Publications


Springer Open-Access Book, Spring 2019

 

The COST Action Cryptacus wrote an open-access book that will be publicly released in Spring 2019. More information is available on the Springer web page that introduces the book.

To promote the books, teasing videos have been recorded during the final Cryptacus conference that was held in Rennes, France, in September 2018.

  • Introduction: Gildas Avoine and Julio Hernandez-Castro
  • Chapter 1: Emerging Security Challenges for Ubiquitous Devices, Miroslaw Kutylowski, Piotr Syga, Moti Yung
  • Chapter 2: Catalog and Illustrative Examples on Lightweight Cryptographic Primitives, Aleksandra Mileva, Vesna Dimitrova, Orhun Kara, Miodrag J. Mihaljevic
  • Chapter 3: Selected Design and Analysis Techniques of Contemporary Symmetric Encryption, Vasily Mikhalev, Miodrag J. Mihaljevic, Orhun Kara, Frederik Armknecht
  • Chapter 4: An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families, Tomer Ashur, Atul Luykx
  • Chapter 5: E-Passport and e-ID technologies, Lucjan Hanzlik, Miroslaw Kutylowski
  • Chapter 6: Ultra-lightweight Authentication, Xavier Carpent, Paolo D’Arco, Roberto De Prisco
  • Chapter 7: From Relay Attacks to Distance-bounding Protocols, Gildas Avoine, Ioana Boureanu, David G\’erault, Gerhard P. Hancke, Pascal Lafourcade, Cristina Onete
  • Chapter 8: It Started With Templates: The Future of Profiling in Side-channel Analysis, Lejla Batina, Milena Djukanovic, Annelie Heuser, Stjepan Picek
  • Chapter 9: Side Channel Analysis Attack Assessment Platforms and Tools for Ubiquitous Systems, Apostolos P. Fournaris, Athanassios Moschos, Nicolas Sklavos
  • Chapter 10: Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators, Darren Hurley-Smith, Julio Hernandez-Castro
  • Chapter 11: Finding software bugs in embedded devices, Aurelien Francillon, Sam L. Thomas, Andrei Costin
  • Chapter 12: Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach, Agusti Solanas, Edgar Batista, Fran Casino, Achilleas Papageorgiou, Constantinos Patsakis
  • Chapter 13: IoT Forensics, Sasa Mrdovic

© 2018 Pôle audiovisuel Inria Rennes-Bretagne Atlantique


Awareness Meeting, Brussels, Belgium, November 2018

 

You can download a report on the awareness meeting.


Final Conference, Rennes, France, September 2018

 

The slides of the presentations performed during the final conference are available below. They can also be downloaded as a compiled booklet.

  • Lejla Batina, Radboud University, The Netherlands
  • Srdjan Capkun, ETH Zurich, Switzerland
  • Orr Dunkelman, University of Haifa, Israel [slides]
  • Aurélien Francillon, Eurecom, France [slides]
  • Yanick Fratantonio, Eurecom, France
  • Kevin Fu, University of Michigan, USA
  • Flavio Garcia, University of Birmingham, UK [slides]
  • Daniel Gruss, Graz University of Technology, Austria [slides]
  • Annelie Heuser, CNRS, IRISA, France [slides]
  • Miroslaw Kutylowski, Wroclaw University of Technology, Poland [slides]
  • Stjepan Picek, Delft University of Technology, The Netherlands [slides]
  • Bart Preneel, KULeuven, Belgium [slides]
  • Agusti Solanas, Universitat Rovira i Virgili, Spain [slides]
  • Ingrid Verbauwhede, KULeuven, Belgium
  • Edgar Weippl, TU Wien, Austria
  • Wenyuan Xu, Zhejiang University, China

Training Schools, in the Azores, Portugal, April 2018

 

The slides of the presentations performed during the training school are available below. They can also be downloaded as a compiled booklet.

