
Christopher Scherb- Doctor of Philosophy
- Professor of Cyber Security at FHNW University of Applied Sciences and Arts
Christopher Scherb
- Doctor of Philosophy
- Professor of Cyber Security at FHNW University of Applied Sciences and Arts
Fuzzing and Formal Methods for Vulnerability Detection; Zero-Day Engineering; Network Segmentation
About
34
Publications
6,536
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
329
Citations
Introduction
I am Professor of Cyber Security at the University of Applied Sciences and Arts, Northwestern Switzerland.
My research focuses on vulnerability detection, zero-day engineering, awareness and formal methods
Current institution
Additional affiliations
May 2020 - August 2021
September 2021 - August 2024
September 2015 - April 2020
Education
September 2014 - April 2020
September 2012 - August 2014
September 2010 - August 2012
Publications
Publications (34)
Connected Medical Devices (CMDs) significantly benefit patients but are also vulnerable to malfunctions that can harm. Despite strict safety regulations for market entry, there's a notable shortage of specific cybersecurity frameworks for CMDs. Existing regulations on cybersecurity practices are often broad and lack detailed implementation steps. T...
The advent of Large Language Models (LLM) has revolutionized the efficiency and speed with which tasks are completed, marking a significant leap in productivity through technological innovation. As these chatbots tackle increasingly complex tasks, the challenge of assessing the quality of their outputs has become paramount. This paper critically ex...
Symbolic Execution is a formal method that can be used to verify the behavior of computer programs and detect software vulnera-bilities. Compared to other testing methods such as fuzzing, Symbolic Execution has the advantage of providing formal guarantees about the program. However, despite advances in performance in recent years, Symbolic Executio...
With the rising number of cyberattacks, such as ransomware attacks and cyber espionage, educating non-cybersecurity professionals to recognize threats has become more important than ever before. However, traditional training methods, such as phishing awareness campaigns, training videos and assessments have proven to be less effective over time. Th...
As we progress toward Society 5.0's vision of a human-centered digital society, ensuring digital accessibility becomes increasingly critical, particularly for citizens with visual impairments and other disabilities. This paper examines the implementation challenges of accessible digital public services within Swiss public administration. Through De...
In modern software development, vulnerability detection is crucial due to the inevitability of bugs and vulnerabilities in complex software systems. Effective detection and elimination of these vulnerabilities during the testing phase are essential. Current methods, such as fuzzing, are widely used for this purpose. While fuzzing is efficient in id...
The topic of cybersecurity is becoming increasingly important as the number of cyberattacks continues to grow; it is no longer just a matter of protecting, but rather of detecting cyberattacks at an early stage and responding accordingly. Detecting cyberattacks in organisations is an increasingly difficult task, since the ability of malware to hide...
In organisations, the topic of cybersecurity is becoming increasingly important as the number of cyberattacks continues to grow; it is no longer just a matter of protecting, but rather of detecting cyberattacks at an early stage and responding accordingly. There is no generic model for the evaluation, deployment, and operation of a sufficient ´Secu...
Connected Medical Devices (CMDs) have a large impact on patients as they allow them to lead a more normal life. Any malfunction could not only remove the health benefits the CMDs provide, they could also cause further harm to the patient. Due to this, there are many safety regulations which must be adhered to prior to a CMD entering the market. How...
In corporations around the world, the topic of cybersecurity and information security is becoming increasingly important as the number of cyberattacks on themselves continues to grow. Nowadays, it is no longer just a matter of protecting against cyberattacks, but rather of detecting such attacks at an early stage and responding accordingly. There i...
Cybersecurity management has emerged as a topic of growing importance on a global scale. Applying traditional management practices to cybersecurity is often too cumbersome and can lead to significant delays. Today's enterprises must be able to adapt to ever-evolving digital threats and act with corresponding agility and flexibility. Agile methods a...
With the rising number of cyberattacks, such as ransomware attacks and cyber espionage, educating non-cybersecurity professionals to recognize threats has become more important than ever before. However, traditional training methods, such as phishing awareness campaigns, training videos and assessments have proven to be less effective over time. Th...
Components built into space vehicles and equipment (space products) must meet different regulatory requirements; in detail, each component must be certified and sustainably traceable at all times. Space engineers have expressed the need for an interoperable system to collect, manage and route certifications for components, parts and materials that...
