TUM Logo

Frederic Stumpf

Dr. Frederic Stumpf

Alumni

now at ESCRYPT GmbH

I left Fraunhofer AISEC and moved to ESCRYPT GmbH, Stuttgart.

Short CV:

  • Since 7/2013: Escrypt GmbH, Branch Manager Stuttgart
  • 2010 - 2013: Head of Department Embedded Security and Trusted OS at Fraunhofer AISEC, Munich
  • 2009 - 2010: Senior Researcher and Dep. Head of Department Embedded Security and Trusted OS at Fraunhofer AISEC, Munich
  • 2006 - 2009: Research Assistant at chair for IT-Security, Darmstadt

Research Interests

  • Trusted Computing
  • Virtualization
  • Secure Operating Systems
  • Wireless Sensor Networks
  • Car-to-Car Communication
  • Embedded Security

Professional activities:

  • Past projects: HIVE (Project Coordinator), CONVERGE, UMABASA, PRESERVE, Asmonia, RACE, ARAMiS, SealedCloud, RESIST, DFG Project TrustCaps
  • PC memberships: CARDIS 2013, CARDIS 2012, ESCAR 2012, Workshop on Cyber-Physical Systems (INFORMATIK 2012), IEEE SecurWare 2010, IEEE SecurWare 2009, SecuCode 2009 (In conjunction with ACM CCS 2009).
  • Reviewing activities: International Journal of Geographical Information Science,
    IEEE Wireless Communications Journal, Workshop on XEN in High-Performance Cluster and Grid Computing Environments (XHPC'06)

Invited Talks

  • Security im Automobil – Zukunft oder Gegenwart?, IT-Speicher, Regensburg, Germany, April 30, 2013
  • Wenn das Licht ausgeht – Angriffe und Sicherheitslösungen für Smart Metering, Innovation Forum Smart Systems.Embedded, Munich, April 18
  • When the lights go out Attacks and Security Solutions for Smart Metering, SmartCard Workshop, Darmstadt, Germany, February 2013
  • Building Blocks for Secure Embedded Systems, TU Berlin, Germany, May 2, 2012
  • Security as Basis for Safety-critical Systems, SiT-Safety in Transportation 2011, TU Braunschweig, Braunschweig, Germany, November 29, 2011
  • Datenübertragung über öffentliche Netze im Bahnverkehr – Fluch oder Segen?, Safetronic 2010, Munich, Germany, November 9, 2010
  • Virtualization Techniques for Embedded Systems, CAST Forum Embedded Security, Darmstadt, Germany, August 26, 2010
  • Trusted and Secure Mobile Platforms, Keynote, IEEE Symposium on Embedded Security, Leuven, Belgium June 06, 2010
  • Neue Verfahren zur Komponentenidentifikation und -Authentifikation mittels Physical Unclonable Functions, Bundesamt für Sichere Informationstechnik (BSI), Bonn, Germany, April 29, 2010
  • Robust Embedded Systems Using Virtualization, Innovation Forum Embedded Systems, Munich, Germany, April 23, 2010
  • Trusted and Secure Mobile Platforms, First Taiwanese Workshop on Security and System-on-Chip, Taipei, Taiwan, February 26, 2010
  • Protection of Multipurpose ECUs in On-board Systems, Car-2-Car Consortium Liaison Security Workshop, Wolfsburg, Germany, November, 5, 2009
  • Trust, Security and Privacy in VANETs – A Multilayered Security Architecture for C2C-Communication, Research Seminar at Royal Holloway University, UK, November 11, 2007
  • Attestation eines TC-geschützten Systems, CAST Forum Trusted Computing, Darmstadt, Germany, May 24, 2007

Publications

2014   SobiTra – A Software-based Trust-Anchor for ARM Cortex Application Processors

Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY ’14)

2013   Comprehensive Analysis of Software Countermeasures Against Fault Attacks

Design, Automation and Test in Europe (DATE 2013)

  PAL - Privacy Augmented LTE: A Privacy-Preserving Scheme for Vehicular LTE Communication

Proceedings of the 10th ACM International Workshop on Vehicular Internetworking, Systems, and Applications (ACM VANET 2013)

  Improving Mobile Device Security with Operating System-level Virtualization

28th IFIP International Information Security and Privacy Conference (SEC 2013)

  Active File Integrity Monitoring using Paravirtualized Filesystems.

