Head of Mobile Services Group. Cyber-Physical Security Systems, Fraunhofer Institute for Secure Information Technology,

Size: px
Start display at page:

Download "Head of Mobile Services Group. Cyber-Physical Security Systems, Fraunhofer Institute for Secure Information Technology,"

Transcription

1 Alexandra Dmitrienko Curriculum Vitae (last updated in June, 2015) Gender Nationality Location Personal Data female Russian Darmstadt, Germany Phone +49 (6151) / /2015 Education Dr.-Ing. (Ph.D. in Security in Information Technology) with distinction, Department of Computer Sciences, Technische Universität Darmstadt, Germany, Dissertation: Security and Privacy Aspects of Mobile Platforms and Applications. Advisors: Prof. Dr. Michael Waidner (Technische Universität Darmstadt) and Prof. Dr. Srdjan Čapkun (ETH Zurich) M. Sc. of Engineering and Technology with distinction, GPA 5.0(5.0). Department of Computer Sciences, St. Petersburg State Polytechnic University, Russia B. Sc. of Engineering and Technology with distinction, GPA 4.85(5.0). Department of Computer Sciences, St. Petersburg State Polytechnic University, Russia 01/2015 now 01/ / / / / /2009 Working Experience Head of Mobile Services Group. Cyber-Physical Security Systems, Fraunhofer Institute for Secure Information Technology, Darmstadt, Germany Research Assistant. Trust and Compliance, Fraunhofer Institute for Secure Information Technology, Darmstadt, Germany Research Assistant. Cyber-Physical Mobile Systems Security, Fraunhofer Institute for Secure Information Technology, Darmstadt, Germany Research Assistant. System Security Lab, Ruhr-University Bochum, Germany +49 (6151) /7

2 Branch Manager. Department of Wireless Technologies, EFO Ltd, St. Petersburg, Russia Field Application Engineer. Technical Support Department, EFO Ltd, St. Petersburg, Russia Selected Projects SMAC: Smartphone-based access control for automotive applications (with Robert Bosch GmbH as an industrial partner) - project lead Fraunhofer SIT Project Key2Share ( - project lead Industrial project with Nokia Integrated Privacy-Preserving On-board Credentials (ipoc) BSI Project Trusted Embedded Secure Operating System (TeSOS) FP6 EU Project Open Trusted Computing ( Languages Russian English German native fluent intermediate (B2 level) Fields of Competence Trusted Computing technology (TPMs, MTMs, secure boot, remote attestation, etc.) Wireless sensor networks (secure routing, software attestation, ZigBee networks) Runtime attacks for x86 and ARM (new attack methods, exploit development) Operating system security (system-level services for L4-based microkernels, security extensions for mobile operating systems) Applied cryptography (protocol design) Hardware based system security (secure elements, processor-based extensions) Authentication security (password-based, token-based, 2-factor authentication) Access control systems (based on RFID cards and smartphones) Digital payments (mobile payments, Bitcoin) Mobile ticketing services Skills in Software Development System-level development (C, C++, Assembler for x86 and ARM) Embedded systems / microcontrollers / ARM (C, C++) Application development for Android (Java) SVN/GIT (development in teams) Lead of development projects +49 (6151) alexandra.dmitrienko@googl .com 2/7

3 Nov, 2014 Sep, 2014 Jul, 2014 Industrial Trainings Führungsplanspiel Avalon. Leadership training by Bosch, Pforzheim, Germany Intercultural awareness training by SAP, Walldorf, Germany Creativity & innovation. Training by DATEV, Nürnberg, Germany Jun, 2014 Grundlagen der Szenarioplanung. Training by Robert Bosch GmbH, Stuttgart, Germany May, 2014 Mar, 2014 Nov, 2013 Sep, 2007 Nov, 2007 Jan, 2006 Leistungsstarke Teams bilden & führen. Training on social and self-competence by Holtzbrinck Publishing Group, Stuttgart, Germany Business meets technology: Geschäftsverständnis für Software Experten. Business training by Siemens AG, Berlin, Germany Ideation and business planning. Training by EIT ICT Labs, Berlin, Germany IEEE Atmel system training, Dresden, Germany New hardware TCP/IP chip W3150+, Chip-based modules and development kits, WIZnet technical training, Munich, Germany Hardware TCP/IP chips for embedded systems, WIZnet Technical Training, Soul, South Korea Honors, Awards and Scholarships Fraunhofer TALENTA Speed Up funding for support of female researchers in career development. Host institution: Fraunhofer SIT, Darmstadt, Germany Software Campus Program for support of young IT experts. Academic partner: Fraunhofer SIT, Darmstadt, Germany. Industrial partner: Robert Bosch GmbH, Schwieberdingen, Germany Intel Doctoral Student Honor Award. Host institution: Fraunhofer SIT, Darmstadt, Germany 04/ /2011 Research/study award. ERASMUS Mundus Co-operation Window Programme for PhD candidates. Host institution: Ruhr-Universität Bochum, Germany Scholarship for exchange students from Kiel city (Stipendium der Stadt Kiel). Host institution: Kiel University of Applied Sciences, Germany List of Publications Books [B1] N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, and Ahmad-Reza Sadeghi. Mobile Platform Security, volume 4 of Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool, December PhD Thesis [S1] Alexandra Dmitrienko. Security and Privacy Aspects of Mobile Platforms and Applications. PhD thesis, TU Darmstadt, April tu-darmstadt.de/4611/. +49 (6151) alexandra.dmitrienko@googl .com 3/7

