
Mohammad HamadTechnische Universität München | TUM · Department of Electrical and Computer Engineering
Mohammad Hamad
Doctor of Engineering
About
28
Publications
7,775
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
112
Citations
Introduction
Mohammad Hamad is a Postdoctoral Researcher in the Embedded Systems and Internet of Things group in the Faculty of Electrical Engineering and Information Technology at TU Munich (TUM). Mohammad received his Ph.D. in Computer Engineering (Dr.-Ing.) from TU Braunschweig in 2020. Mohamamd holds a bachelor's degree in software engineering and information system from Aleppo University. Mohammad ’s research interests are in the area of autonomous vehicle security and IoT security.
Additional affiliations
April 2020 - May 2020
January 2014 - March 2020
Education
January 2020 - March 2020
Publications
Publications (28)
Ensuring security in real-time and safety-critical systems is becoming extremely challenging, in particular due to the increasingly connectivity of these systems, such as in emerging autonomous vehicles that are subject to new and higher number of security attacks. The main characteristics of real-time systems is that they have strict timing constr...
Precision time protocol (PTP) is one of the most widely used protocols for clock synchronization in packet-switched networks, on which, among others, the transaction synchronization of the stock markets relies. PTP was not standardized with security as a core requirement and is therefore vulnerable and attractive to manifold kinds of malicious atta...
The Publish/Subscribe (Pub/Sub) pattern is an attractive paradigm for supporting Vehicle to Cloud (V2C) communication. However, the security threats on confidentiality, integrity, and access control of the published data challenge the adoption of the Pub/Sub model. To address that, our paper proposes a secure policy-based Pub/Sub model for V2C comm...
Recently, significant developments were introduced within the vehicular domain, making the modern vehicle a network of a multitude of embedded systems communicating with each other, while adhering to safety-critical and secure systems specifications. Many technologies have been integrated within modern vehicles to give them the capability to intera...
The Internet of Vehicles (IoV) equips vehicles with connectivity to the Internet and the Internet of Things (IoT) to support modern applications such as autonomous driving. However, the consolidation of complex computing domains of vehicles, the Internet, and the IoT limits the applicability of tailored security solutions. In this paper, we propose...
The Internet of Vehicle (IoV) is an extension of Vehicle-to-Vehicle (V2V) communication that can improve vehicles’ fully autonomous driving capabilities. However, these communications are vulnerable to many attacks. Therefore, it is critical to provide run-time mechanisms to detect malware and stop the attackers before they manage to gain a foothol...
In recent years, significant developments were introduced within the vehicular domain, evolving the vehicles to become a network of many embedded systems which depend on a set of sensors to interact with each other and with the surrounding environment. While these improvements have increased the safety and incontestability of the automotive system,...
In recent years, significant developments were introduced within the vehicular domain, evolving the vehicles to become a network of many embedded systems distributed throughout the car, known as Electronic Control Units (ECUs). Each one of these ECUs runs a number of software components that collaborate with each other to perform various vehicle fu...
Sensitive data (health, financial, telecom, etc.) must be continuously monitored for situational awareness and risk management. We aim to use this data to define normal behavior profiles for users, IoT devices, applications, and so forth. Later on, we will leverage these defined profiles to identify meaningful deviations from normal behavior, which...
The need for secure communications between IoT devices is paramount. However, due to computational constraints and the need for lightweight publish/subscribe type of communications, traditional mechanisms for secure communications such as TLS and IPsec cannot be used directly. In this paper we present a new model for secure exchange of information...
Modern vehicles are increasingly equipped with highly automated control systems both for driving and for passenger comfort. An integral part of these systems are the communication channels that allow the on-board systems to interact with passenger devices (e.g. tablets), ITS systems (e.g. roadside units), and other vehicles. These advances have sig...
ABSTRACT:
Vehicular Ad hoc Network (VANET) is a very promising approach that aims to improve vehicle and road safety, traffic efficiency, as well as comfortability to both drivers and passengers. Different types of applications were implemented to achieve these goals. Some of these applications require the exchanging of multiple and ordered message...
Vehicular Ad hoc Network (VANET) is a very promising approach that aims to improve vehicle and road safety, traffic efficiency, as well as comfortability to both drivers and
passengers. Different types of applications were implemented to achieve these goals. Some of these applications require the exchanging of multiple and ordered messages as well...
