[HGI-news-int] HGI Newsletter #05e
English Newsletter of the Horst Goertz Institute of IT Security in Bochum
hgi-news-international at lists.ruhr-uni-bochum.de
Fri Dec 3 17:42:01 CET 2010
**HGI-Newsletter**
http://www.hgi.rub.de/hgi/newsletter/n05e/
No 05e - Friday, 3 December 2010
Horst Görtz Institute for IT Security
Ruhr-University Bochum
http://www.hgi.rub.de
Content
=======
- Sofja Kovalevskaja Prize Winner new Professor at HGI
- Six HGI projects awarded by BMBF with 1,9 million Euros
- HGI successfull at the Third German Award for IT Security
- IT Security Events
- 10 years of ITS-Studies in Bochum
- Prof. Paar elected to IACR Board of Directors
- W3 Chair for System Security
- Programme Committees
- Workshops
- Invited talks
- Talks
- HGI Colloquium
- Publications
Sofja Kovalevskaja Prize Winner new Professor at HGI
====================================================
In September Prof. Dr. Eike Kiltz joined the Horst Görtz Institut with a
W2-professorship. He will be part of Professor May’s team at the
Chair of Cryptology and will deal with all aspects of developing
and analysing cryptographic methods. As one out of only 18 young
researchers he received the Sofja-Kovalevskaja Prize awarded
by the Alexander von Humboldt Foundation. This prize amounting to
1,65 million will allow him to continue his research. Professor
Kiltz has graduated from Bochum. After having held post doc
positions at UC San Diego and the “Centrum Wiskunde &
Informatica” in Amsterdam with the research group “Cryptology
and Information Security” he now returns as Professor to the
HGI. Please go to http://homepages.cwi.nl/~kiltz/research.html for
further information.
Six HGI projects awarded by BMBF with 1,9 million Euros
========================================================
Six projects of researchers of the Horst Görtz Institute will be
supported by the “Federal Ministry of Education and Research”
(BMBF) with an amount of 1,9 million Euros. The projects MobWorm,
Sec^2, ESET, RESIST, SCAAS and HIKOS aim at significantly
improving security of present and future IT-Systems. Throughout
the next couple of years the project teams at the HGI and partners
from science and economy are going to develop protecting
mechanisms for smart phones and mobile data, smart cards and chip
cards, as well as for board electronics of cars and software. Further
details can be found on:
http://aktuell.ruhr-uni-bochum.de/pm2010/pm00323.html.de
HGI successfull at the Third German Award for IT Security
=========================================================
On Thursday, 25 November 2010 the third German Award for IT-Security was
awarded by the Horst Görtz Foundation at the "Zentrum für IT-Sicherheit"
in Bochum. Prof. Gregor Leander, Prof. Christof Paar and Dr. Axel
Poschmann of the HGI received the 1st prize, 100,000 Euros, for their
submission "PRESENT - Cost Optimized Security for Pervasive Computing".
PRESENT is currently being standardized by ISO. The 2nd prize, which
comes with a sum of 60,000 Euros, was awarded to Lucas Davi, Prof.
Ahmad-Reza Sadeghi and Marcel Winandy of the Chair of System
Security of the HGI for their submission „ROP Defender, a Tool for
Prevention of Return-Oriented Programming Attacks“. This award is
one of the most prestigious prizes privately awarded in Germany
honouring marketable inventions in the area of IT Security. Further
information regarding the award and the prize winners can be found at
http://horst-goertz.de/it_preis.html.
IT Security Events
==================
- 9 December, 2010 eurobits Christmas Party
- 18 January, 2011 Teacher Training, Cryptography & IT-Security
- 8 February, 2011 Student Day, Cryptography & IT-Security
- 21 March, 2011 14. Kryptotag / SPRING
- 27 May, 2011 its.connect 2011, jobfair
All events will take place in Bochum!
