You are here

dcypher unites researchers, teachers, manufacturers, users and policy makers to increase knowledge and expertise in the Netherlands in the area of cybersecurity

 Impression dcypher Symposium 2017


Part of the ICTOPEN 2018 cybersecurity program on March 20st is the announcement of the winner of the Dutch Cyber Security Research Paper Award competition (DCSRP Award). It is the fourth time this competition is held.Also this year an international jury was composed to select three outstanding papers out of all submitted Dutch recent non-commercial scientific cybersecurity research papers. The 2018 Jury members for the DCSRP Award are Prof. Dr. Konrad RieckProf. Evangelos Markatos and Prof. Richard Calyton. The Jury meets under technical chairmanship of Drs. Jan Piet Barthel. During the meeting the Jury determines, out of the top three, which paper deserves the Best Paper predicate.On March 20st the main authors of all three selected papers will present their paper and receive a personalized certificate, signed by the Jury. After these papers presentations the winner is announced. The winner receives the Dutch Cyber Security Research Paper Award, handed over by Drs. Jan Piet Barthel. In addition the winner receives a bonus cheque, sponsored by IBM!Cybersecurity research papers should be submitted by security research group leaders or members of Dutch Knowledge Institutions before 19th of January 2018. More information:Jurymembers DCSRP AWARD 2018 (pdf)Call for Dutch Cyber Security best Research PapersMore information about the DCSRP Award contest in previous ICT.OPEN editions ICT.OPEN is the principal ICT research conference in the Netherlands. It features two distinguished plenary key notes and invited speakers, as well as many oral and poster presentations. The state of art in ICT research is presented and discussed here. More information: www.ictopen.nl
The General Affairs Council today adopted conclusions calling for the strengthening of European cybersecurity and enhancing cyber resilience across the EU, in line with the tasking from the European Council in October 2017.The conclusions stress the need for all EU countries to make the necessary resources and investment available to address cybersecurity. They welcome the intention of increasing EU efforts in cybersecurity research and development by setting up a network of cybersecurity competence centres across the Union.The Council also backs the plan to set up a world-class European cybersecurity certification framework to increase trust in digital solutions. The conclusions highlight the important connection between trust in digital Europe and achieving cyber resilience across the EU. Significant attention is paid to the strength of cryptography used in products and services within the digital single market.Other measures highlighted by the Council include providing the necessary law enforcement tools to tackle cybercrime, developing a coordinated EU-level response to large-scale cyber incidents and crises, and conducting pan-European cybersecurity exercises on a regular basis. Regarding the global and diplomatic aspects of cybersecurity, the Council recognises the importance of international cooperation and welcomes the creation of a clear framework for using the political, diplomatic and economic tools available to the EU as a response to malicious cyber activities."Cybercrime and state-sponsored malicious cyber activities are one of the largest global threats to our societies and economies. We already lose around €400 billion globally every year due to cyber-attacks. This clearly underlines the need for the EU to use the available tools to increase stability in cyberspace and respond to large-scale cyber incidents. The EU simply has to stay ahead of the game,” said Matti Maasikas, Estonia's Deputy Minister for European Affairs and chair of today's Council meeting. “Increasing our efforts and investment in cybersecurity is a pre-condition for building a strong and trusted digital single market for our citizens,” Maasikas added.Council conclusions on the joint communication to the EP and the Council: Resilience, deterrence and defence: building strong cybersecurity for the EUDigital single market for Europe
