hands

Current Projects



WfB Wachstum für Bochum
WACHSTUM FÜR BOCHUM
The project "Wachstum für Bochum" (growth for Bochum) aims at fostering the long-term and ongoing development of Bochum and its local environment by attracting domestic and foreign investors. As part of the subproject for the "expansion of the competence center for embedded systems and computer security", the chair for system security addresses several subjects concerning embedded malware, embedded audio and the security of embedded devices (satellite phones, mobile phones, etc.) in general...



mobe MoBE
MOBE: DETECTING MODERN BOTNETS
When a computer is infected with malicious software, the owner loses control over it and the system becomes a bot. Bots are controlled remotely, often pooled to groups of many thousands of infected hosts, the so-called botnets. Botnets are responsible for some of the major problems on the Internet today: they are used to propagate spam, facilitate identity theft, theft of banking credentials and accounts to a variety of online services among other criminal activities like Denial of Service attacks...



secmobil SecMobil
SECMOBIL: SECURE E-MOBILITY
By including electro-cars into existing energy networks, the cars are going to communicate much more with their environment as cars do today. Therefore, a completely new architecture based on the information and communication technology becomes possible and necessary. Substantial, comprehensive and standardized solutions on a system-, domain- and modul-layer are to be developed as part of SecMobil...



iaid iAID
IAID: IN­NO­VA­TI­VE ANO­MA­LI­TY- AND IN­TRU­SI­ON-DE­TEC­TION
With the increasing integration of IT systems their vulnerability rises, too. As the BSI Management Report to IT security shows, the number of attacks on IT systems that are connected to the Internet continues to grow. Aims of such attacks include limiting the availability of services or theft of information. The damage of such attacks are often high, so that effective protection against these threats is in the interest of the system operators...



ites iTES
ITES: INNOVATIVE TRUSTWORTHY ENDPOINT SECURITY
The iTES Project is sponsored by the Federal Ministry for Education & Research within the tender "anomaly detection on computer systems". The goal of iTES is the development of a solid base for an innovative and trustworthy security system in form of a demonstrator. The consortium uses established technologies as well as innovative new developments to contribute into the creation of the new security system...




JSAGENTS JSAgents
JSAgents
The goal of JSAgents is the development of a framework to detect, log and mitigate live attacks against internet pages and web browsers. The analysis of these attacks allows deeper insights into malicious vectors, thus enabling the design of new protection schemes. Based on the ECMA-Script-5 implementation in modern web browsers a nearly complete anomaly detection can be performed on the Document Object Model (DOM)...



SASER SASER
SASER- Safe and Se­cu­re Eu­ropean Rou­ting
The In­ter­net has be­co­me an in­dis­pensa­ble part of the in­fra­struc­tu­re for most of the as­pects of daily life and has de­ve­lo­ped to a fun­da­men­tal in­fra­struc­tu­re for Eu­ro­pe. The un­in­ter­rup­ted, re­lia­ble and se­cu­re ac­cess to the In­ter­net is seen as a basic right for all ci­ti­zens and a si­gni­fi­cant eco­no­mi­cal fac­tor. The cur­rent in­fra­struc­tu­re lacks many of those fea­tures which are ob­vious­ly as­so­cia­ted with a trusted, safe and se­cu­re com­mu­ni­ca­ti­on me­di­um...



ubicrypt UbiCrypt
GRK 1817: NEW CHALLENGES FOR CRYPTOGRAPHY IN UBIQUITOUS COMPUTING
The Re­se­arch Trai­ning Group (RTG) will in­ves­ti­ga­te cryp­to­gra­phic me­cha­nis­ms which form the fo­un­da­ti­on for se­cu­ri­ty so­lu­ti­ons in ubi­qui­tous com­pu­ting. The re­se­arch is struc­tu­red in three le­vels: cryp­to­gra­phic pri­mi­ti­ves, de­vice and sys­tem level. A com­mon theme is that new cryp­to­gra­phic me­thods are re­se­ar­ched for ap­p­li­ca­ti­ons which are di­stri­bu­ted and hea­vi­ly in­ho­mo­ge­neous. The re­se­arch to­pics range from cryp­to­gra­phic fo­un­da­ti­ons such as fully ho­mo­mor­phic en­cryp­ti­on, which is very de­s­i­ra­ble for pri­va­cy re­a­sons, over se­cu­ri­ty for me­di­cal im­plants to in­ter­net se­cu­ri­ty so­lu­ti­ons in­vol­ving new na­tio­nal ID cards...