4 Conferences and Workshops with Proceedings [C1] Alexandra Dmitrienko, Stephan Heuser, Thien Duc Nguyen, Marcos da Silva Ramos, Andre Rein, and Ahmad-Reza Sadeghi. Market-driven code provisioning to mobile secure hardware. In Financial Cryptography and Data Security, January [C2] Christoph Busold, Alexandra Dmitrienko, and Christian Wachsmann. Key2Share for authentication services. In SmartCard Workshop, February [C3] Alexandra Dmitrienko, David Noack, Ahmad-Reza Sadeghi, and Moti Yung. On offline payments with Bitcoin. Invited paper. In Workshop on Bitcoin Research, March [C4] Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, and Ahmad-Reza Sadeghi. On the (in)security of mobile two-factor authentication. In Financial Cryptography and Data Security Conference, March [C5] Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, and Ahmad-Reza Sadeghi. Do I know you? - Efficient and privacy-preserving common friend-finder protocols and applications. In Annual Computer Security Applications Conference, December [C6] N. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider, and Stanislaus Stelle. CrowdShare: Secure mobile resource sharing. In International Conference on Applied Cryptography and Network Security, June [C7] Kevin Z. Snow, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Fabian Monrose, and Ahmad-Reza Sadeghi. Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization. In IEEE Symposium on Security and Privacy, May [C8] Lucas Davi, Alexandra Dmitrienko, Stefan Nürnberger, and Ahmad-Reza Sadeghi. Gadge me if you can - secure and efficient ad-hoc instruction-level randomization for x86 and ARM. In ACM Symposium on Information, Computer and Communications Security, May [C9] Christoph Busold, Alexandra Dmitrienko, Hervé Seudié, Ahmed Taha, Majid Sobhani, Christian Wachsmann, and Ahmad-Reza Sadeghi. Smart keys for cyber-cars: Secure smartphone-based NFC-enabled car immobilizer. In ACM Conference on Data and Application Security and Privacy, February [C10] Lucas Davi, Alexandra Dmitrienko, Stefan Nürnberger, and Ahmad-Reza Sadeghi. XIFER: A software diversity tool against code-reuse attacks. In ACM International Workshop on Wireless of the Students, by the Students, for the Students, August [C11] Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar, and Christian Wachsmann. SmartTokens: Delegable access control with NFC-enabled smartphones. In International Conference on Trust and Trustworthy Computing. Springer, June (6151) alexandra.dmitrienko@googl .com 4/7

5 [C12] Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, and Ahmad-Reza Sadeghi. MoCFI: A framework to mitigate control-flow attacks on smartphones. In Network and Distributed System Security Symposium, February [C13] Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, and Bhargava Shastry. Towards taming privilege-escalation attacks on Android. In Network and Distributed System Security Symposium, February [C14] Lucas Davi, Alexandra Dmitrienko, Christoph Kowalski, and Marcel Winandy. Trusted virtual domains on OKL4: Secure information sharing on smartphones. In ACM Workshop on Scalable Trusted Computing. ACM Press, October [C15] Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Ahmad-Reza Sadeghi, and Bhargava Shastry. Practical and lightweight domain isolation on Android. In ACM Workshop on Security and Privacy in Mobile Devices. ACM Press, October [C16] Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr, Ahmad-Reza Sadeghi, and Marcel Winandy. A security architecture for accessing health records on mobile phones. In International Conference on Health Informatics, October [C17] Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr, Ahmad-Reza Sadeghi, and Marcel Winandy. Securing the access to electronic health records on mobile phones. In Biomedical Engineering Systems and Technologies Revised Selected Papers. Springer-Verlag, [C18] Sven Bugiel, Alexandra Dmitrienko, Kari Kostiainen, Ahmad-Reza Sadeghi, and Marcel Winandy. TruWalletM: Secure web authentication on mobile platforms. In International Conference on Trusted Systems, December [C19] Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, and Marcel Winandy. Privilege escalation attacks on Android. In Information Security Conference, October [C20] Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, and Marcel Winandy. Return-oriented programming without returns. In ACM Conference on Computer and Communications Security, October [C21] Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ekberg, Ahmad-Reza Sadeghi, and N. Asokan. Key attestation from trusted execution environments. In International Conference on Trust and Trustworthy Computing, June [C22] Luigi Catuogno, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Steffen Schulz, Marcel Winandy, Jing Zhan, Konrad Eriksson, Dirk Kuhlmann, Gianluca Ramunno, and Matthias Schunter. Trusted virtual domains - design, implementation and lessons learned. In International Conference on Trusted Systems, December (6151) alexandra.dmitrienko@googl .com 5/7

