Marinos Tsantekidis

Marinos Tsantekidis
Technische Universität Braunschweig · Institut für Datentechnik und Kommunikationsnetze

Master of Science

About

13
Publications
365
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
19
Citations
Introduction
I am a Ph.D. candidate at the Institute of Computer and Network Engineering at TU Braunschweig, Germany. I received my Bachelor's degree in Computer Science from the Technological Educational Institute of Thessaloniki, Greece in 2011 and my Master's degree in Digital Systems Security from the University of Piraeus, Greece in 2014. My research focuses on security at the operating system level.

Publications

Publications (13)
Conference Paper
It is often useful for a code component (e.g., a library) to be able to maintain information that is hidden from the rest of the program (e.g., private keys used for signing, or usage counters used for behavioral monitoring of the program). In this paper, we present an extension to a previously developed mechanism for controlling access to librarie...
Chapter
Recently, significant developments were introduced within the vehicular domain, making the modern vehicle a network of a multitude of embedded systems communicating with each other, while adhering to safety-critical and secure systems specifications. Many technologies have been integrated within modern vehicles to give them the capability to intera...
Chapter
The ability to analyze software systems without access to the source code, offers many advantages including the detection of vulnerabilities so that they may be fixed before an adversary can exploit them in a zero day attack. This type of analysis also has an important role in education as it allows students to use their imagination and creativity...
Conference Paper
The ability to monitor when user code invokes a library function offers numerous advantages. For example, during black-box testing of code, high-level control-flow integrity (CFI) checking, run-time access-control policy enforcement and so on. However, for this technique to be useful it must be efficient and able to function even when the target ap...
Conference Paper
Modern vehicles are increasingly equipped with highly automated control systems both for driving and for passenger comfort. An integral part of these systems are the communication channels that allow the on-board systems to interact with passenger devices (e.g. tablets), ITS systems (e.g. roadside units), and other vehicles. These advances have sig...
Poster
Full-text available
Our system allows access control policies to be implemented at the library call level. Calls to libraries are monitored and their arguments examined to ensure that they comply with the security policy associated with the running program. Wrappers for libraries are automatically created, so that calls to external functions in the library are vectore...
Conference Paper
Full-text available
We propose a system that allows policy to be implemented at the library call level. Under our scheme, calls to libraries are monitored and their arguments examined to ensure that they comply with the security policy associated with the running program. Our system automatically creates wrappers for libraries so that calls to external functions in th...

Projects

Projects (4)
Project
CONCORDIA provides excellence and leadership in technology, processes and services to establish an user-centric EU-integrated cyber security ecosystem for digital sovereignty in Europe
Project
SmartShip aims to bring together Information and Communication Technologies (ICT) of focused Universities, Research Institutions and Companies oriented into the maritime sector in order to build a holistic integrated ICT-based framework for the sustainable, individualized and completely automated energy management of ships. SmartShip is funded by the European Commission Horizon 2020 programme under Grant Agreement No. 823916. Project duration: 48 months, started on January 01, 2019.
Archived project
THREAT-ARREST aims to develop an advanced training platform incorporating emulation, simulation, serious gaming and visualization capabilities to adequately prepare stakeholders with different types of responsibility and levels of expertise in defending high-risk cyber systems and organizations to counter advanced, known and new cyber-attacks. The THREAT-ARREST platform will deliver security training, based on a model driven approach where cyber threat and training preparation (CTTP) models, specifying the potential attacks, the security controls of cyber systems against them, and the tools that may be used to assess the effectiveness of these controls, will drive the training process, and align it (where possible) with operational cyber system security assurance mechanisms to ensure the relevance of training. The platform will also support trainee performance evaluation and training programme evaluation and adapt training programmes based on them. The effectiveness of the framework will be validated using a prototype implementation interconnected with real cyber systems pilots in the areas of smart energy, healthcare and shipping, and from technical, legal and business perspectives.