46
1 COST Action IC1403: CRYPTACUS COST Action IC1403: CRYPTACUS CRYPTAnalysis of Ubiquitous Computing Systems MC Chair: Gildas Avoine, INSA Rennes, France MC Vice-Chair: Julio Hernandez-Castro, Univ. of Kent, UK Grant Holder: INSA Rennes, France COST Science Officer: Ralph Stübner COST Administrative Officer: Matthias Kahlenborn Improve the security and privacy of ubiquitous computing systems, from theory to practice. Cryptography, Security, Privacy, Low-cost devices Proposer Context Objective Partners Stakeholders Organization Working Groups Other Actions Dissemination Implementation Decisions Actions Miscellaneous

COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

1

COST Action IC1403: CRYPTACUSCOST Action IC1403: CRYPTACUSCRYPTAnalysis of Ubiquitous Computing Systems

MC Chair: Gildas Avoine, INSA Rennes, FranceMC Vice-Chair: Julio Hernandez-Castro, Univ. of Kent, UK

Grant Holder: INSA Rennes, FranceCOST Science Officer: Ralph Stübner

COST Administrative Officer: Matthias Kahlenborn

Improve the security and privacy of ubiquitous computing systems, from theory to practice.

Cryptography, Security, Privacy, Low-cost devices

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 2: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

2

Context

Implantable medical devices, ePassports, Access control, Car ignition keys, Payment,

Smart meters, GPS,…

Computing systems no longer consist only of connected servers, but involve a wide range of

pervasive and embedded devices, leading to the concept of "ubiquitous computing systems".

Battery-less devices.Low memory and processing capabilities.

Hardware and embedded software (long life-cycles).Personal data collected.

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 3: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

3

Most of ubiquitous computing systems are very weak

Examples of broken systems.

Mifare Classic. Keeloq car ignition system. Mifare DESfire. Transportation passes (Boston, London,…) Building access control. Implantable medical devices (insulin pump,…).

Examples of frauds: remotely-controlled garage door, payment fraud, stolen cars, ePassport cloning,…

Gap between theory and practice.

Context

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 4: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

4

Improve the analysis methodologies and tools for assessing the security and privacy of ubiquitous computing systems.

Ultimately providing guidelines for secure future designs.

Innovative because: Focus on cryptanalysis. Consider real-world applications. Consider privacy as well.

Impact for stakeholders and societal impact.

Objective and Impact

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 5: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

5

Partners18 partners participated in the proposal

12 involved countries

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 6: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

6

COST 35 COST Countries, 1 Cooperating Country

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 7: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

7

COST35 COST Countries, 1 Cooperating Country

Including 19 Inclusiveness Countries

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 8: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

8

Cryptacus23 COST Countries, 1 Cooperating Country

Including 10 Inclusiveness Countries

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 9: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

9

23 countries signed the MoU

Early Stage Researchers (phd ≤ 8y) 20 among 51

Gender Balance 7 among 51

Inclusiveness Countries 10 among 24

Industrial Partners 0

International Partners 0

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

MC Statistics

Page 10: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

10

Stakeholders include chip manufacturers (e.g. NXP) and integrators (e.g. Oridao)

Partners are strongly connected to stakeholders.

Stakeholders will be able to join the project once accepted.

Stakeholders

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

“The research performed in this proposal concerning security in ubiquitous computing systems is an essential area for research and development at NXP.

Academic research activities in this field usually focus on pieces of the problem and resulting solutions are hardly applicable to commercial solutions.

The CRYPTACUS project addresses the question with a holistic and innovative bottom-up approach where the practical considerations settle in the core of the activities.

CRYPTACUS may have an important impact for our future developments, and NXP is consequently glad to fully support this European initiative.” [NXP]

“We strongly support CRYPTACUS initiative for 2 reasons:- IoT security aspects are today clearly underestimated (…)- The proposed consortium gathers worldwide recognized experts with a proven track record of combining theoretical approach with pragmatic real life scenarios.” [ORIDAO]

Page 11: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

11

MC + 4 WG Meetings.

Scientific Committee.

Policy Enforcement Committee.

Organization

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 12: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

12

Working Groups

Security assessment of real-world

systems

Hardware and software security

engineering

Cryptanalysis of building blocks

Cryptographic models

Investigate how existing security and privacy models might be extended toconsider real-world settings e.g. physical noise, authentication server.

Objectives

1. Confront crypto & privacy communities’ views.

2. Confront models with practical scenarios.

Milestones

A security and privacy model for ubiquitous computing systems that could eventually lead to a security and privacy certification.

Outcomes

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 13: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

13

Working Groups

Security assessment of real-world

systems

Hardware and software security

engineering

Cryptanalysis of building blocks

Cryptographic models

Bridge the knowledge between the fields of cryptography and security and ubiquitous computing.

