Project Areas
S – Solutions

S2 – Attestation Protocols

The project designs and develops novel attestation schemes that not only allow to verify integrity and trustworthiness of single remote devices, but also of autonomous networks. The schemes will efficiently detect novel runtime attacks (e.g., data-only exploits, DOP) on embedded systems. The solutions will be secure in a strong adversary model which considers physical attacks and advanced computing capabilities (e.g., a quantum computers).

Principal Investigators

  Name Working area(s) Contact
Prof. Lucas Davi
Secure Software Systems
S2, T1
+49 201 183-6445
S-GW 212
Prof. Ahmad-Reza Sadeghi
System Security
P3, S2, S7
+49 6151 16-25328
S2|20 305

Researchers

  Name Contact
Tigist Abera
System Security Lab
+49 6151 16-25323
S2|20 304
Duc Thien Nguyen
System Security Lab
+49 6151 16- 27344
S2|20 303
Oussama Draissi
Secure Software Systems
+49 201 18-37019
S-GW 309

Publications

Loading...
Loading data from TUbiblio…

Error on loading data

An error has occured when loading publications data from TUbiblio. Please try again later.

  • {{ year }}

    • ({{ publication.date.toString().substring(0,4) }}):
      {{ publication.title }}.
      In: {{ publication.series }}, {{ publication.volume }}, In: {{ publication.book_title }}, In: {{ publication.publication }}, {{ publication.journal_volume}} ({{ publication.number }}), ppp. {{ publication.pagerange }}, {{ publication.place_of_pub }}, {{ publication.publisher }}, {{ publication.institution }}, {{ publication.event_location }}, {{ publication.event_dates }}, ISSN {{ publication.issn }}, e-ISSN {{ publication.eissn }}, ISBN {{ publication.isbn }}, {{ labels[publication.type]?labels[publication.type]:publication.type }}
    • […]

Number of items in this list: {{ publicationsList.length }}
Only the {{publicationsList.length}} latest publications are displayed here.

View complete list at TUbiblio View this list at TUbiblio