Welcome...

dr.ing. E. Tews BSc (Erik)

Assistant Professor

About Me

I'm a security researcher who spent most of his academic life at Technische Universität Darmstadt, Germany. Previously I was working for the University of Birmingham, UK and since 2017, I'm at the University of Twente.

Expertise

Cryptography
Cordless Telephones
Students
Mobile Phones
Internet
Peer To Peer Networks
Firmware
Defects
Wire
Switching Networks
Digital Video Broadcasting (Dvb)
Processing
Hardware Security
Program Processors
Radio Stations
Authentication
Synchronization
Field Programmable Gate Arrays (Fpga)
Recovery
Chromium
Particle Accelerators
Smartphones
Radio Links
Availability
Ethernet
Bluetooth
Network Protocols

Research

I'm currently interested in:

  • The Internet of Things
  • Privacy preserving technologies and the World Wide Web
  • Applied Cryptanalysis including side channel attacks
  • Railway signalling systems
  • Security of critical infrastructures
  • Security of wireless protocols

Publications

Recent
Baumann, P., Katzenbeisser, S., Stopczynski, M., & Tews, E. (2016). Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection. In WPES '16. Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society (pp. 37-46). Association for Computing Machinery. DOI: 10.1145/2994620.2994621
Schulz, M., Klapper, P., Hollick, M., Tews, E., & Katzenbeisser, S. (2016). Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet. In WiSec '16. Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (pp. 43-48). Association for Computing Machinery. DOI: 10.1145/2939918.2940650
Senftleben, M., Barroso, A., Bucicoiu, M., Hollick, M., Katzenbeisser, S., & Tews, E. (2016). On the Privacy and Performance of Mobile Anonymous Microblogging. IEEE transactions on information forensics and security, 11(7), 1578-1591. DOI: 10.1109/TIFS.2016.2541633
Meyer, C., Somorovsky, J., Weiss, E., Schwenk, J., Schinzel, S., & Tews, E. (2014). Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks. In Proceedings of the 23rd USENIX Security Symposium (pp. 733-748)
Ghiglieri, M., & Tews, E. (2014). A privacy protection system for HbbTV in Smart TVs. In 2014 IEEE 11th Consumer Communications and Networking Conference 2014 (pp. 357-362). IEEE. DOI: 10.1109/CCNC.2014.6866595
Tews, E., & Schlehuber, C. (2014). Quantitative Ansätze zur IT-Risikoanalyse. In S. Katzenbeisser, V. Lotz, & E. R. Weippl (Eds.), Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit (Vol. 228, pp. 293-303). (LNI). Nederlands Centrum Geestelijke Volksgezondheid.
Karvelas, N. P., Peter, A., Katzenbeisser, S., Tews, E., Tews, E., & Hamacher, K. (2014). Privacy preserving whole genome sequence processing through proxy-aided ORAM. In 13th Annual ACM Workshop on Privacy in the Electronic Society (WPES 2014) (pp. 1-10). New York: Association for Computing Machinery. DOI: 10.1145/2665943.2665962
Schlehuber, C., Tews, E., & Katzenbeisser, S. (2014). IT-Security in Railway Signalling Systems. In H. Reimer, N. Pohlmann, & W. Schneider (Eds.), ISSE 2014 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2014 Conference (pp. 56-64). Springer. DOI: 10.1007/978-3-658-06708-3_4
Senftleben, M., Bucicoiu, M., Tews, E., Armknecht, F., Katzenbeisser, S., & Sadeghi, A-R. (2014). MoP-2-MoP - Mobile Private Microblogging. In N. Christin, & R. Safavi-Naini (Eds.), Financial Cryptography and Data Security: 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers (pp. 384-396). (Lecture Notes in Computer Science; Vol. 8437). Springer. DOI: 10.1007/978-3-662-45472-5_25
Weiner, M., Massar, M., Tews, E., Giese, D., & Wieser, W. (2013). Security analysis of a widely deployed locking system. In A-R. Sadeghi, V. D. Gligor, & M. Yung (Eds.), 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013 (pp. 929-940). Association for Computing Machinery. DOI: 10.1145/2508859.2516733
Peter, A., Tews, E., Tews, E., & Katzenbeisser, S. (2013). Efficiently outsourcing multiparty computation under multiple keys. IEEE transactions on information forensics and security, 8(12), 2046-2058. DOI: 10.1109/TIFS.2013.2288131

UT Research Information System

Google Scholar Link

Education

I'm currently teaching Operating Systems for BSc students as well as Systems Security for MSc students.

Courses

Contact Details

Visiting Address

University of Twente
Faculty of Electrical Engineering, Mathematics & Computer Science
Zilverling (building no. 11), room 4037
Hallenweg 19
7522NH  Enschede
The Netherlands

Navigate to location

Mailing Address

University of Twente
Faculty of Electrical Engineering, Mathematics & Computer Science
Zilverling  4037
P.O. Box 217
7500 AE Enschede
The Netherlands