Head of Mobile Services Group. Cyber-Physical Security Systems, Fraunhofer Institute for Secure Information Technology,
|
|
- Cecil Wilkerson
- 8 years ago
- Views:
Transcription
1 Alexandra Dmitrienko Curriculum Vitae (last updated in June, 2015) Gender Nationality Location Personal Data female Russian Darmstadt, Germany Phone +49 (6151) / /2015 Education Dr.-Ing. (Ph.D. in Security in Information Technology) with distinction, Department of Computer Sciences, Technische Universität Darmstadt, Germany, Dissertation: Security and Privacy Aspects of Mobile Platforms and Applications. Advisors: Prof. Dr. Michael Waidner (Technische Universität Darmstadt) and Prof. Dr. Srdjan Čapkun (ETH Zurich) M. Sc. of Engineering and Technology with distinction, GPA 5.0(5.0). Department of Computer Sciences, St. Petersburg State Polytechnic University, Russia B. Sc. of Engineering and Technology with distinction, GPA 4.85(5.0). Department of Computer Sciences, St. Petersburg State Polytechnic University, Russia 01/2015 now 01/ / / / / /2009 Working Experience Head of Mobile Services Group. Cyber-Physical Security Systems, Fraunhofer Institute for Secure Information Technology, Darmstadt, Germany Research Assistant. Trust and Compliance, Fraunhofer Institute for Secure Information Technology, Darmstadt, Germany Research Assistant. Cyber-Physical Mobile Systems Security, Fraunhofer Institute for Secure Information Technology, Darmstadt, Germany Research Assistant. System Security Lab, Ruhr-University Bochum, Germany +49 (6151) /7
2 Branch Manager. Department of Wireless Technologies, EFO Ltd, St. Petersburg, Russia Field Application Engineer. Technical Support Department, EFO Ltd, St. Petersburg, Russia Selected Projects SMAC: Smartphone-based access control for automotive applications (with Robert Bosch GmbH as an industrial partner) - project lead Fraunhofer SIT Project Key2Share ( - project lead Industrial project with Nokia Integrated Privacy-Preserving On-board Credentials (ipoc) BSI Project Trusted Embedded Secure Operating System (TeSOS) FP6 EU Project Open Trusted Computing ( Languages Russian English German native fluent intermediate (B2 level) Fields of Competence Trusted Computing technology (TPMs, MTMs, secure boot, remote attestation, etc.) Wireless sensor networks (secure routing, software attestation, ZigBee networks) Runtime attacks for x86 and ARM (new attack methods, exploit development) Operating system security (system-level services for L4-based microkernels, security extensions for mobile operating systems) Applied cryptography (protocol design) Hardware based system security (secure elements, processor-based extensions) Authentication security (password-based, token-based, 2-factor authentication) Access control systems (based on RFID cards and smartphones) Digital payments (mobile payments, Bitcoin) Mobile ticketing services Skills in Software Development System-level development (C, C++, Assembler for x86 and ARM) Embedded systems / microcontrollers / ARM (C, C++) Application development for Android (Java) SVN/GIT (development in teams) Lead of development projects +49 (6151) alexandra.dmitrienko@googl .com 2/7
3 Nov, 2014 Sep, 2014 Jul, 2014 Industrial Trainings Führungsplanspiel Avalon. Leadership training by Bosch, Pforzheim, Germany Intercultural awareness training by SAP, Walldorf, Germany Creativity & innovation. Training by DATEV, Nürnberg, Germany Jun, 2014 Grundlagen der Szenarioplanung. Training by Robert Bosch GmbH, Stuttgart, Germany May, 2014 Mar, 2014 Nov, 2013 Sep, 2007 Nov, 2007 Jan, 2006 Leistungsstarke Teams bilden & führen. Training on social and self-competence by Holtzbrinck Publishing Group, Stuttgart, Germany Business meets technology: Geschäftsverständnis für Software Experten. Business training by Siemens AG, Berlin, Germany Ideation and business planning. Training by EIT ICT Labs, Berlin, Germany IEEE Atmel system training, Dresden, Germany New hardware TCP/IP chip W3150+, Chip-based modules and development kits, WIZnet technical training, Munich, Germany Hardware TCP/IP chips for embedded systems, WIZnet Technical Training, Soul, South Korea Honors, Awards and Scholarships Fraunhofer TALENTA Speed Up funding for support of female researchers in career development. Host institution: Fraunhofer SIT, Darmstadt, Germany Software Campus Program for support of young IT experts. Academic partner: Fraunhofer SIT, Darmstadt, Germany. Industrial partner: Robert Bosch GmbH, Schwieberdingen, Germany Intel Doctoral Student Honor Award. Host institution: Fraunhofer SIT, Darmstadt, Germany 04/ /2011 Research/study award. ERASMUS Mundus Co-operation Window Programme for PhD candidates. Host institution: Ruhr-Universität Bochum, Germany Scholarship for exchange students from Kiel city (Stipendium der Stadt Kiel). Host institution: Kiel University of Applied Sciences, Germany List of Publications Books [B1] N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, and Ahmad-Reza Sadeghi. Mobile Platform Security, volume 4 of Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool, December PhD Thesis [S1] Alexandra Dmitrienko. Security and Privacy Aspects of Mobile Platforms and Applications. PhD thesis, TU Darmstadt, April tu-darmstadt.de/4611/. +49 (6151) alexandra.dmitrienko@googl .com 3/7
