Head of Mobile Services Group. Cyber-Physical Security Systems, Fraunhofer Institute for Secure Information Technology,

Size: px
Start display at page:

Download "Head of Mobile Services Group. Cyber-Physical Security Systems, Fraunhofer Institute for Secure Information Technology,"

Transcription

1 Alexandra Dmitrienko Curriculum Vitae (last updated in June, 2015) Gender Nationality Location Personal Data female Russian Darmstadt, Germany Phone +49 (6151) / /2015 Education Dr.-Ing. (Ph.D. in Security in Information Technology) with distinction, Department of Computer Sciences, Technische Universität Darmstadt, Germany, Dissertation: Security and Privacy Aspects of Mobile Platforms and Applications. Advisors: Prof. Dr. Michael Waidner (Technische Universität Darmstadt) and Prof. Dr. Srdjan Čapkun (ETH Zurich) M. Sc. of Engineering and Technology with distinction, GPA 5.0(5.0). Department of Computer Sciences, St. Petersburg State Polytechnic University, Russia B. Sc. of Engineering and Technology with distinction, GPA 4.85(5.0). Department of Computer Sciences, St. Petersburg State Polytechnic University, Russia 01/2015 now 01/ / / / / /2009 Working Experience Head of Mobile Services Group. Cyber-Physical Security Systems, Fraunhofer Institute for Secure Information Technology, Darmstadt, Germany Research Assistant. Trust and Compliance, Fraunhofer Institute for Secure Information Technology, Darmstadt, Germany Research Assistant. Cyber-Physical Mobile Systems Security, Fraunhofer Institute for Secure Information Technology, Darmstadt, Germany Research Assistant. System Security Lab, Ruhr-University Bochum, Germany +49 (6151) /7

2 Branch Manager. Department of Wireless Technologies, EFO Ltd, St. Petersburg, Russia Field Application Engineer. Technical Support Department, EFO Ltd, St. Petersburg, Russia Selected Projects SMAC: Smartphone-based access control for automotive applications (with Robert Bosch GmbH as an industrial partner) - project lead Fraunhofer SIT Project Key2Share (www.key2share.de) - project lead Industrial project with Nokia Integrated Privacy-Preserving On-board Credentials (ipoc) BSI Project Trusted Embedded Secure Operating System (TeSOS) FP6 EU Project Open Trusted Computing (www.opentc.net) Languages Russian English German native fluent intermediate (B2 level) Fields of Competence Trusted Computing technology (TPMs, MTMs, secure boot, remote attestation, etc.) Wireless sensor networks (secure routing, software attestation, ZigBee networks) Runtime attacks for x86 and ARM (new attack methods, exploit development) Operating system security (system-level services for L4-based microkernels, security extensions for mobile operating systems) Applied cryptography (protocol design) Hardware based system security (secure elements, processor-based extensions) Authentication security (password-based, token-based, 2-factor authentication) Access control systems (based on RFID cards and smartphones) Digital payments (mobile payments, Bitcoin) Mobile ticketing services Skills in Software Development System-level development (C, C++, Assembler for x86 and ARM) Embedded systems / microcontrollers / ARM (C, C++) Application development for Android (Java) SVN/GIT (development in teams) Lead of development projects +49 (6151) /7

3 Nov, 2014 Sep, 2014 Jul, 2014 Industrial Trainings Führungsplanspiel Avalon. Leadership training by Bosch, Pforzheim, Germany Intercultural awareness training by SAP, Walldorf, Germany Creativity & innovation. Training by DATEV, Nürnberg, Germany Jun, 2014 Grundlagen der Szenarioplanung. Training by Robert Bosch GmbH, Stuttgart, Germany May, 2014 Mar, 2014 Nov, 2013 Sep, 2007 Nov, 2007 Jan, 2006 Leistungsstarke Teams bilden & führen. Training on social and self-competence by Holtzbrinck Publishing Group, Stuttgart, Germany Business meets technology: Geschäftsverständnis für Software Experten. Business training by Siemens AG, Berlin, Germany Ideation and business planning. Training by EIT ICT Labs, Berlin, Germany IEEE Atmel system training, Dresden, Germany New hardware TCP/IP chip W3150+, Chip-based modules and development kits, WIZnet technical training, Munich, Germany Hardware TCP/IP chips for embedded systems, WIZnet Technical Training, Soul, South Korea Honors, Awards and Scholarships Fraunhofer TALENTA Speed Up funding for support of female researchers in career development. Host institution: Fraunhofer SIT, Darmstadt, Germany Software Campus Program for support of young IT experts. Academic partner: Fraunhofer SIT, Darmstadt, Germany. Industrial partner: Robert Bosch GmbH, Schwieberdingen, Germany Intel Doctoral Student Honor Award. Host institution: Fraunhofer SIT, Darmstadt, Germany 04/ /2011 Research/study award. ERASMUS Mundus Co-operation Window Programme for PhD candidates. Host institution: Ruhr-Universität Bochum, Germany Scholarship for exchange students from Kiel city (Stipendium der Stadt Kiel). Host institution: Kiel University of Applied Sciences, Germany List of Publications Books [B1] N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, and Ahmad-Reza Sadeghi. Mobile Platform Security, volume 4 of Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool, December PhD Thesis [S1] Alexandra Dmitrienko. Security and Privacy Aspects of Mobile Platforms and Applications. PhD thesis, TU Darmstadt, April tu-darmstadt.de/4611/. +49 (6151) /7

