60 likes | 171 Vues
This presentation by Pieter Hartel explores the intricacies of distributed and embedded security within complex, heterogeneous networked systems. As security often becomes an afterthought, understanding its critical role is vital, especially given its prominence in government agendas. The talk covers theoretical developments through experimental models that encapsulate behavioral essences, utilizing tools like CoProve and UPPAAL for verification. Through intrusion detection, risk management, and secure storage, the session aims to shed light on robust security practices in constrained and hostile environments.
E N D
Distributed and Embedded Securitygroup Pieter Hartel
Why security? Hard: usually an afterthought Interesting: crosscutting Rewarding: High on government agendas Why distributed and embedded systems? Complex, heterogeneous, networked systems Resource constraints, hostile environments Distributed and Embedded Security
Theory development driven by experiments Models capture essence of behaviour Logical models of security protocols Information theoretic models of leakage Simulations and prototypes to validate Standard and bespoke tools to verify CoProve for security protocol verification UPPAAL for timed analysis Methods for systematic model construction How do we work?
SRO Istrice & Prosecco Operations in the encrypted domain Trust & Risk management Intrusion detection Secure Storage SRO DSN Modelling Current work
2009: Damiano, Mohammed 2008: Ileana, Marnix, Marcin, Raluca 2007: Nikolay, Richard 2006: Vasughi, Ricardo 2005: Jordan, Law, Gabriele 2003: Hartmut Current & Past PhDs
Istrice & Prosecco 5 x STW: Secure Grip (SAS), IPID (IS), VISPER (IS), VRIEND (IS), SEDAN (DB) 2 x BSIK: Freeband/I-Share, PointOne/ALwEN Philips: SPCMHD (DB) DSN EU: PROTEM (TST) STW: A4 (TST,CAES) NWO: MOCA (FMT,IS) Current projects & partners