4 Conferences and Workshops with Proceedings [C1] Alexandra Dmitrienko, Stephan Heuser, Thien Duc Nguyen, Marcos da Silva Ramos, Andre Rein, and Ahmad-Reza Sadeghi. Market-driven code provisioning to mobile secure hardware. In Financial Cryptography and Data Security, January [C2] Christoph Busold, Alexandra Dmitrienko, and Christian Wachsmann. Key2Share for authentication services. In SmartCard Workshop, February [C3] Alexandra Dmitrienko, David Noack, Ahmad-Reza Sadeghi, and Moti Yung. On offline payments with Bitcoin. Invited paper. In Workshop on Bitcoin Research, March [C4] Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, and Ahmad-Reza Sadeghi. On the (in)security of mobile two-factor authentication. In Financial Cryptography and Data Security Conference, March [C5] Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, and Ahmad-Reza Sadeghi. Do I know you? - Efficient and privacy-preserving common friend-finder protocols and applications. In Annual Computer Security Applications Conference, December [C6] N. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider, and Stanislaus Stelle. CrowdShare: Secure mobile resource sharing. In International Conference on Applied Cryptography and Network Security, June [C7] Kevin Z. Snow, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Fabian Monrose, and Ahmad-Reza Sadeghi. Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization. In IEEE Symposium on Security and Privacy, May [C8] Lucas Davi, Alexandra Dmitrienko, Stefan Nürnberger, and Ahmad-Reza Sadeghi. Gadge me if you can - secure and efficient ad-hoc instruction-level randomization for x86 and ARM. In ACM Symposium on Information, Computer and Communications Security, May [C9] Christoph Busold, Alexandra Dmitrienko, Hervé Seudié, Ahmed Taha, Majid Sobhani, Christian Wachsmann, and Ahmad-Reza Sadeghi. Smart keys for cyber-cars: Secure smartphone-based NFC-enabled car immobilizer. In ACM Conference on Data and Application Security and Privacy, February [C10] Lucas Davi, Alexandra Dmitrienko, Stefan Nürnberger, and Ahmad-Reza Sadeghi. XIFER: A software diversity tool against code-reuse attacks. In ACM International Workshop on Wireless of the Students, by the Students, for the Students, August [C11] Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar, and Christian Wachsmann. SmartTokens: Delegable access control with NFC-enabled smartphones. In International Conference on Trust and Trustworthy Computing. Springer, June (6151) alexandra.dmitrienko@googl .com 4/7
5 [C12] Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, and Ahmad-Reza Sadeghi. MoCFI: A framework to mitigate control-flow attacks on smartphones. In Network and Distributed System Security Symposium, February [C13] Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, and Bhargava Shastry. Towards taming privilege-escalation attacks on Android. In Network and Distributed System Security Symposium, February [C14] Lucas Davi, Alexandra Dmitrienko, Christoph Kowalski, and Marcel Winandy. Trusted virtual domains on OKL4: Secure information sharing on smartphones. In ACM Workshop on Scalable Trusted Computing. ACM Press, October [C15] Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Ahmad-Reza Sadeghi, and Bhargava Shastry. Practical and lightweight domain isolation on Android. In ACM Workshop on Security and Privacy in Mobile Devices. ACM Press, October [C16] Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr, Ahmad-Reza Sadeghi, and Marcel Winandy. A security architecture for accessing health records on mobile phones. In International Conference on Health Informatics, October [C17] Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr, Ahmad-Reza Sadeghi, and Marcel Winandy. Securing the access to electronic health records on mobile phones. In Biomedical Engineering Systems and Technologies Revised Selected Papers. Springer-Verlag, [C18] Sven Bugiel, Alexandra Dmitrienko, Kari Kostiainen, Ahmad-Reza Sadeghi, and Marcel Winandy. TruWalletM: Secure web authentication on mobile platforms. In International Conference on Trusted Systems, December [C19] Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, and Marcel Winandy. Privilege escalation attacks on Android. In Information Security Conference, October [C20] Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, and Marcel Winandy. Return-oriented programming without returns. In ACM Conference on Computer and Communications Security, October [C21] Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ekberg, Ahmad-Reza Sadeghi, and N. Asokan. Key attestation from trusted execution environments. In International Conference on Trust and Trustworthy Computing, June [C22] Luigi Catuogno, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Steffen Schulz, Marcel Winandy, Jing Zhan, Konrad Eriksson, Dirk Kuhlmann, Gianluca Ramunno, and Matthias Schunter. Trusted virtual domains - design, implementation and lessons learned. In International Conference on Trusted Systems, December (6151) alexandra.dmitrienko@googl .com 5/7
