Research Groups:
Biometrics & HCI Group |
|
Protocol Group |
|
Security Evaluation Group |
|
Watermarking and Steganography Group |
|
Selected research topic: IT-Security within the automotive domain
As part of the research activity concerning the automotive environment at the Otto-von-Guericke university Automotive OvG the »Multimedia and Security« research group »evaluation« is examining sections of the IT-system that is part of todays cars and the automotive infrastructure in general.
Scientific papers on IT-Security within the automotive domain
- Kiltz, Stefan; Lang, Andreas; Dittmann, Jana: Klassifizierung der Eigenschaften von Trojanischen Pferden; In: DACH Security 2006 IT Security & IT Management; Patrick Horster (Eds.) Syssec, Düsseldorf, Germany, pp.351-361, 2006 pdf
- Andreas Lang, Jana Dittmann; Steigende Informationstechnologie: Sicherheitsrisiko im Fahrzeugbau; Automotive - Safety & Security 2004 Sicherheit und Zuverlässigkeit für automobile Informationstechnik; Ada Deutschland Tagung 2004; Shaker Verlag, Aachen, pp. 21-33, Ada Deutschland Tagung 2004, 6. - 7. Oktober 2004, Stuttgart, ISBN 3-8322-3283-4, 2004 pdf
Selected research topic: Media-, Network- and Computer-Forensics
Within the framework of the research on protocols relevant to IT-security, the »protocol group« also focusses on forensic analyses besides working on steganographic and cryptographic protocols.
This forensic research covers all three subsets of IT-Forensics (Media-, Network- and Computer-Forensics). IT-Forensics, which has been given a high priority, will be looked at in a wholistic approach covering the entire forensic process. This includes the derivation and evalutation of measures to be taken in all of the three stages of the forensic process (preemptive, runtime and post-mortem measures).
As a result of the actual research in the field of Media-Forensics a first Microphone and Environment classification could be presented on ACM MM&Security Workshop 2007:
-
Christian Kraetzer, Andrea Oermann, Jana Dittmann and Andreas Lang: Digital Audio Forensics: A First Practical Evaluation on Microphone and Environment Classification. To appear in the Proceedings of the 2007 ACM Multimedia and Security Workshop in Dallas, Texas, September 20-21, 2007. pdf
Furthermore a behaviour based framework for the classification of specific Trojan Horses was developed as a necessary step in the context of forensic evaluations.
ACM Copyright Notice: Copyright 2005/2006 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Publications Dept., ACM, Inc., fax +1 (212) 869-0481, or permissions{at}acm.org