French Invited speakers: Canadian Invited speakers:
Friday, June 26 MITACS 2009
8:15 — 08:30 Welcome Slides
8:30 — 10:00 Session 1: Internet Security Chair: Lafourcade Pascal
8:30 — 9:15 Castelluccia Claude Tracking Malicious Servers on the Internet
Abstract: Cyber-criminals frequently use redirection techniques to hide the actual location of their malicious servers in order to evade identification and prevent or, at least delay, the shutdown of these illegal servers by law enforcement. We developped a framework to geolocalize hidden servers, that is, to determine the physical location of these servers based on network measurements. During this talk, I will present our preliminary experimental results of this project.
Slides
9:15 — 10:00 Jose M. Fernandez "Botnets: No calm after the Storm"
Abstract: In this presentation, we will survey the developments in botnet technology as they have being deployed and employed in the "real world" in the last few years. Of most notable importance and notoriety is the Storm worm that appeared in 2007 and that had all but disappeared by the end of 2008. From a technical and research point of view, it marks the departure from IRC-controlled botnets to sophisticated command and control architectures using a combination of peer-to-peer networking and a network of http servers with fast changing domain names (aka fast flux networks). This has made Storm one of most researched on malware in the last few years. We will present the results of our research on graph theory-based simulations of the P2P networks employed by such botnets and the relative efficacy of various mitigation strategies, some of which were indeed been tested "in-the-wild" against the Storm botnet. We will conclude by discussing more recent developments in botnet technology. Nature abhors a vacuum and Storm has indeed been replaced by other equally sophisticated botnets. We will discuss their similarities and differences with the good ol' Storm, and how the models we used to describe Storm can be adapted (or not) to analyse them. We will close by discuss ongoing research on these more recent botnets.
Slides
10:00 — 10:30 Break I
10:30 — 12:00 Session 2: Cryptosystems, Chair:  Kumar Murty
10:30 — 11:15 Joaquin Garcia-Alfaro Security & Privacy on EPC Networks
Abstract: The Electronic Product Code (EPC) is a low-cost technology based on passive Radio Frequency IDentification (RFID) devices. It is the basis of a distributed architecture, called the EPC Network, for the automatic identification of objects in motion on supply chain and industrial production applications. A globally unique number is assigned to the RFID device assigned to every tagged object. This number is then used to identify the object and get further information about it through Internet based applications (e.g., using Web services). The information about an object is not stored on a tag, but instead supplied by distributed servers on the Internet. Security threats can target the different services of the EPC network, if weaknesses are not handled properly. This talk will provide examples of threats targeting the insecure wireless channel used for the exchange of information between RFID devices. Additionally, it will discuss some countermeasures to mitigate the risk of some of these threats.
Slides
11:15 — 12:00 Abdalla Michel Robust Public-Key and Identity-Based Encryption.
Abrstact: Motivated by applications to auctions, searchable encryption, and anonymous wireless communication, we provide a provable-security treatment of the notion of a ``robust'' encryption scheme, namely one where the decryption algorithm rejects when the ``wrong'' secret key is used. First, we provide formal definitions of robustness under chosen-plaintext and chosen-ciphertext attack. We find that contrary to what seems intuitive, robustness ---at least in combination with privacy and anonymity as required by applications--- is actually rarely, if ever, present and obvious ways to confer it fail. We however provide general ways to efficiently confer robustness without sacrificing other security properties, for both public-key and identity-based encryption. Next, we examine the robustness of several well-known encryption schemes. Finally, we also show how to apply our results to searchable encryption schemes to obtain the first schemes with security against chosen-ciphertext attacks in the standard model. We believe these results are important to clarify and help fill gaps in the literature arising from the implicit use of a robustness property that until now lacked formal definitions. This is joint work with Mihir Bellare, Chanathip Namprempre, and Gregory Neven.
Slides
12:00 — 1:30 Lunch
1:30 — 3:00 Session 3: Secure key agreement, Chair:  Bruce Kapron
1:30 — 2:00 Rei Safavi-Naini Unconditionally secure key agreement over noisy channels
Abstract: We discuss the problem of secure key agreement when Alice and Bob are connected by noise channels and their communication is intercepted by Eve through noisy channels also. We will show that in this scenario secret key agreement is possible in some surprising cases where the main channel is much noisier than Eve's channels. We discuss our results and relate them to other known work in this area.
Slides
2:00 — 3:30 Tutorial A 1st part Fault attacks from theory to practise: what is possible to do?
Slides
3:30 — 4:00 Break II
4:00 — 5:30 Session 4: Chair:  Bruce Kapron
4:00 — 5:30 Tutorial B 1st Part New Techniques in Privacy-Preserving Data Mining and Machine Learning
Saturday, June 27 MITACS 2009
8:30 — 10:00 Session 5: Security Chair:  Yassine Lakhnech
8:30 — 9:15 Student Presentation
  • Martin Gagné: "Automated Security Proof for Symmetric Encryption Modes."
    Slides
  • Abdelberi Chaabane: "Revisiting unstructured overlay network security"
    Slides
  • Chris Ware: "Applications of Geometric Programming in Information Security"
    Slides
9:15 — 10:00 Kumar Murty The ERINDALE Hash Function
Abstract: We describe the construction of a hash function based on polynomials over finite fields. The construction does not follow the Merkle-Daamgard philosophy.
Slides
10:00 — 10:30 Break I
10:30 — 12:00 Session 6: Computational Security, Chair:  Ali Miri
10:30 — 11:15 Bruce Kapron COMPUTATIONAL INDISTINGUISHABILITY LOGIC
Abstract: We present a logic for reasoning about computational indistinguishability of poly-time samplable probability distributions and about negligibility of conditional probability of poly-time decidable predicates, in the presence of random oracles and adaptive adversaries. We trace the development of related logics, and examine applications to correctness proofs for cryptographic primitives, schemes and protocols (Joint work with Gilles Barthe, Marion Daubignard and Yassine Lakhnech)
Slides
11:15 — 12:00 Blanchet Bruno CryptoVerif: A Computationally Sound Mechanized Prover for Security Protocols"
Abrstact: We present the prover CryptoVerif: it is the first mechanized prover for security protocols sound in the computational model. It produces proofs presented as sequences of games, like the manual proofs of cryptographers; these games are formalized in a probabilistic polynomial-time process calculus. CryptoVerif provides a generic method for specifying security assumptions on cryptographic primitives, which can handle shared-key and public-key encryption, signatures, message authentication codes, and hash functions. It can prove secrecy and correspondence properties (including authentication). It produces proofs valid for a number of sessions polynomial in the security parameter, in the presence of an active adversary.
Slides
12:00 — 1:30 Lunch
1:30 — 3:00 Session 7: Symmetric Encryption, Chair: 
1:30 — 2:00 Marine Minier (CITI laboratory) Some integral properties of Rijndael
Abstract: in this talk, we present new integral properties for all the Rijndael versions and show how to build unknown key distinguishers and also known key distinguishers. We also give a formal definition of a known key distinguisher and show how to apply this result for a particular hash function of the SHA3 competition.
Slides Slides
2:00 — 3:30 Tutorial B 2nd Part New Techniques in Privacy-Preserving Data Mining and Machine Learning
Abrstact:
3:30 — 4:00 Break II
4:00 — 5:30 Session 8: Chair: TBA
4:00 — 5:30 Tutorial A 2nd part Fault attacks from theory to practise: what is possible to do?
Slides