Research

Research

Research

Our research focus lies on the development and analysis of IT security technologies in combination with the functional security of and the user interaction with the to-be-protected systems. As application areas, we look specifically at the Internet of Things as well as safety-critical systems. Especially in the area of the Internet of Things, we are also dealing with the important topic of data security and with 'privacy-enhancing technologies'.

Current publications

We list the publications of the last three years below. A complete list, including BibTex format, can be found on the Publications page.

2024

  • A. El Khairi, M. Caselli, A. Peter, A. Continella, „ReplicaWatcher: Training-less Anomaly Detection in Containerized Microservices” in Proc. of the 31th Annual Network and Distributed System Security Symposium (NDSS 2024), ACM, 2024, to appear.
  • P. Jakubeit, A. Peter, M. van Steen, „RoomKey: Extracting a Volatile Key with Information from the Local WiFi Environment Reconstructable within a Designated Area”. In Proc. of the 10th International Conference on Information Systems Security and Privacy (ICISSP 2024), SciTePress, 2024, to appear.

2023

  • A. Bassit, F. Hahn, R. Veldhuis, A. Peter, „Improved Multiplication-Free Biometric Recognition Under Encryption” in IEEE Transactions on Biometrics, Behavior, and Identity Science (T-BIOM), IEEE, 2023. (» PDF)
  • V. Stanciu, M. van Steen, C. Dobre, A. Peter, „Privacy-friendly statistical counting for pedestrian dynamics” in Computer Communications, vol. 211, pp. 178-192, Elsevier, 2023. (» PDF)
  • J. Starink, M. Huisman, A. Peter, A. Continella, „Understanding and Measuring Inter-Process Code Injection in Windows Malware” in Proc. of the 19th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2023), Springer, 2023, to appear.
  • A. Bassit, F. Hahn, Z. Rezgui, U. Kelly, R. Veldhuis, A. Peter, „Template Recovery Attack on Homomorphically Encrypted Biometric Recognition Systems with Unprotected Threshold Comparison” in Proc. of the 2023 International Joint Conference on Biometrics (IJCB 2023), IEEE, 2023, to appear.
  • P. Jakubeit, A. Peter, M. van Steen, „LocKey: Location-based Key Extraction from the WiFi Environment in the User’s Vicinity”  in Proc. of the 18th International Conference on Information Security Practice and Experience (ISPEC 2023), Springer, 2023. (» PDF)
  • C. Sabater, F. Hahn, A. Peter, J. Ramon, „Private Sampling with Identifiable Cheaters” in Proceedings on Privacy Enhancing Technologies (PoPETs), 2023. (» PDF)
  • P. Jakubeit, A. Peter, M. van Steen, "The Measurable Environment as Nonintrusive Authentication Factor on the Example of WiFi Beacon Frames" in Proc. of the 5th International Workshop on Emerging Technologies for Authorization and Authentication (ETAA 2022), Springer, 2023. (» PDF)
Webmaster (Changed: 20 Aug 2024)  Kurz-URL:Shortlink: https://uol.de/p87732en | # |
Zum Seitananfang scrollen Scroll to the top of the page