The research vision of the Security and Privacy Group at COMSYS is the analysis, design, and evaluation of secure and privacy-preserving communication systems across various domains, including the Industrial Internet of Things, Smart Grids, and healthcare, among others.
To realize this vision, we most notably craft novel (and sustainable) security and privacy architectures, paradigms, and mechanisms as well as improve upon existing approaches to security and privacy. We consider all types of systems and networks, e.g. ranging from highly resource-constrained IoT networks to distributed (peer-to-peer) applications and networks and large-scale cloud deployments.
Our used and developed technologies range from soft privacy solutions such as semantic annotations and behavioral nudges to applied cryptography or confidential computing for strong and provable security and privacy guarantees.
The close cooperation with the other research groups at COMSYS allows us to work closely with domain experts from various types of communication systems, most notably, centering around industrial, medical, and corporate use cases.
Currently, we pursue this research vision by tackling the following research topics:
![]() | Markus Dahlmanns, M.Sc. Researcher +49 241 80-21425 markus.dahlmanns(at)comsys.rwth-aachen.de | ![]() | Ina Berenice Fink, M.Sc. Researcher +49 241 80-21419 ina.fink(at)comsys.rwth-aachen.de |
![]() | David Heye, M.Sc. Researcher +49 241 80-21426 david.heye(at)comsys.rwth-aachen.de | ![]() | Hajeong Jeon, M.Sc. Researcher +49 241 80-21412 hajeong.jeon(at)comsys.rwth-aachen.de |
![]() | Johannes Lohmöller, M.Sc. Researcher +49 241 80-21421 johannes.lohmoeller@comsys.rwth-aachen.de | ![]() | Dr. rer. nat. Jan Pennekamp Postdoctoral Researcher +49 241 80-21411 jan.pennekamp(at)comsys.rwth-aachen.de |
![]() | Christian van Sloun, M.Sc. Researcher +49 241 80-21414 christian.van.sloun(at)comsys.rwth-aachen.de |
The Security and Privacy Group typically has thesis topics available for motivated and talented students. An excerpt of available theses can be seen from inside the RWTH University network. If you have specific interests, you may contact any group member individually.
7. |
Proceedings of the 2025 IEEE/IFIP Network Operations and Management Symposium (NOMS '25), May 12-16, 2025, Honolulu, HI, USA
Publisher: IEEE,
May
2025
Accepted
|
6. |
Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS '25), February 24–28, 2025, San Diego, CA, USA
Publisher: Internet Society,
February
2025
ISBN: 979-8-9894372-8-3
|
5. |
The Unresolved Need for Dependable Guarantees on Security, Sovereignty, and Trust in Data Ecosystems
Data & Knowledge Engineering,
151
May
2024
ISSN: 0169-023X
|
4. |
ACM Computing Surveys,
56(2)
February
2024
ISSN: 0360-0300
DOI: 10.1145/3606693
|
3. |
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security (ASIACCS '23), July 10-14, 2023, Melbourne, VIC, Australia, page 797-811.
Publisher: ACM,
July
2023
ISBN: 979-8-4007-0098-9/23/07
|
2. |
Proceedings of the 35th International Conference on Advanced Information Systems Engineering (CAiSE '23), June 12-16, 2023, Zaragoza, Spain Volume 13901, page 489-505.
Publisher: Springer,
June
2023
ISBN: 978-3-031-34559-3
|
1. |
Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (ASIACCS '22), May 30-June 3, 2022, Nagasaki, Japan, page 252-266.
Publisher: ACM,
May
2022
ISBN: 978-1-4503-9140-5/22/05
|