Dr. rer. nat. Jörg Daubert

Picture taken by Henry Stadthagen
NameJörg Daubert
PositionSenior Researcher & Area Head
Smart Protection in Infrastructures
and Networks (SPIN)
Emaildaubert(at)tk.tu-darmstadt.de 
Phone +49 (6151) 16 - 23191
Fax+49 (6151) 16 - 23202
OfficeS2|02 A 121
Postal addressTU Darmstadt - FB 20
FG Telekooperation
Hochschulstraße 10
D-64289 Darmstadt
Germany

Research Interests

  • Trustworthy mobile devices
  • Privacy & trust
  • Anonymous overlay networks
  • Publish-subscribe

Short Bio

Jörg Daubert studied computer science with a focus on IT management until 2011. In 2016, he obtained his Ph.D. with the thesis on "Anonymous Publish/Subscribe Overlays" at Technische Universität in Darmstadt. Since 2014 he is acting as Area Head of the "Secure Smart Infrastructures" group; since 2016 he is joint PostDoc and Area Head of the "Smart Protection in Infrastructures and Networks" (SPIN) group with 9 researchers within the Telecooperation Lab under Prof. Mühlhäuser in Darmstadt. Starting 2016, Jörg Daubert is also coordinating the research training group (doctoral college) "Privacy and Trust for Mobile Users" with 11 Ph.D. student positions.

Jörg Daubert also worked in industrial research for AGT International, a major industry player in Internet of Things and data analytics, from 2011 to 2015 and is freelancing as an IT consultant from 2011 onwards.

Topics for Bachelor and Master Theses

Please have a look at https://www.tk.informatik.tu-darmstadt.de/de/teaching/abschlussarbeiten-d/ for open theses. We often offer a selection of challenging topics in the area of privacy-preserving communication networks. The focus can be either theoretical – developing attack and protection concepts, or practical – analyzing the aforementioned attacks and concepts via simulation. You can write the thesis in English or German.

Publications

Additional Attributes

Type

Anonymous Publish-Subscribe Overlays

Jörg Daubert
March 2016
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5473/]
[Phdthesis]

New Horizons for a Data-Driven Economy

Martin Strohbach, Jörg Daubert, Herman Ravkin, Mario Lischka
p. 119-141, January 2016
Springer
[Online-Edition: http://www.springer.com/de/book/9783319215686]
[InBook]

On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks

Jörg Daubert, Tim Grube, Mathias Fischer, Max Mühlhäuser
In: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), p. 738-744, January 2016
IEEE
[Inproceedings]

AnonPubSub: Anonymous Publish-Subscribe Overlays

Jörg Daubert, Mathias Fischer, Tim Grube, Stefan Schiffner, Panayotis Kikiras, Max Mühlhäuser
In: Elsevier Computer Communications {ComCom}}, Vol. 76, p. 42-53, 2016
[Article]

Theses

3 Entries found


16.03.2017

A novel honeypot concept

Master Thesis

in progress


Nowadays, the number and sophistication of cyberattacks is  constantly  increasing.  To  cope  with  this,  security  solutions  such  as  Intrusion Detection Systems (IDSs)  are  considered  a  mandatory  line of  defense  for  any  critical  network.  However,  IDSs usually employ passive monitoring techniques.  Honeypots emerged from the need for more active monitoring.

Honeypots are systems whose only value is to be probed, attacked and compromised. Their purpose is to attract malicious users, study their activities and, at the same time, reduce the attack surface of the monitored network. It is important to note that since honeypots do not feature any other purpose; by definition, any interaction with them is considered an attack. Thus, they do not exhibit false positives, i.e., all incoming traffic is considered malicious.