Modern Implantable Medical Devices (IMDs) are low-power embedded systems with life-critical functionalities. Almost all of these devices are equipped with wireless- communication capabilities in order to aid in diagnosis, in updating the functional settings and firmware and so on, without any surgical procedure to perform these tasks manually. Ther...
this is the presentation of our work ”A Framework for Policy Based Secure Intra Vehicle Communication ”
Over the past two decades, significant developments were introduced within the vehicular domain, evolving the modern vehicle into a network of dozens of embedded systems each hosting one or more applications. Communications within this distributed environment while adhering to safety-critical and secure systems guidelines implies the formulation of...
The Internet evolved from a collection of computers to today's agglomeration of all sort of devices (e.g. printers, phones, coffee makers, cameras and so on) a large part of which contain security vulnerabilities. The current wide scale attacks are, in most cases, simple replays of the original Morris Worm of the mid-80s. The effects of these attac...
Over the past few years, significant developmentswere introduced within the vehicular domain. The modernvehicle becomes a network of dozens of embedded systemswhich collaborate together. While these improvements haveincreased functionality of vehicle systems, they have introducednew potential risks. Threat modeling has gained a central role toident...
Microkernel-based architectures have gained an increasing interest and relevance for embedded systems. These can not only provide real-time guarantees but also offer strong security properties which become increasingly significant in certain application domains such as automotive systems. Nevertheless, the functionality of those complex systems oft...
Abstract—The rapid development of the embedded systems and the wide use of them in many sensitive fields require safeguarding their communications. Internet Protocol Security (IPsec) i s widely used t o solve network security problems by providing confidentiality and integrity for the communications in the network, but it introduces communication o...
Despite continuing reliability problems, complex systems are still being developed using ad-hoc development practices and unsafe languages. The response to excursions outside the nominal profile usually lead to the termination of the program. In many situations, however, such a course of action may not be satisfactory. For example, systems such as...
Despite the fact that numerous studies have indicated that vehicular networks are vulnerable to external and internal attacks, very little effort has been expended in safeguarding communications both between elements within the vehicle and between the vehicle and the outside world. In this paper we present a mechanism that allows communications pol...
Projects
Projects (4)
nIoVe aims to deploy a novel multi-layered interoperable cybersecurity solution for the Internet-of-Vehicles (IoV), with emphasis of the Connected and Autonomous Vehicles (CAVs) ecosystem by employing an advanced cybersecurity system enabling all relevant stakeholders and incident response teams to share cyber threat intelligence, synchronize and coordinate their cybersecurity strategies, response and recovery activities. For more information please visit https://www.niove.eu/
nIoVe aims to deploy a novel multi-layered interoperable cybersecurity solution for the Internet-of-Vehicles (IoV), with emphasis of the Connected and Autonomous Vehicles (CAVs) ecosystem by employing an advanced cybersecurity system enabling all relevant stakeholders and incident response teams to share cyber threat intelligence, synchronize and coordinate their cybersecurity strategies, response and recovery activities. To do so the project develops a set of in-vehicle and V2X data collectors that will feed nIoVe’s machine learning platform and tools for threat analysis and situational awareness across the IoV ecosystem. Advanced visual and data analytics are further enhanced and adapted to boost cyber-threat detection performance under complex attack scenarios, while IoV stakeholders are jointly engaged in incident response activities through trusted mechanisms. The proposed approach is supported by interoperable data exchange between existing and newly proposed cybersecurity tools. nIoVe solution will be demonstrated and validated in 3 pilots: Hybrid execution environment, simulated environment, and real-world conditions.
CONCORDIA (stands for Cybersecurity cOmpeteNCe fOr Research anD InnovAtion) aims to build the European Secure, Resilient and Trusted Ecosystem. The vision of CONCORDIA is to build a community with strong cooperation between all stakeholders, understanding that all stakeholders have their KPIs, bridging among them and fostering the development of IT products and solutions along the whole supply chain. Technologically, it projects abroad and evolvable data-driven and cognitive E2E Security approach for the ever-complex ever-interconnected compositions of emergent data-driven cloud, IoT and edge-assisted ICT ecosystems.
link: https://www.concordia-h2020.eu