Category Archives: Workshops

Interdisciplinary Cyber Research (ICR) workshop 2018


9th of June, 2018 — Tallinn, Estonia

The aim of the workshop is to bring together young as well as established scholars undertaking research in various disciplines related to information and communication technologies such as computer sciences, political and social sciences, and law.

Agenda:
8:30 Registration
9:00 Opening words, Dr Anna-Maria Osula & Prof Olaf Maennel on behalf of Tallinn University of Technology (SOC-209)
9:10 Keynote presentation, “Maximising Cyber Resilience”, Mr Luc Dandurand, Head of Cyber Operations at Guardtime (SOC-209)
10:05 Keynote presentation, “Command, Control & Communications within Cyber Incidents”, Mr Kieren Nicolas Lovell, Head of Computer Emergency Response at University of Cambridge (SOC-209)

11:30–13:00
SESSION 1: eID (ROOM 1 / SOC-209)
Session moderated by Dr Anna-Maria Osula, NATO CCD COE
Ms Liisa Past, “ROCA Vulnerability and eID: Lessons Learned”, Information System Authority
Mr Arnis Parsovs, “Legal Issues in Solving the Estonian ID Card Crisis”, University of Tartu
Ms Liisa Tallinn, “Estonian eID Vulnerability: a PR Problem?”, SpectX
Mr Arne Koitmäe, “Internet Voting and ID Card Crisis: Elections Manager’s Perspective”, State Electoral Office

SESSION 2: Tech 1 (ROOM 2 / SOC-211)
Session moderated by Dr Hayretdin Bahsi, Tallinn University of Technology
Mr Raymond Yin & Mr Isaac Burgess, “Dual IP Stack Exfiltration – Methods and Defences”, University of Adelaide
Mr Andrei Perapiolkin, “Time Lock Puzzles for Distributed Systems”, Tallinn University of Technology
Mr Alexander Manariotis, “Private but Public on the Blockchain”, University of Adelaide
Ms Kristiina Renel, “Public Sector Logging & Compliance with GDPR“, Tallinn University of Technology

13:00 Lunch
14:00–15:30
SESSION 3: State & Cyber (ROOM 1 / SOC-209)
Session moderated by Prof Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten
Dr Kristan Stoddart, “Cyber Espionage: Anarchy in Cyberspace”, Aberystwyth University
Ms Kateryna Gorbanova, “International Normative Framework of Cyber Espionage”, Tallinn University of Technology
Mr Siim Alatalu, “Cyber Commands – Universal Solution to a Universal Cyber Security Problem?”, NATO CCD COE
Mr Roman Müller, “Manipulation Resistant Opinion Forming in Online Communities”, Tallinn University of Technology

SESSION 4: Tech 2 (ROOM 2 / SOC-211)
Session moderated by Prof Olaf Maennel, Tallinn University of Technology
Ms Tiiu Mamers, “The Information Security Investment Problem for Small Enterprises and the RORPI Model”, Tallinn University of Technology
Mr Alvaro Schuller, “Exploiting Spectre: Reading Kernel Memory from a User Process”, Tallinn University of Technology
Mr Michael Pfeiffer & Mr Lazarus Lai De Oliveira, “The Challenges of Building a Universal CAN Bus Emulation Testbed Environment for Security and Vulnerability Analysis of Internal Networks in Vehicles”, University of Adelaide
Mr Richard Matthews, “Thermal Effects of Dark Current on Blind Source Camera Identification”, University of Adelaide

15:30 Coffee break

15:50–17:00
SESSION 5: Data & Privacy (ROOM 1 / SOC-209)
Session moderated by Dr Agnes Kasper, Tallinn University of Technology
Ms Isabella Oldani, “Technology as an Alternative to Geography in Protecting Personal Data”, University of Trento
Ms Kärt Salumaa, “Risks and Incidents Deriving from Breaching Data Protection Regulation”, KPMG Law Firm
Ms Munirah DeVries, “Biometric Profiling of Wearable Devices for Medical Monitoring and Authentication”, University of Adelaide
Mr Raul Nugis, “Forensic Data Properties of Digital Signature BDOC and ASICE Files”, Tallinn University of Technology

