Mobile phone security 

I was recently asked by Computerworld to contribute some statements on security of and our dependency on mobile phones. The first response I got was an email by a former student on a Sunday afternoon that my name appeared in an article on nrk.no. It turned out that they cited a Computerworld article that had […]

Forensic readiness in the cloud and beyond 

Yesterday, Keyun Ruan, editor of the book „Cybercrime and Cloud Forensics“, gave an invited talk at HiG. I had had her book lying on my desk since earlier this summer, so I asked her to sign the copy. „Good luck with cloud forensics research in Norway and beyond!“ was her message. The talk covered the full […]

Prepared for the new semester 

This semester, I am going to teach IMT3501 Software Security for the third time. I update the course every year, and this year I managed to be ahead with updates almost one semester, i.e. I have updated almost all teaching materials by the start of the semester. Some of the changes for this year: More […]

Continuous integration for text documents 

Continuous integration is a concept that has gained widespread traction in software development. I consider it useful in other contexts, too. I recommend to master students and doctoral students I supervise to start with a blank thesis document the first day they embark on their project. That way, they will always have a thesis they […]

New Ph.D. student: Yi-Ching Liao 

Yi-Ching Liao started as a Ph.D. student with NISlab last month and is working with me on Process Tracking for Forensic Readiness in Operating Systems. She has a M.Sc. in Computer Science from University of Helsinki and a B.Sc. in Computer Science from National Chengchi University Taiwan. She also possesses extensive experience in computer crime […]

Open master thesis topics 

I currently have several open master thesis topics that have not yet been reserved. A TPM-Supported Trusted Path for a Smart Card – The goal of the proposed project is to combine several existing ideas and prototypes into an innovative solution to extend the trusted computing base from a smart card to peripheral devices. Read […]

COINS@SWITS 

With the intention to find out how SWITS operates their annual seminar I travelled to Malmö recently. SWITS is the Swedish IT Security Network for Ph.D. Students, similar to the COINS research school of computer and information security I am engaged in to set up in Norway. SWITS has been in business for more than […]

Keylogging for the advancement of research 

I supervised a group of bachelor students this year who developed a key logger as their bachelor thesis. „BeLT“ stands for „Behaviour Logging Tool“ and comprises key logging, mouse logging, and application usage logging, together with local storage, secure network transmission and safe storage for further processing. This project is a cooperation between behavioral biometrics […]

What is in a name 

Sometimes you find the same abbreviations in the same field. Take CISPA as an example. CISPA is the name of the competence centre „Center for IT-Security, Privacy and Accountability“ at University of Saarbrücken. CISPA is also the name of the Cyber Intelligence Sharing and Protection Act, a proposed law in the United States which would […]

Wann wird's mal wieder richtig Sommer 

This year reminds me of a song hear a long time ago. You can find Rudi Carrell on Youtube: „Wann wird’s mal wieder richtig Sommer – ein Sommer, wie er früher einmal war?“ (When will there again be a real summer like there used to be?). I was on Easter vacation in March and returned […]