Nowadays, most network systems are based on fixed and reliable infrastructure, but with Internet of Things (IoT), smart home and smart city systems are used more and more in mobile scenarios and vehicles become connected. Often low power mobile devices are supported by cloud computing capabilities. However, infrastructure may not be available every...
Today's Internet is heavily used for multimedia streaming from cloud backends, while the Internet of Things (IoT) reverses the traditional data flow, with high data volumes produced at the network edge. Information Centric Networking (ICN) advocates against a host-centric communication model which is promising for distributed edge computing environ...
Named Function Networking (NFN) offers to compute and deliver results of computations in the context of Information Centric Networking (ICN). While ICN offers data delivery without specifying the location where these data are stored, NFN offers the production of results without specifying where the actual computation is executed. In NFN, computatio...
Information Centric Networking (ICN) exposes names to the network forwarding to deliver
named data directly by requesting it with the corresponding name. This principle is fur-
ther extended by Named Function Networking (NFN), which additionally allows function
definition and application to data inside a network.
In the last few years the consumpti...
Nowadays, most network systems are based on fixed and reliable infrastructure. In this context Information Centric Networking (ICN) is a novel network approach, where data is in the focus instead of hosts. Therefore, requests for data are independent from the location where the data is actually stored on. This property is optimal for infrastructure...
Named Function Networking (NFN) offers to compute and deliver results of computations in the context of Information Centric Networking (ICN). While ICN offers data delivery without specifying the location where these data are stored, NFN offers the production of results without specifying where the ac- tual computation is executed. In NFN, computat...
Information Centric Networking (ICN) is a modern networking concept which enables users to address named data directly by their name, without knowing the location where the data is stored. Since requesting static data is only a special case of requesting processed data, Named Function Networking (NFN) is a generalization of ICN by providing the pos...
Limited energy capacity and computation power is a common characteristic of mobile but connected devices. Edge computing, i.e. outsourcing computation task to close-by stationary service providers, is a widespread approach to still deploy computation-intensive applications on such devices. However, if moving at high speed (like for instance vehicle...
Recently, vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) connectivity transitioned from a vision of the future to reality. Applications in such environments vary from local propagation of road conditions to large-scale traffic flow control systems. In this demo, we present a network stack for the data exchange in the automotive IoT, b...
Named Function Networking was designed to perform computations inside Information Centric Networks, whereas the network decides where to execute a computation depending on the input data. However, this decision is based on fixed forwarding strategies. Initially, the forwarding strategies aimed to execute computations deep inside the network satisfy...
Named Function Networking (NFN) is an extension for Information Centric Networking (ICN) to execute computation inside the Network. Thereby, NFN consists of two contributions: A workflow definition and a resolution strategy. The ICN communication model enables NFN to reuse already computed results by using the network’s content store. To resolve a...
This paper introduces NDNFit, a distributed mobile health (mHealth) application built to use the newly proposed Named Data Networking (NDN) architecture instead of TCP/IP. The design is inspired by the Open mHealth ecosystem. Open mHealth uses a traditional cloud-enabled mobile architecture, but aspires to provide users with direct control of how t...
In content-based security, encrypted content as well as wrapped access keys are made freely available by an Information Centric Network: Only those clients which are able to unwrap the encryption key can access the protected content. In this paper we extend this model to computation chains where derived data (e.g. produced by a Named Function Netwo...
Named Function Networking (NFN) extends classic Information Centric Networking (ICN), such that in addition to resolving data access by name, it also supports the concept of function definition and application to data (or other functions) in the same resolution-by-name process. This empowers the network to select internally (optimal) places for ful...
In Named Function Networking (NFN) λ-calculus[1] enables a programmatic way of inter- acting with an information-centric network (ICN) as a single computer.
To enable the ICN to understand and handle expressions written in the λ-calculus, which are encoded in names, NFN proposes the integration of an abstract machine that couples β-reduction with I...
Acknowledgments I would like to thank Prof. Dr. Thomas Vetter for giving me the opportunity to this work. Special thanks goes to Christoph Jud for supervising this work, for his great engagement supporting me in this project and for his reviews. I would also thank MatthiasSoì er and Thomas Gerig for their 3DSlicer skills and everyone else who spent...