SESSION 6: Tracking Watches (ROOM 2 / SOC-211)
Session moderated by Dr Matthew Sorell, University of Adelaide
Ms Sasha de Vries & Mr Brent Williams, “Penetration Testing of the SpaceTalk Tracking Watch”, University of Adelaide
Mr Narayan Shanmuganathan & Mr Nooragha Sharifi, “Security Framework for Children’s Safety Watches”, University of Adelaide
Mr Luke Jennings & Mr Inderbir Singh, “Improving the Technical Functionality of Children’s Tracking Watches”, University of Adelaide
Ms Kristine Hovhannisyan, “Arkangel: Investigation of Children’s Tracking Smartwatch Ecosystem. Forensic Value and Privacy Implications”, Tallinn University of Technology

18:00 Social event at Pipedrive office, Paldiski maantee 80

Links:
http://cybercentre.cs.ttu.ee/icr2018/

Interdisciplinary Cyber Research (ICR) workshop 2017

8th of July, 2017 — Tallinn, Estonia

The aim of the workshop is to bring together young as well as established scholars undertaking research in various disciplines related to information and communication technologies such as computer sciences, political and social sciences, and law.

You can participate as a speaker (submitting an abstract+delivering a presentation) or simply join our wonderful audience. Speakers are requested to submit a 1000-word abstract.

Agenda:
08:30 – Registration
09:00 – Opening words, Dr Anna-Maria Osula & Prof Olaf Maennel
09:10 – Keynote, “The Triangle of Impossibility: Strategic Decision-Making and Cyber Security”, Mr Lauri Almann
10:05 – Keynote, “The Truth about Hacking. From Russia to Hollywood.”, Mr Ralph Echemendia
11:00 – Coffee break

11:30 – 13:00 SESSION 1: Big Data & Privacy
Ms Kärt Pormeister, “The GDPR as an Enabler for Big Data: What Does it Mean for the Data Subject?”
Ms Maris Männiste, “Social Media and Big Data”
Ms Julija Terjuhana, “Right to Data Portability”
Mr Alexander Mois Aroyo, “Bringing Human Robot Interaction towards Trust and Social Engineering – Slowly & Secretly Invading People’s Privacy Settings”

11:30 – 13:00 SESSION 2: Security
Mr Alessandro Borrello, Mr Sioli O’Connell & Mr Yuval Yarom, “Is Dynamic Analysis of Android Applications More Effective Than Mass Static Analysis at Detecting Vulnerabilities?”
Mr Ben Agnew, “Security Applications of Additive Analogue Memory”
Mr Richard Matthews, “Isolating Lens Aberrations within Fixed Pattern Noise”
Mr Muhammad Imran Khan, “On Detection of Anomalous Query Sequences”

13:00 – Lunch
14:00 – 15:30 SESSION 3: Privacy (cont) & Cyber Crime
Dr Xingan Li, “Social Networking Services and Privacy: An Evolutionary Notion”
Mr Sten Mäses, “Gone Phishin’ (But Not to Jail)”
Mr Kristjan Kikerpill, “Cybercrime Against Business: Who Draws the Short Straw?”
Ms Anne Veerpalu, “Blockchain Technologies”

14:00 – 15:30 SESSION 4: Applied IT-Security
Prof Tobias Eggendorfer, “Using Process Mining to Identify Attacks”
Ms Belgin Tastan, “Electronic Identification System – How to Adopt, Expanding and Provide One Card for All”
Mr Aykan Inan, “Project IVA”
Mr Ayden Aba & Mr Jackson Virgo, “Equity Crowdfunding with Blockchain”

15:30 – Coffee break
15:50 – 17:00 SESSION 5: State and Cyber
Ms Maarja Toots, “Why Do e-Participation Projects Fail? The Case of Estonia’s Osale.ee”
Mr Georgios Pilichos, “Securitization of Cyberspace”
Mr Madis Metelitsa, “Addressing the Security Dilemma in Cyberspace”
Ms Somaly Nguon, “Cambodia’s Effort on Cybersecurity Regulation: Policy and Human Rights’ Implications”

