Logo konference
AktualityProgramPoplatkyRegistracePořadateléPartneřiPozvánkaUbytováníZpravodaj konferenceGalerie fotek z konference

Program konference SPI 2007

May 2, 2007
09:0011:15Luděk Novák: Information security standards
11:3012:20Partner presentation
12:2012:35Cold buffet
12:3514:30Stands Excursion

V rámci exkurse po stáncích projdeme stánky společností PCS spol. s r.o., ROHDE & SCHWARZ - PRAHA, s.r.o., F.S.C. BEZPEČNOSTNÍ PORADENSTVÍ, a.s., NOWATRON ELEKTRONIK, spol. s r.o., TTC TELEKOMUNIKACE, s.r.o. a ADI International (Honeywell, spol. s r.o. - Security Products o.z.).
14:3016:25 Mike Bond: Penetration (hacking) to Secure Hardware
16:2516:35Coffee Break
16:3518:30Amitabh Saxena: Code obfuscation and Software Protection
19:0022:00Welcome Reception

May 3, 2007
09:009:45 Enrico Bologna: NATO INFOSEC Community – Moving to Information Assurance (IA)
9:4510:05Amitabh Saxena: The RFID Guardian
10:0510:25 Theodore Tryfonas: An Alternative Model for Information Availability: Specifying the Intentions of DoS Attackers
10:2510:40Coffee Break
10:4011:10 Mike Bond: Cheating and Subliminal-Exploitation in Combat Simulations and Online Gaming
11:1011:40 Jay Klein: Digging Deeper Into Deep Packet Inspection (DPI)
11:4012:00 Václav Jirovský, Robert Malý: Virtual Communities and Cyber Terrorism
12:0012:20Petr Růžička: Group Encrypted Transport VPN
12:2013:15Lunch
13:1518:30Partner presentations
19:0022:30Coctail Party

May 4, 2007
9:009:30 Alf Zugenmaier: A Taxonomy Proposal for Privacy
9:3010:00 Christian Rechberger, Vincent Rijmen: The SHA Family of Hash Functions: Recent Results
10:0010:15Coffee Break
10:1510:35 Vlastimil Klíma: About a new generation of block ciphers and hash functions - DN and HDN
10:3510:55 Jan Krhovják, Petr Švenda, Vašek Matyáš, Luděk Smolík: The Sources of Randomness in Smartphones with Symbian OS
10:5511:15 Josef Kaderka: Coalition Network Defense Common Operational Picture (CNET-D COP)
11:1511:25Coffee Break
11:2511:45 Jan Krhovják, Marek Kumpošt, Vašek Matyáš: Security of electronic transactions – theory and practice
11:4512:05 Jiří Markl, Jaroslav Dočkal: Deployment of Snort IDS in SIP based VoIP environments
12:0512:25Daniel Joščák: Beyond the MD5 Collisions
12:3014:30Farewell Banquet

První zvaní řečníci konference SPI 2007

Enrico Bologna Enrico Bologna

CV: Colonel Enrico BOLOGNA of the Italian Army was assigned on 1 September 2004 as Chief INFOSEC Branch at NATO Headquarters (HQ) Consultation, Command and Control (C3) Staff (NHQC3S) after having served as Branch Staff Officer the previous two years.As Chief INFOSEC Branch he directs and supervises the handling and co-ordination all INFOSEC-related staff work and co-chairs the Information Assurance (formerly INFOSEC) Sub-Committee (SC/4) under the NATO C3 Board (NC3B). He also chairs the Public Key Infrastructure (PKI) Advisory Cell (PAC) and directs, in conjunction with the NATO Office of Security (NOS), the NATO Computer Incident Response Capability (NCIRC) and the development and maintenance of NATO Cyber Defence Policy. He provides liaison with National Security Authorities (NSAs), National Communications Security Agencies (NCSAs) of each member nation and equivalent NATO Partner Authorities and maintains liaison with the Strategic Commands, NATO Military and Civilian Agencies and Security Accreditation Authorities. Colonel BOLOGNA represents the NHQC3S or SC/4 in different fora as directed by the NC3B, NSC or Military Committee, in their respective domains.

Colonel Bologna, educated in scientific matters, attended the Army Academy and trained in signal and electronic engineering and received his commission as Lieutenant in 1984. He attended the Masters of National Defence War College (1994 and 1997) and received his Strategic Science University Degree from the University of TORINO in 1999.He graduated at the Electronic Warfare (EW) Course in Bulford - UK and at the National and NATO (Oberammergau - GE) Senior Officer's C2W and INFO Ops. Colonel Bologna is qualified in Integrated Communication Systems and Automated Command and Control Systems and for Designing and Managing a PKI; he is a military parachutist and military instructor in skiing and winter combat.

