<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		
		<title>Arbeitsgruppe Systemsicherheit: Aktuelle Meldungen</title>
		<link>https://syssec.informatik.uni-due.de/</link>
		<description>Aktuelle Meldungen für: Arbeitsgruppe Systemsicherheit, Universität Duisburg-Essen</description>
		<language>de</language>
		<generator>TYPO3 - get.content.right</generator>
		<docs>http://blogs.law.harvard.edu/tech/rss</docs>
		
		
		
		<lastBuildDate>Fri, 27 Mar 2026 13:48:41 +0100</lastBuildDate>
		
		
		<item>
			<title>Basic Exercise for Cybersecurity Course (Summer Term 2026)</title>
			<link>https://syssec.informatik.uni-due.de//en/news/singleview/basic-exercise-for-cybersecurity-course-summer-term-2026-25385/?no_cache=1</link>
			<guid>https://syssec.informatik.uni-due.de//en/news/singleview/basic-exercise-for-cybersecurity-course-summer-term-2026-25385/?no_cache=1</guid>
			<description>Conversion of number systems and modulo</description>
			<content:encoded><![CDATA[<p>We offer a voluntary basic exercise to support the introduction to the course Cybersecurity in the upcoming summer term 2026:</p><ul><li><strong>Date:</strong> Wednesday, 15.04.2026, 12:00-14:00</li><li><strong>Location:</strong> S04 T01 A02</li></ul><p>The exercise is aimed in particular at students in their first semester or without previous knowledge of computer science. Central basics such as <strong>number systems</strong> (binary, decimal, hexadecimal) and <strong>modulo arithmetic</strong> will be covered, which will be highly relevant in the further course of the course.</p><p>A short confirmation of participation is required for planning purposes. This is done via the corresponding vote in the Moodle course: <a href="https://lehre.moodle.uni-due.de/course/view.php?id=12300" target="_blank" class="moz-txt-link-freetext" rel="noreferrer">https://lehre.moodle.uni-due.de/course/view.php?id=12300</a> (password: <i>moodle.CyberSec.26)</i></p>]]></content:encoded>
			
			
			<pubDate>Fri, 27 Mar 2026 13:48:41 +0100</pubDate>
			
		</item>
		
		<item>
			<title>Secure Cross-Chain Technology Brigade Accepted at ACNS Conference</title>
			<link>https://syssec.informatik.uni-due.de//en/news/singleview/secure-cross-chain-technology-brigade-accepted-at-acns-conference-25326/?no_cache=1</link>
			<guid>https://syssec.informatik.uni-due.de//en/news/singleview/secure-cross-chain-technology-brigade-accepted-at-acns-conference-25326/?no_cache=1</guid>
			<description>The new protection system, called Brigade, enables automated monitoring and detection of malicious transactions in blockchain platforms that rely on so-called cross-chain bridges and protocols.</description>
			<content:encoded><![CDATA[<p>In the blockchain world, cross-chain bridges are the driving force behind decentralized finance (DeFi) technologies. They allow the exchange of assets between different blockchain technologies without the need for a central intermediary.</p><p>Our research on <strong>Brigade</strong> addresses one of the current major security issues in decentralized systems: the high complexity and vulnerability of cross-chain bridges and their protocols. In recent years, the cross-chain infrastructure has been responsible for a significant proportion of the largest security incidents, as attackers exploit complex interactions between multiple blockchains. Brigade tackles this challenge by continuously monitoring cross-chain transactions, correlating relevant on-chain and off-chain events, and automatically identifying malicious behavior. The system can be implemented without changes to existing protocols that are already in use.</p><p>In a comprehensive retrospective analysis of real cross-chain attacks, we demonstrated that Brigade successfully detects attacks with total damages of approximately <strong>$4 billion</strong>. These results underscore the potential of automated, holistic security monitoring for decentralized finance and cross-chain systems.</p><p>The design and evaluation of Brigade will be presented at the <a href="https://acns2026.github.io" target="_blank" rel="noreferrer"><strong>24th </strong>I<strong>nternational Conference on Applied Cryptography and Network Security (ACNS)</strong></a> 2026 in New York.</p><p>The original proposal for Brigade has been developed in the master thesis of <strong>Pascal Winkler</strong>, which received the <a href="/en/news/singleview/dies-academicus-for-pascal-winkler-24465/">Dies Academicus Prize</a>.</p>]]></content:encoded>
			
