Items from security-related news (E76.Jan-2007)
Announcement
Call for Proposals for Fellowships from post-doctoral researchers, junior faculty and
research scientists.
The Institute for Information Infrastructure Protection (I3P) has issued a
Call for Proposals from post-doctoral researchers, junior faculty and
research scientists.
Applicants must submit proposals to the host institutions by February 7,
2007. Host Institutions must submit completed application packets to the
I3P by February 21, 2007. For more information about application
requirements see: http://www.thei3p.org/fellowships/2007callforproposals.html
I3P Research Areas of Interest:
The Institute for Information Infrastructure Protection (The I3P) is a
Consortium that includes academic institutions, federally-funded labs and
non-profit organizations. The I3P funded by the Department of Homeland
Security and the National Institute of Standards and Technology. The I3P
is managed by Dartmouth College.
Network Security Group at Institute for Infocomm Research - a national
research institute fully funded by Singapore government, is looking for
a network security researcher. This is a full-time position in our core
headcount. A 2-3 year contract will be offered and is renewable subject
to the candidate's performance.
Our group is active in the security community, and has established
extensive collaborations with local and overseas universities and
research institutes. We are also involved in an EU-funded project. More
information is available at http://icsd.i2r.a-star.edu.sg/staff/nsl/
The candidate should have a PhD degree with strong background on network
security, especially on wireless sensor network security. (MSc with
independent R&D capability may also be considered.) The candidate is
expected to do research on network security, create valuable
intellectual properties, publish papers at leading conferences and
journals, and produce project deliverables in time. If you are
interested in this job, please send your CV to Jianying Zhou
All events take place at the Hilton Tobago Resort unless otherwise noted.
Sunday, February 11, 2007
5:00pm-7:00pm
7:30am-8:30am
8:30am-8:45am
8:45am-9:00am
9:00am-10:00am
Mike Bond
This talk explores the hypothesis that it is safer and better for
designers to give the bad guys their cut, but to keep it small, and
keep in control. It may not just be our systems but also our protocol
building blocks that should be designed to make room for the bad guy
to take his cut. The talk is illustrated with examples of very
successful systems with known weaknesses, drawn primarily from the
European EMV payment system, and banking security in general. We also
discuss a few "too secure" systems that end up failing in worse ways
as a result.
10:00am-10:30am
10:30am-12:00pm
Vulnerabilities in First-Generation RFID-enabled Credit Cards,
Conditional E-Cash,
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against
Splitting,
A Model of Onion Routing with Provable Anonymity,
K-Anonymous Multi-party Secret Handshakes,
Using a Personal Device to Strengthen Password Authentication from an
Untrusted Computer,
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups,
On Authentication with HMAC and Non-Random Properties,
11:00am-12:00pm
Hidden Identity-Based Signatures,
Space-Efficient Private Search,
Cryptographic Securities Exchanges,
Improved multi-party contract signing,
Informant: Detecting Sybils Using Incentives,
Dynamic Virtual Credit Card Numbers,
The unbearable lightness of PIN cracking,
12:00pm-1:00pm
Title: Usable SPACE: Security, Privacy, and Context for the Mobile User
Personal Digital Rights Management for Mobile Cellular Devices,
Certificate Revocation using Fine Grained Certificate Space Partitioning,
An Efficient Aggregate Shuffle Argument Scheme,
12:00pm-1:00pm
Institute for Information Infrastructure Protection (I3P)
Contributed by Patricia Erwin
January 3, 2007
Announcement
Security Research Position, Singapore
Contributed by Jianying Zhou
December 24, 2006
Announcement
Preliminary Program, Financial Cryptography 2007
Contributed by Sven Dietrich
Registration reception
poolside Hilton Tobago Resort
Monday, February 12, 2007
Breakfast and Registration
Welcome, Minister of Finance (tentative)
Conference opening, Conference Chairs
Keynote Address
Title: Leaving Room for the Bad Guys
When designing a crypto protocol, or building a large security
architecture, no competent designer ignores considering the bad guy,
and anticipating his plans. But often we designers find ourselves
striving to build totally secure systems and protocols -- in effect
writing the bad guys entirely out of the equation. In a large system,
when you exclude the bad guys, they soon muscle their way in
elsewhere, and maybe in a new and worse way over which you may have
much less control. A crypto protocol with no known weaknesses may be a
strong tool, but when it does break, it will break in an unpredictable
way.