Colonel Bologna began his military career at the alpine Brigade in Turin participating in the Italian Contingent in support of Allied Mobile Force Land (AMFL) and at 2nd Signal Regiment in Bolzano for tactical network Corps level serving as Company Commander, S2 and S3 Officer. He served in Rome as Staff Officer at the Army General Staff CIS Division, developing Operational Requirements and signal Equipment verification for communication systems and Electronic Warfare (EW) materials.At the 45th Signal Regiment he served as Battalion Commander in Salerno for supporting and developing permanent strategic military networks in its area of responsibility (AOR) and its deployed links in the Balkan Theatres. He directed the development and implementation and managed the installation, certification and accreditation of the new national secure communication and information system during the year 2000. Prior to his NATO assignment, he served with the 2nd Regional Operative Defence-Force Command J3 Division in Naples, managing the Ops Cell for plans and activities as Mounting HQ for Balkan Theatres and as Chief, Information Systems Security Branch responsible for theatre policy and its enforcement concerning information warfare and communications and computer security. No stranger to the Alliance, from 2002 he was involved in activities related to INFOSEC Architectures, Crypto equipment and documentation under the NATO INFOSEC Sub-committee. He ends his Information Assurance Sub-committee (SC/4) Staff Co-Chairmanship in August 2007.

Název příspěvku: NATO INFOSEC Community Moving to Information Assurance (IA)

Stručný obsah: At the "Transformational Summit" on 28-29 Nov 2006 in Riga (Latvia) it was stressed the importance of "Security" and that Information Security or Protection of Information or the more and more used term Information Assurance (IA) will serve as an enabler for NNEC. It was emphasized for the NATO C3 Board (NC3B) to consider its role in Governance on NNEC as well as to consider the NC3B role in the Defence Against Terrorism (DAT) which includes Cyber Defence (CD) aspects. The NC3B is now finalizing its new sub-structure, a new organization based on capability perspective will facilitate working with the Allied Command Transformation (ACT) and the Military Committee (MC) on the new challenges. This talk surveys recent progress in this area.



Jay Klein Jay Klein

CV: Dr. Jay Klein is in charge of expanding Allot's core algorithmic competence and driving intellectual property development, industry standards involvement and academia cooperation.

Mr. Klein has over 20 years of experience in the Telecommunications field. Prior to Allot, Mr. Klein served as Vice President at DSP Group (VoIP & multimedia silicon solutions NASDAQ: DSPG) where he was responsible for strategic technology acquisitions. Prior to DSP, Mr. Klein was Co-Founder and CTO of Ensemble Communications (wireless access system manufacturer) and was one of the founders & creators of WiMAX and IEEE 802.16. Prior to Ensemble, Mr. Klein was CTO and Vice President of R&D with CTP Systems (cellular system manufacturer) which was acquired by DSP Communications and later by Intel. Prior to CTP, Mr. Klein was with the Israeli Ministry of Defense (IMoD) Research Department where he led various communication system projects, and for his accomplishments was awarded with the prestigious Israel Defense Presidential Award. In addition, Mr. Klein holds numerous patents in the Telecommunications field.

Název příspěvku: Network Visibility and Service Management utilizing Deep Packet Inspection

Stručný obsah: The broadband access market has become intensely competitive as the end user can pick and choose out from different network operators offering more or less the same service - internet access. Ongoing heavy investments made by these operators, mainly in network capacity and backhaul bandwidth, seem to be economically marginal as numerous applications and 3rd party services are aggressively consuming network resources. For example, many peer-to-peer file sharing applications (e.g., Bittorrent) tend to exploit subscriber's connection to its maximum allowed or capable capacity. The network operator's lack of ability to differentiate between different applications and services, not only affects its economics, but significantly harms the end user quality of experience (QoE) of internet access.

The first step for an operator to regain control is to understand how the network is utilized and which applications and services are being used. Only after this knowledge is within its grasp then it can theoretically be in a position in which services and applications could be controlled, policed and managed and even charged upon. The key enabler technology for this strategy is Deep Packet Inspection (DPI).

In this paper I will discuss DPI technology in general and its applicability to Layer 7 application identification. I will cover some key techniques for classification and discuss specific application examples. I will also show that coupling a DPI engine with traffic shaping capabilities facilitates the construction of network appliances which fits the new necessities of internet service providers and can increase on one hand, the end user QoE of specific services and on the other hand create new manageable services.



Mike Bond Mike Bond
CV: Mike bond is Security Director at Cryptomathic, a software security solutions provider. His research interests include Security APIs, EMV and online game security.

Název tutoriálu: Design Tutorial: Security APIs and HSM Programming

Stručný obsah: This tutorial surveys the challenges involved in programming HSMs securely and efficiently, and gives advice on good design based on in-depth case studies.

Název příspěvku: Cheating and Subliminal-Exploitation in Combat Simulations and Online Gaming

Stručný obsah: This talk surveys cheating and unfairness in online first-person games and combat simulations, and introduces a new class of exploits based on low-level network layer effects.



