[HGI-news-int] HGI Newsletter #04e
English Newsletter of the Horst Goertz Institute of IT Security in Bochum
hgi-news-international at lists.ruhr-uni-bochum.de
Fri May 28 18:12:10 CEST 2010
HGI-Newsletter
http://www.hgi.rub.de/hgi/newsletter/n04e/
No 04e - Friday, 28 May 2010
Horst Görtz Institute for IT Security
Ruhr-University Bochum
http://www.hgi.rub.de
Content
=======
- Successful manipulation of credit accounts
- Assistant professor "Embedded Malware"
- Graduation ceremony for 40 IT-security specialists
- New members on the board of Trustees at the Horst Görtz Institute
- HGI represented in IACR
- Trust 2010
- Start of new project work "Unique"
- Workshop on "Generic Ring Algorithms"
- Guests
- Programme Committees
- Workshops
- Invited talks
- Talks
- HGI Colloquium
- Publications
Successful manipulation of credit accounts
==========================================
As a consequence of attacks on RFID-Chips in 2007 Timo Kasper has been
able to manipulate the credit value stored on contactless cards used in
a widespread payment application. Exchanging these false credits for
real goods without any problems is proof enough that converting bits
into real cash works. By setting up a specific reader device, Timo
Kasper was able to modify the credit value stored on a card, which then
could be used for cashless payment transactions. Altering the credit
value on a card in practice takes 40ms from a distance of up to 30cm and
hence shows a signifacant real-world risk.
Assistant professor "Embedded Malware"
======================================
We are happy to announce that Dr. Thorsten Holz joined the Horst Görtz
Institute as new Assistant Professor for "Embedded Malware". Dr. Holz
studied at RWTH Aachen. He obtained his PhD degree at the Laboratory for
Dependable Distributed Systems (University of Mannheim) in "Tracking and
Mitigation of Malicious Remote Control Networks". In the last year he
worked as a postdoctoral research fellow at Vienna University of
Technology, specifically at the International Secure Systems Lab. Dr.
Thorsten Holz is one of the founders of the German Honeynet Project.
Working closely with the Chair in Network and Data Security he will
contribute to the research in Embedded Malware, Honeypots, analysis of
binary code and anti spam techniques at the HGI. URL: http://honeyblog.org/
Graduation ceremony for 40 IT-security specialists
==================================================
40 Students of the study program IT-Security received their diplomas at
the "Nestfest", the annual graduation ceremony of the Faculty of
Electrical Engineering and Information Sciences. On January, 22nd, 2010,
they were awarded with Bachelors', Diploma or Masters' degrees. Given
the ongoing strong demand for IT-security specialists, the job
perspectives for our graduates are excellent. Usually, students are
offered a contract even before receiving their degree.
New members on the board of Trustees at the Horst Görtz Institute
=================================================================
The HGI welcomes four new members to the Board of Trustees: Dr. Rainer
Baumgart (Secunet), Tom Köhler (Microsoft), Dr. Dirk Hochstrate (G
DATA), Dr. Thomas Wille (NXP) and Klaus Wolfenstetter (T-Labs). They
supersede Prof. Johannes Buchmann (TU Darmstadt), Dr. Stephan Lechner
(European Commission), Dr. Udo Helmbrecht (former Präsident of the BSI,
now president of EU-Netzwerksicherheitsagentur ENISA) and Dr.
Franz-Peter Heider (T-Systems GEI GmbH, Managing Director business unit
ITC-Security). The Horst Görtz Institute thanks its former Trustees for
their support and is looking forward to a fruitful cooperation with the
newly elected Board members.
HGI represented in IACR
=======================
The former scientific coordinator of the HGI, Dr. Christopher Wolf, is
board member of the IACR, the International Association of Cryptologic
Resarch. Dr. Wolf is the only German board member and is responsible for
the IACR Newsletter and its web presentation. The IACR is the worldwide
professional association of cryptologists and has more than 1500 members
all over the world.
