 Today when you buy a car it comes with a key that you don't have to press for the car to open. You simply approach your car and your car figures out that you are close or that the key is in your pocket and It will just open for you. It's a wonderful thing to have But it comes with certain risks. How does the car know that the key is close? We looked into this problem about seven years ago and we figured out we can defeat these kind of systems, went on and essentially Told ourselves how to steal cars by relaying signals between the key and and the car We tested all possible models on the market and this is still one of the preferred ways for thieves today to steal cars there are many newspaper reports on how to do this and and this shows one of the Images of this of this happening in action So I can't show the video for lack of time, but these attacks are actually happening someone excites Your key and steals your car in order to protect against these kind of attacks We need something called secure distance measurement meaning we need a secure way for systems to determine their mutual distance This is not only restricted to cars. We need this in many different settings access to to data payment systems And and different kinds of access to buildings. So physical access to property But also in the IOT space the ability to know where objects are is important for objects themselves Like if you have flying drones, they need to know where they are and where they are with respect to each other So you need a secure way to position objects and to measure their relative distances Surprisingly, we don't have that today So system like GPS or Wi-Fi or cellular networks are Spoofable meaning that an attacker by injecting a wireless signal can change the location of the of the device So he can change the measured location of the device So this location will be different from the true location of the device so in order to fix this we decided to Improve on these systems and to build an entirely new system at ETH Zurich to build an entirely new secure positioning system and What we did during this this journey, which lasts now over 10 years is we actually build an entirely new radio Which is low power probably secure of course very precise and fast and We are hoping that it's going to replace even connectivity technologies like Bluetooth by providing distance and Communication abilities. How does it work? My only technical slide It works by using ground-trip time of light with very narrow 1 to 2 nanosecond wide Ultra wide band pulses that are then used to achieve such precision that we want But on top of that we need to come up with very clever Cryptographic algorithms that would protect the security of this of this system and this shown on this on this graph At least in the background we went even further in order to push this technology to the community We are actually standardizing it now We started a new standard for secure distance measurement and we got all the key players involved including Apple Samsung Broadcom and so forth right and By pushing the entire community in this direction we can achieve our long-term goal Which is to deploy a terrestrial secure positioning system that would enable every object to obtain their their location securely and for everyone to verify locations of other objects in the environment However using radio to determine locations and to determine proximity Comes with some additional benefits so you can do things better than we used to we used to today So in the scenario of humanitarian airdrops you could say something like Whoever's in a in an affected area will get some help and that you can achieve if you could securely verify locations Radio is not only is not the only sensing modality that we can that we can use we can use for example sound as well in many different Context to establish proximity. This is an example where we use sound as a second factor for for authentication Meaning that we measure the sound that that there is in the environment on the phone and on the on the PC In order to determine that the phone is close to the PC and if the phone is close You will be logged in if the phone is not close Your login will fail and now you can generalize this to a number of IOT devices that are in your environment and allow seamless non-interactive online online authentication and Maybe to close all this all this to a to maybe more high-level Message internet is all about virtual resources the goal of my research is to De-virtualize the internet we want to get physical again to know where objects are where the information is coming from and This will secure existing systems and also enable the deployment of of new future systems. So thank you