4 Conferences and Workshops with Proceedings [C1] Alexandra Dmitrienko, Stephan Heuser, Thien Duc Nguyen, Marcos da Silva Ramos, Andre Rein, and Ahmad-Reza Sadeghi. Market-driven code provisioning to mobile secure hardware. In Financial Cryptography and Data Security, January [C2] Christoph Busold, Alexandra Dmitrienko, and Christian Wachsmann. Key2Share for authentication services. In SmartCard Workshop, February [C3] Alexandra Dmitrienko, David Noack, Ahmad-Reza Sadeghi, and Moti Yung. On offline payments with Bitcoin. Invited paper. In Workshop on Bitcoin Research, March [C4] Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, and Ahmad-Reza Sadeghi. On the (in)security of mobile two-factor authentication. In Financial Cryptography and Data Security Conference, March [C5] Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, and Ahmad-Reza Sadeghi. Do I know you? - Efficient and privacy-preserving common friend-finder protocols and applications. In Annual Computer Security Applications Conference, December [C6] N. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider, and Stanislaus Stelle. CrowdShare: Secure mobile resource sharing. In International Conference on Applied Cryptography and Network Security, June [C7] Kevin Z. Snow, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Fabian Monrose, and Ahmad-Reza Sadeghi. Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization. In IEEE Symposium on Security and Privacy, May [C8] Lucas Davi, Alexandra Dmitrienko, Stefan Nürnberger, and Ahmad-Reza Sadeghi. Gadge me if you can - secure and efficient ad-hoc instruction-level randomization for x86 and ARM. In ACM Symposium on Information, Computer and Communications Security, May [C9] Christoph Busold, Alexandra Dmitrienko, Hervé Seudié, Ahmed Taha, Majid Sobhani, Christian Wachsmann, and Ahmad-Reza Sadeghi. Smart keys for cyber-cars: Secure smartphone-based NFC-enabled car immobilizer. In ACM Conference on Data and Application Security and Privacy, February [C10] Lucas Davi, Alexandra Dmitrienko, Stefan Nürnberger, and Ahmad-Reza Sadeghi. XIFER: A software diversity tool against code-reuse attacks. In ACM International Workshop on Wireless of the Students, by the Students, for the Students, August [C11] Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar, and Christian Wachsmann. SmartTokens: Delegable access control with NFC-enabled smartphones. In International Conference on Trust and Trustworthy Computing. Springer, June (6151) /7

5 [C12] Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, and Ahmad-Reza Sadeghi. MoCFI: A framework to mitigate control-flow attacks on smartphones. In Network and Distributed System Security Symposium, February [C13] Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, and Bhargava Shastry. Towards taming privilege-escalation attacks on Android. In Network and Distributed System Security Symposium, February [C14] Lucas Davi, Alexandra Dmitrienko, Christoph Kowalski, and Marcel Winandy. Trusted virtual domains on OKL4: Secure information sharing on smartphones. In ACM Workshop on Scalable Trusted Computing. ACM Press, October [C15] Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Ahmad-Reza Sadeghi, and Bhargava Shastry. Practical and lightweight domain isolation on Android. In ACM Workshop on Security and Privacy in Mobile Devices. ACM Press, October [C16] Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr, Ahmad-Reza Sadeghi, and Marcel Winandy. A security architecture for accessing health records on mobile phones. In International Conference on Health Informatics, October [C17] Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr, Ahmad-Reza Sadeghi, and Marcel Winandy. Securing the access to electronic health records on mobile phones. In Biomedical Engineering Systems and Technologies Revised Selected Papers. Springer-Verlag, [C18] Sven Bugiel, Alexandra Dmitrienko, Kari Kostiainen, Ahmad-Reza Sadeghi, and Marcel Winandy. TruWalletM: Secure web authentication on mobile platforms. In International Conference on Trusted Systems, December [C19] Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, and Marcel Winandy. Privilege escalation attacks on Android. In Information Security Conference, October [C20] Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, and Marcel Winandy. Return-oriented programming without returns. In ACM Conference on Computer and Communications Security, October [C21] Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ekberg, Ahmad-Reza Sadeghi, and N. Asokan. Key attestation from trusted execution environments. In International Conference on Trust and Trustworthy Computing, June [C22] Luigi Catuogno, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Steffen Schulz, Marcel Winandy, Jing Zhan, Konrad Eriksson, Dirk Kuhlmann, Gianluca Ramunno, and Matthias Schunter. Trusted virtual domains - design, implementation and lessons learned. In International Conference on Trusted Systems, December (6151) /7

