The objective of the Action is to improve and adapt the existent cryptanalysis methodologies and tools to the ubiquitous computing framework. This objective is divided in four sub-objectives:
Introduce security and privacy models in ubiquitous computing systems in order to provide a rigorous framework for the cryptanalysis and design contributions.
Improve the cryptanalysis methods, focusing on primitives and protocols designed for ubiquitous computing systems.
Develop side-channel attacks methodologies and tools and reverse-engineering techniques suitable to ubiquitous computing systems.
Analyze the security of real-world systems including privacy issues related to the data collected by these systems.