Introduction Content


The DEEDS group researches algorithmic, OS and system level issues in providing dependable & secure services for safety-critical, service critical and $-critical distributed systems and software.

This poster provides an overview of the current group activities.

What all do we do?

For area details click the “Areas” “Button”

  • Our target area is distributed/networked (embedded) systems and software, i.e., the elements behind robust/dependable/secure/safe/trusted “ambient or ubiquitous computing”.
  • We explore both theoretical and experimental issues in “Dependable Embedded Systems and Software” (thus our name DEEDS). As an example, on the conceptual front we develop theories for effective location and composition of dependability/security relevant detectors. On the real-world front, this translates to error and security vulnerability profiling of software/OS's leading to effective placement and composition of “wrappers” to mitigate the effect of errors/vulnerabilities. Similarly, we investigate failure tolerant distributed protocols and issues of composability of dependable services. A recent area investigates the application of formal abstractions to verify distributed protocols.
  • On the experimental side we explore “testing” of distributed SW and OS's. At the OS level we develop techniques to test OS drivers – both as state space models and as applied fault-injection techniques. One activity is the development of verification/validation approaches (including toolsets for code-level verification and also based on formal theorem proving approaches).
  • A major DEEDS theme is the “Quantification of Trust” where we develop Security Metrics for Cloud Services, Security Service Level Agreements, and conceptual + tools frameworks for CSP Security Coparisons, Security Monitoring/Negotiation and also the exploration of side channel attacks in Cloud Virtual Machines.
  • One emerging application domain for our theoretical/experimental research is the Critical Infrastructure Protection (CIP). The continuous informatization/computerization of critical infrastructures lead to higher interconnectivity and opened new doors for cyber attacks. We develop novel concepts/middleware's to protect legacy and future critical infrastructures. Read more…

Quick Links to some recent/ongoing projects:

1. DFG: (a) GK Mixed Mode Environments: See DEEDS GK activity foils
  LOEWE: (b) CASED: Center for Advanced Security (Ended 2016)
  BMBF: (c) EC-SPRIDE: European Center for Security & Privacy by Design (Ended 2016)
  CRISP: (d) Center for Research in Security and Privacy
  CYSEC: (e) Cybersecurity
2. EC H2020:
  • ESCUDO-CLOUD: Enforceable Security in the Cloud to Uphold Data Ownership (2015-2018)
  • SLA-READY: Making Cloud SLAs Readily Usable in the EU private Sector (2015-2016)
  • MSCA-ITC-NECS: European Training Network for Cybersecurity 2016-2019
  • CIPSEC: Enhancing Critical Infrastructure Protection with Innovative Security Framework 2016-2019
3. EC FP7: SPECS (Secure Provisioning of Cloud Services based on SLA Mgmt) 2013-2016
ABC4TRUST (Attribute Based Credentials for Trust): Nov 2010 – Nov 2014
BiC (Cloud/Internet: Trust; Security & Dependability): Jan 2011 – Jan 2014
4. EC FP6: (a) NoE ReSIST: See ReSIST foils from EUSEA 06 presentation
(b) IP DECOS: See DECOS foils from DECOS Summer School
5. Earlier EC NextTTA, DBench

Funded Projects

2016-2019 MSCA-ITC-NECS
2016-2019 CIPSEC
2015-2018 ESCUDO-CLOUD
2015-20196 EC H2020: SLA-READY
2013-2016 EC FP7 SPECS
2012-2014 GM R&DE
2010-ongoing Hitachi
2010-2014 EC FP7 ABC4TRUST
2010-2013 EC FP7 BiC
2009-2011 EU FP7 INDEXSYS (Reference Architectures)
2009- CASED: Center for Advanced Security
2008- IBM Faculty Award
2008-2011 EU FP7 COMIFIN (Communication Middleware for Monitoring)
2008-2011 EU FP7 INSPIRE (Increasing Security & Protection Through Infrastructure Resilience)
2008-2011 EU FP7 INCO-TRUST (Trustworthy, Secure & Dependable ICT Infrastructures)
2008-2011 EU FP7 THINK-TRUST (Composite Security & Trust for ICT)
2008-2009 EU FP7 Genesys (Generic Embedded Systems Platform)
2006-2015 DFG GKMM (Research Training Group – Cooperative, Adaptive and Responsive Monitoring in Mixed Mode Environments)
2006-2009 Hitachi Research (Distributed X-by-Wire Protocols)
2005-2008 EU FP6 NoE ReSIST (Resilience & Survivability in IST)
2005-2008 Microsoft Research Award (Fast Distributed Consensus)
2004-2007 EU FP6 IP DECOS (Dependable Embedded Components and Systems)
2004-2007 EU FP6 NoE ARTIST2 (Advanced Real Time Embedded Systems)
2003-current Microsoft Research (Robust Software/Middleware/Wrappers)
2003-2004 Microsoft Research Embedded Systems Program Gift
2002-2005 German National Science Foundation (DFG GK -Ubiquitous Computing)
2002-2003 DaimlerChrysler (Dependable Autonomic Computing)
2001-2003 EU FP5 NEXTTA (High Confidence Architectures for Safety Critical Systems)
2001-2003 TFR (Validation of FT RT Protocols Using Formal Techniques)
2000-2002 Vinnova (Cost-Effective Architectures for Embedded/Distributed RT)
2000-2003 Volvo Research (Self Stabilization in Embedded RT Systems)
2000-2002 EU FP5 DBENCH (Dependability Benchmarking)
1999-2002 Saab Endowment (Dependable and Robust Real-Time Systems)
1998-2002 NSF CAREER Award (User/OS Transparent Fault Recovery Using Caches)
1997-1998 State of NJ (Verification and Validation of Embedded Protocols)
1996-1999 DARPA (Fault-Tolerance Through Scheduling in Real Time Systems)
1992-1994 NAWC/ONR (Dependability Evaluation and Application of NGCR Standards)
1991-1993 ONR (Reliability Modeling of Dependable Distributed Systems)
1991-1992 NASA (Engine Controller and Health Monitor System)

The following are some specific project posters

Dependable Embedded Wireless Sensor Networks
Engergy Profiling & Proactive Reconfiguration in Wireless Sensor Networks
SW-HW Integration for Dependable Real-Time Embedded Systems: Design and Optimization
Behavior-Driven Testing of Windows Device Drivers
Fast Asynchronous Agreement Protocols
Exploiting Symmetries to Model Check Fault Tolerant Protocols

Some 2005 project posters are here

Methodology for Robustness Wrapping of OS's
Methodology for Robustness Wrapping of OS's
On Using Abstractions to Model Check an On-line Diagnostic Protoco
A Multi Variable Optimization Approach for SW-HW Integration