Hasan Ibne Akram, PhD

Hasan Ibne Akram, PhD

Metropolregion München
14.076 Follower:innen 500+ Kontakte

Info

I am a serial entrepreneur, a computer scientist, passionate about automotive 🚗 software…

Serviceleistungen

Artikel von Hasan Ibne Akram, PhD

  • Building a Business in Automotive Cybersecurity

    Building a Business in Automotive Cybersecurity

    Let’s say, you have decided to become an entrepreneur. You want to focus on building a business in the automotive…

    1 Kommentar
  • Making Your Millions in a 9.7 Billion Dollar Industry

    Making Your Millions in a 9.7 Billion Dollar Industry

    The automotive cybersecurity industry is projected to reach $9.7 billion by the year 2030 according to a whitepaper by…

    1 Kommentar
  • Car Hacking: How To Hack An ECU

    Car Hacking: How To Hack An ECU

    Autonomous driving is the next big thing in the automotive industry. As technology continues to evolve, innovation is…

    3 Kommentare
  • 3 Myths in Automotive Safety Integrity Level (ASIL)

    3 Myths in Automotive Safety Integrity Level (ASIL)

    In the automotive industry, we often hear a lot of myths about ASIL or Automotive Safety Integrity Level and it is just…

    8 Kommentare
  • 6 Steps Towards ISO 21434 Compliance

    6 Steps Towards ISO 21434 Compliance

    In today’s automotive industry, a lot of people are struggling and asking questions about the ISO 21434 or the UNECE…

    4 Kommentare

Beiträge

Aktivitäten

Berufserfahrung

  • Matrickz GmbH Grafik
  • -

    Unterschleißheim, Bavaria, Germany

  • -

    Munich, Bavaria, Germany

  • -

    Darmstadt, Hesse, Germany

Ausbildung

Veröffentlichungen

  • Security Testing over Encrypted Channels on the ARM Platform

    12th International Conference on Internet Monitoring and Protection

    Security Testing has been applied for many years to detect vulnerabilities in applications. With the increasing demand for encryption to protect the confidentiality of network data, the requirements have changed. When proprietary, closed source software uses end-to-end encryption, security testing tools which are fuzzing the application layer over network with plaintext data will eventually fail. The Intrusion Detection Framework for Encrypted Network Data (iDeFEND) framework circumvents this…

    Security Testing has been applied for many years to detect vulnerabilities in applications. With the increasing demand for encryption to protect the confidentiality of network data, the requirements have changed. When proprietary, closed source software uses end-to-end encryption, security testing tools which are fuzzing the application layer over network with plaintext data will eventually fail. The Intrusion Detection Framework for Encrypted Network Data (iDeFEND) framework circumvents this problem without violating the security of the end-to-end encryption. Unfortunately, the framework cannot be used on the Advanced RISC Machines (ARM) platform, since it uses architecture depended features of x86. In this paper, we transfer iDeFEND to the ARM architecture and thereby, make it suitable for testing applications on embedded devices. In addition, we discuss the limitations of the current framework and improve it with novel methods to provide a more generic approach for security testing. We present a generic method for inspecting data on encrypted channels. Our approach does not require any knowledge of the structure of the wrapper function for receiving and decrypting like iDeFEND. Furthermore, we present a solution to test and inspect applications that are using packet queues. Finally, we evaluate our approach on popular mobile applications.

    Andere Autor:innen
    Veröffentlichung anzeigen
  • Designing safe and secure autopilots for the urban environment

    11th International Conference on System Safety and Cyber-Security (SSCS 2016)

    This paper analyses safety and security risks posed by the introduction of autopilot functions for road vehicles. Drawing on lessons learned from the aviation industry, the authors make the case for standardising the behaviour and interfaces of advanced driver assistance systems. This paper proposes a modular functional architecture to support both iterative development and an iterative increase in security sophistication. The authors define security goals for their modular architecture based…

    This paper analyses safety and security risks posed by the introduction of autopilot functions for road vehicles. Drawing on lessons learned from the aviation industry, the authors make the case for standardising the behaviour and interfaces of advanced driver assistance systems. This paper proposes a modular functional architecture to support both iterative development and an iterative increase in security sophistication. The authors define security goals for their modular architecture based on their analysis of the threat and propose a pragmatic approach to achieve these security goals.

