• Groene Loper 5, Metaforum

    5612 AP Eindhoven


  • P.O. Box 513, Department of Mathematics and Information Science

    5600 MB Eindhoven


Organization profile

Introduction / mission

The interconnectivity and pervasiveness of computers and embedded systems is not only determining new functionalities, but is also opening the way to increasingly sophisticated attacks. In recent years the field of security has become a key focus of computer science research around the globe. The mission of the Security group (SEC), which is part of EPSI, the Eindhoven Institute for the Protection of Systems and Information, is to realize a more secure and privacy-preserving digital infrastructure. We believe this goal can only be achieved by investigating the overall cybersecurity problem, tackling the engineering, deployment, management, and maintenance perspectives of systems and ICT infrastructures. Our research interests are a reflection of this and span from security deployment and management, to physical security and attack engineering.

Highlighted phrase

The SEC group takes a multi-faceted approach to the full systems security process in order to counter today’s security challenges.

Organisational profile

Cybersecurity challenges are innumerable: from advanced and nation-state malware, evolving evasive attack techniques, to the new frontiers of IoT security, access control, and physical security. In reaction to this, SEC’s approach to system security covers offensive and defensive aspects of system security, targeting concrete security problems and addressing the underlying, fundamental issues. SEC’s strength lies in its ability to empirically and theoretically understand the full security process: from attack generation and system management, to policy specification and user aspects.

Research in the Security (SEC) group spans three areas vital to the security of decentralized and embedded systems:

  • Security policy specification & enforcement
  • Security of embedded systems
  • Threat intelligence and defense

SEC sits at the intersection of these areas, addressing challenging operative and theoretical problems: for example, by monitoring underground activities and studying the techno-economic principles driving attack production, SEC maintains a unique perspective on the offensive side of computer security. This understanding is channeled into novel approaches such as new monitoring techniques to detect attacks targeting IT and IoT systems and new adaptive security and authentication mechanisms. SEC has made significant contributions to secure key storage in embedded systems by devising algorithms for randomness extraction from Physical Unclonable Functions (PUFs). Furthermore, SEC pioneered Quantum Readout of PUFs, an object authentication technology that is immune to spoofing.

Scientific staff:  S. Etalle (HGL), W. Michiels (d-HLG, 0.2fte), M. Petkovic (d-HLG,0.2 fte), N. Zannone (UHD), L. Allodi (UD, joined 2017), J. den Hartog (UD), B. Škorić (UD)

Postdocs: Laura Genga, Alexios Lekidis (0fte), Daniel Ricardo dos Santos

PhD students: A. Abbasi, M. Alizadeh, A. Amadori, P. Burda, G. Dupont, D. Fauri, A. Gallucci, H. Van Le, D. Leermakers, S. Ravidas, T. Stanko, S. Thaler, S. Vavilis

Fingerprint Dive into the research topics where Security W&I is active. These topic labels come from the works of this organisation's members. Together they form a unique fingerprint.

Scheduling Engineering & Materials Science
Access control Engineering & Materials Science
Real time systems Engineering & Materials Science
Cryptography Engineering & Materials Science
Network protocols Engineering & Materials Science
Data storage equipment Engineering & Materials Science
Synchronization Engineering & Materials Science
Communication Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2016 2020


Linnartz, J. M. G., Bonarius, J. H., de Kort, Y. A. W., Smolders, K. C. H. J., Vogels, I. M. L. C., Peeters, S. T., Dangol, R., Kruisselbrink, T. W., Özçelebi, T., Eijkemans, C., Vereggen - Tielemans, T., Vereggen - Tielemans, T., de Kort, Y. A. W. & Hegh, L.


Project: Research direct

Research Output 1994 2020

Design of practical IoT identification methods: deliverable 2.2, Month 34, Nov 2019

Razeghi, B., Voloshynovskiy, S., Gheisari, M., Furon, T., Amsaleg, L., Leermakers, D. & Škorić, B., Jan 2020, Eindhoven: Technische Universiteit Eindhoven. 90 p. (Computer Science Reports; vol. 20-01)

Research output: Book/ReportReportAcademic

Open Access

Enhancing the performance and security of Helper Data Systems

Stanko, T., 23 Jan 2020, (Accepted/In press) Eindhoven: Technische Universiteit Eindhoven.

Research output: ThesisPhd Thesis 1 (Research TU/e / Graduation TU/e)

Open Access
1 Citation (Scopus)

Access control in Internet-of-Things: a survey

Ravidas, S., Lekidis, A., Paci, F. & Zannone, N., 15 Oct 2019, In : Journal of Network and Computer Applications. 144, p. 79-101 23 p.

Research output: Contribution to journalArticleAcademicpeer-review

Access control
Internet of things


Best paper award at the 7th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2017)

Niek Tax (Recipient), L. Genga (Recipient) & N. Zannone (Recipient), 8 Dec 2017

Prize: OtherCareer, activity or publication related prizes (lifetime, best paper, poster etc.)Scientific

Best Paper Award of the 2004 IEEE 16th European Conference on Real-Time Systems (ECRTS)

C.C. Wüst (Recipient), L. Steffens (Recipient), Reinder J. Bril (Recipient) & W.F.J. Verhaegh (Recipient), 1 Jul 2004

Prize: OtherCareer, activity or publication related prizes (lifetime, best paper, poster etc.)Scientific

Real time systems
Quality of service

Best Paper Award of the 2011 IEEE 29th International Conference on Consumer Electronics (ICCE) - 2nd place winner

C. Tempelaars (Recipient), M.M.H.P. van den Heuvel (Recipient), Reinder J. Bril (Recipient) & Christian Hentschel (Recipient), Jan 2011

Prize: OtherCareer, activity or publication related prizes (lifetime, best paper, poster etc.)Scientific

Consumer electronics

Activities 1999 2019

Eventpad: Cybercrime Analysis using Visual Analytics

Bram C.M. Cappers (Speaker)
27 Nov 2019

Activity: Talk or presentation typesInvited talkProfessional

The Value of Data

Bram C.M. Cappers (Speaker)
13 Sep 2019

Activity: Talk or presentation typesInvited talkProfessional

Visual Analytics 101

Bram C.M. Cappers (Speaker)
7 May 2019

Activity: Talk or presentation typesInvited talkScientific

Student theses

(In)security of video surveillance systems in building automation systems

Author: Yeh, M., 29 Oct 2018

Supervisor: den Hartog, J. (Supervisor 1), Constante, E. (External person) (External coach) & Dagrada, M. (External person) (External coach)

Student thesis: Master


Accurate, automated and flexible privacy policy conflicts resolution in multiparty systems

Author: Darwish, K., 29 May 2017

Supervisor: Zannone, N. (Supervisor 1)

Student thesis: Master


Active learning in VAE latent space

Author: Tonnaer, L., 25 Sep 2017

Supervisor: Menkovski, V. (Supervisor 1), Portegies, J. W. (Supervisor 2) & Holenderski, M. (Supervisor 2)

Student thesis: Master