TrustED

Aurelien Francillon, EURECOM, France

Picture of Aurelien Francillon.

Talk: Analyzing thousands of firmware images and a few physical devices. What's next?

Aurelien Francillon is an assistant professor in the networking and security department at EURECOM. Before this he received a PhD from INRIA Grenoble and then spent 2 years as a postdoctoral researcher in the System Security Group at ETH Zurich.

His primary research interest is in the security of embedded devices, from low-end microcontrollers to high-end smartphones. To improve and analyze the security of these devices a holistic approach is necessary. Therefore he is interested in several topics such as software security, architecture, support for security, wireless and wired network security and privacy. He is especially interested in the boundaries between software and hardware.

Marcel Medwed, NXP Semiconductors, Eindhoven

Picture of Marcel Medwed.

Talk: IoT Security Challenges and Ways Forward

Marcel works for NXP Semiconductors in the field of computer security, algorithms and reliability. He received his PhD degree in the field of IT Security from TU Graz, which he obtained with honors in 2010. After that he stayed as postdoctoral researcher at the Crypto group of Universite catholique de Louvain (UCL).

His research interest are in developing leakage-resilient PRFs by exploring cipher design principles and countermeasures against side-channel and fault attacks.

David Oswald, University of Birmingham, UK

Picture of David Oswald. Talk: Wireless Attacks on Automotive Remote Keyless Entry Systems

David is a lecturer (assistant professor) in the Security and Privacy Group at the University of Birmingham, UK. His main field of research is the security of embedded systems in the real world. On the one hand, the focus is on attack methods that exploit weaknesses in the physical implementation of mathematically secure cryptographic algorithms. Those techniques include both (passive) side-channel analysis and (active) fault injection, as well as reverse engineering. On the other hand, David is working on the practical realization of security systems in embedded applications. He is co-founder of the Kasper & Oswald GmbH, offering innovative products and services for security engineering. His research on vulnerabilities of various wide-spread systems (e.g. DESFire RFID smartcards, Yubikey two-factor authentication tokens, electronic locks, and VW/Hitag2 RKE systems) has created awareness for the crucial importance of security among developers of embedded devices.