Dr. rer. nat. Jörg Daubert

Picture taken by Henry Stadthagen
NameJörg Daubert
PositionSenior Researcher & Area Head
Smart Protection in Infrastructures
and Networks (SPIN)
Emaildaubert(at)tk.tu-darmstadt.de 
Phone +49 (6151) 16 - 23191
Fax+49 (6151) 16 - 23202
OfficeS2|02 A 121
Postal addressTU Darmstadt - FB 20
FG Telekooperation
Hochschulstraße 10
D-64289 Darmstadt
Germany

Research Interests

  • Trustworthy mobile devices
  • Privacy & trust
  • Anonymous overlay networks
  • Publish-subscribe

Short Bio

Jörg Daubert studied computer science with a focus on IT management until 2011. In 2016, he obtained his Ph.D. with the thesis on "Anonymous Publish/Subscribe Overlays" at Technische Universität in Darmstadt. Since 2014 he is acting as Area Head of the "Secure Smart Infrastructures" group; since 2016 he is joint PostDoc and Area Head of the "Smart Protection in Infrastructures and Networks" (SPIN) group with 9 researchers within the Telecooperation Lab under Prof. Mühlhäuser in Darmstadt. Starting 2016, Jörg Daubert is also coordinating the research training group (doctoral college) "Privacy and Trust for Mobile Users" with 11 Ph.D. student positions.

Jörg Daubert also worked in industrial research for AGT International, a major industry player in Internet of Things and data analytics, from 2011 to 2015 and is freelancing as an IT consultant from 2011 onwards.

Topics for Bachelor and Master Theses

Please have a look at https://www.tk.informatik.tu-darmstadt.de/de/teaching/abschlussarbeiten-d/ for open theses. We often offer a selection of challenging topics in the area of privacy-preserving communication networks. The focus can be either theoretical – developing attack and protection concepts, or practical – analyzing the aforementioned attacks and concepts via simulation. You can write the thesis in English or German.

Publications

Additional Attributes

Type

Improved Distribution of Locally Sourced Energy in Smart Grids During Brownouts and in Times of Energy Scarcity

Rolf Egert, Florian Volk, Jörg Daubert, Max Mühlhäuser
In: International Journal On Advances in Systems and Measurements, Vol. 10, December 2017
[Article]

Challenges and Available Solutions against Organized Cyber-Crime and Terrorist Networks

Andrea Tundis, Florian Huber, Bernhard Jäger, Jörg Daubert, Emmanouil Vasilomanolakis, Max Mühlhäuser
In: International Conference on Safety and Security Engineering, September 2017
[Inproceedings]

Cover Traffic: A Trade of Anonymity and Efficiency

Tim Grube, Markus Thummerer, Jörg Daubert, Max Mühlhäuser
In: to appear in: 13th International Workshop on Security and Trust Management in conjunction with the 22th European Symposium On Research in Computer Security (ESORICS 2017), September 2017
[Inproceedings]

Constrained PET Composition for Measuring Enforced Privacy

Sebastian Funke, Alexander Wiesmaier, Jörg Daubert
In: ARES 2017, p. to appear, September 2017
[Inproceedings]

Beyond the Hype: On Using Blockchains in Trust Management for Authentication

Nikolaos Alexopoulos, Jörg Daubert, Max Mühlhäuser, Sheikh Mahbub Habib
In: TrustCom, August 2017
IEEE
[Online-Edition: http://stprp-activity.com/TrustCom2017]
[Inproceedings]

IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende

Sebastian Funke
In: Proceedings of the DACH Security 2017, p. 1-10, June 2017
DACH Security 2017
[Inproceedings]

GRK 2050: D.4 AlterEgo

Jörg Daubert
In: Proceedings of the11th Joint Workshop of the German Research Training Groups in Computer Science, June 2017
Schloß Dagstuhl
[Inproceedings]

Mitigating Brown-Outs: Fair Distribution of Locally Sourced Energy in Smart Grids

Rolf Egert, Florian Volk, Jörg Daubert, Max Mühlhäuser
In: The Seventh International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies - ENERGY 2017, May 2017
IARIA
[Inproceedings]

Ant Colonies for Efficient and Anonymous Group Communication Systems

Tim Grube, Sascha Hauke, Jörg Daubert, Max Mühlhäuser
In: 2017 International Conference on Networked Systems (NetSys), p. 1-8, March 2017
IEEE
[Online-Edition: http://ieeexplore.ieee.org/document/7903958/]
[Inproceedings]

Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?