			
			<pubDate>Thu, 26 Feb 2026 10:02:28 +0100</pubDate>
			
		</item>
		
		<item>
			<title>CASA Cluster of Excellence Receives Funding for Another Seven Years</title>
			<link>https://syssec.informatik.uni-due.de//en/news/singleview/casa-cluster-of-excellence-receives-funding-for-another-seven-years-24923/?no_cache=1</link>
			<guid>https://syssec.informatik.uni-due.de//en/news/singleview/casa-cluster-of-excellence-receives-funding-for-another-seven-years-24923/?no_cache=1</guid>
			<description>There is great excitement among cybersecurity researchers in Germany’s Ruhr area: Yesterday, the German Excellence Commission approved the extension of the CASA Cluster of Excellence. Among the Principal Investigators (PIs) is Prof. Dr. Lucas Davi, Director of paluno – The Ruhr Institute for...</description>
			<content:encoded><![CDATA[<p>Cyberattacks are on the rise worldwide, increasingly targeting hospitals, public institutions, and critical infrastructures. At the same time, state-sponsored attacks are escalating the threat situation, aiming to disrupt democratic processes and endanger societal security and well-being.</p><p>To effectively address these challenges, <strong>CASA - Securing the Digital Society </strong>develops innovative security mechanisms that make digital systems more resilient. CASA takes a research approach that is unique in Europe: it combines cutting-edge technological innovation with insights into the social and human aspects of cybersecurity. This interdisciplinary perspective makes CASA a leading center for holistic cybersecurity research.</p><p><a href="https://syssec.informatik.uni-due.de/team/lucas-vincenzo-davi/" target="_blank" class="link-external" rel="noreferrer">Prof. Dr. Lucas Davi</a>, Director of paluno - The Ruhr Institute for Software Technology, contributes his expertise in system and software security. “<i>At CASA we develop novel security solutions that remain effective under realistic attack scenarios – without slowing down system performance,”</i> explains Davi. <i>“We take a comprehensive view of IT security across all system layers: from hardware-level protections to identifying vulnerabilities in decentralized applications.”</i></p><p>CASA is based at the Horst Görtz Institute for IT Security at Ruhr University Bochum. Other participating institutions are the Max Planck Institute for Security and Privacy in Bochum, the Technical University of Berlin, the University of Bonn and the University of Duisburg-Essen. Funding from the German Research Foundation (DFG) began on January 1, 2019. After an initial term of seven years, the Cluster of Excellence has now been extended until December 31, 2032.</p>&lt;h3&gt;About the Excellence Strategy of the federal and state governments&lt;/h3&gt;<p>The aim of the Excellence Strategy is to strengthen Germany’s position as an outstanding research hub in the long term and further improve its international competitiveness. The Clusters of Excellence funding line is designed to support project-based funding in internationally competitive fields of research at universities or university consortia. The DFG is responsible for developing and implementing this funding line and for publishing calls for proposals every 7 years.</p><p>Further Information: <a href="https://www.dfg.de/en/research-funding/funding-initiative/excellence-strategy" target="_blank" class="external-link-new-window" rel="noreferrer"><i>https://www.dfg.de/en/research-funding/funding-initiative/excellence-strategy</i></a>&nbsp;</p>&lt;h3&gt;Related article:&nbsp;&lt;/h3&gt;<p><strong>News from the Horst-Görtz-Instituts:</strong> <a href="https://hgi.rub.de/en/news/newsarchiv/hginews/excellence-strategy-casa-receives-funding-for-another-seven-years" target="_blank" class="external-link-new-window" rel="noreferrer"><i>https://hgi.rub.de/en/news/newsarchiv/hginews/excellence-strategy-casa-receives-funding-for-another-seven-years</i></a></p>]]></content:encoded>
			
