Cybersecurity

The area spans multiple research fields related to the protection of ICT systems, from large to embedded ones. Particular attention is devoted to the design and optimization of network security functions, enforcement and verification of platform trustworthiness, formal verification of security protocols, electronic identity for access control and authentication, software protection, quantum cryptography and post-quantum security solutions. Research methods include both algorithmic and AI-based techniques.

Specific research topics in this area are:

  1. Trusted and trustworthy computing and data privacy
  2. Electronic identity, user authentication/authorization, and identity management
  3. Network security design, optimization and automation
  4. Risk analysis, security planning and audit, intrusion detection and tracing, forensics analysis
  5. Reliable and secure, i.e. “resilient,” computer architectures for safety-critical domains
  6. Quantum and post quantum criptography
  7. Formal methods for cybersecurity
  8. Threat modeling and analysis

ERC sectors

  • PE6_2 Computer systems, parallel/distributed systems, sensor networks, embedded
  • systems, cyber-physical systems
  • PE6_4 Theoretical computer science, formal methods, and quantum computing
  • PE6_5 Cryptology, security, privacy, quantum cryptography
  • PE6_7 Artificial intelligence, intelligent systems, multi agent systems

Keywords

  • Cybersecurity
  • Quantum cryptography
  • Trustworthy systems
  • Electronic identity
  • Network security