10 years of ITS-Studies in Bochum
=================================
For exactly 10 years now Bochum is offering academic programs in
IT-Security. Currently there are three Master programs and a Bachelor
program, the latter of which is unique in Germany. 130 new students
registered for this winter term. At the moment about 60 students
graduate with Bachelor and Master degrees every year and enjoy best
career opportunities. The national newspaper "Süddeutsche Zeitung" lists
ITS as one of the 10 occupational areas with best future perspectives.
For further information visit:
http://sueddeutsche.de/karriere/berufe-mit-zukunft-karriere-wir-kommen-1.964189-9
Prof. Paar elected to IACR Board of Directors
=============================================
The 2010 election took place October 1 through November 15 to fill all
four IACR Officer positions and three of nine IACR Director positions.
This year, for the first time the election was conducted electronically
using the Helios cryptographically-verifiable election system. Prof.
Christof Paar, Director of the HGI, was elected to a Directorate post.
With Dr. Christopher Wolf, there are now two German members (both at the
HGI) in the Board of Directors of the IACR, the worlwide association of
cryptologic researchers.
W3 Chair for System Security
============================
The position of Chair of System Security (formerly Prof. Ahmad Sadeghi)
has become vacant. It is integrated in the Horst Görtz Institute for
IT-Security, one of the the leading university-based research centres in
this field. The future occupant is supposed to represent the department
in this field in research and teaching. His/her scientific work will
focus on one or more of the key research areas: operating system
security; security in distributed systems; cryptography (protocols and
algorithms). International visibility through publications and projects,
substantial experience with external research funding are expected. The
committee is currently reviewing the application, and the position is
expected to be filled early 2011.
Programme Committees
====================
Thorsten Holz:
**European Workshop on System Security (EuroSec'10)**, Publicity Chair,
Paris, 13 April 2010
**9th Workshop on the Economics of Information Security (WEIS 2010)**,
Harvard University, Cambridge, USA, 7 – 8 June 2010
**7th Conference on Detection of Intrusions and Malware & Vulnerability
Assessment (DIMVA '10)**, Bonn, 8 – 9 June 2010
**15th European Symposium on Research in Computer Security (ESORICS
'10)**, Athen, Greece, 20 – 22 September 2010
**13th International Symposium on Recent Advances in Intrusion Detection
(RAID '10)**, Publicity Chair, Ottawa, Ontario, Canada, 15 – 17
September 2010
Eike Kiltz:
**30th International Cryptology Conference (CRYPTO 2010)**, Santa
Barbara, USA, 30 May - 3 June 2010
**13th International Conference on Practice and Theory in Public Key
Cryptography (PKC 2010)**, Paris, France, 26 - 28 May 2010
Alexander May:
**CT-RSA 2011**, San Francisco, USA, 14 - 18 February 2011
**14th International Conference on Practice and Theory in Public Key
Cryptography (PKC 2011)**, Taormina, Italy, 6 - 9 March 2011
**30th International Conference on the Theory and Applications of
Cryptographic Techniques (Eurocrypt 2011)**, Tallinn, Estonia, 15 -19
May 2011
Workshops
=========
Alexander May, Frederic Vercauteren:
**MAYA WG2 – Research Meeting in Cryptoanalysis** K.U. Leuven ESAT, 9
September 2010
Christopher Wolf, Frederik Armknecht:
**Sicherheit 2010: Special Session on Theory and Practice of
Cryptography**, Berlin, 6 Oktober 2010
Invited talks
=============
Thorsten Holz: **Angriffe im Mobilen Internet**, a-i3/BSI - Symposium
2010, Bochum
Thorsten Holz: **Tracking and Mitigation of Malicious Remote Control
Networks**, Colloquium in connection with GI-Dissertationspreis 2010,
Schloss Dagstuhl, Wadern
Thorsten Holz: **Botnets in 2010**, SIGINT 2010, Cologne
Thorsten Holz: **Erkennen von Botnetzen - Aktueller Forschungsstand und
offene Probleme**, IT-Security Breakfast May 2010, IHK Bochum
Thorsten Holz: **Technical Aspects of the Waledac Takedown**, 19th
Messaging Anti-Abuse Working Group Meeting, Barcelona
Thorsten Holz: **Effiziente Analyse von Schadsoftware im Kontext von
Frühwarnsystemen**, University Bonn, Bonn
Thorsten Holz: **Botnet Detection and Mitigation**, Universität
Darmstadt, DarmstadtMeiko Jensen ** Cloud Computing Standards: A
Security Point of View**, IEEE Cloud Computing Standards Symposium,
Miami, Florida, U.S.A., July 2010.