In the last 20 years, the Dutch information security community grew from a handful of brilliant mathematicians to a large community of cybersecurity researchers with representatives from many of the technical and the social sciences. The Netherlands Organisation for Scientific Research (NWO) and the European Commission have provided over a hundred million Euros of funding in long term Dutch Cyber Security Research. This has led to dozens of new businesses, hundreds of highly skilled employees in all major corporations, government departments and universities, and thousands of scientific publications and patents.Dutch Cyber Security best Research Paper (DCSRP) AwardAnnouncing the winner of the Dutch Cybersecurity best Research Paper award at ICT.OPEN became a tradition. This contest will be organized for the fourth time! ICT security research groups at Dutch universities and knowledge centres are invited to nominate their best recent (2017/2018 accepted) research papers, with a maximum of two papers per group. Again a jury of international scientists in the fields of cybersecurity will be formed and asked to judge submitted papers. Dutch ICT cybersecurity research group leaders are asked to send in a maximum of two papers per research group before January 19th, 2018 to dcypher.Out of all nominated papers the jury selects both the top three as well as the winning paper. In the first week of March dcypher will inform all three selected nominees. They are expected to present their paper March 20th at ICT.OPEN in the Cybersecurity Track. All presenters receive a signed certificate. The winner receives the Dutch Cyber Security best Research Paper Award. Also see: Announcement Jury DCSRP Award 2018More information about the DCSRP Award contest in previous ICT.OPEN editions ICT.OPEN is the principal ICT research conference in the Netherlands. It features two distinguished plenary key notes and invited speakers, as well as many oral and poster presentations. The state of art in ICT research is presented and discussed here. More information: www.ictopen.nl 


NCSC is investigating the possibility of financing the exchange of PhD students between the Netherlands (NL) and the United States of America (USA). Before we proceed with the allocation of funds and formalization of the (legal) process, we would like to know which Dutch parties are interested in such an opportunity.# PROPOSED EXCHANGE- The exchange is limited to academic institutions, such as universities in NL or USA.- A PhD student from NL will travel to an academic partner in the USA.- This partner will, in exchange, send a PhD student to the partner in NL.- The period of exchange will range between 1-3 months, depending on agreements and funding.- The exchange is focused on, but not limited to, joint NL-USA research projects.- The travel and accommodation costs will be covered by NCSC up to 5.000 euro per student.- Additional costs such as food, workspace, etc. are excluded from these funds. # INTERESTED?If your organization is interested in participating in such an exchange, please indicate so by sending an email to research@ncsc.nl. If there appears to be sufficient interest in this proposal, we will proceed with the financial and legal arrangements. Once these arrangements have been made, we will inform the community through Dcypher communication channels, including this mailinglist.
Call for papers Workshop on Security Protocol Implementations:  Development and Analysis (SPIDA)23 April 2018, London, United KingdomCo-located to IEEE EuroS&P 2018CONTEXTSecurity protocols (such as TLS for internet, WPA2 for WiFi, GSM for mobile telephony, to mention just some of the broadly used ones) play a crucial role in protecting the digital communications and interactions we rely on in our modern society. The security of such protocols can break because of fundamental, inherent flaws, but the bulk of the security flaws are due to implementation flaws. The complexity and unclarity of typical protocol specifications makes it more likely to introduce such flaws and makes it harder to spot them. SPIDA seeks novel contributions and case studies that address the challenges when implementing security protocols. How can implementations be analysed, statically or dynamically, in a systematic way? How can we make sure that the specifications are precise, but still easy to understand and implement correctly? And how to assure implementations faithfully follow such specifications?https://spida.cs.ru.nlhttps://www.ieee-security.org/TC/EuroSP2018/ TOPICSThe workshop seeks submissions from academia and industry presenting novel  research results to tackle this issue. Relevant topics include, but are not limited to:- Formal verification of code- Software engineering approaches to go from specifications to implementations- Protocol reverse engineering- LangSec approaches to security protocols- Fuzzing techniques, e.g. evolutionary or white-box fuzzing- State machine inference- Symbolic execution- Model-based testing of protocol implementations- Methods and languages to write rigorous protocol specificationsSUBMISSIONSPapers should be submitted through the submission web site at https://easychair.org/conferences/?conf=spida18. Each accepted paper must be presented by an author, who will have to be registered by the early-bird registration deadline. The workshop will accept regular submissions (at most 10 pages in the IEEE double-column format, including bibliography), as well as short submissions of up to 4 pages for results that are preliminary and/or work in progress. Authors must submit an extended abstract prior to the paper submission. IMPORTANT DATESAbstract deadline: 8 January 2018Paper deadline: 12 January 2018Notification: 5 February 2018Camera-ready submission: 23 February 2018Workshop: 23 April 2018ORGANIZING COMMITTEEMathy Vanhoef, KU Leuven, BelgiumJoeri de Ruiter, Radboud University, The Netherlands 