6 Workshops without Proceedings [W1] Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, and Ahmad-Reza Sadeghi. CFI goes mobile: Control-flow integrity for smartphones. In International Workshop on Trustworthy Embedded Devices. September Extended Abstract. [W2] Alexandra Dmitrienko. Zigbee-to-TCP/IP gateway: New opportunities for ZigBeebased sensor networks. In International Workshop on Ambient Intelligence and Embedded Systems, September Technical Reports and White Papers [T1] Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, and Ahmad-Reza Sadeghi. On the (in)security of mobile two-factor authentication. Technical Report TUD-CS , CASED, [T2] Kevin Z. Snow, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Fabian Monrose, and Ahmad-Reza Sadeghi. Just-in-time code reuse: the more things change, the more they stay the same. In BlackHat USA, August [T3] N. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider, and Stanislaus Stelle. CrowdShare: secure mobile resource sharing. Technical Report TUD-CS , TU Darmstadt, April [T4] Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, and Ahmad-Reza Sadeghi. Over-the-air cross-platform infection for breaking mtan-based online banking authentication (white paper). In BlackHat Abu Dhabi, December [T5] Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, and Ahmad-Reza Sadeghi. XManDroid: A new Android evolution to mitigate privilege escalation attacks. Technical Report TR , Ruhr-University Bochum, System Security Lab, April [T6] Ahmad-Reza Sadeghi, Steffen Schulz, Alexandra Dmitrienko, Christian Stüble, Dennis Gessner, and Markus Ullmann. Trusted embedded system operating system (TeSOS) - study and design. Technical Report HGI-TR , Ruhr-University Bochum, System Security Lab, April Posters [P1] Alexandra Dmitrienko, David Noack, Ahmad-Reza Sadeghi, and Moti Yung. POSTER. Bitcoin2Go: secure offline and fast payments with Bitcoins. In Financial Cryptography and Data Security Conference, March [P2] Christoph Busold, Alexandra Dmitrienko, Hervé Seudié, Ahmed Taha, Majid Sobhani, Christian Wachsmann, and Ahmad-Reza Sadeghi. POSTER: Secure smartphonebased NFC-enabled car immobilizer. In ACM Conference on Data and Application Security and Privacy, February [P3] Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, and Bhargava Shastry. POSTER: The quest for security against privilege escalation attacks on Android. In ACM Conference on Computer and Communications Security. ACM, October (6151) alexandra.dmitrienko@googl .com 6/7

7 [P4] Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, and Ahmad-Reza Sadeghi. POSTER: Control-flow integrity for smartphones. In ACM Conference on Computer and Communications Security. ACM, October Industrial Journals [J1] Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, and Ahmad-Reza Sadeghi. Security analysis of mobile two-factor authentication schemes. Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18, [J2] Alexandra Dmitrienko. Wiznet W3150A network co-processor: New features for embedded devices. Components and Technologies, 12(7), [J3] Alexandra Dmitrienko and Alexey Naumov. Passive infrared detectors Sencera: New name at the market. Electronic Components, 12(11), [J4] Alexandra Dmitrienko. TDK components for electromagnetic compatibility. Electronic Components, 12(4), [J5] Alexandra Dmitrienko and Igor Krivchenko. Humidity sensors Sencera. Electronic Components, 12(8), [J6] Alexandra Dmitrienko and Igor Krivchenko. Sensors and detectors Sencera. Components and Technologies, 12(8), (6151) /7

Securing the E-Health Cloud

Securing the E-Health Cloud Securing the E-Health Cloud Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy 1st ACM International Health Informatics Symposium (IHI 2010) Arlington, Virginia, USA, 11-12 November 2010 Introduction Buzzwords

More information

Secure & Interconnected Mobility: Integrated Security for Mobile, Automotive, and Cloud Computing

Secure & Interconnected Mobility: Integrated Security for Mobile, Automotive, and Cloud Computing Secure & Interconnected Mobility: Integrated Security for Mobile, Automotive, and Cloud Computing Prof. Dr. Ahmad-Reza Sadeghi TU Darmstadt Academic Principal Investigator and Director Dr. Matthias Schunter

More information

Market-driven Code Provisioning to Mobile Secure Hardware

Market-driven Code Provisioning to Mobile Secure Hardware Market-driven Code Provisioning to Mobile Secure Hardware Alexandra Dmitrienko 2, Stephan Heuser 1, Thien Duc Nguyen 1, Marcos da Silva Ramos 2, Andre Rein 2, and Ahmad-Reza Sadeghi 1 1 CASED/Technische

More information

EIT ICT Labs MASTER SCHOOL. Specialisations

EIT ICT Labs MASTER SCHOOL. Specialisations EIT ICT Labs MASTER SCHOOL Specialisations S&P EIT ICT Labs Master Programme Security & Privacy The Learning outcomes of this major are: Understanding the concepts and technologies for achieving confidentiality,

More information

EIT ICT Labs MASTER SCHOOL S&P Programme Specialisations

EIT ICT Labs MASTER SCHOOL S&P Programme Specialisations EIT ICT Labs MASTER SCHOOL S&P Programme Specialisations S&P EIT ICT Labs Master Programme Security & Privacy The programme in Security and Privacy focuses on the study of the design, development and evaluation

More information

Security Requirements of a Trusted Virtual Domain (TVD)

Security Requirements of a Trusted Virtual Domain (TVD) Trusted Virtual Domains Design, Implementation and Lessons Learned Luigi Catuogno 1, Alexandra Dmitrienko 1, Konrad Eriksson 2, Dirk Kuhlmann 3, Gianluca Ramunno 4, Ahmad-Reza Sadeghi 1, Steffen Schulz

More information

Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation

Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation Lucas Davi, Patrick Koeberl, and Ahmad-Reza Sadeghi Intel Collaborative

More information

Embedding Trust into Cars Secure Software Delivery and Installation

Embedding Trust into Cars Secure Software Delivery and Installation Embedding Trust into Cars Secure Software Delivery and Installation André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security, Bochum, Germany Third Workshop

More information

IT Security in Industrie 4.0

IT Security in Industrie 4.0 IT Security in Industrie 4.0 Prof. Dr. Michael Waidner TU Darmstadt & Fraunhofer Institute for Secure Information Technology? AUTONOMIK Innovation Days Berlin, June 17-18, 2014 1. What is Industrial IT