6 Workshops without Proceedings [W1] Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, and Ahmad-Reza Sadeghi. CFI goes mobile: Control-flow integrity for smartphones. In International Workshop on Trustworthy Embedded Devices. September Extended Abstract. [W2] Alexandra Dmitrienko. Zigbee-to-TCP/IP gateway: New opportunities for ZigBeebased sensor networks. In International Workshop on Ambient Intelligence and Embedded Systems, September Technical Reports and White Papers [T1] Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, and Ahmad-Reza Sadeghi. On the (in)security of mobile two-factor authentication. Technical Report TUD-CS , CASED, [T2] Kevin Z. Snow, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Fabian Monrose, and Ahmad-Reza Sadeghi. Just-in-time code reuse: the more things change, the more they stay the same. In BlackHat USA, August [T3] N. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider, and Stanislaus Stelle. CrowdShare: secure mobile resource sharing. Technical Report TUD-CS , TU Darmstadt, April [T4] Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, and Ahmad-Reza Sadeghi. Over-the-air cross-platform infection for breaking mtan-based online banking authentication (white paper). In BlackHat Abu Dhabi, December [T5] Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, and Ahmad-Reza Sadeghi. XManDroid: A new Android evolution to mitigate privilege escalation attacks. Technical Report TR , Ruhr-University Bochum, System Security Lab, April [T6] Ahmad-Reza Sadeghi, Steffen Schulz, Alexandra Dmitrienko, Christian Stüble, Dennis Gessner, and Markus Ullmann. Trusted embedded system operating system (TeSOS) - study and design. Technical Report HGI-TR , Ruhr-University Bochum, System Security Lab, April Posters [P1] Alexandra Dmitrienko, David Noack, Ahmad-Reza Sadeghi, and Moti Yung. POSTER. Bitcoin2Go: secure offline and fast payments with Bitcoins. In Financial Cryptography and Data Security Conference, March [P2] Christoph Busold, Alexandra Dmitrienko, Hervé Seudié, Ahmed Taha, Majid Sobhani, Christian Wachsmann, and Ahmad-Reza Sadeghi. POSTER: Secure smartphonebased NFC-enabled car immobilizer. In ACM Conference on Data and Application Security and Privacy, February [P3] Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, and Bhargava Shastry. POSTER: The quest for security against privilege escalation attacks on Android. In ACM Conference on Computer and Communications Security. ACM, October (6151) /7

7 [P4] Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, and Ahmad-Reza Sadeghi. POSTER: Control-flow integrity for smartphones. In ACM Conference on Computer and Communications Security. ACM, October Industrial Journals [J1] Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, and Ahmad-Reza Sadeghi. Security analysis of mobile two-factor authentication schemes. Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18, [J2] Alexandra Dmitrienko. Wiznet W3150A network co-processor: New features for embedded devices. Components and Technologies, 12(7), [J3] Alexandra Dmitrienko and Alexey Naumov. Passive infrared detectors Sencera: New name at the market. Electronic Components, 12(11), [J4] Alexandra Dmitrienko. TDK components for electromagnetic compatibility. Electronic Components, 12(4), [J5] Alexandra Dmitrienko and Igor Krivchenko. Humidity sensors Sencera. Electronic Components, 12(8), [J6] Alexandra Dmitrienko and Igor Krivchenko. Sensors and detectors Sencera. Components and Technologies, 12(8), (6151) /7

Secure Elements for You and Me: A Model for Programmable Secure Hardware in Mobile Ecosystems

Secure Elements for You and Me: A Model for Programmable Secure Hardware in Mobile Ecosystems Android Security Symposium, Vienna, 9-11 September 2015 Secure Elements for You and Me: A Model for Programmable Secure Hardware in Mobile Ecosystems Marcos da Silva Ramos, Andre Rein Fraunhofer SIT, Darmstadt,

More information

Securing the E-Health Cloud

Securing the E-Health Cloud Securing the E-Health Cloud Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy 1st ACM International Health Informatics Symposium (IHI 2010) Arlington, Virginia, USA, 11-12 November 2010 Introduction Buzzwords

More information

Secure & Interconnected Mobility: Integrated Security for Mobile, Automotive, and Cloud Computing

Secure & Interconnected Mobility: Integrated Security for Mobile, Automotive, and Cloud Computing Secure & Interconnected Mobility: Integrated Security for Mobile, Automotive, and Cloud Computing Prof. Dr. Ahmad-Reza Sadeghi TU Darmstadt Academic Principal Investigator and Director Dr. Matthias Schunter

More information

Market-driven Code Provisioning to Mobile Secure Hardware

Market-driven Code Provisioning to Mobile Secure Hardware Market-driven Code Provisioning to Mobile Secure Hardware Alexandra Dmitrienko 2, Stephan Heuser 1, Thien Duc Nguyen 1, Marcos da Silva Ramos 2, Andre Rein 2, and Ahmad-Reza Sadeghi 1 1 CASED/Technische

More information

EIT ICT Labs MASTER SCHOOL. Specialisations

EIT ICT Labs MASTER SCHOOL. Specialisations EIT ICT Labs MASTER SCHOOL Specialisations S&P EIT ICT Labs Master Programme Security & Privacy The Learning outcomes of this major are: Understanding the concepts and technologies for achieving confidentiality,

More information

A Perspective on the Evolution of Mobile Platform Security Architectures

A Perspective on the Evolution of Mobile Platform Security Architectures A Perspective on the Evolution of Mobile Platform Security Architectures Kari Kostiainen Nokia Research Center, Helsinki TIW, June 2011 Joint work with N. Asokan, Jan-Erik Ekberg and Elena Reshetova 1

More information

EIT ICT Labs MASTER SCHOOL S&P Programme Specialisations

EIT ICT Labs MASTER SCHOOL S&P Programme Specialisations EIT ICT Labs MASTER SCHOOL S&P Programme Specialisations S&P EIT ICT Labs Master Programme Security & Privacy The programme in Security and Privacy focuses on the study of the design, development and evaluation

