COST Action IC1403: Cryptanalysis in Ubiquitous Computing Systems

Recent technological advances in hardware and software have irrevocably affected the classical picture of computing systems. Today, these no longer consist only of connected servers, but involve a wide range of pervasive and embedded devices, leading to the concept of “ubiquitous computing systems”. The objective of the Action is to improve and adapt the existent cryptanalysis methodologies and tools to the ubiquitous computing framework. Cryptanalysis, which is the assessment of theoretical and practical cryptographic mechanisms designed to ensure security and privacy, will be implemented along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. Researchers have only recently started to focus on the security of ubiquitous computing systems. Despite the critical flaws found, the required highly-specialized skills and the isolation of the involved disciplines are a true barrier for identifying additional issues. The COST Action CRYPTACUS established a network of complementary skills in cryptography, information security, privacy, and embedded systems to address scientific challenges related to Cryptanalysis in Ubiquitous Computing Systems.


Security of Ubiquitous Computing System – Selected Topics, 2021

This open-access book targets engineers and researchers in computer sciences, mathematics, and electrical engineering, not necessarily experts in security. Each chapter is presented in a 5-minute teaser video available below.

Cryptacus' Book


OPEN-ACCESS BOOK
HARDCOVER
BIBTEX FILE


TABLE OF CONTENTS – TEASER VIDEOS

INTRODUCTION 1
(J. Hernandez-Castro, CRYPTACUS’ Vice-chair)

INTRODUCTION 2
(G. Avoine, CRYPTACUS’ Chair)

CHAPTER 1
Emerging Security Challenges for Ubiquitous Devices
(M. Kutyłowski, P. Syga and M. Yung)

CHAPTER 2
Catalog and Illustrative Examples on Lightweight Cryptographic Primitives
(A. Mileva, V. Dimitrova, O. Kara, and M. J. Mihaljević)

CHAPTER 3
An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families
(V. Mikhalev, M. J. Mihaljević, O. Kara, and F. Armknecht)

CHAPTER 4
An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families
(T. Ashur and A. Luykx)

CHAPTER 5
E-Passport and e-ID technologies
(L. Hanzlik and M. Kutyłowski)

CHAPTER 6
Ultra-lightweight Authentication
(X. Carpent, P. D’Arco, and R. De Prisco)

CHAPTER 7
From Relay Attacks to Distance-bounding Protocols
(G. Avoine, I. Boureanu, D. Gérault, G. P. Hancke, P. Lafourcade, and C. Onete)

CHAPTER 8
It Started With Templates: The Future of Profiling in Side-channel Analysis
(L. Batina, M. Djukanovic, A. Heuser, and S. Picek)

CHAPTER 9
Side Channel Analysis Attack Assessment Platforms and Tools for Ubiquitous Systems
(A. P. Fournaris, A. Moschos, and N. Sklavos)

CHAPTER 10
Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators
(D. Hurley-Smith and J. Hernandez-Castro)

CHAPTER 11
Finding software bugs in embedded devices
(A. Francillon, S. L. Thomas, and A. Costin)

CHAPTER 12
Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach
(A. Solanas, E. Batista, F. Casino, A. Papageorgiou, and C. Patsakis)

CHAPTER 13
IoT Forensics
(S. Mrdovic)


COST_LOGO_rgbEU-FLAG_rgb_304dpi

Funded by the Horizon 2020 Framework Programme of the European Union