More information

Over-the-Air Cross-platform Infection for Breaking mtan-based Online Banking Authentication

Over-the-Air Cross-platform Infection for Breaking mtan-based Online Banking Authentication Over-the-Air Cross-platform Infection for Breaking mtan-based Online Banking Authentication Alexandra Dmitrienko Fraunhofer Institute for Secure Information Technology/CASED, Germany Joint work with Lucas

More information

A Perspective on the Evolution of Mobile Platform Security Architectures

A Perspective on the Evolution of Mobile Platform Security Architectures A Perspective on the Evolution of Mobile Platform Security Architectures Kari Kostiainen Nokia Research Center, Helsinki TIW, June 2011 Joint work with N. Asokan, Jan-Erik Ekberg and Elena Reshetova 1

More information

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in

More information

Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer

Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer Christoph Busold, Ahmad-Reza Sadeghi, Christian Wachsmann Intel CRI-SC, TU Darmstadt, Germany christoph.busold@cased.de, ahmad.sadeghi@cased.de,

More information

Patterns for Secure Boot and Secure Storage in Computer Systems

Patterns for Secure Boot and Secure Storage in Computer Systems Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de

More information

A SECURITY ARCHITECTURE FOR ACCESSING HEALTH RECORDS ON MOBILE PHONES

A SECURITY ARCHITECTURE FOR ACCESSING HEALTH RECORDS ON MOBILE PHONES A SECURITY ARCHITECTURE FOR ACCESSING HEALTH RECORDS ON MOBILE PHONES Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr and Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany

More information

IT Security in Germany - A Review

IT Security in Germany - A Review Munich IT Security Research Group Reality Check: Practical Limitations of Technical Privacy Protection Hans-Joachim Hof MuSe - Munich IT Security Research Group Munich University of Applied Sciences hof@hm.edu

More information

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich sigl@tum.de Fraunhofer Research Institution

More information

Security concept for gateway integrity protection within German smart grids

Security concept for gateway integrity protection within German smart grids ASE 2014, ECSaR-Workshop Security concept for gateway integrity protection within German smart grids Prof. Dr. Kai-Oliver Detken 1, Carl-Heinz Genzel 2, Olav Hoffmann 3, Prof. Dr. Richard Sethmann 4 1

More information

Securing the Access to Electronic Health Records on Mobile Phones

Securing the Access to Electronic Health Records on Mobile Phones Securing the Access to Electronic Health Records on Mobile Phones Alexandra Dmitrienko 1, Zecir Hadzic 1, Hans Löhr 1, Ahmad-Reza Sadeghi 2, and Marcel Winandy 1 1 Horst Görtz Institute for IT-Security

More information

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Department of Computer Science Introduction Our society is undergoing a

More information

Vehicular Security Hardware The Security for Vehicular Security Mechanisms

Vehicular Security Hardware The Security for Vehicular Security Mechanisms escrypt GmbH Embedded Security Systemhaus für eingebettete Sicherheit Vehicular Security Hardware The Security for Vehicular Security Mechanisms Marko Wolf, escrypt GmbH Embedded Security Embedded Security

More information

1. PUBLISHABLE SUMMARY

1. PUBLISHABLE SUMMARY 1. PUBLISHABLE SUMMARY ICT-eMuCo (www.emuco.eu) is a European project with a total budget of 4.6M which is supported by the European Union under the Seventh Framework Programme (FP7) for research and technological

More information

DAAD Deutscher Akademischer Austausch Dienst German Academic Exchange Service

DAAD Deutscher Akademischer Austausch Dienst German Academic Exchange Service DAAD Deutscher Akademischer Austausch Dienst German Academic Exchange Service Siemens / DAAD Post Graduate Program Research Grants for Foreign Graduates 2007 / 2008 Working together in offering the "Siemens

More information

The Beast is Resting in Your Memory On Return-Oriented Programming Attacks and Mitigation Techniques To appear at USENIX Security & BlackHat USA, 2014

The Beast is Resting in Your Memory On Return-Oriented Programming Attacks and Mitigation Techniques To appear at USENIX Security & BlackHat USA, 2014 Intelligent Things, Vehicles and Factories: Intel Workshop on Cyberphysical and Mobile Security 2014, Darmstadt, June 11 The Beast is Resting in Your Memory On Return-Oriented Programming Attacks and Mitigation

More information

A Perspective on the Evolution of Mobile Platform Security Architectures

A Perspective on the Evolution of Mobile Platform Security Architectures A Perspective on the Evolution of Mobile Platform Security Architectures N. Asokan Nokia Research Center Joint work with Kari Kostiainen, Jan-Erik Ekberg, Elena Reshetova (Intel) Padova, July 2012 1 Introduction

More information

New Scholarships 2005 - New Scholarships 2005

New Scholarships 2005 - New Scholarships 2005 New Scholarships 2005 - New Scholarships 2005 DAAD-SIEMENS SCHOLARSHIP PROGRAM ASIA 21st CENTURY GERMAN ACADEMIC EXCHANGE SERVICE Deutscher Akademischer Austausch-Dienst (DAAD) Bonn and SIEMENS AG Munich

More information

Securing the E-Health Cloud

Securing the E-Health Cloud Securing the E-Health Cloud Hans Löhr Horst Görtz Institute for IT Security Ruhr-University Bochum Germany hans.loehr@trust.rub.de Ahmad-Reza Sadeghi Horst Görtz Institute for IT Security Ruhr-University

