• Trusted Computing
    • Authenticated Boot
    • Binding and Sealing
    • Integrity Measurement and Attestation
    • On-board Credentials
  • Mobile Security with focus on smartphones
    • Security Architectures
    • Selected Access Control and Permission Model Aspects
    • Selected Modern Attack Techniques
  • Hardware-assisted Cryptographic Protocols
  • Hardware Vulnerabilities in Embedded Devices