![]() |
31st International Conference on
ICT Systems Security and Privacy Protection - IFIP SEC 2016
May 30th till June 1st, 2016, Ghent, Belgium
|
![]() |
Keynote SpeakersDaniel Le Métayer: The risk-based approach to privacy: prospects and challenges
Abstract. Considering that data cannot be easily classified as personal or non-personal, or as sensitive or non-sensitive, it has been argued that is counterproductive to adopt a binary approach in privacy regulations because it can lead both to inadequate protection of data subjects in certain situations and inacceptable burden for industry for certain types of treatments. One possible way forward is to follow a more progressive, nuanced approach based on a rigorous analysis of the potential risks associated with data processing. Risk analysis is a common approach in computer security but it has received less attention so far in the context of privacy, which raises specific challenges. The keynote will address this issue and discuss the virtues and limitations of privacy risk analysis as well as further work needed in this area. Herbert Bos: Crazy Time: Exploiting Software Without Bugs
Abstract. In this talk I will look at new types of vulnerabilties that may have disastrous consequences, but for which it is difficult to point at any particular bug in the software stack. In particular, I will discuss how Google allows attackers that compromise your PC to also own your phone (thereby killing SMS-based two-factor authentication), and a brand new attack on Windows-based systems that allows an attacker to completely pwn the latest Microsoft Edge browser with all defenses up, while not using a single software bug. The goal of this talk is to show that any sufficiently advanced attack is indistinguishable from magic. Kristian Beckman AwardBart Preneel: The Post-Snowden Threat Landscape
Abstract. In June 2013 Edward Snowden leaked a large collection of documents that describe the capabilities and technologies of the NSA and its allies. Even to security experts the scale, nature and impact of some of the techniques revealed was surprising. In addition to “active defense” technologies and a focus on subverting end systems, the documents also reveal a systematic attempt to undermine cryptographic systems. A major consequence is the increased awareness of the public at large of the existence of highly intrusive mass surveillance techniques. There has also been some impact in the business world, including a growing interest in companies that (claim to) develop end-to-end secure solutions. There is no doubt that large nation states and organized crime have carefully studied the techniques and are exploring which ones they can use for their own benefit. But after more than two years, there is little progress in legal or governance measures to address some of the excesses by increasing accountability. Moreover, the security research community seems to have been slow to respond to the new threat landscape. In this talk we analyze these threats and speculate how they could be countered. |
Sponsors |