VeriTrust Verified Trusted Computing

Slides:



Advertisements
Similar presentations
SECURITY RESEARCH SEVENTH FRAMEWORK PROGRAMME Mark Stroud Home Office Scientific Development Branch UK Security Programme Committee Member.
Advertisements

Jacques Bus, Head of Unit DG Information Society and Media EU-US Cooperation in Network and Information Security 17 Mar, 2008 – Yale, US.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
NM Interoperability Technical Exchange
Boost your network security with NETASQ Vulnerability Manager.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Giandonato CAGGIANO ENISA MANAGEMENT BOARD REPRESENTATIVE LEGAL ADVISER ON EUROPEAN AFFAIRS OF THE MINISTRY OF COMMUNICATIONS U. OF ROMA TRE LAW FACULTY.
The Pursuit for Efficient S/C Design The Stanford Small Sat Challenge: –Learn system engineering processes –Design, build, test, and fly a CubeSat project.
SEC835 Database and Web application security Information Security Architecture.
ANSALDO: BACKGROUND experience in dependable Signalling Automation Systems experience in dependable Management Automation Systems experience in installation,
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
WEB 2.O APPLICATIONS FOR SMALL BUSINESS IT255: Unit 3.
Bruxelles Ansaldo STS – Company Profile nShield ARTEMIS Call
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
Dependability in FP 6 Brian Randell Pisa Workshop, November 2002.
Presentation of projects’ ideas. 1. Madrid Network “A public-private network which aim is to contibute actively to position Madrid Region in the top.
International Internship Summer 2008: NICTA (Sydney, AU) Caitlin Cottrill.
USL4 Health Company of Prato PUSL Yorkshire Digital Eco-system. Sheffield, 31 Jan 2008.
1 Vulnerability Assessment Elisa Heymann Computer Architecture and Operating Systems Department Universitat Autònoma de Barcelona
Security Information and Event Management
Survey Report IPEXPO 2015 Top priorities and Technology Trends.
1 Introduction SEARCH-LAB Ltd.. 2 Introduction of SEARCH-LAB SEARCH Laboratory established at the Budapest University of Technology in 1999 SEARCH-LAB.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Urban Infrastructure and Its Protection Responding to the Unexpected Interest Group Report.
Michael Radloff, Martin Schultz 12th International Conference BPM 2014 Modeling Concepts for Internal Controls in Business Processes – an Empirically Grounded.
Dr. Stelios Panagiotou, Dr. Stelios C.A. Thomopoulos Integrated Systems Laboratory Institute of Informatics and Telecommunications National Center for.
PROFIFOX A clever way to manage.. What is PROFIFOX? PROFIFOX is a software solution designed to increase the efficiency of teams working on problems and.
How Sage ERP X3 Systems Can Benefit Businesses.  Sage X3 is an affordable and flexible ERP solution designed to help mid-sized companies manage business.
Clouding with Microsoft Azure
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
TCSEC: The Orange Book.
Device Security in Cognitive Radio
Firewall Issues Research Group GGF-15 Oct Boston, Ma Leon Gommans - University of Amsterdam Inder Monga - Nortel Networks.
Energy Saving Bureau Industrial energy audits in coherence with Directive on the promotion of end-use efficiency and energy services.
Joseph JaJa, Mike Smorul, and Sangchul Song
Outline What does the OS protect? Authentication for operating systems
Lessons Learned, Future Plans and Conclusions
Utilizing AI & GPUs to Build Cloud-based Real-Time Video Event Detection Solutions Zvika Ashani CTO.
WELCOME Mobile Applications Testing
Detection and Analysis of Threats to the Energy Sector (DATES)
INFS 3500 Martin, Brad, and John
Outline What does the OS protect? Authentication for operating systems
Surveillance. Public Health Approach Surveillance What is the Problem ? Problem Risk Factor Identification : What Is the Cause ? Intervention Evaluation.
CMMI Overview.
Project 2 Rachel Richman Gatcombe Section /17/2018 3:02 AM.
CORPORATE PROFILE JUNE 2016
Business Transformation
Industrial Ontologies Group: 10th Anniversary
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Contact Center Security Strategies
Enterprise Data Solution Running on the Azure Cloud Platform Protects, Preserves Critical Data “Druva takes a proactive approach to help customers address.
CIPSEC Future Activities
High Performance Computing Center – HLRS
SCOTT NO meeting Measurement
Internet Engineering Course
ENabling SafE Multi-Brand Platooning for Europe
Configuration Management
RED.
Security in Cloud Computing
Penn State Information Technology
OU BATTLECARD: E-Business Suite Courses and Certifications
Cloud Computing for Wireless Networks
Presentation transcript:

VeriTrust Verified Trusted Computing Erno Jeges, SEARCH-LAB Ltd.

SEARCH-LAB Ltd. IT security Physical security 1999 university lab FLINDER – An automated security testing tool capable of discovering typical security-relevant bugs http://www.flinder.hu/ SHIELDS – Detecting known security vulnerabilities from within design and development tools (FP7 STREP) http://www.shields-project.eu/ OpenTC – Development of trusted and secure computing systems based on open source software (FP6 IP) http://www.opentc.net/ DESEREC – Increasing dependability and security of critical infrastructures (FP6 IP) http://www.deserec.eu/ IDENTRACE – Site wide identity tracking system based on object tracking and identification methods http://www.identrace.com/ 1999 university lab 2002 spin-off company 2003 → FP5, FP6, FP7… IT security security evaluation security testing common vulnerabilities embedded/mobile Physical security intelligent video surveillance site wide object tracking non-cooperative identification remote/soft biometrics

Project idea for ARTEMIS call 2010: VeriTrust Trusted Computing solutions achieve trust by protecting HW and SW integrity trusted platforms preserve integrity during operation However, vulnerabilities may still exist in the implementation Poorly evaluated solutions are a serious setback VeriTrust will develop tools and methods for objective and effective evaluation of implementations in compliance with TCG standards will focus on security and interoperability will make complexity manageable will provide affordable evaluation via automated tools

Thank you for your attention Ernő Jeges erno.jeges@search-lab.hu www.search-lab.hu