Objectives

1. Apply stream cipher theory to ultra-lightweight designs.

2. Develop a formalization of distance bounding protocols.

Milestones

New attacks, recommendations and assessment processes for the design of protocols and primitives.

Outcomes

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 14: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

14

Working Groups

Security assessment of real-world

systems

Hardware and software security

engineering

Cryptanalysis of building blocks

Cryptographic models

Develop new (in labs) attacks (and guidelines for countermeasures): side-channel attacks, reverse-engineering, location privacy,…

Objectives

1. Apply side-channel attacks to ubiquitous computing devices.

2. Develop suitable reverse-engineering techniques.

Milestones

Methodologies in hardware and software engineering and three software tools for side-channel attacks and reverse-engineering.

Outcomes

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 15: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

15

Working Groups

Security assessment of

real-world systems

Hardware and software security

engineering

Cryptanalysis of building blocks

Cryptographic models Attack and analyze real-world

systems.

Objectives

1. Evaluation of the current (in)security in the real world.

2. Define a generic attack procedure.

Milestones

(1) Provide companies with helpful recommendations, (2) challenge WGs with experimental results and (3) raise the awareness of citizens.

Outcomes

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 16: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

16

IC1306 is a COST Action related to cryptography for secure digital interaction, namely internet of computers (SSL, public-key crypto,...) and its future (secure cloud computing,…)

Example of considered primitives: e-voting, secure multiparty computations, formal verification methods, etc. based on asymmetric crypto such as lattice-based crypto or multi-linear mapping.

Other Related COST Action: 1306

Both Actions relate to crypto but there the overlap is small.

Cryptacus focuses on ubiquitous computing (embedded, lightweight) with a cryptanalysis approach.

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 17: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

17

IC1204 is a COST Action related to the manufacturing flows of secure hardware, as well as fault and active disturbances on actual hardware (ASIC, FPGA).

WG1: Manufacturing test of secure devices

WG2: Trustworthy manufacturing of secure devices

WG3: Fault attack detection and protection

WG4: Reconfigurable devices for secure functions

WG5: Validation, Evaluation, and Fault Injection

Other Related COST Action: 1204

Both Actions relate to crypto but there the overlap is small.

Cryptacus focuses on real-world ubiquitous computing (lightweight) with a cryptanalysis approach.

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 18: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

18

A book (Springer) on the security and privacy in ubiquitous systems authored the Action Participants.

Non technical articles aimed at large-audience in international and national magazines, edition of a special issue in IEEE Comm. or Comm. Of the ACM.

Three software tools (side-channel attacks and reverse-engineering).

Expertise passed on to young researchers and non-academic stakeholders through training schools.

Joint publications + Proceedings + Progress & Final reports + Website + Short Term Scientific Missions.

Dissemination

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 19: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

19

Memorandum of Understanding (MoU).

COST Vademecum.

E-COST online application.

Cryptacus website (not set up yet).

Documents and Tools

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 20: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

20

INSA (Institut National des Sciences Appliquées) is an engineering School (about 1’600 students).

INSA is affiliated to the computer science laboratory IRISA (joined lab with INRIA and CNRS) .

INSA assigned a part-time secretary (30%) to Crytpacus: Isabelle Mesguen.

Grant Holder

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 21: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

21

Organigram

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 22: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

22

The missions of the Scientific Committee are the evaluation of proposals for Short Term Scientific Missions (STSM) and proposals for the organization of events (Meetings, Workshops, and Training Schools). Missions of the Scientific Committee also include the monitoring of the achieved objectives.

The Scientific Committee consists of a Chair and four Working-Group Leaders.

Scientific Committee

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 23: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

23

The missions of the Policy Enforcement Committee are to monitor that the Action complies with the COST policies in terms of gender balance, inclusiveness, early stage researchers involvement, international cooperation, and industry participation, and suggest activities to enforce these policies.

The Policy Enforcement Committee consists of a Chair and a few members belonging to the Action (not necessarily belonging to the MC).

Policy Enforcement Committee

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 24: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

24

Working Groups consist of Researchers affiliated to a Participating COST Country and explicitly registered as WG Members. Working Groups are led by a Leader and a Vice-Leader.

MC Members can register to any WG without formal approval of the Leader, and each MC Member should be registered to at least one WG.

Other researchers must require the approval of the WG Leader to become a member of that WG.

Working Groups

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 25: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

25

MC+WG+TS Meeting in Spring 2015.

Croatia, Šibenik

May 31st – June 5th

MC+WG June (date to be announced later)

MC+WG Meeting in Fall 2015.

Date and location to be defined later.

Short Term Scientific Missions.

Work Plan

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous summerschool-croatia15.cs.ru.nl

Page 26: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

26

First Grant Period is likely to start on Mach 1st, 2015.

Budget is 129’000 €.