Trust 2010
==========
On 21 - 23 June the third international conference on "Trust and
Trustworthy Computing" will take place in Berlin. This time it will be
organized by Professor Ahmad-Reza Sadeghi. The conference deals with the
technical and socio-economic aspects of trustworthy infrastructures. It
provides an excellent interdisciplinary forum for researchers,
practitioners, and decision makers to explore new ideas and discuss
experiences in building, designing, using, and understanding trustworthy
computing systems. For further information go to http://www.trust2010.org
Start of new project work "Unique"
==================================
Professor Ahmad-Reza Sadeghi and his team are participating in a new
project co-financed by the European Commission under EU Framework
Programme 7. The project is running for 2.5 years. The consortium of the
UNIQUE project consists of eight European organizations. UNIQUE brings
together five academic and research institutions (including three
leading universities and two research SMEs) and three large
microelectronics companies from six European countries (Austria,
Belgium, France, Germany, Ireland and the Netherlands). These
organisations link basic research and security design to applied
research and end-user producers for consumers and industry. The UNIQUE
project aims to increase the protection of hardware systems against
counterfeiting, cloning, tampering, reverse engineering and insertion of
malicious components. For more information see
http://www.trust.rub.de/projects/unique
Workshop on "Generic Ring Algorithms"
=====================================
On 13 - 15 January, the workshop "Generic Ring Algorithms" took place at
the Ruhr University Bochum. It was organized by the HGI member Tibor
Jager. Invited speakers included Alex Dent (Royal Holloway University
London), Divesh Aggarwal (ETH Zürich), Andy Rupp (University of
Massachusetts) and Vishal Saraswat (University of Massachusetts). Talks
were given on analysis of cryptographic assumptions in idealized models
of calculation such as the "Generic ring model". Additionally, the
extent to which these models reflect reality was discussed. The
financial support of the RUB Research School is gratefully acknowledged.
Guests
======
1 - 4 February 2010 **Kimmo Järvinen** (Helsinki University of
Technology, Finland), Lehrstuhl für Systemsicherheit; Topic: Research
Cooperation within the EU CACE (Computer Aided Cryptography Engineering)
26 - 29 May 2010 **Orr Dunkelmann** (Weizmann Institute of Science,
Israel), Lehrstuhl für Eingebettete Sicherheit; Topic: Practical-Time
Attacks on the KASUMI Cryptosystem Used in GSM and 3G Telephony
Programme Committees
====================
Christof Paar: **COSADE 2010**, Workshop on Constructive Side-Channel
and Secure Design, Darmstadt, 4 - 5 February 2010
Workshops
=========
Ahmad-Reza Sadeghi: **TRUST 2010** 21-23 June 2010, Berlin
Ernesto Damiani, Nils Gruschka, Florian Kerschbaum, Jörg
Schwenk: **First IEEE International Workshop on Web Service and
Business
Process Security, WSBPS** colocated with IEEE SERVICES 2010,
Miami, FL, USA, 5 - 10 July 2010, Miami, Florida, USA
Meiko Jensen, Christoph Meinel, Michael Menzel, Jörg Schwenk, Ivonne
Thomas: **Workshop on Services Security (WS2'10)** to be held at
ISSE/SICHERHEIT
2010, 5 - 7 October 2010, Berlin
Invited talks
=============
Ahmad-Reza Sedeghi: **Trusted Computing - State of the Art and New
Chalenges**, Wuhan University, China; November 2009
Frederik Armknecht: **Constructing Full-Homomorphic Encryption Schemes
