Projects per year
Organization profile
Introduction / mission
The interconnectivity and pervasiveness of computers and embedded systems is not only determining new functionalities, but is also opening the way to increasingly sophisticated attacks. In recent years the field of security has become a key focus of computer science research around the globe. The mission of the Security group (SEC), which is part of EPSI, the Eindhoven Institute for the Protection of Systems and Information, is to realize a more secure and privacy-preserving digital infrastructure. We believe this goal can only be achieved by investigating the overall cybersecurity problem, tackling the engineering, deployment, management, and maintenance perspectives of systems and ICT infrastructures. Our research interests are a reflection of this and span from security deployment and management, to physical security and attack engineering.
Highlighted phrase
The SEC group takes a multi-faceted approach to the full systems security process in order to counter today’s security challenges.
Organisational profile
Cybersecurity challenges are innumerable: from advanced and nation-state malware, evolving evasive attack techniques, to the new frontiers of IoT security, access control, and physical security. In reaction to this, SEC’s approach to system security covers offensive and defensive aspects of system security, targeting concrete security problems and addressing the underlying, fundamental issues. SEC’s strength lies in its ability to empirically and theoretically understand the full security process: from attack generation and system management, to policy specification and user aspects.
Research in the Security (SEC) group spans three areas vital to the security of decentralized and embedded systems:
- Security policy specification & enforcement
- Security of embedded systems
- Threat intelligence and defense
SEC sits at the intersection of these areas, addressing challenging operative and theoretical problems: for example, by monitoring underground activities and studying the techno-economic principles driving attack production, SEC maintains a unique perspective on the offensive side of computer security. This understanding is channeled into novel approaches such as new monitoring techniques to detect attacks targeting IT and IoT systems and new adaptive security and authentication mechanisms. SEC has made significant contributions to secure key storage in embedded systems by devising algorithms for randomness extraction from Physical Unclonable Functions (PUFs). Furthermore, SEC pioneered Quantum Readout of PUFs, an object authentication technology that is immune to spoofing.
Scientific staff: S. Etalle (HGL), W. Michiels (d-HLG, 0.2fte), M. Petkovic (d-HLG,0.2 fte), N. Zannone (UHD), L. Allodi (UD, joined 2017), J. den Hartog (UD), B. Škorić (UD)
Postdocs: Laura Genga, Alexios Lekidis (0fte), Daniel Ricardo dos Santos
PhD students: A. Abbasi, M. Alizadeh, A. Amadori, P. Burda, G. Dupont, D. Fauri, A. Gallucci, H. Van Le, D. Leermakers, S. Ravidas, T. Stanko, S. Thaler, S. Vavilis
Fingerprint
Network
Profiles
-
Arne A. Aarts, MSc
- Department of Mathematics and Computer Science, Security - Doctoral Candidate
Person: Prom. : doctoral candidate (PhD)
-
Luca Allodi
- Department of Mathematics and Computer Science, Security - Assistant Professor
Person: UD : Assistant Professor
-
Alessandro Amadori
- Department of Mathematics and Computer Science, Security - Former Doctoral Candidate
Person: Prom. : doctoral candidate (PhD)
Projects
- 1 Finished
-
OptiLight
Linnartz, J. M. G., Bonarius, J. H., de Kort, Y. A. W., Smolders, K. C. H. J., Vogels, I. M. L. C., Peeters, S. T., Dangol, R., Kruisselbrink, T. W., Özçelebi, T. & de Kort, Y. A. W.
