Speakers

Guest speakers

Patrik Ekdahl

Photo: Patrik Ekdahl

Photo: Patrik Ekdahl

Patrik Ekdahl is a Master Researcher at Ericsson in Lund, Sweden. He received his Ph.D. in Information Theory from Lund University in 2003. His thesis discusses analysis and design of stream ciphers and includes the co-authored work on the stream cipher SNOW which, in an adapted version, is the primary link encryption used in LTE. During the period 2004-2007 he worked for a SME in Lund, developing cryptologic equipment for the Swedish military and high end government institutions. He has been with Ericsson since 2007 where he has been  working at the security research department, mainly focusing on mobile device platform security from both a software and hardware perspective. During the last two years he has been involved in different standardisation organisations such as GlobalPlatform and their work on defining a Trusted Execution Environment for mobile devices.

 

Talk abstract: 

Upcoming security features in mobile devices

In this talk we will present a modern mobile device architecture with hardware based environment separation. We will discuss a general Trusted Execution Environment (TEE) and look more specifically into the TEE architecture as described by the standardisation body GlobalPlatform.

We will present some upcoming security services such as trusted user interface, remote connectivity from the TEE, and remote administration of trusted applications, together with the challenges we see for utilising these security features from a web server/browser.

Andrew Martin

Photo: Andrew Martin

Andrew Martin has led the development of security education in Oxford University’s Software Engineering Programme for over a decade. He is Principal Investigator of several externally-funded projects in the areas of trusted systems, mobile platforms, and cloud security. He is leading the establishment of a Centre for Doctoral Training in Cyber Security at Oxford, is Associate Director of the Cyber Security Centre, and is the coordinator for the Academic Centre of Excellence in Cyber Security Research activities and Chair of the GCHQ Academic Liaison Panel.

Talk abstract: 

Who is the User?

The concept of user accounts is deeply embedded in many models of
computer and application use, but it is under assault from two directions:
first, user authentication is problematic for almost every internet user;
second, there is now often a many-many relationship between users and
devices/services, sometimes with minimal authentication requirements. In
this talk we consider the impact of trusted hardware upon these problems,
and ask whether we have the necessary building-blocks for solutions.

 

Accepted Papers

Note: this list of papers is only provisional. A full pre-proceedings will be available in June.

  • Ronald Toegl, Johannes Winter and Martin Pirker. A Path Towards Ubiquitous Protection of Media
  • Jiun Yi Yap and Allan Tomlinson. Threat Model of a Scenario Based on Trusted Platform Module 2.0 Specification
  • John Lyle. That Tricky Second Factor: Using Trusted Computing to Secure Two-Factor Web Authentication
  • Cornelius Namiluko, Andrew Paverd and Tulio De Souza. Towards Enhancing Web Application Security Using Trusted Execution
  • Justin King-Lacroix. Position paper: Can the Web really use secure hardware?
  • Darmawan Suwirya, Karen Lu and Laurent Castillo. Managing Access to Security Hardware in PC Browsers
  • Nick Hofstede and Nick Van Den Bleeken. Using the W3C WebCrypto API for document signing
  • The papers are not shown in any order.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s