To achieve the main objective, Action Participants will directly contribute with knowledge and skills to secondary objectives identified below:
- Introduce security and privacy models in ubiquitous computing systems in order to provide a rigorous framework for the cryptanalysis and design contributions.
- Improve the cryptanalysis methods, focusing on primitives and protocols designed for ubiquitous computing systems.
- Develop side-channel attacks methodologies and tools and reverse-engineering techniques suitable to ubiquitous computing systems.
- Analyze the security of real-world systems including privacy issues related to the data collected by these systems.