Frederic Stumpf
Dr. Frederic Stumpf
Alumni
| now at ESCRYPT GmbH |
I left Fraunhofer AISEC and moved to ESCRYPT GmbH, Stuttgart.
Short CV:
- Since 7/2013: Escrypt GmbH, Branch Manager Stuttgart
- 2010 - 2013: Head of Department Embedded Security and Trusted OS at Fraunhofer AISEC, Munich
- 2009 - 2010: Senior Researcher and Dep. Head of Department Embedded Security and Trusted OS at Fraunhofer AISEC, Munich
- 2006 - 2009: Research Assistant at chair for IT-Security, Darmstadt
Research Interests
- Trusted Computing
- Virtualization
- Secure Operating Systems
- Wireless Sensor Networks
- Car-to-Car Communication
- Embedded Security
Professional activities:
- Past projects: HIVE (Project Coordinator), CONVERGE, UMABASA, PRESERVE, Asmonia, RACE, ARAMiS, SealedCloud, RESIST, DFG Project TrustCaps
- PC memberships: CARDIS 2013, CARDIS 2012, ESCAR 2012, Workshop on Cyber-Physical Systems (INFORMATIK 2012), IEEE SecurWare 2010, IEEE SecurWare 2009, SecuCode 2009 (In conjunction with ACM CCS 2009).
- Reviewing activities: International Journal of Geographical Information Science,
IEEE Wireless Communications Journal, Workshop on XEN in High-Performance Cluster and Grid Computing Environments (XHPC'06)
Invited Talks
- Security im Automobil – Zukunft oder Gegenwart?, IT-Speicher, Regensburg, Germany, April 30, 2013
- Wenn das Licht ausgeht – Angriffe und Sicherheitslösungen für Smart Metering, Innovation Forum Smart Systems.Embedded, Munich, April 18
- When the lights go out – Attacks and Security Solutions for Smart Metering, SmartCard Workshop, Darmstadt, Germany, February 2013
- Building Blocks for Secure Embedded Systems, TU Berlin, Germany, May 2, 2012
- Security as Basis for Safety-critical Systems, SiT-Safety in Transportation 2011, TU Braunschweig, Braunschweig, Germany, November 29, 2011
- Datenübertragung über öffentliche Netze im Bahnverkehr – Fluch oder Segen?, Safetronic 2010, Munich, Germany, November 9, 2010
- Virtualization Techniques for Embedded Systems, CAST Forum Embedded Security, Darmstadt, Germany, August 26, 2010
- Trusted and Secure Mobile Platforms, Keynote, IEEE Symposium on Embedded Security, Leuven, Belgium June 06, 2010
- Neue Verfahren zur Komponentenidentifikation und -Authentifikation mittels Physical Unclonable Functions, Bundesamt für Sichere Informationstechnik (BSI), Bonn, Germany, April 29, 2010
- Robust Embedded Systems Using Virtualization, Innovation Forum Embedded Systems, Munich, Germany, April 23, 2010
- Trusted and Secure Mobile Platforms, First Taiwanese Workshop on Security and System-on-Chip, Taipei, Taiwan, February 26, 2010
- Protection of Multipurpose ECUs in On-board Systems, Car-2-Car Consortium Liaison Security Workshop, Wolfsburg, Germany, November, 5, 2009
- Trust, Security and Privacy in VANETs – A Multilayered Security Architecture for C2C-Communication, Research Seminar at Royal Holloway University, UK, November 11, 2007
-
Attestation eines TC-geschützten Systems, CAST Forum Trusted Computing, Darmstadt, Germany, May 24, 2007
Publications
| 2014 | SobiTra – A Software-based Trust-Anchor for ARM Cortex Application Processors
Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY ’14) |
|
| 2013 | Comprehensive Analysis of Software Countermeasures Against Fault Attacks
Design, Automation and Test in Europe (DATE 2013) |
|
| PAL - Privacy Augmented LTE: A Privacy-Preserving Scheme for Vehicular LTE Communication
Proceedings of the 10th ACM International Workshop on Vehicular Internetworking, Systems, and Applications (ACM VANET 2013) |
||
| Improving Mobile Device Security with Operating System-level Virtualization
28th IFIP International Information Security and Privacy Conference (SEC 2013) |
||
| Active File Integrity Monitoring using Paravirtualized Filesystems.