CFP: Fourth International Workshop on Privacy Engineering (IWPE'18) - co-located to the 3rd IEEE European Symposium on Security and Privacy - 27 April 2018 - LONDON!!! IMPORTANT DATES Deadline of abstract submission:   12 January, 2018Deadline of paper submission:      19 January, 2018Notification of acceptance:        5 February, 2018Accepted Paper camera ready:       23 February, 2018 We are pleased to invite you to participate in the premier annual event of the International Workshop on Privacy Engineering (IWPE'18).http://iwpe.info/ https://www.ieee-security.org/TC/EuroSP2018/This year’s program seeks to highlight challenges to privacy posed by widespread adoption of machine learning and artificial intelligence technologies. One motivation for this focus stems from goals and provisions of the European General Data Protection Regulation (GDPR), including requirements for privacy and data protection by design, providing notices and information about the logic of automated decision-making, and emphasis on privacy management and accountability structures in organizations that process personal data. Interpreting and operationalizing these requirements for systems that employ machine learning and artificial intelligence technologies is a daunting task.As engineering is asked to play a larger role in privacy governance, software developers need tools for understanding, systematizing, and embedding privacy into systems and workflows. This work also requires greater engagement with design, legal, and public policy departments.Methods and tools for bridging privacy work across these communities are essential to success. Furthermore, research that focuses on techniques and tools that can aid the translation of legal and normative concepts into systems requirements are of great value.Organizations also need tools for systematically evaluating whether systems fulfill users’ privacy needs and requirements and for providing necessary technical assurances. Methods that can support organizations and engineers in developing (socio-)technical systems that address these requirements is of increasing value to respond to the existing societal challenges associated with privacy.In this context, privacy engineering research is emerging as an important topic. Engineers are increasingly expected to build and maintain privacy-preserving and data-protection compliant systems in different ICT domains such as health, energy, transportation, social computing, law enforcement, public services; based on different infrastructures such as cloud, grid, or mobile computing. While there is a consensus on the benefits of an engineering approach to privacy, concrete proposals for models, methods, techniques and tools that support engineers and organizations in this endeavor are few and in need of immediate attention. Also of great relevance are the development and evaluation of approaches that go beyond the one size fits all mantra, and that attend to the ever evolving practice of software engineering in agile service environments across different domains.To cover this gap, the topics of the International Workshop on Privacy Engineering (IWPE'18) focus on all the aspects surrounding privacy engineering, ranging from its theoretical foundations, engineering approaches, and support infrastructures, to its practical application in projects of different scale across the software ecosystem. Specifically, we are seeking the following kinds of papers: (1) technical papers that illustrate the engineering or application of a novel formalism, method or other research finding (e.g., engineering a privacy enhancingprotocol) with preliminary evaluation; (2) experience and practice papers that describe a case study, challenge or lessons learned in a specific domain; (3) early evaluations of tools and other infrastructure that support engineering tasks in privacy requirements, design, implementation, testing, etc.; (4) interdisciplinary studies or critical reviews of existing privacy engineering concepts, methods, tools and frameworks; or ! (5) vision papers that take a clear position informed by evidence based on a thorough literature review.IWPE’18 welcomes papers that focus on novel solutions on the recent developments in the general area of privacy engineering. Topics of interests include, but are not limited to:-Integrating law and policy compliance into the development process -Privacy or data protection impact assessments in the engineering context -Privacy engineering and data driven software development -Privacy