https://wiki.uio.no/mn/ifi/AFSecurity/index.php?title=Special:NewPages&feed=atom&hideredirs=1&limit=50&offset=&namespace=0&username=&tagfilter=mn/ifi/AFSecurity - New pages [en]2024-03-28T08:57:59ZFrom mn/ifi/AFSecurityMediaWiki 1.27.4https://wiki.uio.no/mn/ifi/AFSecurity/index.php/1_December_20231 December 20232023-11-14T13:32:24Z<p>Josang@uio.no: Created page with "== AF''Security'' == == ''Confidential Computing'' == {| border="0" cellpadding="1" cellspacing="1" width="100%" |- | '''TIME:'''&nbsp; Friday 1 December 2023, 14:00h<br />''..."</p>
<hr />
<div>== AF''Security'' ==<br />
== ''Confidential Computing'' ==<br />
<br />
{| border="0" cellpadding="1" cellspacing="1" width="100%"<br />
|-<br />
| '''TIME:'''&nbsp; Friday 1 December 2023, 14:00h<br />'''PLACE:'''&nbsp; Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br /><br />
All interested are welcome. Coffee and snaks served.<br /><br />
<br />'''AGENDA:'''<br /><br />
14:00h Welcome to AFSecurity at UiO <br /><br />
14:15h Invited talk<br /><br />
* TITLE: ''Confidential Computing'' &nbsp;<br />
* SPEAKER: Ijlal Loutfi, Canonical <br />
| <center>[[File:photo-Ijlal-Loutfi.png|90px|link=https://www.linkedin.com/in/ijlal-loutfi-785125234/]]</center><br />
| <center>[[File:logo-Canonical.png|320px|link=https://canonical.com/]]</center><br />
|}<br />
* ABSTRACT:<br />Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.<br /><br />Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.<br /><br />In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.<br />
<br />
<br />15:00h Discussion<br /><br />
<br />
'''BIO:''' &nbsp; Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.<br />
<br />
<br />
<br /><br /><br />
<br />
{| border="0" cellpadding="1" cellspacing="1" width="90%"<br />
|-<br />
| [[File:AFSecurity-small.png|250px]]<br />
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/forskning/grupper/sec/ Digital Security].<br />
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]<br />
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]<br />
|}</div>Josang@uio.nohttps://wiki.uio.no/mn/ifi/AFSecurity/index.php/31_October_202331 October 20232023-10-16T15:12:22Z<p>Josang@uio.no: </p>
<hr />
<div>== AF''Security'' Seminar: ''AI - Challenges and Opportunities for Cybersecurity'' ==<br />
<br />
{| border="0" cellpadding="1" cellspacing="1" width="100%"<br />
|-<br />
| '''TIME:'''&nbsp; Tuesday 31 October 2023, 14:00h<br />'''PLACE:'''&nbsp; Kristen Nygaards Hall, 5th floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br /><br />
All interested are welcome. Coffee and snaks served.<br /><br />
<br />'''AGENDA:'''<br /><br />
14:00h Welcome to AFSecurity at UiO <br /><br />
14:15h Invited talk<br /><br />
* TITLE: ''AI - Challenges and Opportunities for Cybersecurity'' &nbsp;<br />
* SPEAKER: Zoltán Aradi, National Cyber Security Center of Hungary <br />
| <center>[[File:Photo-Zoltan-Aradi.jpg|150px|link=https://www.linkedin.com/in/zoltanaradi/]]</center><br />
| <center>[[File:Logo-NCSC-Hungary.png|150px|link=https://nki.gov.hu/]]</center><br />
|}<br />
* ABSTRACT:<br />Artificial Intelligence stands at the forefront of paradigm changes in many realms, including cybersecurity, reshaping the landscape of digital defense and threat mitigation. As AI technologies become more sophisticated, cybersecurity strategies are compelled to evolve. AI-driven cybersecurity promises a proactive defense mechanism, leveraging advanced algorithms for real-time threat detection, pattern recognition, and adaptive responses. However, this paradigm shift brings forth challenges such as potential vulnerabilities in AI systems, ethical concerns regarding autonomous decision-making in security, and the need for continuous innovation to outpace emerging cyber threats. Balancing the promises and pitfalls of AI in cybersecurity demands robust governance frameworks, ongoing research into secure AI development, and international collaboration to establish ethical standards that safeguard against malicious use. The future of cybersecurity is intricately tied to the responsible integration of AI, ushering in a new era where adaptive defenses and human-machine collaboration redefine the dynamics of cyber resilience.<br />
<br />
<br />15:00h Discussion<br /><br />
<br />