15:50 – 17:00 SESSION 6: eGovernment & Security
Mr Harish Gowda & Mr Matt Reynolds, “Real-Time Video Stream Substiution”
Mr Nicolas Mayer, “The ENTRI Framework: Security Risk Management Enhanced by the Use of Enterprise Architectures”
Mr David Hubczenko, “Investigation into Twitterbot Identification Techniques”
Mr Lachlan Gunn, “Geolocation of Tor Hidden Services: Initial Results”

18:00 – Social snacks at “August”, Väike-Karja 5

Links:
http://cybercentre.cs.ttu.ee/en/icr2017/

Cyber Security Summer School 2017: “Social Engineering Capture the Flag Summer School”

July 10-14, 2017, Estonian Information Technology College, Tallinn

A main focus on this year’s Cyber Security Summer School will be social engineering. With experts from all faculties, including computer science, law, criminology, forensics and psychology, the Summer School tries to give an impression on how and why social engineering works, how to prevent social engineering and how to find evidence for social engineering attacks.

Speakers:
Dirk Labudde, The University of Applied Sciences Mittweida, Germany
Jeffrey Moulton, Louisiana State University, USA
Sandra Matz, University of Cambridge Psychometrics Centre, UK
Vesselin Popov, University of Cambridge Psychometrics Centre, UK

Monday, July 10th
08:00 – 09:00 Registration. Breakfast at IT College bitStop Cafe
09:00 – 09:30 Welcome by the organizers. Practical information
09:30 – 10:30 Introduction of the speakers and mentors. Allocation of teams
10:30 – 11:00 Coffee break
11:00 – 12:30 Talk by Freddy Dezeure “Main Cyber Threats Affecting Our Society and How Your Social Footprint Helps the Adversary”
12:30 – 13:30 Lunch break at IT College bitStop Cafe
13:30 – 14:30 Talk by Aunshul Rege “Tainted Love: Social Engineering at Dating Websites”
14:30 – 15:30 Cases by Kieren Niĉolas Lovell
15:30 – 16:00 Coffee break
16:00 – 17:00 Introduction to CTF. Introduction of CTF-teams
17:30 – 20:00 Dinner and welcome party at IT College bitStop Cafe

Tuesday, July 11th
08:00 – 09:00 Breakfast at IT College bitStop Cafe
09:00 – 10:00 CTF-team-time
10:00 – 11:00 Talk by Didier Meuwly
11:00 – 11:30 Coffee break
11:30 – 12:30 Talk by Vesselin Popov on Big Data, Psychometrics and Profiling
12:30 – 13:30 Lunch break at IT College bitStop Cafe
13:30 – 14:30 Social Engineering Talk by Dirk Labudde
14:30 – 15:00 CTF-team-time
15:00 – 15:30 Coffee break
15:30 – 16:15 Talk by Tobias Eggendorfer: How (not) to be phished
16:15 – 17:00 CTF-team-time
17:30 – 18:30 Dinner at IT College bitStop Cafe

Wednesday, July 12th
08:00 – 09:00 Breakfast at IT College bitStop Cafe
09:00 – 09:30 Presentations by CTF-teams on their results
09:30 – 10:30 Hands on Session by Dirk Labudde (Part 1)
10:30 – 11:00 Coffee break
11:00 – 12:30 Hands on Session by Dirk Labudde (Part 2)
12:30 – 13:30 Lunch break at IT College bitSop Cafe
13:30 – 15:00 Talk by Ralph Echemendia
15:00 – 15:30 Coffee break
15:30 – 16:15 Talk by Aleks Koha and Leonardo Romanello on Tools against Social Engineering
16:15 – 17:30 Briefing on the morning presentation, status update on the flags and CTF-team-time
17:30 – 18:30 Dinner at IT College bitStop Cafe