from Coding Theory**, InfoMaTech - Seminar, FHDW Hannover; December 2009
Alexander May: **Lösen von RSA Problemen mittels Gitterreduktion**,
Mathematisches Kolloquium Oldenburg; 6 January 2010
http://www.mathematik.uni oldenburg.de/sveraninhalt.phtml?veranid=228
Alexander May: **Attacking Power Generators Using Unravelled
Linearization: When Do We Output Too Much?**, Early Symmetric Crypto
(ESC) Seminar, Remich, Luxembourg; 11 - 15 January 2010
https://cryptolux.org/ESC/Alexander_May
Meiko Jensen: **A Security Modeling Approach for Web-Service-based
Business Processes**, FIM colloquium, Universität Passau; January 2010
Jörg Schwenk: **Cloud Computing Security**, Münchner Kreis, München; 4
February 2010 http://www.muenchner-kreis.de/pdfs/TrustInIT/Schwenk.pdf
Christof Paar: **Application of Physical Attacks to Real World Systems"
auf dem Workshop Provable Security against Physical Attacks**, Lorentz
Center in Leiden/Niederlande; 15 - 19 February 2010
Talks
=====
Christian Wachsmann: **Anonymizer-Enabled Security and Privacy for
RFID**, International Conference on Cryptology and Network Security,
Kanazawa, Japan; December 2009
Frederik Armknecht: **Memory Leakage-Resilient Encryption based on
Physically Unclonable Functions**, ASIACRYPT - 15th International
Conference on the Theory and Application of Cryptology and Information
Security; December 2009.
Sven Schäge, Jörg Schwenk: **A CDH-Based Ring Signature Scheme with
Short Signatures and Public Keys**, Financial Cryptography and Data
Security '10, Tenerife, Canary Islands, Spain; 25 - 28 January 2010
HGI Colloquium
==============
3 December 2009 Mathias Herrmann / Ruhr-University Bochum:
**Attacking Power Generators Using Unravelled Linearization**
10 December 2009 Michael Silbermann / Ruhr-University Bochum:
**Security Analysis of Contactless Payment Systems in Practice**
17 December 2009 Henrich C. Pöhls / ISL Passau: **Digital Signatures and
Context-Loss - How Digital Signatures might
facilitate Data Protection Claims in SOA**
14 January 2010 Wilfried Karden / Innenministerium NRW:
**Wirtschaftsspionage**
21 January 2010 Martin Novotný / FEE CTU Praque: **Implementing MQ
cryptosystems - Problems and Challenges**
28 January 2010 Meiko Jensen / Ruhr-University Bochum: **On Technical
Security Issues in Cloud Computing**
4 February 2010 Florian Kerschbaum / SAP: **Security Challenges in
Supply Chain Management**
15 April 2010 Alessandro Barenghi / Politecnico di Milano: **Attacking
AES 256 Through Low Voltage Faults**
22 April 2010 Ralf Zimmermann / EMSEC: **Implementing the Elliptic Curve
Method (ECM) on Special-Purpose Hardware**
28 April 2010 Juan Garay / AT&T Labs (Research): **A Framework for the
Sound Specification of Cryptographic Tasks**
29 April 2010 Thorsten Holz / EMMA: **Honeypots, Botnets, Malware
Analysis, and more - Introducing the
Embedded Malware Group**
6 May 2010 Albrecht Petzold / TU Darmstadt: **A Multivariate Signature
Scheme with a Partially Cyclic Public Key**
20 May 2010 Mathias Herrmann / CITS: **Maximizing Small Root Bounds by
Linearization and Applications to
Small Secret Exponent RSA**
27 May 2010 Orr Dunkelman / The Weizmann Institute of Science: **A
Practical-Time Attack on the KASUMI Cryptosystem Used in GSM and 3G
Telephony**
10 June 2010 Thorsten Mehlich / RUB: **Strategien für effiziente
Skalarmultiplikation**
17 June 2010 Roberto Avanzi / RUB: **Arithmetic of Supersingular Koblitz
Curves in Characteristic Three**
24 June 2010 Christopher Wolf / AG LTS (Long Term Security):
