[crypto] [secdm at tue.nl: Program Crypto Working Group, May 23, 2014]

R. Hirschfeld ray at unipay.nl
Thu May 22 11:44:55 CEST 2014


------- Start of forwarded message -------
From: Secretariaat DM <secdm at tue.nl>
To: Secretariaat DM <secdm at tue.nl>
Subject: Program Crypto Working Group, May 23, 2014

Dear all,

Herewith I send you the program of the CWG-meeting on Friday, May 23, 2014.

With kind regards / Met vriendelijke groeten,
Anita Klooster
secretary of the section Discrete Mathematics

[cid:image001.gif at 01CB8FB5.88A9C0F0]

Dept. of Mathematics and Computer Science
MF 4.058
Office hours: Monday and Friday 08.30-12.30 h / Tuesday and Wednesday 08.30-17.00 h
Telephone: +31 (0)40 2472254
Email: secdm at tue.nl<mailto:secdm at tue.nl>


CRYPTO WORKING GROUP


Friday, May 23, 2014

                                                De Kargadoor (http://www.kargadoor.nl/utrecht/zaalverhuur.html)
                                                Oudegracht 36, Utrecht



Program

10.45 - 11.30 hrs.   Christian Dörr (TU Delft),
                                               The Ineffectiveness of Network Security Policies against Advanced Cyber Threats
Rethinking Security Practices after Stuxnet & Co

11.30 -  11.45 hrs.   Coffee / tea break

11.45 - 12.30 hrs.    Nadia Heninger (Univ. of Pennsylvania),
                                               Approximate common divisors via lattices

12.30 -  14.00 hrs.   Lunch break (lunch not included)


14.00 - 14.45 hrs.    Roel Verdult (RU Nijmegen),

                                   Do you trust the cryptography used in your devices?


14.45 - 15.00 hrs.    Coffee / tea break


15.00 - 15.45 hrs.    Andreas Hülsing (TU/e),

                                               Practical Forward Secure Signatures using Minimal Security Assumptions





Abstract talk Christian Dörr: The Ineffectiveness of Network Security Policies against Advanced Cyber Threats, Rethinking Security Practices after Stuxnet & Co
Little was known when next generation cyber threats that combine a multitude of attack vectors to penetrate their target were discovered, especially how these the threats are spreading once deployed and which protection methods are suitable contain an infection. This talk presents the results of a 6-month study at a large research institution with 20 000 participants to investigate the mechanics of how such new threats would propagate inside an organization and how effective current network protection practices are against these adversaries. The measurements show that current best practices do not provide any protection against such hybrid vectors and deviations from security policies by single individuals can render the security measures of an entire organization useless. New policies may however save the day against some of these threats: If rigiously applied it is possible to sufficiently slow down and contain intruders to limit the overall impact of a breach.
------- End of forwarded message -------


More information about the crypto mailing list