4 th Young Researcher s Day 2014



Ähnliche Dokumente
Cloud Architektur Workshop

Exercise (Part II) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1

Connecting the dots on Germany s Energiewende and its impact on European energy policy

p^db=`oj===pìééçêíáåñçêã~íáçå=

TMF projects on IT infrastructure for clinical research

Stand der Recherche nach publizierten Identity Management Standards - ISO/IEC, DIN, BSI, CEN/ISSS und OASIS

Customer-specific software for autonomous driving and driver assistance (ADAS)

Die Renaissance von Unified Communication in der Cloud. Daniel Jonathan Valik UC, Cloud and Collaboration

Privacy-preserving Ubiquitous Social Mining via Modular and Compositional Virtual Sensors

Geometrie und Bedeutung: Kap 5

Fußballtraining für jeden Tag: Die 365 besten Übungen (German Edition)

Ways and methods to secure customer satisfaction at the example of a building subcontractor

Darstellung und Anwendung der Assessmentergebnisse

KURZANLEITUNG. Firmware-Upgrade: Wie geht das eigentlich?

Die Kunst des Programmierens...

Contents. Interaction Flow / Process Flow. Structure Maps. Reference Zone. Wireframes / Mock-Up

HIR Method & Tools for Fit Gap analysis

Social Innovation and Transition


Group and Session Management for Collaborative Applications

ELBA2 ILIAS TOOLS AS SINGLE APPLICATIONS

Zurich Open Repository and Archive. Anatomie von Kommunikationsrollen. Methoden zur Identifizierung von Akteursrollen in gerichteten Netzwerken

ISO Reference Model

Wie man heute die Liebe fürs Leben findet

Creating OpenSocial Gadgets. Bastian Hofmann

Turning Data Into Insights Into Value. Process Mining. Introduction to KPMG Process Mining

Repositioning University Collections as Scientific Infrastructures.

Extracting Business Rules from PL/SQL-Code

arlanis Software AG SOA Architektonische und technische Grundlagen Andreas Holubek

Mitglied der Leibniz-Gemeinschaft

Possible Solutions for Development of Multilevel Pension System in the Republic of Azerbaijan

Aufbau eines IT-Servicekataloges am Fallbeispiel einer Schweizer Bank

Ressourcenmanagement in Netzwerken SS06 Vorl. 12,

Addressing the Location in Spontaneous Networks

Version/Datum: Dezember-2006

Preisliste für The Unscrambler X

WP2. Communication and Dissemination. Wirtschafts- und Wissenschaftsförderung im Freistaat Thüringen

Exercise (Part XI) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1

The Future Internet in Germany and Europe

Mit Legacy-Systemen in die Zukunft. adviion. in die Zukunft. Dr. Roland Schätzle

Exercise (Part V) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1

Sustainability Balanced Scorecard as a Framework for Eco-Efficiency Analysis


Social Sciences and Humanities role in Social Innovation Some key observations from the experience of TU Dortmund University sfs

Daten haben wir reichlich! The unbelievable Machine Company 1

Infrastructure as a Service (IaaS) Solutions for Online Game Service Provision

How to access licensed products from providers who are already operating productively in. General Information Shibboleth login...

Sicherheit / Sicherung - unterschiedliche Begriffsbestimmung, gemeinsame Fachaspekte

Technical Support Information No. 123 Revision 2 June 2008

WAS IST DER KOMPARATIV: = The comparative

Environmental management in German institutions of higher education: Lessons learnt and steps toward sustainable management

Der Begriff Cloud. Eine Spurensuche. Patric Hafner geops

Security Patterns. Benny Clauss. Sicherheit in der Softwareentwicklung WS 07/08

TalkIT: Internet Communities Tiroler Zukunftsstiftung Donnerstag,

prorm Budget Planning promx GmbH Nordring Nuremberg

Efficient Design Space Exploration for Embedded Systems

EEX Kundeninformation

The Solar Revolution New Ways for Climate Protection with Solar Electricity

Englisch. Schreiben. 18. September 2015 HTL. Standardisierte kompetenzorientierte schriftliche Reife- und Diplomprüfung. Name: Klasse/Jahrgang:

IT-Beratung: Vom Geschäftsprozess zur IT-Lösung

Themen für Seminararbeiten WS 15/16

Overall Coordination- and Communication Platform. for electronic and standardised Data-Exchange between. Ports and Hinterland in Rail-Traffic

Ein Stern in dunkler Nacht Die schoensten Weihnachtsgeschichten. Click here if your download doesn"t start automatically

Einführung in die Robotik Einführung. Mohamed Oubbati Institut für Neuroinformatik. Tel.: (+49) 731 / mohamed.oubbati@uni-ulm.de

Corporate Digital Learning, How to Get It Right. Learning Café

MARKET DATA CIRCULAR DATA AMENDMENT

Providers of climate services in Germany

1. General information Login Home Current applications... 3

DAS ERSTE MAL UND IMMER WIEDER. ERWEITERTE SONDERAUSGABE BY LISA MOOS

USBASIC SAFETY IN NUMBERS

H o c h s c h u l e D e g g e n d o r f H o c h s c h u l e f ü r a n g e w a n d t e W i s s e n s c h a f t e n

Soll der Staat aktiv Innovationen fördern? Das Beispiel Airbus A400M

Exchange ActiveSync wird von ExRCA getestet. Fehler beim Testen von Exchange ActiveSync.