More information

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded

More information

Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection

Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection USENIX Security Symposium 2014, San Diego, CA, USA Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection Lucas Davi Intel Collaborative Research Institute for

More information

ICT Enabling the Future of Smart Energy. Competence Center IT4Energy Dr. Thomas Luckenbach Dr. Armin Wolf

ICT Enabling the Future of Smart Energy. Competence Center IT4Energy Dr. Thomas Luckenbach Dr. Armin Wolf ICT Enabling the Future of Smart Energy Competence Center IT4Energy Dr. Thomas Luckenbach Dr. Armin Wolf 1 egovernment ehealth Public Security Smart Mobility Smart Energy Activity Domains of FOKUS Public

More information

Embedded Java & Secure Element for high security in IoT systems

Embedded Java & Secure Element for high security in IoT systems Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product

More information

Smart Data Innovation Lab (SDIL)

Smart Data Innovation Lab (SDIL) Smart Data Innovation Lab (SDIL) Accelerating Data driven Innovation NESSI Summit May 27, 2014 Prof. Dr.-Ing. Michael Beigl Department of Informatics KIT University of the State of Baden-Wuerttemberg and

More information

Secure Storage in the Cloud

Secure Storage in the Cloud Secure Storage in the Cloud 14. ISSS Berner Tagung für Informationssicherheit "Cloud Computing: Chancen und Risiken" 24. November 2011, Bern Prof. Dr. Michael Waidner Fraunhofer SIT, Direktor Technische

More information

Security and privacy rights management for mobile and ubiquitous computing

Security and privacy rights management for mobile and ubiquitous computing Security and privacy rights management for mobile and ubiquitous computing Michael Fahrmair, Wassiou Sitou, and Bernd Spanfelner Technische Universität München, Department of Informatics, Boltzmannstr.3,

More information

2013-04-16 to 2013-04-19. Hanno Langweg, Einar Snekkenes (HiG)

2013-04-16 to 2013-04-19. Hanno Langweg, Einar Snekkenes (HiG) COINS study tour 2013-04-16 to 2013-04-19. Hanno Langweg, Einar Snekkenes (HiG) Seven institutions were selected to collect their experience with Ph.D. training in security and computer science. The selection

More information

A Note on the Security in the Card Management System of the German E-Health Card

A Note on the Security in the Card Management System of the German E-Health Card A Note on the Security in the Card Management System of the German E-Health Card Marcel Winandy (Ruhr-University Bochum) 3rd International ICST Conference on Electronic Healthcare for the 21st Century

More information

Property Based TPM Virtualization

Property Based TPM Virtualization Property Based Virtualization Marcel Winandy Joint work with: Ahmad Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security Chair for System Security Ruhr University Bochum, Germany Sirrix

More information

SECURITY & ACCESS CONTROL SYSTEM BASED PROJECTS

SECURITY & ACCESS CONTROL SYSTEM BASED PROJECTS ************************************************************************ INNOVATIVE & APPLICATION ORIENTED PROJECTS ON SVSEMBEDDED SYSTEMS (8051/AVR/ARM7/MSP430/RENESAS/ARM cortex M3) ************************************************************************

More information

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009

Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009 Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer October 2009 Jennic highlights Jennic is a fabless semiconductor company providing Wireless Microcontrollers to high-growth

More information

Hardware Security for Device Authentication in the Smart Grid

Hardware Security for Device Authentication in the Smart Grid Hardware Security for Device Authentication in the Smart Grid Andrew J. Paverd and Andrew P. Martin Department of Computer Science, University of Oxford, UK {andrew.paverd,andrew.martin}@cs.ox.ac.uk Abstract.

More information

Secure Data Management in Trusted Computing

Secure Data Management in Trusted Computing 1 Secure Data Management in Trusted Computing Ulrich Kühn Deutsche Telekom Laboratories, TU Berlin Klaus Kursawe (KU Leuven) Stefan Lucks (U Mannheim) Ahmad-Reza Sadeghi (RU Bochum) Christian Stüble (RU

More information

Victoria Kostina Curriculum Vitae - September 6, 2015 Page 1 of 5. Victoria Kostina

Victoria Kostina Curriculum Vitae - September 6, 2015 Page 1 of 5. Victoria Kostina Victoria Kostina Curriculum Vitae - September 6, 2015 Page 1 of 5 Victoria Kostina Department of Electrical Engineering www.caltech.edu/~vkostina California Institute of Technology, CA 91125 vkostina@caltech.edu

More information

Prof. Dr. D. W. Cunningham, Berliner Strasse 35A, 03046 Cottbus, Germany

Prof. Dr. D. W. Cunningham, Berliner Strasse 35A, 03046 Cottbus, Germany Curriculum Vitae Prof. Dr. Douglas William Cunningham Work Address: Brandenburg Technical University Cottbus Graphical Systems Department Konrad-Wachsmann-Allee 1 D-03046 Cottbus, Tel: (+49) 355-693816

More information

DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android

DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android Technical Report Nr. TUD-CS-2016-0025 January 28, 2016 DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android Authors Stephan Heuser, Marco Negro, Praveen Kumar Pendyala,

More information

The relevance of cyber-security to functional safety of connected and automated vehicles

The relevance of cyber-security to functional safety of connected and automated vehicles The relevance of cyber-security to functional safety of connected and automated vehicles André Weimerskirch University of Michigan Transportation Research Institute (UMTRI) February 12, 2014 Introduction

