dcypher.nl

You are here

dcypher unites researchers, teachers, manufacturers, users and policy makers to increase knowledge and expertise in the Netherlands in the area of cybersecurity

Impression dcypher Symposium 2017

Current

connects cybersecurity knowledge Almost all presentations are included in the program of dcypher Symposium and also the video, the photo's and the cartoons are to be viewed online.The symposium was organised October 4th, 2017 MediaPlaza in Utrecht by dcypher in close cooperation with the Netherlands Organisation for Scientific Research (NWO), the Netherlands Enterprise Agency (RvO), the National Cyber Security Centre (NCSC) and Applied Science Organisation (SIA) in conjunction with the European Cybersecurity Month and AlertOnline. The dcypher Symposium is co-funded through a MIT Grant for Network activities by TKI HTSM.
The Ministry of Security and Justice has launched an innovative programme with the objective of promoting collaboration with startups: The Startup in Residence programme (SiR). This program challenges startups to develop solutions to five selected social challenges in the field of Security and Justice. We are looking for enthusiastic, innovative and knowledgeable startups who wish to join us during this journey.How does the programme work?Startups can apply until 9 October 2017 provided that they have an idea that has not yet been put on the market and that it can contribute in solving one of the selected social issues. On each issue, three startups get the opportunity to present a solution. The proposals are presented in a pitch to a professional jury, who assesses the proposals and subsequently makes a definitive  selection. The five winners (one per social issue) may participate in the SiR programme. These startups get a budget for development purposes  and are invited to participate in the training and guidance program.After five months of intensive collaboration between startup and Ministry, the programme ends with a working prototype as a result. The startup is expected to present the solution to clients and potential customers during the Demo-day in May 2018. https://www.thehaguesecuritydelta.com/news/newsitem/940-startup-in-residence-programme-launched-by-ministery-of-security-and-justice
Between August 21st and 25th 2017 fifty advanced students, interested in the broad field of cybersecurity, attended the second National Cyber Security Summer School (NCS3). During this week twenty lecturers from public, private and academic institutions took the students through many different aspects of cyber security, viewed from different disciplinary angles. The CSR ChallengePart of the summerschool is that participants compete in groups to formulate an advice for the Cyber Security Council (CSR) of the Netherlands. The groups are supervised by experts in the field of cybersecurity coming from governments organizations, companies and universities. The challenge is to draft a policy recommendation and present this at the last day of the NCS3. This years question was how emerging technologies will contribute to the cybersecurity of the Dutch critical sector. A professional independent jury is involved to appoint the winner of the contest. Dick Schoof, National Coordinator for Security and Counterterrorism and co-chair of the CSR, announced the winning advise of the CSR Challenge 2017: 'The Introduction of Blockchain in Food and Agriculture Sector'. The winning team gets the opportunity to present their advice to the Cyber Security Council and will be offered internship opportunities at one of several organizations.Mary Soares, Willemijn Bos, Luc Schellekens, Eleanor Denneman, Max Dijkstra, Tjerk van Goor and Dick Schoof.  All NCS3 2017 attendees with a.o. Rogier van WanroyJeannine PeekRob BartholeeElly van den HeuvelJan Piet Barthel and Nicolas Castellon  photo: Sjoerd van der Hucht