More information

IT Security in Industrie 4.0

IT Security in Industrie 4.0 IT Security in Industrie 4.0 Prof. Dr. Michael Waidner TU Darmstadt & Fraunhofer Institute for Secure Information Technology? AUTONOMIK Innovation Days Berlin, June 17-18, 2014 1. What is Industrial IT

More information

Trusted Virtual Domains Design, Implementation and Lessons Learned

Trusted Virtual Domains Design, Implementation and Lessons Learned Trusted Virtual Domains Design, Implementation and Lessons Learned Luigi Catuogno 1, Alexandra Dmitrienko 1, Konrad Eriksson 2, Dirk Kuhlmann 3, Gianluca Ramunno 4, Ahmad-Reza Sadeghi 1, Steffen Schulz

More information

Embedding Trust into Cars Secure Software Delivery and Installation

Embedding Trust into Cars Secure Software Delivery and Installation Embedding Trust into Cars Secure Software Delivery and Installation André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security, Bochum, Germany Third Workshop

More information

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in

More information

Over-the-Air Cross-platform Infection for Breaking mtan-based Online Banking Authentication

Over-the-Air Cross-platform Infection for Breaking mtan-based Online Banking Authentication Over-the-Air Cross-platform Infection for Breaking mtan-based Online Banking Authentication Alexandra Dmitrienko Fraunhofer Institute for Secure Information Technology/CASED, Germany Joint work with Lucas

More information

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich sigl@tum.de Fraunhofer Research Institution

More information

Patterns for Secure Boot and Secure Storage in Computer Systems

Patterns for Secure Boot and Secure Storage in Computer Systems Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de

More information

Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation

Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation Lucas Davi, Patrick Koeberl, and Ahmad-Reza Sadeghi Intel Collaborative

More information

Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer

Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer Christoph Busold, Ahmad-Reza Sadeghi, Christian Wachsmann Intel CRI-SC, TU Darmstadt, Germany christoph.busold@cased.de, ahmad.sadeghi@cased.de,

More information

1. PUBLISHABLE SUMMARY

1. PUBLISHABLE SUMMARY 1. PUBLISHABLE SUMMARY ICT-eMuCo (www.emuco.eu) is a European project with a total budget of 4.6M which is supported by the European Union under the Seventh Framework Programme (FP7) for research and technological

More information

Reality Check: Practical Limitations of Technical Privacy Protection

Reality Check: Practical Limitations of Technical Privacy Protection Munich IT Security Research Group Reality Check: Practical Limitations of Technical Privacy Protection Hans-Joachim Hof MuSe - Munich IT Security Research Group Munich University of Applied Sciences hof@hm.edu

More information

A SECURITY ARCHITECTURE FOR ACCESSING HEALTH RECORDS ON MOBILE PHONES

A SECURITY ARCHITECTURE FOR ACCESSING HEALTH RECORDS ON MOBILE PHONES A SECURITY ARCHITECTURE FOR ACCESSING HEALTH RECORDS ON MOBILE PHONES Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr and Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany

More information

A Perspective on the Evolution of Mobile Platform Security Architectures

A Perspective on the Evolution of Mobile Platform Security Architectures A Perspective on the Evolution of Mobile Platform Security Architectures N. Asokan Nokia Research Center Joint work with Kari Kostiainen, Jan-Erik Ekberg, Elena Reshetova (Intel) Padova, July 2012 1 Introduction

More information

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Department of Computer Science Introduction Our society is undergoing a

More information

Security concept for gateway integrity protection within German smart grids

Security concept for gateway integrity protection within German smart grids ASE 2014, ECSaR-Workshop Security concept for gateway integrity protection within German smart grids Prof. Dr. Kai-Oliver Detken 1, Carl-Heinz Genzel 2, Olav Hoffmann 3, Prof. Dr. Richard Sethmann 4 1

More information

The Beast is Resting in Your Memory On Return-Oriented Programming Attacks and Mitigation Techniques To appear at USENIX Security & BlackHat USA, 2014

The Beast is Resting in Your Memory On Return-Oriented Programming Attacks and Mitigation Techniques To appear at USENIX Security & BlackHat USA, 2014 Intelligent Things, Vehicles and Factories: Intel Workshop on Cyberphysical and Mobile Security 2014, Darmstadt, June 11 The Beast is Resting in Your Memory On Return-Oriented Programming Attacks and Mitigation

More information

Securing the Access to Electronic Health Records on Mobile Phones

Securing the Access to Electronic Health Records on Mobile Phones Securing the Access to Electronic Health Records on Mobile Phones Alexandra Dmitrienko 1, Zecir Hadzic 1, Hans Löhr 1, Ahmad-Reza Sadeghi 2, and Marcel Winandy 1 1 Horst Görtz Institute for IT-Security

More information

Vehicular Security Hardware The Security for Vehicular Security Mechanisms

Vehicular Security Hardware The Security for Vehicular Security Mechanisms escrypt GmbH Embedded Security Systemhaus für eingebettete Sicherheit Vehicular Security Hardware The Security for Vehicular Security Mechanisms Marko Wolf, escrypt GmbH Embedded Security Embedded Security

