Dipl.-Inform. Saffija Kasem-Madani

Researcher

Contact
Phone: +49 228 73-54246
Fax: +49 228 73-54254
Email: kasem@REMOVETHISPART.cs.uni-bonn.de
PGP public key: 0x8288C47E
   
Address
  Institute of Computer Science 4
Friedrich-Ebert-Allee 144
53113 Bonn
Germany
Room: III.03.1
 

Bachelor and Master theses offered

Are you interested in IT security and want to write your Bachelor/Master thesis in one of my research fields? Then, please send me an email.

Research

I am mainly, but not only interested in:

  • Privacy-preserving technologies, especially Pseudonymization with Availability Options.
  • Privacy metrics and measures.
  • Privacy policy languages.
  • Applications of efficient algorithms for hard problems in IT security.
  • Malware detection methods.
  • Applications of graph theory in the field of IT security.
  • Cryptographic Hardware and Hardware Security.

Publications

2017

Kasem-Madani S., Meier M., Wehner M. (2017) Towards a Toolkit for Utility and Privacy-Preserving Transformation of Semi-structured Data Using Data Pseudonymization. In: Garcia-Alfaro J., Navarro-Arribas G., Hartenstein H., Herrera-Joancomartí J. (eds) Data Privacy Management, Cryptocurrencies and Blockchain Technology. ESORICS 2017, DPM 2017, CBT 2017. Lecture Notes in Computer Science, vol 10436. Springer, Cham. Appendix.

2016

S. Wendzel and S. Kasem-Madani. undefined IoT Security: The Improvement-Decelerating 'Cycle of Blame' (Short Paper). DOI: 10.13052/popcas010.

S. Kasem-Madani.undefined A Mechanism Design for Privacy-Preserving Computation on Shared Data (Extended Abstract). Accepted for GI Sicherheit Doktorandenforum and GI Sicherheit Poster Session, 2016.

S. Kasem-Madani. undefinedA Framework Design for Privacy-Preserving Computation on Shared Data (Poster). Accepted for 1st IEEE European Symposium of Security & Privacy (EuroS&P). Saarbrücken, Germany. March 2016.

2015

D. Christin, D. Bub, A. Moerov, and S. Kasem-Madani.undefined A Distributed Privacy-Preserving Mechanism for Mobile Urban Sensing Applications. In Proceedings of the 10th IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2015.

S. Kasem-Madani and M. Meier: Definition of Availability Policies for Data Pseudonymization Using XACML. Pre-proceedings of 10th IFIP Summer School on Privacy and Identity Management, 2015.

2010

S. Kasem-Madani: Approximability of Selected Steiner Tree Problems in Communication Networks. Diploma thesis, supervisors: Prof. Dr. Marek Karpinski, Dr. Mathias Hauptmann, University of Bonn, November 2010.

Teaching

At University of Bonn:

  • Summer term 2017

    • Lecture "Privacy & Pseudonymization" of the module "IT Security" of professor Dr. Michael Meier (Master CS).
    • Exercise to lecture "Privacy & Pseudonymization" of professor Dr. Michael Meier (Master CS).
    • Exercises to lecture "Reaktive Sicherheit" of professor Dr. Michael Meier (Bachelor CS, fourth semester).
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier (Master CS).
    • Lab "IT Security" of professor Dr. Michael Meier (Master CS).

  • Winter term 2016/17

    • Exercises to lecture "IT-Sicherheit" of professor Dr. Michael Meier (Bachelor CS, third semester).
    • Lectures "Informationstechnik: Computer" and "Hardware Security Module" of the module "IT-Sicherheit" on behalf of professor Dr. Michael Meier (Bachelor CS, third semester).
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier (Master CS).

  • Summer term 2016

    • Extercises to lecture "Reaktive Sicherheit" of professor Dr. Michael Meier (Bachelor CS, fourth semester).
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier (Master CS).
    • Lecture "IT Security": "Privacy & Pseudonymization", on behalf of professor Dr. Michael Meier (Master CS).

  • Winter term 2015/16

    • Lab "IT Security" of professor Dr. Michael Meier.
    • Exercises to lecture "IT-Sicherheit" of professor Dr. Michael Meier (Bachelor CS, third semester).
    • Project group "IT-Sicherheit" of professor Dr. Michael Meier (Bachelor CS)
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier.

  • Summer term 2015

    • Lab "IT Security" of professor Dr. Michael Meier.
    • Exercises to lecture "Reaktive Sicherheit" of professor Dr. Michael Meier (Bachelor CS, fourth semester).
    • Lecture "IT Security": "Privacy & Pseudonymization", on behalf of professor Dr. Michael Meier.
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier.

  • Winter term 2014/15

    • Project group "IT Security" of professor Dr. Michael Meier.
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier.

  • Summer term 2014

    • Exercises to lecture "Reaktive Sicherheit" of professor Dr. Michael Meier (Bachelor CS, fourth semester).
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier.

  • Winter term 2013/14

    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier.

  • Summer term 2013

    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier.
    • Exercises to lecture "Network Security" of Dr. Jens Tölle (Master CS), together with Dipl.-Inform. Rafael Uetz and M. Sc. Martin Lambertz.

