September 18-20, 2024 | DoubleTree by Hilton, San Jose, California

Join Our Email List and Get Access to the Complete ICMC15 Conference Audio Archive

The ICMC 2015 Audio Archive contains complete audio files and slides from over 45 conference sessions.

Thanks for joining our email list! Click any hyperlinked presentation title to view slides. Adobe acrobat required.

Wednesday, November 4

Pre-Conference Workshops


How Not To Do a FIPS 140 Project (W01a) Steve Weingart, Manager of Public Sector Certifications, Aruba Networks; Chris Keenan, Evaluator, Gossamer Security Solutions

Part I
Part II
Part III

Breaking into Embedded Devices: Side Channel Analysis (W01b) Jasper Van Woudenberg, CTO North America, Riscure

Part I
Part II
Part III
Part IV

GlobalPlatform—Addressing Unique Security Challenges through Standardization (W01c) Presentation 1, Presentation 2, Presentation 3Presentation 4  Kevin Gillick, Executive Director, GlobalPlatform; Hank Chavers, Technical Program Manager, GlobalPlatform; Philip Hoyer, Director of Strategic Innovation, HID Global, and Identity Task Force Chair, GlobalPlatform; Alexander Summerer, Technology Consultant, Giesecke & Devrient, and Secure Element Access Control Working Group Chair, GlobalPlatform

Part I
Part II
Part III

Validating a Virtual Module Without Guidance From CMVP (W02a) Steve Ratcliffe, TME, Cisco Systems

Part I
Part II

Breaking into Embedded Devices: Fault Injection (W02b) Jasper Van Woudenberg, CTO North America, Riscure

Part I
Part II

 

Thursday, November 5

Plenary Keynote Sessions


Welcome and Introductions, Yi Mao, Principal Consultant, atsec information security


Keynote Presentation on Current Issues in Cryptography (P11a) Phil Zimmermann, Creator of PGP, Co-founder, Silent Circle


Keynote Presentation: Cryptography, Moore’s Law, and Hardware Foundations for Security (P11b) Paul Kocher, President, Chief Scientist​, Cryptography Research


Keynote Presentation: Department of Defense Cybersecurity (P11c) Marianne Bailey, Principal Director, Deputy CIO for Cybersecurity, Department of Defense

Certification Programs Track


Accreditation, Validation & Recognition based on ISO Standards (C12) Randall Easter, NIST


The Next Steps Toward A Scalable International Cryptographic Evaluation Process (C13) Clint Winebrenner, Technical Lead, Product Certifications Security & Trust Organization, Cisco


Legacy Random Number Generators (RNGs) (C14) Zhiqiang (Richard) Wang, CSTL Lab Technical Director, Leidos; William Tung, Senior Security Evaluation Analyst, Gemalto


Proposed Changes for a Long-Overdue Revision of FIPS 140-2 (C15) Francisco Corella, Founder & CTO, Pomcor; Karen Lewison, CEO, Pomcor


Adding to the Approved List of Algorithms (C16) Kelvin Desplanque, TME—Government Certification CoGS—Canada, Cisco Systems


CMVP Programmatic Status (CMVP) (C17) Carolyn French, ITS Engineer, CSE; Michael Cooper, IT Specialist, NIST; Apostol Vassilev, Cybersecurity Expert, Computer Security Division, NIST

General Technology Track


Effective Cryptography—Or: What’s Wrong With All These Crypto APIs? (G12) Thorsten Groetker, CTO, Utimaco


The Entropy Bogeyman (G13) Edward Morris, Co-Founder, Gossamer Security Solutions; Khai Van, Security Tester, Gossamer Security Solutions


The What, Why, and How of Tokenization (G14) Peter Helderman, Principal Consultant, UL


SP 800-131A Transitions and Related Implementation Guidance (G15) Allen Roginsky, Mathematician, NIST; Apostol Vassilev, Cybersecurity Expert, Computer Security Division, NIST


SP800-90B: Analysis of Linux /dev/random (G16) Stephan Mueller, Principal Consultant and Evaluator, atsec information security


Enough Entropy? Justify It! (G17) Yi Mao, Principal Consultant, atsec information security

Advanced Technology Track


Quantum Computing and Its Impact (A12) David Cornwell, Lead Engineer, Booz Allen Hamilton


Extending Derived Credential Use to Support S/MIME Even with Medium-Hardware Protected Credentials (A13) Issam Andoni, Chief Technology Architect/Owner, Zeva Inc.


A Look into Hard Drive Firmware Hacking (A14) Khai Van, Security Tester, Gossamer Security Solutions


Improved Approaches to Online Health Testing in SP800-90 RNGs (A15) David Johnston, Hardware Security Architect, Intel


Test Vector Leakage Assessment (TVLA) for Side Channel Analysis in Conformance Testing Scenario (A16a) Gilbert Goodwill, Senior Principal Engineer, DPA Software and Training Lead, Cryptography Research
Test Vector Leakage Assessment (TVLA) for Side Channel Analysis in Conformance Testing Scenario (A16b) Steve Weymann, Security Engineer, InfoGard Laboratories


Low-Cost Side Channel Attacks on Smartphones and Embedded Devices using Software Defined Radios (A17) Gabriel Goller, Giesecke & Devrient

CMUF Face-to-Face Meeting

Cryptographic Module User Forum Update, Matt Keller, VP, Corsec Security

Friday, November 6

Certification Programs Track


CSfC Program and its FIPS 140-2 Requirements (C21) Matt Keller, VP, Corsec Security


What is Suite-B Cryptography and How Does it Relate to Government Certifications? (C22) Anthony Busciglio, Co-Founder, Laboratory Manager, Acumen Security


Introduction on the Commercial Cryptography Scheme in China (C23) Di Li, atsec information security


FIPS 140 Quo Vadis? (C24) Apostol Vassilev, Cybersecurity Expert, Computer Security Division, NIST


Cryptographic Validation Requirements and the Common Criteria (ISO/IEC 15408) (C25) Kirill Sinitski, Common Criteria Evaluator & Quality Coordinator, CygnaCom


NIST & NIAP Working Together (C26) Janine Pedersen, Director, National Information Assurance Partnership (NIAP); Michael Cooper, IT Specialist, NIST

General Technology Track


Repetition Count Test (G21) Jason Tseng, Project Control Analyst, Leidos; Michael Powers, Security Assurance Engineer, Leidos


Roadmap to Testing of New Algorithms (CAVP) (G22) Sharon Keller, Computer Scientist, NIST; Apostol Vassilev, Cybersecurity Expert, Computer Security Division, NIST


Entropy Estimation by Example (G23) David Cornwell, Lead Engineer, Booz Allen Hamilton


Importance of Open Source to the Cryptographic Module Community (G24) Chris Brych, Senior Principal Security Analyst, Oracle


Challenges in Generating Keys for Asymmetric-Key Algorithms (G25) Allen Roginsky, Mathematician, NIST


What is My Operational Environment? (G26) Swapneela Unkule, atsec information security

End User Experience Track


Commonly Accepted Keys and CSPs Initiative (U21) Ryan Thomas, FIPS 140-2 Program Manager, CGI Global Labs


FIPS is FIPS, Real World is Real World and Never the Twain Shall Meet? (U22) Ashit Vora, Co-Founder and Laboratory Director, Acumen Security


Collateral Damage—Vendor and Customer Impact of Frequent Policy Changes (U23) Joshua Brickman, Director, Security Evaluations, Oracle; Glenn Brunette, Senior Director and Chief Technologist, Cybersecurity, Oracle


Learning From Each Other and Our Mistakes (U24) Terrie Diaz, Product Certification Engineer, Cisco Systems; Edward Morris, Co-Founder, Gossamer Security Solutions


FIPS140-Testing: You Want My What? (U25) Valerie Fenwick, Software Engineering Manager, Oracle; Hai-May Chao,, Principal Software Engineer, Solaris Security Technologies Group, Oracle


Validating Encryption: The Bottleneck in Security Innovation (U26) Ray Potter, CEO, SafeLogic; Walter Paley, Director of Marketing, SafeLogic

Summary Panel Discussion

Impact of Draft CMVP Policy Changes on Industry (P27) Moderator: Marcus Streets, Product Director High Security Products, Good Technology Panelists: Douglas Gebert, Enterprise Architect, HP Enterprise; Michael Cooper, IT Specialist, NIST; Tammy Green, Senior Principal Security Architect, Blue Coat Systems; Laurie Mack, Director Security & Certifications, Gemalto