Our researchers plan future research in cooperation with NII:
- Dr. N. Sonehara, Information and Society Research Director at NII and Project Reader at ROIS/TRIC.
- Dr. Y. Ichifuji, ROIS/TRIC
- Dr. I. Echizen, Associate Professor at NII.
- Dr. S. Wohlgemuth, Associate Professor at NII and ROIS/TRIC
Starting at 3pm
Dr. N. Sonehara, “Data-centric Socio-Informatics Supporting Public Policy Decision Making, NII and ROIS/TRIC.
Dr. Y. Ichifuji, “Web Data Driven Information Circulation and Its application of Resilience Evaluation”, ROIS/TRIC
Dr. I. Echizen, “Multimedia Location Privacy Control Mechanism”, NII
Dr. S. Wohlgemuth, “Resilient Social System Design Methods”, ROIS/TRIC, Associate Professor at NII / ROIS
The team of the Technical University of Vienna “We_0wn_Y0u” could achieve victory at the iCTF 2011 under the direction of Adrian Dabrowski. In a very exciting, nine-hour competition against 85 international competing teams, also Martin Mulazzani, Peter Frühwirt and Manuel Leithner put, as representatives of SBA Research, their skills regarding attacks and defenses of IT infrastructure to the test.
With a broad international participation field (i.a. US, Russia and China), iCTF is one of the the largest Capture-the-Flag contests worldwide. Foto
“We have subjected the cloud solution from A1 to an architecture analysis and can confirm that the data in the A1 Austria Cloud are stored only on servers that are operated in Austria,” confirms Markus Klemen, CEO of Secure Business Austria Research. (mehr…)
Guest talk: A Bird’s-Eye View of Optimal Codes and Symmetric Cryptography from Combinatorial Designs
A Bird’s-Eye View of Optimal Codes and Symmetric Cryptography from Combinatorial Designs
Dimitris E. Simos, Department of Mathematics, National Technical University of Athens,
Abstract: In the past few decades, combinatorial design theory has grown to encompass a wider variety of investigations, many of which are not apparently motivated by any practical application. Rather, they are motivated by a desire to obtain a coherent and powerful theory of existence and properties of designs. Nevertheless, it comes as no surprise that applications in coding theory and communications continue to arise, and also that designs have found applications in new areas. Cryptography in particular has provided a new source of applications of designs in computer science, and simultaneously a field of new and challenging problems in design theory.
In this lecture, we present a number of applications of combinatorial designs in which the connection with classes of optimal codes and modern symmetric (private-key) cryptography appears to be substantial and meaningful. In the first part, we present some new results for self-dual codes and quasi-cyclic codes and exemplify some of their advantages in terms of encoding and decoding. In the continuum, we survey recent powerful private-key cryptosystems from special classes of combinatorial designs, that posses beautiful combinatorial properties. Practical aspects of the cryptosystems, in terms of security and cryptanalysis are analyzed and examples of real-time encryption and decryption are provided using cryptographic algorithms. We conclude, by providing a state-of-the-art comparison of private-key block ciphers in the field of modern cryptography.
Clemens Kolbitsch recently finished his PhD supervised by Engin Kirda and Chris Kruegel. Tomorrow, he will present his paper “The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious Code” at CCS 2011. Clemens will shortly join our partner company TLLOD.
Manuel Leithner presented weaknesses of Facebook, WLANs and Smartphones on ORF (youtube).
We are going to present our social snapshot forensic tool at the Annual Computer Security Applications Conference (ACSAC) 2011.
Recently, academia and law enforcement alike have shown a strong demand for data that is collected from online social networks. In this work, we present a novel method for harvesting such data from social networking websites. Our approach uses a hybrid system that is based on a custom add-on for social networks in combination with a web crawling component. The datasets that our tool collects contain profile information (user data, private messages, photos, etc.) and associated meta-data (internal timestamps and unique identifiers). These social snapshots are significant for security research and in the field of digital forensics. We implemented a prototype for Facebook and evaluated our system on a number of human volunteers. We show the feasibility and efficiency of our approach and its advantages in contrast to traditional techniques that rely on application-specific web crawling and parsing. Furthermore, we investigate different use-cases of our tool that include consensual application and the use of sniffed authentication cookies. Finally, we contribute to the research community by publishing our implementation as an open-source project.
You can find the paper here: Social Snapshot ACSAC11 preprint
On ARES’ last day, an informal workshop on research collaborations was held. Participants from Japan were Prof. Dr. Ryoichi Sasaki
Tokyo Denki University, Prof. Dr. Noboru Sonehara, National Institute of Informatics, Prof. Dr. Isao Echizen, National Institute of Informatics, Dr. Sven Wohlgemuth, National Institute of Informatics.