Skip to content

The Mind for 2020

Every week at our engineers-meeting we have a short presentation of _anything_ we found on the internet that is somewhat work-related and that we would like to share with our fellow engineers. As the team-lead, I wanted to do some short team-building exercise, and I thought about the game “The Mind”. It is a collaborative (…)

Account Management in OmniLedger

The C4DT Factory works using software produced by the EPFL IC labs. Our focus is on software that increases digital trust in the era of the internet. One area where we see a lack of trust is account management, which includes the following elements: self-sovereign management of the account using the account to login to (…)

OmniLedger

The DEDIS lab at EPFL worked on a novel blockchain system called OmniLedger. It uses Calypso to provide decentralized access control including secure storage of data on a blockchain. This combination has the following characteristics: OmniLedger builds on byzcoin, a permissioned, public blockchain which uses little energy. Contrary to other permissioned blockchains, it still allows (…)

Mobile OmniLedger App

For a bit more than three years, DEDIS has been working on a blockchain based on the byzcoin paper. The groundwork has been laid to add client interactions, first as a number of command line interfaces, then a first web-interface, a second interface added by C4DT as a demonstrator, and now, finally, a mobile app (…)

pv: The Pipe Viewer

When working on the command line, it is common to build complex commands that connect sub-tasks through the pipe. In those situations, it can be useful to have an idea of the data transferred between two connected processes. For example, what is the throughput? What about the volume of data transferred? Enter pv. You can (…)

devtodo: todo list for developers

Most projects need organization. There exists a bunch out there, from the post-its laying on the desk to a huge kanban spanning the whole chain of supply. With code¸I find using the same layout as the project is pretty practical: when digging deeper inside it, you get more relevant information, tagging these closer to the (…)

Switzerland: launch of a label to protect SMEs from cyber risks

Protecting your SME from cyberattacks is often complicated: costs of IT security audits, absent or overly complex standards, lack of internal skills have discouraged more than one company from confronting these risks.

Born from a participative approach, the Label cyber-safe.ch helps SMEs and other small organizations to manage their cyber risks pragmatically. Since December 9, a free tool allows to easily assess the exposure of an SME on the website www.cyber-safe.ch.

Please click below to access the official press release in French.

CAS-Login using OmniLedger

The Center for Digital Trust is always searching for novel ways to decentralize control of users accounts so we don’t have to rely on a centralized structure that can be abused by administrators. Currently we have three kinds of services that we offer to our partners: A matrix.c4dt.org installation for internal discussions Our demo.c4dt.org demonstrators (…)

Data 2025 Workshop, a joint IHEID-C4DT event

The rising importance of data has thrown up new challenges ranging from competition policy to privacy to the geostrategic implications of 5G. The goal of this conference, organized in collaboration with The Graduate Institute in Geneva (IHEID), is to boost understanding of what data is and help to develop mindsets and attitudes that are based on technical and economic realities rather than the myths and shallow discussions that so often appear in popular media. For more information, please click below…

March 19th, 2020, 08:00-18:00 @ The Graduate Institute, Geneva, Maison de la Paix, Auditorium A1.

Prof. Guerraoui’s Distributed Computing Lab (DCL) presents low-cost alternative to Bitcoin

The cryptocurrency Bitcoin is limited by its astronomical electricity consumption and outsized carbon footprint. A nearly zero-energy alternative sounds too good to be true, but as C4DT-affiliated Professor Rachid Guerraoui explains, it all comes down to our understanding of what makes transactions secure. DCL’s new system, dubbed Byzantine Reliable Broadcast, can achieve safe cryptocurrency transactions on a large scale with an energetic cost of virtually zero. Read EPFL’s press release by clicking on the following link.

C4DT launch workshop on IoT security

On Thursday October 3rd the C4DT will kick off the IoT Security workgroup with its launch workshop held at the EPFL. Nine C4DT partner companies will develop an understanding of each other’s challenges and needs in IoT Security and share insights on such projects. Prof. David Atienza and Dr. Amir Aminifar from the C4DT-affiliated Embedded Systems Laboratory (ESL) provide insights into their state-of-the-art research.

C4DT Distinguished Lecture : Talk by Dr. Dan Bogdanov, Cybernetica, Estonia

In this talk, Dan Bogdanov will start by introducing secure computing technologies and their potential in enterprise and government use. He will then look at a focus group study of the barriers of adopting such technologies based on interviews in many industries.

