DSI Publications
Subject(s)
Technology, R&D management
Keyword(s)
Cryptograpy, intelligence agencies, IT security law, IT security regulation, industrial recommendations
JEL Code(s)
O30, O33, O38
In January 2017, the Digital Society Institute hosted a workshop on the “Crypto-debate: Strategies for responsible dealings with security agencies on matters of cryptography, vulnerabilities and tools.” Dr. Stefan Grosse (Federal Ministry of the Interior), Ralf Koenzen (Lancom Systems), Linus Neumann (Chaos Computer Club) and Stefan Heumann (Stiftung Neue Verantwortung) contributed to the workshop.
This issue contains German text and English translation in one file.
Volume
2017
Subject(s)
Technology, R&D management
Keyword(s)
Cybersecurity, wireless networks, telecommunications, Zwave, ZigBee, WiFi, smart grid, electrical systems, high criticality wireless networks, information security, critical infrastructures, cyber norms, internet governance, cyber legislation, ICT risk management, cyber metrics, internet jurisdiction, information security threats
Volume
1st ed.,
ISBN
978-3-319-52904-2
ISBN (Online)
978-3-319-52905-9
Subject(s)
Technology, R&D management
Keyword(s)
Big data & analytics, business mobility, E-Commerce, Internet of Things
Subject(s)
Technology, R&D management
Keyword(s)
data protection, privacy, IT security law, IT security regulation, industrial recommendations, EU General Data Protection Regulation (GDPR), cyberthreats
JEL Code(s)
O30, O33, O38
In December 2016, the Digital Society Institute hosted a workshop on requirements to create a compatibility of data protection and IT security regulation. Contributions to the workshop were given by Marit Hansen (ULD Schleswig-Holstein), Tomasz Lawicki (TeleTrusT working group “State of the Art Technology”), Steve Ritter (BSI) and Johannes Schlattmann (LVM).
The issue contains German text and English translation in one file.
Volume
2017
Subject(s)
Information technology and systems
Keyword(s)
Reverse-engineering, hardware obfuscation, IP-protection, camouflage gates, obfuscation, control flow obfuscation
Secondary Title
Foundations of hardware IP protection
Pages
105–123
ISBN
978-3-319-50378-3
ISBN (Online)
978-3-319-50380-6
Subject(s)
Technology, R&D management
Keyword(s)
IT security products, IT security, IT-sec industry, industrial recommendations, hacking
In October 2016, the Digital Society Institute hosted a workshop dedicated to the topic of vulnerabilities at large and in particular of vulnerabilities in security products. The workshop included talks from Thomas Dullien (former Google Project Zero), Matthias Luft (ERNW), Dr. Christoph Peylo (T-Labs) and a comment from Michael Kranawetter, (Head of Information Security Microsoft Germany).
Volume
2017
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
Bitstream encryption vulnerability, FPGA security, bitstream fault injection, automated key recovery, AES
Volume
PP
Journal Pages
1–13
Subject(s)
Information technology and systems
Keyword(s)
Cyber command, cyber war, espionage, Germany, sabotage, Ursula von der Leyen
Volume
3
Subject(s)
Technology, R&D management
Volume
2016
Journal Pages
663–670
ISSN (Online)
2194-4172