Send email Copy Email Address

Threat Detection & Defenses

Attack-detection mechanisms should be able to reliably detect, predict, and comprehensibly explain both known and novel threats, while also being able to cope with evasion techniques – like obfuscation, polymorphism, or stealth low-volume attacks.

To proactively understand potential attacks on complex IT systems, we need to perform a comprehensive threat analysis of possible attack vectors. Based on this knowledge, we can develop novel methods to reliably detect, predict, and comprehensibly explain known and emerging threats to IT systems. Such threat detection mechanisms must also be able to cope with evasion techniques such as obfuscation or low-level covert attacks. The resulting detection mechanisms should not only be able to detect every critical incident, but also raise alarms only when necessary. The more false alarms that are triggered, the higher the risk that users will ignore the warnings or even permanently disable detection mechanisms.

To create a strong line of defense, attack detection methods should be complemented by appropriate defense methods, ideally chosen autonomously by the attacked system to counter any threat it encounters. In this research area, we pursue this ideal in a variety of ways, for example, by focusing on identifying and mitigating novel system vulnerabilities, developing new methods for software security of complex systems, or novel side-channel attacks and defenses at different system levels.

OUR LATEST PUBLICATIONS

Year 2024

Conference / Medium

MSR
Mining Software RepositoriesMining Software Repositories

Conference / Medium

ICSE
International Conference on Software EngineeringInternational Conference on Software Engineering (ICSE)

Year 2023

Conference / Medium

RAID
Proceedings of International Symposium on Research in Attacks, Intrusions and Defenses (RAID)Proceedings of International Symposium on Research in Attacks, Intrusions and Defenses (RAID)