More information

Securing the E-Health Cloud

Securing the E-Health Cloud Securing the E-Health Cloud Hans Löhr Horst Görtz Institute for IT Security Ruhr-University Bochum Germany hans.loehr@trust.rub.de Ahmad-Reza Sadeghi Horst Görtz Institute for IT Security Ruhr-University

More information

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded

More information

Property Based TPM Virtualization

Property Based TPM Virtualization Property Based Virtualization Marcel Winandy Joint work with: Ahmad Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security Chair for System Security Ruhr University Bochum, Germany Sirrix

More information

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé

More information

Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection

Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection USENIX Security Symposium 2014, San Diego, CA, USA Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection Lucas Davi Intel Collaborative Research Institute for

More information

Plan and Design a Windows Server 2003 Network

Plan and Design a Windows Server 2003 Network Plan and Design a Windows Server 2003 Network Course 2278 - Five Days - Instructor-led - Hands-On Introduction The goal of this five-day course is to provide students with the knowledge and skills necessary

More information

Embedded Java & Secure Element for high security in IoT systems

Embedded Java & Secure Element for high security in IoT systems Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

Secure Data Management in Trusted Computing

Secure Data Management in Trusted Computing 1 Secure Data Management in Trusted Computing Ulrich Kühn Deutsche Telekom Laboratories, TU Berlin Klaus Kursawe (KU Leuven) Stefan Lucks (U Mannheim) Ahmad-Reza Sadeghi (RU Bochum) Christian Stüble (RU

More information

SECURITY & ACCESS CONTROL SYSTEM BASED PROJECTS

SECURITY & ACCESS CONTROL SYSTEM BASED PROJECTS ************************************************************************ INNOVATIVE & APPLICATION ORIENTED PROJECTS ON SVSEMBEDDED SYSTEMS (8051/AVR/ARM7/MSP430/RENESAS/ARM cortex M3) ************************************************************************

More information

DAAD Deutscher Akademischer Austausch Dienst German Academic Exchange Service

DAAD Deutscher Akademischer Austausch Dienst German Academic Exchange Service DAAD Deutscher Akademischer Austausch Dienst German Academic Exchange Service Siemens / DAAD Post Graduate Program Research Grants for Foreign Graduates 2007 / 2008 Working together in offering the "Siemens

More information

Prof. Dr. D. W. Cunningham, Berliner Strasse 35A, 03046 Cottbus, Germany

Prof. Dr. D. W. Cunningham, Berliner Strasse 35A, 03046 Cottbus, Germany Curriculum Vitae Prof. Dr. Douglas William Cunningham Work Address: Brandenburg Technical University Cottbus Graphical Systems Department Konrad-Wachsmann-Allee 1 D-03046 Cottbus, Tel: (+49) 355-693816

More information

The relevance of cyber-security to functional safety of connected and automated vehicles

The relevance of cyber-security to functional safety of connected and automated vehicles The relevance of cyber-security to functional safety of connected and automated vehicles André Weimerskirch University of Michigan Transportation Research Institute (UMTRI) February 12, 2014 Introduction

More information

New Scholarships 2005 - New Scholarships 2005

New Scholarships 2005 - New Scholarships 2005 New Scholarships 2005 - New Scholarships 2005 DAAD-SIEMENS SCHOLARSHIP PROGRAM ASIA 21st CENTURY GERMAN ACADEMIC EXCHANGE SERVICE Deutscher Akademischer Austausch-Dienst (DAAD) Bonn and SIEMENS AG Munich

More information

A Note on the Security in the Card Management System of the German E-Health Card

A Note on the Security in the Card Management System of the German E-Health Card A Note on the Security in the Card Management System of the German E-Health Card Marcel Winandy (Ruhr-University Bochum) 3rd International ICST Conference on Electronic Healthcare for the 21st Century

More information

APPLIED AND INTEGRATED SECURITY

APPLIED AND INTEGRATED SECURITY APPLIED AND INTEGRATED SECURITY Directors: Claudia Eckert (Managing) Georg Sigl SECURITY RESEARCH IN MUNICH Fraunhofer Institution for Applied and Integrated Security Claudia Eckert Georg Sigl TU München

More information

Security and privacy rights management for mobile and ubiquitous computing

Security and privacy rights management for mobile and ubiquitous computing Security and privacy rights management for mobile and ubiquitous computing Michael Fahrmair, Wassiou Sitou, and Bernd Spanfelner Technische Universität München, Department of Informatics, Boltzmannstr.3,

More information

Smart Data Innovation Lab (SDIL)

Smart Data Innovation Lab (SDIL) Smart Data Innovation Lab (SDIL) Accelerating Data driven Innovation NESSI Summit May 27, 2014 Prof. Dr.-Ing. Michael Beigl Department of Informatics KIT University of the State of Baden-Wuerttemberg and

More information

Secure Storage in the Cloud

Secure Storage in the Cloud Secure Storage in the Cloud 14. ISSS Berner Tagung für Informationssicherheit "Cloud Computing: Chancen und Risiken" 24. November 2011, Bern Prof. Dr. Michael Waidner Fraunhofer SIT, Direktor Technische

More information

Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009

Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009 Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer October 2009 Jennic highlights Jennic is a fabless semiconductor company providing Wireless Microcontrollers to high-growth

