CLEARER: Security and Privacy Research Roadmap for the CrySyS Lab Levente Buttyán, Márk Félegyházi, Boldizsár Bencsáth Laboratory of Cryptography and System.

Slides:



Advertisements
Similar presentations
Célzott informatikai támadások napjainkban Boldizsár Bencsáth PhD Laboratory of Cryptography and System Security (CrySyS) Budapest University of Technology.
Advertisements

© 2013 Copyright Southwest Research Institute ® Southwest Research Institute Embedded Systems Security for Automotive October 3, 2013.
Text mining Gergely Kótyuk Laboratory of Cryptography and System Security (CrySyS) Budapest University of Technology and Economics
ESCALATE December 1 st 2008 Professional Development for Higher Education: Mapping the territory. Dr Liz Beaty, Director Strategic Academic Practice and.
Complex networked systems ICT LEIT H2020 InfoDay Mario Di Francesco, PhD Assistant professor – Aalto University Department of Computer Science and Engineering.
Targeted attacks of recent days Boldizsár Bencsáth PhD Laboratory of Cryptography and System Security (CrySyS) Budapest University of Technology and Economics.
Stuxnet, Duqu és társai – kifinomult internetes kártevők kifejlesztése, átalakítása, továbbfejlesztése Stuxnet, Duqu and others – development and operation.
Research and teaching activities in the CrySyS Lab Levente Buttyán Laboratory of Cryptography and System Security (CrySyS) Budapest University of Technology.
Kriptográfia - a legerősebb láncszem a kiberbiztonság gyakorlatában? Boldizsár Bencsáth PhD Laboratory of Cryptography and System Security (CrySyS) Budapest.
EUROSEC 2011 Gábor Pék, Boldizsár Bencsáth and Levente Buttyán Laboratory of Cryptography and Systems Security Budapest University of Technology and Economics.
Cyber Insurance for Data Breaches Márk Félegyházi Laboratory of Cryptography and System Security (CrySyS Lab) Department of Telecommunications Budapest.
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
Beyond Prototypes: Challenges in Deploying Ubiquitous Systems N. Davies and H. Gellersen IEEE pervasive computing, 2002 Presenter: Min Zhang
History Since 1999 till present Since 1958 till 1961 One of the first departments of university 3 Since 1961 till 1999 تا 1378.
Chapter 1: The Context of SA&D Methods
Corvinus University of Budapest. Brief history Faculty of Business Administration Faculty of Economics Faculty of Social Sciences Faculty of Public Administration.
1 Computer Engineering Department College of Computer Sciences and Engineering Tuesday 18 November 2008 King Fahd University of Petroleum & Minerals.
Department of Computer Engineering Lale Akarun, Chair, Most preferred undergraduate program nationally; admit 70 students/yr.
University of Zilina Slovakia. Brief history The University of Zilina was established on October 1, 1953 as the University of Railway Transport in Prague.
Careers in Mathematics 24 March Careers In Mathematics What can you do with a B.Sc. degree in Mathematics ? Where do you want to work ?
Malicious Attacks Quinn Male Susan Dou Hanzhang Hu.
EHealth Challenges and Opportunities E-health: Multi-disciplinary of E (ICT) and Healthcare, or applied ICT in healthcare (Design oriented), or healthcare.
Electronic and Computer Engineering D Azzi (PL)R Khusainov (SL) D Robinson (RF-HEIF IV)
Jyväskylä There are more of buildings designed by world famous architect Alvar Aalto than anywhere else in the world. Population –The biggest city.
Introduction IT Department at CEU Contribution to carry out CEU’s mission with appropriate: -Information technology tools and services -Hardware and software.
EIT ICT Labs  ICT innovation is driving transformations in society to improve quality of life  Rapid disruptive ICT innovation is a key driver in the.
Information Systems and Internet Security (ISIS) Lab Research overview and some recent projects Nasir Memon Polytechnic Institute of NYU.
The Digital Learning Platform for Critical Life Skills ALICE WAGNER, SC SCHOOLS MANAGER (864)
Dr. Mohammad Mohammadi Aghdam Head of Mechanical Engineering Department.
LEFIS W2 Posgraduate Workshop 1 LEFIS, WG 2 Postgraduate studies Meeting, Rotterdam.
Information Security in an Introductory Course. Introduction Kathy Winters University of Tennessee at Chattanooga Department of Computer Science and Engineering.
Stepping Into Web 2.0: Building New Learning Environments Panel Members Paulette Robinson, PhD—Intro and Virtual Worlds Nate Allen, PhD—Communities of.
Structure of Study Programmes
Network of Excellence in Internet Science Network of Excellence in Internet Science (EINS) Joint Workshop and 4 th Plenary Meeting Bologna June 13, 2014.
Computer Networks Working Group Prof. Dr. E. Milovanović.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
History  Founded in 1988 as the first Aerospace Engineering Department in the country.  More than 1157 graduates since 1988 in various.
Introducing the CrySyS Lab Félegyházi Márk Laboratory of Cryptography and System Security (CrySyS Lab) Budapest University of Technology and Economics.
FACULTY OF ORGANIZATIONAL SCIENCES UNIVERSITY OF BELGRADE FACULTY OF ORGANIZATIONAL SCIENCES Studies in INTERNET TECHNOLOGIES & ELECTRONIC BUSINESS Božidar.
Agder University Faculty of Engineering and Science ICT Department Head of ICT Department Prof. A. Prinz.
Introduction Thomson Chan Rosaryhill School
Version Number Authentication and Local Key Agreement Levente Buttyán Laboratory of Cryptography and System Security (CrySyS) Budapest University of Technology.
SAFESPOT SP2 Meeting September 14 th and 15 th 2006 Rome 1 Integrated Project Co-operative Systems for Road Safety “Smart Vehicles on Smart Roads” Tamas.
$20 billion business 230 million printers sold  170 million inkjet  60 million laserjet #1 in ink, laser, scanners, designjet, print servers Consistent.
Endowed by Chair of Future Communication Faculty of Computer Science Prof. Dr. K. Tutschku PhD Course Introduction Future Network Architectures and Experimentation.
Virtual Worlds in Government Virtual Worlds in Languages Paulette Robinson, PhD National Defense University “A global learning community for government’s.
Dr. Peter Trúchly Faculty of Informatics and Information Technologies Slovak University of Technology.
School of Engineering. Y.U. School of Engineering Founded in Departments Computer Engineering (2001) Industrial Engineering (2001) Electronics.
1 Structure of Aalborg University Welcome to Aalborg University.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Information Assurance – A Technology Transfer Success Story Deidre W. Evans, Edward L. Jones, Christy L. Chatmon Computer and Information Sciences Department.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
UNIVERSITY OF JYVÄSKYLÄ Department of Mathematical Information Technology 2002 Faculty of Information Technology Department of Mathematical Information.
Roadmap Penelitian DSP Research & Technology Group ITB Tahun
UNIVERSITY OF JYVÄSKYLÄ FACULTY OF INFORMATION TECHNOLOGY IT with a human touch 2010.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Faculty of Engineering at Shoubra
Stefan Poslad, PhD School of Electronic Engineering & Computer Science
Information Collection and Presentation Enriched by Remote Sensor Data
Computer Science Courses
Future Technologies FTC 2016 Future Technologies Conference December 2016 San Francisco, United States.
University of Cyprus UCY
Prof. Maria Papadopouli
Broad Emerging Themes in CPS/IoT
Collaboration Universidad de Chile (DCC) - GITS
Collaboration Universidad de Chile (DCC) - GITS
Department of Computer Science DCC University of Chile
Computer Science Courses in the Major
Presentation transcript:

