Ruhr-Uni-Bochum
HGI

Copyright: HGI, stock.adobe.com: chinnarach

"Trace Oddity: Analyzing the privacy and security of communication infrastructures"- Inaugural Lecture by Katharina Kohls

The Faculty of Computer Science cordially invites all interested parties to Prof. Katharina Kohls inaugural lecture “Towards more secure and privacy-freindly smart devices” on 18.12.2024, starting at 3 p.m.!

Katharina Kohls aims at making mobile networks more secure.

Copyright: Rub, Marquard

When? December 18, 2024, 3-4 p.m. lecture, afterwards get together with pizza and drinks
Where? Building MC, Open Space
Registration: https://terminplaner6.dfn.de b/45dafb979145e905484a8e1b6144244d-980317

Katharina Kohls has been connected to Ruhr University Bochum since 2008, starting with her studies, followed by her doctoral research and work as a postdoc. In March 2024, after a stint in the Netherlands, she returned as a professor to lead the Chair of System Security at the Faculty of Computer Science.

As an expert in mobile network security, Kohls explains that these networks are composed of various components: “For instance, they consist of end devices like phones and base stations, which establish the radio connection. The core network, however, is the central unit where user data is stored.” Her research tackles key questions: Can attackers affect the core network from outside? Are there vulnerabilities in the communication protocols? And how can base stations be strategically distributed to prevent intrusions? “Mobile network security is a fascinating field,” she says. “It’s inspiring to work on real-world challenges so closely tied to everyday life.”

Abstract:

In today’s interconnected world, our digital activities leave behind traces—fragments of information that can be pieced together to reveal insights beyond what individuals intended to share. In the context of privacy, these traces empower adversaries to perform large-scale analyses, uncovering patterns and personal details that compromise anonymity and reveal sensitive data. Similarly, in the domain of mobile networks, traces serve as critical indicators for identifying vulnerabilities in network components, such as weaknesses in implementations or the configuration of networks. This lecture delves into the dual role of traces: as a tool for adversaries to breach privacy and as a means for researchers to uncover and mitigate security flaws.

General note: In case of using gender-assigning attributes we include all those who consider themselves in this gender regardless of their own biological sex.