H Mcast Future Internet made in Hamburg?

Sport Northern Ireland. Talent Workshop Thursday 28th January 2010 Holiday Inn Express, Antrim

Netzwerke und Sicherheit auf mobilen Geräten

ISO/IEC 27001/2. Neue Versionen, weltweite Verbreitung, neueste Entwicklungen in der 27k-Reihe

Die UN-Kinderrechtskonvention. Darstellung der Bedeutung (German Edition)

Security of Pensions

Oracle Integration Cloud Service

ISO Reference Model

Praktikum Entwicklung von Mediensystemen mit ios

Prof. Guillaume Habert

JONATHAN JONA WISLER WHD.global

Konfiguration von eduroam. Configuring eduroam

PONS DIE DREI??? FRAGEZEICHEN, ARCTIC ADVENTURE: ENGLISCH LERNEN MIT JUSTUS, PETER UND BOB

Prozesse als strategischer Treiber einer SOA - Ein Bericht aus der Praxis

Dr. Bernd Korves October 05, 2015

Exercise (Part VIII) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1

Exkursion zu Capgemini Application Services Custom Solution Development. Ankündigung für Februar 2013 Niederlassung Stuttgart

INDUSTRIAL DATA SPACE DATA ECONOMY AND ANALYTICS CONCEPTS AND IMPLEMENTATION

Sagen und Geschichten aus dem oberen Flöhatal im Erzgebirge: Pfaffroda - Neuhausen - Olbernhau - Seiffen (German Edition)

Die "Badstuben" im Fuggerhaus zu Augsburg

Mercedes OM 636: Handbuch und Ersatzteilkatalog (German Edition)

Algorithms & Datastructures Midterm Test 1

FACHKUNDE FüR KAUFLEUTE IM GESUNDHEITSWESEN FROM THIEME GEORG VERLAG

Labour law and Consumer protection principles usage in non-state pension system

MobiDM-App Handbuch für Windows Mobile

Open Archives Initiative - Protocol for Metadata Harvesting (OAI-PMH)

Login data for HAW Mailer, Emil und Helios

Transkript:

Einladung zum 4 th Young Researcher s Day 2014 Nach drei erfolgreichen Young Researcher s Days starten wir im neuen Jahr in Runde vier. Frau Ingrid Schaumüller-Bichl und Herr Edgar Weippl laden ganz herzlich zum 4 th Young Researcher s Day ein, der im Rahmen des ACM SIGSAC Chapters Vienna und des OCG-Arbeitskreises IT-Sicherheit am stattfinden wird. Donnerstag, 23.01.2014 von 14:00 17:30 Uhr Als Grundgedanke hinter diesem Event steht der Wunsch, dass jede österreichische Institution, die einen Security- Lehrgang bzw. Lehrschwerpunkt anbietet, ihren besten Studierenden die Möglichkeit gibt, die eigenen Arbeiten vorzutragen und so eine Nachwuchsvernetzung zu fördern. Programm: 14:00-14:10 Begrüßung Ingrid Schaumüller-Bichl (FH OÖ, Campus Hagenberg), Edgar Weippl (TU Wien, SBA Research) 14:10-14:40 Hardware-Software-Codesign of Side-Channel Evaluated Identity-based Encryption Thomas Unterluggauer (IAIK TU Graz) 14:40-15:10 Cloudoscopy: services discovery and topology mapping Johanna Ullrich (TU Wien) 15:10-15:40 Syntaktische Definition von Malware Verhalten Hermann Dornhackl (FH St. Pölten) 15:40-16:00 Pause 16:00-16:30 Praxistaugliche Kommunikationssicherheit in einer Smart Metering Infrastruktur Christian Peuker (FH Salzburg) 16:30-17:00 Communication Schemes for Proces Execution Histories to Enforce Entailment Constraints in Process-Driven SOAs Thomas Quirchmayr (WU Wien) 17:00-17:30 Towards a Privacy-Preserving Federated Identity as a Service Model Bernd Zwattendorfer (IAIK TU Graz) 17:30 Ausklang Der Young Researcher s Day findet in den Räumen der OCG statt (Wollzeile 1, 1010 Wien). Wir ersuchen um eine Anmeldung bis zum 21.01.2014 an Yvonne Poul (ypoul@sba-research.org). Wir freuen uns über Ihr Kommen und auf einen spannenden 4th Young Researcher s Day 2014! Ingrid Schaumüller-Bichl FH OÖ, Campus Hagenberg Edgar Weippl SBA Research

Hardware-Software-Codesign of Side-Channel Evaluated Identity-based Encryption Thomas Unterluggauer (IAIK TU Graz) Providing sufficient security to embedded applications has become increasingly important. The schemes being used rely on the presence of a key for encryption. Contrary to this approach, the promising concept of identity-based encryption (IBE) enables the encryption of data by just knowing the recipient's identity, avoiding the key exchange problem. This talk discusses identity-based encryption for embedded platforms. Besides computational speed and low resource optimizations for embedded applications, it also focuses on security against side-channel attacks.

