Research Group for System Security
Security/Malicious Functions in Hardware
Trusted embedded mobile Platforms and Computing
As today's world gets more and more connected, different parties with potentially conflicting interests need to interact with each other in a provably secure and privacy-preserving way. This can be achieved by means of cryptographic protocols.
Security Functions in Hardware
Counterfeiting of goods and intellectual property has reached a level that threatens industrial production, organisational functions, health systems and even national security when malicious elements are deployed for critical infrastructures.
Trusted Platforms and Computing
We analyze, design, and develop advanced security architectures for single systems and distributed applications. Our security architectures aim at providing mechanisms to protect personal user information across IT systems. This concern in particular embedded systems such as RFID and sensor systems as well as smartphones.
| Contact person:
Content & tech