Prof. Dr.-Ing. Andreas Noack

University of Applied Sciences Stralsund -
Department of Electrical Engineering and Computer Science
Office: Building 4, Room 222
Phone: +49 3831 45 6626
Fax: +49 3831 45 6687
Email: andreas.noack[at]hochschule-stralsund.de
Slack: stralsundsecurity [invite link]

Upcoming event: 6. Stralsunder IT-Sicherheitskonferenz, 26.-28.9.2017 [link]
Teaching
  • WS 2017/2018
    • Netzwerksicherheit (SMSB3/SMIB3/SMIB7)
    • Kryptographie (SMSB3)
  • SS 2017
    • Rechnernetze (SMSB2/SMIB2/MIMEB4)
    • Netzwerksicherheit (SMSB4/SMIB6/IKTB6/ETB6)
    • Kryptographische Protokolle (SMSB4)
    • Laborpraktikum Verteilte Systeme (IKTB4)
    • Breitbandtechnik (INFM/MIM/ETM)
Do you search for a bachelor, master or project thesis? Click here.

Topics for bachelor, master and project theses
Network security
  • Erweiterte Forschung zu Intrusion Detection: Verhaltensanalyse.
  • Generischer TLS-Proxy mit Generierung von X.509-Zertifikaten zur Laufzeit (via openssl)
  • Konzeption und Realisierung eines sicheren Mesh-Netzwerks an der Fachhochschule Stralsund.
  • Überblick über die Funkprotokolle von Smarthome.
  • Sicherheitsanalyse von IEEE 802.11 WLAN Implementierungen mit Fuzzing.
System security
  • Angriffe auf Smartphones (Android/iOS/WP)
  • Überblick über die Sicherheitseigenschaften von Crypto-Dongles für den hardwarebasierten Kopierschutz (Hardware wird ggf. gestellt).
  • Reverse Engineering von kryptographischen Primitiven durch statische Analyse von Firmware-Images.
Cryptography
  • Effiziente und kryptographisch sichere Topologie-Erzeugung (Mesh mit Smartphones) und sichere Datenübertragung (Unicast/Broadcast)
  • Sicherheitsniveau von aktuellen klassischen asymmetrischen Verfahren und (hyper-)elliptischen Kurven (+evtl. zusätzliche Verfahren wie Hashchains).
  • Sicherheitsniveau von aktuellen symmetrischen Verfahren (u.a. Anwendbarkeit von linearer und differentieller Kryptoanalyse).
  • Bestimmung der verwendeten Chiffre anhand von gegebenen Chiffraten.
  • Überblick über die Funktionsweise und Implementierung von Weil- und Tate-Pairings.
  • Fuzzing kryptographischer Parameter für symmetrische kryptographische Primitive.
  • Fuzzing kryptographischer Parameter für asymmetrische kryptographische Primitive.
Networking
  • Bestimmung der Netzwerkqualität (Durchsatz, Latenz, Jitter) des Wireless Mesh Netzwerks an der Fachhochschule Stralsund (IEEE 802.11s Standard).
Software defined radio
  • Weiterentwicklung des Universal Radio Hackers.
  • Angriff von SmartHome Geräten über die Funkschnittstelle.
  • Sicherheitsanalyse eines kryptographischen Funkprotokolls eigener Wahl.
  • Extraktion von Seitenkanalinformationen aus IoT-Geräten.
  • Zustandsabhängiges Fuzzing von Protokollnachrichten.
  • Echtzeitsimulation der Funkschnittstelle eines Gerätes in IoT-Kommunikation via SDR.
  • Messung der Energieeffizienz kryptographischer Operationen auf IoT-Hardware.
  • Design von Richtfunkantennen und Signalverstärkung für die Reichweitenerhöhung von SDRs.
High performance computing
  • Implementierung eines kryptographischen Verfahrens (Chiffre, Hash, Mac) für den Einsatz auf einem FPGA-basierten Parallelrechner.
Please contact me if you are interested in one of the topics!
Projects
My field of activity contains amongst other things:
  • Consulting on design and improvement of network concepts and systems
  • Consulting on efficient network protocols and development
  • Consulting on secure cryptographic network protocols and development
  • Security reports
  • Seminars and training
If you are interested in a cooperation or if you need further information do not hesitate to contact me!
For further information, please refer to the Steinbeis Institute.

