Palestrantes

Palestra 1A (P1A): Energy Efficient Security for IoT Devices

David Ott (Intel Labs)


Abstract: Power constraints in IoT devices follow from their reliance on finite lifetime batteries which, when depleted, will terminate the device's operation. Computational requirements for IoT devices have increased sharply over time as the amount of data collected, processed, and communicated has increased. Meanwhile, capacity gains in battery technology have increased only incrementally over the years. The result is the well-known battery gap. As security solutions (e.g., data encryption) similarly increase IoT computational requirements over time in order to remain robust against increasingly capable attackers, an associated security processing gap exists. In this talk, I will describe the Intel-Brazil research collaboration on Energy Efficient Security for IoT Devices, including research objectives, energy measurement methodologies, and some sample research results. Included also will be a few reflections on industry-academia collaboration in researching security solutions for the future of technology.

Short bio: David Ott is a Research Director within Intel Labs where he creates and directs programs that bring together top academic researchers and Intel R&D teams worldwide. David is a specialist in computer security, communications, and software, and has worked for Intel since 2005 in a variety of technical roles related to Intel platforms and enterprise computing. David holds MS and PhD degrees in Computer Science from the University of North Carolina at Chapel Hill.


Palestra 1B (P1B): Future IoT Security Challenges

Rafael Misoczki (Intel Labs)


Abstract: Internet-of-Things is a fascinating topic. It combines all sorts of devices, with different computational power, network bandwidth/speed and energy resources, in a collaborative fashion to achieve an ultimate goal. Due to this discrepancy in terms of resources (from very scarce up to very empowered), providing a concise and efficient security strategy across an IoT vertical is, and has always been, a challenge. If this situation is already challenging now, think about future IoT applications where the scale of the solutions will be exponentially larger and the interdependency between security and safety might turn a simple security vulnerability into a real life-threatening situation. In this short talk, I plan to discuss about a few future IoT applications, such as automotive, smart cities, healthcare and home automation, and their intrinsically related security research challenges.

Short bio: Rafael Misoczki is a Research Scientist at Intel Labs, Hillsboro, USA. His main research interests are post-quantum cryptography and efficient cryptographic schemes for IoT and wearable devices. Rafael Misoczki received his PhD in Informatique from the Université Paris 6 (Sorbonne Universités), Paris, France, in 2013, with a thesis on efficient constructions for post-quantum cryptography. He also received a MSc degree in Electrical Engineering (2010) and a BSc degree in Computer Science (2008), both from the Universidade de São Paulo, Brazil.


Palestra 2 (P2): Distributed Differential Privacy

Christopher Clifton (Purdue University, EUA)


Abstract: Information Security has long been based on cryptography-style all-or-nothing definitions, such as ciphertext indistinguishability as a measure of confidentiality. This is often inappropriate in a data privacy context; people want their data to be used, but in a controlled, limited manner. This talk will describe differential privacy as a means for balancing data use and confidentiality. We will then show how this solves problems that are swept under the rug in traditional confidentiality definitions.
This will be presented in the context of a distributed data scenario: attempting to share data analysis without sharing the underlying data. Neither secure multiparty computation or differential privacy adequately solves this problem on its own, but combined, we can achieve good results while controlling disclosure of individual data. Efficiently combining these techniques turns out to be non-trivial, we will show some of the challenges and how they can be solved.

Short bio: Dr. Clifton is a Professor of Computer Science at Purdue University. He works on data privacy, particularly with respect to analysis of private data. From 2013-2015, Dr. Clifton served as a program director at the National Science Foundation. Prior to joining Purdue in 2001, he was a principal scientist in the Information Technology Division at the MITRE Corporation. Before joining MITRE in 1995, he was an assistant professor of computer science at Northwestern University. He has a Bachelor's and Master's degree (1986) from the Massachusetts Institute of Technology, and a Ph.D. (1991) from Princeton University.


Palestra 3 (P3): IoT Blockchain: Open, Secure, Private and Trusted Internet of Things Stack

Martín Serrano (Insight Centre for Data Analytics, NUI Galway, IRL)


Abstract: Today people have a greater awareness about the benefits of Internet of Things sensed-enabled services, likewise more sensing services are easier to adopt and deploy. Cities are a clear example where IoT has influenced big changes for its infrastructure and its inhabitants, for example today there are cities technologically equipped and socially organized in a way that the generation and deployment of better citizen services and solutions are more rapidly adopted (e.g. Smart Cities). The Internet of Things is already considered the scientific evolution of the Internet that comes with a technology deployment wave of connected devices.
The Open Internet of Things stack, published at the IEEE IoT newsletter in 2015, has been designed in the context of having IoT systems and cloud infrastructures. It is the methodology that defines and establishes the relations between the operations and the role that "things" can play in the whole IoT system(s), likewise it represents the functionality or services that applications are able to provide and support. However the big concern is how Open and Trusted is the Internet of Things Infrastructure and how reliable are the services running in IoT infrastructure to offer data privacy and access security based on IoT services transactions.
In this talk we will go through todays' Open, Security, Privacy and Tryst relations and how the IoT technology and the global conditions, according with new data trends are the channels for user acceptance and large deployments in global user communities. The recently introduced, distributed blockchain, in the security market draws IoT directions to discuss and identify how IoT must be designed to be secure, transparent, highly resistant to outages, auditable, and efficient. The emergent technologies like blockchain will demonstrate where technology has evolved and the manufacturing cost being reduced or not.