Proceedings of the 5th International Conference on Trusted Systems (InTrust 2013) |
||
| 2012 | Localized Electromagnetic Analysis of Cryptographic Implementations
Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012 |
|
| A Cache Timing Attack on AES in Virtualization Environments
14th International Conference on Financial Cryptography and Data Security (Financial Crypto 2012) |
||
| Page-based Runtime Integrity Protection of User and Kernel Code
Proceedings of EuroSec'12, 5th European Workshop on System Security |
||
| Complementary IBS: Application Specific Error Correction for PUFs
IEEE Int. Symposium on Hardware-Oriented Security and Trust |
||
| Attestation of Mobile Baseband Stacks
The 6th International Conference on Network and System Security (NSS 2012) |
||
| Secure and Privacy-Aware Multiplexing of Hardware-Protected TPM Integrity Measurements among Virtual Machines
15th International Conference on Information Security and Cryptology (ICISC 2012) |
||
| A Secure Architecture for Smart Meter Systems
4th International Symposium on Cyberspace Safety and Security (CSS 2012) |
||
| A New Security Architecture for Smartcards Utilizing PUFs
Information Security Solutions Europe (ISSE 2012) |
||
| 2011 | A Cost-Effective FPGA-based Fault Simulation Environment
Proceedings of the Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2011) |
|
| Semi-invasive EM Attack on FPGA RO PUFs and Countermeasures
Proceedings of the 6th Workshop on Embedded Systems Security (WESS 2011) |
||
| Asymmetric Cryptography in Automotive Access and Immobilizers
Proceedings of the 9th escar Embedded Security in Cars Conference |
||
| Side-Channel Analysis of PUFs and Fuzzy Extractors
4th International Conference on Trust and Trustworthy Computing (Trust 2011) |
||
| 2010 | Toward Artificial Synesthesia: Linking Images and Sounds via Words
NIPS Workshop on Machine Learning for Next Generation Computer Vision Challenges |
|
| Leveraging Attestation Techniques for Trust-Establishment in Distributed Systems
|
||
| Improving the Quality of Ring Oscillator PUFs on FPGAs
Proceedings of the 5th Workshop on Embedded Systems Security (WESS'2010) |
||
| Efficient One-Pass Entity Authentication based on ECC for Constrained Devices
IEEE Int. Symposium on Hardware-Oriented Security and Trust |
||
| 2009 | A Security Architecture for Multipurpose ECUs in Vehicles
25. VDI/VW-Gemeinschaftstagung: Automotive Security |
|
| On Controlled Sharing of Virtual Goods
Proceedings of the 7th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods |
||
| Revocation of TPM Keys
Proceedings of the Second International Conference on Trusted Computing (TRUST 2009) |
||
| Enhancing Control of Service Compositions in Service-Oriented Architectures
Proceedings of the Third International Workshop on Advances in Information Security ({WAIS} 2009) |
||
| 2008 | Towards Secure E-Commerce Based on Virtualization and Attestation Techniques
Proceedings of the Third International Conference on Availability, Reliability and Security (ARES 2008) |
|
| Improving the Scalability of Platform Attestation
Proceedings of the Third ACM Workshop on Scalable Trusted Computing (ACM STC'08) |
||
| Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques
Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2008) |
||
| 2007 | Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques
Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks |
|
| 2006 | Hades - Hardware Assisted Document Security
Second Workshop on Advances in Trusted Computing (WATC '06 Fall) |
|
| A Robust Integrity Reporting Protocol for Remote Attestation
Second Workshop on Advances in Trusted Computing (WATC '06 Fall) |
||
| 2005 | NoSE - building virtual honeynets made easy
Proceedings of the 12th International Linux System Technology Conference (Linux-Kongress 2005) |