engineering and machine learning -Privacy engineering and artificial intelligence -Privacy engineering and data subject access rights -Privacy risk management models -Privacy breach recovery methods -Privacy engineering and data portability -Technical standards, heuristics and best practices for privacy engineering -Privacy engineering in technical standards -Privacy requirements elicitation and analysis methods -User privacy and data protection requirements -Management of privacy requirements with other system requirements -Privacy requirements elicitation and analysis techniques -Privacy design patterns -Privacy-preserving architectures -Privacy engineering and databases, services, and the cloud -Privacy engineering in networks -Engineering techniques for fairness, transparency, and privacy in databases -Privacy engineering in the context of interaction design and usability -Privacy testing and evaluation methods -Validation and verification of privacy requirements -Privacy Engineering and design -Engineering Privacy Enhancing Technologies (PETs) -Integration of PETs into systems or the development ecosystem -Models and approaches for the verification of privacy properties -Tools and formal languages supporting privacy engineering -Usable privacy for developers -Teaching and training privacy engineering -Adaptations of privacy engineering into specific software development processes -Pilots and real-world applications -Evaluation of privacy engineering methods, technologies and tools -Privacy engineering and accountability -Privacy engineering and business processes -Privacy engineering and manageability of data in (large) enterprises -Organizational, legal, political and economic aspects of privacy engineeringThis topic list is not meant to be exhaustive; since IWPE'18 is interested in all aspects of privacy engineering. However, to screen out off-topic papers early in the review process, we request authors to submit an abstract prior to their paper submission. Abstracts of papers without a clear application to privacy engineering will be considered outside the scope of this workshop and may be rejected.PAPER FORMAT & SUBMISSIONWe solicit unpublished short position papers (up to 4 pages) and long papers reporting technical, research or industry experience (up to 8pages) on all dimensions of the privacy engineering domain. Each paper, written in English, must follow IEEE Proceedings format.Authors must submit an extended abstract prior to the paper submission.This abstract is aimed at 1) helping organizers understand whether the paper is on-topic early in the review process; and, 2) allowing reviewers to choose their preferred manuscripts in advance of the paper submission.Submission of a paper should be regarded as an undertaking that, should the paper be accepted, at least one of the authors will attend the workshop to present the paper. All papers must be submitted via EasyChair at https://www.easychair.org/conferences/?conf=iwpe18If you have any questions regarding IWPE'18, please contact iwpe18@easychair.orgIWPE’18 Organizing CommitteeJose M. del AlamoAnupam DattaAleksandra KorolovaDeirdre K. MulliganSeda GürsesJose M. SuchArunesh Sinha 
CALL: TRUSTED DIGITAL SOLUTIONS AND CYBERSECURITY IN HEALTH AND CAREThis call aims at multidisciplinary technologies and solutions in health and care with a focus on cybersecurity to assure data privacy, security and protection of health and care infrastructures. It addresses the need for secure and user-driven ICT-based solutions in early risk detection and interventions with big data approaches that enable aggregation of a variety of new and existing data sources such as medical records, registries, social platforms and other environmental, physiological and behavioural data, including data from large scale pilots on smart living environments. This call will contribute to the Focus Areas on 'Digitising and transforming European industry and services' and 'Boosting the effectiveness of the Security Union'. Zie ook https://ec.europa.eu/research/participants/portal/desktop/en/opportunities/h2020/calls/h2020-sc1-fa-dts-2018-2020.html#c,topics=callIdentifier/t/H2020-SC1-FA-DTS-2018-2020/1/1/1/default-group&callStatus/t/Forthcoming/1/1/0/default-group&callStatus/t/Open/1/1/0/default-group&callStatus/t/Closed/1/1/0/default-group&+identifier/desc