6 Workshops without Proceedings [W1] Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, and Ahmad-Reza Sadeghi. CFI goes mobile: Control-flow integrity for smartphones. In International Workshop on Trustworthy Embedded Devices. September Extended Abstract. [W2] Alexandra Dmitrienko. Zigbee-to-TCP/IP gateway: New opportunities for ZigBeebased sensor networks. In International Workshop on Ambient Intelligence and Embedded Systems, September Technical Reports and White Papers [T1] Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, and Ahmad-Reza Sadeghi. On the (in)security of mobile two-factor authentication. Technical Report TUD-CS , CASED, [T2] Kevin Z. Snow, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Fabian Monrose, and Ahmad-Reza Sadeghi. Just-in-time code reuse: the more things change, the more they stay the same. In BlackHat USA, August [T3] N. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider, and Stanislaus Stelle. CrowdShare: secure mobile resource sharing. Technical Report TUD-CS , TU Darmstadt, April [T4] Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, and Ahmad-Reza Sadeghi. Over-the-air cross-platform infection for breaking mtan-based online banking authentication (white paper). In BlackHat Abu Dhabi, December [T5] Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, and Ahmad-Reza Sadeghi. XManDroid: A new Android evolution to mitigate privilege escalation attacks. Technical Report TR , Ruhr-University Bochum, System Security Lab, April [T6] Ahmad-Reza Sadeghi, Steffen Schulz, Alexandra Dmitrienko, Christian Stüble, Dennis Gessner, and Markus Ullmann. Trusted embedded system operating system (TeSOS) - study and design. Technical Report HGI-TR , Ruhr-University Bochum, System Security Lab, April Posters [P1] Alexandra Dmitrienko, David Noack, Ahmad-Reza Sadeghi, and Moti Yung. POSTER. Bitcoin2Go: secure offline and fast payments with Bitcoins. In Financial Cryptography and Data Security Conference, March [P2] Christoph Busold, Alexandra Dmitrienko, Hervé Seudié, Ahmed Taha, Majid Sobhani, Christian Wachsmann, and Ahmad-Reza Sadeghi. POSTER: Secure smartphonebased NFC-enabled car immobilizer. In ACM Conference on Data and Application Security and Privacy, February [P3] Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, and Bhargava Shastry. POSTER: The quest for security against privilege escalation attacks on Android. In ACM Conference on Computer and Communications Security. ACM, October (6151) alexandra.dmitrienko@googl .com 6/7
7 [P4] Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, and Ahmad-Reza Sadeghi. POSTER: Control-flow integrity for smartphones. In ACM Conference on Computer and Communications Security. ACM, October Industrial Journals [J1] Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, and Ahmad-Reza Sadeghi. Security analysis of mobile two-factor authentication schemes. Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18, [J2] Alexandra Dmitrienko. Wiznet W3150A network co-processor: New features for embedded devices. Components and Technologies, 12(7), [J3] Alexandra Dmitrienko and Alexey Naumov. Passive infrared detectors Sencera: New name at the market. Electronic Components, 12(11), [J4] Alexandra Dmitrienko. TDK components for electromagnetic compatibility. Electronic Components, 12(4), [J5] Alexandra Dmitrienko and Igor Krivchenko. Humidity sensors Sencera. Electronic Components, 12(8), [J6] Alexandra Dmitrienko and Igor Krivchenko. Sensors and detectors Sencera. Components and Technologies, 12(8), (6151) /7
Securing the E-Health Cloud
Securing the E-Health Cloud Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy 1st ACM International Health Informatics Symposium (IHI 2010) Arlington, Virginia, USA, 11-12 November 2010 Introduction Buzzwords
More informationSecure & Interconnected Mobility: Integrated Security for Mobile, Automotive, and Cloud Computing
Secure & Interconnected Mobility: Integrated Security for Mobile, Automotive, and Cloud Computing Prof. Dr. Ahmad-Reza Sadeghi TU Darmstadt Academic Principal Investigator and Director Dr. Matthias Schunter
