Mohammad Hamad

Mohammad Hamad
Technische Universität München | TUM · Department of Electrical and Computer Engineering

Doctor of Engineering

About

29
Publications
8,238
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
113
Citations
Introduction
Mohammad Hamad is a Postdoctoral Researcher in the Embedded Systems and Internet of Things group in the Faculty of Electrical Engineering and Information Technology at TU Munich (TUM). Mohammad received his Ph.D. in Computer Engineering (Dr.-Ing.) from TU Braunschweig in 2020. Mohamamd holds a bachelor's degree in software engineering and information system from Aleppo University. Mohammad ’s research interests are in the area of autonomous vehicle security and IoT security.
Additional affiliations
April 2020 - May 2020
Technische Universität München
Position
  • PostDoc
January 2014 - March 2020
Technische Universität Braunschweig
Position
  • Research Assistant
Education
January 2020 - March 2020
Technische Universität Braunschweig
Field of study
  • Automotive Security

Publications

Publications (29)
Conference Paper
Full-text available
Ensuring security in real-time and safety-critical systems is becoming extremely challenging, in particular due to the increasingly connectivity of these systems, such as in emerging autonomous vehicles that are subject to new and higher number of security attacks. The main characteristics of real-time systems is that they have strict timing constr...
Article
Full-text available
Precision time protocol (PTP) is one of the most widely used protocols for clock synchronization in packet-switched networks, on which, among others, the transaction synchronization of the stock markets relies. PTP was not standardized with security as a core requirement and is therefore vulnerable and attractive to manifold kinds of malicious atta...
Conference Paper
Full-text available
The Publish/Subscribe (Pub/Sub) pattern is an attractive paradigm for supporting Vehicle to Cloud (V2C) communication. However, the security threats on confidentiality, integrity, and access control of the published data challenge the adoption of the Pub/Sub model. To address that, our paper proposes a secure policy-based Pub/Sub model for V2C comm...
Chapter
Recently, significant developments were introduced within the vehicular domain, making the modern vehicle a network of a multitude of embedded systems communicating with each other, while adhering to safety-critical and secure systems specifications. Many technologies have been integrated within modern vehicles to give them the capability to intera...
Preprint
Full-text available
The Internet of Vehicles (IoV) equips vehicles with connectivity to the Internet and the Internet of Things (IoT) to support modern applications such as autonomous driving. However, the consolidation of complex computing domains of vehicles, the Internet, and the IoT limits the applicability of tailored security solutions. In this paper, we propose...
Article
Full-text available
The Internet of Vehicle (IoV) is an extension of Vehicle-to-Vehicle (V2V) communication that can improve vehicles’ fully autonomous driving capabilities. However, these communications are vulnerable to many attacks. Therefore, it is critical to provide run-time mechanisms to detect malware and stop the attackers before they manage to gain a foothol...
Article
Full-text available
In recent years, significant developments were introduced within the vehicular domain, evolving the vehicles to become a network of many embedded systems which depend on a set of sensors to interact with each other and with the surrounding environment. While these improvements have increased the safety and incontestability of the automotive system,...
Thesis
Full-text available
In recent years, significant developments were introduced within the vehicular domain, evolving the vehicles to become a network of many embedded systems distributed throughout the car, known as Electronic Control Units (ECUs). Each one of these ECUs runs a number of software components that collaborate with each other to perform various vehicle fu...
Poster
Full-text available
Sensitive data (health, financial, telecom, etc.) must be continuously monitored for situational awareness and risk management. We aim to use this data to define normal behavior profiles for users, IoT devices, applications, and so forth. Later on, we will leverage these defined profiles to identify meaningful deviations from normal behavior, which...
Conference Paper
The need for secure communications between IoT devices is paramount. However, due to computational constraints and the need for lightweight publish/subscribe type of communications, traditional mechanisms for secure communications such as TLS and IPsec cannot be used directly. In this paper we present a new model for secure exchange of information...
Conference Paper
Modern vehicles are increasingly equipped with highly automated control systems both for driving and for passenger comfort. An integral part of these systems are the communication channels that allow the on-board systems to interact with passenger devices (e.g. tablets), ITS systems (e.g. roadside units), and other vehicles. These advances have sig...
Presentation
ABSTRACT: Vehicular Ad hoc Network (VANET) is a very promising approach that aims to improve vehicle and road safety, traffic efficiency, as well as comfortability to both drivers and passengers. Different types of applications were implemented to achieve these goals. Some of these applications require the exchanging of multiple and ordered message...
Conference Paper
Vehicular Ad hoc Network (VANET) is a very promising approach that aims to improve vehicle and road safety, traffic efficiency, as well as comfortability to both drivers and passengers. Different types of applications were implemented to achieve these goals. Some of these applications require the exchanging of multiple and ordered messages as well...
Conference Paper
Full-text available
Modern Implantable Medical Devices (IMDs) are low-power embedded systems with life-critical functionalities. Almost all of these devices are equipped with wireless- communication capabilities in order to aid in diagnosis, in updating the functional settings and firmware and so on, without any surgical procedure to perform these tasks manually. Ther...
Presentation
this is the presentation of our work ”A Framework for Policy Based Secure Intra Vehicle Communication ”
Conference Paper
Full-text available
Over the past two decades, significant developments were introduced within the vehicular domain, evolving the modern vehicle into a network of dozens of embedded systems each hosting one or more applications. Communications within this distributed environment while adhering to safety-critical and secure systems guidelines implies the formulation of...
Conference Paper
Full-text available
The Internet evolved from a collection of computers to today's agglomeration of all sort of devices (e.g. printers, phones, coffee makers, cameras and so on) a large part of which contain security vulnerabilities. The current wide scale attacks are, in most cases, simple replays of the original Morris Worm of the mid-80s. The effects of these attac...
Conference Paper
Full-text available
Over the past few years, significant developmentswere introduced within the vehicular domain. The modernvehicle becomes a network of dozens of embedded systemswhich collaborate together. While these improvements haveincreased functionality of vehicle systems, they have introducednew potential risks. Threat modeling has gained a central role toident...
Conference Paper
Full-text available
Microkernel-based architectures have gained an increasing interest and relevance for embedded systems. These can not only provide real-time guarantees but also offer strong security properties which become increasingly significant in certain application domains such as automotive systems. Nevertheless, the functionality of those complex systems oft...
Article
Full-text available
Abstract—The rapid development of the embedded systems and the wide use of them in many sensitive fields require safeguarding their communications. Internet Protocol Security (IPsec) i s widely used t o solve network security problems by providing confidentiality and integrity for the communications in the network, but it introduces communication o...
Conference Paper
Despite continuing reliability problems, complex systems are still being developed using ad-hoc development practices and unsafe languages. The response to excursions outside the nominal profile usually lead to the termination of the program. In many situations, however, such a course of action may not be satisfactory. For example, systems such as...
Conference Paper
Despite the fact that numerous studies have indicated that vehicular networks are vulnerable to external and internal attacks, very little effort has been expended in safeguarding communications both between elements within the vehicle and between the vehicle and the outside world. In this paper we present a mechanism that allows communications pol...

