Cyber-Physical Security is Security in the Internet of Things. In particular we are investigating security solutions that incorporate the physical attributes
of hardware by design, i.e., hardware entangled cryptography– for instance by means of the so-called Physically Unclonable Functions (PUFs).
Secure Architectures and Security Analysis for mobile platforms like Google's Android, Apple's iPhone or Nokia's Onboard redentials. Furthermore, we focus on Sensors and RFID.
Privacy and resilience for Internet-scale critical infrastructures. We focus on enhanced security for data and computation outsoured to the cloud.
Ranges from practical protocols for simple embedded systems to public-key based protocols. Of particular interest are the design and implementation of hardware-based protocols, and privacy-preserving protocols. Moreover, we do research in the field of secure computations
Trust in Mobile and Embedded Systems
We analyze, design, and develop advanced security architectures for personal and distributed systems. Our security architectures aim at providing mechanisms to protect personal user information across IT systems. This concern in particular embedded systems such as low-cost sensor platforms as well as RFID and mobile systems.