More information

Double Degree Programme TU Munich Tomsk Polytechnic University

Double Degree Programme TU Munich Tomsk Polytechnic University Double Degree Programme TU Munich Tomsk Polytechnic University Department of Informatics, Technische Universität München, Germany Institute of Cybernetics, Tomsk Polytechnic University, Russia Tomsk, Russia

More information

2013-04-16 to 2013-04-19. Hanno Langweg, Einar Snekkenes (HiG)

2013-04-16 to 2013-04-19. Hanno Langweg, Einar Snekkenes (HiG) COINS study tour 2013-04-16 to 2013-04-19. Hanno Langweg, Einar Snekkenes (HiG) Seven institutions were selected to collect their experience with Ph.D. training in security and computer science. The selection

More information

Taming the Robot: Efficient Sand-boxing of the Android OS

Taming the Robot: Efficient Sand-boxing of the Android OS Technische Universität Berlin FG Security in Telecommunications Weiss Steffen Liebergeld, March 22nd, 2011 steffen@sec.t-labs.tu-berlin.de Outline Introduction Virtualization Microkernels L4Linux L4 Android

More information

Implement Data Security in Today's Operating System Group Members

Implement Data Security in Today's Operating System Group Members Implement Data Security in Today's Operating System Group Members 1 Muhammad Aleem, 2 Muhammad Tahir, 3 Nasir Jamal 1 MSCS-20, 2 MSCS-06, 3 MSCS-01 Department of Information Technology, University of Sargodha

More information

Hardware Security for Device Authentication in the Smart Grid

Hardware Security for Device Authentication in the Smart Grid Hardware Security for Device Authentication in the Smart Grid Andrew J. Paverd and Andrew P. Martin Department of Computer Science, University of Oxford, UK {andrew.paverd,andrew.martin}@cs.ox.ac.uk Abstract.

More information

Dr. STYLIANI KLEANTHOUS LOIZOU CURRICULUM VITAE

Dr. STYLIANI KLEANTHOUS LOIZOU CURRICULUM VITAE Dr. STYLIANI KLEANTHOUS LOIZOU CURRICULUM VITAE Personal Details Name: Date of Birth: 21/06/1981 Nationality: Cypriot Marital Status: Married E-Mail: styliani.kleanthous@ouc.ac.cy or styliani.kleanthous@gmail.com

More information

ICT Enabling the Future of Smart Energy. Competence Center IT4Energy Dr. Thomas Luckenbach Dr. Armin Wolf

ICT Enabling the Future of Smart Energy. Competence Center IT4Energy Dr. Thomas Luckenbach Dr. Armin Wolf ICT Enabling the Future of Smart Energy Competence Center IT4Energy Dr. Thomas Luckenbach Dr. Armin Wolf 1 egovernment ehealth Public Security Smart Mobility Smart Energy Activity Domains of FOKUS Public

More information

Prof. Dr.-Ing. Andreas Schrader

Prof. Dr.-Ing. Andreas Schrader Prof. Dr.-Ing. Andreas Schrader Ambient Computing Group Institute of Telematics University of Lübeck www.itm.uni-luebeck.de schrader@itm.uni-luebeck.de Working Group Ambient Computing Institute for Telematics,

More information

A. Background. In this Communication we can read:

A. Background. In this Communication we can read: On RFID The Next Step to THE INTERNET OF THINGS Information of the Presidency 2832nd Council meeting, Competitiveness (Internal Market, Industry and Research), Brussels, 22-23 November 2007 A. Background

More information

EIT ICT Labs The ICT Innovation Catalyst for Europe

EIT ICT Labs The ICT Innovation Catalyst for Europe Start-Chart EIT ICT Labs The ICT Innovation Catalyst for Europe Prof. Dr. Willem Jonker CEO willem.jonker@ictlabs.eu EIT ICT Labs mission is to turn Europe into a global leader in ICT Innovation Breed

More information

Development of Attendance Management System using Biometrics.

Development of Attendance Management System using Biometrics. Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.

More information

Vehicular On-board Security: EVITA Project

Vehicular On-board Security: EVITA Project C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security

More information

Standard for an Architectural Framework for the Internet of Things IEEE P2413. IEEE GlobeCom Austin, Texas December, 2014

Standard for an Architectural Framework for the Internet of Things IEEE P2413. IEEE GlobeCom Austin, Texas December, 2014 Standard for an Architectural Framework for the Internet of Things IEEE P2413 Chuck Adams Past-President IEEE Standards Association Distinguished Standards Strategist Huawei Technologies IEEE GlobeCom

More information

Introduction to Internet of Things

Introduction to Internet of Things Introduction to Internet of Things DAVID LIU, 9/23/2014 What is Internet of Things A Network if interconnect objects that: harvests information from the environment sensing) Interacts with the physical

More information

Network Security in Building Networks

Network Security in Building Networks Network Security in Building Networks Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is) Westphalian University of Applied Sciences Gelsenkirchen, Germany www.if-is.net Content

More information

Victoria Kostina Curriculum Vitae - September 6, 2015 Page 1 of 5. Victoria Kostina

Victoria Kostina Curriculum Vitae - September 6, 2015 Page 1 of 5. Victoria Kostina Victoria Kostina Curriculum Vitae - September 6, 2015 Page 1 of 5 Victoria Kostina Department of Electrical Engineering www.caltech.edu/~vkostina California Institute of Technology, CA 91125 vkostina@caltech.edu

