Xavier Larduinat
Gene Tsudik
N. Asokan
  • Xavier Larduinat (Eurosmart/Gemalto), Smart Card industry at the horizon 2020
    ABSTRACT:
    In April 2007, Eurosmart members presented the result of the work of a task force called Vision 2020, aiming at anticipating the future of the Smart Card industry at the horizon 2020.
    Eurosmart represents all the actors of the smart card eco-system: Chip makers, software editors, smart cards manufacturers. All these key components were represented in the task force, as well as some additional profiles to better project “one day of our digital life in 2020”. Mobile Operators, Bankers as well as opinion makers such as journalists were part of the team lead by Eurosmart.
    Three words summarize our industry’s future: “Smart Secure Devices”, departing from some the traditional shapes and issuances models of today’s Smart Cards. In other words, smart Secure objects that better fit the way we work, learn, move, play or deal with each others while enabling use to protect our digital identities, assets and transactions.
    This presentation intends to further develop in depth one of the key findings of the Vision 2020 workgroup.  Machine-to-Machine (M2) is an untapped potential for Smart Secure Devices, leveraging on three pillar technologies:  Contactless, Biometrics and Nanotechnologies.
    Looking at the key attributes that made Smart Cards successful in the Telecom and Banking industry, the objective of the paper is to present possible implementations of M2M applications and how do they meet the three top goals of all all Digital Services:  Security, Ease of Use and Privacy.
    This paper will explain the role of the Smart Secure Devices, enforcing the authority of the Service Issuers and the Rights of the Users, versus the role of the microprocessor managing the functionality of the Machine in its network environment.
    Smart Cards today are proven to resolve the needs for Security, Ease of Use and Privacy for Human-to-Machine digital services.  Until now, the “human” participation in such transactions ensured an infinite panel of reactions whenever a deviation occurred in the way the service was delivered. The fascinating challenge ahead for M2M implementations will be to embed enough delegation power and enough ability to settle on all possible deviations whenever a Machine deals with another Machine.
    The market potential for M2M is phenomenal:  New high volume industries such as the Automotive industry and Retail will embrace M2M managed Smart Secure Devices for Diagnostics, Provisioning, Maintenance and Safety services. By 2020, M2M will be as significant for our industry that SIM is today for 2/3GSM.

    Graduated from INSA Lyon in 1986 with an Engineering Degree (MS) in Material Sciences for Semiconductor, Mr Larduinat joint Schlumberger in 1987 in the Semiconductor Automated Test Equipment (ATE) division.  After various position as a Field Application Engineer and Field Marketing based in Montrouge France, Mr Larduinat moved to San Jose California to become the Marketing Director of the Diagnostic Systems division of Schlumberger ATE in 1995.
    Mr Larduinat joint the Smart Card division of Schlumberger in 2001 as the Director of the Secure Wireless Advanced Services division (SWAS), a group in charge of developing advanced Java applets for the SIM card to promote non-voice revenues for Mobile Operators.
    Since 2004, Mr Larduinat joint the Central Corporate Marketing of Axalto, then Gemalto since June 2006.

  • Gene Tsudik (University of California, Irvine), Sensor Self-Defense: How to Withstand Mobile Adversary in Unattended Sensor Networks
    ABSTRACT:
    Some emerging Wireless Sensor Network (WSN) scenarios preclude constant presence of, and supervision by, a centralized data collection point, i.e., a sink. In such a  disconnected or unattended WSN setting, nodes must accumulate sensed data until it can be safely off-loaded to an itinerant sink. Furthermore, if the operating environment is hostile, there is a very real danger of node and data compromise. The unattended nature of the network makes it an attractive target for attacks that aim to learn, erase or modify potentially valuable data collected by sensors.
    In this talk, we argue that adversarial models and defense techniques used in prior sensor security research are unsuitable for the unattended WSN setting. We define a new and realistic adversarial model - a mobile WSN adversary - by taking into account special features of the unattended environment.
    We show that, in the presence of a powerful mobile WSN adversary, securing data stored on unattended sensors presents some interesting challenges and opens up an exciting new line of research.


    Gene Tsudik is a Professor in the Department of Computer Science at the University of California, Irvine. He has been conducting research in internetworking, network security and applied cryptography since 1987. He obtained his PhD in Computer Science from USC in 1991 for research on firewalls and Internet access control. Before coming to UC Irvine in 2000, he was a Project Leader at IBM Zurich Research Laboratory (1991-1996) and USC Information Science Institute (1996-2000). Over the years, his research interests included: routing, firewalls, authentication, mobile networks, e-commerce, anonymity, group communication, digital signatures, key management, ad hoc networks, as well as database privacy and secure storage. Between 2003 and 2007, Professor Tsudik served as the Associate Dean of Research and Graduate Studies in the School of Information and Computer Sciences at UCI. He spent April-September 2007 in Italy as a Fulbright Scholar lecturing and conducting research at the University of Rome (La Sapienza).

  • N. Asokan (Nokia), On-board Credentials with Open Provisioning
    ABSTRACT:
    Securely storing and using credentials is critical for ensuring the security of many modern distributed applications. Existing approaches to address this problem fall short. User memorizable passwords are flexible and cheap, but they suffer from bad usability and low security. On the other hand, dedicated hardware tokens provide high levels of security, but the logistics of manufacturing and provisioning smartcards are expensive, which makes them unattractive for most service providers. A new approach to address the problem has become possible due to the fact that several types of general-purpose secure hardware, like TPM and M-shield, are becoming widely deployed. These platforms enable, to different degrees, a strongly isolated secure environment.  In this paper, we describe how we use general-purpose secure hardware to develop an architecture for credentials which we call "On-board Credentials (ObCs)".  ObCs combine the flexibility of virtual credentials with the higher levels of protection due to the use of secure hardware. A distinguishing feature of the ObC architecture is that it is "open": it allows anyone to design and deploy new credential algorithms to ObC-capable devices without approval from the device manufacturer or any other third party. The architecture is widely applicable and has been prototyped on several different platforms including mobile devices based on M-Shield secure hardware.


    N. Asokan is a principal scientist with Nokia Research Center in  Helsinki.  He also served as a part-time professor at the Helsinki University of Technology from March 2006 till December 2007.  Asokan has been conducting research in building secure systems for over ten years, first at the IBM Zurich Research Laboratory and then at Nokia Research Center. His primary research interest has been in applying cryptographic techniques to design secure protocols for distributed systems. Recently, he has also been investigating the use of Trusted Computing technologies for securing endnodes, and ways to make secure systems usable. Asokan received his doctorate in Computer Science from the University of Waterloo in 1998.

    More information about Asokan's research is available at:
    http://asokan.org/asokan

  • TBA