Blog

CONCORDIA Blog

November 21, 2019

Privacy by design: Bringing Machine Learning towards the Edge

Machine Learning (ML) & Artificial Intelligence (AI) are driven by large quantities of data, which often raises security and privacy concerns (see Figure). With the introduction of new privacy laws, such as the General Data Protection Regulation (GDPR) in the EU, there is a need to conduct R&D on approaches...

Read More
November 14, 2019

A European cybersecurity ecosystem

Europe’s continued ability to provide important public services and promote economic development is heavily dependent on digitalisation and information and communication technologies. However, the digital infrastructure required to enable this is increasingly becoming a target for attacks aimed at simultaneously undermining democracy and influencing governmental processes. Furthermore, the exposure of...

Read More
November 7, 2019

Concordia left the door open for you

On the 16th and 17th of this October, in the European cybersecurity awareness month and the Luxembourgish cybersecurity events week, the CONCORDIA OPEN DOOR event made its debut in the capital of the Grand Duchy of Luxembourg. One hundred participants from both industry and academia, including also representatives of some...

Read More
October 31, 2019

Advertising Ecosystem: What is the cost on user’s online privacy?

Introduction We constantly leak personal data to various entities while browsing the web or generally interacting with web services. For example, such leaks happen when we use mobile apps or visit shopping and news websites, all of which may display advertisements to us. Interestingly, during our browsing, we are typically...

Read More
October 24, 2019

The multidimensional landscape of Cybersecurity and the ENISA-FORTH summer school

The annual ENISA-FORTH summer school is delivering sessions on cybersecurity trends and topics as well as focused and specialized training sessions on various aspects. This year the summer school included inspired keynote speeches and presentations of experts in the fields of cryptography, malware detection, cyber defense, quantum computing, blockchain and...

Read More
October 10, 2019

Women in Cyber

  «To really have an impact in research and development, it is necessary to think big, diverse, and inclusive.» Today, we have unquestionable evidence that gender diversity brings benefits. Men and women complement each other in their skills, attitude towards risk and collaboration, bringing different perspectives to the workplace. The cybersecurity field, like others,...

Read More
October 3, 2019

CONCORDIA’S Attendance at ACM SIGCOMM 2019 and GECON 2019

The Communication Systems Group CSG of the University of Zürich UZH presented its current contributions to CONCORDIA at two conferences, ACM SIGCOMM 2019 and GECON 2019 (being held, respectively, in Beijing, China and in Leeds, United Kingdom). While SIGCOMM is one of the leading conferences in the area of computer...

Read More
September 25, 2019

Encrypted traffic analysis while preserving user privacy

Encrypted traffic is on the rise. In 2016, NSS Labs found out that 97% of surveyed enterprises saw an increase in encrypted web traffic. Both Let's Encrypt and Google currently report between 70% and 90% of traffic is HTTPS (HTTP encrypted with SSL/TLS). Google has been pressing for HTTPS for...

Read More
September 19, 2019

Quantification of IoT attack detectability

IoT devices are trending as “easy targets” for numerous and various cyberattacks, including DDoS, ransomware, data exfiltration and cryptocurrency mining. Network intrusion detection systems (NIDSs) are a common means to detect such attacks, typically based on network traffic analysis. However, in some cases even for a modern NIDS it is...

Read More
September 12, 2019

Enhancing User-Centric Security in CONCORDIA

Over the past couple of years, many problems occurred on online social media regarding privacy, identity management, and fake news. Regarding user privacy for instance, there have been numerous reports of user data being shared or sold to unauthorized third parties without the consent of the user. Furthermore, the inability...

Read More