EIT ICT Labs activity
Duration: January 2013 until December 2013
Contact: Mayla Bruso
Today, the mobile phone is the principal way to interact with the digital world whilst also being able to capture continuously contextual data (e.g. pictures, location, pressure). Its pervasive use and wide range from voice, entertainment, private and professional apps, digital wallet to authentication make its security critical. Yet the ability to install potentially rogue applications and to root devices decrease their intrinsic security. This activity addresses security and privacy concerns in the design of the 'extended' (from authentication to charging) identity management, by using the new platform enhancement to execute applications in a trusted environment and by adding anomaly based monitoring capability. Within this activity the security group at the TU/e focusses on privacy analysis of protocols.