    Andere Autor:innen
    Veröffentlichung anzeigen
  • Security-Architektur zum Schutz vor Cyber-Attacken

    Hansar Automotive

    Selbst bei einem streng nach ISO 26262 entwickelten Autopiloten können Cyber-Attacken die Sicherheitsmechanismen wieder aushebeln. Ein hinreichend schneller Aufbau von Schutzmaßnahmen erfordert dringend eine möglichst rasche industrieweite Standardisierung von Security-Anforderungen und Schnittstellen. Dazu wird von den Autoren ein pragmatisches, aber dennoch effektives Konzept mit einer 2-Schichten-Architektur vorgeschlagen.

    Andere Autor:innen
    Veröffentlichung anzeigen
  • Actively Learning Probabilistic Subsequential Transducers

    Proceedings of the Eleventh International Conference on Grammatical Inference, PMLR 21:19-33, 2012

    In this paper we investigate learning of probabilistic subsequential transducers in an active learning environment. In our learning algorithm the learner interacts with an oracle by asking probabilistic queries on the observed data. We prove our algorithm in an identification in the limit model. We also provide experimental evidence to show the correctness and to analyze the learnability of the proposed algorithm.

    Andere Autor:innen
    Veröffentlichung anzeigen
  • Grammatical Inference Algorithms in MATLAB

    ICGI 2010: Proceedings of the 10th International Colloquium on Grammatical Inference

    Andere Autor:innen
  • PSMA: A Parallel Algorithm for Learning Regular Languages

    Inferring a regular language from examples and counter-examples is a classical
    problem in grammatical inference. It is also known as a variant of automata synthesis
    or grammar induction problems and corresponds to finding the smallest DFA
    consistent with a labelled sample of strings. The best known algorithm to solve
    this problem runs in polynomial (but cubic) time, and for large learning samples
    the algorithm cannot be used. We introduce a parallel version of the RPNI…

    Inferring a regular language from examples and counter-examples is a classical
    problem in grammatical inference. It is also known as a variant of automata synthesis
    or grammar induction problems and corresponds to finding the smallest DFA
    consistent with a labelled sample of strings. The best known algorithm to solve
    this problem runs in polynomial (but cubic) time, and for large learning samples
    the algorithm cannot be used. We introduce a parallel version of the RPNI algorithm
    which solves the above question, and we study the main challenges toward
    parallelization of such class of algorithms to run in a multi-core environment. We
    report experiments showing the viability of the technique.

    Andere Autor:innen
    Veröffentlichung anzeigen
  • Identity Metasystem in Location Based Persistent Authentication

    European Context-Awareness and Trust (EUROCAT09) 3rd Workshop on Combining Context with Trust, Security, and Privacy

    Persistent authentication in smart environments (PAISE) is a new effective approach that has changed the device-centric paradigm in traditional token based authentication systems to a much more usercentric one. Instead of carrying a security token, such as an RFID tag, all the time the location of a previously authenticated user is simply persistently tracked by sensors in the smart environment, such as cameras. For closed scenarios, recent publications have already shown various advantages…