More information

A. Background. In this Communication we can read:

A. Background. In this Communication we can read: On RFID The Next Step to THE INTERNET OF THINGS Information of the Presidency 2832nd Council meeting, Competitiveness (Internal Market, Industry and Research), Brussels, 22-23 November 2007 A. Background

More information

SmartTokens: Delegable Access Control with NFC-enabled Smartphones

SmartTokens: Delegable Access Control with NFC-enabled Smartphones SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version) Alexandra Dmitrienko 1, Ahmad-Reza Sadeghi 2, Sandeep Tamrakar 3, and Christian Wachsmann 4 1 Fraunhofer SIT Darmstadt,

More information

Dr. STYLIANI KLEANTHOUS LOIZOU CURRICULUM VITAE

Dr. STYLIANI KLEANTHOUS LOIZOU CURRICULUM VITAE Dr. STYLIANI KLEANTHOUS LOIZOU CURRICULUM VITAE Personal Details Name: Date of Birth: 21/06/1981 Nationality: Cypriot Marital Status: Married E-Mail: styliani.kleanthous@ouc.ac.cy or styliani.kleanthous@gmail.com

More information

Security and Privacy in Big Data, Blessing or Curse?

Security and Privacy in Big Data, Blessing or Curse? Security and Privacy in Big Data, Blessing or Curse? 2 nd National Cryptography Days 9-11 April 2015 Dr. Zeki Erkin Cyber Security Section Department of Intelligent Systems Delft University of Technology

More information

APPLIED AND INTEGRATED SECURITY

APPLIED AND INTEGRATED SECURITY APPLIED AND INTEGRATED SECURITY Directors: Claudia Eckert (Managing) Georg Sigl SECURITY RESEARCH IN MUNICH Fraunhofer Institution for Applied and Integrated Security Claudia Eckert Georg Sigl TU München

More information

Vehicular On-board Security: EVITA Project

Vehicular On-board Security: EVITA Project C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security

More information

Uni-directional Trusted Path: Transaction Confirmation on Just One Device

Uni-directional Trusted Path: Transaction Confirmation on Just One Device Uni-directional Trusted Path: Transaction Confirmation on Just One Device Atanas Filyanov 1, Jonathan M. McCune 2, Ahmad-Reza Sadeghi 3, Marcel Winandy 1 1 Ruhr-University Bochum, Germany 2 Carnegie Mellon

More information

Standard for an Architectural Framework for the Internet of Things IEEE P2413. IEEE GlobeCom Austin, Texas December, 2014

Standard for an Architectural Framework for the Internet of Things IEEE P2413. IEEE GlobeCom Austin, Texas December, 2014 Standard for an Architectural Framework for the Internet of Things IEEE P2413 Chuck Adams Past-President IEEE Standards Association Distinguished Standards Strategist Huawei Technologies IEEE GlobeCom

More information

Network Security in Building Networks

Network Security in Building Networks Network Security in Building Networks Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is) Westphalian University of Applied Sciences Gelsenkirchen, Germany www.if-is.net Content

More information

Implement Data Security in Today's Operating System Group Members

Implement Data Security in Today's Operating System Group Members Implement Data Security in Today's Operating System Group Members 1 Muhammad Aleem, 2 Muhammad Tahir, 3 Nasir Jamal 1 MSCS-20, 2 MSCS-06, 3 MSCS-01 Department of Information Technology, University of Sargodha

More information

Prof. Dr.-Ing. Andreas Schrader

Prof. Dr.-Ing. Andreas Schrader Prof. Dr.-Ing. Andreas Schrader Ambient Computing Group Institute of Telematics University of Lübeck www.itm.uni-luebeck.de schrader@itm.uni-luebeck.de Working Group Ambient Computing Institute for Telematics,

More information

Thomas S. Heydt-Benjamin

Thomas S. Heydt-Benjamin Thomas S. Heydt-Benjamin Contact Information 530 E86th St #3C NYC, NY 10028, USA +1 (917) 744-7934 tomb@acm.org http://cryptocracy.net Research Interests Privacy, security, and identity management. Anonymity

More information

smart grids forum Intelligent power grids: How to build in Safety and Security Conference March 21 22, 2013 in Munich, Germany

smart grids forum Intelligent power grids: How to build in Safety and Security Conference March 21 22, 2013 in Munich, Germany smart grids forum Intelligent power grids: How to build in Safety and Security Conference March 21 22, 2013 in Munich, Germany TÜV SÜD AG Embedded Systems TÜV SÜD Akademie GmbH About the Conference To

More information

UR:BAN Networked Transportation System. Good Practice Case of Industry-led R&D Project with Good Prospects of Post-project Exploitation

UR:BAN Networked Transportation System. Good Practice Case of Industry-led R&D Project with Good Prospects of Post-project Exploitation UR:BAN Networked Transportation System Good Practice Case of Industry-led R&D Project with Good Prospects of Post-project Exploitation Programme Mobility and Transportation Technologies "Mobility and Transport

More information

Home Automation System with Universally Used Mobile Application Platform

Home Automation System with Universally Used Mobile Application Platform IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 2, Ver. III (Mar - Apr. 2014), PP 01-06 Home Automation System with Universally

More information

Development of Attendance Management System using Biometrics.

Development of Attendance Management System using Biometrics. Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.

