Wouter Joossen - IBBT Security departement


Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Wouter Joossen - IBBT Security departement

  1. 1. security departement<br />security, privacy and trust of E-*<br />13/10/2011<br />1<br />
  2. 2. Enhance the leading position <br />of ICT-security research in Flanders<br />Essential objectives: <br />perform first class basic and applied research in key areas from ICT security (core)<br />transfer the acquired basic knowledge into the economy (traditional notion of valorization)<br />lower the cost of regulatory compliance of new hardware, software and applications (specific: valorization)<br />contribute actively to training of undergraduate and PhD students, and of industry (valorization too)<br />2<br />
  3. 3. Context, application and technology trends<br />Securityis directly related to dependability, and to trustworthiness – trustworthiness will remain essential <br /> Security cannot be achieved as an after-thought; core to software applications and the development & deploymentprocesses<br /> Security problems arise anywhere in systems (not only at front- and backdoors): end-to-end quality is required.<br />Trustworthiness requires full life-cycle support (management support)<br />3<br />
  4. 4. security, privacy & trust of E-*:application areas<br />E-health<br />E-media<br />E-society<br />E-commerce<br />E-logistics<br />E-banking<br />…<br />
  5. 5. Security Expertise (1/2)<br />Secure programming languages (Clarke, Piessens, Joosen)<br />Security middleware and component frameworks (Piessens, Desmet, Joosen) <br />Secure development process (Scandariato, Joosen) <br />Security monitoring and management (Desmet, Huygens, Joosen) <br />Security for computer networks and pervasive systems (Verbaeten, Huygens, Preneel, Verbauwhede) <br />Security for ad-hoc and wireless networks (Preneel, Verbauwhede)<br />Privacy enhancing technologies, identity management (De Decker, Preneel) <br />Cryptographic software and software obfuscation (Piessens, Preneel)<br />Cryptographic hardware and embedded systems (Verbauwhede, Preneel, Rijmen)<br />Document security, watermarking and perceptual hashing (Preneel)<br />Trusted computing (Verbauwhede, Preneel) <br /> Legislation, compliance & policy(Dumortier, ) <br />
  6. 6. Security Expertise (2/2 and incomplete)<br />Cryptographic algorithms and protocols, foundations of cryptography and provable security (Rijmen, Preneel) <br />Risk management (Huygens. Joosen)<br />Authorisation technologies (Piessens, Joosen, Desmet)<br />Secure System Software (Piessens, Joosen)<br />HW implementation of DRM, watermarking and perceptual hashing (Verbauwhede, Preneel, Rijmen)<br />Side-channel attacks and countermeasures (Verbauwhede, Rijmen, Preneel)<br />Embedded biometry (Verbauwhede, Tuyls)<br />Security for RFID’s, smart-cards, sensor nodes (Verbauwhede, Batina, Preneel, Huygens, Joosen) <br />Evaluation of system security, including requirements, security architectures, software, hardware, cryptographic libraries and smart cards (All)<br />
  7. 7. Missionrevisited<br />Security Middleware<br />Privacy<br />Cryptography<br />Watermarking<br />DRM<br />Secure Programming Languages<br />Biometric<br />“To be a one stop shop for security research”<br />Secure Development<br />Risk Management<br />
  8. 8. “one-stop-shopfor ICT security research” <br />5 research programs:<br />embeddedsecurity<br />privacy & identity management<br />programming secure software<br />securitythrough the engineering process<br />legal research, regulatory & policyframeworkfor ICT<br />securingdistributed software<br />
  9. 9. The European context (FP7-IST call 8)<br />Track record:<br />About 20 FP6/FP7 projects that relate to trust and security<br />Currently featuring two NoE’s:<br />Cryptology, Bart Preneel from COSIC is currently coordinating ECRYPT II (Network of Excellence on Cryptology), which is a successor to ECRYPT.<br />Service Engineering: WouterJoosen (DistriNet) currently is the Research Director of NESSoS: Engineering Secure Software and Systems for Future Internet Services.<br />… lead generators for new EU projects<br />9<br />
  10. 10. For the business – applied to many hot application domains:<br />Assurance, compliance of new applications, typically Future Internet Services<br />Cloud computing (the next big one after SOA)<br />IoT and embedded software and systems<br />Very long term: Enabling Cost and Risk Assessment<br />For Society: focus on<br />Privacy (Social Networks)<br />Cybercrime<br />10<br />
  11. 11. Service Provider<br />GPS<br />GSM<br />Another example: NextGenITS [ICON]<br />Privacy preserving Electronic Toll<br />Only final fee transmitted to Service Provider<br />Only driver has access to location data<br />Authenticity of reported fee and location data<br />Confidentiality of communications<br />GPS Satellites<br />Driver<br />Fee Calculation<br />Updates<br />OBU<br />Bill<br />Fee Reporting<br />Encrypted Location Data<br />
  12. 12. One Example: Bravehealth (FP7-IP 2010-2013)<br />The BRAVEHEALTH system will enable the integration of services provided by mobile resources, legacy applications, data and computing intensive services within a mobile grid to offer personalized e-health services to mobile, nomadic, stationary users.<br />12<br />
  13. 13. Our broader context for strategic research<br />13<br />13/10/2011<br />Focus <br />of this talk<br />
  14. 14. Three basic themes in the SecCAS program<br />End to end data protection<br />Improved security in multi-tenant applications<br />Client-centric protection<br />14<br />
  15. 15. Into the market…Some Important trends in cloud security:<br />Cloud security gateways<br />Cloud based recovery Services<br />MDM: Mobile Device Management Services<br />High Assurance Public Identity Providers<br />13/10/2011<br />15<br />
  16. 16. Conclusion:what it means for the ICON programme<br />We have a lot on our plates!<br />New projects being developed:<br />Mobile device management<br />Security and management dashboards<br />Cloud security Gateways for and by SaaS providers<br />Enhancing the reliability of “social networks” in integrated solutions…<br />Application cases: logistics, transport, health…!!!!<br />16<br />
  17. 17. Tank you, theTeam (>140 FTEs)<br />Prof. Dave ClarkeProf. Bart De DeckerProf. Danny Hughes<br />Prof. Christophe HuygensProf. Wouter JoosenProf. Frank Piessens<br />Prof. Yolande Berbers<br />Prof. Tom Holvoet<br />Prof. Bart Jacobs<br /><ul><li>15postdocs50+ junior researchers</li></ul>Prof. Bart PreneelProf. Vincent RijmenProf. Ingrid Verbauwhede<br />Prof. Claudia Diaz<br />7 postdocs40+ junior reserachers<br />ICRI:<br />Prof. JosDumortier<br />2 postdocs15+ junior researchers<br />17<br />
  18. 18. security departement<br />security, privacy and trust of E-*<br />13/10/2011<br />18<br />