User Tools

Site Tools


start

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
start [2017/10/23 19:33]
lallodi [TU/e Security Group]
start [2022/01/13 16:11] (current)
ggankhuyag
Line 4: Line 4:
  
  
-The interconnectivity and pervasiveness of computers and of embedded systems is not only determining new functionalitiesbut is also opening the way to increasingly sophisticated attacks. Indeed, in the last years the field of security has become one of the main focuses of computer science research around the globe. The mission of the Security group (SEC) at [[https://www.tue.nl|TU/e]], in collaboration with [[http://www.win.tue.nl/eipsi/| EPSI]], the Eindhoven Institute for the Protection of Systems and Information, is to realize a more secure and privacy-preserving digital infrastructure.+The interconnectivity and pervasiveness of computers and of embedded systems are not only determining new functionalities but are also opening the way to increasingly sophisticated attacks. Indeed, in the last yearsthe field of security has become one of the main focuses of computer science research around the globe. The mission of the Security group (SEC) at [[https://www.tue.nl|TU/e]], in collaboration with [[http://www.win.tue.nl/eipsi/| EPSI]], the Eindhoven Institute for the Protection of Systems and Information, is to realize a more secure and privacy-preserving digital infrastructure.
  
 We believe this goal can only be achieved by investigating **the overall picture of the cybersecurity problem**, tackling the **engineering, deployment, management, and maintenance perspectives** of systems and ICT infrastructures.  We believe this goal can only be achieved by investigating **the overall picture of the cybersecurity problem**, tackling the **engineering, deployment, management, and maintenance perspectives** of systems and ICT infrastructures. 
  
-Our research interests are a reflection of this and span from security deployment and managementto physical security and attack engineering.+Our research interests are a reflection of this and span from security deployment and management to physical security and attack engineering.
  
 ^ Research topic  ^ Core research area ^ Staff members ^ ^ Research topic  ^ Core research area ^ Staff members ^
-| Network monitoring |Critical infrastructure protection |[[http://www.win.tue.nl/~setalle/|Sandro Etalle]], [[http://www.win.tue.nl/~jhartog/|Jerry den Hartog]] | +| Network monitoring |Critical infrastructure protection |[[http://www.win.tue.nl/~setalle/|Sandro Etalle]], [[http://www.win.tue.nl/~jhartog/|Jerry den Hartog]], [[https://research.tue.nl/en/persons/emmanuele-zambon-mazzocato| Emmanuele Zambon-Mazzocato]] | 
-Software security |White-box Cryptography |Wil Michiels | +Security for machine learning |Model cloning, Interpretability, Backdoors |Wil Michiels | 
-| Secure data management | Access control, Trustworthy collaborative systems, Formal methods for security |[[http://www.win.tue.nl/~jhartog/|Jerry den Hartog]], [[http://www.win.tue.nl/~petkovic/|Milan Petkovic]], [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] | +| Secure data management | Access control, Trustworthy collaborative systems, Formal methods for security |[[http://www.win.tue.nl/~jhartog/|Jerry den Hartog]], [[http://www.win.tue.nl/~petkovic/|Milan Petkovic]], [[http://zannone.win.tue.nl//|Nicola Zannone]] | 
-| Data analytics for security | Deep learning applied to cyber security,  [[processmining|Process mining applied to security and privacy]] |[[http://www.win.tue.nl/~petkovic/|Milan Petkovic]], [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] | +| Data analytics for security & Trustworthy AI | Deep learning applied to cyber security, Responsible and safe AI,  [[processmining|Process mining applied to security and privacy]] |[[http://www.win.tue.nl/~petkovic/|Milan Petkovic]], [[http://zannone.win.tue.nl/|Nicola Zannone]] | 
-|Attacker and risk models| [[attackereconomics|Attacker economics]],  [[riskanalysis|Cyber-risk quantification]]| [[http://www.win.tue.nl/~lallodi/|Luca Allodi]]| +|Attacker and risk models| [[attackereconomics|Attacker economics]],  [[riskanalysis|Cyber-risk quantification]]| [[https://lallodi.github.io|Luca Allodi]]| 
-| Identification and Authentication | Physical Unclonable Functions, Biometrics|[[http://security1.win.tue.nl/~bskoric/|Boris Skoric]] | +| Identification and Authentication | Physical Unclonable Functions, Biometrics|[[http://bskoric.win.tue.nl/|Boris Skoric]] | 
-| Information-theoretic security |Quantum Readout of Physical Unclonable Functions, Quantum Cryptography |[[http://security1.win.tue.nl/~bskoric/|Boris Skoric]] |+| Information-theoretic security |Quantum Readout of Physical Unclonable Functions, Quantum Cryptography |[[http://bskoric.win.tue.nl/|Boris Skoric]] | 
 +| IoT Security and Privacy |Network security protocols for IoT, Privacy-Enhancing Technologies for IoT devices and networks, Applied Security for IoT |[[https://ssciancalepore.win.tue.nl/|Savio Sciancalepore]] |
  