More information

A Road Map on Security Deliverables for Mobile Cloud Application

A Road Map on Security Deliverables for Mobile Cloud Application A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,

More information

IT Security Quo Vadis?

IT Security Quo Vadis? Munich IT Security Research Group IT Security Quo Vadis? Hans-Joachim Hof MuSe - Munich IT Security Research Group Munich University of Applied Sciences hof@hm.edu http://muse.bayern Prof. Dr.-Ing. Hans-Joachim

More information

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field

More information

Firewall-based Solution for Preventing Privilege Escalation Attacks in Android

Firewall-based Solution for Preventing Privilege Escalation Attacks in Android International Journal of Computer Networks and Communications Security VOL. 2, NO. 9, SEPTEMBER 2014, 318 327 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S Firewall-based Solution for Preventing

More information

How To Understand And Understand Rwth Aachen University

How To Understand And Understand Rwth Aachen University A short introduction to RWTH Location of RWTH Aachen University RWTH Mainbuilding Development of RWTH Aachen University until 2004 Students Foreign Students Polytechnical School Faculty of Architecture

More information

How To Become A Computer Scientist

How To Become A Computer Scientist EIT Education & the EIT ICTLabs Master School Prof. Fabrizio Granelli Local Master School Coordinator, UNITN Education, EIT & UNITN Maurizio Marchese Fabrizio Granelli Director of Education Local MS coordinator

More information

What is Industrie 4.0

What is Industrie 4.0 What is Industrie 4.0 Prof. Dr.-Ing. Reiner Anderl Computer Integrated Design (Datenverarbeitung in der Konstruktion, DiK) Fachbereich Maschinenbau Technische Universität Darmstadt Otto-Berndt-Straße 2

More information

Basheer Al-Duwairi Jordan University of Science & Technology

Basheer Al-Duwairi Jordan University of Science & Technology Basheer Al-Duwairi Jordan University of Science & Technology Assistant Professor Department of Network Engineering & Security @ JUST Education: PhD, Iowa State University, 2005 Ms, Iowa State University,

More information

Secure Machine to Machine Communication on the example of Smart Grids

Secure Machine to Machine Communication on the example of Smart Grids Corporate Technology Secure Machine to Machine Communication on the example of Smart Grids 10.ITG Fachtagung Zukunft der Netze 2011, Steffen Fries Siemens AG, CT T, GTF IT Security : +49 89 636 53403 :

More information

EIT ICT Labs The ICT Innovation Catalyst for Europe

EIT ICT Labs The ICT Innovation Catalyst for Europe Start-Chart EIT ICT Labs The ICT Innovation Catalyst for Europe Prof. Dr. Willem Jonker CEO willem.jonker@ictlabs.eu EIT ICT Labs mission is to turn Europe into a global leader in ICT Innovation Breed

More information

Hardware Security Modules for Protecting Embedded Systems

Hardware Security Modules for Protecting Embedded Systems Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &

More information

Reza Shokri Curriculum Vitae [1 of 5] Reza Shokri

Reza Shokri Curriculum Vitae [1 of 5] Reza Shokri Reza Shokri Curriculum Vitae [1 of 5] Reza Shokri Department of Computer Science, The University of Texas at Austin Visiting Cornell NYC Tech lastname@cs.utexas.edu http://www.shokri.org RESEARCH INTERESTS

More information

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is 1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the

More information

Best Paper Award, Hawaii International Conference on System Sciences, HICSS-36 (2003)

Best Paper Award, Hawaii International Conference on System Sciences, HICSS-36 (2003) Curriculum Vitae EDUCATION Monica N. Nicolescu Assistant Professor Department of Computer Science University of Nevada, Reno monica@cs.unr.edu http://www.cs.unr.edu/ monica June 1998 - May 2003: University

More information

Implementation and Direct Accessing of Android Authority Application in Smart Phones

Implementation and Direct Accessing of Android Authority Application in Smart Phones Implementation and Direct Accessing of Android Authority Application in Smart Phones Amit H. Choksi 1, Jaimin J. Sarvan 2 and Ronak R. Vashi 3 1 ET Dept, BVM Engg. College, V.V.Nagar-388120, Gujarat, India

More information

Security Evaluation of Mobile Device Integration with V2X Communication

Security Evaluation of Mobile Device Integration with V2X Communication Security Evaluation of Mobile Device Integration with V2X Communication Tim Leinmüller 1, Boris Atanassow 1, Stefan Diewald 2, Lutz-Peter Breyer 1 and Matthias Kranz 3 1 DENSO AUTOMOTIVE Deutschland GmbH,

More information

Applied and Integrated Security. C. Eckert

Applied and Integrated Security. C. Eckert Applied and Integrated Security 1 Joseph von Fraunhofer (1787-1826) Researcher discovery of Fraunhofer Lines in the sun spectrum Inventor new methods of lens processing Entrepreneur head of royal glass

More information

ACCESS CONTROL MANY FUNCTIONS. ONE SYSTEM. ONE CARD.

