• Groene Loper 5, Metaforum

    5612 AP Eindhoven

    Netherlands

  • P.O. Box 513, Department of Mathematics and Information Science

    5600 MB Eindhoven

    Netherlands

Organization profile

Introduction / mission

The interconnectivity and pervasiveness of computers and embedded systems is not only determining new functionalities, but is also opening the way to increasingly sophisticated attacks. In recent years the field of security has become a key focus of computer science research around the globe. The mission of the Security group (SEC), which is part of EPSI, the Eindhoven Institute for the Protection of Systems and Information, is to realize a more secure and privacy-preserving digital infrastructure. We believe this goal can only be achieved by investigating the overall cybersecurity problem, tackling the engineering, deployment, management, and maintenance perspectives of systems and ICT infrastructures. Our research interests are a reflection of this and span from security deployment and management, to physical security and attack engineering.

Highlighted phrase

The SEC group takes a multi-faceted approach to the full systems security process in order to counter today’s security challenges.

Organisational profile

Cybersecurity challenges are innumerable: from advanced and nation-state malware, evolving evasive attack techniques, to the new frontiers of IoT security, access control, and physical security. In reaction to this, SEC’s approach to system security covers offensive and defensive aspects of system security, targeting concrete security problems and addressing the underlying, fundamental issues. SEC’s strength lies in its ability to empirically and theoretically understand the full security process: from attack generation and system management, to policy specification and user aspects.

Research in the Security (SEC) group spans three areas vital to the security of decentralized and embedded systems:

  • Security policy specification & enforcement
  • Security of embedded systems
  • Threat intelligence and defense

SEC sits at the intersection of these areas, addressing challenging operative and theoretical problems: for example, by monitoring underground activities and studying the techno-economic principles driving attack production, SEC maintains a unique perspective on the offensive side of computer security. This understanding is channeled into novel approaches such as new monitoring techniques to detect attacks targeting IT and IoT systems and new adaptive security and authentication mechanisms. SEC has made significant contributions to secure key storage in embedded systems by devising algorithms for randomness extraction from Physical Unclonable Functions (PUFs). Furthermore, SEC pioneered Quantum Readout of PUFs, an object authentication technology that is immune to spoofing.

Scientific staff:  S. Etalle (HGL), W. Michiels (d-HLG, 0.2fte), M. Petkovic (d-HLG,0.2 fte), N. Zannone (UHD), L. Allodi (UD, joined 2017), J. den Hartog (UD), B. Škorić (UD)

Postdocs: Laura Genga, Alexios Lekidis (0fte), Daniel Ricardo dos Santos

PhD students: A. Abbasi, M. Alizadeh, A. Amadori, P. Burda, G. Dupont, D. Fauri, A. Gallucci, H. Van Le, D. Leermakers, S. Ravidas, T. Stanko, S. Thaler, S. Vavilis

Fingerprint Dive into the research topics where Security W&I is active. These topic labels come from the works of this organisation's members. Together they form a unique fingerprint.

  • Network Recent external collaboration on country level. Dive into details by clicking on the dots.

    Projects

    Research Output

    A latitudinal study on the use of sequential and concurrency patterns in deviance mining

    Genga, L., Potena, D., Chiorrini, A., Diamantini, C. & Zannone, N., 1 Jan 2020, Studies in Computational Intelligence. Appice, A., Ceci, M., Loglisci, C., Manco, G., Masciari, E. & Ras, Z. (eds.). Cham: Springer, p. 103-119 17 p. (Studies in Computational Intelligence; vol. 880).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

  • 1 Downloads (Pure)

    An authorization framework for cooperative intelligent transport systems

    Ravidas, S., Karkhanis, P., Dajsuren, Y. & Zannone, N., 1 Jan 2020, Emerging Technologies for Authorization and Authentication - 2nd International Workshop, ETAA 2019, Proceedings. Saracino, A. & Mori, P. (eds.). Cham: Springer, p. 16-34 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11967 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 2 Downloads (Pure)

    A post-contingency power flow emulator for generalized probabilistic risks assessment of power grids

    Rocchetta, R. & Patelli, E., May 2020, In : Reliability Engineering and System Safety. 197, 12 p., 106817.

    Research output: Contribution to journalArticleAcademicpeer-review

  • Prizes

    Best paper award at the 7th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2017)

    Niek Tax (Recipient), L. Genga (Recipient) & N. Zannone (Recipient), 8 Dec 2017

    Prize: OtherCareer, activity or publication related prizes (lifetime, best paper, poster etc.)Scientific

    Best Paper Award of the 2004 IEEE 16th European Conference on Real-Time Systems (ECRTS)

    C.C. Wüst (Recipient), L. Steffens (Recipient), Reinder J. Bril (Recipient) & W.F.J. Verhaegh (Recipient), 1 Jul 2004

    Prize: OtherCareer, activity or publication related prizes (lifetime, best paper, poster etc.)Scientific

    File
  • Best Paper Award of the 2011 IEEE 29th International Conference on Consumer Electronics (ICCE) - 2nd place winner

    C. Tempelaars (Recipient), M.M.H.P. van den Heuvel (Recipient), Reinder J. Bril (Recipient) & Christian Hentschel (Recipient), Jan 2011

    Prize: OtherCareer, activity or publication related prizes (lifetime, best paper, poster etc.)Scientific

    File
  • Activities

    Eventpad: Cybercrime Analysis using Visual Analytics

    Bram C.M. Cappers (Speaker)
    27 Nov 2019

    Activity: Talk or presentation typesInvited talkProfessional

    The Value of Data

    Bram C.M. Cappers (Speaker)
    13 Sep 2019

    Activity: Talk or presentation typesInvited talkProfessional

    Visual Analytics 101

    Bram C.M. Cappers (Speaker)
    7 May 2019

    Activity: Talk or presentation typesInvited talkScientific

    Student theses

    (In)security of video surveillance systems in building automation systems

    Author: Yeh, M., 29 Oct 2018

    Supervisor: den Hartog, J. (Supervisor 1), Constante, E. (External person) (External coach) & Dagrada, M. (External person) (External coach)

    Student thesis: Master

    File

    6LoWPAN: IPv6 for battery-less building networks

    Author: Abbasi, N., 31 Aug 2009

    Supervisor: Lukkien, J. (Supervisor 1), van der Stok, P. (Supervisor 2), Geilen, M. (Supervisor 2) & Verhoeven, P. (Supervisor 2)

    Student thesis: Master

    File

    Accelerating SIFT feature extraction with a vector DSP: a feasibility study

    Author: Sathyanarayana Prasad, A., 31 Aug 2014

    Supervisor: van Berkel, C. (Supervisor 1), van Kampen, D. (External person) (External coach), Kloosterhuis, W. (External coach) & Goossens, K. (Supervisor 2)

    Student thesis: Master

    File