Projects per year
Organisation profile
Introduction / mission
The interconnectivity and pervasiveness of computers and embedded systems is not only determining new functionalities, but is also opening the way to increasingly sophisticated attacks. In recent years the field of security has become a key focus of computer science research around the globe. The mission of the Security group (SEC), which is part of EPSI, the Eindhoven Institute for the Protection of Systems and Information, is to realize a more secure and privacy-preserving digital infrastructure. We believe this goal can only be achieved by investigating the overall cybersecurity problem, tackling the engineering, deployment, management, and maintenance perspectives of systems and ICT infrastructures. Our research interests are a reflection of this and span from security deployment and management, to physical security and attack engineering.
Highlighted phrase
The SEC group takes a multi-faceted approach to the full systems security process in order to counter today’s security challenges.
Organisational profile
Cybersecurity challenges are innumerable: from advanced and nation-state malware, evolving evasive attack techniques, to the new frontiers of IoT security, access control, and physical security. In reaction to this, SEC’s approach to system security covers offensive and defensive aspects of system security, targeting concrete security problems and addressing the underlying, fundamental issues. SEC’s strength lies in its ability to empirically and theoretically understand the full security process: from attack generation and system management, to policy specification and user aspects.
Research in the Security (SEC) group spans three areas vital to the security of decentralized and embedded systems:
- Security policy specification & enforcement
- Security of embedded systems
- Threat intelligence and defense
SEC sits at the intersection of these areas, addressing challenging operative and theoretical problems: for example, by monitoring underground activities and studying the techno-economic principles driving attack production, SEC maintains a unique perspective on the offensive side of computer security. This understanding is channeled into novel approaches such as new monitoring techniques to detect attacks targeting IT and IoT systems and new adaptive security and authentication mechanisms. SEC has made significant contributions to secure key storage in embedded systems by devising algorithms for randomness extraction from Physical Unclonable Functions (PUFs). Furthermore, SEC pioneered Quantum Readout of PUFs, an object authentication technology that is immune to spoofing.
Scientific staff: S. Etalle (HGL, 0.6 fte), W. Michiels (d-HLG, 0.2 fte), M. Petkovic (d-HLG, 0.2 fte), N. Zannone (UHD), L. Allodi (UD), J. den Hartog (UD), B. Škorić (UD), S. Sciancalepore (UD), E. Zambon (Researcher)
PhD students: A. Aarts, P. Burda, M. Campobasso, S. Clark, G.F.C. Dupont, A. Gallucci, B. Joudeh, L. Kersten, Ch. Leite da Silva, V. Liventsev, G. Mehri, M. Rosso, D.R. George, S. Kempinski
Fingerprint
Collaborations and top research areas from the last five years
Profiles
-
Arne A. Aarts, MSc
- Mathematics and Computer Science, Security - Doctoral Candidate
Person: Prom. : doctoral candidate (PhD)
-
Luca Allodi
- Mathematics and Computer Science, Security - Associate Professor
- EAISI Foundational - Associate Professor
Person: UHD : Associate Professor, UD : Assistant Professor
-
Pavlo Burda, MSc
- Mathematics and Computer Science, Security - Doctoral Candidate-TA
Person: Prom. : doctoral candidate (PhD), OWP : University Teacher / Researcher
-
CATRIN: Controllable, Accountable, Transparent the Responsible Internet
23/10/21 → 22/10/27
Project: Research direct
-
INTERSECT
Weffers, H., Kempinski, S., Meratnia, N., Özçelebi, T., van den Brand, M. G. J., Kurtev, I., Hatefi, Z., Bibi, I., Luyk, M., Leite da Silva, C., Gankhuyag, G., Allodi, L., Bekkers, R. N. A., Etalle, S., Sciancalepore, S., Özçelebi, T. & den Hartog, J. I.
1/09/20 → …
Project: Research direct
-
SECREDAS GA 783119
den Hartog, J. I., Etalle, S., Zannone, N., Sheikhalishahi, M., Cappers, B. C. M., Dupont, G., Le, D., Gankhuyag, G., Clark, S., Aarts, A. A., Ravidas, S. & Zambon-Mazzocato, E.
