Programme and practical information

 

Pratical Information as PDF

 

ISP 2017 Programme

Location

The programme will take place in Maison du Savoir (MSA) Auditoires at Campus Belval of the University of Luxemburg.

Programme

During the programme, you will have full access to latest knowledge on information security studies and will be encouraged to exchange ideas with your classmates and professors. Meanwhile, an exciting guided tour is also waiting for you!

Lunch will be offered to all participants during the whole ISP week.

Agenda

Monday 24

9:30-10:30 Registration Coffee and Programme Introduction (MSA 4.080)[1]

10:30-12:00 Secure, Verifiable Voting Systems, from Theory to Practice (MSA 4.090)

The challenge of verifiable, secret ballot voting:

• Outline of Prêt à Voter

• Key developments

• Prêt à Voter in Victoria State, Australia

• Other systems

• Discussion/Conclusions/open questions.

12:00-14:00 Lunch

14:00-16:00 Fault and Intrusion Tolerance (MSA 4.090)

This advanced course addresses the problem of dependability and security of computer systems under the tolerance paradigm, or how to prevent failures, especially security, first by restructuring systems to expose as few vulnerabilities as possible and then by allowing accidental and malicious faults (vulnerabilities, attacks and intrusions) to be present.

Tuesday 25

9:30-11:30 City Tour (Meeting in front of the Luxemburg City Tourist Office, Place Guillaume II)

12:30-14:00 Lunch

14:00-16:00 Applications of Game Theory in Information Security (MSA 4.090)

Information security problems typically involve decision makers who choose and adjust their behaviors in their interactions in order to achieve their goals. Consequently, game theoretic models can be used to both better understand the challenges that the interaction of participants in these scenarios bring about, and to achieve more efficient defense strategies for them. Game theory provides mathematical tools for modelling multi-agent systems, where one agent’s outcome depends not only on his decisions but also on those of the other players in the interaction. In this presentation, an overview of some of the most important game theoretic models is given, and different approaches where game theory can be used in analyzing information security scenarios will be discussed.

Wednesday 26

9:00-10:30 The Impact of Security Requirements in the Software Development Life Cycle (MSA 4.090)

11:00-12:30 Avoiding Vulnerabilities by Application of Software Security (MSA 4.090)

Software security continues to be in bad shape. For example, web applications have shown this shape since arising, despite the efforts being made in building them with secure code. In this lecture, in a first instance, we will understand the most common software security problems and their causes, for then to present the techniques usually used to detect these problems or to prevent from them. Next and focusing in web application, we will cover a set of complementary approaches for web application security. First, we will see static analysis tools and how they can benefit from machine learning. Second, we will cover how protection mechanisms can be embedded in the execution environment, specifically in the DMBS. Finally, a demonstration of tools that implement these approaches will be presented.

12:30-13:30 Lunch

Thursday 27

9:00-10:30 Symmetric Cryptosystems (MSA 4.090)

11:00-12:30 Individual and Group Anonymity Introduction (MSA 4.090)

The objective of this class is to introduce students to some key ideas for guaranteeing of individual and group data anonymity. Major challenge in Privacy-preserving data publishing is to simultaneously preserve both the privacy and information utility in the anonymous data. Privacy is a double-edged sword – there should be enough privacy to ensure that sensitive information about the individuals is not disclosed by the views and at the same time, there should be enough data to perform the data analysis.

12:30-14:00 Lunch

14:00-16:00 Introduction to Security Enhanced Linux (MSA 2.200)

A properly configured SELinux system can greatly reduce security risks. The lecture will provide a brief overview of SELinux: its packages, commands, and configuration files and the general process of access control, as well as practical examples of its implementation.

19:30 Dinner at Porta Nova, 14 Avenue de la Faiencerie, 1510 Luxembourg

Friday 28

9:00-10:30 Modern Malware (MSA 4.090)

11:00-12:30 Bloc of Short Presentations (MSA 3.330)

  • 11:00-11:15 Diversity Enhancements for SIEMs
  • 11:15-11:30 Security for Smart Electricity GRIDs
  • 11:30-11:45 Security of the Internet of Things
  • 11:45-12:00 SDN Security
  • 12:00-12:15 High Speed Transmission with 850nm VCSELs
  • 12:15-12:30 5G Security

12:30-14:00 Lunch and farewell

[1] Cold and hot drinks are provided.

Programme as PDF