 You can also readily browse our [[researchareas|most recent contributions]]. We also [[artefacts| share our code and datasets]]. You can also readily browse our [[researchareas|most recent contributions]]. We also [[artefacts| share our code and datasets]].
 ====Teaching==== ====Teaching====
  
-We cover most of these aspects extensively in our teaching as well, including courses on offensive computer security at the bachelor and master's levels, as well as comprehensive courses on [[http://security1.win.tue.nl/~zannone/teaching/DTM/2IMS25-17-18.html|Principles of data protection]], [[http://www.win.tue.nl/~setalle/hh.html|attack engineering (Hacker's Hut)]], [[http://www.win.tue.nl/~jhartog/CourseVerif/|Verification of Security Protocols]], and [[http://security1.win.tue.nl/~bskoric/physsec/files/|Physical Aspects of Digital Security]], among several others.+We cover most of these aspects extensively in our teaching as well, including courses on offensive computer security at the bachelor and master's levels, as well as comprehensive courses on [[http://zannone.win.tue.nl/teaching/DTM/2IMS25-17-18.html|Principles of data protection]], [[https://canvas.tue.nl/courses/19128|Attack Engineering and Cybercrime]], [[http://www.win.tue.nl/~jhartog/CourseVerif/|Verification of Security Protocols]], and [[http://bskoric.win.tue.nl/physsec/files/|Physical Aspects of Digital Security]], [[https://tue.osiris-student.nl/#/onderwijscatalogus/extern/cursus?cursuscode=2IMS30&collegejaar=2021/|Advanced Network Security]], among several others.
  
-Check out our courses at the [[bachelor|Bachelor]] and [[master|Master's]] levels! Our Master's program fits in the [[https://true-security.nl|TRU/e Master Security Programme]] in collaboration with [[http://www.ru.nl/ds/|Radboud University]].+Check out our courses at the [[bachelor|Bachelor]] and [[master|Master's]] levels! Starting from 2021-2022 TU Eindhoven offers a fully local Information Security Technology master track where all lectures are offered on the TU/e campus. The [[https://educationguide.tue.nl/programs/graduate-school/special-masters-tracks/information-security-technology/|Master of Science in Information Security Technology (IST)]] track used to be part of the "TRU/e Master in Cyber Security" which was offered in collaboration with Radboud University (RU). The last intake of the TRU/e master was in 2020-2021.
  
 We are also developing the [[lab|BlackHat's Lab (B-LAB)]] as a platform to **test nation state-level exploits, surveillance platforms, and advanced attack vectors**. The lab also has an **IoT interface** to test new (and existing) attacks against the ever-growing IoT world. We are also developing the [[lab|BlackHat's Lab (B-LAB)]] as a platform to **test nation state-level exploits, surveillance platforms, and advanced attack vectors**. The lab also has an **IoT interface** to test new (and existing) attacks against the ever-growing IoT world.
  
-Find more details on the navigation bar on the left, or contact us for specific enquiries. You can also [[https://twitter.com/security_tue|follow us on Twitter]].\\+Find more details on the navigation bar on the left, or contact us for specific inquiries. You can also [[https://twitter.com/security_tue|follow us on Twitter]].\\
 ====Contacts==== ====Contacts====
  
Line 37: Line 38:
  
 +31 040 2472853\\ +31 040 2472853\\
-<secsec@tue.nl> \\+secsec[at]tue[dot]nl> \\
 MetaForum building MetaForum building
 Room 6.061  Room 6.061 
start.1508780018.txt.gz · Last modified: 2021/01/10 20:59 (external edit)