1/05/18 → 31/10/21
Project: Research direct
-
A2RID -Anonymous Direct Authentication and Remote Identification of Commercial Drones
Wisse, E., Tedeschi, P., Sciancalepore, S. & Di Pietro, R., 15 Jun 2023, In: IEEE Internet of Things Journal. 10, 12, p. 10587-10604 18 p., 10029376.Research output: Contribution to journal › Article › Academic › peer-review
1 Citation (Scopus) -
A Comprehensive Study on Third-Party User Tracking in Mobile Applications
Paci, F., Pizzoli, J. & Zannone, N., 29 Aug 2023, ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings. Association for Computing Machinery, Inc, 97. (ACM International Conference Proceeding Series).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Open Access -
A Dataset of physical-layer measurements in indoor wireless jamming scenarios
Alhazbi, S., Sciancalepore, S. & Oligeri, G., Feb 2023, In: Data in Brief. 46, 8 p., 108773.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile19 Downloads (Pure)
Equipment
-
BlackHat’s lab
Luca Allodi (Manager) & Ganduulga Gankhuyag (Manager)
SecurityFacility/equipment: Research lab
-
IoT lab
Sandro Etalle (Manager), Luca Allodi (Manager) & Nicola Zannone (Manager)
SecurityFacility/equipment: Research lab
-
Security Operation Center lab
Luca Allodi (Manager) & Ganduulga Gankhuyag (Manager)
SecurityFacility/equipment: Research lab
Datasets
-
SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers
Rosso, M. (Creator), Campobasso, M. (Creator), Gankhuyag, G. (Creator) & Allodi, L. (Creator), Eindhoven University of Technology, 7 Dec 2020
https://gitlab.tue.nl/saibersoc/acsac2020-artifacts
Dataset
-
Data underlying the publication: Model-based simulation and threat analysis of in-vehicle networks
Lekidis, A. (Creator) & Barosan, I. (Contributor), 4TU.Centre for Research Data, 11 Nov 2019
DOI: 10.4121/uuid:43484fbd-e8a9-4884-b094-1eee9f69f458
Dataset
-
Automotive Controller Area Network (CAN) Bus Intrusion Dataset v2
Dupont, G. (Contributor), Lekidis, A. (Contributor), den Hartog, J. I. (Contributor) & Etalle, S. (Contributor), 4TU.Centre for Research Data, 14 Nov 2019
DOI: 10.4121/uuid:b74b4928-c377-4585-9432-2004dfa20a5d
Dataset
Prizes
-
2020 IEEE Security & Privacy Best Paper Award
Allodi, Luca (Recipient), Chotza, Tzouliano (Recipient), Panina, Katia (Recipient) & Zannone, Nicola (Recipient), 2020
Prize: Other › Career, activity or publication related prizes (lifetime, best paper, poster etc.) › Scientific
-
Best paper award at the 7th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2017)
Tax, Niek (Recipient), Genga, Laura (Recipient) & Zannone, Nicola (Recipient), 8 Dec 2017
Prize: Other › Career, activity or publication related prizes (lifetime, best paper, poster etc.) › Scientific
-
Best Paper Award of the 2004 IEEE 16th European Conference on Real-Time Systems (ECRTS)
Wüst, C.C. (Recipient), Steffens, L. (Recipient), Bril, Reinder J. (Recipient) & Verhaegh, W.F.J. (Recipient), 1 Jul 2004
Prize: Other › Career, activity or publication related prizes (lifetime, best paper, poster etc.) › Scientific
File
Activities
-
From Energy Distribution to Process-aware Intrusion Detection…and the Diversity of Cyber-Physical Systems in General
Martin Rosso (Speaker)
19 Sept 2023Activity: Talk or presentation types › Invited talk › Popular
-
The OTCAD attack database; highlights and uses
Martin Rosso (Speaker)
23 May 2023Activity: Talk or presentation types › Invited talk › Popular
-
International Journal of Information Security (Journal)
Savio Sciancalepore (Editorial board member)
2023Activity: Publication peer-review and editorial work types › Editorial activity › Scientific
Press/Media
-
Information Security Technology track graduate Eva Wisse wins Kooy Prize 2023
24/04/23
1 item of Media coverage
Press/Media: Public Engagement Activities
-
Properties and Applications of Entanglement of (In)-distinguishable Particles
29/04/22
1 item of Media coverage
Press/Media: Expert Comment
-
ACSAC 2020: Distinguished Paper with Artifact Award
Martin Rosso, Michele Campobasso, Ganduulga Gankhuyag & Luca Allodi
9/12/20
1 Media contribution
Press/Media: Public Engagement Activities
Student theses
-
(In)security of video surveillance systems in building automation systems
Author: Yeh, M. M., 29 Oct 2018Supervisor: den Hartog, J. (Supervisor 1), Constante, E. (External person) (External coach) & Dagrada, M. (External person) (External coach)
Student thesis: Master
File -
3D Face Reconstruction Using Deep Learning
Author: Jawahar, P., 20 Jan 2020Supervisor: Medeiros de Carvalho, R. (Supervisor 1), Gallucci, A. (Supervisor 2) & Vanschoren, J. (Supervisor 2)
Student thesis: Master
File -
A2RID: An Anonymous RemoteID-compliant Group Signature Scheme for Commercial Drones
Author: Wisse, E. M. C., 17 Oct 2022Supervisor: Sciancalepore, S. (Supervisor 1)
Student thesis: Master
File