Hasan Ibne Akram, PhD
Metropolregion München
14.076 Follower:innen
500+ Kontakte
Info
I am a serial entrepreneur, a computer scientist, passionate about automotive 🚗 software…
Serviceleistungen
Artikel von Hasan Ibne Akram, PhD
Beiträge
-
You’re worried about your company’s cybersecurity. How can you use algorithms to protect it?
In the field of automotive industry recently we have seen a ton of cyber attacks. Before 2015 attacks on vehicle, we’re not taking that seriously by the industry. However, in 2015, Charlie Miller et al, showed that they can Weaponized a vehicle by taking full control of the vehicle remotely. They exploited a vulnerability to communicate with the CAN bus and control the vehicle remotely. Therefore, from then on word, hacking of the vehicle was not a theoretical, or a Hollywood concept, it became reality. And hence the whole industry had to take Automotive Cybersecurity seriously. As a result today we have a cyber security standard ISO 20 1434.
-
You’re worried about your company’s cybersecurity. How can you use algorithms to protect it?
One thing that I found helpful was Cybersecurity mechanisms like secure, booting, secure over the air, update, and secured on board communication in the domain of Automotive Cybersecurity. These mechanisms are amazing tools, and that allows us to drive in a safe manner and protects our vehicles from cyber attacks cyber attacks on vehicles can lead to weaponization of vehicles, so this is far more important than traditional cyber security, because our lives ours at stake.
-
You’re worried about your company’s cybersecurity. How can you use algorithms to protect it?
Encryption technology is the backbone of today’s digital infrastructure. It is the public infrastructure (PKI) that allows us to do anything in the Internet starting from online transaction, payment is safe and secure, voice chat without having to worry about anybody eavesdropping, security, and safety feature off your car all the way to Autonomous vehicle. AES is a symmetric encryption which means you have to have a shared key, and RSA is a asymmetric encryption which means you need to have a key pair of public and private key. Transport layer, security protocol, or TLS uses both the mechanisms. If uses a symmetric key for the handshake or the key exchange, and then once the key is exchanged, it uses symmetric key for data transfer.
Aktivitäten
-
Thank you everyone for your stimulating input and question in the Introduction to FuSa training.... loved working with you guys.... Marlene Thulin…
Thank you everyone for your stimulating input and question in the Introduction to FuSa training.... loved working with you guys.... Marlene Thulin…
Geteilt von Hasan Ibne Akram, PhD
-
🚗🚀 Begeisterung für MINT und Mobilität der Zukunft – Prof. Dr. Stefan-Alexander Schneider im Kuratorium des Deutschen Museums 🌐🎓 Wir freuen uns,…
🚗🚀 Begeisterung für MINT und Mobilität der Zukunft – Prof. Dr. Stefan-Alexander Schneider im Kuratorium des Deutschen Museums 🌐🎓 Wir freuen uns,…
Beliebt bei Hasan Ibne Akram, PhD
Berufserfahrung
Ausbildung
Veröffentlichungen
-
Security Testing over Encrypted Channels on the ARM Platform
12th International Conference on Internet Monitoring and Protection
Security Testing has been applied for many years to detect vulnerabilities in applications. With the increasing demand for encryption to protect the confidentiality of network data, the requirements have changed. When proprietary, closed source software uses end-to-end encryption, security testing tools which are fuzzing the application layer over network with plaintext data will eventually fail. The Intrusion Detection Framework for Encrypted Network Data (iDeFEND) framework circumvents this…
Security Testing has been applied for many years to detect vulnerabilities in applications. With the increasing demand for encryption to protect the confidentiality of network data, the requirements have changed. When proprietary, closed source software uses end-to-end encryption, security testing tools which are fuzzing the application layer over network with plaintext data will eventually fail. The Intrusion Detection Framework for Encrypted Network Data (iDeFEND) framework circumvents this problem without violating the security of the end-to-end encryption. Unfortunately, the framework cannot be used on the Advanced RISC Machines (ARM) platform, since it uses architecture depended features of x86. In this paper, we transfer iDeFEND to the ARM architecture and thereby, make it suitable for testing applications on embedded devices. In addition, we discuss the limitations of the current framework and improve it with novel methods to provide a more generic approach for security testing. We present a generic method for inspecting data on encrypted channels. Our approach does not require any knowledge of the structure of the wrapper function for receiving and decrypting like iDeFEND. Furthermore, we present a solution to test and inspect applications that are using packet queues. Finally, we evaluate our approach on popular mobile applications.
