Detecting Attacks on Connected Vehicles

Attacks on connected vehicles require special attention and there is a need for new sophisticated security solutions that will cover the integration of different domains in connected vehicles and help proactively address potential threats to connected vehicles. The overall goal of this project is to provide various security solutions for integrity, access control, availability, and […]

Read More
White-box computing security patterns and software security modeling

  In black-box security, the software is assumed to run in a trusted environment. In the context of white-box attacks, the environment is assumed to be distrusted and the users of the software, which are installed in a device, have unlimited time and resources to break into the software and has access to binary code […]

Read More
Threat Models in JavaScript Applications

In the modern world people want fast access to the right data at the right time. The facilitator of this data transmission and interconnection is the internet. People are sending and receiving data through their different devices. In this so called ubiquitous era service providers are moving from in shop servers to cloud environments and […]

Read More
Security in Ultra Large Software Systems

Ultra large software systems play an increasing important role in our lives. They are systems such as the world wide banking system, mobile communications systems, social networks, online retailers and online gaming systems. Ultra large software systems are critical and failures in the systems can critically impact the economic health of companies, markets and even […]

Read More
Prototype Behavior Based Integrity Verification (BBIV)

Web computing, in which the world-wide web is itself employed as a distributed computing platform, is entering a stage of rapid expansion with the advent of Open Web Platform so that programs that once worked only a native environment on desktop, tablets or phones can now work from within a browser itself. There is therefore […]

Read More
To analyze and identify White Box techniques that can be used to protect cryptographic operations of various ciphers, starting with SM4 Symmetric Block Cipher

White-box cryptography seeks to maintain the secrecy of cryptographic keys used by software, despite an attacker having full control over the software. This project extends the work by Dr. Lin on the Chinese cipher SM4, as well as its application to a further cipher. The goal of this project is: 1) To implement a complete […]

Read More
Safety and Security for Connected and Autonomous Vehicles

Currently, the automotive industry is going through a very significant transformation—one that is blending cars with modern IT, involving technologies such as: multiple CPUs for in-car computing, ad-hoc networking and Internet connectivity, computer vision and sensing technologies, entertainment and artificial intelligence for automated driving and real-world congestion control. Connected and intelligence vehicles are also raising […]

Read More
HTML5 Integrity and Performance

The research involved in this internship focuses on the performance and integrity of HTML5. In terms of performance, the intern will design and implement a set of tests that will be used to analyze the performance of HTML5 applications. These tests will focus on measuring the computational performance, network performance, as well as rendering performance […]

Read More
Methods for detecting Hardware Blu-ray player emulation, debugging or instrumentation

Blu-Ray Disk Framework offers content protection system which is intended to protect audio/video media against piracy. The Blu-Ray Content Protection System consists of three individually working components: Advance Access Control System, ROM-Mark and BD+. Each component works collaboratively with the other in order to protect high-definition content distributed on Blu-Ray discs. The ability of a […]

Read More
Modeling and Analysis of access-control policies (SELinux and/or SMACK)

Access-control policy management is an increasingly hard problem from both the security point of view (is the policy “safe”?) and the functionality point of view (does the system still work as expected?). Even when a policy is considered both safe and functional, each addition, deletion or modification of the policy has the potential to break […]

Read More