More informationMarket-driven Code Provisioning to Mobile Secure Hardware
Market-driven Code Provisioning to Mobile Secure Hardware Alexandra Dmitrienko 2, Stephan Heuser 1, Thien Duc Nguyen 1, Marcos da Silva Ramos 2, Andre Rein 2, and Ahmad-Reza Sadeghi 1 1 CASED/Technische
More informationEIT ICT Labs MASTER SCHOOL. Specialisations
EIT ICT Labs MASTER SCHOOL Specialisations S&P EIT ICT Labs Master Programme Security & Privacy The Learning outcomes of this major are: Understanding the concepts and technologies for achieving confidentiality,
More informationEIT ICT Labs MASTER SCHOOL S&P Programme Specialisations
EIT ICT Labs MASTER SCHOOL S&P Programme Specialisations S&P EIT ICT Labs Master Programme Security & Privacy The programme in Security and Privacy focuses on the study of the design, development and evaluation
More informationSecurity Requirements of a Trusted Virtual Domain (TVD)
Trusted Virtual Domains Design, Implementation and Lessons Learned Luigi Catuogno 1, Alexandra Dmitrienko 1, Konrad Eriksson 2, Dirk Kuhlmann 3, Gianluca Ramunno 4, Ahmad-Reza Sadeghi 1, Steffen Schulz
More informationHardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation Lucas Davi, Patrick Koeberl, and Ahmad-Reza Sadeghi Intel Collaborative
More informationEmbedding Trust into Cars Secure Software Delivery and Installation
Embedding Trust into Cars Secure Software Delivery and Installation André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security, Bochum, Germany Third Workshop
More informationIT Security in Industrie 4.0
IT Security in Industrie 4.0 Prof. Dr. Michael Waidner TU Darmstadt & Fraunhofer Institute for Secure Information Technology? AUTONOMIK Innovation Days Berlin, June 17-18, 2014 1. What is Industrial IT
More informationOver-the-Air Cross-platform Infection for Breaking mtan-based Online Banking Authentication
Over-the-Air Cross-platform Infection for Breaking mtan-based Online Banking Authentication Alexandra Dmitrienko Fraunhofer Institute for Secure Information Technology/CASED, Germany Joint work with Lucas
More informationA Perspective on the Evolution of Mobile Platform Security Architectures
A Perspective on the Evolution of Mobile Platform Security Architectures Kari Kostiainen Nokia Research Center, Helsinki TIW, June 2011 Joint work with N. Asokan, Jan-Erik Ekberg and Elena Reshetova 1
More informationSecure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
More informationSmart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer Christoph Busold, Ahmad-Reza Sadeghi, Christian Wachsmann Intel CRI-SC, TU Darmstadt, Germany christoph.busold@cased.de, ahmad.sadeghi@cased.de,
More informationPatterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
More informationA SECURITY ARCHITECTURE FOR ACCESSING HEALTH RECORDS ON MOBILE PHONES
A SECURITY ARCHITECTURE FOR ACCESSING HEALTH RECORDS ON MOBILE PHONES Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr and Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany
More informationIT Security in Germany - A Review
Munich IT Security Research Group Reality Check: Practical Limitations of Technical Privacy Protection Hans-Joachim Hof MuSe - Munich IT Security Research Group Munich University of Applied Sciences hof@hm.edu
More informationCHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich sigl@tum.de Fraunhofer Research Institution
More informationSecurity concept for gateway integrity protection within German smart grids
ASE 2014, ECSaR-Workshop Security concept for gateway integrity protection within German smart grids Prof. Dr. Kai-Oliver Detken 1, Carl-Heinz Genzel 2, Olav Hoffmann 3, Prof. Dr. Richard Sethmann 4 1
More informationSecuring the Access to Electronic Health Records on Mobile Phones
Securing the Access to Electronic Health Records on Mobile Phones Alexandra Dmitrienko 1, Zecir Hadzic 1, Hans Löhr 1, Ahmad-Reza Sadeghi 2, and Marcel Winandy 1 1 Horst Görtz Institute for IT-Security
More informationInformation Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center
Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Department of Computer Science Introduction Our society is undergoing a
More informationVehicular Security Hardware The Security for Vehicular Security Mechanisms
escrypt GmbH Embedded Security Systemhaus für eingebettete Sicherheit Vehicular Security Hardware The Security for Vehicular Security Mechanisms Marko Wolf, escrypt GmbH Embedded Security Embedded Security
More information1. PUBLISHABLE SUMMARY
1. PUBLISHABLE SUMMARY ICT-eMuCo (www.emuco.eu) is a European project with a total budget of 4.6M which is supported by the European Union under the Seventh Framework Programme (FP7) for research and technological
More informationDAAD Deutscher Akademischer Austausch Dienst German Academic Exchange Service
