ANYMOS

Logo ANYMOS

Future innovations in the field of mobility will be significantly data-driven. The competence cluster ANYMOS pursues the long-term goal of establishing anonymization as an enabling technology in order to reduce uncertainties regarding the need to apply data protection regulations when sharing and using data and to preserve Germany's strong position in the automotive and public transport sectors in data-driven innovations as well.

Project duration: 2022/11 - 2025/10

End-to-end verifiable and secret online elections

Logo_Voting

Many different elections are held at KIT. In order to increase the voter turnout by providing more comfort, these elections shall be conducted online in the future. Thereby, the integrity of the election has to be ensured by end-to-end verifiability as well as its confidentiality. In this project, various practicable voting systems will be examined to determine whether they meet the requirements for use at KIT. In this context, the requirements will also be worked out with those responsible at KIT for organizing the elections and operating such systems.

Project duration: 2022/07 - 2024/06

KASTEL

Logo KASTEL
Logo KASTEL

The Competence Center for Applied Security Technology (KASTEL) is a competence center for cyber security initiated by the German Federal Ministry of Education and Research (BMBF).
Under the motto "Comprehensible security in the networked world", KASTEL addresses the challenges posed by the progressive networking of previously isolated systems. Of particular importance are the consequences of digitalization in the area of critical infrastructures, for example in the energy industry, in networked mobility or in industrial production.
KASTEL bundles competencies around IT security at the research location Karlsruhe. The aim is to develop a comprehensive approach instead of isolated partial solutions. The focus is on the overall security of specific application areas, such as power grids, smart mobility or smart factories.
To ensure this security, new threats must be modeled, security goals described, and new methods developed. This can only be achieved through the collaboration of cryptographers, IT security specialists, software engineers, network experts, lawyers, and economists and social scientists.

Project duration: Since 2011; as a permanent project

ROCK-IT

Logo ROCK-IT

At large research institutions, only very simple experimental techniques with standardized samples have been automated and performed remotely so far. In this Helmholz-funded project ROCK-IT (remote, operando controlled, knowledge-driven, IT-based) the necessary tools are developed to perform more complex experiments remotely. As a pilot application, catalysis operando experiments will be considered, allowing researchers to remotely set experiment parameters and directly analyze the collected data. This project is intended to facilitate access and thus accelerate innovation cycles.

Project duration: 2023/01 - 2025/12

Secure Federated Machine Learning

Logo SFML

Machine learning models require large amounts of data to be trained on, leaving little training data available in use cases with strong privacy requirements.
The Secure Federated Machine Learning project is investigating approaches for training a neural network on data from multiple parties without having to reveal their data to the other parties. These approaches can then be used in use cases with strong privacy requirements.

Project duration: 2021/10 - 2024/09

Sec4IoMT

Logo Sec4IoMT

In the "Security for the Internet of Medical Things" project, or "Sec4IoMT" for short, a solution approach for the long-term preservation of the security of Internet of Medical Things (IoMT) devices in critical infrastructures is to be found and implemented as an example. The aim is to maintain the interoperability of the devices when individual components receive a security update. At the same time, a security update must not lead to a loss of certification for the medical devices.
KASTEL aims to define and formalize security models and functionalities for cryptographic upgrade mechanisms of medical device clusters. Without suitable formal models, no scientifically sound statement can be made about the security of the developed solution. Since modern medical devices consist to a larger extent of software, updates can strongly change and affect their functionality. This can result in difficulties with its certification. Using provably secure cryptography, update mechanisms can be formalized to convince a certification body that these updates are secure in the long run, maintain the required functionality, and thus keep the certification valid.

Project duration: 2022/10 - 2025/09

VE-ASCOT

Logo_ASCOT
Logo VE-ASCOT

Modern IT systems consist of many different hardware and software components whose individual trustworthiness is essential for the security of the overall system. The aim of the project is to develop a "Chain of Trust" (COT) platform that enables a trustworthy production chain and secure launch of semiconductor components. It is based on an embedded trust anchor (this protects against unauthorized access and stores confidential and cryptographic data) and further, non-copyable identity features. The functionality will be demonstrated in the field of medical technology.

Project duration: 2021/04 - 2024/03