News

Project KOVR, a wearable countermovement is more than pleased to announce that they reveal a new and improved prototype of the Anti-Surveillance Coat during the Dutch Design Week 2017.As we’ve entered the final stage of the development, we’re eager to inform you that it will be presented at the main location ‘het Klokgebouw’ in the Dating Dutch Design exposition. You are invited. Be among the first people to experience this new design.See you there?! Let us know so we can meet! Send us an email or use our social media channels.More info: http://www.projectkovr.com/#
Before the defence of our PhD students Anna Krasnova and Wouter Lueks on October 9, we are organising a small but interesting  Symposium on “Privacy in the era of censorship and bitcoin”.Date and time: October 9, 2017, 9:30 – 12:30Location: Faculty Club Huize Heyendael, Nijmegen Schedule:9:30 – 10:15: Ian Goldberg, University of Waterloo, Canada, "Perfect Imitation and Secure Asymmetry for Decoy Routing Systems with Slitheen"10:15 – 10:45: coffe break10:45 – 11: 30: Gildas Avooine, INSA, Rennes, France, “An introduction to relay attacks and countermeasures”11:30 – 12:15: Bart Preneel, imec-COSIC KU Leuven, “A Perspective on Cryptocurrencies” Abstracts:1) "Perfect Imitation and Secure Asymmetry for Decoy Routing Systems with Slitheen"Censorship circumvention is often characterized as an arms race between a nation-state censor and the developers of censorship-resistance systems. Decoy routing offers a solution to censorship resistance that has the potential to tilt this arms race in the favour of the censorship resistor. Decoy routing uses real connections to unblocked, overt sites to deliver censored content to users. However, the widespread deployment of decoy routers has yet to reach fruition.  Obstacles to deployment such as the heavy requirements on routers that deploy decoy router relay stations, asymmetric traffic routes, and possible effects on the quality of service for existing costumers that pass through deployed decoy routers have deterred potential participants from deploying existing systems. Although more deployable decoy routing systems have been proposed, these solutions suffer from security vulnerabilities that put their users at risk of discovery. In this talk, we propose techniques for supporting route asymmetry in previously symmetric decoy routing systems and a more secure alternative to existing lightweight systems that provides additional defenses against routing around decoys (RAD) attacks. 2) “An introduction to relay attacks and countermeasures” A relay attack is a fraud where an attacker impersonates a genuine communicating party by relaying the messages he exchanges with another party during a protocol execution. Relay attacks are one of the most effective and feared attacks against contactless systems.Due to their physical nature, relay attacks are not captured by conventional security models. To detect such attacks, it is necessary to look beyond the content of the exchanged messages and incorporate the physical context of the interaction into the model. Distance-bounding protocols are promising solutions to prevent relay attacks. They measure the round-trip time of short messages exchanged between the parties to estimate an upper-bound on the distance between them. How to design secure and practical distance-bounding protocols is an open research challenge, though.During the presentation, we will introduce the concept of relay attack and explain how it can be easily performed with off-the-shelf devices.We will then describe real-life scenarios. We will finally sketch possible countermeasures. 3) “A Perspective on Cryptocurrencies”This talk explores the technological innovations created by cryptocurrencies such as Bitcoin. We discuss the principles of distributed currencies and discuss their strengths and weaknesses. We also explain how the blockchain mechanism interacts with the other features to create a complex ecosystem. We also touch on the issues of stability and incentive compatibility and we discuss which properties of blockchains are relevant for the key use cases.
Nijmegen, The Netherlands Workshop: November 13-15 School:   November  9-11 ECC is the annual workshop dedicated to the study of elliptic-curve cryptography and related areas of modern cryptography, for more information, also about past editions of ECC, please see the main ECC website. The 21st Workshop on Elliptic Curve Cryptography (ECC 2017) will take place on November 13-15, 2017, in Nijmegen, The Netherlands.  The workshop is accompanied by a 3-day "summer" school on elliptic curves aimed at getting graduate students involved in the area. The "summer" school will take place on November 9-11, 2017. The aim of ECC is to bring together leading experts from academia, industry, and government, as well as young researchers and graduate students for the purpose of exchanging ideas and presenting their work. The ECC Workshop has invited presentations only. Presentations tend to give an overview  on emerging or established areas of modern cryptography, often combined with new research findings and often lead to new collaborations between attendees.  Early-bird Registration: until Sep 30 Late registration: from Oct 1 https://ecc2017.cs.ru.nl/SPEAKERS: Diego Aranha Craig Costello Joan Daemen Maria Dubovitskaya Luca De Feo  Daniel Genkin Aurore Guillevic Kimmo Järvinen Pınar Kılıçer David Kohel Tancrède Lepoint Joost Renes Emmanuel Thomé Mehdi Tibouchi Jaap Top  Benjamin Wesolowski LECTURERS IN THE ECC SCHOOL: Diego Aranha Joppe Bos  Craig Costello Wouter Castryck Tim Güneysu Nele Mentens Benjamin Smith  
We are in the process of recruiting candidates for the HEART PhD position. In order to find good candidates, I would be grateful if you could distribute within your organization.Topic: Privacy and security analytics        Objectives: In the domains of smart homes and healthcare, the life of people is improved by devices that gather personal data and process it, into relevant health information using third party smart services and technology providers (e.g. cloud and Big Data analytics services). While the use of IoT devices can bring advantages in terms of efficiency, convenience, and costs, their use raises privacy concerns regarding the users and their personal activity data. The sensitive nature of this data and sharing it with a centralized server (e.g. cloud) raise privacy concerns, even if the latter is well protected. These privacy concerns can be addressed by using an end-to-end approach to privacy and data protection and building systems with privacy embedded in the system architecture, while coherently integrating health-specific privacy, security and legal requirements.        http://ricerca.unimc.it/en/heart        http://ricerca.unimc.it/en/heart/HEART_callforapplication_final.pdf(page 14 for ESR4: Privacy and security analytics) Philips has a long history of successfully introducing innovative products to the market (lamps, CD players, TV’s, medical imaging equipment, equipment for patient monitoring, etc). Today, Philips is moving towards connecting its products to the digital world, introducing new services and integrated solutions based on digital technologies connected to the cyber space. Therefore, Philips Research and Philips product divisions rely more and more on digital security technologies which are playing a crucial role in new Philips products, services, software and solutions. We are looking for a top scientist with a strong computer science / mathematical background to strengthen our competences in digital security and who can help us to build and offer competitive trusted solutions and services in Healthcare. The candidate will join the Data Science department of Philips Research.Philips Research is the source of many advanced developments in Healthcare, Lifestyle and Technology. Building on 100 years of experience in industrial research and our world-leading patent position, we're dedicated to bringing meaningful innovations that improve people's lives.We provide technology options for innovations in the area of health and well-being, targeted at both developed and emerging markets. Positioned at the front-end of the innovation process, we work on everything from spotting trends and ideation to proof of concept and first-of-a-kind product development. For more insights you can visit: www.research.philips.com The mission of the Data Science department is to lead Philips into the Digital era through world-class innovations on data analytics and digital security. The focus of the department is on advancing the automated analytical methods used to extract new knowledge from data, as well as to strengthen brand image by ensuring privacy as well as trustworthiness and protection of digital propositions. The department builds on several interconnected competences including data management, machine learning, statistics, probability models, pattern recognition, data engineering, security and privacy. We use the advances in the aforementioned scientific disciplines, as well as new digital platforms to create innovation for Philips businesses by real-time extraction of insights from various sources like sensors, mobile devices, Web, and social networking sites. Next to that, security and privacy are addressed and taken into account already in the design phase of Philips digital propositions. The department plays a crucial role in digital and data intensive research projects using these competences.
We are looking for PhD and PostDocs at the Interdisciplinary Centre for Security, Reliability and Trust(SnT) in Luxembourg.  If you are interested in security and privacy in network communication have a look at the following links. http://emea3.mrted.ly/1klzs -- PhDhttp://emea3.mrted.ly/1kvpr -- PostDoc
View all news items >