CALL FOR PAPERS - PoPETs 2018, Issue 3 / PETS 2018The deadline for PoPETs 2018, Issue 3 is less than four weeks away: ovember 30 (11:59PM Samoa Time, UTC-11), 2017. PoPETs/PETS now has 4 deadlines a year; submit whenever you feel ready! Read the CFP below for more details on our hybrid journal/symposium model, which includes the option to resubmit with major revisions to a subsequent deadline. See the web site (https://petsymposium.org/) for full information, including submission guidelines https://petsymposium.org/authors.php). Papers must be submitted via the submission server for Issue 3 at: https://submit.petsymposium.org/2018.3/-----------------------------------------------------------------Call for Papers18th Privacy Enhancing Technologies Symposium (PETS 2018) July 24--27 2018, Barcelona, Spain General information: https://petsymposium.org/ Submission server: https://submit.petsymposium.org/2018.3/The annual Privacy Enhancing Technologies Symposium (PETS) brings together privacy experts from around the world to present and discuss recent advances and new perspectives on research in privacy technologies. The 18th PETS event will be organized by Eticas and held in Barcelona, Spain (dates tbd). Papers undergo a journal-style reviewing process and accepted papers are published in the journal Proceedings on Privacy Enhancing Technologies (PoPETs).PoPETs, a scholarly, open access journal for timely research papers on privacy, has been established as a way to improve reviewing and publication quality while retaining the highly successful PETS community event. PoPETs is published by De Gruyter Open, the world's second largest publisher of open access academic content, and part of the De Gruyter group, which has over 260 years of publishing history. PoPETs does not have article processing charges (APCs) or article submission charges.Papers submitted to PETS/PoPETs should present novel practical and/or theoretical research into the design, analysis, experimentation, or fielding of privacy-enhancing technologies. While PETS/PoPETs has traditionally been home to research on anonymity systems and privacy-oriented cryptography, we strongly encourage submissions on a number of both well-established and emerging privacy-related topics, for which examples are provided below.PoPETs also solicits submissions for Systematization of Knowledge (SoK) papers. These are papers that critically review, evaluate, and contextualize work in areas for which a body of prior literature exists, and whose contribution lies in systematizing the existing knowledge in that area. To be suitable for publication, SoK articles must provide an added value beyond a literature review, such as novel insights, identification of research gaps, or challenges to commonly held assumptions. SoK papers will follow the same review process as other submissions, and will be published in PoPETs and presented at the PETS 2018 event.Authors can submit papers to PoPETs four times a year, every three months on a predictable schedule. The four submission deadlines for the 2018 volume of PoPETs are in May 2017, Aug 2017, Nov 2017, and Feb 2018. Papers accepted for an issue in the 2018 volume will be presented at PETS 2018. Note that accepted papers must be presented at PETS.Authors are notified of the decisions about two months after submission. In addition to accept and reject decisions, papers may receive resubmit with major revisions decisions, in which case authors are invited to revise and resubmit their article to one of the following two issues. We endeavor to assign the same reviewers to revised versions.Submit papers for PoPETs 2018, Issue 3 at https://submit.petsymposium.org/2018.3/. Submitted papers must be anonymized, and may be at most 15 pages excluding bibliography and appendices and 20 pages total. Reviews are double blind. Please see the submission guidelines at https://petsymposium.org/authors.php#submission-guidelines and view our FAQ at https://petsymposium.org/faq.php for more information about the process. Important Dates for PETS 2018 Issue 3All deadlines are 23:59:59 American Samoa time (UTC-11) Paper submission deadline: November 30, 2017 (firm) Rebuttal period: January 8 -- 10, 2018 Author notification: February 1, 2018 Camera-ready deadline for accepted papers and minor revisions (if accepted by the shepherd): March 15, 2018 Authors invited to resubmit with major revisions can submit the revised (full) paper two weeks after the stated deadline. Such papers must, however, be registered with an abstract by the usual deadline. All other papers than these major revision resubmissions must be submitted by the stated deadline, including papers submitted to and rejected from previous issues. To benefit from the two-week deadline extension, major revisions must be submitted to one of the two issues following the decision. Major revisions submitted to later issues are treated as new submissions, due by the regular deadline and possibly assigned to new reviewers.Suggested topics include but are not restricted to:Behavioural targetingBuilding and deploying privacy-enhancing systems Crowdsourcing for privacy Cryptographic tools for privacy Data protection technologies Differential privacy Economics of privacy and game-theoretical approaches to privacy Empirical studies of privacy in real-world systems Forensics and privacy Human factors, usability and user-centered design for PETs Information leakage, data