September 2018

European Researchers Night
28th of September 2018, Athens, Greece
The Researchers’ Night 2018, which was organized in 300 cities around Europe on September 28, 2018, brought together an unprecedented concentration of technical innovators, media and civil society from all around Europe. The goal was to bring together scientific communities and share state of the art research projects with the rest of the world. C. Xenakis, C. Ntantogian and N. Koutroumpouchos from UPRC presented the FutureTPM project in the historic building of National Technical University of Athens to the event attendees and other participants. The team discussed with attendees about the FutureTPM vision and accomplishments so far.


Cyber Security Challenge (CSC)
26th of September, Athens, Greece
The Cyber Security Challenge (CSC) is a series of national competitions, learning programmes, and networking initiatives designed to identify, inspire and enable more people to become cyber security professionals. The University of Piraeus and the UPRC has undertaken the organization and the coordination of the Hellenic participation to CSC. During the presentation of the Hellenic team, Prof. C. Xenakis disseminated the FutureTPM project to attendees by sharing its vision and accomplishments so far. This event gathered interested individuals on the CSC, scientific community and media coverage.

Graz Secuity Days for Industry
5th of September, Graz, Austria
Partner IFAG participated

June 2018

ISG Open Day
26th of June 2018, London, United Kingdom
Daniele Sgandurra (RHUL) and Konstantinos Markantonakis (RHUL) led the activities of the Smart Card and IoT Security Centre showroom at the ISG Open Day at Royal Holloway, on Tuesday 26th June 2018. The showroom included a dedicated FutureTPM presentation slot and dissemination desk, and there were plenty of opportunities to network and engage in discussions with visitors to disseminate the results of FutureTPM. The event was very successful and was attended by around 200 participants.

Trusted Computing Group F2F meeting
20th of June 2018, San Diego, USA
Partner HWDU participated and presented the FutureTPM project to the TCG members.

University of Luxembourg - Partnership Day 2018
5th of June 2018, Luxembourg
Partner UL is going to present the FutureTPM project.

May 2018

CSIT’s 8th Annual World Cyber Security Summit
10th of May 2018, Belfast, Northern Ireland
Partner UB talked about the FutureTPM project

April 2018

First Concertation meeting
26th of April 2018, Brussels, Belgium
Partner TEC is going to represent the FutureTPM project

CRYPTACUS Training School
16th to 20thof April 2018, S. Miguel, Portugal
Partner INESC-ID participated

March 2018

CommNet2 PhD Spring School
26th to 28th of March 2018, Sheffield, United Kingdom
The CommNet² Spring School is a regular event targeted at PhD students which, this year, was hosted by the University of Surrey in Guildford, UK with a focus on wireless security. In his talk, Dr. Ronald Toegl of Infineon Technologies Austria AG , gave an introduction to Trusted Computing. The main technology discussed was the Trusted Platform Module, with topics of channel vs. device security, TPM features, core concepts like the chain of trust and the applicability in network computing settings (with examples). Supporting components like the TSS were also introduced and the advances of hardware security (including cryptographic features), also in future settings, discussed. The following discussion with the students was especially fruitful.
In his talk, Dr. Thanassis Giannetsos from the Department of Computer Science, Surrey University , presented the main security and privacy challenges in IoT Edge Computing, focusing on the core edge devices, i.e., sensors, vehicles and mobile phones. He described how the use of trusted computing technologies (especially TPMs) can be used towards establishing and managing trust between entities, starting from bi-lateral interaction between two single system components and continuing as such systems get connected to ever larger entities. A more in-depth discussion revolved around the design of architectures that can support the use of software- and hardware-based attestation towards corroborating the fundamental security and privacy properties of such devices and how they can be transferred to statements on the security properties of hierarchical compositions of Systems-of-Systems.