Projects per year
Organisation profile
Introduction / mission
Research in the Security (SEC) group spans two areas vital to the security of decentralized and embedded systems, and has its center of gravity in the intersection of these areas. The two areas are security policy specification & enforcement and security of embedded systems.
Organisation profile
Policy Specification and Enforcement. While the Internet allows for a free exchange of data, the security boundaries needed to guarantee privacy and confidentiality have become the main obstacle to flexible cooperation within and between (virtual) organizations.
The classical preventive access control mechanisms cannot cope with heterogeneous distributed systems and they have to be at least partially replaced by more elaborate trust management and compliance control systems. This is where SEC expertise lies: in the specification and implementation of policies for distributed systems.
Security of Embedded Systems
Securing networked embedded systems is particularly challenging because of their lack of computational and physical resources. In this area, SEC focuses presently on the security of mobile (e.g. smart-card based) systems; for instance in the PinpasJC project we are studying side channel attacks on smart cards.
One of the challenges that embedded devices face is secure key storage. This issue is addressed by SEC's research on Physical Unclonable Functions, a novel approach based on the extraction of randomness from the physical components of the device itself. Also in this area and closely linked to coding and crypto we have the project PinpasJC (on the analysis of smart card algorithms to identify possible side-channel attacks).
These areas overlap to a great extent and their intersection forms the core of SEC's research: compliance control for distributed and embedded systems. SEC's approach is to start from a concrete security problem and solve it by addressing the fundamental issues behind it. SEC's strength lies precisely in the ability to understand deeply both the user's concern as well as the theory behind it.
Master's projects
There are many options for master thesis projects, both internal projects and projects in industry.
See the website for more information on the group and its projects.
Fingerprint
Collaborations and top research areas from the last five years
Profiles
-
Arne A. Aarts, MSc
- Mathematics and Computer Science, Security - Former Doctoral Candidate
Person: Prom. : doctoral candidate (PhD)
-
Luca Allodi
- Mathematics and Computer Science, Security - Associate Professor
- EAISI Foundational - Associate Professor
- Mathematics and Computer Science, Threat Analysis - Associate Professor
Person: UHD : Associate Professor, UD : Assistant Professor
-
INTERSECT
Weffers, H. (Project Manager), Kempinski, S. (Project member), Meratnia, N. (Project member), Özçelebi, T. (Project member), van den Brand, M. G. J. (Project member), Kurtev, I. (Project member), Hatefi, Z. (Project member), Bibi, I. (Project member), Luyk, M. (Project communication officer), Leite, C. (Project member), Gankhuyag, G. (Project member), Allodi, L. (Project member), Bekkers, R. N. A. (Project member), Etalle, S. (Project member), Sciancalepore, S. (Project member), Özçelebi, T. (Project member) & den Hartog, J. I. (Project member)
1/09/20 → …
Project: Research direct
-
SECREDAS GA 783119
den Hartog, J. I. (Project member), Etalle, S. (Project member), Zannone, N. (Project Manager), Sheikhalishahi, M. (Project member), Cappers, B. C. M. (Project member), Dupont, G. (Project member), Le, D. (Project member), Gankhuyag, G. (Project member), Clark, S. (Project member), Aarts, A. A. (Project member), Ravidas, S. (Project member) & Zambon, E. (Project member)
1/05/18 → 31/10/21
Project: Research direct
-
A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography
Aquina, N., Cimoli, B., Das, S., Hövelmanns, K., Weber, F. J., Okonkwo, C., Rommel, S., Škorić, B., Monroy, I. T. & Verschoor, S., 6 Feb 2025, International Association for Cryptologic Research, 40 p.Research output: Working paper › Preprint › Professional
Open AccessFile -
