aspect of computer
security are solicited for submission to the 27th IFIP International 
Information Security and Privacy Conference. The focus is on original,
high quality, unpublished research and implementation experiences.
Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference with proceedings. We encourage submissions of papers 
discussing industrial research and development. Papers should focus 
on topics which include, but are not limited to, the following:

– Access Control
– Accountability
– Anonymity
– Applied Cryptography
– Attacks & Malicious Code
– Authentication & Delegation
– Awareness & Education
– Data Integrity 
– Database Security
– Identity Management
– Information Security Culture
– Formal Security Verification
– Mobile Code Security
– Policies & Standards
– Privacy Attitudes & Practices
– Risk Analysis & Management
– Security Architectures
– Security Economics
– Security in Location Services
– Security in Social Networks
– Security Models
– Social Engineering & other Human-related Risks
– System Security
– Usable Security
– Trust Models & Management
– Trust Theories
– Trustworthy User Devices

After the conference, extended versions of selected papers will 
be considered for publication in a major security-focused journal. 
Those papers will undergo at least another review round.

The proceedings will be published by Springer in the IFIP Advances 
in ICT Series. All submissions should follow the proper template 
from the time they are submitted. They should be not more than 
12 pages (using 11-point font), including bibliography and 
appendices. PC members are not required to read the appendices, 
so the paper should be intelligible without them. 
All submissions must be written in English.

Authors must submit their papers by the deadline indicated below, 
using the conference web site (www.sec2012.org) and following the 
requirements stated therein.

All accepted papers must be presented at the conference. Their 
authors must be prepared to sign a copyright transfer statement. 
At least one author of each accepted paper must register to the 
conference by the early date indicated by the organizers, and 
present the paper.

Submission of papers: January 17, 2012 (22:00 UTC) *extended*
Notification to authors: March 1, 2012
Camera-ready version: March 10, 2012

S. Katsikas, University of Piraeus (GR)

D. Gritzalis, AUEB (GR)
S. Furnell, Plymouth University (UK)

V. Atluri, Rutgers University (US)
J. Biskup, University of Dortmund (DE)
J. Camenisch, IBM Research (CH)
S. De Capitani di Vimercati, U. degli Studi di Milano (IT)
N. Clarke, Plymouth University (UK)
J. Crume, IBM (US)
F. Cuppens, TELECOM Bretagne (FR)
N. Cuppens, UEB (FR)
B. de Decker, K.U. Leuven (BE)
G. Dhillon, Virginia C/wealth University (US)
T. Dimitrakos, BT (UK)
R. Dodge, US Military Academy (US)
S. Fischer-Huebner, Karlstadt University (SE)
D. Gollmann, Hamburg Univ. of Technology (DE)
J.-H. Hoepman, TNO & Radboud U. Nijmegen (NL)
T. Holz, Ruhr-University Bochum (DE)
S. Ioannidis, FORTH (GR)
B. Jacobs, Radboud Univ. Nijmegen (NL)
S. Jajodia, George Mason University (US)
L. Janczewski, Univ. of Auckland (NZ)
T. Karygiannis, NIST (US)
V. Katos, University of Thrace (GR)
P. Katsaros, University of Thessaloniki (GR)
S. Katzenbeisser, T.U. Darmstadt (DE)
D. Kesdogan, University of Siegen (DE)
C. Lambrinoudakis, Univ. of Piraeus (GR)
C. Landwehr, Univ. of Maryland (US)
R. E. Leenes, Tilburg University (NL)
J. Lopez, University of Malaga (ES)
E. Markatos, FORTH and Univ. of Crete (GR)
S. Marsh, Communications Research Center (CA)
I. Mavridis, University of Macedonia (GR)
N. Miloslavskaya, National Nuclear Research University (RU)
Y. Murayama, Iwate Prefectural University (JP)
E. Okamoto, Univ. of Tsukuba (JP)
M. Olivier, University of Pretoria (SA)
O. Ouzounis, ENISA (EU)
J. I. Pagter, Alexandra Instituttet, (DK)
M. Papadaki, Plymouth University (UK)
M. Pattinson, University of Adelaide (AU)
P. Peleties, USB Bank (CY)
H. Pohl, UAS Bonn-Rhein-Sieg (DE)
S. Qing, Chinese Academy of Sciences (CN)
M. Rajarajan, City University (UK)
K. Rannenberg, Goethe Univ. Frankfurt (DE)
C. Rieder, HSW Luzern (CH)
P. Samarati, Univ. degli Studi di Milano (IT)
R. Sasaki, Tokyo Denki University (JP)
I. Schaumuller-Bichl, UAS Hagenberg (AT)
A. K. Seip, Finanstilsynet (NO)
R. von Solms, NMMU (SA)
T. Tryfonas, University of Bristol (UK)
C. Valli, Edith Cowan University (AU)
J. Vyskoc, VaF (SK)
J. Ward, Hewlett Packard (UK)
T. Welzer, Univ. of Maribor (SI)
D. Westhoff, HAW Hamburg (DE)
L. Yngstrom, Univ. of Stockholm (SE)
M. Yung, Google (US)

