Recent technological advances in hardware and software have irrevocably affected the classical picture of computing systems. Today, these no longer consist only of servers, mainframes and workstations, but involve a wide range of pervasive and embedded devices, leading to the concept of ubiquitous computing systems. There is, however, an important gap in the adaptation of the existent cryptanalytic methodologies and tools to this relatively new ubiquitous computing framework. Efforts to correct this gap should target four main axes: the development of new cryptographic models, further cryptanalysis of the main building blocks, progress in hardware and software security engineering, and advances in the security assessment of realworld systems. Researchers have only recently started to devote their efforts to the study of the security of ubiquitous computing systems and the necessary lightweight cryptography. Despite the critical flaws found, the required highly-specialized skills and the isolation of the involved disciplines are a true barrier for advancing and identifying additional issues. It is therefore necessary to establish a network of researchers with complementary skills so that expertise in cryptography, information security, privacy, and embedded systems can be put to work together. The outcome of this networking efforts will directly help industry stakeholders and regulatory bodies to increase security and privacy in ubiquitous computing systems, in order to eventually make citizens better protected in their everyday life.