correlation and generic attacks to privacy Interdisciplinary research connecting privacy to economics, law, ethnography, psychology, medicine, biotechnology, human rights Location and mobility privacy Machine learning and privacy Measuring and quantifying privacy Mobile devices and privacy Obfuscation-based privacy Policy languages and tools for privacy Privacy in cloud and big-data applications Privacy in social networks and microblogging systems Privacy-enhanced access control, authentication, and identity management Profiling and data mining Reliability, robustness, and abuse prevention in privacy systems Surveillance Systems for anonymous communications and censorship resistance Traffic analysis Transparency enhancing tools Web privacyGeneral Chair (gc18@petsymposium.org)Gemma Galdón Clavell, EticasProgram Chairs/Co-Editors-in-Chief (pets18-chairs@petsymposium.org) Rachel Greenstadt, Drexel UniversityDamon McCoy, New York UniversityCarmela Troncoso, EPFLProgram Committee/Editorial Board:Gunes Acar, KU LeuvenWilliam Aiello, University of British Columbia Mashael Al-Sabah, Qatar University Abdelrahaman Aly, KU Leuven Alessandro Aquisti, Carnegie Mellon University Hadi Asghari, TU Delft Shehar Bano, University College London Kevin Bauer, MIT Lincoln Laboratory Matt Blaze, University of Pennsylvania Sonja Buchegger, KTH Royal Institute of Technology Kelly Caine, Clemson University Aylin Caliskan, Princeton University Jean Camp, Indiana University Bloomington Sherman S.M. Chow, Chinese University of Hong Kong Christopher Clifton, Purdue University Scott Coull, FireEye Jed Crandall, University of New Mexico Emiliano De Cristofaro, University College London Rinku Dewri, University of Denver Claudia Diaz, KU Leuven Roger Dingledine, The Tor Project Tariq Elahi, KU Leuven Giulia Fanti, University of Illinois at Urbana-Champaign David Fifield, University of California, Berkeley Simone Fischer-Hübner, Karlstad University Arthur Gervais, Imperial College London Ian Goldberg, University of Waterloo Thomas Groß, Newcastle University Jens Grossklags, Technical University Munich Seda Gurses, KU Leuven Marit Hansen, Independent Centre for Privacy Protection Schleswig-Holstein Ryan Henry, Indiana University Bloomington Jaap-Henk Hoepman, Radboud University Nijmegen Amir Herzberg, Bar Ilan University Mireille Hildebrandt, Radboud University Nijmegen Nick Hopper, University of Minnesota Amir Houmansadr, University of Massachusetts Amherst Yan Huang, Indiana University Bloomington Kévin Huguenin, Université de Lausanne Aaron Johnson, U.S. Naval Research Laboratory Apu Kapadia, Indiana University Bloomington Aniket Kate, Purdue University Stefan Katzenbeisser, TU Darmstadt Florian Kershbaum, University of Waterloo Negar Kiyavash, University of Illinois at Urbana-Champaign Boris Koepf, IMDEA Software Institute Markulf Kohlweiss, Microsoft Research Ponnurangam Kumaraguru, IIIT Delhi Alptekin Kupku, Koç University Susan Landau, Tufts University Peeter Laud, Cybernetica Adam J. Lee, University of Pittsburgh Douglas Leith, Trinity College Dublin Janne Lindqvist, Rutgers University Ashwin Machanavajjhala, Duke University Nick Mathewson, The Tor Project Aleecia McDonald, Stanford University Susan McGregor, Tow Center for Digital Journalism & Columbia Journalism School Sarah Meiklejohn, University College London Prateek Mittal, Princeton University Takao Murakami, National Institute of Advanced Industrial Science and Technology (AIST) Steven Murdoch, University College London Arvind Narayanan, Princeton University Muhammad Naveed, University of Southern California Shirin Nilizadeh, UCSB Guevara Noubir, Northeastern University Cristina Onete, INSA/IRISA Rennes Paul Pearce, UC Berkeley Adrian Perrig, ETHZ Bart Preneel, KU Leuven Ananth Raghunathan, Google Kasper Rasmussen, University of Oxford Joel Reardon, UC Berkeley / ICSI Michael Reiter, UNC Chapel Hill Alfredo Rial, University of Luxembourg Franziska Roesner, University of Washington Thomas Roessler, Google Stefanie Roos, University of Waterloo Ahmad-Reza Sadeghi, Technische University Darmstadt Martin Schmiedecker, SBA Research Peter Schwabe, Radboud Univeristy Nijmegen Claudio Soriente, Telefonica Research Thorsten Strufe, TU Dresden Paul Syverson, U.S. Naval Research Laboratory Abhradeep Thakurta, UC Santa Cruz Michael Tschantz, UC Berkeley Gene Tsudik, UC Irvine Doug Tygar, UC Berkeley Eugene Vasserman, Kansas State University Michael Waidner, Fraunhofer SIT and TU Darmstadt Tao Wang, Hong Kong University of Science and Technology Tara Whalen, Google Philipp Winter, Princeton University Joss Wright, Oxford Internet Institute Matthew Wright, RITSubmission GuidelinesFor full details of submission guidelines please refer to: https://petsymposium.org/authors.php#submission-guidelines. Papers not following these instructions risk being rejected without consideration of their merits!
View all news items >