Grant Agreement

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 27: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

27

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

A. COST Networking Tools EUR

(1) Meetings 70,040

(2) Training Schools 13,140

(3) STSMs 25,000

(4) Dissemination 3,500

(5) Other Expenses (Bank Fees) 400

B. Total Science Expenditure 112,080

C. FSAC (15%) 16,812

D. Total Expenditure (B+C) 128,892

Budget Plan

Page 28: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

28

Do you approve the organigram, namely the structure (chair, vice-chair, scientific committee, policy enforcement committee, working group

leaders and vice-leaders, website manager) and the people already assigned ?

Decision 1: Organigram

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 29: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

29

Decision 2: Working Plan

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Do you approve the first-year working plan, i.e.:

MC+WG+TS Meeting in Spring 2015

MC+WG Meeting in Fall or winter 2015

At least 10 Short Term Scientific Missions.

Page 30: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

30

Decision 3: Budget Plan

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Do you approve the first-year budget plan?

Page 31: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

31

Decision 4: Next Meeting

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Do you approve the following date and location for next MC+WG+TS Meeting, namely:

Croatia, Šibenik, 2015

During of right after the Training School: May 31st – June 5th.

Page 32: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

32

Decision 5: Invitation/Reimbursement

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Invitations to attend meetings will be sent at least 30 calendar days in advance to Management Committee Members.

MC Members and Substitutes who do not confirm their attendance at least 15 calendar days in advance will not be reimbursed.

The Chair can decide to use the saved money to reimbursed other participants.

In such a case, the scientific committee will be requested to provide the Chair with a ranked list of candidates to be reimbursed.

The MC delegates its authority to the MC Chair to apply this rule.

Page 33: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

33

Decision 6: Working Group Members

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Each MC Member must belong to at least one WG

MC Members do not need the approval of WG Leaders to become members of any WG.

Working Group Leaders must keep up-to-date lists of official WG Members.

Apart from MC Members, becoming a WG Member requires the prior approval of the WG Leader.

Approval criteria are let to the discretion of each WG Leader.

Page 34: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

34

Decision 7: WG Vice-Leaders

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Working Group Vice-Leaders who are not MC Members are reimbursed to attend WG Meetings.

Page 35: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

35

Decision 8: STSM Selection

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

The Scientific Committee is in charge of selecting candidates for Short Term Scientific Missions.

The MC delegates its authority to the MC Chair to approve the selection suggested by the Scientific Committee. In case of conflict of interest, the authority is delegated to the MC Vice-Chair.

Page 36: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

36

The first Grant Period will start on March 1st, 2015.

Assigned to: COST Office and Grant Holder.

Action: Grant Agreement

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 37: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

37

Suggest WG Vice-Leaders to MC by March 1st, 2015.

Assigned to: WG Leaders.

Action: WG Vice-Leaders

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 38: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

38

Suggest members for the Policy Enforcement Committee by March 1st.

Evaluate the compliance of Cryptacus with the COST policies and suggest ideas to enforce the rules if needed, by next MC Meeting.

Assigned to: Policy Enforcement Committee Chair.

Action: Policy Enforcement Committee

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 39: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

39

Practical details about MC+WG+TS Meeting in Croatia are announced (activities and program) by March 31st, 2015.

Invitations will be sent soon after March 1st.

Assigned to: Core Group

Action: MC+WG+TS Meeting

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 40: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

40

Procedures and criteria to apply to STSMs will be defined by March 1st, 2015.

Assigned to: Scientific Committee Chair.

Action: Procedure for STSMs

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 41: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

41

Call for STSMs announced by March 1st, 2015.

Assigned to: MC Chair

Action: Call for STSMs

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 42: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

42

The website (www.cryptacus.eu) will be set up by March 1st, 2015.

Current mailing lists (@irisa.fr) will be moved to cryptacus.eu by March 31st, 2015.

The website will be fully operational by May 31st, 2015.

Assigned to: Website Manager, Core Group.

In the meanwhile, documents will be uploaded to: URL: www.avoine.net/cryptacus/mc/ Login: mc Pwd: mc=allofus*

Action: Website

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 43: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

43

A logo should be designed by March, 31st, 2015.

Assigned to: Core Group (MC will be consulted).

Action: Logo

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 44: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

44

An e-vote will be organized before March 1st:

Approve WG Vice-Leaders.

Approve members of the Policy Enforcement Committee.

Approve the procedures and criterias for STSMs

Action: Next Vote

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 45: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

45

Floor is open for questions.

Miscellaneous

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Page 46: COST Action IC1403: CRYPTACUS€¦ · 3 Most of ubiquitous computing systems are very weak Examples of broken systems. Mifare Classic. Keeloq car ignition system. Mifare DESfire

46

ArtiSauce

Proposer

Context

Objective

Partners

Stakeholders

Organization

Working Groups

Other Actions

Dissemination

Implementation

Decisions

Actions

Miscellaneous

Chaussée de Waterloo 421 - 1050 BRUXELLES ( IXELLES ) - ( 400m place du Chatelain) Téléphone:0483.65.65.16Site

web: www.artisauce.com