M. Theoharidou, AUEB (GR)
N. Kyrloglou, ACCI (GR)

S. Foresti, Universita' degli Studi di Milano (IT)

This call for papers and additional information about the conference 
can be found at http://www.sec2012.org
For information regarding the conference you may contact: info@sec2012.org

Jan 04

Cyberweapons: Stuxnet weapon has at least 4 cousins | Cyber Warzone

The Stuxnet virus that last year damaged Irans nuclear program was likely one of at least five cyber weapons developed on a single platform whose roots trace back to 2007, according to new research from Russian computer security firm Kaspersky Lab.

via Cyberweapons: Stuxnet weapon has at least 4 cousins | Cyber Warzone.

Dec 13

Was Russia Behind Stuxnet? | The Diplomat

The U.S. and Israel are widely assumed to be responsible for the Stuxnet computer worm that hit Iran’s nuclear facilities. But Moscow has just as good a motive.

Was Russia Behind Stuxnet? | The Diplomat.

Oct 21

UCL Crypto Group/BCRYPT: Tolerant Algebraic Side-Channel Analysis of AES


*Speaker:* Yossi Oren, Tel Aviv University (Israel)

*Title:* Tolerant Algebraic Side-Channel Analysis of AES

*Date:* Tuesday, October 25, 11:00

*Place:* room 207, Euler Building (near Maxwell Building) Avenue
Georges Lemaitre, 4-6 - 1348 Louvain-la-Neuve

*Abstract:* Classical power analysis attacks are difficult to mount when only a single power trace is available: the statistical methods that make DPA attacks so successful are not applicable since they require many (typically thousands) of traces. Recently it was suggested by Standaert et al. to use algebraic methods for the single-trace scenario, converting the key recovery problem into a Boolean satisfiability (SAT) problem, then using a SAT solver. However, this approach is extremely sensitive to noise (allowing an error rate of well under 1% at most), and the question of its practicality remained open.

In this work we show how a single-trace side-channel analysis problem can be transformed into a pseudo-Boolean optimization (PBOPT) problem, which takes errors into consideration.  We call our new attack methodology Tolerant Algebraic Side-Channel Analysis (TASCA).  We will describe the new methodology, its strengths and limitations, and finally show a full TASCA-based key-recovery attack on a microcontroller-based implementation of the Advanced Encryption Standard.

For a map of Louvain-la-Neuve: http://www.dom.ucl.ac.be/info_plan.html
For a map of public parking lots: http://www.llnparking.be/

Sep 29

Ressources for call for papers

The following websites could be useful to find call for papers and conferences, in particular regarding eGovernance

Sep 19

Vaste piratage des entreprises de défense japonaises

Le conglomérat Mitsubishi Heavy Industries a confirmé ce lundi des informations de la presse japonaise affirmant que plusieurs de ses ordinateurs avaient été piratés. Le groupe Mitsubishi compte les principales entreprises d’armement japonaises, avec des usines construisant des sous-marins, des missiles et des composants pour les centrales nucléaires.

via Vaste piratage des entreprises de défense japonaises – LeMonde.fr.