Dipl.-Inform. Saffija Kasem-Madani

Researcher

Contact
Phone: +49 228 73-54246
Fax: +49 228 73-54254
Email: kasem@REMOVETHISPART.cs.uni-bonn.de
PGP public key: 0x8288C47E
   
Address
  Institute of Computer Science 4
Friedrich-Ebert-Allee 144
53113 Bonn
Germany
Room: III.03.1
 

Bachelor and Master theses offered

Are you interested in IT security and want to write your Bachelor/Master thesis in one of my research fields? Then, please send me an email.

Research

I am mainly, but not only interested in:

  • Privacy-preserving technologies, especially Pseudonymization with Availability Options.
  • Privacy metrics and measures.
  • Privacy policy languages.
  • Applications of efficient algorithms for hard problems in IT security.
  • Malware detection methods.
  • Applications of graph theory in the field of IT security.
  • Cryptographic Hardware and Hardware Security.

Publications

2017

S. Kasem-Madani, M. Meier and M. Wehner. Towards A Toolkit for Utility and Privacy-Preserving Transformation of Semi-structured Data Using Data Pseudonymization. Appendix.

2016

S. Wendzel and S. Kasem-Madani. undefined IoT Security: The Improvement-Decelerating 'Cycle of Blame' (Short Paper). DOI: 10.13052/popcas010.

S. Kasem-Madani.undefined A Mechanism Design for Privacy-Preserving Computation on Shared Data (Extended Abstract). Accepted for GI Sicherheit Doktorandenforum and GI Sicherheit Poster Session, 2016.

S. Kasem-Madani. undefinedA Framework Design for Privacy-Preserving Computation on Shared Data (Poster). Accepted for 1st IEEE European Symposium of Security & Privacy (EuroS&P). Saarbrücken, Germany. March 2016.

2015

D. Christin, D. Bub, A. Moerov, and S. Kasem-Madani.undefined A Distributed Privacy-Preserving Mechanism for Mobile Urban Sensing Applications. In Proceedings of the 10th IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2015.

S. Kasem-Madani and M. Meier: Definition of Availability Policies for Data Pseudonymization Using XACML. Pre-proceedings of 10th IFIP Summer School on Privacy and Identity Management, 2015.

2010

S. Kasem-Madani: Approximability of Selected Steiner Tree Problems in Communication Networks. Diploma thesis, supervisors: Prof. Dr. Marek Karpinski, Dr. Mathias Hauptmann, University of Bonn, November 2010.

Teaching

At University of Bonn:

 

  • Winter term 2016/17

    • Exercises to lecture "IT-Sicherheit" of professor Dr. Michael Meier (Bachelor CS, third semester).
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier (Master CS).

  • Summer term 2016

    • Extercises to lecture "Reaktive Sicherheit" of professor Dr. Michael Meier (Bachelor CS, fourth semester).
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier (Master CS).
    • Lecture "IT Security": "Privacy & Pseudonymization", on behalf of professor Dr. Michael Meier (Master CS).

  • Winter term 2015/16

    • Lab "IT Security" of professor Dr. Michael Meier.
    • Exercises to lecture "IT-Sicherheit" of professor Dr. Michael Meier (Bachelor CS, third semester).
    • Project group "IT-Sicherheit" of professor Dr. Michael Meier (Bachelor CS)
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier.

  • Summer term 2015

    • Lab "IT Security" of professor Dr. Michael Meier.
    • Exercises to lecture "Reaktive Sicherheit" of professor Dr. Michael Meier (Bachelor CS, fourth semester).
    • Lecture "IT Security": "Privacy & Pseudonymization", on behalf of professor Dr. Michael Meier.
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier.

  • Winter term 2014/15

    • Project group "IT Security" of professor Dr. Michael Meier.
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier.

  • Summer term 2014

    • Exercises to lecture "Reaktive Sicherheit" of professor Dr. Michael Meier (Bachelor CS, fourth semester).
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier.

  • Winter term 2013/14

    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier.

  • Summer term 2013

    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier.
    • Exercises to lecture "Network Security" of Dr. Jens Tölle (Master CS), together with Dipl.-Inform. Rafael Uetz and M. Sc. Martin Lambertz.