			
			<pubDate>Thu, 22 May 2025 20:15:00 +0200</pubDate>
			
		</item>
		
		<item>
			<title>New Publication at ISSTA: Wemby Discovers Security Vulnerabilities in WebAssembly</title>
			<link>https://syssec.informatik.uni-due.de//en/news/singleview/new-publication-at-issta-wemby-discovers-security-vulnerabilities-in-webassembly-24733/?no_cache=1</link>
			<guid>https://syssec.informatik.uni-due.de//en/news/singleview/new-publication-at-issta-wemby-discovers-security-vulnerabilities-in-webassembly-24733/?no_cache=1</guid>
			<description>WebAssembly is bringing more and more applications to the internet. However, many web apps that use WebAssembly have vulnerabilities. We have investigated the risks to users and developed an analysis tool to make these apps safer.
In addition to HTML, CSS, and JavaScript, WebAssembly (Wasm) has...</description>
			<content:encoded><![CDATA[<p>WebAssembly is bringing more and more applications to the internet. However, many web apps that use WebAssembly have vulnerabilities. We have investigated the risks to users and developed an analysis tool to make these apps safer.</p><p>In addition to HTML, CSS, and JavaScript, WebAssembly (Wasm) has now established itself as the "fourth language" of the web and is supported by all major browsers. The technology allows programs to be developed in languages such as C, C++, Go, or Rust and then run as WebAssembly modules in the browser with minimal performance loss. Many popular web apps, including twitch.tv, Google Earth, Adobe Photoshop, and Zoom, now take advantage of this benefit.</p><p>However, the technology also poses security risks, as shown by our joint study with the TU Braunschweig. We analyzed nearly 38,000 domains on the web and found that more than 77% of these domains transmit data to apps without adequately checking the sources.</p><p>We see this practice as a significant security risk. If a WebAssembly module contains errors, hackers can exploit these vulnerabilities and inject malicious code into users' browsers over the internet.</p><p>To reduce this risk, we developed the analysis tool Wemby. Wemby detects memory errors in WebAssembly modules within the browser. Compared to previous methods, the tool analyzes more code in significantly less time.</p><p>Using Wemby, we discovered, among other things, a security vulnerability in Zoom that could be exploited through manipulated video data. The affected providers have been informed so they can take appropriate protective measures.</p><p>In June 2025, the researchers will present the results of their work at the Software Engineering Conference ISSTA in Trondheim (Norway).</p>]]></content:encoded>
			
			
			<pubDate>Thu, 27 Feb 2025 11:45:51 +0100</pubDate>
			
		</item>
		
		<item>
			<title>Dies Academicus for Pascal Winkler</title>
			<link>https://syssec.informatik.uni-due.de//en/news/singleview/dies-academicus-for-pascal-winkler-24465/?no_cache=1</link>
			<guid>https://syssec.informatik.uni-due.de//en/news/singleview/dies-academicus-for-pascal-winkler-24465/?no_cache=1</guid>
			<description>Our research assistant Pascal Winkler has received the Dies Academicus Award for his master’s thesis. Congratulations!</description>
			<content:encoded><![CDATA[<p>Each year, the University of Duisburg-Essen honors its top graduates with the Dies Academicus Award. This year, our research assistant Pascal Winkler is among the most successful graduates in the category of best master's theses.</p><p>Pascal wrote his master’s thesis in our department under the supervision of Jens-Rene Giesen. The title of his thesis is <em>Mitigating Cross-Chain Bridge Attacks in DeFi Applications</em>. His thesis contributes to strengthening the security infrastructure of decentralized finance (DeFi). By developing advanced strategies to combat attacks on cross-chain bridges, his work significantly enhances the integrity and stability of DeFi ecosystems. In particular, the thesis introduces an innovative development framework for securing cross-chain bridges, which developers can easily adopt. This approach not only boosts investor confidence but also increases the resilience of the entire decentralized financial landscape—an area of growing importance for the financial industry.</p><p>Pascal will now explore this topic further in his doctoral studies. We wish him great success in his research journey through the world of smart contracts and blockchain.</p><p>More information about Pascal’s research can be found on our website [<a href="/en/team/pascal-winkler/">here</a>].</p>]]></content:encoded>
			