A Security Alert Investigation Tool Supporting Tier 1 Analysts in Contextualizing and Understanding Network Security Events
Kersten, L., Darré, S., Mulders, T., Zambon, E., Caselli, M., Snijders, C. C. P. & Allodi, L., 18 Mar 2025, 2024 Annual Computer Security Applications Conference, ACSAC 2024. Institute of Electrical and Electronics Engineers, p. 890-905 16 p. 10917883Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
File201 Downloads (Pure) -
Interpretable modelling and visualization of biomedical data
Ghosh, S. (Corresponding author), Baranowski, E. S., Biehl, M., Arlt, W., Tino, P. & Bunte, K., 14 Apr 2025, In: Neurocomputing. 626, 19 p., 129405.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile4 Downloads (Pure)
Equipment
-
BlackHat’s lab
Allodi, L. (Manager) & Gankhuyag, G. (Manager)
SecurityFacility/equipment: Research lab
-
IoT lab
Etalle, S. (Manager), Allodi, L. (Manager) & Zannone, N. (Manager)
SecurityFacility/equipment: Research lab
-
Security Operation Center lab
Allodi, L. (Manager) & Gankhuyag, G. (Manager)
SecurityFacility/equipment: Research lab
Datasets
-
SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers
Rosso, M. (Creator), Campobasso, M. (Creator), Gankhuyag, G. (Creator) & Allodi, L. (Creator), Eindhoven University of Technology, 7 Dec 2020
https://gitlab.tue.nl/saibersoc/acsac2020-artifacts
Dataset
-
Cognition in Social Engineering Empirical Research: a Systematic Literature Review
Burda, P. (Creator), Allodi, L. (Creator) & Zannone, N. (Creator), Zenodo, 3 Oct 2023
DOI: 10.5281/zenodo.8380243, https://zenodo.org/records/8380243
Dataset
-
Measuring the "Cost" of CPS Attacks: Not all CPS Networks are Created Equal Dataset
Rosso, M. (Creator), Eindhoven University of Technology, 2024
DOI: 10.4121/2cd80dea-9eea-4dfb-b0d3-3e72c0e47804
Dataset
Prizes
-
2020 IEEE Security & Privacy Best Paper Award
Allodi, L. (Recipient), Chotza, T. (Recipient), Panina, K. (Recipient) & Zannone, N. (Recipient), 2020
Prize: Other › Career, activity or publication related prizes (lifetime, best paper, poster etc.) › Scientific
-
Distinguished paper award
Burda, P. (Recipient), Allodi, L. (Recipient), Serebrenik, A. (Recipient) & Zannone, N. (Recipient), 1 Oct 2024
Prize: Other › Career, activity or publication related prizes (lifetime, best paper, poster etc.) › Scientific
-
Distinguished Paper with Artifacts Award
Rosso, M. (Recipient), Campobasso, M. (Recipient), Gankhuyag, G. (Recipient) & Allodi, L. (Recipient), 9 Dec 2020
Prize: Other › Career, activity or publication related prizes (lifetime, best paper, poster etc.) › Scientific
-
From Energy Distribution to Process-aware Intrusion Detection…and the Diversity of Cyber-Physical Systems in General
Rosso, M. (Speaker)
19 Sept 2023Activity: Talk or presentation types › Invited talk › Popular
-
The OTCAD attack database; highlights and uses
Rosso, M. (Speaker)
23 May 2023Activity: Talk or presentation types › Invited talk › Popular
-
Annual Computer Security Applications Conference (ACSAC) 2023 (Event)
Sciancalepore, S. (Editorial board member)
2023 → …Activity: Publication peer-review and editorial work types › Editorial activity › Scientific
Press/Media
-
Information Security Technology track graduate Eva Wisse wins Kooy Prize 2023
24/04/23
1 item of Media coverage
Press/Media: Public Engagement Activities
-
Properties and Applications of Entanglement of (In)-distinguishable Particles
29/04/22
1 item of Media coverage
Press/Media: Expert Comment
-
ACSAC 2020: Distinguished Paper with Artifact Award
Rosso, M., Campobasso, M., Gankhuyag, G. & Allodi, L.
9/12/20
1 Media contribution
Press/Media: Public Engagement Activities
Student theses
-
3D Face Reconstruction Using Deep Learning
Jawahar, P. (Author), Medeiros de Carvalho, R. (Supervisor 1), Gallucci, A. (Supervisor 2) & Vanschoren, J. (Supervisor 2), 20 Jan 2020Student thesis: Master
File -
A2RID: An Anonymous RemoteID-compliant Group Signature Scheme for Commercial Drones
Wisse, E. M. C. (Author), Sciancalepore, S. (Supervisor 1), 17 Oct 2022Student thesis: Master
File -
Account Sharing Detection In Web Login
Swinkels, J. (Author), Zannone, N. (Supervisor 1), 2021Student thesis: Bachelor
File