Cloudoscopy: services discovery and topology mapping Johanna Ullrich (TU Wien) We define and study cloudoscopy, i.e., exposing sensitive information about the location of (victim) cloud services and/or about the internal organisation of the cloud network, in spite of location-hiding efforts by cloud providers. A typical cloudoscopy attack is composed of a number of steps: first expose the internal IP address of a victim instance, then measure its hop-count distance from adversarial cloud instances, and finally test to find a specific instance which is close enough to the victim (e.g., co-resident) to allow (denial of service or side-channel) attacks. We refer to the three steps/modules involved in such cloudoscopy attack by the terms IP address deanonymisation, hop-count measuring, and co-residence testing. We present specific methods for these three cloudoscopy modules, and report on results of our experimental validation on popular cloud platform providers. Our techniques can be used for attacking (victim) servers, as well as for benign goals, e.g., optimisation of instances placement and communication, or comparing clouds and validating cloud-provider placement guarantees.

Syntaktische Definition von Malware Verhalten Hermann Dornhackl (FH St. Pölten) Es wird die Anwendung formaler Methoden zur Modellierung von Malware Verhalten beschrieben. Die Modellierung des Verhaltens erfolgt dabei über syntaktische Strukuren, die bösartiges Verhalten in Execution Traces von Malware abbilden. Dieses bösartige Verhalten wird durch eine formale Grammatik beschrieben, die als Terminalsymbole die API calls enthält; Nicht-Terminale repräsentieren Sequenzen von API calls, die jeweils bestimmte (Teil-)Ziele der Malware beschreiben. Die Kombination verschiedener Nicht-Terminale in sequentiellen und hierarchischen Strukturen ergeben Angriffsvektoren, die von bösartiger Software verwendet werden. Ausgehend von diesen durch die Grammatik definierten syntaktischen Strukturen kann ein Parser generiert werden, mit dessen Hilfe in den Execution Traces einer verdächtigen Software nach bösartigen Verhaltensmustern gesucht werden kann.

Praxistaugliche Kommunikationssicherheit in einer Smart Metering Infrastruktur Christian Peuker (FH Salzburg) In today s life the usage of renewable resources for energy production are gaining more and more importance. Reasons are limited fossil fuels as well an increasing will to combat climate change. Based on the European Union s 20-20-20 climate and energy targets an ambitious roadmap was created to change the existing traditional power grids into future energy networks. As a first step it is necessary to verify the security and privacy challenges of a smart metering infrastructure and to find solutions how they should be met. The talk is focused on a smart metering gateway and its security relevant demands based on the BSI protection profile. Based on this profile a prototype of a smart metering gateway based on open standards and protocols has been developed. The existing prototype fulfils the majority of the requirements of the protection profile while keeping costs at a minimum.

Communication Schemes for Proces Execution Histories to Enforce Entailment Constraints in Process-Driven SOAs Thomas Quirchmayr (WU Wien) A distributed business process is executed in a distributed computing environment. In this context, the serviceoriented architecture (SOA) paradigm provides a mature and well understood framework for the integration of software services. Entailment constraints, such as mutual exclusion or binding constraints, are an important means to specify and enforce business processes in a SOA. Process engines control the process flow and are responsible for the coordination of the services that participate in a distributed business process. Since the enforcement of entailment constraints requires knowledge of the subjects or roles who executed particular task instances, we need to communicate the execution history of the respective tasks and processes between the services and the process engines. However, the inherent concurrency of a distributed system may lead to omission failures. Such failures may impair the enforcement of entailment constraints in a process-driven SOA. In particular, the impact of these failures as well as the corresponding countermeasures depend on the architecture of the respective process engine. We discuss communication schemes for (distributed) process execution histories in a SOA. In particular, we provide generic procedures for di fferent communication schemes and examine the efficiency of these schemes as well as their characteristics if omission failures occur. In this context, we especially consider if the respective process engine acts as an orchestration engine or as a choreography engine.

Towards a Privacy-Preserving Federated Identity as a Service Model Bernd Zwattendorfer (IAIK TU Graz) Identity management plays a key role in e-government. Giving the increasing number of cloud applications, also in the field of e-government, identity management is also vital in the area of cloud computing. Several cloud identity models have already emerged, whereas the so-called "Identity as a Service"-model seems to be the most promising one. Cloud service providers currently implement this model by relying on a central identity broker, acting as a hub between different service and identity providers. While the identity broker model has a couple of advantages, still some disadvantages can be identified. One major drawback of the central identity broker model is that both the user and the service provider must rely on one and the same identity broker for identification and authentication. This heavily decreases flexibility and hinders freedom of choice for selecting other identity broker implementations. We by-pass this issue by proposing a federated identity as a service model, where identity brokers are interconnected. This federated identity as a service model retains the benefits but eliminates the drawbacks of the central cloud identity broker model.