Detecting manipulations in microchips
Attackers have the ability not only to manipulate software, but also to tamper with the hardware. A team from Bochum is devising methods to detect such tampering.
Mar 20, 2023
0
79
Ruhr University Bochum was founded in 1962 as part of the new university plan in Germany post WWII. Today, Ruhr University Bochum has approximately 34,000 students. The university offers more than 150 study programs, and is noted as one of the contenders for elite universities in academia and research quality. The Faculties of Medicine, Biology and Biotechnology, Engineering, (mechanical, civil, electrical) and Physics and Astronomy are deemed exceptional by most ranking panels.
Hardware
Attackers have the ability not only to manipulate software, but also to tamper with the hardware. A team from Bochum is devising methods to detect such tampering.
Mar 20, 2023
0
79
Robotics
Researchers from Bochum and Saarbrücken have detected security vulnerabilities, some of them serious, in several drones made by the manufacturer DJI. These enable users, for example, to change a drone's serial number or ...
Mar 2, 2023
0
172
Software
Almost every new program code has bugs that, in the worst case, can potentially compromise security. In order to detect them quickly and efficiently, researchers from the Horst Görtz Institute for IT Security at Ruhr University ...
Dec 14, 2022
0
3
Engineering
To survive in extreme habitats, many animals and plants have developed brilliant abilities that we otherwise only know from superheroes in movies. In most cases, their abilities are based on the extraordinary properties of ...
Sep 12, 2022
0
41
Machine learning & AI
Artificial intelligence (AI) can be trained to recognize whether a tissue image contains a tumor. However, exactly how it makes its decision has remained a mystery until now. A team from the Research Center for Protein Diagnostics ...
Sep 2, 2022
0
48
Consumer & Gadgets
Daycare apps are designed to make everyday life in daycare centers easier. Parents can use them, for example, to access reports on their children's development and to communicate with teachers. However, some of these applications ...
Jul 7, 2022
0
38
Energy & Green Tech
The expansion of natural gas infrastructure jeopardizes energy transition, as natural gas is not a bridge technology towards a 100 percent renewable energy system as defined by the Paris Climate Agreement. This is the result ...
Jul 5, 2022
0
68
Hardware
As far as data security is concerned, there is an even greater danger than remote cyberattacks: namely tampering with hardware that can be used to read out information—such as credit card data from a card reader. Researchers ...
Jun 7, 2022
0
56
Telecom
Smart devices are supposed to make our everyday lives easier. At the same time, however, they are a gateway for passive eavesdropping. To prevent possible surveillance of the movement profile within one's home, researchers ...
May 24, 2022
0
45
Computer Sciences
Machines can use artificial intelligence to create photos or voice recordings that look or sound like those in real life. Researchers at the Horst Görtz Institute for IT Security at Ruhr-Universität Bochum are interested ...
Dec 20, 2021
0
41