09.10.2017

Trustworthy Secure Middleware Architecture for Mobile Devices

Master Thesis

finished


We are currently in a smart-phone era. Mobile devices are gaining more popular than the exis- ting traditional computers. As the growth of technology increases, the possibility of increasing risks are higher. The risk of possible attacks for a mobile device are increasing and could be with physical access and remote access. Even though we do not have a major attack on mobile devices in past, there are some attacks which happened such as by sharing the non-signed and non-verified downloaded executable files to one another [MSCU2011]. Mobile security is one of the most important and key element in today’s world. Security and privacy-related are most important topics in such mobile devices scenarios. The possible factors of mobile attacks are less, because of less heterogeneity. To understand the heterogeneity and homogeneity with re- spect to mobile devices, consider a smart device which is manufactured by different companies with different operating system (handset manufacturers). For example, if we consider a black- berry or an apple which manufactures its own hardware and software (Operating System). In this scenario, the security features of the hardware is tightly coupled with the software they designed. So, the overall security outcome of such scenario is much better. The smart phone OS makers reluctant to give access to such hardware security features. But, even if the OS makers are willing to share such information via their customised APIs, the application developers or other parties are forced to fully trust the smart phone OS makers hardware based security API functions. Also, the companies such as apple are not sharing the information or APIs to access secure isolated environments. When comes to homogeneity, Even though the companies such as Motorola, LG, Samsung are bound in using the standard open platform Android, they are en- ding up manufacturing their own custom hardware specifications and custom software designs. This leads in implementing custom and buggy security properties as there is no standardization. Again in this case, application developers are forced to trust the modified OS and to fully trust the security based API functions if available. 

Granularitätssteuerung von Personally Identifiable Information anhand von Preisfunktionen

Bachelor Thesis

finished


Ziel dieser Bachelorarbeit ist ein Framework, zur Granularitätssteuerung von personally identifiable information (PII) anhand von Preisfunktionen. Dieses Framework soll als Schicht zwischen Benutzer und Service Provider genutzt werden und eine Granularisierung der gegebenen PII anhand von gegebenen Preisfunktionen ermöglichen. 


Recent Activities

TPC / Chair / Organizer:

  • ARES 2017 (TPC)
  • SECUREWARE 2017 (TPC)
  • CCNC 2016 (Session Chair)

(External) Reviewer:

  • IEEE Journal on Selected Areas in Communications
  • Elsevier Information Systems
  • IEEE INFOCOM
  • IEEE Global Communications Conference
  • IEEE ICC
  • IDnext OID

Teaching

Winter Term 2017/2018

  • Protection in Networked Systems (PNS)
    co-organizer, lecturer

Summer Term 2017

  • Lecture TK3 Ubiquitous / Mobile Computing
    lecturer, session on trust & privacy
  • Seminar Telecooperation
    topic advisor

Winter Term 2016/2017

  • Protection in Networked Systems (PNS)
    co-organizer, lecturer
  • Seminar Telecooperation
    topic advisor

Summer Term 2016

  • Computer Netzwerke und verteilte Systeme (CNuvS)
    co-organizer, exercise lecturer
  • Lecture TK3 Ubiquitous / Mobile Computing
    lecturer, session on privacy
  • Bachelorpraktikum
    topic advisor "AMIS"
  • Seminar Telecooperation
    topic advisor

Winter Term 2015/2016

  • Seminar Telecooperation
    topic advisor
  • Forschungsprojekt TK
    topic advisor "AMIS"

Summer Term 2015

  • Seminar Telecooperation
    topic advisor
  • Lecture TK3 Ubiquitous / Mobile Computing
    lecturer, session on privacy

Winter Term 2014/2015

  • Smart Cities Seminar
    Organizer
  • Seminar Telecooperation
    Co-organizer, topic advisor

Summer Term 2014

  • Resilient Networks
    lecturer (one session)

Summer Term 2013

  • Seminar Telekooperation (course web page)
    Advisor for topics "Location-based privacy enhancing technologies", and "(Social) graph privacy"
  • Bachelor Students Traineeship / Bachelorpraktikum (course web page)
    Project owner "Twitterize - Anonymize Twitter"

Summer Term 2012

  • Seminar Telekooperation
    Advisor for topics "Privacy in wireless sensor networks", "Comparison: Privacy policy languages", "A brief survey on three PPDM techniques", and "Private P2P communities"
  • Bachelor Students Traineeship / Bachelorpraktikum (course web page)
    Project owner "Privacy for da_sense"

Winter Term 2011/2012

  • Seminar Telekooperation
    Advisor for topics "Anonymity metrics", "Anonymity and misbehavior", and "Timing attacks on TOR"
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang