Home      Log In      Contacts      FAQs      INSTICC Portal
 

Keynote Lectures

Available Soon
Bill Buchanan, Edinburgh Napier University, United Kingdom

Next Generation Information Warfare: Challenges and Research Directions
Roberto Di Pietro, Hamad Bin Khalifa University, Qatar

 

Keynote Lecture

Bill Buchanan
Edinburgh Napier University
United Kingdom
 

Brief Bio
Available Soon


Abstract
Available Soon



 

 

Next Generation Information Warfare: Challenges and Research Directions

Roberto Di Pietro
Hamad Bin Khalifa University
Qatar
 

Brief Bio
Prof. Dr. Roberto Di Pietro is currently full professor of cyber security at the HBKU College of Science and Engineering, Doha-Qatar, leading the effort to establish a world class research and innovation center in cyber security.
Prior to that, he served as Global Lead for Security Research at Bell Labs from 2013 to 2017. In that capacity, he coordinated three Security Research Depts.-based in Paris, Munich, and Espoo - counting 40+ researchers and research engineers, striving to lead security research in alignment with the strategic
business goals and to move research results into innovation. Besides his position at Nokia Bell Labs, Dr. Roberto Di Pietro was also Professor at University of Padova (with tenure). Prior to the above assignments, he was a faculty at University of Roma Tre (Roma, Italy), always dedicated to security research, research mentoring, and innovation.
From 2009-2010 he was a Seconded National Expert to EUROJUST (The Hague). In 2011-12 he was awarded a Chair of Excellence at University Carlos
III, Madrid, for his research results in security. In 2011 he co-founded a research-inspired start-up, providing innovative commercial solutions in the domain of Access Control (exited 2015). From 2013-2015 he was the scientific director of an EU project devoted to devise novel digital forensics tools to support the investigation of EU anti-cartel agencies.
He started his Computer Scientist career back to the 1995, serving for a few years as senior military technical officer, within the Italian MoD, managing complex ICT projects with focus on security, aiming at supporting investigations, forensics, and operations.
His research interests include Cloud Security, Distributed Systems Security, Blockchain Technology, Wireless Security, On-line Social Networks Security, OSINT, Intrusion Detection, Access Control, Forensics. On these topics, he has been publishing 180+ scientific papers, and has been contributing with patents and books.
He holds a M.Sc. in Computer Science from University of Pisa, a PhD in Computer Science, and a Post-degree Specialization Diploma in Operations Research and Strategic Decisions from University of Roma “La Sapienza”, as well as professional certifications such as CISA, CISSP, CISM, CRISC, CGEIT. As for Google Scholar, he has totaling 7100+ citation, with h-index=41, and i-index=110.


Abstract
Information has always played a decisive role in any type of conflict (be it war, revolution, or market competition). Knowing even with little advance the next course of action decided by an opponent, could provide a capital advantage.
Hence, it should come with little surprise that a crucial phase of any conflict is being fought from the information perspective. In particular, a specific segment of interest is constituted by the fact that information trusted by a target may be subject to manipulation, without the target's awareness. Thus, making decisions based on this counterfeit information is absolutely against the interests of the intended victim, since its decision process could be influenced, if not controlled, by its adversary. The manipulation of trusted information is part of Information warfare.

Over the years, we have witnessed an evolution in the way information is produced, transmitted, and consumed In particular, the advent of the Internet made communication distances almost irrelevant, completely revolutionizing the information communication ecosystem. The related introduction of web pages, fora, and Social Media has radically changed many aspects of users' lives from a social point of view, leading to a new logic of information that prefers speed and
immediacy to accuracy and reliability. The information during the sharing process undergoes adjustments, enrichment, teasing an active participation by a dynamic audience, resulting in the fact that original source, opinions, and even fake contributions can hardly be discerned.
People - and eventually the Society -, are also potential target of modern Information warfare.

In this talk, I will revise typical target of Information warfare interpreting them according to the modern information age, focusing on the fabric of society, the economy, and critical Infrastructures.
For each entity we build one or more plausible detailed real-world scenarios, showing the related possible threats from the information warfare point of view.
In addition, we will dive into the description of the still open problems and the countermeasures that can be implemented, possibly inspiring further research in the domain.
Finally, we will also touch one special subjects: Next Generation of Information Warfare Technologies. Here, we will offer a thorough and detailed description of the technologies involved in the above depicted scenarios.



footer