Andere Autor:innenVeröffentlichung anzeigen -
Designing safe and secure autopilots for the urban environment
11th International Conference on System Safety and Cyber-Security (SSCS 2016)
This paper analyses safety and security risks posed by the introduction of autopilot functions for road vehicles. Drawing on lessons learned from the aviation industry, the authors make the case for standardising the behaviour and interfaces of advanced driver assistance systems. This paper proposes a modular functional architecture to support both iterative development and an iterative increase in security sophistication. The authors define security goals for their modular architecture based…
This paper analyses safety and security risks posed by the introduction of autopilot functions for road vehicles. Drawing on lessons learned from the aviation industry, the authors make the case for standardising the behaviour and interfaces of advanced driver assistance systems. This paper proposes a modular functional architecture to support both iterative development and an iterative increase in security sophistication. The authors define security goals for their modular architecture based on their analysis of the threat and propose a pragmatic approach to achieve these security goals.
Andere Autor:innenVeröffentlichung anzeigen -
Security-Architektur zum Schutz vor Cyber-Attacken
Hansar Automotive
Selbst bei einem streng nach ISO 26262 entwickelten Autopiloten können Cyber-Attacken die Sicherheitsmechanismen wieder aushebeln. Ein hinreichend schneller Aufbau von Schutzmaßnahmen erfordert dringend eine möglichst rasche industrieweite Standardisierung von Security-Anforderungen und Schnittstellen. Dazu wird von den Autoren ein pragmatisches, aber dennoch effektives Konzept mit einer 2-Schichten-Architektur vorgeschlagen.
Andere Autor:innenVeröffentlichung anzeigen -
Learning probabilistic subsequential transducers from positive data
Proceedings of ICAART
-
Actively Learning Probabilistic Subsequential Transducers
Proceedings of the Eleventh International Conference on Grammatical Inference, PMLR 21:19-33, 2012
In this paper we investigate learning of probabilistic subsequential transducers in an active learning environment. In our learning algorithm the learner interacts with an oracle by asking probabilistic queries on the observed data. We prove our algorithm in an identification in the limit model. We also provide experimental evidence to show the correctness and to analyze the learnability of the proposed algorithm.
Andere Autor:innenVeröffentlichung anzeigen -
PSMA: A Parallel Algorithm for Learning Regular Languages
Inferring a regular language from examples and counter-examples is a classical
problem in grammatical inference. It is also known as a variant of automata synthesis
or grammar induction problems and corresponds to finding the smallest DFA
consistent with a labelled sample of strings. The best known algorithm to solve
this problem runs in polynomial (but cubic) time, and for large learning samples
the algorithm cannot be used. We introduce a parallel version of the RPNI…Inferring a regular language from examples and counter-examples is a classical
problem in grammatical inference. It is also known as a variant of automata synthesis
or grammar induction problems and corresponds to finding the smallest DFA
consistent with a labelled sample of strings. The best known algorithm to solve
this problem runs in polynomial (but cubic) time, and for large learning samples
the algorithm cannot be used. We introduce a parallel version of the RPNI algorithm
which solves the above question, and we study the main challenges toward
parallelization of such class of algorithms to run in a multi-core environment. We
report experiments showing the viability of the technique.Andere Autor:innenVeröffentlichung anzeigen -
Identity Metasystem in Location Based Persistent Authentication
European Context-Awareness and Trust (EUROCAT09) 3rd Workshop on Combining Context with Trust, Security, and Privacy
Persistent authentication in smart environments (PAISE) is a new effective approach that has changed the device-centric paradigm in traditional token based authentication systems to a much more usercentric one. Instead of carrying a security token, such as an RFID tag, all the time the location of a previously authenticated user is simply persistently tracked by sensors in the smart environment, such as cameras. For closed scenarios, recent publications have already shown various advantages…
Persistent authentication in smart environments (PAISE) is a new effective approach that has changed the device-centric paradigm in traditional token based authentication systems to a much more usercentric one. Instead of carrying a security token, such as an RFID tag, all the time the location of a previously authenticated user is simply persistently tracked by sensors in the smart environment, such as cameras. For closed scenarios, recent publications have already shown various advantages, such as consistent user experience across contexts and a decreased probability of impersonation. In order to address even more complex and privacy-enhanced scenarios, we propose to enhance PAISE with Identity Management (IdM). Taking advantage of IdM, users can easily choose among different virtual identities and, at the same time, we can now support open and cross-context application scenarios. This paper addresses the balance between the security requirements of service providers in smart environments and the privacy concerns of users. Therefore, this paper discusses first security and privacy implications in PAISE and evaluates then the adaptability and interoperability of existing identity management systems for persistent authentication in changing and open scenarios. As our main result and in order to ensure interoperability an Identity Metasystem on top of the PAISE architecture will be described in detail.
