Dr.-Ing. Peter Amthor

Foto Peter Amthor

Curriculum Vitae:  pdf

Contact:

Phone:+49 (0) 3677 69 4163
Room:Zusebau 3029
eMail:peter.amthor[at]tu-ilmenau.de
 PGP public key
(66F6 C884 6F47 C94E 0B1C 2DF2 7B0B 0E90 0032 964E)
ORCID:
Matrix:@amthor:matrix.org
Mastodon:  @amthor@discuss.systems
a.k.a.:“FG VSBS Staff 2” in Open Timetable

Research Interests

My research interests are in the application of formal methods for design, analysis, specification, and implementation of secure IT systems. This includes:

  • secure software applications
  • operating systems access control
  • privacy protection mechanisms
  • threat countermeasures

My research focus is on integrating such methods into a software engineering process that explicitly focuses mission-critical non-functional requirements such as security, safety and reliability. For this reason I am always interested in collaborating with related research areas.

Academic Services

  • Journal Reviewer for IEEE Access, Elsevier Computers & Security (active)
  • PC Member:
    • SECRYPT 2021–present
    • ARES (CyberTIM Workshop) 2020–2021
    • ICSOFT 2019–2020
    • EuroSys Shadow PC 2013
  • Assistant reviewer at D·A·CH Security 2011–2018, WI 2021

Teaching

examING project logo

Projects:

As a subproject of examING, I am involved in the AutoPING project which aims at testing, integrating and evaluation competence-oriented and digitally supported teaching based on the autograding platform CodeOcean.

Awards:

  • 2023: TU Ilmenau Teaching Award (Lehrpreis der TU Ilmenau)
  • 2020: Special Award for Excellent Teaching at the Dept. of Computer Science and Automation (Lehrpreis der Fakultät IA für besonderes Engagement in der Lehre)
  • 2017: Best Elective Lecture Award at the Dept. of Computer Science and Automation (Lehrpreis der Fakultät IA für beste Wahlpflichtvorlesung) for Advanced Operating Systems

Regular Courses

Summer Terms:

  • Systems Security Course (International)
  • Seminars (Research Seminar/Hauptseminar/Proseminar)

Winter Terms:

  • Advanced Operating Systems Course (awarded department's Best Elective Lecture in winter 2017/18)
  • Seminars (Research Seminar/Hauptseminar/Proseminar)

Anytime:

  • RCSE Research Project (temporarily unavailable)
  • Bachelor/Master Thesis (see also here)

Bachelor/Master Theses

Topics: In the scope of my research interests and ongoing projects, we can find a topic for a Bachelor or Master Thesis based on your personal preferences. Generally, this includes but is not limited to the following areas of interest:

  • Trustworthy and error-free enforcement of security policies (e.g. OS, local and distributed applications, middleware, ...)
  • Specification language for attribute-based access control policies (a.k.a. DynaMo)
  • Tool-assisted security policy implementation/code generation
  • Formal methods for security policy analysis (e.g. heuristic safety analysis, model checking, information flow analysis, ...)
  • Specification and design of OS security architectures (with a focus on OSs, e.g. SELinux, SEAndroid, Redox, …)
  • Design and prototypical implementation of threat-reactive security architectures
  • Theoretical foundations and prototypical application of multi-tenant security policies and metapolicies for their composition

It is also possible to discuss any individual ideas based on your personal interests. In either case, please contact me via Mail for further discussion.

Prerequisites: Since most of my topics require a solid understandig of security concepts, previous attendance of the Systems Security course or a similar introduction into technical IT security is mandatory. For more practical topics, an implementation in Rust is likely required. Moreover, most of the following, fundamental CS skills and knowledge is assumed:

  • Discrete mathematics: logic, set theory, graph theory, abstract algebra, automata theory & formal languages
  • Operating systems basic concepts, mechanisms and architectures
  • Networking fundamentals
  • Software engineering practices and tools
  • Research skills in searching, evaluating and using scientific literature
  • Writing a thesis in LaTeX

