You are on page 1of 4

M AY 2018, N O 18

Cryptacus Newsletter

April-May 2018
Cryptacus Newsletter
Welcome to the April-May 2018 edition of the
monthly Cryptacus.eu newsletter, offering a glimpse
into recent developments in the cryptanalysis of
IoT & related areas. Send your contributions, com-
ments & feedback at cryptacus.newsletter@irisa.fr

News from the Chair I would like to use this opportu- The last period may, consequently,
by G ILDAS AVOINE nity to kindly thank the organizers, be more competitive for applicants.
including Ricardo’s colleagues and
students, who greatly contributed to Last grant period also means
make this event successful. we are now working on the or-
ganisation of the last conference.
It will be held in Rennes (France)
on September 18th-20th, 2018. The
website is already up (https://www.
cryptacus.eu/en/conference/)
but programme and traveling infor-
Dear Cryptacus Members, mation are not available yet. MC
Members will likely receive their offi-
April has been an important cial invitation in May.
month for the Cryptacus community.
Mainly because of the organiza- The list of speakers is not com-
tion of two important events in pleted yet, but promises to be stellar.
São Miguel, namely the Cryptacus Looking now to the future, I can I can announce the confirmed ones:
training school organized by Ricardo announce that the new Grant Period Lejla Batina, Milena Djukanovik,
Chaves (PT), and a workshop on will start on time, namely on May Orr Dunkelman, Aurélien Francil-
distance-bounding protocols (Crypta- 1st, 2018. lon, Kevin Fu, Flavio Garcia, Daniel
cus COST Action & Popstar ERC Gruss, Claudio Orlandi, Bart Preneel,
Grant) mostly organized by Ioana You can already apply for STSMs and Ingrid Verbauwhede.
Boureanu (UK) and Stéphanie De- and ITC Grants, to be held between
laune (FR). May 1st and December 11th, which The full list will be provided in the
is unfortunately already the end of next newsletter.
More than 70 people have been our COST Action.
funded to attend the events, which
have been amazingly successful ac- The number of applications we
cording to the feedback and com- receive roughly doubled from one Best regards,
ments I received from the attendees. grant period to another one.
Gildas Avoine

Cryptacus Newsletter
m Cryptacus.eu B cryptacus.newsletter@irisa.fr Page 1
Recommended reading: • Chair in Computer Science at
Practical Fault Injection on the University of Liverpool’s
Deterministic Signatures: Department of Computer Sci-
ence. A permanent and full
The Case of EdDSA
time position at the highest
level. They mention in the ad
The recommending reading of
security as one of their pri-
the month is a joint work by Niels
ority topics. The closing date
Samwel and Lejla Batina from Rad-
for applications is the 11 May
boud University, Nijmegen.
2018. More info at http://
www.jobs.ac.uk/job/BIS200/
It is particularly timely after re- chair-in-computer-science/
cent vulnerabilities of popular im-
plementations of deterministic signa-
tures schemes such as EdDSA have
been attacked, showing that the se-
cure deployment of these algorithms
will require more countermeasures They conclude that, as only a • A position as (full) profes-
than originally though. single successful fault is needed to sor of Computer Science is
fully recover the key, this kind of im- available as soon as possible
plementation is a particularly easy at the Department of Com-
The paper shows, in addition, puter Science, Aarhus Univer-
target for the attackers.
that the realistic implementation of sity (www.cs.au.dk). The de-
these additional countermeasures is partment has research groups
far from trivial as the authors pro- within ’Algorithms and Data
posed certain checks as a counter- Structures’, ’Data-Intensive Sys-
measure but the implementation un- tems’, ’Cryptography and Secu-
der analysis remained vulnerable to rity’, ’Mathematical Computer
fault injection attacks. Science’, ’Logic and Semantics’,
’Ubiquitous Computing and In-
The authors present simple at-
teraction’, ’Computer-Mediated
tacks against the EdDSA implementa-
Activity’, ’Use, Design and Inno-
tion in the lightweight cryptographic
vation’, and ’Programming Lan-
library WolfSSL on a 32-bit micro-
guages’. Moreover, they wish
controller, achieving success rates of
to build competencies within
almost 100% by voltage glitching and
Machine Learning and Sys-
electromagnetic fault injection.
tems Security. The deadline is
03.05.2018. More information
at https://goo.gl/rnJYSh.

Open Positions

• 50th Anniversary Readership


(Associate Professor) in Cyber
Security at the Lancaster Uni-
versity School of Computing &
Communications.