  • Lejla Batina, Radboud University, NL, “Physical attacks: from a concept to real-world” [slides]
  • Herbert Bos, Vrije Universiteit Amsterdam, NL, “The vulnerability of bug-free software: scary side channels and hardware horrors
  • Srdjan Capkun, ETH Zurich, CH, “On Secure Positioning and Location-Based Security” [slides]
  • Ricardo Chaves, INESC-ID/IST, University of Lisbon, PT, “Science and Communication” [slides]
  • Joan Daemen, Radboud University, NL and STmicroelectronics, BE, “Recent Innovations in lightweight crypto” [slides]
  • Tiago Dias, ISEL, Polytechnic of Lisbon, PT, “Science and Communication
  • Maria Eichlseder, Graz University of Technology, AT, “Differential cryptanalysis” [slides]
  • Daniel Gruss, Graz University of Technology, AT, “Software-based Microarchitectural Attacks: The Case of Meltdown and Spectre” [slides (talk)] [slides (training)]
  • Handan Kılınç, EPFL, CH, “Threat Models in Distance Bounding” [slides]
  • Markus Kuhn, University of Cambridge, UK, “Efficient, Portable Template Attacks” [slides]
  • Mirosław Kutyłowski, Wrocław University of Science and Technology, PL, “GDPR and legal challenges for designing distance bounding protocols” [slides]
  • Pedro Matutino, ISEL, Polytechnic of Lisbon, PT, “Student Demo Session
  • Nele Mentens, KU Leuven, BE, “Configurable computing for cryptographic implementations
  • Kasper Rasmussen, University of Oxford, UK, “Body Impedance for Authentication, Key Generation and Device Pairing” [slides]
  • Mark Ryan, University of Birmingham and HP Labs Bristol, UK, “Hardware-assisted secure execution environments
  • Nuno Santos, INESC-ID/IST, University of Lisbon, PT, “Student Demo Session
  • Patrick Schaumont, Virginia Tech, US, “Fault-Attacks on Embedded Software: Threats, Design and Evaluation” [slides]
  • Kevin Valk and Andres Wandurraga, RISCURE, NL, “A day in the life of an embedded security analyst

Workshop in the Azores, Portugal, April 2018

 

The workshop focused on distance-bounding protocols. The website of the workshop is still online.

  • Srdjan Capkun, Secure distance measurement – Physical layer and implementation issues [slides]
  • Tom Chothia, Modelling and analysis of a hierarchy of distance-bounding attacks [slides]
  • Alexandre Debant, Proving physical proximity using symbolic models [slides]
  • David Gérault, TREAD: A generic and provable distance bounding protocol for privacy [slides]
  • Gerhard Hancke, Distance-bounding channels: Thoughts on security properties of the physical layer
  • Jens Hermans, The protocol lifecycle
  • Markus Kuhn, Authentication at the speed of light: From distance-bounding protocols to securing broadcast navigation signals [slides]
  • Handan Kilinc, Public-key DB and its application on contactless access control [slides]
  • Kasper Rasmussen, Selected security and privacy challenges of implementing and deploying distance-bounding protocols [slides]
  • Pierre-Henri Thévenon, A practical countermeasure against relay attacks
  • Jorge Toro Pozo, Distance-bounding protocols: Computational vs. symbolic models [slides]
  • Gildas Avoine, A primer on relay attacks and distance-bounding protocols [slides]
  • Ioana Boureanu, Provable-security models for distance-bounding [slides]
  • Stéphanie Delaune, An introduction to formal symbolic models [slides]

Workshop in Nijmegen, Netherlands, November 2017

 

The slides of the presentations performed during the workshop are available below. Following this workshop, a Booklet of Abstracts has been released.