DAAD Deutscher Akademischer Austausch Dienst German Academic Exchange Service Siemens / DAAD Post Graduate Program Research Grants for Foreign Graduates 2007 / 2008 Working together in offering the "Siemens
More informationThe Beast is Resting in Your Memory On Return-Oriented Programming Attacks and Mitigation Techniques To appear at USENIX Security & BlackHat USA, 2014
Intelligent Things, Vehicles and Factories: Intel Workshop on Cyberphysical and Mobile Security 2014, Darmstadt, June 11 The Beast is Resting in Your Memory On Return-Oriented Programming Attacks and Mitigation
More informationA Perspective on the Evolution of Mobile Platform Security Architectures
A Perspective on the Evolution of Mobile Platform Security Architectures N. Asokan Nokia Research Center Joint work with Kari Kostiainen, Jan-Erik Ekberg, Elena Reshetova (Intel) Padova, July 2012 1 Introduction
More informationNew Scholarships 2005 - New Scholarships 2005
New Scholarships 2005 - New Scholarships 2005 DAAD-SIEMENS SCHOLARSHIP PROGRAM ASIA 21st CENTURY GERMAN ACADEMIC EXCHANGE SERVICE Deutscher Akademischer Austausch-Dienst (DAAD) Bonn and SIEMENS AG Munich
More informationSecuring the E-Health Cloud
Securing the E-Health Cloud Hans Löhr Horst Görtz Institute for IT Security Ruhr-University Bochum Germany hans.loehr@trust.rub.de Ahmad-Reza Sadeghi Horst Görtz Institute for IT Security Ruhr-University
More informationCycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
More informationStitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection
USENIX Security Symposium 2014, San Diego, CA, USA Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection Lucas Davi Intel Collaborative Research Institute for
More informationICT Enabling the Future of Smart Energy. Competence Center IT4Energy Dr. Thomas Luckenbach Dr. Armin Wolf
ICT Enabling the Future of Smart Energy Competence Center IT4Energy Dr. Thomas Luckenbach Dr. Armin Wolf 1 egovernment ehealth Public Security Smart Mobility Smart Energy Activity Domains of FOKUS Public
More informationEmbedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
More informationSmart Data Innovation Lab (SDIL)
Smart Data Innovation Lab (SDIL) Accelerating Data driven Innovation NESSI Summit May 27, 2014 Prof. Dr.-Ing. Michael Beigl Department of Informatics KIT University of the State of Baden-Wuerttemberg and
More informationSecure Storage in the Cloud
Secure Storage in the Cloud 14. ISSS Berner Tagung für Informationssicherheit "Cloud Computing: Chancen und Risiken" 24. November 2011, Bern Prof. Dr. Michael Waidner Fraunhofer SIT, Direktor Technische
More informationSecurity and privacy rights management for mobile and ubiquitous computing
Security and privacy rights management for mobile and ubiquitous computing Michael Fahrmair, Wassiou Sitou, and Bernd Spanfelner Technische Universität München, Department of Informatics, Boltzmannstr.3,
More information2013-04-16 to 2013-04-19. Hanno Langweg, Einar Snekkenes (HiG)
COINS study tour 2013-04-16 to 2013-04-19. Hanno Langweg, Einar Snekkenes (HiG) Seven institutions were selected to collect their experience with Ph.D. training in security and computer science. The selection
More informationA Note on the Security in the Card Management System of the German E-Health Card
A Note on the Security in the Card Management System of the German E-Health Card Marcel Winandy (Ruhr-University Bochum) 3rd International ICST Conference on Electronic Healthcare for the 21st Century
More informationProperty Based TPM Virtualization
Property Based Virtualization Marcel Winandy Joint work with: Ahmad Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security Chair for System Security Ruhr University Bochum, Germany Sirrix
More informationSECURITY & ACCESS CONTROL SYSTEM BASED PROJECTS
************************************************************************ INNOVATIVE & APPLICATION ORIENTED PROJECTS ON SVSEMBEDDED SYSTEMS (8051/AVR/ARM7/MSP430/RENESAS/ARM cortex M3) ************************************************************************
More informationEVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications
EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé
More information1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
More informationWireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009
Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer October 2009 Jennic highlights Jennic is a fabless semiconductor company providing Wireless Microcontrollers to high-growth
More informationHardware Security for Device Authentication in the Smart Grid
Hardware Security for Device Authentication in the Smart Grid Andrew J. Paverd and Andrew P. Martin Department of Computer Science, University of Oxford, UK {andrew.paverd,andrew.martin}@cs.ox.ac.uk Abstract.