  • Summer term 2010, as a student teaching assistant:

    • Exercises to lecture "Algorithmic Bioinformatics" of professor Dr. Holger Fröhlich (Master Life Science Informatics).

  • Winter term 2008/09, as a student teaching assistant:

    • Exercises to "Algorithmen und Berechnungskomplexität I" of professor Dr. Christian Sohler (Bachelor CS, third semester).
    • Exercises to "Angewandte Mathematik: Numerik und Stochastik" of professors Dr. Reinhard Klein and Dr. Michael Clausen.

At Hochschule Bonn-Rhein-Sieg (University of Applied Sciences):

  • Winter term 2012/13:

    • Exercises to lecture "Informationssicherheit" of professor Dr. Kerstin Lemke-Rust (Bachelor CS, third semester).
    • Exercises to lecture "Mathematische und physikalische Grundlagen der Informatik" of professor Dr. Kurt-Ulrich Witt.

  • Summer term 2012:

    • Lecture "Angewandte Kryptographie", deputy for professor Dr. Kerstin Lemke-Rust, together with Dipl-Ing. Timo Bartkewitz (Bachelor CS, fourth semester).
    • Exercises to lecture "Angewandte Kryptographie".

  • Winter term 2011/12:

    • "Einsteigerprojekt Informatik und Psychologie", course for introduction to scientific writing, reading and presenting (Bachelor CS, first semester).

  • Non regular:

    • SchülerKrypto 2014, Bonn-Aachen International Institute for Information Technology, February 2014.
    • Girls'Day 2013: Die Fraunhofer CyberCity, Bundeskanzleramt, Berlin. April 2013.

    • Girls'Day 2012: Ein kleines Fotoalbum mit HTML, Bonn-Rhein-Sieg University of Applied Sciences. April 2012.
    • SchülerKrypto 2010, Bonn-Aachen International Institute for Information Technology, February 2010.

 

 

Theses advised

  • Master theses:

    • Mubashir Mehmood Qureshi: "Secure multiparty computation of the median in a star network". (in progress, at SAP, Karlsruhe).
    • Manal Al-Akkad: "Data appearances for privacy-preserving data analysis". December 2016 (finished).

  • Bachelor theses:

    • Markus Krämer: "k-means-Clustering auf Chiffraten" (in progress).
    • Marcel Schubert: "Datenschutzfolgenabschätzung". September 2017. (finished).
    • Matthias Ulbrich: "Untersuchung der Anwendung homomorpher Kryptosysteme unter Berücksichtigung der unautorisierten Verformbarkeit von Chiffretexten". June 2017. (finished).
    • Daniel Meyer: "Ausgewählte Angriffe auf Pseudonymisierungen mit Verfügbarkeitsoptionen". June 2017. (finished).
    • Martin Wehner: "Ein Toolkit für die policybasierte Pseudonymisierung mit Verfügbarkeitsoptionen". December 2016 (finished).
    • Samim Faiz: "Untersuchung und Implementierung ausgewählter homomorpher hashing-Verfahren für die Integritätsprüfung homomorpher Chiffrate". December 2016 (finished).
    • Henning Braun: "Evaluierung ausgewählter homomorpher Kryptosysteme hinsichtlich ihrer Eignung für Pseudonymisierungszwecke". University of Bonn. 8/2015 - 1/2016 (finished).
    • Jacek Samotyja: "Side Channel Analysis of an AES Implementation on a SASEBO-GII Board". Bonn-Rhein-Sieg University of Applied Sciences, March 2012 (finished).

  • Seminar theses:

    • Tobias Hartmann: "Utility definitions for utility-preserving data transformations for privacy". Summer semester 2017.
    • Martin Wehner: "Pseudonymization frameworks". Winter semester 2016/17.
    • Viktor-Maurits Kaszian: "CryptDB". Summer semester 2016.
    • Johannes vom Dorp: "A short introduction to RFID-privacy". Winter semester 2014/15.
    • Ilya Manyugin: "Malware detection on instruction level using the Bag-of-words model". Summer semester 2014.

  • Lab reports:

    • Sergio Valmorisco Sierra: Pseudonyization Framework with Availability Options. Winter semester 2015/16.
    • Johannes vom Dorp: A Tool for the User-friendly Definition of Availability Policies of Pseudonymized Data in XACML. Summer semester 2015.

Reviewing Activities

Reviewer:

  • Special Session "Emerging threats of Criminal Use of Information Hiding: Usage Scenarios and Detection Approaches", International Workshop on Digital-forensics and Watermarking (IWDW) 2017.

  • IEEE Security & Privacy, Special Issue "Digital Forensics" 2017.

Subreviewer:

  • IFIP Sec 2016
  • Digital Investigation: The International Journal of Digital Forensics & Incident Response 2015
  • DFN-Konferenz "Sicherheit in vernetzten Systemen" 2015
  • IFIP Sec 2015
  • Local Computer Networks (LCN) 2014
  • DFN-Konferenz "Sicherheit in vernetzten Systemen" 2014
  • Cryptographic Hardware and Embedded Systems (CHES) 2013
  • Cryptographic Hardware and Embedded Systems (CHES) 2012