Thursday 26 September 2019

08:00-08:45 Registration
08:45-10:00 Welcome & Keynote 1.
Room    Schengen II (shared with CBT and DPM workshops)

Arthur Gervais
Dr. Gervais is lecturer at Imperial College London (UK). He is Co-Founder, CEO, of Blockchain Scalability Platform. His research focuses on the security, privacy and performance of blockchain technology. Because this technology is still in its infancy, he largely focus on understanding and quantifying the tension points and tradeoffs in terms of security, privacy and performance, with the goal to build a mainstream, scalable, open, and decentralized blockchain protocol. Part of his research is e.g., the design of usable software that securely interacts with networks and hardware, connecting the real world with blockchain, and the design of practical and scalable blockchain platform. His research is inherently multidisciplinary and he frequently collaborate with colleagues worldwide in various fields (e.g., machine learning).

Title    Off Blockchain Protocols
Abstract    A plethora of recent research works have demonstrated different mechanisms on how to perform blockchain transactions without writing every single interaction to the underlying ledger. Instead, these protocols utilize the expensive and low-rate blockchain only as a recourse for disputes. Off-chain protocols promise to complete transactions in sub-seconds rather than minutes or hours while retaining asset security, reducing fees and allowing blockchains to scale. This talk will explore the various lines of research covering off-chain transactions. We will discuss their security and privacy provisions and identify unsolved challenges, indicating promising avenues of future work.
10:00-10:30 Coffee break
10:30-12:00 Session 1 (Authentication & Risk)
Room    Wiltz

Jule Anna Ziegler, Michael Schmidt and Mikael Linden
“Improving Identity and Authentication Assurance in Research & Education Federations”
Umberto Morelli, Silvio Ranise, Damiano Sartori, Giada Sciarretta and Alessandro Tomasi
“Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations”
Karin Bernsmed, Martin Gilje Jaatun and Christian Frøystad
“Is a Smarter Grid Also Riskier?”

12:00-13:30 Lunch break
13:30-15:00 Session 2 (Protocols)
Room    Wiltz

Fatih Balli, F. Betül Durak and Serge Vaudenay
“BioID: a Privacy-Friendly Identity Document”
Mina Sheikhalishahi, Fabio Martinelli, Zeki Erkin and Majid Nateghizad
“On the Statistical Detection of Adversarial Instances over Encrypted Data”
Joshua Guttman and John Ramsdell
“Understanding Attestation: Analyzing Protocols that use Quotes”

15:00-15:30 Coffee break
15:30-15:45 Short paper session
Room    Wiltz

Stelvio Cimato, Valentina Ciriani, Ernesto Damiani and Maryam Ehsanpour
“An OBDD-based Technique for the Efficient Synthesis of Garbled Circuits”

15:45-16:45 STM PhD award talk
Room    Wiltz

Felix Günther
Felix Günther is a postdoctoral researcher in the Security and Cryptography group at UC San Diego, working with Mihir Bellare. He obtained his Ph.D. from TU Darmstadt in 2018. His research interests are in applied cryptography enabling computer security, with a particular focus on provable security. His work aims to narrow the gap between the theoretical understanding and practical security of real-world cryptographic systems.

Title    A Cryptographic Perspective on TLS 1.3: Modeling Advanced Protocol Security
Abstract    Secure communication links are at the heart of today’s Internet infrastructure, and cryptographic protocols form their security core. Increasing demands for highest efficiency and stronger security have over the past years led to the standardization of novel and revised protocol designs, prominently Google’s QUIC protocol and the new TLS 1.3 standard. In this talk, I will discuss the road to TLS 1.3 from a cryptographic perspective and show how advanced cryptographic modeling can contribute to security standardization.
17:00-20:30 Social activity (NOTE: buses will leave at 17:00 sharp)
20:30-22:00 Gala dinner

 Friday 27 September 2019

08:45-09:00 Registration
09:00-10:00 Keynote 2
Room    Wiltz

Joshua Guttman
Dr. Joshua Guttman is a Senior Principal Scientist at the MITRE Corporation, and Research Professor at Worcester Polytechnic Institute.  He has focused on security foundations and applications, including cryptographic protocol analysis and design, network security, operating systems security, and information flow.
Dr. Guttman has written extensively, with about 75 academic publications, and regularly serves on program committees and proposal evaluations.  He was educated at Princeton and the University of Chicago.


A Cut Principle for Information Flow


We view a distributed system as a graph of active locations with unidirectional channels between them, through which they pass messages. In this context, the graph structure of a system constrains the propagation of information through it.
Suppose a set of channels is a cut set between an information source and a potential sink. We prove that, if there is no disclosure from the source to the cut set, then there can be no disclosure to the sink. We introduce a new formalization of partial disclosure, called blur operators, and show that the same cut property is preserved for disclosure to within a blur operator. A related compositional principle ensures limited disclosure for a class of systems that differ only beyond the cut.
10:00-10:30 Coffee break
10:30-12:00 Session 3 (Trust & Reputation)
Room    Wiltz

Paul Georg Wagner, Pascal Birnstill and Jürgen Beyerer
“Challenges of Using Trusted Computing for Collaborative Data Processing”
Mohammad G. Raeini and Mehrdad Nojoumian
“Secure Trust Evaluation Using Multipath and Referral Chain Methods”
Johannes Blömer and Nils Löken
“Personal Cross-Platform Reputation”

12:00-14:00 Farewell, Lunch