**Äquivalente Schlüssel in Multivariaten Quadratischen Systemen**
1 July 2010 Juraj Somorovsky / NDS: **Streaming-based verification of
XML Signatures in SOAP Messages**
5 July 2010 Susanne Wetzel / Stevens Institute of Technology, USA
8 July 2010 Peter Schwabe / Eindhoven University of Technology: **New
Software Speed Records for Cryptographic Pairings**
15 July 2010 Alexander Meurer / CITS: **Correcting Errors in RSA Private
Keys**
The abstracts are available at
http://www.hgi.rub.de/hgi/hgi-seminar/aktuelles/
Publications
============
F. Armknecht, R. Maes, A. Sadeghi. B. Sunar, P. Tuyls: **Memory
Leakage-Resilient Encryption based on Physically Unclonable
Functions**, ASIACRYPT - 15th Annual International Conference on the
Theory and Application of Cryptology and Information Security, 2009
Serdar Cabuk, Chris I. Dalton, Konrad Eriksson, Dirk Kuhlmann,
HariGovind V. Ramasamy, Gianluca Ramunno, Ahmad-Reza Sadeghi, Matthias
Schunter, Christian Stüble: **Towards automated security policy
enforcement in multi-tenant virtual data centers** Journal of Computer
Security, IOS Press, Vlo. 18, Number 1, pp. 89-121, 2010
Mathias Herrmann, Alexander May: **Maximizing Small Root Bounds by
Linearization and Applications to Small Secret Exponent RSA** 13th
International Conference on Practice and Theory in Public Key
Cryptography 2010, May 26-28, 2010, ENSParis, France
http://pkc2010.di.ens.fr/accepted%20paper.htm
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas
Schneider: **Embedded SFE: Offloading Server and Network using Hardware
Tokens** 14th International Conference on Financial Cryptography and
Data Security (FC 2010), January 25-28, Tenerife, Canary Islands, Spain,
Talk given by Thomas Schneider
Meiko Jensen, Nils Gruschka, Ralph Herkenhöner: **A survey of attacks on
web services** In Computer Science - Research and Development (CSRD):
Volume 24, Issue 4 (2009), Page 185. Springer Berlin/Heidelberg.
Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann:
**Anonymizer-Enabled Security and Privacy for RFID** 8th International
Conference on Cryptology And Network Security (CANS),Kanazawa, Japan,
December 2009, Proceedings, volume 5888 of LNCS, pages 134-153.
Springer-Verlag, 2009
Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg: **Efficient
Privacy-Preserving Face Recognition** 12th International Conference on
Information Security and Cryptology (ICISC 2009), December 2-4, Seoul,
Korea, Talk was given by Immo Wehrenberg
Steffen Schulz, Ahmad-Reza Sadeghi: **Extending IPsec for Efficient
Remote Attestation** 14th International Conference on Financial
Cryptography and Data Security (FC 2010), January 25-28, Tenerife,
Canary Islands, Spain, Talk given by Ahmad-Reza Sadeghi
Information
===========
Subscribe:
If you wish to subscribe to the HGI News by email, you can do so at
http://lists.ruhr-uni-bochum.de/mailman/listinfo/hgi-news-international
Unsubscribe:
If you wish to unsubscribe from the HGI News, please visit
http://lists.ruhr-uni-bochum.de/mailman/listinfo/hgi-news-international
Download:
All HGI-Newsletters (both English and German) can be downloaded from:
http://www.hgi.rub.de/hgi/newsletter
Editor:
Anja Nuss, Email: an at hgi.rub.de
Executive Director of the Horst Görtz Institute:
Prof. Dr. Jörg Schwenk, Email: Joerg.Schwenk at rub.de
--
Anja Nuß
Scientific Coordinator
Horst Görtz Institute
Room IC 4 / 147
Ruhr-University Bochum
DE-44780 Bochum, Germany
Phone: +49 (234) 32 - 27722
Fax: +49 (234) 32 - 14886
URL: www.hgi.rub.de
More information about the HGI-News-International
mailing list