Thursday, July 13th
08:00 – 09:00 Breakfast at IT College bitStop Cafe
09:00 – 10:30 CTF-team-time
10:30 – 11:00 Coffee break
11:00 – 12:30 CTF-team-time
12:30 – 13:30 Lunch break at IT College bitStop Cafe
13:30 – 15:00 Talk by Jeffrey Moulton “Privacy in the Digital World”, “This is Personal – Part II, The Internet of You”
15:00 – 15:30 Coffee break
15:30 – 17:30 CTF-team-time
18:30 Bus transfer IT College – city centre
19:00 – 22:00 Reception dinner in the Crown Hall of the Tallinn Teachers’ House (Tallinna Õpetajate Maja) at the Town Hall Square (Raekoja plats 14).
22:30 Bus transfer city centre – IT College

Friday, July 14th
08:00 – 09:00 Breakfast at IT College bitStop Cafe
09:00 – 09:30 Status of CTF-Teams
09:30 – 10:00 Last flags for CTF
10:00 – 12:30 Presentations by CTF-Teams on their results
12:30 – 13:30 Lunch break at IT College bitStop Cafe
13:30 – 15:00 Report writing and feedback
15:00 – 15:30 Coffee break
15:30 – 16:30 Announcing the winner of CTF. Wrap-up, defusing, feedback to the organizers
16:30 – 17:30 Dinner at IT College bitStop Cafe

Links:
http://www.studyitin.ee/c3s2017

Interdisciplinary Cyber Research (ICR) workshop 2016

TTU_centre_for_digital_forensics_and_cyber_security

2nd of July, 2016 — Tallinn, Estonia

The aim of the workshop is to bring together young as well as established scholars undertaking research in various disciplines related to information and communication technologies such as computer sciences, political and social sciences, and law.

Agenda:
09:00 – Opening words, Ms Anna-Maria Osula & Prof Olaf Maennel
09:10 – Keynote, “On Artificial Intelligence and Steering the Future”, Mr Jaan Tallinn
10:05 – Keynote, “Artificial Intelligence: Will Judges and Lawyers Ever Enter the 20th Century (Never Mind the 21st Century)?”, Mr Stephen Mason
11:00 – Coffee Break

11:30 – 13:00 SESSION 1: Use and Abuse of the Internet
Maarja Pild, “Liability for Posting, Liking, Tagging, Sharing or Doing Nothing at All on Facebook”
Lolita Berzina, “Application of the Right to Be Forgotten and the Jurisdiction in Internet”
Eva Vīksna, “Taming the Online Environment – Protection of Copyright on the Internet”
Mari Kert-Saint Aubyn, “Case Study: Ukrainian Electrical Grid Hack”

11:30 – 13:00 SESSION 2: Technology and Emerging Threats
Hayretdin Bahsi, “Mission Impact Assessment of Cyber Threats”
Ismail Melih Tas, Basak Gencer Unsalver, “Our Proposed SIP – Based Distributed Reflection Denial of Service (DRDoS) Attacks & Effective Defense Mechanism”
Johann David Krister Andersson, “Using Internet Protocol Packet Visualization to Support Defence Exercise Debriefing”
Huishi Yin, “Implementation and Evaluation of Kano-like Models Using Data from Online Sources”

13:00 – Lunch
14:00 – 15:30 SESSION 3: Crime and Digital Technologies
Andra Siibak, “”People Who Defend Their Homeland”: Reasons and Motivations for Joining an Anti-Immigration Group on Facebook”
Tõnu Mets, “Admissibility of Digital Evidence”
Tiia Sõmer, “Visualising Cyber Crime based on the E-Crime Project: Mapping the Journeys of Cyber Criminals”
Margus Ernits, “How to Educate the Defenders of Cyberspace”

14:00 – 15:30 SESSION 4: Internet of Things
Michael Hua, “Security Analysis: NFC Tags and Signature RTD”
Petko Stefanov, “An Analysis of Security Flaws in the NFC Communication Protocol of Modern Mobile Devices”
Prescient Kannampuzha, “Security Investigation of a CAN Bus IoT Network Implementation and its Interface to the Internet”
Michael Bassi, “Engineering Change Management for Industrial Control System Security”

