Protecting ubiquitous applications: beyond the Byzantine threats model

ShareThis
Posted: 10-06-2007 01:54 | Views: 3288
Important Date: 13-06-2007
[Complete]
image

The speech will be held on Wednesday June 13th, at 18:15 – 19:15 in the Aretaios building (hall 3).


Lecture Abstract

The traditional security model for network applications developed over 30 years ago deals with threats in which the adversary can corrupt a bounded number of components. Although this model is adequate for network systems whose components are of a similar type (but operationally independent), it is not suitable for ubiquitous systems whose components may have very different features and be subject to a variety of constraints such as, power constraints (e.g., battery operated), communication/medium constraints (e.g., wireless) and computational constraints (restricted memory, IC footprint). In addition, some components may share a functionality, e.g., use the same OS, in which case the adversary may succeed in controlling large numbers of components by simply corrupting this functionality (e.g., infecting the OS with a virus).

While the goal of any security model is to provide holistic security, it is important that a dynamic and flexible approach is used.What is needed is a model that will guarantee holistic security if proven secure components are combined in a secure framework. In particular, replacing/adding components (or subsystems) by other proven secure components (subsystems) should not weaken the security of the system, or require a re-evaluation of its security---plug and play security mode.

The talk will focus on such issues including dependent component faults, light crypto tools and Universal Composability issues. We shall consider ubiquitous networks whose components range from RFIDs and sensors to PDAs, laptops, and servers, with topologies that combine fixed with wireless and ad hoc infrastructures (such as mesh networks).

Σχετικά με τον ομιλητή

Mike Burmester, Ph.D., is the Harris Professor of Computer Science at Florida State University, Tallahassee, Florida, and co-director of the SAIT Lab. He graduated from Athens University and received his Ph.D. from the University of Rome (La Sapienza), Italy. He joined the faculty at FSU in 2001 after more than 30 years of research and teaching at leading institutions around the world. Dr. Burmester has published more than 100 research papers in information security. His current research interests include cryptography, network security and ubiquitous applications. He is a fellow of the Institute of Mathematics and its Applications (FIMA), and a member of IEEE Computer Society and the International Association of Cryptological Research (IACR).


Back

News

Secretery Building (Building 3) 7 Tsirigoni Square Corfu, 49100 tel:26610 87760 / 87761 / 87763
e-mail: cs@ionio.gr
certification
<< <
April 2024
> >>
Mo Tu We Th Fr Sa Su
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Today, Friday 19-04-2024
No results found for that day
Text To SpeechText To Speech Text ReadabilityText Readability Color ContrastColor Contrast
Accessibility Options