Tim Grube, Sascha Hauke, Jörg Daubert, Max Mühlhäuser
In: (to appear) Proceedings of the 14th Annual IEEE Consumer Communications & Networking Conference (CCNC), p. 1-4, January 2017
IEEE
[Inproceedings]

Theses

3 Entries found


01.02.2017

The Effects of API-Rate-Limits and Crawling Detection on Crawlability of Popular Social Media Networks

Bachelor Thesis

finished


Getting good datasets for social media analytics research is hard. Service providers hardly release any data anymore and the few public datasets that exist are old and therefore outdated. Also the world of social media is changing rapidly which makes synthetic data useless.

Crawling your own data is a solution for this problem. However it is not known - considering rate limiting and possibly crawling detection - what the most time efficient way to collect such datasets is. 

26.12.2016

Darknet Crawling and Data Analysis

Bachelor Thesis

finished


Darknet market places allow people to purchase illegal goods or illegal services like a botnet for DDoS attacks.  The usage and the popularity of such market places is permanently increasing. Darknet research is still in its infancy. Our goal is to get a better understanding in this area. This challenge will be tackled in this thesis.  

This market functions as a black market and offers the opportunity for users to remain anonymous. Marketplace operators use Tor hidden services to hide their identity. Sellers and buyers use Tor and BitCoin to trade anonymously. 

However, every user of such a Darknet market has to be registered with a username which are visible to everyone within that marketplace. These names can be linked to offered products. Thus, it is possible to monitor the activity of users which can be related to each other. This can lead to new perceptions.

30.09.2016

End-2-end privacy architecture for IoT

Master Thesis

finished


Rapid growth and the pervasive cyber-physical nature of Internet of Things (IoT) technology influences both, commer- cial/industrial as well as personal environments. „Data is the new gold“ - in the future: billions of inter-connected devices and cloud-services collect, analyze, infer and disseminate (personal) data to make our everyday life smarter.

Interaction between IoT and our personal lives, with information processing in domains like eHealth, location-based services, smart cities and smart environments calls for privacy protection [3]. „The capacity to correlate information is going to change all of those interactions, and I lose power over a great deal of my life when there’s a massive amount of information over me that I don’t have control over“ worries Goeff Webb [2].

Fortunately, many solutions to enhance privacy already exist and are well researched in form of Privacy Enhancing Technologies (PETs). For example: onion routing for origin anonymity, spatial location cloaking against location tracking, k-anonymity for anonymous data disclosure and data encryption for confidentiality. But, do we really know how to use and combine them correctly? 


Recent Activities

TPC / Chair / Organizer:

  • ARES 2017 (TPC)
  • SECUREWARE 2017 (TPC)
  • CCNC 2016 (Session Chair)

(External) Reviewer:

  • IEEE Journal on Selected Areas in Communications
  • Elsevier Information Systems
  • IEEE INFOCOM
  • IEEE Global Communications Conference
  • IEEE ICC
  • IDnext OID

Teaching

Winter Term 2017/2018

  • Protection in Networked Systems (PNS)
    co-organizer, lecturer

Summer Term 2017

  • Lecture TK3 Ubiquitous / Mobile Computing
    lecturer, session on trust & privacy
  • Seminar Telecooperation
    topic advisor

Winter Term 2016/2017

  • Protection in Networked Systems (PNS)
    co-organizer, lecturer
  • Seminar Telecooperation
    topic advisor

Summer Term 2016

  • Computer Netzwerke und verteilte Systeme (CNuvS)
    co-organizer, exercise lecturer
  • Lecture TK3 Ubiquitous / Mobile Computing
    lecturer, session on privacy
  • Bachelorpraktikum
    topic advisor "AMIS"
  • Seminar Telecooperation
    topic advisor

Winter Term 2015/2016

  • Seminar Telecooperation
    topic advisor
  • Forschungsprojekt TK
    topic advisor "AMIS"

Summer Term 2015

  • Seminar Telecooperation
    topic advisor
  • Lecture TK3 Ubiquitous / Mobile Computing
    lecturer, session on privacy

Winter Term 2014/2015

  • Smart Cities Seminar
    Organizer
  • Seminar Telecooperation
    Co-organizer, topic advisor

Summer Term 2014

  • Resilient Networks
    lecturer (one session)

Summer Term 2013

  • Seminar Telekooperation (course web page)
    Advisor for topics "Location-based privacy enhancing technologies", and "(Social) graph privacy"
  • Bachelor Students Traineeship / Bachelorpraktikum (course web page)
    Project owner "Twitterize - Anonymize Twitter"

Summer Term 2012

  • Seminar Telekooperation
    Advisor for topics "Privacy in wireless sensor networks", "Comparison: Privacy policy languages", "A brief survey on three PPDM techniques", and "Private P2P communities"
  • Bachelor Students Traineeship / Bachelorpraktikum (course web page)
    Project owner "Privacy for da_sense"

Winter Term 2011/2012

  • Seminar Telekooperation
    Advisor for topics "Anonymity metrics", "Anonymity and misbehavior", and "Timing attacks on TOR"
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang