The ITU Center for Information Security and Trust (ITU CISAT) provides a multidisciplinary research environment, delivering knowledge and capacity necessary to tackle modern cybersecurity challenges from a societal, legal, organizational, and technical point of view. ITU CISAT draws on expertise in information security, computer science, social science, law and philosophy, covering the range of basic research in security science to applied research in systems-building and analysis of the implications to society.Research
ITU CISAT conducts research in information security, in terms of:
Reliability, security by design, language-based security, continuous deployment
Adversary-, capability- and risk-modeling, risk mitigation, cyber attack detection, theorem proving, model checking
Organizational effects, including trustability, governance, and legislation
Human perceptions of trust, ethics and privacy, including psychological, philosophical and cognitive aspects
ITU CISAT provides research-based multidisciplinary Bachelor's and Master's programs within information security in order to meet the need for cybersecurity experts. ITU CISAT students acquire competencies enabling them to make security decisions as suppliers and acquirers of software, to construct secure software, to assess security risks, to perform penetration testing, and more.
ITU CISAT also strengthens the competences of professionals. In 2019, the center will start up two new projects that will support Danish companies to upgrade their IT security; CSSME Courses (Cyber Security courses for Small and Medium-sized Enterprises) and CIDI (Cybersecure IoT in Danish Industry). Both projects are funded by Industriens Fond.
CISAT working groups are a good way for external parterners, including industry and governmental and non-governmental organizations to interact with CISAT on topics that are becoming increasingly relevant for securing critical infrastructure systems. For more information about each working group, how to join them, please visit the Working Group's webpage.WG-AAI WG-DEMTECH WG-IOT WG-PRIV
|11-Jan||15:00 - 16:00||FAST: Fair Auctions via Secret Transactions||Lorenzo Gentile||Online|
|08-Mar||15:00 - 16:00||"It's Not Something They Really Care About": A Study on Security and Privacy Practices in Danish Companies||Asmita Dalela||Online|
|23-Mar||15.00 - 16.00||Securing a World of Physically Capable Computers||Bruce Schneier||Online|
|12-Apr||15.00 - 16.00||PESTO: Proactive Secure Distributed SSO, or How to Trust a Hacked Server||Carsten Baum, Aarhus University||Online|
|19-Apr||15.00 - 16.00||Research on illicit online markets, mainly for drugs and other goods||Rasmus Munksgaard, Aalborg University||Online|
|26-Apr||15.00 - 16.00||Modelling Human Threats in Socio-Technical Systems||Rosario Giustolisi, ITU||Online|
|3-May||15.00 - 16.00||Certifying the True Error: Machine Learning in Coq with Verified Generalization Guarantees||Gordon Stewart, Ohio University||Online|
|10-May||15.00 - 16.00||CertRL: Formalizing Convergence Proofs for Value and Policy Iteration in Coq||Koundinya Vajjha, University of Pittsburgh||Online|
|17-May||15.00 - 16.00||X-Men: A Mutation-Based Approach for the Formal Analysis of Security Ceremonies||Dr. Diego Sempreboni, King’s College London||Online|
|31-May||9.00 - 10.00||Silas: High-Performance Computing, Automated Reasoning and Machine Learning at the Core of Trustworthy AI||Dr. Zhe Hou, Institute for Integrated and Intelligent Systems, Griffith University, Australia||Online|
|14-June||15.00 - 16.00||"Now I'm a bit angry:" Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them||Dr. Peter Mayer, Karlsruhe Institute of Technology||Online|
|21-June||15.00 - 16.00||Hardware Lottery and the Perils of Computer Security||Dr. Tanvir Arafin||Online|
|5-July||9.00 - 10.00||Modular Synthesis of Certifying STV Counting Programs||Emeritus Professor Rajeev Gore, Australian National University||Online|
|23-August||15.00 - 16.00||TBA||Zsolt István, ITU||Online|
Contact Ieva Daukantas to propose a talk.