The focal point for research and education in cybersecurity at the IT University of Copenhagen (ITU).
Find Out MoreThe ITU Center for Information Security and Trust (ITU CISAT) provides a multidisciplinary research environment, delivering knowledge and capacity necessary to tackle modern cybersecurity challenges from a societal, legal, organizational, and technical point of view. ITU CISAT draws on expertise in information security, computer science, social science, law and philosophy, covering the range of basic research in security science to applied research in systems-building and analysis of the implications to society.
ResearchITU CISAT conducts research in information security, in terms of:
Reliability, security by design, language-based security, continuous deployment
Adversary-, capability- and risk-modeling, risk mitigation, cyber attack detection, theorem proving, model checking
Organizational effects, including trustability, governance, and legislation
Human perceptions of trust, ethics and privacy, including psychological, philosophical and cognitive aspects
ITU CISAT provides research-based multidisciplinary Bachelor's and Master's programs within information security in order to meet the need for cybersecurity experts. ITU CISAT students acquire competencies enabling them to make security decisions as suppliers and acquirers of software, to construct secure software, to assess security risks, to perform penetration testing, and more.
ITU CISAT also strengthens the competences of professionals. In 2019, the center will start up two new projects that will support Danish companies to upgrade their IT security; CSSME Courses (Cyber Security courses for Small and Medium-sized Enterprises) and CIDI (Cybersecure IoT in Danish Industry). Both projects are funded by Industriens Fond.
Associate Professor
Associate Professor
Associate Professor
Associate Professor
Associate Professor
Associate Professor
Associate Professor
Associate Professor
Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor
Postdoc
Postdoc
PhD Student
PhD Student
CISAT working groups are a good way for external parterners, including industry and governmental and non-governmental organizations to interact with CISAT on topics that are becoming increasingly relevant for securing critical infrastructure systems. For more information about each working group, how to join them, please visit the Working Group's webpage.
WG-AAI WG-DEMTECH WG-IOT WG-PRIV
Date | Time | Title | Speaker | Location |
11-Jan | 15:00 - 16:00 | FAST: Fair Auctions via Secret Transactions | Lorenzo Gentile | Online |
08-Mar | 15:00 - 16:00 | "It's Not Something They Really Care About": A Study on Security and Privacy Practices in Danish Companies | Asmita Dalela | Online |
23-Mar | 15.00 - 16.00 | Securing a World of Physically Capable Computers | Bruce Schneier | Online |
12-Apr | 15.00 - 16.00 | PESTO: Proactive Secure Distributed SSO, or How to Trust a Hacked Server | Carsten Baum, Aarhus University | Online |
19-Apr | 15.00 - 16.00 | Research on illicit online markets, mainly for drugs and other goods | Rasmus Munksgaard, Aalborg University | Online |
26-Apr | 15.00 - 16.00 | Modelling Human Threats in Socio-Technical Systems | Rosario Giustolisi, ITU | Online |
3-May | 15.00 - 16.00 | Certifying the True Error: Machine Learning in Coq with Verified Generalization Guarantees | Gordon Stewart, Ohio University | Online |
10-May | 15.00 - 16.00 | CertRL: Formalizing Convergence Proofs for Value and Policy Iteration in Coq | Koundinya Vajjha, University of Pittsburgh | Online |
17-May | 15.00 - 16.00 | X-Men: A Mutation-Based Approach for the Formal Analysis of Security Ceremonies | Dr. Diego Sempreboni, King’s College London | Online |
31-May | 9.00 - 10.00 | Silas: High-Performance Computing, Automated Reasoning and Machine Learning at the Core of Trustworthy AI | Dr. Zhe Hou, Institute for Integrated and Intelligent Systems, Griffith University, Australia | Online |
14-June | 15.00 - 16.00 | "Now I'm a bit angry:" Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them | Dr. Peter Mayer, Karlsruhe Institute of Technology | Online |
23-August | 15.00 - 16.00 | Software-Defined Data Protection: Low Overhead Policy Compliance at the Storage Layer is Within Reach! | Zsolt István, ITU | Online |
30-August | 15.00 - 16.00 | Hardware Lottery and the Perils of Computer Security | Dr. Tanvir Arafin | Online |
13-September | 15.00 - 16.00 | Improving proof assistant user productivity using language models | Karl Palmskog, KTH Royal Institute of Technology, Sweden; Pengyu Nie, University of Texas at Austin, USA | Online |
27-September | 15.00 - 16.00 | Voters perception of Trust in Risk Limiting Audits | Asmita Dalela, ITU | Online |
11-October | 9.00 - 10.00 | Modular Synthesis of Certifying STV Counting Programs | Emeritus Professor Rajeev Gore, Australian National University | Online |
18-October | 15.00 - 16.00 | Ai2: Safety and robustness certification of neural networks with abstract interpretation | Dana Drachsler Cohen, Assistant Professor, Faculty of Electrical and Computer Engineering, Technion, Israel | Online |
22-October | 15.00 - 16.00 | A formal approach to coercion-resistance and its application to e-voting | Mathias Oliver Valdbjørn Jørgensen, MSc, ITU | Online |
3-October | 14.00 - 14.00 | Mt. Random: Multi-tiered Randomness Beacons | Bernardo Machado David, ITU | Online |
8-November | 15.00 - 16.00 | Towards Auditable AI Systems | Christian Berghoff and Arndt von Twickel, technical officers at the Federal Office for Information Security in Bonn, Germany | Online |
15-November | 15.00 - 16.00 | Trust and Trustworthiness of Voting Systems | Professor Peter Y A Ryan, University of Luxembourg | Online |
Contact Ieva Daukantas to propose a talk.
Professor, Head of ITU CISAT
Research Communicator
ITU CISAT is part of the IT University of Copenhagen (ITU), located at Rued Langgaards Vej 7, DK-2300