September 4, 2019 @ 14:15 in BC 410

Executive Training: Foundations of Information and Communication Technologies

This course is intended for professionals—decision makers, advisers, lawyers—from organizations which, like ICRC, see information and communication technologies (ICT) as an opportunity to better engage with beneficiaries and clients.
The next course will be held on 25-29 November 2019 @ Humanitarium, ICRC headquarters in Geneva.

CYD-Campus Conference on Artificial Intelligence in Defence and Security

The Cyber-Defense Campus holds its inaugural Conference on Artificial Intelligence in Defence and Security on the 5-6 September 2019 at the SwissTech Center in Lausanne. Speakers will be drawn internationally from all defence and security areas of industry, academia, military and government. The discussed AI topics will range from new scientific findings to the benefits and usability of AI techniques. For more information please click here…

Improving Wide-Area Data Store Availability and Responsiveness with Crux

Wide-area data stores enhance fault tolerance and response times, and they enhance scalability. Yet even in the absence of failures, these wide-area deployments can degrade the interaction latency between nearby clients. Cristina Basescu presents Crux, the first general framework that addresses these issues by building locality-preserving data stores.
Wednesday, June 19th, 2019 @16:15 room BC 410

Helen: Maliciously Secure Cooperative Learning for Linear Models

by Prof. Raluca Popa, UC Berkeley
Many organizations wish to collaboratively train machine learning models on their combined datasets for a common benefit (e.g., better medical research, or fraud detection). However, they often cannot share their plaintext datasets due to privacy concerns and/or business competition. In this talk, Helen will be presented, a system that allows multiple parties to train a linear model without revealing their data, a setting we call coopetitive learning.

C4DT’s academic director on e-ID in “Le Temps” daily newspaper

On the 4th of June, the Council of States debated the Swiss law on e-ID (Federal Act on Electronic Identification Services, LSIE). C4DT’s academic director Prof. Jean-Pierre Hubaux wrote an article on the topic for the Swiss French-language daily newspaper ‘Le Temps’, in which he favors state control of all e-ID processes with private sector engagement.

Read the article by clicking on the following link.

IC Research Day: Digital Trust

The School of Computer and Communication Sciences (IC) invites you all to attend this year’s IC Research Day, held at EPFL’s SwissTech Convention Center on the 6th of June, where world-leading experts will present and discuss their work toward building trust in a digital world. EPFL researchers will showcase ongoing research projects and engage with the audience.

Registration is free. Discover the full program here…

Rethinking General-Purpose Decentralized Computing

While showing great promise, smart contracts are difficult to program correctly, as they need a deep understanding of cryptography and distributed algorithms, and offer limited functionality, as they have to be deterministic and cannot operate on secret data. In this talk, Ceyhun Alp presents Protean, a general-purpose decentralized computing platform that addresses these limitations.

Funding Multilateral Projects in Cybersecurity / Digital Trust

This workshop will be held on the 20th of May 2019 the the EPFL and aims to inform researchers and industrial partners, active in the field of cybersecurity / digital trust, about current opportunities to fund multilateral projects (collaborative projects involving multiple research and industry partners) using H2020 as well as other Swiss and EU sources of financing.
Please note that this is a closed C4DT community event.

Swiss Symposium on Blockchain Research

The UZH Blockchain Center is organising a Swiss-wide Symposium on Blockchain Research to take place on the 14.05.2019 in Zürich. In such an event, two principles are fundamental: (1) Academic, interdisciplinary programme; (2) Federal coverage. It is just fair (and interesting) to learn what Universities of this country are doing in the area now. This allows to form a sense of community, find possible synergies and plainly learn. Please register for this event.

Jean-Pierre Hubaux takes on co-leadership of GA4GH Data Security Work Stream

C4DT-affiliated Jean-Pierre Hubaux, a Full Professor at École polytechnique fédérale de Lausanne (EPFL) and lead of the Data Protection in Personalized Health (DPPH) initiative in Switzerland, and David Bernick, Chief Information Security Officer at the Broad Institute of MIT and Harvard, take on leadership of the Global Alliance for Genomics and Health (GA4GH) Data Security Work Stream.

MinFuzz: Program simplification to drive fuzzing effectiveness

In this talk, Nicolas Badoux presents MinFuzz, his approach to discover and remove prunable code blocks to improve fuzzing effectiveness. First, he will discuss which computations are “skippable”. His system targets particularly decompression, decryption, and checksum computations […]