References (active and past projects)
  • KASIMIR II (Kollaborative Schwarmintelligenz für die mobile Rettungsplattform MORP), 2014
  • KASIMIR (Kollaborative Schwarmintelligenz für die mobile Rettungsplattform MORP), 2013
  • WebSuN - Patientennachsorge, 2013
  • Mobile Rettungsplattform (MORP), 2012
Research topics
  • IT security
    • Internet of Things (e.g. SmartHome)
    • Wireless networks including IEEE 802.11 WLAN, mesh, adhoc, cellular networks and proprietary protocols
    • Hardware accelerated hacking (Rivyera S6-LX150)
    • OSI layer 2 security (IPv4, IPv6)
    • Side channels and covert channels
  • Cryptography
    • Efficient network protocols for authentication and key agreement
    • Symmetric and asymmetric ciphers
  • Networking
    • Performance and QoS analysis
    • Virtual Private Networks (OpenVPN, IPsec, PPTP)
Reviewer
  • Reviewer for International Symposium on Applications of Computational Intelligence and Machine Learning in Networked Systems (ACMiNS), 2017.
  • Reviewer for IETE Journal of Research, 2017.
  • Reviewer for Universal Journal of Communications and Network, UJCN'15/UJCN'16/UJCN'17.
  • Reviewer for The 4th International Workshop on Design and Performance of Networks on Chip (DPNoC 2017), 2017.
  • Reviewer for Universal Journal of Electrical and Electronic Engineering (UJEEE), 2016.
  • Reviewer for The Fourth International Symposium on Security in Computing and Communications (SSCC'2016), 2016.
  • Reviewer for IEEE SPICES 2015 (SPICES2015), 2015.
  • Reviewer for Second International Conference on Security in Computer Networks and Distributed Systems (SNDS-2014), 2014.
  • Program Committee and Organisation for 1st/2nd/3rd/4th/5th/6th Stralsunder IT-Sicherheitskonferenz (SSK'12/SSK'13/SSK'14/SSK'15/SSK'16/SSK'17), 2012-2017.
  • EURASIP Journal on Information Security (EURASIP), 2013, 2014.
  • Program Committee Member and Reviewer for ContextQoS'11-14, ICCCN2015/16/17, Workshop of IEEE ICCCN Conference, 2011-2017.
  • Reviewer for WI2013 -- 11. Internationale Tagung Wirtschaftsinformatik (WI2013), 2012.
  • Reviewer for IEEE WCNC 2012/2013, Wireless Communications and Networking Conference (WCNC 2012/2013), 2012, 2013.
  • Reviewer for APCOM Symposium, Application of Computers and Operations Research in the Mineral Industry, 2011.
  • Reviewer for European Transactions on Telecommunications (ETT), 2011.
  • Reviewer for International Journal of Foundations of Computer Science (IJFCS), 2010.
  • Reviewer for IEEE Transactions on Mobile Computing (TMC), 2009, 2016.
  • Reviewer for IACR Eurocrypt, 2009.
Publications
  • Johannes Pohl (supervised). Universal Radio Hacker: Investigate Wireless Protocols Like a Boss - Arsenal Theater Demo.
    Black Hat USA - Arsenal [link], 2017.
  • Emmanouil Panaousis, Aron Laszka, Johannes Pohl, Andreas Noack, and Tansu Alpcan. Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking.
    In RATSP 2015 - The 2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications, 2015.
  • Johannes Pohl and Andreas Noack. I see you: On Neural Networks for Indoor Geolocation.
    In ESANN 2015 - European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, 2015.
  • Christoph Müller and Andreas Noack. Mining network and the security question.
    In 35th APCOM Symposium - Application of Computers and Operations Research in the Mineral Industry, Australia, September 2011.
  • Christoph Müller and Andreas Noack. Safety support functions for underground network communications.
    In 35th APCOM Symposium - Application of Computers and Operations Research in the Mineral Industry, Australia, September 2011.
  • Andreas Noack. Efficient cryptographic protocols for wireless mesh networks.
    Dissertation, Ruhr-Universität Bochum, Universitätsbibliothek, 2011.
  • Andreas Noack, Patrick-Benjamin Bök, and Sebastian Krück. Evaluating the impact of transmission power on QoS in wireless mesh networks.
    In IEEE ICCCN 2011 Workshop on Context-aware QoS Provisioning and Management for Emerging Networks, Applications and Services - ContextQoS 2011, Hawaii, Juli 2011.
  • Andreas Noack. Trust agreement in wireless mesh networks.
    In WISTP'11 - Workshop in Information Security Theory and Practice, Greece, June 2011.
  • Andreas Noack and Mark Borrmann. Mutual preimage authentication for fast handover in enterprise networks.
    In Robert Meersman, Tharam Dillon, and Pilar Herrero (editors) - On the Move to Meaningful Internet Systems: OTM 2010, volume 6426 of Lecture Notes in Computer Science, pages 583-599. Springer, 2010.
  • Andreas Noack and Christoph Müller. Mobile machine operation in underground networks and the security question.
    In 8th conference: escar'10 - Embedded Security in Cars, November 2010.
  • Andreas Noack and Jörg Schwenk. Group key agreement performance in wireless mesh networks.
    In 35th IEEE LCN and Workshops Conference Proceedings, pages 176-179, 2010.
  • C. Müller, I. Szekely, and A. Noack. Ethernet communication for detection of emergency locations and dynamic evacuation in underground infrastructures.
    In 12th International Conference on Optimization of Electrical and Electronic Equipment (OPTIM), pages 1046-1051. IEEE, 2010.
  • A. Noack. Efficient Authenticated Wireless Roaming via Tunnels.
    In Quality of Service in Heterogeneous Networks, pages 739-752, 2009.
  • Andreas Noack and Jörg Schwenk. Group key agreement for wireless mesh networks.
    In 34th IEEE LCN and Workshops Conference Proceedings, pages 945-952, 2009.
  • Andreas Noack and Stefan Spitz. Dynamic threshold cryptosystem without group manager.
    In International Journal of Network Protocols and Algorithms (ISSN: 1943-3581), 1(1):108-121, 2009.