• English
  • Deutsch
  • Log In
    or
  • Research Outputs
  • Projects
  • Researchers
  • Institutes
  • Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Buch
  4. Cybersecurity Research: Challenges and Course of Action
 
  • Details
  • Full
Options
2019
  • Bericht

Titel

Cybersecurity Research: Challenges and Course of Action

Abstract
The European society faces numerous disruptive changes due to the progressing digitalisation. These changes have the potential to lead to a fair digitalised world if they are based on the ideal of digital sovereignty as a guiding principle at the citizen, economic and state levels. Research in cybersecurity creates the technological prerequisites for addressing the challenges of digitalisation in this spirit. Researchers in academia and industry from all over Europe met in Darmstadt and Berlin to identify the main challenges of cybersecurity research. Irrespective of their scientific backgrounds, all authors agreed that effective security and privacy measures require a systematic and holistic approach which considers security and privacy from the ground up. They stressed that in addition to the proposed research agenda, it is necessary to improve education across the board. During the discussions, it became also clear that various important scientific questions remain open, and that only long-term research across all disciplines can solve these problems. In the first chapter, we outline the major challenges in the fundamental research of the IT security fields in computer and engineering sciences. In the second chapter, we look at the cybersecurity challenges from the perspective of economic, legal and social sciences. In the last chapter, we analyse various examples of applications and technologies which combine the different research areas. Each section of the roadmap is dedicated to a specific challenge. The order of the sections is not intended to reflect their rel ative importance. For each challenge, we propose concrete next steps based on the state of the art in the scientific and industrial research landscape. We hope to reach out to all interested parties who endeavour to strengthen cybersecurity and enhance digital sovereignty in Europe.
Author(s)
Holz, Thorsten
RUB, Chair of Systems Security
Müller-Quade, Jörn
KIT, Chair of Cryptography and IT Security
Raabe, Oliver
KIT, ZAR
Waidner, Michael
Fraunhofer-Institut für Sichere Informationstechnologie SIT
Bardin, Sébastien
CEA LIST, Software Safety and Security Laboratory, France
Debar, Hervé
Télécom-SudParis, Head of Networks and Security Department, EUNITY, France
Dinger, Jochen
FIDUCIA & GAD IT AG
Fahl, Sascha
RUB, Chair of Usable Security and Privacy
Faust, Sebastian
TU Darmstadt, Chair of Applied Cryptography
Gonzalez Fuster, Gloria
VUB, Law Science Technology & Society, Belgium
Gro, Stjepan
Univ. of Zagreb, Head of Laboratory for Information Security and Privacy, Croatia
Hallett, Joseph
Univ. of Bristol, CyBOK, Great Britain
Harlander, Magnus
genua GmbH, Shareholder
Houdeau, Detlef
Infineon AG, Senior Director Business Development
Kirchner, Claude
INRIA, France
Klasen, Wolfgang
Siemens AG, Research Group Security for Embedded Systems
Lotz, Volkmar
SAP Research France, Product Security Research, France
Markatos, Evangelos
Univ. of Crete, Distributed Computing Systems Laboratory, FORTH, Greece
Möhring, Peter
Giesecke & Devrient
Posch, Reinhard
TU Graz, Austria
Ritter, Steve
Federal Office for Information Security
Schallbruch, Martin
ESMT Berlin
Schunter, Matthias
Intel
Volkamer, Melanie
KIT, Chair of Security Usability Society
Wespi, Andreas
IBM Research Zurich
Engelbrecht, Adrian
TU Darmstadt, Software & Digital Business Group
Fuchs, Andreas
Fraunhofer-Institut für Sichere Informationstechnologie SIT
Geiselmann, Willi
KIT, Inst. f. Theor. Informatics
Grensing, Anna-Louise
KIT, Inst. f. Theor. Informatics,
Heidt, Margareta
TU Darmstadt, Software & Digital Business Group
Heyszl, Johann
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC
Hiller, Matthias
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC
Jäger, Lukas
Fraunhofer-Institut für Sichere Informationstechnologie SIT
Kawohl, Claudia
Saarland Univ., Information Security & Cryptography
Koch, Alexander
KIT, Inst. f. Theor. Informatics
Krämer, Annika
Saarland Univ., Information Security & Cryptography
Marnau, Ninja
CISPA Helmholtz Center for Information Security
Noack, Kathrin
KIT, Inst. f. Theor. Informatics
Rieke, Roland
Fraunhofer-Institut für Sichere Informationstechnologie SIT
Senf, Daniel
Fraunhofer-Institut für Sichere Informationstechnologie SIT
Springer, Markus
Fraunhofer-Institut für Sichere Informationstechnologie SIT
Steinbrück, Anne
KIT, ZAR
Strefler, Mario
KIT, Inst. f. Theor. Informatics
Tatang, Dennis
Ruhr University Bochum (RUB), Systems Security
Backes, Michael
CISPA Helmholtz Center for Information Security
Buxmann, Peter
TU Darmstadt, Chair of Information Systems, Software & Digital Business Group
Eckert, Claudia
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC
Beteiligt
Müller-Quade, Jörn
Verlag
KIT
Verlagsort
Karlsruhe
Project(s)
SECUNITY
Funder
Bundesministerium für Bildung und Forschung BMBF (Deutschland)
Thumbnail Image
DOI
10.5445/IR/1000090060
Externer Link
Externer Link
Language
Englisch
google-scholar
SIT
Tags
  • Cybersecurity

  • IT-Sicherheit

  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Send Feedback
© 2022