Andere Autor:innen -
Supports for identity management in ambient environments-the hydra approach
Third International Conference on Systems and Networks Communications
Context-aware intelligent homes, body area networks in healthcare as well as holistic and sustainable agriculture are prominent scenarios in the scope of the research field Ambient Environments and Ubiquitous Computing. Such environments where mobile and wireless networks consist of numerous nodes, like sensors, intelligent gateways and mobile devices, require a highly secured and well defined Identity Management framework. Such a framework has to deal with the complete life cycle of identities…
Context-aware intelligent homes, body area networks in healthcare as well as holistic and sustainable agriculture are prominent scenarios in the scope of the research field Ambient Environments and Ubiquitous Computing. Such environments where mobile and wireless networks consist of numerous nodes, like sensors, intelligent gateways and mobile devices, require a highly secured and well defined Identity Management framework. Such a framework has to deal with the complete life cycle of identities of users, services and devices as well as userspsila awareness in information disclosure and privacy. The Identity Management Framework introduced in this paper aims at enabling developers of ambient environments to provide identity management mechanisms according to their specific service scenarios transparent of the underlying standards and security details. From the core requirements analysed in the EU-Project Hydra , the need for an autonomous identity management module is evident. Based on an evaluation of existing Identity Management Systems the paper, therefore, introduces an identity management framework that meets those requirements and will be integrated into the Hydra middleware.
Andere Autor:innenVeröffentlichung anzeigen -
Laws of identity in ambient environments: The hydra approach
The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
The research field of ambient environments and ubiquitous computing aims toward the future vision of intelligent mobile and wireless network scenarios. In such environments where the wireless network consists of numerous nodes, like intelligent devices, sensors and mobile devices, a highly secured and well defined identity (id) management system is required that deals with issues like virtual and temporary identities of users and devices as well as userspsila awareness in information disclosure…
The research field of ambient environments and ubiquitous computing aims toward the future vision of intelligent mobile and wireless network scenarios. In such environments where the wireless network consists of numerous nodes, like intelligent devices, sensors and mobile devices, a highly secured and well defined identity (id) management system is required that deals with issues like virtual and temporary identities of users and devices as well as userspsila awareness in information disclosure and privacy. One major goal of the EU-project HYDRA (ldquoNetworked Embedded System middleware for heterogeneous physical devices in a distributed architecturerdquo) is the support of developers of such ambient environments to manage context sensitive identity information and assure integration and interoperability of existing ID management approaches. Based on this project in this paper we identify and analyse ten requirements for a middleware architecture to create a bridge between existing identity management technologies and also allow a framework to make them available for application developers of ambient environments.
Andere Autor:innenVeröffentlichung anzeigen -
Requirements analysis for identity management in ambient environments: The HYDRA approach
2nd International Workshop on Context Awareness and Trust
-
User-centric identity management in ambient environments
International Journal On Advances in Intelligent Systems Volume 2