Projecten per jaar
Organisatieprofiel
Introductie / missie
The interconnectivity and pervasiveness of computers and embedded systems is not only determining new functionalities, but is also opening the way to increasingly sophisticated attacks. In recent years the field of security has become a key focus of computer science research around the globe. The mission of the Security group (SEC), which is part of EPSI, the Eindhoven Institute for the Protection of Systems and Information, is to realize a more secure and privacy-preserving digital infrastructure. We believe this goal can only be achieved by investigating the overall cybersecurity problem, tackling the engineering, deployment, management, and maintenance perspectives of systems and ICT infrastructures. Our research interests are a reflection of this and span from security deployment and management, to physical security and attack engineering.
Highlighted phrase
The SEC group takes a multi-faceted approach to the full systems security process in order to counter today’s security challenges.
Organisatieprofiel
Cybersecurity challenges are innumerable: from advanced and nation-state malware, evolving evasive attack techniques, to the new frontiers of IoT security, access control, and physical security. In reaction to this, SEC’s approach to system security covers offensive and defensive aspects of system security, targeting concrete security problems and addressing the underlying, fundamental issues. SEC’s strength lies in its ability to empirically and theoretically understand the full security process: from attack generation and system management, to policy specification and user aspects.
Research in the Security (SEC) group spans three areas vital to the security of decentralized and embedded systems:
- Security policy specification & enforcement
- Security of embedded systems
- Threat intelligence and defense
SEC sits at the intersection of these areas, addressing challenging operative and theoretical problems: for example, by monitoring underground activities and studying the techno-economic principles driving attack production, SEC maintains a unique perspective on the offensive side of computer security. This understanding is channeled into novel approaches such as new monitoring techniques to detect attacks targeting IT and IoT systems and new adaptive security and authentication mechanisms. SEC has made significant contributions to secure key storage in embedded systems by devising algorithms for randomness extraction from Physical Unclonable Functions (PUFs). Furthermore, SEC pioneered Quantum Readout of PUFs, an object authentication technology that is immune to spoofing.
Scientific staff: S. Etalle (HGL, 0.6 fte), W. Michiels (d-HLG, 0.2 fte), M. Petkovic (d-HLG, 0.2 fte), N. Zannone (UHD), L. Allodi (UD), J. den Hartog (UD), B. Škorić (UD), S. Sciancalepore (UD), E. Zambon (Researcher)
PhD students: A. Aarts, P. Burda, M. Campobasso, S. Clark, G.F.C. Dupont, A. Gallucci, B. Joudeh, L. Kersten, Ch. Leite da Silva, V. Liventsev, G. Mehri, M. Rosso, D.R. George, S. Kempinski
Vingerafdruk
Samenwerkingen en hoofdonderzoeksgebieden uit de afgelopen vijf jaar
Profielen
-
Luca Allodi
- Mathematics and Computer Science, Security - Universitair Hoofddocent
- EAISI Foundational - Universitair Hoofddocent
- Mathematics and Computer Science, Threat Analysis - Universitair Hoofddocent
Persoon: UHD : Universitair Hoofddocent, UD : Universitair Docent
-
Matteo Asuni
- Mathematics and Computer Science, Threat Analysis - Promovendus
Persoon: Prom. : Promovendus
-
Sam Baggen
- Mathematics and Computer Science, Threat Analysis - Ontwikkelaar ICT
Persoon: OBP : Ondersteunend en Beheerspersoneel
-
CATRIN: Controllable, Accountable, Transparent the Responsible Internet
Allodi, L. (Project Manager), Teuwen, K. (Projectmedewerker) & Baggen, S. (Projectmedewerker)
23/10/21 → 22/10/27
Project: Second tier
-
INTERSECT
Weffers, H. (Project Manager), Kempinski, S. (Projectmedewerker), Meratnia, N. (Projectmedewerker), Özçelebi, T. (Projectmedewerker), van den Brand, M. G. J. (Projectmedewerker), Kurtev, I. (Projectmedewerker), Hatefi, Z. (Projectmedewerker), Bibi, I. (Projectmedewerker), Luyk, M. (Project communicatie medewerker), Leite, C. (Projectmedewerker), Gankhuyag, G. (Projectmedewerker), Allodi, L. (Projectmedewerker), Bekkers, R. N. A. (Projectmedewerker), Etalle, S. (Projectmedewerker), Sciancalepore, S. (Projectmedewerker), Özçelebi, T. (Projectmedewerker) & den Hartog, J. I. (Projectmedewerker)
1/09/20 → …
Project: Onderzoek direct
-
SECREDAS GA 783119
den Hartog, J. I. (Projectmedewerker), Etalle, S. (Projectmedewerker), Zannone, N. (Project Manager), Sheikhalishahi, M. (Projectmedewerker), Cappers, B. C. M. (Projectmedewerker), Dupont, G. (Projectmedewerker), Le, D. (Projectmedewerker), Gankhuyag, G. (Projectmedewerker), Clark, S. (Projectmedewerker), Aarts, A. A. (Projectmedewerker), Ravidas, S. (Projectmedewerker) & Zambon, E. (Projectmedewerker)