    Persistent authentication in smart environments (PAISE) is a new effective approach that has changed the device-centric paradigm in traditional token based authentication systems to a much more usercentric one. Instead of carrying a security token, such as an RFID tag, all the time the location of a previously authenticated user is simply persistently tracked by sensors in the smart environment, such as cameras. For closed scenarios, recent publications have already shown various advantages, such as consistent user experience across contexts and a decreased probability of impersonation. In order to address even more complex and privacy-enhanced scenarios, we propose to enhance PAISE with Identity Management (IdM). Taking advantage of IdM, users can easily choose among different virtual identities and, at the same time, we can now support open and cross-context application scenarios. This paper addresses the balance between the security requirements of service providers in smart environments and the privacy concerns of users. Therefore, this paper discusses first security and privacy implications in PAISE and evaluates then the adaptability and interoperability of existing identity management systems for persistent authentication in changing and open scenarios. As our main result and in order to ensure interoperability an Identity Metasystem on top of the PAISE architecture will be described in detail.

    Andere Autor:innen
  • Supports for identity management in ambient environments-the hydra approach

    Third International Conference on Systems and Networks Communications

    Context-aware intelligent homes, body area networks in healthcare as well as holistic and sustainable agriculture are prominent scenarios in the scope of the research field Ambient Environments and Ubiquitous Computing. Such environments where mobile and wireless networks consist of numerous nodes, like sensors, intelligent gateways and mobile devices, require a highly secured and well defined Identity Management framework. Such a framework has to deal with the complete life cycle of identities…

    Context-aware intelligent homes, body area networks in healthcare as well as holistic and sustainable agriculture are prominent scenarios in the scope of the research field Ambient Environments and Ubiquitous Computing. Such environments where mobile and wireless networks consist of numerous nodes, like sensors, intelligent gateways and mobile devices, require a highly secured and well defined Identity Management framework. Such a framework has to deal with the complete life cycle of identities of users, services and devices as well as userspsila awareness in information disclosure and privacy. The Identity Management Framework introduced in this paper aims at enabling developers of ambient environments to provide identity management mechanisms according to their specific service scenarios transparent of the underlying standards and security details. From the core requirements analysed in the EU-Project Hydra , the need for an autonomous identity management module is evident. Based on an evaluation of existing Identity Management Systems the paper, therefore, introduces an identity management framework that meets those requirements and will be integrated into the Hydra middleware.

    Andere Autor:innen
    Veröffentlichung anzeigen
  • Laws of identity in ambient environments: The hydra approach

    The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies

    The research field of ambient environments and ubiquitous computing aims toward the future vision of intelligent mobile and wireless network scenarios. In such environments where the wireless network consists of numerous nodes, like intelligent devices, sensors and mobile devices, a highly secured and well defined identity (id) management system is required that deals with issues like virtual and temporary identities of users and devices as well as userspsila awareness in information disclosure…

    The research field of ambient environments and ubiquitous computing aims toward the future vision of intelligent mobile and wireless network scenarios. In such environments where the wireless network consists of numerous nodes, like intelligent devices, sensors and mobile devices, a highly secured and well defined identity (id) management system is required that deals with issues like virtual and temporary identities of users and devices as well as userspsila awareness in information disclosure and privacy. One major goal of the EU-project HYDRA (ldquoNetworked Embedded System middleware for heterogeneous physical devices in a distributed architecturerdquo) is the support of developers of such ambient environments to manage context sensitive identity information and assure integration and interoperability of existing ID management approaches. Based on this project in this paper we identify and analyse ten requirements for a middleware architecture to create a bridge between existing identity management technologies and also allow a framework to make them available for application developers of ambient environments.

    Andere Autor:innen
    Veröffentlichung anzeigen
  • User-centric identity management in ambient environments

    International Journal On Advances in Intelligent Systems Volume 2

Hasan Ibne Akram, PhDs vollständiges Profil ansehen

  • Herausfinden, welche gemeinsamen Kontakte Sie haben
  • Sich vorstellen lassen
  • Hasan Ibne Akram, PhD direkt kontaktieren
Mitglied werden. um das vollständige Profil zu sehen

Weitere ähnliche Profile

Entwickeln Sie mit diesen Kursen neue Kenntnisse und Fähigkeiten