Loading…
Attending this event?
View analytic

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Privacy & ethics [clear filter]
Monday, February 18
 

09:15

Paradigms of privacy research and privacy engineering (keynote)
The objective of the session is to provide an overview of "privacy research" within computer science and the way in which this research is instrumental for privacy engineering today.


Abstract
For many developers, privacy is not a separate concept. It is often considered to be equivalent to security, or the responsibility of the legal department. The General Data Protection Regulation (GDPR) explicitly requires data protection by design. However, GDPR lacks detailed guidance on how to fulfill this requirement in applications. Thankfully, in the last decade, computer scientists have embarked upon research to develop technical privacy solutions to help fill this gap.

The objective of this talk is to provide an overview of "privacy research" within computer science. We explore how this research plays an instrumental role in privacy engineering today. Concretely, this talk highlights different concepts of privacy and demonstrates ways to address different pieces of the privacy problem through technical design. In particular, I will introduce three dominant research paradigms on privacy that are fundamental to building applications that attend to the privacy requirements of different stakeholders. Using this knowledge, you will be better positioned to build privacy-sensitive applications.


This session is intended for anyone building, designing or maintaining applications.

Speakers
SG

Seda Guerses

FWO Postdoctoral Fellow, KU Leuven


Monday February 18, 2019 09:15 - 10:30
Main building (room Lemaire)
 
Thursday, February 21
 

16:00

The future of security and privacy (keynote)
In the last two decades, technology has had a significant impact on everyone's lives. In this lecture, we analyze how main information technology trends made their impact on the security and privacy of citizens.


Abstract
If you are not doing anything wrong, you have nothing to hide. This argument is often used, but not always easy to counter. In the last two decades, technology has had a significant impact on everyone's lives. Some may argue that these changes are pushed upon us by major corporations. However, others argue that we bring all this technology in ourselves. Just look at the myriad of smart devices in a modern household.

In this lecture, we analyze a number of leading information technology trends. We investigate their impact on the security and privacy of citizens. Topics that are covered include the IoT, cloud and edge computing, big data and AI. We also look at the growing role of law enforcement, intelligence services and the military in cyberspace.


This session is intended for anyone building, designing or securing applications.

Speakers
BP

Bart Preneel

Full professor, KU Leuven


Thursday February 21, 2019 16:00 - 17:30
Main building (room Lemaire)
 
Friday, February 22
 

11:00

Data protection by design - an overview of obligations and technical approaches
The GPDR imposes a number of privacy obligations and data protection requirements. In this session, we investigate how to address these requirements in your applications using technical design.

Abstract
Almost everyone has heard of the General Data Protection Regulation (GDPR). But what does the GDPR mean for software developers? Which obligations does the GDPR stipulate? Which requirements does it impose for data protection? And most importantly, how do you address these obligations using technical design?

In this session, we start from the overview of the GDPR requirements. From there, we zoom in on state-of-the-art research addressing purpose limitation, transparency, sensitive data, accountability, risk management, and data subject rights. When possible, we look into recommendations for developers published by various data protection authorities. Additionally, we draw from ongoing disputes around (the lack of) data protection by design. In the end, you will have an overview of the requirements of the GDPR and how to address them technically.

This session is intended for anyone building, designing or maintaining applications

Speakers
SG

Seda Guerses

FWO Postdoctoral Fellow, KU Leuven


Friday February 22, 2019 11:00 - 12:30
Main building (room Lemaire)

16:00

Who left open the Cookie Jar?
Cookies have been around for more than 20 years, and have a large impact on online security and privacy. We evaluate whether the implemented safeguards are always behaving as expected.

Abstract
Nowadays, cookies are the most prominent mechanism to identify and authenticate users on the Internet. While not directly accessible across origins, cookies are present on all cross-site requests. These so-called third-party cookies enable both cross-site attacks and third-party tracking. To mitigate these nefarious consequences, various countermeasures have been developed. Some come in the form of browser extensions, while others are built into the browser. One well-known example is Safari's Intelligent Tracking Protection (IPT). Unfortunately, these mechanisms are not as effective as one might hope.

In this session, we explore the current landscape of cookie security policies. We show how to bypass many security mechanisms using novel attack techniques. Additionally, we illustrate how even built-in security mechanisms can be circumvented. You will walk away with a solid understanding of third-party cookies in the modern web. As a user, you will learn how to protect yourself better. As a developer, you will learn how to handle cookies more securely.

This session is intended for anyone with an interest in privacy on the web; anyone who want to securely make use of cookies

Speakers
TV

Tom Van Goethem

PhD Researcher, KU Leuven


Friday February 22, 2019 16:00 - 17:15
West wing (room Lemaître)