More information

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12 Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge

More information

DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android

DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android Technical Report Nr. TUD-CS-2016-0025 January 28, 2016 DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android Authors Stephan Heuser, Marco Negro, Praveen Kumar Pendyala,

More information

Uni-directional Trusted Path: Transaction Confirmation on Just One Device

Uni-directional Trusted Path: Transaction Confirmation on Just One Device Uni-directional Trusted Path: Transaction Confirmation on Just One Device Atanas Filyanov 1, Jonathan M. McCune 2, Ahmad-Reza Sadeghi 3, Marcel Winandy 1 1 Ruhr-University Bochum, Germany 2 Carnegie Mellon

More information

Windows 7, Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse

More information

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

More information

Security and Privacy in Big Data, Blessing or Curse?

Security and Privacy in Big Data, Blessing or Curse? Security and Privacy in Big Data, Blessing or Curse? 2 nd National Cryptography Days 9-11 April 2015 Dr. Zeki Erkin Cyber Security Section Department of Intelligent Systems Delft University of Technology

More information

E L E G A N T EMBEDDED SOLUTIONS

E L E G A N T EMBEDDED SOLUTIONS About EES Tech Center: EES Tech Center is a training division from ELEGANT Pvt. Ltd. It has been launched to provide application oriented training and academic project training on embedded systems with

More information

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed. CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! 50331 - Windows 7, Enterprise Desktop Support Technician Duration: 5 days About this Course This five-day

More information

"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary

Charting the Course... ... to Your Success! MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test

More information

A short introduction to RWTH

A short introduction to RWTH A short introduction to RWTH Location of RWTH Aachen University RWTH Mainbuilding Development of RWTH Aachen University until 2004 Students Foreign Students Polytechnical School Faculty of Architecture

More information

A Road Map on Security Deliverables for Mobile Cloud Application

A Road Map on Security Deliverables for Mobile Cloud Application A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,

More information

Home Automation System with Universally Used Mobile Application Platform

Home Automation System with Universally Used Mobile Application Platform IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 2, Ver. III (Mar - Apr. 2014), PP 01-06 Home Automation System with Universally

More information

Secure Services and Quality Testing SST. Security Engineering Privacy by Design Trusted Solutions. Mario Hoffmann. for Service Ecosystems

Secure Services and Quality Testing SST. Security Engineering Privacy by Design Trusted Solutions. Mario Hoffmann. for Service Ecosystems Secure Services and Quality Testing SST Security Engineering Privacy by Design Trusted Solutions for Service Ecosystems Mario Hoffmann Head of Department Fraunhofer AISEC in a nutshell Fraunhofer Profile

More information

Implementation and Direct Accessing of Android Authority Application in Smart Phones

Implementation and Direct Accessing of Android Authority Application in Smart Phones Implementation and Direct Accessing of Android Authority Application in Smart Phones Amit H. Choksi 1, Jaimin J. Sarvan 2 and Ronak R. Vashi 3 1 ET Dept, BVM Engg. College, V.V.Nagar-388120, Gujarat, India

More information

Industrie 4.0. Towards a Holistic Approach for Cyber Safety and Security

Industrie 4.0. Towards a Holistic Approach for Cyber Safety and Security Industrie 4.0 Towards a Holistic Approach for Cyber Safety and Security Prof. Dr.-Ing. Reiner Anderl Marco Grimm, M.Sc. Datenverarbeitung in der Konstruktion (DiK) Fachbereich Maschinenbau Technische Universität

More information

What is Industrie 4.0

What is Industrie 4.0 What is Industrie 4.0 Prof. Dr.-Ing. Reiner Anderl Computer Integrated Design (Datenverarbeitung in der Konstruktion, DiK) Fachbereich Maschinenbau Technische Universität Darmstadt Otto-Berndt-Straße 2

More information

Security and the Internet of Things (IoT)

Security and the Internet of Things (IoT) Security and the Internet of Things (IoT) Analysis and Recommendations for IoT Manufacturers and IT/Business Executives Wei (Weslay) Xu Tuck School of Business at Dartmouth 03/20/2015 High Level Description

More information

Firewall-based Solution for Preventing Privilege Escalation Attacks in Android

Firewall-based Solution for Preventing Privilege Escalation Attacks in Android International Journal of Computer Networks and Communications Security VOL. 2, NO. 9, SEPTEMBER 2014, 318 327 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S Firewall-based Solution for Preventing

More information

Position Paper: Can the Web Really Use Secure Hardware?