15:30 – Coffee break
15:50 – 17:00 SESSION 5: E-Governance
Gerli Aavik, “The Electronic Identification and Trust Service Regulation (EIDAS): An Analysis of its Compatibility with the Estonian E-Government System (EES)”
Sandra Särav, “E-Residency as the Estonian E-Government Éclat: How More Security Can Result in Less Privacy”
Nenin Hadzic, “Determining Specifications of Secure Database Architecture for Use within Australian Online Government”
Osura Jayasundara, “Recommendation of a Unified ID System for E-Government of Australia”

15:50 – 17:00 SESSION 6: Identity Theft and Verification
Torsten Schmickler, “Biometrics: the Future of Identity Verification”
Adrian Daniele, “Ethernet Device Anomaly Detection Using a Digital Fingerprint”
Olga Rodionova, “Medical Data Security of Wearable Fitness Devices”
Arnis Paršovs, “Security Analysis of Instant Messenger TorChat”

Registration deadline for non-authors is 27th of June 2016.

Links:
http://cybercentre.cs.ttu.ee/en/icr2016/

Cyber Security Summer School 2016: “Digital Forensics — technology and law”

cybersecurity_summerschool_estonia

July 3-8, 2016, Estonian Information Technology College, Tallinn

Cyber Security Summer School 2016 is organised by Information Technology Foundation for Education in collaboration with Tallinn University of Technology, University of Tartu and The University of Adelaide.

Speakers:
• Hein Dries-Ziekenheiner
• Jeffrey Moulton (LSU)
• Merike Kaeo (Double Shot Security)
• Pavel Gladyshev (University College Dublin)
• Stephen Mason (www.stephenmason.eu)

Timeline:
Applications open until May 9, 2016
Confirmation of admission by May 23, 2016

Monday, July 4
09:00 – 10:00 Opening of the Summer School
Welcoming words by Erki Urva, Chairman of the Board of HITSA
Introduction of the speakers and mentors by organizers Olaf Maennel and Helen Eenmaa-Dimitrieva
11:15 – 13:00 “Introduction to Electronic Evidence”, “Evidential Foundations and Authenticity” Stephen Mason and Hein Dries-Ziekenheiner
14:00 – 16:00 “Forensic Tools” Pavel Laptev

Tuesday, July 5
09:30 – 11:00 “Case assessment and Interpretation in digital forensic casework” Didier Meuwly
11:15 – 13:00 “Social media, big data, internet forensics” Hein Dries-Ziekenheiner
14:00 – 16:00 Exercise “State of Connecticut v Julie Amero” Stephen Mason and Hein Dries-Ziekenheiner

Wednesday, July 6
09:00 – 09:30 “Application to court” Stephen Mason
09:30 – 11:00 “Network Forensics As Evidence: What Can You Trust and What Is Admissible in a Court of Law” Merike Kaeo
16:15 – 17:30 “IT Forensics: Why post-mortem is dead. Whay over preserving evidence is bad.” Tobias Eggendorfer

Thursday, July 7
14:15 – 16:00 “This is Personal”, “Risk Management Framework” Jeffrey Moulton
16:15 – 18:00 “Frameworks for International Cyber Security” Eneken Tikk-Ringas

Friday, July 8
09:15 – 11:00 First Round of Moot Court
14:00 – 16:00 Best groups in a Public Moot
16:00 – 16:30 Summary and closing of the Summer School

Links:
http://studyitin.ee/c3s

Oxford Training Sessions on Government, Security, and Conflict in the Cyber Age

oxford-dpir

egvntchlogomp

This three-day training session is organized and delivered by Oxford University faculty. It will discuss in detail the challenges and opportunities of the modern information society. These are not solely or even primarily technical in nature – they also involve elemental questions of political culture and institutions, public policy, ethics, law, and diplomacy.

