• Groene Loper 5, Metaforum

    5612 AP Eindhoven

    Netherlands

  • P.O. Box 513, Department of Mathematics and Information Science

    5600 MB Eindhoven

    Netherlands

Organization profile

Introduction / mission

The interconnectivity and pervasiveness of computers and embedded systems is not only determining new functionalities, but is also opening the way to increasingly sophisticated attacks. In recent years the field of security has become a key focus of computer science research around the globe. The mission of the Security group (SEC), which is part of EPSI, the Eindhoven Institute for the Protection of Systems and Information, is to realize a more secure and privacy-preserving digital infrastructure. We believe this goal can only be achieved by investigating the overall cybersecurity problem, tackling the engineering, deployment, management, and maintenance perspectives of systems and ICT infrastructures. Our research interests are a reflection of this and span from security deployment and management, to physical security and attack engineering.

Highlighted phrase

The SEC group takes a multi-faceted approach to the full systems security process in order to counter today’s security challenges.

Organisational profile

Cybersecurity challenges are innumerable: from advanced and nation-state malware, evolving evasive attack techniques, to the new frontiers of IoT security, access control, and physical security. In reaction to this, SEC’s approach to system security covers offensive and defensive aspects of system security, targeting concrete security problems and addressing the underlying, fundamental issues. SEC’s strength lies in its ability to empirically and theoretically understand the full security process: from attack generation and system management, to policy specification and user aspects.

Research in the Security (SEC) group spans three areas vital to the security of decentralized and embedded systems:

  • Security policy specification & enforcement
  • Security of embedded systems
  • Threat intelligence and defense

SEC sits at the intersection of these areas, addressing challenging operative and theoretical problems: for example, by monitoring underground activities and studying the techno-economic principles driving attack production, SEC maintains a unique perspective on the offensive side of computer security. This understanding is channeled into novel approaches such as new monitoring techniques to detect attacks targeting IT and IoT systems and new adaptive security and authentication mechanisms. SEC has made significant contributions to secure key storage in embedded systems by devising algorithms for randomness extraction from Physical Unclonable Functions (PUFs). Furthermore, SEC pioneered Quantum Readout of PUFs, an object authentication technology that is immune to spoofing.

Scientific staff:  S. Etalle (HGL), W. Michiels (d-HLG, 0.2fte), M. Petkovic (d-HLG,0.2 fte), N. Zannone (UHD), L. Allodi (UD, joined 2017), J. den Hartog (UD), B. Škorić (UD)

Postdocs: Laura Genga, Alexios Lekidis (0fte), Daniel Ricardo dos Santos

PhD students: A. Abbasi, M. Alizadeh, A. Amadori, P. Burda, G. Dupont, D. Fauri, A. Gallucci, H. Van Le, D. Leermakers, S. Ravidas, T. Stanko, S. Thaler, S. Vavilis

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2016 2020

OptiLight

Linnartz, J., Bonarius, J., de Kort, Y., Smolders, K., Vogels, I., Peeters, S., Dangol, R., Kruisselbrink, T., Ozcelebi, T., Eijkemans, C., Vereggen - Tielemans, T., Vereggen - Tielemans, T. & de Kort, Y.

1/11/1631/10/20

Project: Research direct

Research Output 1994 2019

Access control in Internet-of-Things: a survey

Ravidas, S., Lekidis, A., Paci, F. & Zannone, N., 15 Oct 2019, In : Journal of Network and Computer Applications. 144, p. 79-101 23 p.

Research output: Contribution to journalArticleAcademicpeer-review

Access control
Internet of things
Ecosystems
Industry

Accurate ILP-based contention modeling on statically scheduled multicore systems

Palomo, X., Mezzetti, E., Abella, J., Bril, R. J. & Cazorla, F. J., 1 Apr 2019, Proceedings - 25th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2019. Brandenburg, B. B. (ed.). Piscataway: Institute of Electrical and Electronics Engineers, p. 15-28 14 p. 8743282

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Inductive logic programming (ILP)
Scheduling
Hardware
Industry

A retargetable fault injection framework for safety validation of autonomous vehicles

Fu, Y., Terechko, A., Bijlsma, T., Cuijpers, P. J. L., Redegeld, J. & Ors, A. O., 9 May 2019, 2019 IEEE International Conference on Software Architecture - Companion, ICSA-C 2019. Piscataway: Institute of Electrical and Electronics Engineers, p. 69-76 8 p. 8712351

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Hardware
User interfaces
Electronic equipment
Health
Robots

Prizes

Best paper award at the 7th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2017)

Niek Tax (Recipient), Laura Genga (Recipient) & Nicola Zannone (Recipient), 8 Dec 2017

Recognition: OtherCareer, activity or publication related prizes (lifetime, best paper, poster etc.)Scientific

Best Paper Award of the 2004 IEEE 16th European Conference on Real-Time Systems (ECRTS)

C.C. Wüst (Recipient), L. Steffens (Recipient), Reinder Bril (Recipient) & W.F.J. Verhaegh (Recipient), 1 Jul 2004

Recognition: OtherCareer, activity or publication related prizes (lifetime, best paper, poster etc.)Scientific

File
Real time systems
Quality of service
Processing

Best Paper Award of the 2011 IEEE 29th International Conference on Consumer Electronics (ICCE) - 2nd place winner

C. Tempelaars (Recipient), M.M.H.P. van den Heuvel (Recipient), Reinder Bril (Recipient) & Christian Hentschel (Recipient), Jan 2011

Recognition: OtherCareer, activity or publication related prizes (lifetime, best paper, poster etc.)Scientific

File
Consumer electronics
Processing

Activities 1999 2017

  • 7 Contributed talk
  • 3 Workshop, seminar, course or exhibition
  • 2 Conference
  • 1 Consultancy

Stockholm International Summit on Cyber Security in SCADA and Industrial Control Systems

Ali Abbasi (Organiser)
20 Oct 2017

Activity: Participating in or organising an event typesConferenceProfessional

3rd Cyber Security Workshop in the Netherlands

Stefan Thaler (Organiser)
5 Oct 2017

Activity: Participating in or organising an event typesWorkshop, seminar, course or exhibitionScientific

European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML/PKDD)

Stefan Thaler (Speaker)
18 Sep 201722 Sep 2017

Activity: Talk or presentation typesContributed talkScientific

Press / Media

-TU/e leads national research project for a secure Internet of Things

Sandro Etalle

13/06/19

1 item of media coverage

Press/Media: Expert Comment

TU/e leads national research project for a secure IoT

Sandro Etalle

12/06/19

1 item of media coverage

Press/Media: Expert Comment

Student theses

(In)security of video surveillance systems in building automation systems

Author: Yeh, M., 29 Oct 2018

Supervisor: den Hartog, J. (Supervisor 1), Constante, E. (External person) (External coach) & Dagrada, M. (External person) (External coach)

Student thesis: Master

Accurate, automated and flexible privacy policy conflicts resolution in multiparty systems

Author: Darwish, K., 29 May 2017

Supervisor: Zannone, N. (Supervisor 1)

Student thesis: Master

File

Active learning in VAE latent space

Author: Tonnaer, L., 25 Sep 2017

Supervisor: Menkovski, V. (Supervisor 1), Portegies, J. W. (Supervisor 2) & Holenderski, M. (Supervisor 2)

Student thesis: Master

File