Short bio: Dr. Martin Serrano is the research director and scientific coordinator of the Internet of Things Unit (UIoT) within the Insight Centre for Data Analytics Galway (former DERI) at the National University of Ireland. Dr. Serrano has more than 15 years experience in ICT industry and applied scientific research within a wide range of successful European (FP5-FP7/H2020) collaborative software projects, Irish National Projects (HEA PRTLI, SFI) and also Enterprise Ireland (EI) innovation projects. He also leads Future Internet Research and Experimentation (FIRE) activities and IoT industrial innovation targeted projects. Dr. Serrano is a recognized IoT Expert with a strong background on applied semantic and systems interoperability, services and network management technologies. Dr. Serrano has been included in the list of top 25 key people influencing the Internet of Things ("https://www.siliconrepublic.com/machines/2015/10/06/25-internet-of-things-iot-leaders-ireland), He has a leading role in the European Research Cluster for the IoT and he is board member at the Connected Smart Cities Network. Dr. Serrano is a continuous contributor to the Scientific, Research and Innovation agenda for Europe. He is also actively investigating, Semantic-based Cloud Infrastructures and Big Data Management. Data Bases Stream processing, Cyber-Physical Systems (CPS) Control, Privacy and Security aspects for IoT, Sensor Networks for the IoT and their deployment in cloud computing environments. Dr. Serrano is an active member of IEEE (Computer and Communication Societies) and ACM and He is the author of the book “Applied Ontology Engineering in Cloud Services, Networks and Management Systems” published by Springer, NY, USA and several book chapters on related areas.


Palestra 4 (P4): The Cyberspace Battle for Information: Combating Internet Censorship

Amir Houmansadr (University of Massachusetts Amherst, EUA)


Abstract: The Internet has become ubiquitous, bringing many benefits to people across the globe. Unfortunately, Internet users face threats to their security and privacy: repressive regimes deprive them of freedom of speech and open access to information, governments and corporations monitor their online behavior, advertisers collect and sell their private data, and cybercriminals hurt them financially through security breaches. My research aims to make Internet communications more secure and privacy-preserving. In this talk, I will focus on the design, implementation, and analysis of tools that help users bypass Internet censorship. I will discuss the major challenges in building robust censorship circumvention tools, introduce two novel classes of systems that we have developed to overcome these challenges, and conclude with several directions for future research.

Short bio: Amir is an assistant professor of computer science at UMass, where he joined in Fall 2014. His area of research is network security and privacy, which includes problems such as Internet censorship resistance, statistical traffic analysis, location privacy, and privacy in next-generation network architectures. He received his Ph.D. from the University of Illinois at Urbana-Champaign in 2012, where he was advised by Nikita Borisov. After that, he was a postdoctoral scholar for two years at the University of Texas at Austin, honored to be working with Vitaly Shmatikov. He also earned his M.Sc. and B.Sc. degrees from the Electrical Engineering Department of Sharif University of Technology. He received a Google Faculty Research Award in 2015 and an NSF CAREER Award in 2016.


Palestra Nacional (PN): Segurança em IoT: o futuro repetindo o passado

Miriam von Zuben (CERT.br/NIC.br)


Resumo: A Internet das Coisas (IoT) já é uma realidade e apresenta desafios que demandam novas abordagens de segurança. Nesse novo cenário, novas vulnerabilidades surgem e outras bem conhecidas podem ser exploradas. Nessa palestra, a partir do relato de algumas ameaças e ataques, serão analisados os riscos de conectar "coisas" à IoT sem considerar a segurança.

Short bio: Miriam von Zuben é Analista Sênior de Segurança do CERT.br/NIC.br, desde 2005, tendo atuado nas áreas de Tratamento de Incidentes e Análise de Tendências. Atualmente, atua na área de Treinamento e Conscientização de Usuários, ministrando palestras e desenvolvendo materiais relacionados a boas práticas de segurança. É também instrutora dos cursos do CERT/CC, da Carnegie Mellon University. É a principal mantenedora da Cartilha de Segurança para Internet.


Realizado por:
Apoiado por:
Patrocinado por:
Diamante
Ouro
Prata
Bronze
Desenvolvido por: