Projects per year
Organisation profile
Introduction / mission
The interconnectivity and pervasiveness of computers and embedded systems is not only determining new functionalities, but is also opening the way to increasingly sophisticated attacks. In recent years the field of security has become a key focus of computer science research around the globe. The mission of the Security group (SEC), which is part of EPSI, the Eindhoven Institute for the Protection of Systems and Information, is to realize a more secure and privacy-preserving digital infrastructure. We believe this goal can only be achieved by investigating the overall cybersecurity problem, tackling the engineering, deployment, management, and maintenance perspectives of systems and ICT infrastructures. Our research interests are a reflection of this and span from security deployment and management, to physical security and attack engineering.
Highlighted phrase
The SEC group takes a multi-faceted approach to the full systems security process in order to counter today’s security challenges.
Organisation profile
Cybersecurity challenges are innumerable: from advanced and nation-state malware, evolving evasive attack techniques, to the new frontiers of IoT security, access control, and physical security. In reaction to this, SEC’s approach to system security covers offensive and defensive aspects of system security, targeting concrete security problems and addressing the underlying, fundamental issues. SEC’s strength lies in its ability to empirically and theoretically understand the full security process: from attack generation and system management, to policy specification and user aspects.
Research in the Security (SEC) group spans three areas vital to the security of decentralized and embedded systems:
- Security policy specification & enforcement
- Security of embedded systems
- Threat intelligence and defense
SEC sits at the intersection of these areas, addressing challenging operative and theoretical problems: for example, by monitoring underground activities and studying the techno-economic principles driving attack production, SEC maintains a unique perspective on the offensive side of computer security. This understanding is channeled into novel approaches such as new monitoring techniques to detect attacks targeting IT and IoT systems and new adaptive security and authentication mechanisms. SEC has made significant contributions to secure key storage in embedded systems by devising algorithms for randomness extraction from Physical Unclonable Functions (PUFs). Furthermore, SEC pioneered Quantum Readout of PUFs, an object authentication technology that is immune to spoofing.
Scientific staff: S. Etalle (HGL, 0.6 fte), W. Michiels (d-HLG, 0.2 fte), M. Petkovic (d-HLG, 0.2 fte), N. Zannone (UHD), L. Allodi (UD), J. den Hartog (UD), B. Škorić (UD), S. Sciancalepore (UD), E. Zambon (Researcher)
PhD students: A. Aarts, P. Burda, M. Campobasso, S. Clark, G.F.C. Dupont, A. Gallucci, B. Joudeh, L. Kersten, Ch. Leite da Silva, V. Liventsev, G. Mehri, M. Rosso, D.R. George, S. Kempinski
Fingerprint
Collaborations and top research areas from the last five years
Profiles
-
Luca Allodi
- Mathematics and Computer Science, Security - Associate Professor
- EAISI Foundational - Associate Professor
- Mathematics and Computer Science, Threat Analysis - Associate Professor
Person: UHD : Associate Professor, UD : Assistant Professor
-
Matteo Asuni
- Mathematics and Computer Science, Threat Analysis - Doctoral Candidate
Person: Prom. : doctoral candidate (PhD)
-
Sam Baggen
- Mathematics and Computer Science, Threat Analysis - ICT Developer
Person: OBP : Supportive and management staff
-
CATRIN: Controllable, Accountable, Transparent the Responsible Internet
Allodi, L. (Project Manager), Teuwen, K. (Project member) & Baggen, S. (Project member)
23/10/21 → 22/10/27
Project: Second tier
-
INTERSECT
Weffers, H. (Project Manager), Kempinski, S. (Project member), Meratnia, N. (Project member), Özçelebi, T. (Project member), van den Brand, M. G. J. (Project member), Kurtev, I. (Project member), Hatefi, Z. (Project member), Bibi, I. (Project member), Luyk, M. (Project communication officer), Leite, C. (Project member), Gankhuyag, G. (Project member), Allodi, L. (Project member), Bekkers, R. N. A. (Project member), Etalle, S. (Project member), Sciancalepore, S. (Project member), Özçelebi, T. (Project member) & den Hartog, J. I. (Project member)
1/09/20 → …
Project: Research direct
-
SECREDAS GA 783119
den Hartog, J. I. (Project member), Etalle, S. (Project member), Zannone, N. (Project Manager), Sheikhalishahi, M. (Project member), Cappers, B. C. M. (Project member), Dupont, G. (Project member), Le, D. (Project member), Gankhuyag, G. (Project member), Clark, S. (Project member), Aarts, A. A. (Project member), Ravidas, S. (Project member) & Zambon, E. (Project member)