Amitabh Saxena Amitabh Saxena
CV: Amitabh Saxena obtained a Masters degree in Information Systems in 2003 and a PhD in cryptography in 2007, both from La Trobe University, Australia. His general interests include group-oriented cryptography, number theory, provable security, zero-knowledge proofs and quantum information processing. He is currently a post-doctoral fellow at the Department of Information and Communication Technology, University of Trento, Italy, and is working on the problem of code obfuscation.

Název tutoriálu: Code obfuscation and Software Protection

Stručný obsah: Over recent years the need for software protection has emerged. The main idea is to make software hard to "reverse engineer". In this regard the notion of "code obfuscation" has been proposed to address this issue. In this tutorial, we will discuss some recent work on code obfuscation and elaborate on some negative and positive results. Finally, we will give some open problems and further avenues for research.

Název příspěvku: The RFID Guardian

Stručný obsah: This talk will present the design and implementation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an "RFID firewall", enabling individuals to monitor and control access to their RFID tags by combining a standard-issue RFID reader with unique RFID tag emulation capabilities. Our system provides a platform for coordinated usage of RFID security mechanisms, offering fine-grained control over RFID-based auditing, key management, access control, and authentication capabilities.



Alf Zugenmaier Alf Zugenmaier
CV: Dr. Alf Zugenmaier has researched privacy and network security at University of Freiburg, Microsoft Research, and DoCoMo Euro-Labs. He is now a senior researcher at the latter.

Název příspěvku: A Taxonomy Proposal for Privacy

Stručný obsah: The aim of this talk is to present a coherent taxonomy of information privacy and relate it to security. It will also point out some directions of future research.



Christian Rechberger Christian Rechberger

CV: Christian Rechberger finished his master at Graz University of Technology with work on new side-channel attacks on implementations of cryptographic algorithms in 2004. After some time in the field of IT Security and E-Government he joined the newly formed research group around Vincent Rijmen and is now working on the analysis and design of cryptographic primitives, especially hash functions.

Vincent Rijmen Vincent Rijmen

CV: In 1993 Vincent Rijmen graduated as electronics engineer from the University of Leuven, Belgium (KU Leuven). He is co-designer of the Advanced Encryption Standard (AES) and since 2004 full professor at Graz University of Technology.

Název příspěvku: The SHA Family of Hash Functions: Recent Results

Stručný obsah: It is now already two years since the first theoretical attacks on the popular hash function SHA-1 have been announced. Cryptanalytic methods keep improving and soon a first SHA-1 collision will be presented to the public. This talk surveys recent progress in the analysis of the SHA family of hash functions and points out a number of issues surrounding the situation.



Luděk Novák Luděk Novák

CV: Vystudoval v roce 1991 Vojenskou akademii v Brně, kde působil do roku 1994 jako odborný asistent se zaměřením na počítačovou bezpečnost. Do poloviny roku 1999 pracoval jako odborník na bezpečnost informací v různých pozicích na Generálním štábu Armády České republiky. Od léta 1999 uplatňuje zkušenosti s řízením bezpečnosti informací v komerčním sektoru. V současnosti je vedoucím konzultantem ve společnosti ANECT a.s. se zaměřením na řízení rizik a bezpečnosti informací a na řízení procesů ICT. Je držitelem certifikátů CISA – Certified Information Systems Auditor, CISSP – Certified Information Systems Security Professional, členem Rady odborného sdružení ISACA CRC a členem technické komise Českého normalizačního institutu TNK 20 – Informační technologie.

Název tutoriálu: Information security standards

Stručný obsah: Odpovědnost za normalizaci bezpečnosti informací je v rámci Mezinárodní organizace pro normalizaci ISO zastřešena podkomisí JTC1/SC27 – Bezpečnostní techniky IT. V poslední době je důležitou snahou této subkomise harmonizovat přístupy a vzájemně provázat vydávané normy, což ne vždy bývalo úplnou samozřejmostí.

Cílem semináře je představit práci JTC1/SC27 a základní normy a standardy určené pro návrh a prosazování bezpečnostních principů. V první části budou představeny všechny dokumenty nové série ISO/IEC 27000, která upřesňuje pravidla řízení bezpečnosti informací. V dalším bloku budou prezentovány možnosti využití specifických norem a směrnic, které se soustředí na vybrané aspekty bezpečnosti např. ISO/IEC 18028 – bezpečnost sítí, ISO/IEC TR 18044 – řízení bezpečnostních incidentů, ISO/IEC 18043 – výběr, nasazení a provoz systémů detekce průniku (IDS), ISO/IEC 20000 – řízení služeb apod. Pozornost bude věnována především možnostem praktického využití a nasazení norem.



Jednací řečí je angličtina, simultánní překlad je zajištěn.