Where: Tallinn University of Technology, Ehitajate tee 5, Tallinn, room U01-202 (auditorium behind the main hall)

DAY 1: September 4, Friday, Grand Hall
09:00 – 10.00    Registration and welcoming
10:00 – 10:30    Course Introduction (Lucas Kello)
10:30 – 12:00    Lecture 1: Computing and Networks: The Basics (Andrew Martin)
12:00 – 13:00    Lunch break
13:00 – 14:20    Lecture 2: Code as a Weapon: Worms and Viruses (Andrew Martin)
14:20 – 14:30    Short break
14:30 – 16:00    Lecture 3: International Security and Conflict in the Cyber Age (Lucas Kello)
16.00 – 16.10    Short break
16:10 – 17:00    Day 1 summary

DAY 2: September 5, Saturday, Grand Hall
08:30 – 09:00    Registration
09:00 – 10:20    Lecture 4: Rules of War in the Cyber Domain (Lucas Kello)
10:20 – 10:30    Short break
10:30 – 12:00    Lecture 5: Cybersecurity and the Age of Privateering: A Historical Analogy (Florian Egloff)
12:00 – 13:00    Lunch break
13:00 – 14:20    Lecture 6: Origins, Principles and Functions of the Estonian State Information System (Kuldar Taveter)
14:20 – 14:30    Short break
14:30 – 16:00    Lecture 7: Designing User Friendly and Secure Services of e-State (Kuldar Taveter)
16:00 – 16:20    Coffee break
16:20 – 17:00    Day 2 summary and simulation exercise briefing

DAY 3: September 6, Sunday, Grand Hall
08:30 – 09:00    Registration
09:00 – 09:30    Simulation exercise set up
09:30 – 13:00    Simulation Exercise
13:00 – 14:30    Lunch break and group discussion
14:30 – 15:30    Post-Exercise Debriefing: Decisionmaking in a Crisis
15:30 – 15:50    Coffee break
15:50 – 17:00    Course summary

Registration open until 02.09.2015.

Links:
http://www.egov.ee/oxford/

Interdisciplinary Cyber Research workshop 2015

TTU_centre_for_digital_forensics_and_cyber_security

18th of July, 2015 — Tallinn, Estonia

The aim of the workshop is to bring together young as well as established scholars undertaking research in various disciplines related to information and communication technologies such as computer sciences, political and social sciences, and law. Attending the ICR workshop is free of charge and also open for participants who have not submitted an abstract (registration for non-authors is here). Travel to/from Tallinn and accommodation is to be covered by the participants.

Agenda:
9:30​ – Opening words, ​Tallinn University of Technology
9:35​ – Keynote presentation, ​“Data Sovereignty, Data Flow, and International Jurisdiction in Cloud Computing, ​Prof Christopher Millard​, Queen Mary University of London
10:05​ -Keynote presentation, ​“Gnawing Away at Internet of Things Silos”, ​Prof Jon Crowcroft​, University of Cambridge
Session 1: State and Cyber (Room 1)
“Governance of Cyber-Security in Elections”, ​Prof Robert Krimmer​, Tallinn University of Technology
“E-Estonia under an Actor Network Theory Perspective”, ​Carlos Vargas Alvarez Del Castillo​, Tallinn University
Session 2: Education and Digital Safety (Room 2)
“Representation of Snowden ́s Scandal in Estonian Media: Semiotic Logic of Fear”, Mari-Liis Madisson​, University of Tartu
Session 3: Privacy (Room 1)
“Tor Does Not Stink: Use and Abuse of the Tor Anonymity Network from the Perspective of Law”, Tomas Minarik​, NATO CCD COE
Session 4: Tech I (Room 2)
Session 5: Law (Room 1)
“ISP Liability & the Delfi case”, Karmen Turk​, University of Tartu
Session 6: Tech II (Room 2)

Registration deadline for non-authors: 10th of July 2015

Links:
http://cybercentre.cs.ttu.ee/en/icr2015/

Cyber Security Summer School 2015

Print

13-17 July 2015, Laulasmaa Spa and Conference Hotel.

