Home      Log In      Contacts      FAQs      INSTICC Portal
 

Keynote Lectures

Building The Future: Tokenization, Blockchain and Citizen-focused Systems
Bill Buchanan, Edinburgh Napier University, United Kingdom

Next Generation Information Warfare: Challenges and Research Directions
Roberto Di Pietro, Hamad Bin Khalifa University, Qatar

 

Building The Future: Tokenization, Blockchain and Citizen-focused Systems

Bill Buchanan
Edinburgh Napier University
United Kingdom
 

Brief Bio

Prof Bill Buchanan, OBE, PhD, FBCS, FIET, PFHEA

Bill Buchanan is a Professor in the School of Computing at Edinburgh Napier University, and a Fellow of the BCS, and the IET, and a Principle Fellow of the HEA. He was appointed an Officer of the Order of the British Empire (OBE) in the 2017 Birthday Honours for services to cyber security. Bill recently received an "Outstanding Contribution to Knowledge Exchange" award at the Scottish Knowledge Exchange awards, and was the Cyber Evangelist of the Year in 2016. Currently he leads the Centre for Distributed Computing, Networks, and Security and The Cyber Academy (thecyberacademy.org). His research has led to three successful spin-out companies, including Zonefox, and he has developed a number of patents. Bill has published over 280 academic papers and 30 academic books. His main research focus is around information sharing, threat analysis, cryptography, Blockchain, e-Health, and triage within digital forensics. Bill regularly appears on TV and radio related to computer security, and has given evidence to both the UK and Scottish parliaments. He has been named as one of the Top 100 people for Technology in Scotland for every year since 2012, and was also included in the FutureScot "Top 50 Scottish Tech People Who Are Changing The World". Recently his work on Secret Shares received "Innovation of the Year" at the Scottish Knowledge Exchange Awards, for a research project which involves splitting data into secret shares, and can then be distributed across a public Cloud-based infrastructure. He was also included in the JISC Top 50 Higher Education Social Media Influencers and has one of the most extensive Web sites for computer security education (asecuritysite.com).


Abstract
This talk will outline the future of digital systems which are citizen focused, and which preserve the rights to privacy, consent and ownership. It will outline the methods that can be used to create integrated trusted architectures, and where data can be protected at every stage. This includes methods around Anonymised Transactions, Zero Knowledge Proof (ZKP), Homomorphic Encryption and Distributed Ledgers. The talk will also outline how complex systems such as health care can be remodelled into a more citizen focused infrastructure, and how tokenization can be used to protect data.



 

 

Next Generation Information Warfare: Challenges and Research Directions

Roberto Di Pietro
Hamad Bin Khalifa University
Qatar
 

Brief Bio
Prof. Dr. Roberto Di Pietro is currently full professor of cyber security at the HBKU College of Science and Engineering, Doha-Qatar, leading the effort to establish a world class research and innovation center in cyber security.
Prior to that, he served as Global Lead for Security Research at Bell Labs from 2013 to 2017. In that capacity, he coordinated three Security Research Depts.-based in Paris, Munich, and Espoo - counting 40+ researchers and research engineers, striving to lead security research in alignment with the strategic
business goals and to move research results into innovation. Besides his position at Nokia Bell Labs, Dr. Roberto Di Pietro was also Professor at University of Padova (with tenure). Prior to the above assignments, he was a faculty at University of Roma Tre (Roma, Italy), always dedicated to security research, research mentoring, and innovation.
From 2009-2010 he was a Seconded National Expert to EUROJUST (The Hague). In 2011-12 he was awarded a Chair of Excellence at University Carlos
III, Madrid, for his research results in security. In 2011 he co-founded a research-inspired start-up, providing innovative commercial solutions in the domain of Access Control (exited 2015). From 2013-2015 he was the scientific director of an EU project devoted to devise novel digital forensics tools to support the investigation of EU anti-cartel agencies.
He started his Computer Scientist career back to the 1995, serving for a few years as senior military technical officer, within the Italian MoD, managing complex ICT projects with focus on security, aiming at supporting investigations, forensics, and operations.
His research interests include Cloud Security, Distributed Systems Security, Blockchain Technology, Wireless Security, On-line Social Networks Security, OSINT, Intrusion Detection, Access Control, Forensics. On these topics, he has been publishing 180+ scientific papers, and has been contributing with patents and books.
He holds a M.Sc. in Computer Science from University of Pisa, a PhD in Computer Science, and a Post-degree Specialization Diploma in Operations Research and Strategic Decisions from University of Roma “La Sapienza”, as well as professional certifications such as CISA, CISSP, CISM, CRISC, CGEIT. As for Google Scholar, he has totaling 7100+ citation, with h-index=41, and i-index=110.


Abstract
Information has always played a decisive role in any type of conflict (be it war, revolution, or market competition). Knowing even with little advance the next course of action decided by an opponent, could provide a capital advantage.
Hence, it should come with little surprise that a crucial phase of any conflict is being fought from the information perspective. In particular, a specific segment of interest is constituted by the fact that information trusted by a target may be subject to manipulation, without the target's awareness. Thus, making decisions based on this counterfeit information is absolutely against the interests of the intended victim, since its decision process could be influenced, if not controlled, by its adversary. The manipulation of trusted information is part of Information warfare.

Over the years, we have witnessed an evolution in the way information is produced, transmitted, and consumed In particular, the advent of the Internet made communication distances almost irrelevant, completely revolutionizing the information communication ecosystem. The related introduction of web pages, fora, and Social Media has radically changed many aspects of users' lives from a social point of view, leading to a new logic of information that prefers speed and
immediacy to accuracy and reliability. The information during the sharing process undergoes adjustments, enrichment, teasing an active participation by a dynamic audience, resulting in the fact that original source, opinions, and even fake contributions can hardly be discerned.
People - and eventually the Society -, are also potential target of modern Information warfare.

In this talk, I will revise typical target of Information warfare interpreting them according to the modern information age, focusing on the fabric of society, the economy, and critical Infrastructures.
For each entity we build one or more plausible detailed real-world scenarios, showing the related possible threats from the information warfare point of view.
In addition, we will dive into the description of the still open problems and the countermeasures that can be implemented, possibly inspiring further research in the domain.
Finally, we will also touch one special subjects: Next Generation of Information Warfare Technologies. Here, we will offer a thorough and detailed description of the technologies involved in the above depicted scenarios.



footer