Händelser: Informations- och kommunikationsteknikhttp://www.chalmers.se/sv/om-chalmers/kalendariumAktuella händelser på Chalmers tekniska högskolaThu, 21 Sep 2017 13:26:09 +0200http://www.chalmers.se/sv/om-chalmers/kalendariumhttp://www.chalmers.se/sv/institutioner/cse/kalendarium/Sidor/Installation_Alejandro-Russo.aspxhttp://www.chalmers.se/sv/institutioner/cse/kalendarium/Sidor/Installation_Alejandro-Russo.aspxInstallationsföreläsning Alejandro Russo, Data- och informationsteknik<p>Sal EB, vån 4, Hörsalsvägen 11, Campus Johanneberg</p><p>​Titel: A tale of three cities: carrying out security research across several communities</p>​ <br /><span class="text-normal page-content"><img src="/SiteCollectionImages/Institutioner/DoIT/Profile%20pictures/ST/Alejandro-Russo.jpg" class="chalmersPosition-FloatRight" alt="" style="margin:5px" />Abstract: Protecting privacy of data is a long standing problem. Today, we can easily install software (apps) which might be written by literally anyone. We gladly grant apps access to our personal information like pictures and messages while also providing them with unrestricted Internet connection -- otherwise, apps cannot deliver their promised functionality! Regular users are often poorly equipped to understand the privacy implications of granting access to such sensitive resources.<br /><br />In this talk, I will describe the core ideas of my research on protecting privacy of data using (strongly-typed and pure) functional languages. Besides describing the main concepts, I will show how this research has captured the attention of several research communities (security, functional programming, and operating systems) and the lessons I have learned from that. I will conclude describing the next steps on my research agenda and the new directions that I am pursuing.</span>http://www.chalmers.se/sv/institutioner/cse/kalendarium/Sidor/Disputation-Valentin-Tudor.aspxhttp://www.chalmers.se/sv/institutioner/cse/kalendarium/Sidor/Disputation-Valentin-Tudor.aspxValentin Tudor, Data- och informationsteknik<p>EC, lecture hall, EDIT trappa C, D och H, EDIT</p><p>Enhancing Privacy in the Advanced Metering Infrastructure: Efficient Methods, the Role of Data Characteristics and Applications</p>Large quantities of data are produced and collected by computing and communication devices in cyber-physical systems. Information extracted from these data opens new possibilities but also raises privacy issues. <p></p> <br />The characteristics of these data play an important role in the efficiency of privacy-enhancing technologies thus grasping the former's influence is a step forward in improving the latter. Privacy-enhanced data can be employed in cyber-physical systems' applications and their utility can be improved by fine-tuning the parameters of the privacy-enhancing technologies applied to the data. This can be coupled with an analysis of the efficiency of applications that employ privacy-enhanced preprocessed data for better insights on the trade-off between applications' utility and data privacy. Orthogonal to this, privacy-enhanced data originating from cyber-physical systems can be employed in monitoring solutions for cyber security. This is a step forward in fulfilling both the confidentiality and privacy requirements for these complex systems.<p></p> <br />This thesis focuses on privacy in the context of the Advanced Metering Infrastructure (AMI) in the smart electrical grid and it has three primary objectives. The first is to study the characteristics of AMI datasets and how they influence the efficiency of privacy enhancing technologies. The second objective is to identify methods and efficient algorithmic implementations, in connection to what can be deployed in contemporary hardware, as needed for Internet of Things-based systems. The third objective is to study the balance between confidentiality requirements and the requirement to monitor the communication network for intrusion detection, as an example. <p></p> <br />This thesis advances the current research by showing (i) how different AMI privacy-enhancing techniques complement each other, (ii) how datasets' characteristics can be tuned in order to improve the efficiency of these techniques and (iii) how the need for privacy can be balanced with the need to monitor the AMI communication network.<p></p>http://www.chalmers.se/sv/institutioner/cse/kalendarium/Sidor/Disputation-Per-Hallgren.aspxhttp://www.chalmers.se/sv/institutioner/cse/kalendarium/Sidor/Disputation-Per-Hallgren.aspxPer Hallgren, Data- och informationsteknik<p>EC, lecture hall, EDIT trappa C, D och H, EDIT</p><p>​Robust location privacy</p>The Internet is in many ways both fascinating and yet also scary. For most people, a single commercial entity owns the power to disclose all their personal emails. Most commonly your emails are only disclosed to you and your correspondent, but the power to choose who sees these emails is in fact not yours. The power to control the release of data about ones person is what most people refer to as privacy.<p></p> <br /> In spite of this, almost nothing that the Internet is used for gives the originator of a message control over it. When you use a social media platform, you are given the intuition that you choose which friends who can see any posts and photos that you publish, and of course the connection is encrypted to thwart eavesdropping. However, the service provider may still share this data to anyone they like. From a technological standpoint, a user almost never has the power of their data; in other words, there’s normally no privacy on the Internet.<p></p> <br /> This thesis is describes di erent ways of giving end-users more control over some parts of their own personal data using cryptography for the speci c case of location data, enhancing their privacy. The majority of the thesis explores how to make use of location proximity, to check whether to users are close to each other, as a basic primitive while maintaining privacy through additively homomorphic encryption. The thesis further explores the application scenario of ridesharing, or car pooling, using both additively homomorphic encryption and private set intersection. All of the solutions presented sport proven privacy-preserving capabilities, and have been implemented to measure their performance. This thesis shows in what contexts there’s still a ways to go, but also highlights some settings in which it might already be time to move theory into practice.<p></p>http://www.chalmers.se/sv/styrkeomraden/ikt/kalendarium/Sidor/ACM-VRST-2017.aspxhttp://www.chalmers.se/sv/styrkeomraden/ikt/kalendarium/Sidor/ACM-VRST-2017.aspxThe ACM Symposium on Virtual Reality Software and Technology (VRST) 2017<p>Chalmers Lindholmen, Gothenburg</p><p>​VRST will provide an opportunity for VR researchers to interact, share new results, show live demonstrations of their work, and discuss emerging directions for the field.</p>​ <span class="text-normal page-content"><br />The ACM Symposium on Virtual Reality Software and Technology (VRST) is an international forum for the exchange of experience and knowledge among researchers and developers concerned with virtual reality software and technology. <br /><br /><a href="https://vrst.acm.org/vrst2017/index.html">To conference website: http://vrst.acm.org/vrst2017/</a><br /><br /></span>