			
			<pubDate>Tue, 26 Nov 2024 11:58:57 +0100</pubDate>
			
		</item>
		
		<item>
			<title>Seminar and Bachelor Project Winter Term 24/25</title>
			<link>https://syssec.informatik.uni-due.de//en/news/singleview/seminar-and-bachelor-project-winter-term-2425-24269/?no_cache=1</link>
			<guid>https://syssec.informatik.uni-due.de//en/news/singleview/seminar-and-bachelor-project-winter-term-2425-24269/?no_cache=1</guid>
			<description>Hot Topics in Computer Security</description>
			<content:encoded><![CDATA[<p>Next semester, we will be offering seminars and Bachelor projects on current topics in IT security. This time, we will use a group format with multiple meetings throughout the semester. We will be covering papers from the renowned IT security conferences IEEE Security and Privacy and the USENIX Security Symposium. The latter conference also offers a large number of artifacts (implementation and evaluation data) of the accepted scientific publications, which we will use in our Bachelor project.</p><p><strong>It is highly recommended that you familiarize yourself with the format of the seminar and the Bachelor's project in advance</strong>. This information can be found on our teaching website for both formats: <a href="https://syssec.informatik.uni-due.de/studium-lehre/wintersemester-24-25/" target="_blank">https://syssec.informatik.uni-due.de/studium-lehre/wintersemester-24-25/</a>&nbsp;</p><p>The introductory sessions will take place at the following times:</p><ul>
	<li>Seminar: October 7 at 10:00 a.m. in S-GW 009</li>
	<li>Bachelor's project: October 10 at 10:00 a.m. in S-GW 009</li>
</ul>]]></content:encoded>
			
			<author>lucas.davi.ude@gmail.com</author>
			<pubDate>Fri, 06 Sep 2024 16:37:42 +0200</pubDate>
			
		</item>
		
		<item>
			<title>First Successful Doctorates</title>
			<link>https://syssec.informatik.uni-due.de//en/news/singleview/first-successful-doctorates-24463/?no_cache=1</link>
			<guid>https://syssec.informatik.uni-due.de//en/news/singleview/first-successful-doctorates-24463/?no_cache=1</guid>
			<description>Our two long-standing research associates, Michael Rodler and Sebastian Surminski, have completed their PhD (Dr. rer. nat.). Congratulations!</description>
			<content:encoded><![CDATA[<p>Michael Rodler and Sebastian Surminski were the first employees of our chair. Both were key in establishing the Systems Security Group at the University of Duisburg-Essen. We are pleased that both completed their PhD studies and published their research results at internationally renowned IT security conferences.</p><p>Michael conducted research in the areas of smart contract security and trusted execution environments. The title of his dissertation is <em>Software (In)Security of Smart Contracts and Trusted Enclaves</em>, which he defended on June 27, 2023. Today, Michael works for Amazon Web Services (AWS).</p><p>Sebastian, on the other hand, focused on the security of embedded systems and remote attestation. The title of his dissertation is <em>Securing Embedded Devices with Remote Attestation</em>, which he defended on March 14, 2024. Today, Sebastian works at genua GmbH.</p><p>The department wishes both continued success in their professional careers!</p><p>More information about Michael’s research can be found on our page [<a href="/en/team/former-staff/michael-rodler/">here</a>].<br>
More information about Sebastian’s research can be found on our page [<a href="/en/team/former-staff/sebastian-surminski/">here</a>].</p>]]></content:encoded>
			
