If you made any changes in Pure these will be visible here soon.

Personal profile

Quote

"The key to security is understanding”

Research profile

Sandro Etalle leads the Security group where the approach to system security is multi-faceted and covers offensive and defensive aspects of system security, always targeting concrete security problems and addressing the underlying, fundamental issues at their core. The group’s strength lies precisely in its ability to empirically and theoretically understand the full security process: from attack generation and system management, to policy specification and user aspects. Today,Etalle’s research is focused mainly on network monitoring and intrusion detection, with particular emphasis on the security of industrial control systems. Other topics includes policy specification and enforcement, and incident response. With two PhD students, Etalle founded the company SecurityMatters, bringing the result of their research to the market, and at the same time providing a source for insights into how cybersecurity evolvesin real life, leading to new research challenges.His group’s research spans three areas vital to the security of decentralized and embedded systems: (a) Security policy specification & enforcement (b) Security of embedded systems, and (c) Threat intelligence and defense, sitting at the cutting-edge intersection of these areas, addressing particularly challenging operative and theoretical problems.

Academic background

Sandro Etalle obtained his master’s degree in Mathematics at the University of Padova (Italy) and earned his PhD in 1995 at the University of Amsterdam, under the supervision of Prof. K. R. Apt and Prof. A. Bossi. He was a post-doctoral fellow at the University of Amsterdam, Assistant Professor at the universities of Genova (Italy), Maastricht and Twente, where he lead the spearhead program on Security. After a year as a visiting researcher at the University of Trento, he became full professor at the TU/e. Etalle is one of the authors of the Dutch ‘National Cyber Security Research Agenda’, he has been leader of several national and EU projects, and program chair of several international conferences.

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1992 2018

1 Citations

Behavior analysis in the medical sector: theory and practice

Alizadeh, M., Peters, S., Etalle, S. & Zannone, N., 9 Apr 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018. New York: Association for Computing Machinery, Inc, p. 1637-1646 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Glass

Eventpad : a visual analytics approach to network intrusion detection and reverse engineering

Cappers, B. C. M., van Wijk, J. J. & Etalle, S., 23 Apr 2018, European Cyper Security Perspectives 2018. Den Haag: KPN, p. 62-65 4 p.

Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

Open Access
File
Reverse engineering
Intrusion detection

Eventpad: Rapid Malware Analysis and Reverse Engineering using Visual Analytics

Cappers, B. C. M., van Wijk, J. J., Etalle, S. & Meessen, P., 22 Oct 2018, Eventpad: Rapid Malware Analysis and Reverse Engineering using Visual Analytics. 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Reverse engineering
Data visualization
Data reduction
Agglomeration
Malware

Interactive visualization of event logs for cybersecurity

Cappers, B. C. M., 4 Dec 2018, Eindhoven: Technische Universiteit Eindhoven. 182 p.

Research output: ThesisPhd Thesis 1 (Research TU/e / Graduation TU/e)Academic

Open Access
File
Visualization

Race to the bottom: embedded control systems binary security : an industrial control system protection approach

Abbasi, A., 24 Sep 2018, Eindhoven: Technische Universiteit Eindhoven. 154 p.

Research output: ThesisPhd Thesis 1 (Research TU/e / Graduation TU/e)Academic

Open Access
File

Courses

Capita selecta security

1/09/15 → …

Course

Cyberattacks Crime and Defenses

1/09/15 → …

Course

Principles of data protection

1/09/15 → …

Course

Student theses

Alert classification of web application attacks: using Bayesian networks to classify alerts from anomaly based intrusion detection systems

Author: Schellekens, C., 31 Jan 2014

Supervisor: Etalle, S. (Supervisor 1) & Bolzoni, D. (External person) (External coach)

Student thesis: Master

File

An assessment of ECM authentication in modern vehicles

Author: Bokslag, W., 31 Aug 2017

Supervisor: Etalle, S. (Supervisor 1)

Student thesis: Master

File

Constraint-based detection of advanced threats to ICS

Author: Heesakkers, B., 31 Aug 2017

Supervisor: Etalle, S. (Supervisor 1), Costante, E. (Supervisor 2) & Pechenizkiy, M. (Supervisor 2)

Student thesis: Master

File

Kintsugi: identifying & addressing challenges in embedded binary security

Author: Wetzels, A., 31 Aug 2017

Supervisor: Etalle, S. (Supervisor 1) & Abbasi, A. (Supervisor 2)

Student thesis: Master

File

Knowledge needed to develop malware to infect and impact industrial control systems

Author: van de Wouw, D., 30 Nov 2013

Supervisor: Etalle, S. (Supervisor 1) & Dimkov, T. (External person) (External coach)

Student thesis: Master

File