Research Projects

SysKitLogo SysKit: The goal of the project SysKit is to develop tools for optimized hardware-based security technologies for Industry 4.0 (I4.0) applications. Current industrial plants and production facilities in German key sectors (from machine construction to chemical industries, power engineering, and vehicle manufacturing) are characterized by an increasing number of networked systems and components that exchange more and more data. For our subproject, we develop modular components to support secure and energy-efficient data processing and secure data transfer in I4.0 facilities - with a focus on wireless transmissions. ... More

InStructLogo InStruct: The project InStruct pursues the goal to enable and support the controlled loss of online digital data: digital forgetting. Deleting data at fixed predefined points in time is already technically supported today, it however addresses only a small part of the problem and solution space. In InStruct we investigate novel approaches beyond the automatic deletion of data and media at predefined expiry dates. We are developing solutions for flexible expiration times that may be based on external conditions. Our approaches are developed to work reliably and to be verifiably secure. Countermeasures and attacks by third parties to prevent or undo the expiration are in the center of our focus.

BERCOMLogo BERCOM: The project BERCOM (Blueprint for pan-European Resilient Critical infrastructures based on LTE COmmunications) is a Franco-German collaboration of industry, research organizations and academia from the energy as well as communications sectors. Its objective is to increase the resilience of critical infrastructures by appropriate adaptation of the emerging mobile technologies. As part of the pro­ject, the information security group ad­dres­ses se­ver­al sub­jects con­cerning security analysis and security mechanisms for LTE communication and LTE devices. ... More

UbiCryptLogo GRK 1817: "New Challenges For Cryptography In Ubiquitous Computing": The DFG Re­se­arch Trai­ning Group in­ves­ti­ga­tes cryp­to­gra­phic me­cha­nis­ms which form the fo­un­da­ti­on for se­cu­ri­ty so­lu­ti­ons in ubi­qui­tous com­pu­ting. The re­se­arch is struc­tu­red in three le­vels: cryp­to­gra­phic pri­mi­ti­ves, de­vice and sys­tem level. A com­mon theme is that new cryp­to­gra­phic me­thods are re­se­ar­ched for ap­p­li­ca­ti­ons which are di­stri­bu­ted and hea­vi­ly in­ho­mo­ge­neous. The re­se­arch to­pics range from cryp­to­gra­phic fo­un­da­ti­ons such as fully ho­mo­mor­phic en­cryp­ti­on, which is very de­s­i­ra­ble for pri­va­cy re­a­sons, over se­cu­ri­ty for me­di­cal im­plants to in­ter­net se­cu­ri­ty so­lu­ti­ons in­vol­ving new na­tio­nal ID cards ... More

DigForgLogo Digital Forgetting: The goal of this project, supported by the Mercator Research Center Ruhr, is to investigate and develop technical solutions that support the expiration of online data. By this we tackle the goal of "digital forgetting". We focus on various protection goals that users may have for staying in control over published data. ... More