CLEARER: Security and Privacy Research Roadmap for the CrySyS Lab Levente Buttyán, Márk Félegyházi, Boldizsár Bencsáth Laboratory of Cryptography and System Security (CrySyS) Budapest University of Technology and Economics

Laboratory of Cryptography and System Security CrySyS Adat- és Rendszerbiztonság Laboratórium 2 Where are we standing?  history –lab established in 2003 –2 faculty members and 2 PhD students at that time –currently, 4 faculty members, 1 post doc, 5 PhD students –since 2003, 5 people obtained the PhD  teaching –MSc course on Information Security, BSc course on Computer Networks –MSc special on Security of Communication Systems (Cryptography, Network Security, Secure e-Commerce, Economics of Security and Privacy)  research –focus on security and privacy in wireless networked embedded systems –EU projects: UbiSec&Sens – wireless sensor networks SeVecom – vehicle safety communications EU-MESH – wireless mesh networks BIONETS – “pocket switched networks” WSAN4CIP – wireless sensor networks CHIRON – body area sensor networks –outputs: numerous publications, implemented prototypes, established role in the wireless network security research community

Laboratory of Cryptography and System Security CrySyS Adat- és Rendszerbiztonság Laboratórium 3 Where do we want to go? Embedded wireless networks operating systems “future Internet” security privacy security issues in virtualization security of mobile platforms (eg. android) code attestation cyber insurance and risk management economics of domain name registration reputation systems for defense mechanisms privacy in mobile social networks