Topics:
* How to live securely in a digital society?
* E-Estonia, a role model for the future? On implementation, challenges and limitations
* Privacy and other concerns of a digital society
* Anonymisation and deanonymisation techniques
* Internet measurements and routing: big data and network mathematics
* Examples and hands-on activities from experts
* Lots of fun and insights into controversial topics

Tentative Program:
Sunday, July 12: 18.30 Welcome Reception

Monday, July 13:  Living in a digital society, securely?
09.30 – 13.00 Steven M. Bellovin
13.00 – 14.00 Lunch
14.00 – 17.30 Jaan Priisalu & Kristjan Vassil
18.30 Dinner

Tuesday, July 14: Privacy and concerns about a digital society
09.00 – 12.30 Ben Zevenbergen
12.30 – 13.30 Lunch
13.30 – 17.00 George Danezis
18.30 Dinner

Wednesday, July 15: Security Ecosystems
09.00 – 12.30 Vern Paxson
12.30 – 13.30 Lunch
13.30 – 17.00 Richard Kemmerer
18.30 Dinner
20.00 – 22.00 Mehis Hakkaja (Hacking Demo)

Thursday, July 16: Internet measurements and routing: big data and mobile networks
09.00 – 12.30 Tristan Henderson
12.30 – 13.30 Lunch
13.30 – 17.00 Walter Willinger
18.00 Transport to the gala dinner location
19.00 Gala dinner

Friday, July 17: Student presentations
09.00 – 12.30 Students presentations
12.30 – 13.30 Lunch
13.30 – 14.30 Students presentations
14.30 Closing remarks
15.00 Transport to Tallinn and departure

The registration to summer school has already ended.

Links:
http://studyitin.ee/c3s/program

IT College organizes hacking competition CyberOlympics 2015

Kyberolympia

We invite You to take part in CyberOlympics for students on the 14th of February 2015 starting at 9:00 at Estonian Information Technology College, Raja 4C.

Your skills and toughness will be tested on the Estonian Defence Cyber Training Platform. All students from bachelor’s, applied science and master’s level are welcomed to apply. FIRST PRIZE: BLACKHAT EUROPE in Amsterdam

Sounds interesting and You would like to know more, but You’re not quite ready to jump on board this time?
No worries! Come join us still on the event day, because at 12:00 we open a CyberCaffeteria where You can:

  • watch the whole competition live in action
  • take part in sumorobot workshop
  • compete in hands-on hacking competition
  • listen to short presentations on life in the cyberworld, possible field related studying and working possibilities.

Jaanus_Kaap_cyberolimpics_winner

Winners:
1. Jaanus Kääp, Estonian IT College (IT System Development)
2. Henri Ots, Estonian IT College (IT System Administration)
3. Andres Elliku, Tallinn University of Technology (Cyber Security), Estonian IT College alumni
4. Karl-Martin Karlson, Estonian IT College (IT System Administration)
5. Urmo Lihten, Tallinn University of Technology (Cyber Security), Estonian IT College alumni

Links:
http://www.kyberolympia.ee/en
http://www.goodnews.ee/kuberolumpia-2015-voitis-jaanus-kaap-kolledzist

Workshop about smart card programming in Tartu hackerspace

hakkerikoda_hackEST

In 20 January, 2015 16:00 at Tartu Hackerspace there will be a workshop (in Estonian) about JavaCard development, with focus on EstEID and open eID software.

Introduction of smart card programming, a practical example.

  • Programmable smart cards (JavaCard) – what, why, how and from where
  • JavaCard development lifecycle overview
  • Related technologies, standards (from ISO 7816-3 to PKCS#11)
  • Opensource development tools in the development process: javacard.pro
  • Hands on! Estonian ID-card “clone” in your computer!

EUR 30 participation fee (for the white plastic). The necessary skills are to orientate in the Linux command line, average level of Java programming, and the ability to distinguish hashing from encryption.

Registration: martin@martinpaljak.net

Links:
http://javacard.pro/#news
https://hackest.org/syndmused:2015-01-20-platskaart-vol2