  • Summer term 2010, as a student teaching assistant:

    • Exercises to lecture "Algorithmic Bioinformatics" of professor Dr. Holger Fröhlich (Master Life Science Informatics).

  • Winter term 2008/09, as a student teaching assistant:

    • Exercises to "Algorithmen und Berechnungskomplexität I" of professor Dr. Christian Sohler (Bachelor CS, third semester).
    • Exercises to "Angewandte Mathematik: Numerik und Stochastik" of professors Dr. Reinhard Klein and Dr. Michael Clausen.

At Hochschule Bonn-Rhein-Sieg (University of Applied Sciences):

  • Winter term 2012/13:

    • Exercises to lecture "Informationssicherheit" of professor Dr. Kerstin Lemke-Rust (Bachelor CS, third semester).
    • Exercises to lecture "Mathematische und physikalische Grundlagen der Informatik" of professor Dr. Kurt-Ulrich Witt.

  • Summer term 2012:

    • Lecture "Angewandte Kryptographie", deputy for professor Dr. Kerstin Lemke-Rust, together with Dipl-Ing. Timo Bartkewitz (Bachelor CS, fourth semester).
    • Exercises to lecture "Angewandte Kryptographie".

  • Winter term 2011/12:

    • "Einsteigerprojekt Informatik und Psychologie", course for introduction to scientific writing, reading and presenting (Bachelor CS, first semester).

  • Non regular:

    • SchülerKrypto 2014, Bonn-Aachen International Institute for Information Technology, February 2014.
    • Girls'Day 2013: Die Fraunhofer CyberCity, Bundeskanzleramt, Berlin. April 2013.

    • Girls'Day 2012: Ein kleines Fotoalbum mit HTML, Bonn-Rhein-Sieg University of Applied Sciences. April 2012.
    • SchülerKrypto 2010, Bonn-Aachen International Institute for Information Technology, February 2010.

 

Theses advised

  • Master theses:

    • Manal Al-Akkad: "Data appearances for privacy-preserving data analysis". December 2016 (finished).

  • Bachelor theses:

    • Matthias Ulbrich: TBA.
    • Daniel Meyer: TBA.
    • Martin Wehner: "Ein Toolkit für die policybasierte Pseudonymisierung mit Verfügbarkeitsoptionen". December 2016 (finished).
    • Samim Faiz: "Untersuchung und Implementierung ausgewählter homomorpher hashing-Verfahren für die Integritätsprüfung homomorpher Chiffrate". December 2016 (finished).
    • Henning Braun: "Evaluierung ausgewählter homomorpher Kryptosysteme hinsichtlich ihrer Eignung für Pseudonymisierungszwecke". University of Bonn. 8/2015 - 1/2016 (finished).
    • Jacek Samotyja: "Side Channel Analysis of an AES Implementation on a SASEBO-GII Board". Bonn-Rhein-Sieg University of Applied Sciences, March 2012 (finished).

  • Seminar theses:

    • Viktor-Maurits Kaszian: CryptDB. Summer semester 2016.
    • Johannes vom Dorp: "A short introduction to RFID-privacy". Winter semester 2014/15.
    • Ilya Manyugin: "Malware detection on instruction level using the Bag-of-words model". Summer semester 2014.

  • Lab reports:

    • Sergio Valmorisco Sierra: Pseudonyization Framework with Availability Options. Winter semester 2015/16.
    • Johannes vom Dorp: A Tool for the User-friendly Definition of Availability Policies of Pseudonymized Data in XACML. Summer semester 2015.

Reviewing Activities

Subreviewer:

  • IFIP Sec 2016
  • Digital Investigation: The International Journal of Digital Forensics & Incident Response 2015
  • DFN-Konferenz "Sicherheit in vernetzten Systemen" 2015
  • IFIP Sec 2015
  • Local Computer Networks (LCN) 2014
  • DFN-Konferenz "Sicherheit in vernetzten Systemen" 2014
  • Cryptographic Hardware and Embedded Systems (CHES) 2013
  • Cryptographic Hardware and Embedded Systems (CHES) 2012