The objective of the Action is to improve and adapt the existent cryptanalysis methodologies and tools to the ubiquitous computing framework. This objective is divided in four sub-objectives:

Introduce security and privacy models in ubiquitous computing systems in order to provide a rigorous framework for the cryptanalysis and design contributions.

Improve the cryptanalysis methods, focusing on primitives and protocols designed for ubiquitous computing systems.

Develop side-channel attacks methodologies and tools and reverse-engineering techniques suitable to ubiquitous computing systems.

Analyze the security of real-world systems including privacy issues related to the data collected by these systems.