Welcome at the Chair of IT Security
We work on all aspects of technical data protection and network and IT security. We are primarily interested in privacy, i.e. the protection of individuals against the misuse of their data.
Over the past decades, digital technologies have developed rapidly. The advent of digital transformation and the interconnectivity of all areas of life opens up a wealth of new possibilities. Autonomous networked vehicles, cloud computing, industry 4.0, virtual reality with haptic feedback, online banking or social networks are just a few keywords that are changing the way and quality of life. However, this development also brings with it a number of challenges that people often do not immediately grasp, but which may well conflict with their interests.
Our research group is engaged in the development and analysis of security concepts that protect from all types of potential attackers on such systems. We are also interested in the development of technologies that promote data protection in order to protect privacy in the digital world. Finally, we develop protocols and algorithms to secure the underlying infrastructures for communication and computation.
We are part of KASTEL - Research for more security.
Thorsten Strufe gives a talk about ProMACs on September 28 at 10:30 am. For further information check the link below.centre inria
Amr Osman and Jeannine Born (TU Dresden) won Telekom Challenge 2021, receiving the first prize of 150,000 euros for their idea on "automatic network isolation of IoT devices". Congratulations!
more information from TU Dresden (german article)
Thorsten Strufe has been interviewed by Märkische Allgemeine Zeitung (Newspaper).
Topic: "Why the EU's General Data Protection Regulation (DSGVO) unjustly enjoys a bad reputation".
You can find the article online (link below).(german) article on maz-online.de
From September 21 to 23, CeTI will be offering an exciting on- and offline program on the topic of "smart textiles and wearables". The offer ranges from lectures to workshops, for which you can register online. You can find the link below.registration and programme of CeTI Summer School
Thorsten Strufe was interviewed by spiegel.de.
It is about innovations to the messenger service Whatsapp.
You can find the link to the interview below.
(german) interview with Spiegel Netzwelt
Florian Thie received the TU Dresden award for his thesis "Analysis of complex anonymization networks at the case study of Aqua".
He was supervised by Christiane Kuhn and Simon Hanisch, the first examiner was Thorsten Strufe.
The paper entitled "2PPS - Publish/Subscribe with Provable Privacy" by Sarah Abdelwahab Gaballah and Max Mühlhäuser (both TU Darmstadt), Christoph Coijanovic and Thorsten Strufe has been accepted for the SRDS 2021 conference (September 20.-23.).
The paper is about publish/subscribe systems (such as Twitter) that provide strong and provable privacy protections for both publishers of messages and subscribers.more about the conference
We have an immediate opening for a HiWi position as a Research Assistant.
For more information, please see the attached document.
As part of the KIT Open Day under the motto "7 Days - 7 Questions - 7 Formats", Thorsten Strufe was a discussion guest on the topic "Electron Brains & Cyborgs" - Artificial Intelligence revolutionizes the world. You can find the link to the video below.recording of discussion (german)
Prof. Strufe will give a talk on "ProMACs: Leveraging the Streaming Paradigm to Improve Integrity without Transmission Cost" at a colloquium at the University of Hamburg on Monday, May 31, 21.
The event will take place via zoom, starting at 17:15.registration (Informatik Uni Hamburg)
The video of our opening panel at 'Bonner Tage der Demokratie' is online. Thanks for a very nice discussion (in German) with Lorena Jaume-Palasí, Katharina Mosene, Rebekka Weiß, Ulrich Kelber, and Jan Schallaböck - moderated very professional by Ute Lange - about giving up fundamental rights to use online services. - Prof. Strufevideo link
Our paper “Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance” has been accepted for presentation at the 30th USENIX Security Symposium. In this research, we explore and evaluate different brain biometric techniques to authenticate users with consumer BCI tools and investigate user perceptions towards accepting such technologies. Our results show that it is feasible to recognize users based on brain responses to images. With regard to adoption, users call for simpler devices, faster authentication, and better privacy.
The webpage of the Practical IT Security (PS) department is still under construction.
We ask for a little patience. If you have any questions, please contact our webpage assistant