Timo Kasper, David Oswald, Christof Paar: **A Versatile Framework for
Implementation Attacks on Cryptographic and Embedded Devices** Special
Issue on Security in Computing of Transactions on Computational Sciences
Journal
Alexander May: **Correcting Errors in RSA Private Keys**, 2nd
International Conference on Symbolic Computation and Cryptography 2010,
Royal Holloway, University of London, UKSCC 2010, Royal Holloway
http://scc2010.rhul.ac.uk/invited.php
Alexander May: **Lattice-based Cryptanalysis**, crypt at b-it 2010, Summer
school on Cryptography, Bonn
http://cosec.bit.uni-bonn.de/students/events/cryptabit2010/
Alexander Meurer: **Correcting Errors in RSA Private Keys**, Crypto
2010, 15 – 19 August 2010, Santa Barbara, Californien
http://www.iacr.org/conferences/crypto2010/program.html#ses2.2
Thomas Schneider: **Token-based cloud computing - secure outsourcing of
data and arbitrary computations with lower latency**, 3rd International
Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on
Trust in the Cloud, 21 – 23 June 2010, Berlin, together with Ahmad-Reza
Sadeghi und Marcel Winandy
Thomas Schneider: **Garbled circuits for leakage-resilience: Hardware
implementation and evaluation of one-time programs**, 12th International
Workshop on Cryptographic Hardware and Embedded Systems (CHES'10), 17 –
20 August 2010, Santa Barbara, USA, together with Kimmo Järvinen,
Vladimir Kolesnikov, und Ahmad-Reza Sadeghi
Talks
=====
Meiko Jensen: **An Anonymous Access Control and Accountability Scheme
for Cloud Computing**, Third International Conference on Cloud Computing
(IEEE CLOUD), Miami, Florida, USA, 2010
Meiko Jensen: **Attack Surfaces: A Taxonomy for Attacks on Cloud
Services**, Third International Conference on Cloud Computing (IEEE
CLOUD), Miami, Florida, USA, 2010
Meiko Jensen: **Towards Automated Processing of the Right of Access in
Inter-Organizational Web Service Compositions**, IEEE International
Workshop on Web Service and Business Process Security (WSBPS), Miami,
Florida, USA, 2010.
Clemens Kolbitsch, Thorsten Holz, Christopher Kruegel, Engin Kirda:
**Inspector Gadget: Automated Extraction of Proprietary Gadgets from
Malware Binaries**, IEEE Security and Privacy, Oakland
Hans Löhr: **Anonymous Authentication with TLS and DAA**, TRUST 2010,
Berlin, 21-23 June 2010, (together Emanuele Cesena, Gianluca Ramunno,
Ahmad-Reza Sadeghi, and Davide Vernizzi):
Christof Paar: **Physical Attacks in a Physical World**, MIT Computer
Science and Artificial Intelligence Laboratory, Cambridge, USA, please
see:
http://www.csail.mit.edu/events/eventcalendar/calendar.php?show=event&id=2646
Thomas Schneider: **Token-based cloud computing - secure outsourcing of
data and arbitrary computations with lower latency**, 3rd International
Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on
Trust in the Cloud, 21 – 23 June 2010, Berlin, (together with Ahmad-Reza
Sadeghi and Marcel Winandy)
Thomas Schneider: **Garbled circuits for leakage-resilience: Hardware
implementation and evaluation of one-time programs**, 12th International
Workshop on Cryptographic Hardware and Embedded Systems (CHES'10), 17 –
20 August 2010, Santa Barbara, USA. (together with Kimmo Järvinen,
Vladimir Kolesnikov, und Ahmad-Reza Sadeghi)
Gilbert Wondracek, Thorsten Holz, Christian Platzer, Engin Kirda,
Christopher Kruegel: **Is the Internet for Porn? An Insight Into the
