• Groene Loper 5, Metaforum

    5612 AP Eindhoven


  • P.O. Box 513, Department of Mathematics and Information Science

    5600 MB Eindhoven



Introductie / missie

The interconnectivity and pervasiveness of computers and embedded systems is not only determining new functionalities, but is also opening the way to increasingly sophisticated attacks. In recent years the field of security has become a key focus of computer science research around the globe. The mission of the Security group (SEC), which is part of EPSI, the Eindhoven Institute for the Protection of Systems and Information, is to realize a more secure and privacy-preserving digital infrastructure. We believe this goal can only be achieved by investigating the overall cybersecurity problem, tackling the engineering, deployment, management, and maintenance perspectives of systems and ICT infrastructures. Our research interests are a reflection of this and span from security deployment and management, to physical security and attack engineering.

Highlighted phrase

The SEC group takes a multi-faceted approach to the full systems security process in order to counter today’s security challenges.

Over de organisatie

Cybersecurity challenges are innumerable: from advanced and nation-state malware, evolving evasive attack techniques, to the new frontiers of IoT security, access control, and physical security. In reaction to this, SEC’s approach to system security covers offensive and defensive aspects of system security, targeting concrete security problems and addressing the underlying, fundamental issues. SEC’s strength lies in its ability to empirically and theoretically understand the full security process: from attack generation and system management, to policy specification and user aspects.

Research in the Security (SEC) group spans three areas vital to the security of decentralized and embedded systems:

  • Security policy specification & enforcement
  • Security of embedded systems
  • Threat intelligence and defense

SEC sits at the intersection of these areas, addressing challenging operative and theoretical problems: for example, by monitoring underground activities and studying the techno-economic principles driving attack production, SEC maintains a unique perspective on the offensive side of computer security. This understanding is channeled into novel approaches such as new monitoring techniques to detect attacks targeting IT and IoT systems and new adaptive security and authentication mechanisms. SEC has made significant contributions to secure key storage in embedded systems by devising algorithms for randomness extraction from Physical Unclonable Functions (PUFs). Furthermore, SEC pioneered Quantum Readout of PUFs, an object authentication technology that is immune to spoofing.

Scientific staff:  S. Etalle (HGL), W. Michiels (d-HLG, 0.2fte), M. Petkovic (d-HLG,0.2 fte), N. Zannone (UHD), L. Allodi (UD, joined 2017), J. den Hartog (UD), B. Škorić (UD)

Postdocs: Laura Genga, Alexios Lekidis (0fte), Daniel Ricardo dos Santos

PhD students: A. Abbasi, M. Alizadeh, A. Amadori, P. Burda, G. Dupont, D. Fauri, A. Gallucci, H. Van Le, D. Leermakers, S. Ravidas, T. Stanko, S. Thaler, S. Vavilis

Vingerafdruk Verdiep u in de onderzoeksgebieden waarop Security W&I actief is. Deze onderwerplabels komen uit het werk van de leden van deze organisatie. Samen vormen ze een unieke vingerafdruk.

  • Netwerk Recente externe samenwerking op landenniveau. Duik in de details door op de stippen te klikken.



    A latitudinal study on the use of sequential and concurrency patterns in deviance mining

    Genga, L., Potena, D., Chiorrini, A., Diamantini, C. & Zannone, N., 1 jan 2020, Studies in Computational Intelligence. Appice, A., Ceci, M., Loglisci, C., Manco, G., Masciari, E. & Ras, Z. (redactie). Cham: Springer, blz. 103-119 17 blz. (Studies in Computational Intelligence; vol. 880).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureHoofdstukAcademicpeer review

  • 1 Downloads (Pure)

    An authorization framework for cooperative intelligent transport systems

    Ravidas, S., Karkhanis, P., Dajsuren, Y. & Zannone, N., 1 jan 2020, Emerging Technologies for Authorization and Authentication - 2nd International Workshop, ETAA 2019, Proceedings. Saracino, A. & Mori, P. (redactie). Cham: Springer, blz. 16-34 19 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11967 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

  • 2 Downloads (Pure)

    A post-contingency power flow emulator for generalized probabilistic risks assessment of power grids

    Rocchetta, R. & Patelli, E., mei 2020, In : Reliability Engineering and System Safety. 197, 12 blz., 106817.

    Onderzoeksoutput: Bijdrage aan tijdschriftTijdschriftartikelAcademicpeer review

  • Prijzen

    Best paper award at the 7th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2017)

    Niek Tax (Ontvanger), L. Genga (Ontvanger) & N. Zannone (Ontvanger), 8 dec 2017

    Prijs: AndersWerk, activiteit of publicatie gerelateerde prijzen (lifetime, best paper, poster etc.)Wetenschappelijk

    Best Paper Award of the 2004 IEEE 16th European Conference on Real-Time Systems (ECRTS)

    C.C. Wüst (Ontvanger), L. Steffens (Ontvanger), Reinder J. Bril (Ontvanger) & W.F.J. Verhaegh (Ontvanger), 1 jul 2004

    Prijs: AndersWerk, activiteit of publicatie gerelateerde prijzen (lifetime, best paper, poster etc.)Wetenschappelijk

  • Best Paper Award of the 2011 IEEE 29th International Conference on Consumer Electronics (ICCE) - 2nd place winner

    C. Tempelaars (Ontvanger), M.M.H.P. van den Heuvel (Ontvanger), Reinder J. Bril (Ontvanger) & Christian Hentschel (Ontvanger), jan 2011

    Prijs: AndersWerk, activiteit of publicatie gerelateerde prijzen (lifetime, best paper, poster etc.)Wetenschappelijk

  • Activiteiten

    Eventpad: Cybercrime Analysis using Visual Analytics

    Bram C.M. Cappers (Spreker)
    27 nov 2019

    Activiteit: Types gesprekken of presentatiesGenodigd sprekerProfessioneel

    The Value of Data

    Bram C.M. Cappers (Spreker)
    13 sep 2019

    Activiteit: Types gesprekken of presentatiesGenodigd sprekerProfessioneel

    Visual Analytics 101

    Bram C.M. Cappers (Spreker)
    7 mei 2019

    Activiteit: Types gesprekken of presentatiesGenodigd sprekerWetenschappelijk


    (In)security of video surveillance systems in building automation systems

    Auteur: Yeh, M., 29 okt 2018

    Begeleider: den Hartog, J. (Afstudeerdocent 1), Constante, E. (Externe persoon) (Externe coach) & Dagrada, M. (Externe persoon) (Externe coach)

    Scriptie/masterproef: Master


    6LoWPAN: IPv6 for battery-less building networks

    Auteur: Abbasi, N., 31 aug 2009

    Begeleider: Lukkien, J. (Afstudeerdocent 1), van der Stok, P. (Afstudeerdocent 2), Geilen, M. (Afstudeerdocent 2) & Verhoeven, P. (Afstudeerdocent 2)

    Scriptie/masterproef: Master


    Accelerating SIFT feature extraction with a vector DSP: a feasibility study

    Auteur: Sathyanarayana Prasad, A., 31 aug 2014

    Begeleider: van Berkel, C. (Afstudeerdocent 1), van Kampen, D. (Externe persoon) (Externe coach), Kloosterhuis, W. (Externe coach) & Goossens, K. (Afstudeerdocent 2)

    Scriptie/masterproef: Master