Break
Technical Paper Session
Payment Systems
Thomas S. Heydt-Benjamin (University of Massachusetts Amherst, USA),
Daniel V. Bailey (RSA Laboratories, USA),
Kevin Fu (University of Massachusetts Amherst, USA),
Ari Juels (RSA Laboratories, USA), and Tom O'Hare (Innealta, Inc.)
Larry Shi and Bogdan Carbunar (Motorola Labs) and Radu Sion
(Stony Brook University, USA)
Liqun Chen (HP Laboratories), Alberto Escalante, Hans Loehr,
Mark Manulis, and Ahmad-Reza Sadeghi (Horst Goertz Institute Bochum, Germany)
Lunch
1:00pm-2:30pm
Panel: RFID - yes or no, Moderator: Kevin Fu
2:30pm-3:00pm
Break
3:00pm-4:00pm
Technical Paper Session
Anonymity
Joan Feigenbaum (Yale University), Aaron Johnson (Yale University, USA),
and Paul Syverson (Naval Research Laboratory, USA)
Shouhuai Xu (UTSA) and Moti Yung
(RSA Laboratories and Columbia University, USA)
Adjourn
6:00pm-9:00pm
Reception
Location: TBA
Tuesday, February 13, 2007
7:30am-9:00am
Breakfast
9:00am-10:30am
Technical Paper Session
Authentication
Mohammad Mannan and Paul C. van Oorschot (Carleton University, Canada)
Yvo Desmedt (University College London, UK),
Tanja Lange (Eindhoven University of Technology, Netherlands) and
Mike Burmester (Florida State University, USA)
Christian Rechberger and Vincent Rijmen
(Graz University of Technology, Austria)
Break
Technical Paper Session
Anonymity and Privacy
Aggelos Kiayias and Hong-Sheng Zhou (University of Connecticut, USA)
George Danezis and Claudia Diaz (K.U. Leuven, Belgium)
Adjourn - Box Lunches Available
8:00pm-9:00pm
IFCA General Meeting, Location: TBD
9:00pm-12:00am
Rump Session
Location: TBD
Wednesday, February 14, 2007
7:30am-9:00am
Breakfast
9:00am-10:30am
Technical Paper Session
Cryptography and Commercial Transactions
Christopher Thorpe and David C. Parkes (Harvard University, USA)
Aybek Mukhamedov and Mark Ryan (University of Birmingham, UK)
N. Boris Margolin and Brian Neil Levine
(University of Massachusetts Amherst, USA)
Break
11:00am-12:00pm
Technical Paper Session
Financial Transactions & Web Services
Ian Molloy (Purdue University, USA), Jiangtao Li (Intel Corporation)
and Ninghui Li (Purdue University, USA)
Omer Berkman (The Academic College of Tel Aviv Yaffo, Israel)
and Odelia Moshe Ostrovsky (Algorithmic Research Ltd.
and Tel Aviv University, Israel)
Lunch
Panel: Virtual Economies - Threats and Risks, Moderator: Jean Camp
2:30pm-3:00pm
Sponsor Presentation: TBD
3:00pm
Adjourn
6:00pm-9:00pm
Beach BBQ
Location: TBA
10:00pm-??
Event (TBA)
Thursday, February 15, 2007
7:30am-9:00am
Breakfast
9:00am-10:00am
Invited Talk --- Dawn Jutla
Users breach the security of data within many financial applications
daily as human and/or business expediency to access and use
information wins over corporate security policy
guidelines. Recognizing that changing user context often requires
different security mechanisms, we discuss end-to-end solutions
combining several security and context mechanisms for relevant
security control and information presentation in various mobile user
situations. We illustrate key concepts using Dimitri Kanevsky's (IBM
Research) early 2000s patented inventions for voice security and
classification.
Break
10:30am-11:00am
System paper session
Siddharth Bhatt (Stony Brook University, USA),
Carbunar Bogdan (Motorola Labs), Radu Sion (Stony Brook University, USA),
and Venu Vasudevan (Motorola Labs)
Technical Paper Session
Cryptography
Vipul Goyal (UCLA, USA)
Jun Furukawa (NEC Corporation, Japan) and
Hideki Imai (National Institute of Advanced Industrial Science and
Technology, Japan)
Conference closing/Lunch, Conference Chairs