			
			<pubDate>Fri, 15 Mar 2024 10:29:00 +0100</pubDate>
			
		</item>
		
		<item>
			<title>New paluno Directorate Elected</title>
			<link>https://syssec.informatik.uni-due.de//en/news/singleview/new-paluno-directorate-elected-23904/?no_cache=1</link>
			<guid>https://syssec.informatik.uni-due.de//en/news/singleview/new-paluno-directorate-elected-23904/?no_cache=1</guid>
			<description>In yesterday's meeting of the paluno board, Prof. Dr. Lucas Davi was appointed as the new director. of the institute. Prof. Dr. Amr Rizk and Prof. Dr. Gregor Schiele have been appointed as vice directors.</description>
			<content:encoded><![CDATA[<p>Professor Davi, head of the&nbsp;<a href="https://www.syssec.wiwi.uni-due.de/" target="_blank" rel="noreferrer">System Security Group</a>, succeeds&nbsp;<a href="https://sse.uni-due.de/ueber-uns/team/klaus-pohl" target="_blank" rel="noreferrer">Professor Pohl</a>,&nbsp;who successfully led the institute since its establishment in 2010. The deputy role will be assumed by Professor Rizk, head of the&nbsp;<a href="https://www.ncs.wiwi.uni-due.de/" target="_blank" rel="noreferrer">Communications Networks and Systems Group</a>, and Professor Schiele, head of the <a href="https://www.uni-due.de/es/" target="_blank" rel="noreferrer">Intelligent Embedded Systens Group</a>.</p><p>These decisions were made during a two-day board retreat. The entire board thanks Professor Pohl for his longstanding commitment and leadership at paluno. At the same time, the new directorate is wished much success&nbsp; for the continued success of the institute.</p>&nbsp;
&lt;h3&gt;About paluno&lt;/h3&gt;
&nbsp;<p><a href="https://paluno.uni-due.de/" target="_blank" rel="noreferrer">paluno - the Ruhr Institute for Software Technology</a> is one of the largest research institutes for software engineering in Germany. With 12 professors and over 100 researchers, paluno conducts excellent applied and fundamental research. paluno investigates and tests principles, methods, and tools for the development of software-based technologies. As significant drivers of digitalization, these technologies are changing our world - the way we work, learn, conduct business, produce, communicate, and travel. The researchers at paluno are committed to ensuring that digitalization succeeds with software-based systems and that the new technologies serve people, are user-friendly, and secure..</p>]]></content:encoded>
			
			
			<pubDate>Tue, 06 Feb 2024 21:57:23 +0100</pubDate>
			
		</item>
		
		<item>
			<title>Lehrveranstaltungen im Wintersemester 2023/2024</title>
			<link>https://syssec.informatik.uni-due.de//en/news/singleview/lehrveranstaltungen-im-wintersemester-20232024-23636/?no_cache=1</link>
			<guid>https://syssec.informatik.uni-due.de//en/news/singleview/lehrveranstaltungen-im-wintersemester-20232024-23636/?no_cache=1</guid>
			<description>Im kommenden Semester wird unsere Arbeitsgruppe verschiedene Veranstaltungen in den Bachelor und Master Studiengängen anbieten.