Proceedings of the 5th International Conference on Trusted Systems (InTrust 2013)

2012   Localized Electromagnetic Analysis of Cryptographic Implementations

Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012

  A Cache Timing Attack on AES in Virtualization Environments

14th International Conference on Financial Cryptography and Data Security (Financial Crypto 2012)

  Page-based Runtime Integrity Protection of User and Kernel Code

Proceedings of EuroSec'12, 5th European Workshop on System Security

  Complementary IBS: Application Specific Error Correction for PUFs

IEEE Int. Symposium on Hardware-Oriented Security and Trust

  Attestation of Mobile Baseband Stacks

The 6th International Conference on Network and System Security (NSS 2012)

  Secure and Privacy-Aware Multiplexing of Hardware-Protected TPM Integrity Measurements among Virtual Machines

15th International Conference on Information Security and Cryptology (ICISC 2012)

  A Secure Architecture for Smart Meter Systems

4th International Symposium on Cyberspace Safety and Security (CSS 2012)

  A New Security Architecture for Smartcards Utilizing PUFs

Information Security Solutions Europe (ISSE 2012)

2011   A Cost-Effective FPGA-based Fault Simulation Environment

Proceedings of the Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2011)

  Semi-invasive EM Attack on FPGA RO PUFs and Countermeasures

Proceedings of the 6th Workshop on Embedded Systems Security (WESS 2011)

  Asymmetric Cryptography in Automotive Access and Immobilizers

Proceedings of the 9th escar Embedded Security in Cars Conference

  Side-Channel Analysis of PUFs and Fuzzy Extractors

4th International Conference on Trust and Trustworthy Computing (Trust 2011)

2010   Toward Artificial Synesthesia: Linking Images and Sounds via Words

NIPS Workshop on Machine Learning for Next Generation Computer Vision Challenges

  Leveraging Attestation Techniques for Trust-Establishment in Distributed Systems


  Improving the Quality of Ring Oscillator PUFs on FPGAs

Proceedings of the 5th Workshop on Embedded Systems Security (WESS'2010)

  Efficient One-Pass Entity Authentication based on ECC for Constrained Devices

IEEE Int. Symposium on Hardware-Oriented Security and Trust

2009   A Security Architecture for Multipurpose ECUs in Vehicles

25. VDI/VW-Gemeinschaftstagung: Automotive Security

  On Controlled Sharing of Virtual Goods

Proceedings of the 7th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods

  Revocation of TPM Keys

Proceedings of the Second International Conference on Trusted Computing (TRUST 2009)

  Enhancing Control of Service Compositions in Service-Oriented Architectures

Proceedings of the Third International Workshop on Advances in Information Security ({WAIS} 2009)

2008   Towards Secure E-Commerce Based on Virtualization and Attestation Techniques

Proceedings of the Third International Conference on Availability, Reliability and Security (ARES 2008)

  Improving the Scalability of Platform Attestation

Proceedings of the Third ACM Workshop on Scalable Trusted Computing (ACM STC'08)

  Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques

Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2008)

2007   Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques

Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks

2006   Hades - Hardware Assisted Document Security

Second Workshop on Advances in Trusted Computing (WATC '06 Fall)

  A Robust Integrity Reporting Protocol for Remote Attestation

Second Workshop on Advances in Trusted Computing (WATC '06 Fall)

2005   NoSE - building virtual honeynets made easy

Proceedings of the 12th International Linux System Technology Conference (Linux-Kongress 2005)