1/11/16 → 31/10/20
Project: Research direct
Research output
-
Federated Self-Supervised Learning of Multi-Sensor Representations for Embedded Intelligence
Saeed, A., Salim, F. D., Ozcelebi, T. & Lukkien, J., 15 Jan 2021, In : IEEE Internet of Things Journal. 8, 2, p. 1030-1040 11 p., 9141293.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile -
A comparison of methods for 3D scene shape retrieval
Yuan, J., Abdul-Rashid, H., Li, B., Lu, Y., Schreck, T., Bai, S., Bai, X., Bui, N. M., Do, M. N., Do, T. L., Duong, A. D., He, K., He, X., Holenderski, M., Jarnikov, D., Le, T. K., Li, W., Liu, A., Liu, X., Menkovski, V. & 15 others, , Dec 2020, In : Computer Vision and Image Understanding. 201, 21 p., 103070.Research output: Contribution to journal › Article › Academic › peer-review
-
A Holistic Memory Contention Analysis for Parallel Real-Time Tasks under Partitioned Scheduling
Casini, D., Biondi, A., Nelissen, G. & Buttazzo, G., Apr 2020, Proceedings - 2020 IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2020. Institute of Electrical and Electronics Engineers, p. 239-252 14 p. 9113115Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
2 Citations (Scopus)
Prizes
-
Best paper award at the 7th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2017)
Niek Tax (Recipient), Genga, Laura (Recipient) & Zannone, Nicola (Recipient), 8 Dec 2017
Prize: Other › Career, activity or publication related prizes (lifetime, best paper, poster etc.) › Scientific
-
Best Paper Award of the 2004 IEEE 16th European Conference on Real-Time Systems (ECRTS)
C.C. Wüst (Recipient), L. Steffens (Recipient), Bril, Reinder J. (Recipient) & W.F.J. Verhaegh (Recipient), 1 Jul 2004
Prize: Other › Career, activity or publication related prizes (lifetime, best paper, poster etc.) › Scientific
File -
Best Paper Award of the 2011 IEEE 29th International Conference on Consumer Electronics (ICCE) - 2nd place winner
C. Tempelaars (Recipient), M.M.H.P. van den Heuvel (Recipient), Bril, Reinder J. (Recipient) & Christian Hentschel (Recipient), Jan 2011
Prize: Other › Career, activity or publication related prizes (lifetime, best paper, poster etc.) › Scientific
File
Activities
-
Eventpad: Cybercrime Analysis using Visual Analytics
Bram C.M. Cappers (Speaker)
27 Nov 2019Activity: Talk or presentation types › Invited talk › Professional
-
The Value of Data
Bram C.M. Cappers (Speaker)
13 Sep 2019Activity: Talk or presentation types › Invited talk › Professional
-
Visual Analytics 101
Bram C.M. Cappers (Speaker)
7 May 2019Activity: Talk or presentation types › Invited talk › Scientific
Press / Media
-
ACSAC 2020: Distinguished Paper with Artifact Award
Martin Rosso, Michele Campobasso, Ganduulga Gankhuyag & Luca Allodi
9/12/20
1 Media contribution
Press/Media: Public Engagement Activities
-
TU/e legt Russische handel in digitale 'fingerprints' bloot
Michele Campobasso & Luca Allodi
28/11/20
1 item of Media coverage
Press/Media: Public Engagement Activities
-
Latest In Cybersecurity Research Unveiled at ACM Conference on Computer and Communications Security
Luca Allodi & Michele Campobasso
19/11/20
1 item of Media coverage
Press/Media: Expert Comment
Student theses
-
(In)security of video surveillance systems in building automation systems
Author: Yeh, M., 29 Oct 2018Supervisor: den Hartog, J. (Supervisor 1), Constante, E. (External person) (External coach) & Dagrada, M. (External person) (External coach)
Student thesis: Master
File -
Accurate, automated and flexible privacy policy conflicts resolution in multiparty systems
Author: Darwish, K., 29 May 2017Supervisor: Zannone, N. (Supervisor 1)
Student thesis: Master
File -
Active learning in VAE latent space
Author: Tonnaer, L., 25 Sep 2017Supervisor: Menkovski, V. (Supervisor 1), Portegies, J. W. (Supervisor 2) & Holenderski, M. (Supervisor 2)
Student thesis: Master
File