User Tools

Site Tools


start

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
start [2021/01/10 21:04] – external edit 127.0.0.1start [2022/01/04 15:29] ggankhuyag
Line 4: Line 4:
  
  
-The interconnectivity and pervasiveness of computers and of embedded systems is not only determining new functionalitiesbut is also opening the way to increasingly sophisticated attacks. Indeed, in the last years the field of security has become one of the main focuses of computer science research around the globe. The mission of the Security group (SEC) at [[https://www.tue.nl|TU/e]], in collaboration with [[http://www.win.tue.nl/eipsi/| EPSI]], the Eindhoven Institute for the Protection of Systems and Information, is to realize a more secure and privacy-preserving digital infrastructure.+The interconnectivity and pervasiveness of computers and of embedded systems are not only determining new functionalities but are also opening the way to increasingly sophisticated attacks. Indeed, in the last yearsthe field of security has become one of the main focuses of computer science research around the globe. The mission of the Security group (SEC) at [[https://www.tue.nl|TU/e]], in collaboration with [[http://www.win.tue.nl/eipsi/| EPSI]], the Eindhoven Institute for the Protection of Systems and Information, is to realize a more secure and privacy-preserving digital infrastructure.
  
 We believe this goal can only be achieved by investigating **the overall picture of the cybersecurity problem**, tackling the **engineering, deployment, management, and maintenance perspectives** of systems and ICT infrastructures.  We believe this goal can only be achieved by investigating **the overall picture of the cybersecurity problem**, tackling the **engineering, deployment, management, and maintenance perspectives** of systems and ICT infrastructures. 
  
-Our research interests are a reflection of this and span from security deployment and managementto physical security and attack engineering.+Our research interests are a reflection of this and span from security deployment and management to physical security and attack engineering.
  
 ^ Research topic  ^ Core research area ^ Staff members ^ ^ Research topic  ^ Core research area ^ Staff members ^
 | Network monitoring |Critical infrastructure protection |[[http://www.win.tue.nl/~setalle/|Sandro Etalle]], [[http://www.win.tue.nl/~jhartog/|Jerry den Hartog]] | | Network monitoring |Critical infrastructure protection |[[http://www.win.tue.nl/~setalle/|Sandro Etalle]], [[http://www.win.tue.nl/~jhartog/|Jerry den Hartog]] |
-Software security |White-box Cryptography |Wil Michiels | +Security for machine learning |Model cloning, Interpretability, Backdoors |Wil Michiels | 
-| Secure data management | Access control, Trustworthy collaborative systems, Formal methods for security |[[http://www.win.tue.nl/~jhartog/|Jerry den Hartog]], [[http://www.win.tue.nl/~petkovic/|Milan Petkovic]], [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] | +| Secure data management | Access control, Trustworthy collaborative systems, Formal methods for security |[[http://www.win.tue.nl/~jhartog/|Jerry den Hartog]], [[http://www.win.tue.nl/~petkovic/|Milan Petkovic]], [[http://zannone.win.tue.nl//|Nicola Zannone]] | 
-| Data analytics for security | Deep learning applied to cyber security,  [[processmining|Process mining applied to security and privacy]] |[[http://www.win.tue.nl/~petkovic/|Milan Petkovic]], [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] |+| Data analytics for security & Trustworthy AI | Deep learning applied to cyber security, Responsible and safe AI,  [[processmining|Process mining applied to security and privacy]] |[[http://www.win.tue.nl/~petkovic/|Milan Petkovic]], [[http://zannone.win.tue.nl/|Nicola Zannone]] |
 |Attacker and risk models| [[attackereconomics|Attacker economics]],  [[riskanalysis|Cyber-risk quantification]]| [[https://lallodi.github.io|Luca Allodi]]| |Attacker and risk models| [[attackereconomics|Attacker economics]],  [[riskanalysis|Cyber-risk quantification]]| [[https://lallodi.github.io|Luca Allodi]]|
-| Identification and Authentication | Physical Unclonable Functions, Biometrics|[[http://security1.win.tue.nl/~bskoric/|Boris Skoric]] | +| Identification and Authentication | Physical Unclonable Functions, Biometrics|[[http://bskoric.win.tue.nl/|Boris Skoric]] | 
-| Information-theoretic security |Quantum Readout of Physical Unclonable Functions, Quantum Cryptography |[[http://security1.win.tue.nl/~bskoric/|Boris Skoric]] |+| Information-theoretic security |Quantum Readout of Physical Unclonable Functions, Quantum Cryptography |[[http://bskoric.win.tue.nl/|Boris Skoric]] |
  
 You can also readily browse our [[researchareas|most recent contributions]]. We also [[artefacts| share our code and datasets]]. You can also readily browse our [[researchareas|most recent contributions]]. We also [[artefacts| share our code and datasets]].
 ====Teaching==== ====Teaching====
  
-We cover most of these aspects extensively in our teaching as well, including courses on offensive computer security at the bachelor and master's levels, as well as comprehensive courses on [[http://security1.win.tue.nl/~zannone/teaching/DTM/2IMS25-17-18.html|Principles of data protection]], [[http://www.win.tue.nl/~setalle/hh.html|attack engineering (Hacker's Hut)]], [[http://www.win.tue.nl/~jhartog/CourseVerif/|Verification of Security Protocols]], and [[http://security1.win.tue.nl/~bskoric/physsec/files/|Physical Aspects of Digital Security]], among several others.+We cover most of these aspects extensively in our teaching as well, including courses on offensive computer security at the bachelor and master's levels, as well as comprehensive courses on [[http://zannone.win.tue.nl/teaching/DTM/2IMS25-17-18.html|Principles of data protection]], [[https://canvas.tue.nl/courses/19128|Attack Engineering and Cybercrime]], [[http://www.win.tue.nl/~jhartog/CourseVerif/|Verification of Security Protocols]], and [[http://bskoric.win.tue.nl/physsec/files/|Physical Aspects of Digital Security]], among several others.
  
 Check out our courses at the [[bachelor|Bachelor]] and [[master|Master's]] levels! Our Master's program fits in the [[https://true-security.nl|TRU/e Master Security Programme]] in collaboration with [[http://www.ru.nl/ds/|Radboud University]]. Check out our courses at the [[bachelor|Bachelor]] and [[master|Master's]] levels! Our Master's program fits in the [[https://true-security.nl|TRU/e Master Security Programme]] in collaboration with [[http://www.ru.nl/ds/|Radboud University]].
start.txt · Last modified: 2022/01/13 16:11 by ggankhuyag