ACCESS CONTROL MANY FUNCTIONS. ONE SYSTEM. ONE CARD. MANY FUNCTIONS. ONE SYSTEM. ONE CARD. ACCESS CONTROL One card, centrally monitored and controlled provides access to doors, gates, turnstiles and lockers ACCESS CONTROL The Intelligent System from InterCard

More information

Wireless 100Gb/s and Beyond: A Special Focus Program of the German Scientific Foundation

Wireless 100Gb/s and Beyond: A Special Focus Program of the German Scientific Foundation Wireless 100Gb/s and Beyond: A Special Focus Program of the German Scientific Foundation Rolf Kraemer Technical University Cottbus IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany IHP Im Technologiepark

More information

National Research University - Higher School of Economics PhD programs. Elena Kobzar, Director for Graduate studies ekobzar@hse.ru

National Research University - Higher School of Economics PhD programs. Elena Kobzar, Director for Graduate studies ekobzar@hse.ru National Research University - Higher School of Economics PhD programs Elena Kobzar, Director for Graduate studies ekobzar@hse.ru 1 HSE: Key Facts November 27, 1992: The date HSE was created Since August

More information

Security in Vehicle Networks

Security in Vehicle Networks Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development

More information

Information Security and Cryptography

Information Security and Cryptography Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland Lecturers: David Basin, ETH Zurich Ueli Maurer, ETH Zurich ATG www.infsec.ch Program Starting 09:00

More information

Russian German Cooperation in EU Higher Education Programmes

Russian German Cooperation in EU Higher Education Programmes Russian German Cooperation in EU Higher Education Programmes Prof. Olga Oleynikova Director of the National Tempus Office, Russia Nina Salden, Head of Unit National Tempus Contact Point, DAAD, Germany

More information

How To Secure Cloud Infrastructure

How To Secure Cloud Infrastructure Trustworthy Clouds Underpinning the Future Internet Cloudscape III, Brussels, March 2011 Elmar Husmann, Corinna Schulze IBM 1 of 12 80% Of enterprises consider security the #1 inhibitor to cloud adoptions

More information

Security concept for gateway integrity protection within German smart grids

Security concept for gateway integrity protection within German smart grids Security concept for gateway integrity protection within German smart grids Prof. Dr. Kai-Oliver Detken DECOIT GmbH, Fahrenheitstr. 9, D-28359 Bremen Email: detken@decoit.de Carl-Heinz Genzel, Olav Hoffmann,

More information

Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security

Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security Information Security Group (ISG) From Smart Cards to NFC Smart Phone Security Information Security Group Activities Prof. Keith and Mayes Research From the Information Security Group ACE-CSR at Royal Holloway

More information

Erasmus Mundus Joint Doctorate Application Form

Erasmus Mundus Joint Doctorate Application Form Erasmus Mundus Joint Doctorate Application Form Application Deadline: All application material must be received by February 19, 2012. Early applications are encouraged. How to Apply to (EMJDs) Candidate

More information

RADSAGA Resubmission. First meeting. Steffen MUELLER Alexander KOELPIN. Institute for Electronics Engineering (LTE) University of Erlangen-Nuremberg

RADSAGA Resubmission. First meeting. Steffen MUELLER Alexander KOELPIN. Institute for Electronics Engineering (LTE) University of Erlangen-Nuremberg RADSAGA Resubmission First meeting Steffen MUELLER Alexander KOELPIN Institute for Electronics Engineering (LTE) University of Erlangen-Nuremberg Outline 1. Introducing LTE 2. RadHard activities 3. LTE

More information

Industrie 4.0; Sicherheitsmechanismen für die Produktion. 14. Deutscher IT-Sicherheitskongress; Andreas Philipp

Industrie 4.0; Sicherheitsmechanismen für die Produktion. 14. Deutscher IT-Sicherheitskongress; Andreas Philipp Industrie 4.0; Sicherheitsmechanismen für die Produktion 14. Deutscher IT-Sicherheitskongress; Andreas Philipp Utimaco HSM Aachen, Germany 2015 Page 1 At a glance 1... 2... 3... Headquarters in Aachen

More information

Industrie 4.0. Towards a Holistic Approach for Cyber Safety and Security

Industrie 4.0. Towards a Holistic Approach for Cyber Safety and Security Industrie 4.0 Towards a Holistic Approach for Cyber Safety and Security Prof. Dr.-Ing. Reiner Anderl Marco Grimm, M.Sc. Datenverarbeitung in der Konstruktion (DiK) Fachbereich Maschinenbau Technische Universität

More information

Security and the Internet of Things (IoT)

Security and the Internet of Things (IoT) Security and the Internet of Things (IoT) Analysis and Recommendations for IoT Manufacturers and IT/Business Executives Wei (Weslay) Xu Tuck School of Business at Dartmouth 03/20/2015 High Level Description

More information

Return-oriented programming without returns

Return-oriented programming without returns Faculty of Computer Science Institute for System Architecture, Operating Systems Group Return-oriented programming without urns S. Checkoway, L. Davi, A. Dmitrienko, A. Sadeghi, H. Shacham, M. Winandy

More information

Position Paper: Can the Web Really Use Secure Hardware?

Position Paper: Can the Web Really Use Secure Hardware? Position Paper: Can the Web Really Use Secure Hardware? Justin King-Lacroix 1 Department of Computer Science, University of Oxford justin.king-lacroix@cs.ox.ac.uk Abstract. The Web has become the platform

More information

Secure Services and Quality Testing SST. Security Engineering Privacy by Design Trusted Solutions. Mario Hoffmann. for Service Ecosystems

Secure Services and Quality Testing SST. Security Engineering Privacy by Design Trusted Solutions. Mario Hoffmann. for Service Ecosystems Secure Services and Quality Testing SST Security Engineering Privacy by Design Trusted Solutions for Service Ecosystems Mario Hoffmann Head of Department Fraunhofer AISEC in a nutshell Fraunhofer Profile

More information