  • “An optimal distance bounding protocol based on pre-computation”, Sjouke Mauw, Jorge Toro-Pozo and Rolando Trujillo-Rasua [slides]
  • “Performance Evaluation of an Advanced Man-in-the-Middle Attack Against Certain HB Authentication Protocols”, Miodrag J. Mihaljević, Siniša Tomović and Milica Knežević [slides]
  • “IoT HoneyBot: a novel approach to detection and handling of IoT-based DDoS attacks”, Haris Šemić and Sasa Mrdovic [slides]
  • “On symbolic verification of distance-bounding protocols”, Sjouke Mauw, Zach Smith, Jorge Toro-Pozo and Rolando Trujillo-Rasua
  • “Confusion and Diffusion in Recent Ultralightweight RFID Authentication Protocols”, Paolo D’Arco and Roberto De Prisco [slides]
  • “Cache attacks: From side channels to fault attacks”, Clémentine Maurice [slides]
  • “Rescuing LoRaWAN 1.0”, Gildas Avoine and Loic Ferreira [slides]
  • “Cryptographic Hardware from Untrusted Components”, Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec and George Danezis [slides]
  • “Scalable Key Rank Estimation and Key Enumeration Algorithm for Large Keys”, Vincent Grosso [slides]
  • “A Leakage Trace Collection Approach for Arbitrary Cryptographic IP Cores”, Athanassios Moschos, Apostolos Fournaris and Nicolas Sklavos
  • “FPGA Performance Optimization for CAESAR Authentication Ciphers”, Maria Katsaiti, Nicolas Sklavos and Apostolos Fournaris [slides]
  • “Current state of high-precision EM side-channels and implications on FPGA-based cryptography”, Johann Heyszl [slides]
  • “DECAP-Distributed Extensible Cloud Authentication Protocol”, Andrea Huszti and Norbert Oláh [slides]
  • “How private is your mobile health advisor? Free popular m-Health apps under review”, Achilleas Papageorgiou, Michael Strigkos, Eugenia Politou, Efthimios Alepis, Agusti Solanas and Constantinos Patsaki [slides]
  • “Privacy-Preserving Process Mining: Towards the new European General Data Protection Regulation”, Edgar Batista de Frutos and Agusti Solanas Gomez [slides]
  • “Statistical Disclosure Control meets Recommender Systems: A practical approach”, Fran Casino and Augusti Solanas [slides]
  • “Open-source tooling for differential power analysis”, Ilya Kizhvatov [slides]
  • “Backdoor Detection Tools for the Working Analyst”, Sam Thomas [slides]
  • “Avatar² – Enhancing Binary Firmware Security Analysis with Dynamic Multi-Target Orchestration”, Marius Muench [slides]
  • “Towards Low Energy Block Ciphers”, Francesco Regazzoni [slides]
  • “Distinguishing iterated encryption”, Eran Lambooij [slides]
  • “On Security Enhancement of Lightweight Encryption Employing Error Correction Coding and Simulators of Channels with Synchronization Errors”, Miodrag J. Mihajević [slides]
  • “An Improved Cryptanalsis of Lightweight Stream Cipher Grain-v1”, Miodrag J. Mihaljević, Nishant Sinha, Sugata Gangopadhyay, Subhamoy Maitra, Goutam Paul and Kanta Matsuura [slides]
  • “State of the Art in Lightweight Symmetric Cryptography”, Léo Perrin [slides]
  • “Loophole: Timing Attacks on SharedEvent Loops in Chrome”, Pepe Vila and Boris Köpf [slides]
  • “How (not) to use TLS between 3 parties”, K. Bhargavan, I. Boureanu, P. A. Fouque, C. Onete and B. Richard [slides]
  • “Quam Bene Non Quantum: Analysing the Randomness of a Quantum Random Number Generator and the Costs of Postprocessing”, Darren Hurley-Smith and Julio Hernandez-Castro [slides]

Workshop in Sutomore, Montenegro, November 2016

 

The slides of the presentations performed during the workshop are available below. Following this workshop, a Booklet of Abstracts has been released.

  • Handan Kilinç, Efficient Public-Key Distance Bounding [slides]
  • Takanori Isobe, Security of Block Ciphers Beyond Blackbox Model [slides]
  • Aurélien Francillon, A firmware analysis tour with Avatar in 7 minutes (maybe) [slides]
  • Marin Golub, Machine Learning and Evolutionary Computation in Cryptology [slides]
  • Apostolos P. Fournaris, From Hardware to Software to System: Trusted embedded Nodes in IoT [slides]
  • Flavio D. Garcia, Lock It and Still Lose It – On the (In)Security of Automotive Remote Keyless Entry Systems [slides]
  • Cristiano Giuffrida, Imagine a World without Software Bugs [slides]
  • Darren Hurley-Smith, Bias in the TRNG of the Mifare Desfire EV1 [slides]

Newsletters

You can download a single pdf file containing all the newsletters.


Management Committee Meetings


CRYPTACUS Action Specific Resources

  • The Memorandum of Understanding is a formal document describing the objectives and the working methods of the Cryptacus Action.
  • The Action Fact Sheet is an automatically generated document containing up-to-date information about the Action, including contact information for the Management Committee members for your country.