Manuel Leithner’s book review was just published (DOI)
SBA Research is moving!
|Our new address: Floragasse 7, 1040 Vienna, Austria||Effective on: June 25, 2019||More at: www.sba-research.org/relocation|
New Scientist: Markus Huber has developed software to help police use online clues to solve offline crimes
Manuel Leitner is holding a lesson about UCC Privacy & Security in cooperation with CON.ECT. The talk is centered on multidimensional communication including audio, video, text and files. Threats endangering the privacy of the transmitted data are shown and defense strategies are presented in this talk.
Our paper has been accepted: Social Network Forensics: Tapping the Data Pool of Social Networks.
Internetsicherheit, Hacker und Datenschutz
Der weltweite freie Datenverkehr hat auch seine Schattenseiten: Unbekümmerte Internetuser gehen viel zu unvorsichtig mit ihren Daten um, wichtige Webseiten weisen oft ernste Schwachstellen auf, Hacker finden immer wieder neue Methoden, in Computersysteme einzudringen. Edgar Weippl (Institut für Softwaretechnik und Interaktive Systeme, TU Wien, sba-research), Christian Platzer und Gilbert Wondracek (Seclab, Institut für Rechnergestützte Automation, TU Wien) werden mögliche Gefahren aufzeigen, über Methoden von Hackern erzählen und gemeinsam diskutieren, ob es überhaupt jemals ein „sicheres“ Internet geben kann. (Termin, TU forum)
Guest talk: A Bird’s-Eye View of Optimal Codes and Symmetric Cryptography from Combinatorial Designs
A Bird’s-Eye View of Optimal Codes and Symmetric Cryptography from Combinatorial Designs
Dimitris E. Simos, Department of Mathematics, National Technical University of Athens,
Abstract: In the past few decades, combinatorial design theory has grown to encompass a wider variety of investigations, many of which are not apparently motivated by any practical application. Rather, they are motivated by a desire to obtain a coherent and powerful theory of existence and properties of designs. Nevertheless, it comes as no surprise that applications in coding theory and communications continue to arise, and also that designs have found applications in new areas. Cryptography in particular has provided a new source of applications of designs in computer science, and simultaneously a field of new and challenging problems in design theory.
In this lecture, we present a number of applications of combinatorial designs in which the connection with classes of optimal codes and modern symmetric (private-key) cryptography appears to be substantial and meaningful. In the first part, we present some new results for self-dual codes and quasi-cyclic codes and exemplify some of their advantages in terms of encoding and decoding. In the continuum, we survey recent powerful private-key cryptosystems from special classes of combinatorial designs, that posses beautiful combinatorial properties. Practical aspects of the cryptosystems, in terms of security and cryptanalysis are analyzed and examples of real-time encryption and decryption are provided using cryptographic algorithms. We conclude, by providing a state-of-the-art comparison of private-key block ciphers in the field of modern cryptography.
Edgar Weippl is elected as vice president and will continue organizing the ECRIM fellowship program for Austria.
IT-SeCX 11.11.11: Markus Huber presents “Social Snapshots – Digitale Forensik für Soziale Netzwerke” at ITSeCX (more…)
Ulrich Bayer did hold a lesson on secure development of web applications at the “IKT-Zentren Akademie” of 2011. The talk included a theoretical and practical introduction to secure web application development and the most common attack vectors. (mehr…)
Cloud Speicherdienste als Angriffsvektoren.
based on our Usenix Security 2011 Paper (Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space), we will present some recent updates at the Sicherheitskonferenz Krems