News Archive



Image of press release
Bitcoin: How users betray the security secrets of their virtual purse

Software systems are prone to attacks if users do not use them properly. This also applies to so-called cryptocurrencies, experts say. For the cryptocurrency Bitcoin, two computer scientists at the CISPA Helmholtz Center are now providing scientific proof. Over several months, they searched publicly available information for disclosed security details. Their conclusion: Cybercriminals could have stolen virtual coins worth about 3.3 million US dollars with the help of the search hits. The two researchers [...]

Image of press release
Symposium on Games, Automata, Logics, and Formal Verification held in Saarbrücken for the first time

GandALF 2018, the Ninth International Symposium on Games, Automata, Logics, and Formal Verification, will be held September 26–28 in Saarbrücken. It is the first time that the symposium is taking place outside of Italy. The aim of symposium is to bring together researchers from academia and industry who are actively working in the fields of games, automata, logics, and formal verification. Hence, GandALF 2018 covers a wide spectrum of themes to stimulate cross-fertilization, ranging from theory to applications.

Image of press release
1,5 million euros EU funding for Andreas Bulling and Björn Brandenburg

The European Research Council (ERC) has awarded its 2018 Starting Grants. In this year’s funding round, two researchers from Saarland Informatics Campus (SIC) were successful. Andreas Bulling, Max Planck Institute for Informatics, and Björn Brandenburg, Max Planck Institute for Software Systems, received an ERC Starting Grant and up to 1.5 million euros to pursue their research projects. ERC Starting Grants are awarded annually by the European Research Council. The prestigious grants are awarded [...]

Image of press release
Automating attacks against the second largest cryptocurrency

Cryptocurrencies like Bitcoin are increasingly attracting millions of users, but also cybercriminals, as a successful attack means maximum profit with little risk. This also applies to “ether,” the most widely used cryptocurrency after Bitcoin. As a precautionary measure, researchers at the CISPA Helmholtz Center i.G. at Saarland University have developed a methodology for this cryptocurrency that not only finds security vulnerabilities, but also uses them to automatically develop attacks. [...]

Image of press release
Who controls the internet?

The internet has developed over time and is able to function because of the interplay between various services that are, in turn, operated by a range of different institutions. Frequently, IT security does not play a significant role and, as shown by the latest attacks, we are now paying the price. Institutions are becoming both victims and perpetrators. Researchers at the CISPA Helmholtz Centre in Saarbrücken are consequently investigating the global security status of the internet using formal methods.

1 ...
1 2 3
4 5 6
7 8 9
10 11 12
13 14 15
16 17 18
19 20 21
22 23 24
25 26 27
28 29 30
31 32 33
34 35
2324252627 ...
1 2 3
4 5 6
7 8 9
10 11 12
13 14 15
16 17 18
19 20 21
22 23 24
25 26 27
28 29 30
31 32 33
34 35
35