More informationSecure Data Management in Trusted Computing
1 Secure Data Management in Trusted Computing Ulrich Kühn Deutsche Telekom Laboratories, TU Berlin Klaus Kursawe (KU Leuven) Stefan Lucks (U Mannheim) Ahmad-Reza Sadeghi (RU Bochum) Christian Stüble (RU
More informationVictoria Kostina Curriculum Vitae - September 6, 2015 Page 1 of 5. Victoria Kostina
Victoria Kostina Curriculum Vitae - September 6, 2015 Page 1 of 5 Victoria Kostina Department of Electrical Engineering www.caltech.edu/~vkostina California Institute of Technology, CA 91125 vkostina@caltech.edu
More informationProf. Dr. D. W. Cunningham, Berliner Strasse 35A, 03046 Cottbus, Germany
Curriculum Vitae Prof. Dr. Douglas William Cunningham Work Address: Brandenburg Technical University Cottbus Graphical Systems Department Konrad-Wachsmann-Allee 1 D-03046 Cottbus, Tel: (+49) 355-693816
More informationDroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android
Technical Report Nr. TUD-CS-2016-0025 January 28, 2016 DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android Authors Stephan Heuser, Marco Negro, Praveen Kumar Pendyala,
More informationThe relevance of cyber-security to functional safety of connected and automated vehicles
The relevance of cyber-security to functional safety of connected and automated vehicles André Weimerskirch University of Michigan Transportation Research Institute (UMTRI) February 12, 2014 Introduction
More informationA. Background. In this Communication we can read:
On RFID The Next Step to THE INTERNET OF THINGS Information of the Presidency 2832nd Council meeting, Competitiveness (Internal Market, Industry and Research), Brussels, 22-23 November 2007 A. Background
More informationSmartTokens: Delegable Access Control with NFC-enabled Smartphones
SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version) Alexandra Dmitrienko 1, Ahmad-Reza Sadeghi 2, Sandeep Tamrakar 3, and Christian Wachsmann 4 1 Fraunhofer SIT Darmstadt,
More informationDr. STYLIANI KLEANTHOUS LOIZOU CURRICULUM VITAE
Dr. STYLIANI KLEANTHOUS LOIZOU CURRICULUM VITAE Personal Details Name: Date of Birth: 21/06/1981 Nationality: Cypriot Marital Status: Married E-Mail: styliani.kleanthous@ouc.ac.cy or styliani.kleanthous@gmail.com
More informationSecurity and Privacy in Big Data, Blessing or Curse?
Security and Privacy in Big Data, Blessing or Curse? 2 nd National Cryptography Days 9-11 April 2015 Dr. Zeki Erkin Cyber Security Section Department of Intelligent Systems Delft University of Technology
More informationAPPLIED AND INTEGRATED SECURITY
APPLIED AND INTEGRATED SECURITY Directors: Claudia Eckert (Managing) Georg Sigl SECURITY RESEARCH IN MUNICH Fraunhofer Institution for Applied and Integrated Security Claudia Eckert Georg Sigl TU München
More informationVehicular On-board Security: EVITA Project
C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security
More informationUni-directional Trusted Path: Transaction Confirmation on Just One Device
Uni-directional Trusted Path: Transaction Confirmation on Just One Device Atanas Filyanov 1, Jonathan M. McCune 2, Ahmad-Reza Sadeghi 3, Marcel Winandy 1 1 Ruhr-University Bochum, Germany 2 Carnegie Mellon
More informationStandard for an Architectural Framework for the Internet of Things IEEE P2413. IEEE GlobeCom Austin, Texas December, 2014
Standard for an Architectural Framework for the Internet of Things IEEE P2413 Chuck Adams Past-President IEEE Standards Association Distinguished Standards Strategist Huawei Technologies IEEE GlobeCom
More informationNetwork Security in Building Networks
Network Security in Building Networks Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is) Westphalian University of Applied Sciences Gelsenkirchen, Germany www.if-is.net Content
More informationImplement Data Security in Today's Operating System Group Members
Implement Data Security in Today's Operating System Group Members 1 Muhammad Aleem, 2 Muhammad Tahir, 3 Nasir Jamal 1 MSCS-20, 2 MSCS-06, 3 MSCS-01 Department of Information Technology, University of Sargodha
More informationProf. Dr.-Ing. Andreas Schrader
Prof. Dr.-Ing. Andreas Schrader Ambient Computing Group Institute of Telematics University of Lübeck www.itm.uni-luebeck.de schrader@itm.uni-luebeck.de Working Group Ambient Computing Institute for Telematics,
More informationThomas S. Heydt-Benjamin
Thomas S. Heydt-Benjamin Contact Information 530 E86th St #3C NYC, NY 10028, USA +1 (917) 744-7934 tomb@acm.org http://cryptocracy.net Research Interests Privacy, security, and identity management. Anonymity
More informationsmart grids forum Intelligent power grids: How to build in Safety and Security Conference March 21 22, 2013 in Munich, Germany
smart grids forum Intelligent power grids: How to build in Safety and Security Conference March 21 22, 2013 in Munich, Germany TÜV SÜD AG Embedded Systems TÜV SÜD Akademie GmbH About the Conference To
More informationUR:BAN Networked Transportation System. Good Practice Case of Industry-led R&D Project with Good Prospects of Post-project Exploitation
UR:BAN Networked Transportation System Good Practice Case of Industry-led R&D Project with Good Prospects of Post-project Exploitation Programme Mobility and Transportation Technologies "Mobility and Transport
More informationHome Automation System with Universally Used Mobile Application Platform
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 2, Ver. III (Mar - Apr. 2014), PP 01-06 Home Automation System with Universally
More informationDevelopment of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
More informationA Road Map on Security Deliverables for Mobile Cloud Application
A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,
More informationIT Security Quo Vadis?