1/05/18 → 31/10/21
Project: Research direct
-
A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography
Aquina, N. (Corresponding author), Cimoli, B., Das, S., Hövelmanns, K., Weber, F. J., Okonkwo, C., Rommel, S., Škorić, B., Monroy, I. T. & Verschoor, S., 6 May 2025, In: EPJ Quantum Technology. 12, 1, 42 p., 51.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile5 Citations (Scopus)84 Downloads (Pure) -
All in the Name of Artificial Intelligence: A Commentary on Linardon (2025)
Burger, P. (Corresponding author) & Ghosh, S. (Corresponding author), Jul 2025, In: International Journal of Eating Disorders. 58, 7, p. 1191-1195 5 p.Research output: Contribution to journal › Comment/Letter to the editor › Academic › peer-review
Open AccessFile4 Downloads (Pure) -
Anonymity
Bleumer, G. & Sciancalepore, S. (Corresponding author), 1 Jan 2025, Encyclopedia of Cryptography, Security and Privacy. Jajodia, S., Samarati, P. & Yung, M. (eds.). 3 ed. Springer Nature, p. 76-79 4 p.Research output: Chapter in Book/Report/Conference proceeding › Entry for encyclopedia/dictionary › Academic › peer-review
Equipment
-
BlackHat’s lab
Allodi, L. (Manager) & Gankhuyag, G. (Manager)
SecurityFacility/equipment: Research lab
-
IoT lab
Etalle, S. (Manager), Allodi, L. (Manager) & Zannone, N. (Manager)
SecurityFacility/equipment: Research lab
-
Security Operation Center lab
Allodi, L. (Manager) & Gankhuyag, G. (Manager)
SecurityFacility/equipment: Research lab
Datasets
-
SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers
Rosso, M. (Creator), Campobasso, M. (Creator), Gankhuyag, G. (Creator) & Allodi, L. (Creator), Eindhoven University of Technology, 7 Dec 2020
https://gitlab.tue.nl/saibersoc/acsac2020-artifacts
Dataset
-
BAS Attack Database and Attacker Characterization
Tommasini, M. (Creator) & Rosso, M. (Creator), Eindhoven University of Technology, 11 Jul 2022
DOI: 10.4121/19617243, https://gitlab.tue.nl/sec-lab/bas-security/basattacks
Dataset
-
THREAT/crawl: a Trainable, Highly-Reusable, and Extensible Automated Tool to Crawl Criminal Underground Forums
Campobasso, M. (Creator) & Allodi, L. (Creator), Eindhoven University of Technology, 30 Nov 2022
https://gitlab.tue.nl/threat-crawl/THREATcrawl/
Dataset
Prizes
-
2020 IEEE Security & Privacy Best Paper Award
Allodi, L. (Recipient), Chotza, T. (Recipient), Panina, K. (Recipient) & Zannone, N. (Recipient), 2020
Prize: Other › Career, activity or publication related prizes (lifetime, best paper, poster etc.) › Scientific
-
Best Paper Award at SACMAT 2025
Hasel Mehri, G. (Recipient), Morisset, C. (Recipient) & Zannone, N. (Recipient), 2025
Prize: Other › Career, activity or publication related prizes (lifetime, best paper, poster etc.) › Scientific
-
Best paper award at the 7th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2017)
Tax, N. (Recipient), Genga, L. (Recipient) & Zannone, N. (Recipient), 8 Dec 2017
Prize: Other › Career, activity or publication related prizes (lifetime, best paper, poster etc.) › Scientific
Activities
-
From Energy Distribution to Process-aware Intrusion Detection…and the Diversity of Cyber-Physical Systems in General
Rosso, M. (Speaker)
19 Sept 2023Activity: Talk or presentation types › Invited talk › Popular
-
The OTCAD attack database; highlights and uses
Rosso, M. (Speaker)
23 May 2023Activity: Talk or presentation types › Invited talk › Popular
-
Annual Computer Security Applications Conference (ACSAC) 2023 (Event)
Sciancalepore, S. (Editorial board member)
2023 → …Activity: Publication peer-review and editorial work types › Editorial activity › Scientific
Press/Media
-
IST graduate Jos Wigchert recognized for thesis excellence in Kooy Award 2025
24/04/25
1 Media contribution
Press/Media: Public Engagement Activities
-
-
Genesis Market gang tries to sell platform after FBI disruption
10/07/23
1 item of Media coverage
Press/Media: Expert Comment
Student theses
-
(In)security of video surveillance systems in building automation systems
Yeh, M. M. (Author), den Hartog, J. (Supervisor 1), Constante, E. (External coach) & Dagrada, M. (External coach), 29 Oct 2018Student thesis: Master
File -
3D Face Reconstruction Using Deep Learning
Jawahar, P. (Author), Medeiros de Carvalho, R. (Supervisor 1), Gallucci, A. (Supervisor 2) & Vanschoren, J. (Supervisor 2), 20 Jan 2020Student thesis: Master
File -
A2RID: An Anonymous RemoteID-compliant Group Signature Scheme for Commercial Drones
Wisse, E. M. C. (Author), Sciancalepore, S. (Supervisor 1), 17 Oct 2022Student thesis: Master
File