Position Paper: Can the Web Really Use Secure Hardware? Position Paper: Can the Web Really Use Secure Hardware? Justin King-Lacroix 1 Department of Computer Science, University of Oxford justin.king-lacroix@cs.ox.ac.uk Abstract. The Web has become the platform

More information

Compliance of student learning outcomes with industry needs in embedded systems engineering

Compliance of student learning outcomes with industry needs in embedded systems engineering Compliance of student learning outcomes with industry needs in embedded systems engineering N. Petrakis, G. Liodakis, I.O. Vardiambasis Technological Educational Institute of Crete, Department of Electronic

More information

Applied and Integrated Security. C. Eckert

Applied and Integrated Security. C. Eckert Applied and Integrated Security 1 Joseph von Fraunhofer (1787-1826) Researcher discovery of Fraunhofer Lines in the sun spectrum Inventor new methods of lens processing Entrepreneur head of royal glass

More information

Master Program Business Information Systems Technology (BIST)

Master Program Business Information Systems Technology (BIST) Master Program Information Systems Technology (BIST) Witold Abramowicz 1, Heinrich C. Mayr 2, Florian Matthes 3, Bernhard Thalheim 4 1 The Poznan University of Economics, Management Information Systems,

More information

Hardware Security Modules for Protecting Embedded Systems

Hardware Security Modules for Protecting Embedded Systems Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &

More information

Thomas S. Heydt-Benjamin

Thomas S. Heydt-Benjamin Thomas S. Heydt-Benjamin Contact Information 530 E86th St #3C NYC, NY 10028, USA +1 (917) 744-7934 tomb@acm.org http://cryptocracy.net Research Interests Privacy, security, and identity management. Anonymity

More information

SmartTokens: Delegable Access Control with NFC-enabled Smartphones

SmartTokens: Delegable Access Control with NFC-enabled Smartphones SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version) Alexandra Dmitrienko 1, Ahmad-Reza Sadeghi 2, Sandeep Tamrakar 3, and Christian Wachsmann 4 1 Fraunhofer SIT Darmstadt,

More information

Hardware/microprocessor Run- time executive (real- time OS, hypervisor, etc.) Web messaging infrastructure

Hardware/microprocessor Run- time executive (real- time OS, hypervisor, etc.) Web messaging infrastructure Firmware Strategy for the Internet of Cars David Kleidermacher, CTO Green Hills Software The Internet of Things (IoT) trend can be defined as the rapid assimilation of the world s objects (anything that

More information

Security Evaluation of Mobile Device Integration with V2X Communication

Security Evaluation of Mobile Device Integration with V2X Communication Security Evaluation of Mobile Device Integration with V2X Communication Tim Leinmüller 1, Boris Atanassow 1, Stefan Diewald 2, Lutz-Peter Breyer 1 and Matthias Kranz 3 1 DENSO AUTOMOTIVE Deutschland GmbH,

More information

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients

More information

EIT Education & the EIT ICTLabs Master School. Prof. Fabrizio Granelli Local Master School Coordinator, UNITN

EIT Education & the EIT ICTLabs Master School. Prof. Fabrizio Granelli Local Master School Coordinator, UNITN EIT Education & the EIT ICTLabs Master School Prof. Fabrizio Granelli Local Master School Coordinator, UNITN Education, EIT & UNITN Maurizio Marchese Fabrizio Granelli Director of Education Local MS coordinator

More information

Integration of Industry 4.0 in Education Programs of German Universities of Applied Science. Prof. Dr.-Ing. Rainer Würslin

Integration of Industry 4.0 in Education Programs of German Universities of Applied Science. Prof. Dr.-Ing. Rainer Würslin Integration of Industry 4.0 in Education Programs of German Universities of Applied Science Prof. Dr.-Ing. Rainer Würslin Agenda» The University of Applied Sciences Esslingen» The German Education- and

More information

Embedded Systems at the CSC School

Embedded Systems at the CSC School Embedded Systems at the CSC School Prof. Mads Dam Theoretical Computer Science School of Computer Science and Communication mfd@kth.se, tel.08-790 6229 CSC Departments CB Computational Biology CVAP Computer

More information

Automotive Software Development Challenges Virtualisation and Embedded Security

Automotive Software Development Challenges Virtualisation and Embedded Security Automotive Software Development Challenges Virtualisation and Embedded Security 1 Public ETAS-PGA/PRM-E October 2014 ETAS GmbH 2014. All rights reserved, also regarding any disposal, exploitation, Automotive

More information

Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security

Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security Information Security Group (ISG) From Smart Cards to NFC Smart Phone Security Information Security Group Activities Prof. Keith and Mayes Research From the Information Security Group ACE-CSR at Royal Holloway

More information

CARTES 2012 Demo presentation. Secure Trusted Execution Environment

CARTES 2012 Demo presentation. Secure Trusted Execution Environment CARTES 2012 Demo presentation Secure Trusted Execution Environment MobiCore offers a preventive security solution, protecting most of currently known cyber attacks, complementary to other security solutions

More information

Intelligent Exoskeleton based on human-robot interaction for manipulation of heavy goods in Europe s factories of the Future.

Intelligent Exoskeleton based on human-robot interaction for manipulation of heavy goods in Europe s factories of the Future. Intelligent Exoskeleton based on human-robot interaction for manipulation of heavy goods in Europe s factories of the Future. Project Facts This project has received funding from the European Union s Seventh

More information

Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?

Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration? Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration? Cristina Alcaraz, Pablo Najera, Javier Lopez, Rodrigo Roman Presented by Alexander Witt and Aniket Shah 1 Overview

More information

涉 密 网 络 中 的 数 据 保 护 技 术

涉 密 网 络 中 的 数 据 保 护 技 术 第 42 卷 第 1 期 电 子 科 技 大 学 学 报 Vol.42 No.1 2013 年 1 月 Journal of University of Electronic Science and Technology of China Jan. 2013 Data Protection Technology in Classified Networks CHEN Xun, HAN Zhen, and

More information