Munich IT Security Research Group IT Security Quo Vadis? Hans-Joachim Hof MuSe - Munich IT Security Research Group Munich University of Applied Sciences hof@hm.edu http://muse.bayern Prof. Dr.-Ing. Hans-Joachim
More informationTechnical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate
Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field
More informationFirewall-based Solution for Preventing Privilege Escalation Attacks in Android
International Journal of Computer Networks and Communications Security VOL. 2, NO. 9, SEPTEMBER 2014, 318 327 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S Firewall-based Solution for Preventing
More informationHow To Understand And Understand Rwth Aachen University
A short introduction to RWTH Location of RWTH Aachen University RWTH Mainbuilding Development of RWTH Aachen University until 2004 Students Foreign Students Polytechnical School Faculty of Architecture
More informationHow To Become A Computer Scientist
EIT Education & the EIT ICTLabs Master School Prof. Fabrizio Granelli Local Master School Coordinator, UNITN Education, EIT & UNITN Maurizio Marchese Fabrizio Granelli Director of Education Local MS coordinator
More informationWhat is Industrie 4.0
What is Industrie 4.0 Prof. Dr.-Ing. Reiner Anderl Computer Integrated Design (Datenverarbeitung in der Konstruktion, DiK) Fachbereich Maschinenbau Technische Universität Darmstadt Otto-Berndt-Straße 2
More informationBasheer Al-Duwairi Jordan University of Science & Technology
Basheer Al-Duwairi Jordan University of Science & Technology Assistant Professor Department of Network Engineering & Security @ JUST Education: PhD, Iowa State University, 2005 Ms, Iowa State University,
More informationSecure Machine to Machine Communication on the example of Smart Grids
Corporate Technology Secure Machine to Machine Communication on the example of Smart Grids 10.ITG Fachtagung Zukunft der Netze 2011, Steffen Fries Siemens AG, CT T, GTF IT Security : +49 89 636 53403 :
More informationEIT ICT Labs The ICT Innovation Catalyst for Europe
Start-Chart EIT ICT Labs The ICT Innovation Catalyst for Europe Prof. Dr. Willem Jonker CEO willem.jonker@ictlabs.eu EIT ICT Labs mission is to turn Europe into a global leader in ICT Innovation Breed
More informationHardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
More informationReza Shokri Curriculum Vitae [1 of 5] Reza Shokri
Reza Shokri Curriculum Vitae [1 of 5] Reza Shokri Department of Computer Science, The University of Texas at Austin Visiting Cornell NYC Tech lastname@cs.utexas.edu http://www.shokri.org RESEARCH INTERESTS
More informationTNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
More informationBest Paper Award, Hawaii International Conference on System Sciences, HICSS-36 (2003)
Curriculum Vitae EDUCATION Monica N. Nicolescu Assistant Professor Department of Computer Science University of Nevada, Reno monica@cs.unr.edu http://www.cs.unr.edu/ monica June 1998 - May 2003: University
More informationImplementation and Direct Accessing of Android Authority Application in Smart Phones
Implementation and Direct Accessing of Android Authority Application in Smart Phones Amit H. Choksi 1, Jaimin J. Sarvan 2 and Ronak R. Vashi 3 1 ET Dept, BVM Engg. College, V.V.Nagar-388120, Gujarat, India
More informationSecurity Evaluation of Mobile Device Integration with V2X Communication
Security Evaluation of Mobile Device Integration with V2X Communication Tim Leinmüller 1, Boris Atanassow 1, Stefan Diewald 2, Lutz-Peter Breyer 1 and Matthias Kranz 3 1 DENSO AUTOMOTIVE Deutschland GmbH,
More informationApplied and Integrated Security. C. Eckert
Applied and Integrated Security 1 Joseph von Fraunhofer (1787-1826) Researcher discovery of Fraunhofer Lines in the sun spectrum Inventor new methods of lens processing Entrepreneur head of royal glass
More informationACCESS CONTROL MANY FUNCTIONS. ONE SYSTEM. ONE CARD.