With a salary range of £50,618


to £56,950 this is a permanent
The paper was accepted to Please send us any employment and full time job offer, closing
Africacrypt 2018, and can be opportunities you may want to publi- on the 31st May 2018. This
accessed here https://goo.gl/ cize in the newsletter. is with the renowned Secu-
4ZPacb. rity Lancaster, the University’s

Cryptacus Newsletter
m Cryptacus.eu B cryptacus.newsletter@irisa.fr Page 2
cross-disciplinary research in- • I will be very happy to receive of the malware under observation.
stitute in Security and Protec- anyone interested in investigat- A myriad of techniques have devel-
tion Science. ing randomness generation and oped in this interesting area, but the
testing, particularly on IoT de- recent GravityRAT seems to be vari-
Security Lancaster is one of vices. ous steps ahead of most current mal-
four flagship Lancaster Re- ware in spotting VMs. It uses no
search Institutes and amongst Blogs, posts and other fewer than 7 different techniques to
the current 14 Academic Cen- recommended reads accomplish this. These include com-
tres of Excellence in Cyber Se- The End of the Road for SIMON mon techniques such as looking for
curity Research (ACE-CSRs) and SPECK? traces of the hypervisor left on the
recognised by the UK govern- virtual machine, checking the com-
ment. Well done Tomer and Orr! puter name, and checking the num-
ber of CPU cores.
But it also uses a novel tech-
nique where it requests the CPU tem-
perature, a feature not commonly
supported by hypervisors. These will
then respond "not supported" thus re-
For other interesting positions all vealing that the malware is probably
across Europe, please check the re- not being run on a real machine.
cently revamped “Researchers in Mo- More info at https://goo.gl/
tion” portal at https://euraxess. 15TN6x, with the complete analyis by
ec.europa.eu/. It currently has close For more info, please check this Cisco Talos researchers Warren Mer-
to 60 open positions in computer se- aptly titled piece "ISO blocks NSA’s cer and Paul Rascagnères.
curity and related areas, including latest IoT encryption systems amid
in Poland, the UK, Finland, Slovenia, murky tales of backdoors and bully-
Italy, Norway, Switzerland, and even ing" at https://goo.gl/PkYcTD.
in Spain!

Other news

Proposals for STSMs


By now, you should be already
familiar with what Short Term Scien-
tific Missions (or STSMs, for short)
are. Please make your willingness GravityRAT, state of the art in Event calendar
to receive STSMs proposals known VM detection SSR 2018, The 4th Conference
by sending me an email. Take into on Security Standards Research, will
account that STSMs will be more There is a continuous arms race take place in Darmstadt Germany, on
competitive in this last period of the between malware developers and an- 3-4 December 2018.
Action. alysts to detect (or, alternatively,
Until I do not have any more, I’ll just hide) that a piece of malware is be- The purpose of this conference is
publish mine: ing run in a Virtual Machine. It is to discuss the many research prob-
in the best interests of attackers to lems deriving from studies of existing
recognised when this is the case, so standards, the development of revi-
that they can stop their malware from sions to existing standards, and the
running and hence being dynamically exploration of completely new areas
analysed by security experts. On the of standardisation.
other hand, malware analysts want
their VMs to replicate as accurately The deadline for submissions
as possible real environments so that is 22 June 2018 (3pm UTC). The
they can fully observe the behaviour General Chair is Marc Fischlin. More

Cryptacus Newsletter
m Cryptacus.eu B cryptacus.newsletter@irisa.fr Page 3
info at https://ssr2018.net/. The ’IoT Autentication 2018’ Con- their applications.
ference will take place in Melbourne,
Australia on November 28-30, 2018. Paper submissions close on Au-
gust 14.
It will feature invited presenta-
tions from Auto-ID Labs, IoT Alliance
Australia, IoT (Internet of Things)
Security, Prof. Michael Sheng, Prof.
Margreta Kuijper, Dr. Omid Kava-
hei, Prof. Seng Loke,and Prof. Lejla
One of my preferred events in the Batina.
European cybersecurity calendar is
Nordsec. The Keynote speaker is Dr.
Veena Pureswaran from IBM. If FDTC 2018 is the Fourteenth
It is one of the oldest events you want to attend, check http: Workshop on Fault Diagnosis and
running, and although participants //www.authiot2018.conferences. Tolerance in Cryptography, and will
mostly come from European coun- academy/. be held on the 13 of September 2018
tries north of the 60th parallel, it in Amsterdam, co-located with CHES.
is a magnificent event open to all.
this year it runs its 23rd edition in It is held in cooperation with the
Oslo, Norway, from the 28 to the 30 IACR and is interested in all aspects
November. of fault injection.
The proceedings consist of peer- The submission deadline is
reviewed articles and are published May 25, and Joan Daemen, now
in the Springer Lecture Notes in Com- with Radboud University, is one of
puter Science series. the Chairs. For more info, check
www.fdtc-workshop.eu.
Some Cryptacus members are in-
volved in the organisation or the
program committee, such as Billy
Brumley from Tampere University of
Technology and Aikaterini Mitrokotsa The 14th International Confer-
from Chalmers University of Technol- ence on Information Security and
ogy. Cryptology (Inscrypt) will be held in
Fuzhou, Fujian, from December 14 to
Prof. Audun Jøsang from UiO 16. Organized by the Fujian Provin-
Norway is the General Chair this year. cial Key Laboratory of Network Secu-
rity and Cryptology of Fujian Normal
The deadline for paper submis- University.
sion is the 10th August.
It is an annual conference target-
ing the top research results in the
related area. See you all back in June!

Topics of interest encompass re- Best,


search advances in ALL areas of in- Julio Hernandez-Castro
formation security, cryptology, and

Cryptacus Newsletter
m Cryptacus.eu B cryptacus.newsletter@irisa.fr Page 4

You might also like