R E - T R U S T

Remote EnTrusting by RUn-time Software auThentication


Preliminary Detailed Program

Monday 18, 2006
Mornign Session Chair:    Moti Yung
09:30 - 09:45   Yoram Ofek - UNITN
Re-Trust Project Overview
(Abstract) (Full Presentation)
09:45 - 10:15   Moti Yung - Columbia U. / RSA, USA
Authentication: Present Overview and Future Challenges
(Abstract) (Full Presentation)
10:15 - 10:45   Christian Collberg - U. of Arizona, USA
Dynamic Algorithms for Software Watermarking - How to Store a Secret in Software
(Abstract) (Full Presentation)
10:45 - 11:00   Coffee Break
11:00 - 11:30   Bart Preneel - KUL
Open Research Issue in Cryptography
(Abstract) (Full Presentation)
11:30 - 12:00   Klaus Kursawe - Philips Research
Trusted Computing in Re-Trust
(Abstract) (Full Presentation)
12:00 - 12:30   Mario Baldi - POLITO
Trust in Network Protocols
(Abstract) (Full Presentation)
12:45 - 14:00   Lunch (Panorama)

Afternoon Session Chair:    Bart Preneel
14:00 - 14:45   Riccardo Scandariato - KUL
Entrusting by replacing: past experiences and open questions
(Abstract) (Full Presentation)
14:45 - 15:15   Stefano Di Carlo - POLITO
On-line integrity checking through Software Implemented Hardware Fault Tolerance (SHIFT) techniques
(Abstract) (Full Presentation)
15:15 - 15:30   Coffee Break
15:30 - 16:00   Paolo Tonella - ITC-IRST
Reverse engineering and mutation analysis in the context of software tampering and authentication
(Abstract) (Full Presentation)
16:00 - 16:30   Mariano Ceccato - ITC-IRST
Reverse Engineering Attacks to Remote Software Entrusting
(Abstract) (Full Presentation)
16:30 - 17:00   Srijith - VUA
Policy binding and enforcement in Java
(Abstract) (Full Presentation)
19:30   Italian Style "Aperitivo" at Tridente near Duomo
20:00   Dinner at "Orso Grigio" near Piazza Fiera


Tuesday 19, 2006
Morning Session Chair:    Christian Collberg
09:30 - 10:00   Willem Jonker - Philips Research
Security Needs of the Digital Society
(Abstract) (Full Presentation)
10:00 - 10:30   Ginger Myles - IBM Research
The use of software-based integrity checks in software tamper resistance techniques
(Abstract) (Full Presentation)
10:45 - 11:00   Coffee Break
11:00 - 11:30   Brecht Wyseur - KUL
Code Obfuscation, White-Box Cryptography, and HW/SW Co-obfuscation
(Abstract) (Full Presentation)
11:30 - 12:00   Igor Kotenko - SPIIRAS
Team background and Preliminary analysis of tasks to be solved
(Abstract) (Full Presentation)
12:00 - 12:30   Jean-Daniel Aussel - Gemalto
Smart-Card Assistance to Software Authentication
(Abstract) (Full Presentation)
12:30 - 13:00   Amitabh Saxena - La Trobe U., Australia
Black-Box Groups with Infeasible Inversion
(Abstract) (Full Presentation)
13:00 - 14:30   Lunch (Panorama)

Afternoon Session Chair:    Yoram Ofek
Project Kick-Off Meeting
14:30 - 14:45   WP1- UNITN
Architectural Framework
14:45 - 15:00   WP2 - POLITO
Software-based Tamper Resistance Methods for Remote Entrusting
15:00 - 15:15   WP3 - KUL
Hardware/Software-based Tamper Resistance Method for Remote Entrusting
15:15 - 15:30   WP4 - UNITN
Trust and Security Analysis
15:30 - 16:00   Coffee brak
16:00 - 16:15   WP1- UNITN
Milestones/Deliverables
16:15 - 16:30   WP2 - POLITO
Milestones/Deliverables
16:30 - 16:45   WP3 - KUL
Milestones/Deliverables
16:45 - 17:00   WP4 - UNITN
Milestones/Deliverables