To achieve the main objective, Action Participants will directly contribute with knowledge and skills to secondary objectives identified below:

  • Introduce security and privacy models in ubiquitous computing systems in order to provide a rigorous framework for the cryptanalysis and design contributions.
  • Improve the cryptanalysis methods, focusing on primitives and protocols designed for ubiquitous computing systems.
  • Develop side-channel attacks methodologies and tools and reverse-engineering techniques suitable to ubiquitous computing systems.
  • Analyze the security of real-world systems including privacy issues related to the data collected by these systems.