IoT Security - Hardware and Software solutions
22/09/2015 19:00 to 22/09/2015 21:30
UCL - Maxwell
1) Computer Security & Industrial Cryptography - ESAT/COSIC from KUL Leuven
The COSIC research group provides a broad expertise in digital security and strives for innovative security solutions. The research is applied in a broad range of application domains, such as electronic payments, communications, identity cards, e-voting, protection of e-documents, intelligent home appliances, telematics for the automobile industry and trusted systems. The research focus lays in the design, evaluation and implementation of cryptographic algorithms and protocols, the development of security architectures for information and communication systems, the building of security mechanisms for embedded systems and the design and analysis of privacy preserving systems
2) UCL Crypto Group Microelectronics Laboratory - Louvain-la-Neuve
The UCL Crypto Group gathers some twenty researchers with backgrounds from microelectronics, telecommunications, computer science and mathematics.
This wide diversity of knowledge allowed the group to develop a strong expertise in cryptography but also in its applications to various security related issues, including physical attacks and countermeasures on hardware devices (smart-cards, FPGAs, ASICs), efficient implementation of cryptosystems, design and analysis of cryptosystems and protocols, elliptic curve and identity based cryptography, formal foundations of cryptography, zero-knowledge identification, privacy enhancing technologies, voting systems, spam analysis, etc.
Through strong commitment to academic research and its numerous collaborations with industrial partners, the UCL Crypto Group is intensively involved in the evolution of security technology, including the design of the next generation of smart-cards, sensor networks, privacy preserving systems, etc.
3) ESIA - R&D solutions for network monitoring
High security monitoring for IT infrastructure. ESIA develops comprehensive network-monitoring solutions, fully customisable and able to monitor several thousand network doors.
4) Hacking the Internet of Things: a State of Practice, Vito Rallo, Senior Manager at PwC
This presentation will introduce a simplified view of threats, discuss the attack vectors from practical hacking practice perspective. The speaker will address a number of typical vulnerabilities related to the OWASP IoT Top 10 trying to map them against a real-life Smart Energy use case employed by one of the Belgian’s largest utility companies. The attendees will learn about a simplified classification of IoT security threats, how to map them against a real-life use case understanding the hacking mind-set and the typical approach used to dig into devices’ security features by soft hardware hacking. Finally, the audience will develop its own critic view over the OWASP IoT Top 10 learning how to classify attacks, their exploitability, and their impact on a real IoT architecture.