1/05/18 → 31/10/21
Project: Onderzoek direct
Onderzoeksoutput
-
A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography
Aquina, N. (Corresponding author), Cimoli, B., Das, S., Hövelmanns, K., Weber, F. J., Okonkwo, C., Rommel, S., Škorić, B., Monroy, I. T. & Verschoor, S., 6 mei 2025, In: EPJ Quantum Technology. 12, 1, 42 blz., 51.Onderzoeksoutput: Bijdrage aan tijdschrift › Tijdschriftartikel › Academic › peer review
Open AccessBestand5 Citaten (Scopus)81 Downloads (Pure) -
All in the Name of Artificial Intelligence: A Commentary on Linardon (2025)
Burger, P. (Corresponding author) & Ghosh, S. (Corresponding author), jul. 2025, In: International Journal of Eating Disorders. 58, 7, blz. 1191-1195 5 blz.Onderzoeksoutput: Bijdrage aan tijdschrift › Commentaar/Brief aan de redacteur › Academic › peer review
Open AccessBestand4 Downloads (Pure) -
Anonymity
Bleumer, G. & Sciancalepore, S. (Corresponderende auteur), 1 jan. 2025, Encyclopedia of Cryptography, Security and Privacy. Jajodia, S., Samarati, P. & Yung, M. (uitgave). 3 uitgave Springer Nature, blz. 76-79 4 blz.Onderzoeksoutput: Hoofdstuk in Boek/Rapport/Congresprocedure › Vermelding in encyclopedie / woordenboek › Academic › peer review
Uitrusting
-
BlackHat’s lab
Allodi, L. (Manager) & Gankhuyag, G. (Manager)
SecurityUitrusting/faciliteit: Onderzoekslaboratorium
-
IoT lab
Etalle, S. (Manager), Allodi, L. (Manager) & Zannone, N. (Manager)
SecurityUitrusting/faciliteit: Onderzoekslaboratorium
-
Security Operation Center lab
Allodi, L. (Manager) & Gankhuyag, G. (Manager)
SecurityUitrusting/faciliteit: Onderzoekslaboratorium
Datasets
-
SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers
Rosso, M. (Ontwerper), Campobasso, M. (Ontwerper), Gankhuyag, G. (Ontwerper) & Allodi, L. (Ontwerper), Eindhoven University of Technology, 7 dec. 2020
https://gitlab.tue.nl/saibersoc/acsac2020-artifacts
Dataset
-
-
Data set of multi-source dermatoscopic images of skin hair for skin lesions
Gallucci, A. (Ontwerper), 4TU.Centre for Research Data, 30 jan. 2020
DOI: 10.4121/uuid:9ed94e25-8b74-4807-b84a-2c54ec9d96f0
Dataset
Prijzen
-
2020 IEEE Security & Privacy Best Paper Award
Allodi, L. (Ontvanger), Chotza, T. (Ontvanger), Panina, K. (Ontvanger) & Zannone, N. (Ontvanger), 2020
Prijs: Anders › Werk, activiteit of publicatie gerelateerde prijzen (lifetime, best paper, poster etc.) › Wetenschappelijk
-
Best Paper Award at SACMAT 2025
Hasel Mehri, G. (Ontvanger), Morisset, C. (Ontvanger) & Zannone, N. (Ontvanger), 2025
Prijs: Anders › Werk, activiteit of publicatie gerelateerde prijzen (lifetime, best paper, poster etc.) › Wetenschappelijk
-
Best paper award at the 7th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2017)
Tax, N. (Ontvanger), Genga, L. (Ontvanger) & Zannone, N. (Ontvanger), 8 dec. 2017
Prijs: Anders › Werk, activiteit of publicatie gerelateerde prijzen (lifetime, best paper, poster etc.) › Wetenschappelijk
Activiteiten
-
From Energy Distribution to Process-aware Intrusion Detection…and the Diversity of Cyber-Physical Systems in General
Rosso, M. (Spreker)
19 sep. 2023Activiteit: Types gesprekken of presentaties › Genodigd spreker › Populair
-
The OTCAD attack database; highlights and uses
Rosso, M. (Spreker)
23 mei 2023Activiteit: Types gesprekken of presentaties › Genodigd spreker › Populair
-
28th European Symposium on Research in Computer Security (ESORICS) 2023 (Evenement)
Sciancalepore, S. (Lid redactieraad)
2023Activiteit: Types publicaties van collegiale toetsing en redactioneel werk › Redactioneel werk › Wetenschappelijk
Knipsels
-
IST graduate Jos Wigchert recognized for thesis excellence in Kooy Award 2025
24/04/25
1 Mediabijdrage
Pers / media: PR activiteiten
-
Disrupted Genesis Market found for sale
12/07/23
1 item van Media-aandacht
Pers / media: Vakinhoudelijk commentaar
-
Genesis Market gang tries to sell platform after FBI disruption
10/07/23
1 item van Media-aandacht
Pers / media: Vakinhoudelijk commentaar
Scripties/Masterproeven
-
(In)security of video surveillance systems in building automation systems
Yeh, M. M. (Auteur), den Hartog, J. (Afstudeerdocent 1), Constante, E. (Externe coach) & Dagrada, M. (Externe coach), 29 okt. 2018Scriptie/Masterproef: Master
Bestand -
3D Face Reconstruction Using Deep Learning
Jawahar, P. (Auteur), Medeiros de Carvalho, R. (Afstudeerdocent 1), Gallucci, A. (Afstudeerdocent 2) & Vanschoren, J. (Afstudeerdocent 2), 20 jan. 2020Scriptie/Masterproef: Master
Bestand -
A2RID: An Anonymous RemoteID-compliant Group Signature Scheme for Commercial Drones
Wisse, E. M. C. (Auteur), Sciancalepore, S. (Afstudeerdocent 1), 17 okt. 2022Scriptie/Masterproef: Master
Bestand