Publications

  • 2024
  • Peter Amthor and René Gorges. A Composition Algebra for Decentralized Enforcement of Access Control Policies with an Application to Vehicular Networks. To appear in Pierangela Samarati and Sabrina De Capitani di Vimercati, editors, Proceedings of the 21th International Conference on Security and Cryptography, SECRYPT 2024. INSTICC, SciTePress, 2024.
  • Majid Lotfian Delouee, Victoria Degeler, Peter Amthor, Boris Koldehofe. APP-CEP: Adaptive Pattern-level Privacy Protection in Complex Event Processing Systems. To appear in Proceedings of the 10th International Conference on Information Systems Security and Privacy (ICISSP’24). SCITEPRESS, 2024.
  • 2023
  • Peter Amthor, Ulf Döring, Daniel Fischer, Jonas Genath, Gunther Kreuzberger. Erfahrungen bei der Integration des Autograding-Systems CodeOcean in die universitäre Programmierausbildung. In Proceedings of the Sixth Workshop "Automatische Bewertung von Programmieraufgaben" (ABP 2023), 2023. [doi]
  • Peter Amthor. Language-Support for Correct and Reliable Enforcement of Access Control Policies. Talk at the Operating Systems SIG (FGBS) fall meeting of the German Computer Science Society (GI), Bamberg, Germany, September 2023. [abstract:pdf] [slides:pdf]
  • Marius Schlegel, Peter Amthor. Putting the Pieces Together: Model-based Engineering Workflows for Attribute-based Access Control Policies. In Communications in Computer and Information Science (CCIS) 1795, E-Business and Telecommunications, pages 249–280. Springer Nature Switzerland, Cham, 2023. [doi]
  • 2021
  • Marius Schlegel, Peter Amthor. The Missing Piece of the ABAC Puzzle: A Modeling Scheme for Dynamic Analysis. In Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, pages 234–246, 2021. [doi]
  • 2020
  • Marius Schlegel, Peter Amthor. Beyond Administration: A Modeling Scheme Supporting the Dynamic Analysis of Role-based Access Control Policies. In Proceedings of the 17th International Conference on Security and Cryptography, SECRYPT 2020, pages 431–442, 2020. [doi]
  • Peter Amthor, Marius Schlegel. Towards Language Support for Model-based Security Policy Engineering. In Proceedings of the 17th International Conference on Security and Cryptography, SECRYPT 2020, pages 513–521, 2020. [doi]
  • Peter Amthor, Martin Rabe. Command Dependencies in Heuristic Safety Analysis of Access Control Models. In Proceedings of the 12th International Symposium on Foundations & Practice of Security, FPS 2019, pages 207–224, 2020. [doi] [aam:pdf]
  • 2019
  • Peter Amthor, Daniel Fischer, Winfried E. Kühnhauser, Dirk Stelzer. Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems. In Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, pages 86:1–86:10, 2019. [doi] [slides:pdf]
  • Felix Wiemuth, Peter Amthor, Winfried E. Kühnhauser. Static Termination Analysis for Event-driven Distributed Algorithms. In Proceedings of the 13th International Conference on Distributed and Event-based Systems, DEBS 2019, pages 151–162, 2019. [doi]
  • Peter Amthor. Aspect-oriented Security Engineering. Cuvillier Verlag, Göttingen, Germany, 2019. ISBN 978-3-7369-9980-0. [pub]
  • 2018
  • Peter Amthor. Modellierung und formale Analyse von Betriebssystem-Sicherheitspolitiken. Talk at the Operating Systems SIG (FGBS) fall meeting of the German Computer Science Society (GI), Coburg, Germany, October 2018. [abstract:pdf] [slides:pdf]
  • Peter Amthor. An Aspect-oriented Approach to Model-based Security Engineering. PhD thesis, Technische Universität Ilmenau, Ilmenau, Germany, March 2018.
  • 2017
  • Peter Amthor. Efficient Heuristic Safety Analysis of Core-based Security Policies. In Proceedings of the 14th International Conference on Security and Cryptography, SECRYPT 2017, pages 384–392, 2017. [doi]
  • 2016
  • Peter Amthor and Winfried E. Kühnhauser. Privacy in sozialen Netzwerken: Eine Informationsflussanalyse. In Patrick Horster and Peter Schartner, editors, D·A·CH Security 2016, pages 224–240. syssec Verlag, 2016. [pdf]
  • Peter Amthor. The Entity Labeling Pattern for Modeling Operating Systems Access Control. In S. Mohammad Obaidat and Pascal Lorenz, editors, E-Business and Telecommunications, pages 270–292. Springer International Publishing, Cham, 2016. [doi]
  • 2015
  • Peter Amthor and Winfried E. Kühnhauser. Security Policy Synthesis in Mobile Systems. In Proceedings of the IEEE SERVICES 2015 Visionary Track: Security and Privacy Engineering Theme, SPE '15, pages 189–197, Washington, DC, USA, 2015. IEEE Computer Society. [doi]
  • Peter Amthor. A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux. In Proceedings of the 12th International Conference on Security and Cryptography, SECRYPT 2015, pages 88–99, 2015. [doi]
  • 2014
  • Peter Amthor, Winfried E. Kühnhauser, and Anja Pölck. WorSE: A Workbench for Model-based Security Engineering. Elsevier Computers & Security, 42(0):40–55, 2014. [doi]
  • 2013
  • Heuristic Safety Analysis of Access Control Models. In Proceedings of the 18th ACM symposium on Access control models and technologies, SACMAT '13, pages 137–148, New York, NY, USA, 2013. ACM. [doi]
  • Peter Amthor and Winfried E. Kühnhauser. Leichtgewichtige Sicherheitsdomänen für spontane Kooperationen. In Patrick Horster and Peter Schartner, editors, D·A·CH Security 2013, pages 260–274. syssec Verlag, 2013. [pdf]
  • 2011
  • Peter Amthor, Winfried E. Kühnhauser, and Anja Pölck. Model-based Safety Analysis of SELinux Security Policies. In P. Samarati, S. Foresti, J. Hu, and G. Livraga, editors, Proceedings of the 5th International Conference on Network and System Security, NSS ’11 pages 208–215. IEEE, 2011.
  • 2010 (and before)
  • Peter Amthor. Modellbasierte Analyse von SELinux-Sicherheitspolitiken. Diplomarbeit (Master's Thesis), Technische Universität Ilmenau, December 2010.
  • Peter Amthor, Anja Fischer, and Winfried E. Kühnhauser. Analyse von Zugriffssteuerungssystemen. In Patrick Horster and Peter Schartner, editors, D·A·CH Security 2009, pages 49–61. syssec Verlag, 2009. [pdf]
  • Peter Amthor. Generierung von Informationsflussgraphen aus HRU-Modellen. Technical Report, Technische Universität Ilmenau, October 2008.