Network

Cited By

Projects

Projects (4)
Project
nIoVe aims to deploy a novel multi-layered interoperable cybersecurity solution for the Internet-of-Vehicles (IoV), with emphasis of the Connected and Autonomous Vehicles (CAVs) ecosystem by employing an advanced cybersecurity system enabling all relevant stakeholders and incident response teams to share cyber threat intelligence, synchronize and coordinate their cybersecurity strategies, response and recovery activities. For more information please visit https://www.niove.eu/
Project
nIoVe aims to deploy a novel multi-layered interoperable cybersecurity solution for the Internet-of-Vehicles (IoV), with emphasis of the Connected and Autonomous Vehicles (CAVs) ecosystem by employing an advanced cybersecurity system enabling all relevant stakeholders and incident response teams to share cyber threat intelligence, synchronize and coordinate their cybersecurity strategies, response and recovery activities. To do so the project develops a set of in-vehicle and V2X data collectors that will feed nIoVe’s machine learning platform and tools for threat analysis and situational awareness across the IoV ecosystem. Advanced visual and data analytics are further enhanced and adapted to boost cyber-threat detection performance under complex attack scenarios, while IoV stakeholders are jointly engaged in incident response activities through trusted mechanisms. The proposed approach is supported by interoperable data exchange between existing and newly proposed cybersecurity tools. nIoVe solution will be demonstrated and validated in 3 pilots: Hybrid execution environment, simulated environment, and real-world conditions.
Project
CONCORDIA (stands for Cybersecurity cOmpeteNCe fOr Research anD InnovAtion) aims to build the European Secure, Resilient and Trusted Ecosystem. The vision of CONCORDIA is to build a community with strong cooperation between all stakeholders, understanding that all stakeholders have their KPIs, bridging among them and fostering the development of IT products and solutions along the whole supply chain. Technologically, it projects abroad and evolvable data-driven and cognitive E2E Security approach for the ever-complex ever-interconnected compositions of emergent data-driven cloud, IoT and edge-assisted ICT ecosystems. link: https://www.concordia-h2020.eu