'''BIO:''' &nbsp; Zoltán Aradi is a seasoned cybersecurity professional armed with a CEH and other certificates, currently playing a crucial role in fortifying Hungary’s governmental cybersecurity. Beyond the digital realm, Zoltán's interests span the culinary and financial domains, showcasing a unique blend of technical expertise and a penchant for life's finer pursuits. With a passion for exploring new technologies, he navigates the dynamic landscape of cybersecurity and cutting-edge innovations with equal finesse, embodying a multifaceted professional at the intersection of security, finance, and technological advancement..<br />
<br />
<br />
<br /><br /><br />
<br />
{| border="0" cellpadding="1" cellspacing="1" width="90%"<br />
|-<br />
| [[File:AFSecurity-small.png|250px]]<br />
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/forskning/grupper/sec/ Digital Security].<br />
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]<br />
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]<br />
|}</div>Josang@uio.nohttps://wiki.uio.no/mn/ifi/AFSecurity/index.php/19_October_202319 October 20232023-10-03T13:40:47Z<p>Josang@uio.no: </p>
<hr />
<div>== AF''Security'' Seminar: ''Advanced Metering Infrastructures Security'' ==<br />
<br />
{| border="0" cellpadding="1" cellspacing="1" width="100%"<br />
|-<br />
| '''TIME:'''&nbsp; Thursday 19 October 2023, 14:00h<br />'''PLACE:'''&nbsp; Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br /><br />
All interested are welcome. Coffee and snaks served.<br /><br />
<br />'''AGENDA:'''<br /><br />
14:00h Welcome to AFSecurity at UiO <br /><br />
14:15h Invited talk<br /><br />
* TITLE: ''Security Analyses of Four Large Advanced Metering Infrastructures'' &nbsp;<br />
* SPEAKER: Prof. Sujeet Shenoi, University of Tulsa, USA <br />
| <center>[[File:photo-Sujeet-Shenoi.jpg|150px|link=https://faculty.utulsa.edu/faculty/sujeet-shenoi/]]</center><br />
| <center>[[File:Logo-Tulsa.jpg|150px|link=https://utulsa.edu/]]</center><br />
|}<br />
* ABSTRACT:<br />An advanced metering infrastructure is an integrated system of smart meters, communications networks and data management systems that support the safe, efficient and reliable distribution of electricity while providing advanced functionality to energy customers. Unfortunately, sophisticated cyber attacks on advanced metering infrastructures are a clear and present danger. A chilling scenario involves a computer worm that traverses advanced metering infrastructures, shuts off power and permanently disables millions of smart meters.<br /><br />This presentation describes the results of security analyses of four large advanced metering infrastructures, one with a point-to-multipoint topology and three with mesh topologies. The research articulates the attack surfaces of the point-to-multipoint and mesh advanced metering infrastructures. Additionally, it identifies potential targets, and describes novel attacks on principal components in the four advanced metering infrastructures. Finally, the research clarifies the security impacts of attacks enabled by physical access, along with techniques for mitigating the attacks. While the attacks, impacts and mitigation techniques pertain to the four advanced metering infrastructures in the case study, they are relevant to advanced metering infrastructures in general.<br />
<br />
<br />15:00h Discussion<br /><br />
<br />
'''BIO:''' &nbsp; Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Oklahoma. An active researcher with specialties in cyber security, cyber operations, critical infrastructure protection and digital forensics, Dr. Shenoi works on exciting “problems” ranging from helping solve homicides to penetrating telecommunications systems, oil and gas pipelines, wind farms and voting machines. He spearheads the University of Tulsa's elite Cyber Corps Program that trains “MacGyvers” for U.S. government agencies. For his innovative strategies integrating academics, research and service, Dr. Shenoi was named the 1998-1999 U.S. Professor of the Year by the Carnegie Foundation.<br />
<br />
<br />
<br /><br /><br />
<br />
{| border="0" cellpadding="1" cellspacing="1" width="90%"<br />
|-<br />
| [[File:AFSecurity-small.png|250px]]<br />
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/forskning/grupper/sec/ Digital Security].<br />
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]<br />
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]<br />
|}</div>Josang@uio.no