MANY FUNCTIONS. ONE SYSTEM. ONE CARD. ACCESS CONTROL One card, centrally monitored and controlled provides access to doors, gates, turnstiles and lockers ACCESS CONTROL The Intelligent System from InterCard
More informationWireless 100Gb/s and Beyond: A Special Focus Program of the German Scientific Foundation
Wireless 100Gb/s and Beyond: A Special Focus Program of the German Scientific Foundation Rolf Kraemer Technical University Cottbus IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany IHP Im Technologiepark
More informationNational Research University - Higher School of Economics PhD programs. Elena Kobzar, Director for Graduate studies ekobzar@hse.ru
National Research University - Higher School of Economics PhD programs Elena Kobzar, Director for Graduate studies ekobzar@hse.ru 1 HSE: Key Facts November 27, 1992: The date HSE was created Since August
More informationSecurity in Vehicle Networks
Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development
More informationInformation Security and Cryptography
Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland Lecturers: David Basin, ETH Zurich Ueli Maurer, ETH Zurich ATG www.infsec.ch Program Starting 09:00
More informationRussian German Cooperation in EU Higher Education Programmes
Russian German Cooperation in EU Higher Education Programmes Prof. Olga Oleynikova Director of the National Tempus Office, Russia Nina Salden, Head of Unit National Tempus Contact Point, DAAD, Germany
More informationHow To Secure Cloud Infrastructure
Trustworthy Clouds Underpinning the Future Internet Cloudscape III, Brussels, March 2011 Elmar Husmann, Corinna Schulze IBM 1 of 12 80% Of enterprises consider security the #1 inhibitor to cloud adoptions
More informationSecurity concept for gateway integrity protection within German smart grids
Security concept for gateway integrity protection within German smart grids Prof. Dr. Kai-Oliver Detken DECOIT GmbH, Fahrenheitstr. 9, D-28359 Bremen Email: detken@decoit.de Carl-Heinz Genzel, Olav Hoffmann,
More informationInformation Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security
Information Security Group (ISG) From Smart Cards to NFC Smart Phone Security Information Security Group Activities Prof. Keith and Mayes Research From the Information Security Group ACE-CSR at Royal Holloway
More informationErasmus Mundus Joint Doctorate Application Form
Erasmus Mundus Joint Doctorate Application Form Application Deadline: All application material must be received by February 19, 2012. Early applications are encouraged. How to Apply to (EMJDs) Candidate
More informationRADSAGA Resubmission. First meeting. Steffen MUELLER Alexander KOELPIN. Institute for Electronics Engineering (LTE) University of Erlangen-Nuremberg
RADSAGA Resubmission First meeting Steffen MUELLER Alexander KOELPIN Institute for Electronics Engineering (LTE) University of Erlangen-Nuremberg Outline 1. Introducing LTE 2. RadHard activities 3. LTE
More informationIndustrie 4.0; Sicherheitsmechanismen für die Produktion. 14. Deutscher IT-Sicherheitskongress; Andreas Philipp
Industrie 4.0; Sicherheitsmechanismen für die Produktion 14. Deutscher IT-Sicherheitskongress; Andreas Philipp Utimaco HSM Aachen, Germany 2015 Page 1 At a glance 1... 2... 3... Headquarters in Aachen
More informationIndustrie 4.0. Towards a Holistic Approach for Cyber Safety and Security
Industrie 4.0 Towards a Holistic Approach for Cyber Safety and Security Prof. Dr.-Ing. Reiner Anderl Marco Grimm, M.Sc. Datenverarbeitung in der Konstruktion (DiK) Fachbereich Maschinenbau Technische Universität
More informationSecurity and the Internet of Things (IoT)
Security and the Internet of Things (IoT) Analysis and Recommendations for IoT Manufacturers and IT/Business Executives Wei (Weslay) Xu Tuck School of Business at Dartmouth 03/20/2015 High Level Description
More informationReturn-oriented programming without returns
Faculty of Computer Science Institute for System Architecture, Operating Systems Group Return-oriented programming without urns S. Checkoway, L. Davi, A. Dmitrienko, A. Sadeghi, H. Shacham, M. Winandy
More informationPosition Paper: Can the Web Really Use Secure Hardware?
Position Paper: Can the Web Really Use Secure Hardware? Justin King-Lacroix 1 Department of Computer Science, University of Oxford justin.king-lacroix@cs.ox.ac.uk Abstract. The Web has become the platform
More informationSecure Services and Quality Testing SST. Security Engineering Privacy by Design Trusted Solutions. Mario Hoffmann. for Service Ecosystems
Secure Services and Quality Testing SST Security Engineering Privacy by Design Trusted Solutions for Service Ecosystems Mario Hoffmann Head of Department Fraunhofer AISEC in a nutshell Fraunhofer Profile
More information