Online Adult Industry**, Ninth Workshop on the Economics of Information
Security (WEIS 2010), Boston
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Christopher Kruegel: **A
Practical Attack to De-Anonymize Social Network Users**, IEEE Security
and Privacy, Oakland
HGI Colloquium
==============
10 June 2010 Thorsten Mehlich / Ruhr-University Bochum
**Strategien für effiziente Skalarmultiplikation**
http://www.hgi.rub.de/hgi/hgi-seminar/aktuelles/#strategien-f-r-effiziente-skalarmultiplikation
17 June 2010 Roberto Avanzi / Ruhr-University Bochum
**Arithmetic of Supersingular Koblitz Curves in Characteristic Three**
http://www.hgi.rub.de/hgi/hgi-seminar/aktuelles/#arithmetic-of-supersingular-koblitz-curves-in-characteristic-three
24 June 2010 Christopher Wolf /Ruhr-University Bochum
**Äquivalente Schlüssel in Multivariaten Quadratischen Systemen**
http://www.hgi.rub.de/hgi/hgi-seminar/aktuelles/#quivalente-schl-ssel-in-multivariaten-quadratischen-systemen
1 July 2010 Juraj Somorovsky / Ruhr-University Bochum
**Streaming-based verification of XML Signatures in SOAP Messages**
http://www.hgi.rub.de/hgi/hgi-seminar/aktuelles/#streaming-based-verification-of-xml-signatures-in-soap-messages
8 July 2010 Peter Schwabe / Eindhoven University of Technology
**New Software Speed Records for Cryptographic Pairings**
http://www.hgi.rub.de/hgi/hgi-seminar/aktuelles/#new-software-speed-records-for-cryptographic-pairings
15 July 2010 Florian Kohlar / Ruhr-University Bochum
**On Cryptographically Strong Bindings of SAML Assertions to Transport
Layer Security**
http://www.hgi.rub.de/hgi/hgi-seminar/aktuelles/#on-cryptographically-strong-bindings-of-saml-assertions-to-transport-layer-security
21 July 2010 Mario Kirschbaum / IAIK Graz
**A Glimpse on DPA-Resistant ASIC Prototypes**
http://www.hgi.rub.de/hgi/hgi-seminar/aktuelles/#a-glimpse-on-dpa-resistant-asic-prototypes
22 July 2010 Lena Wiese / TU Dortmund
**Logical Requirements for Database Security**
http://www.hgi.rub.de/hgi/hgi-seminar/aktuelles/#logical-requirements-for-database-security
29 July 2010 Alexander Meurer / Ruhr-University Bochum
**Correcting Errors in RSA Private Keys**
http://www.hgi.rub.de/hgi/hgi-seminar/aktuelles/#correcting-errors-in-rsa-private-keys
The abstracts are available at
http://www.hgi.rub.de/hgi/hgi-seminar/aktuelles/
Publications
============
José Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn,
Ahmad-Reza Sadeghi, Thomas Schneider:
**A certifying compiler for zero-knowledge proofs of knowledge based on
sigma-protocols**
15th European Symposium on Research in Computer Security (ESORICS'10),
LNCS. Springer, 20 – 22 September 2010. Please also see:
http://eprint.iacr.org/2010/339.
Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide
Balzarotti, Christopher Kruegel:
**Abusing Social Networks for Automated User Profiling**
International Symposium on Recent Advances in Intrusion Detection (RAID
2010), Ottowa, Kanada
Endre Bangerter, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider:
**YAZKC: Yet Another Zero-Knowledge Compiler**
19th USENIX Security Symposium (Security'10) Poster Session, 11 – 13
August 2010.
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Christian
Wachsmann, Johannes Winter:
**Lightweight Anonymous Authentication with TLS and DAA for Embedded
Mobile Devices**
accepted for the 13th Information Security Conference (ISC'10), 2010.
Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, Norbert Luttenberger:
**Server-Side Streaming Processing of WS-Security**
IEEE Transactions on Services Computing (TSC, to appear).
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider, Immo
Wehrenberg:
**TASTY: Tool for Automating Secure Two-partY computations**
17th ACM Conference on Computer and Communications Security (CCS'10).
ACM, 4 – 8 Oktober, 2010. Please also see: http://eprint.iacr.org/2010/365.
Tibor Jager, Andy Rupp:
**The Semi-Generic Group Model and Applications to Pairing-based
Cryptography**
The 16th Annual International Conference on the Theory and Application
of Cryptology and Information Security (ASIACRYPT), Singapore, 2010
Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk:
**Generic Compilers for Authenticated Key Exchange**
The 16th Annual International Conference on the Theory and Application
of Cryptology and Information Security (ASIACRYPT), Singapore, 2010
Meiko Jensen, Sven Schäge, Jörg Schwenk:
**Towards an Anonymous Access Control and Accountability Scheme for
Cloud Computing**
Proceedings of the Third International Conference on Cloud Computing
(IEEE CLOUD), Miami, Florida, USA, 2010
Meiko Jensen, Jörg Schwenk:
**Definition, Application, and Enforcement of WS-Security Policies in
Model-Driven SOAs**
Proceedings of the Third International Symposium on Web Services (WSS),
Dubai, U.A.E., 2010
Florian Kohlar, Jörg Schwenk, Meiko Jensen, Sebastian Gajek.
**On Cryptographically Strong Bindings of SAML Assertions to Transport
Layer Security.**
International Journal of Mobile Computing and Multimedia Communications
(invited paper, IJMCMC, to appear).
Hans Löhr, Thomas Pöppelmann, Johannes Rave, Martin Steegmanns, Marcel
Winandy:
**Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop
Environments**
accepted for the 5th International Workshop on Scalable Trusted
Computing (ACM STC'10), 2010.
Hans Löhr, Marcel Winandy, Ahmad-Reza Sadeghi:
**Securing the E-Health Cloud**
accepted for the 1st ACM International Health Informatics Symposium
(ACM IHI 2010), 2010.
Ahmad-Reza Sadeghi, Thomas Schneider:
**Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter
medizinischer Daten am Beispiel der Klassifikation von EKG-Daten**
Workshop Innovative und sichere Informationstechnologie für das
Gesundheitswesen von morgen (PerspeGKtive'10), LNI, 8 September 2010.
Michael Spreitzenbarth, Thorsten Holz:
**Towards Secure Deletion on Smartphones**
5th Conference on "Sicherheit: Schutz und Zuverlässigkeit" (SECURITY
2010), Berlin
Philipp Trinius, Carsten Willems, Thorsten Holz, Konrad Rieck:
**A Malware Instruction Set for Behavior-Based Analysis**
5th Conference on "Sicherheit: Schutz und Zuverlässigkeit" (SICHERHEIT
2010), Berlin
Information
===========
Subscribe:
If you wish to subscribe to the HGI News by email, you can do so at
http://lists.ruhr-uni-bochum.de/mailman/listinfo/hgi-news-international
Unsubscribe:
If you wish to unsubscribe from the HGI News, please visit
http://lists.ruhr-uni-bochum.de/mailman/listinfo/hgi-news-international
Download:
All HGI-Newsletters (both English and German) can be downloaded from:
http://www.hgi.rub.de/hgi/newsletter
Editor:
Anja Nuss, Email: an at hgi.rub.de
Managing Director of the Horst Görtz Institute:
Prof. Dr.-Ing. Chrstof Paar, Email: christoph.paar at rub.de
--
Dipl.-Math. Anja Nuß
Scientific Coordinator
Horst Görtz Institute for IT-Security
Ruhr-University Bochum, Germany
+49 (234) 32 - 27722
www.hgi.rub.de
More information about the HGI-News-International
mailing list