Computer Security Lab (COSEC)

Investigation areas

Attack and defence against threats

Data processing

Evaluation of systems and cyber risk

Identity management

Reliable and upgradeable systems

Lines of investigation

Access control and authentication

Access control based on behaviour

Anomaly detection

Antivirus

Authentication protocols

Big data analysis focussed on privacy

Biometric authentication

Computation of relevant metadata

Creation of information repositories

Cryptographic authentication

Data origination

Data-driven policies

Detection and monitoring of attacks

Detection and removal of malware

Detection, identification and removal of malware propagators

Development of automatic defences

Development of data harvesting mechanisms

Development of threat detection tools

Harvesting of information on threats

IDS/IPS/Firewalls

Internet of Things

IoT privacy

Large-scale data analysis

Mechanisms for data harvesting

Mobile privacy-preserving applications

Network steganography

New types of malware

Online fraud

Privacy best practices

Privacy in the cloud

Privacy policies

Privacy preservation monitoring tools

Privacy-aware security technologies

Private communication networks

Proxies

Radio frequency identification

Security / privacy through design

Security engineering

Security intelligence

Statistical and predictive risk analysis

Study of patterns