Im Bachelor bieten wir die neue Vorlesung, Application Management an. Diese Vorlesung wird die Sicherheitskonzepte von Kryptowährungen und Blockchain Technologien mit...</description>
			<content:encoded><![CDATA[<p>Im kommenden Semester wird unsere Arbeitsgruppe verschiedene Veranstaltungen in den Bachelor und Master Studiengängen anbieten.</p><p>Im Bachelor bieten wir die neue Vorlesung,<i> Application Management</i> an. Diese Vorlesung wird die Sicherheitskonzepte von Kryptowährungen und Blockchain Technologien mit Schwerpunkt Smart Contract Security behandeln. Die Vorlesung Application Management vermittelt ein umfassendes Verständnis für die effiziente und sichere Verwaltung von Anwendungen über ihren gesamten Lebenszyklus hinweg, mit einem Schwerpunkt auf Sicherheit und bewährten Praktiken. Es werden technische und Managementaspekte behandelt, um Anwendungen funktionsfähig und sicher zu halten.</p><p>Im Master bieten wir die Vorlesung <i>Secure Software Systems</i> an. In dieser Vorlesung werden Studierende über aktuelle Forschung, Angriffstechniken und Abwehrmethoden im Bereich der Software- und Systemsicherheit informiert, mit einem Schwerpunkt auf der Analyse von Sicherheitsproblemen und Schutztechnologien für verschiedene Rechnerarchitekturen sowie der Verwundbarkeit von Softwaresystemen gegenüber Laufzeitangriffen (Exploits).</p><p>Zudem bieten wir jedes Semester eine begrenzte Anzahl an Seminararbeiten und Bachelorprojektarbeiten an. Eine Übersicht über die angebotenen Veranstaltungen findet sich auf unserer <a href="https://www.syssec.wiwi.uni-due.de/studium-lehre/wintersemester-23-24/" target="_blank" rel="noreferrer">Lehre Seite für das Wintersemester 2023/2024</a> .</p><p><strong>Beachte</strong>: Denken Sie bitte an die Anmeldungen in den entsprechenden Moodle Kursen für die oben genannten Vorlesungen. Die Zugangsschlüssel zur Einschreibung in die Moodle-Kurse erhalten Sie jeweils während der ersten Vorlesung.</p>]]></content:encoded>
			
			<author>Oussama.Draissi@uni-due.de</author>
			<pubDate>Tue, 26 Sep 2023 13:31:00 +0200</pubDate>
			
		</item>
		
		<item>
			<title>CSAW'23: Two finalist papers</title>
			<link>https://syssec.informatik.uni-due.de//en/news/singleview/csaw23-two-finalist-papers-23635/?no_cache=1</link>
			<guid>https://syssec.informatik.uni-due.de//en/news/singleview/csaw23-two-finalist-papers-23635/?no_cache=1</guid>
			<description>Two papers of our chair advanced to the final round of the NYU Tandon College of Engineering's annual Cyber Security Awareness Week Applied Research Competition.
The two works were admitted to the selection of ten finalists:

RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and...</description>
			<content:encoded><![CDATA[<p>Two papers of our chair advanced to the final round of the NYU Tandon College of Engineering's annual <a href="https://www.csaw.io/research" target="_blank" rel="noreferrer">Cyber Security Awareness Week Applied Research Competition</a>.<br>
The two works were admitted to the selection of ten finalists:</p><p><a href="/en/research/publications/riscyrop-automated-return-oriented-programming-attacks-on-risc-v-and-arm64-16221/">RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64</a><br>
<i>Tobias Cloosters, David Paaßen, Jianqiang Wang, Oussama Draissi, Patrick Jauernig, Emmanuel Stapf, Lucas Davi, Ahmad-Reza Sadeghi</i></p><p><a href="/en/research/publications/clepsydracache-preventing-cache-attacks-with-time-based-evictions-16245/">ClepsydraCache – Preventing Cache Attacks with Time-Based Evictions</a><br>
<i>Jan Philipp Thoma, Christian Niesler, Dominic Funke, Gregor Leander, Pierre Mayr, Nils Pohl, Lucas Davi, Tim Güneysu</i></p>]]></content:encoded>
			
			
			<pubDate>Mon, 18 Sep 2023 10:53:00 +0200</pubDate>
			
		</item>
		
	</channel>
</rss>