Doctoral Research in Cyber Security
Both in all areas of information technology and in our everyday lives, cyber security plays a crucial role. Hardly a day goes by without the media reporting on successful attacks and new threats. From malware-infected computers crippling companies and administrations to stolen credit card numbers leading to emptied bank accounts - the implications of cyber security are obvious. Because of its vast political and societal implications, the Karlsruhe Institute of Technology has anchored cyber security as an Emerging Field.
To meet the manifold challenges in cyber security, KIT is looking for bright minds that complement and strengthen our existing research groups. As fully employed research assistants and part of an internationally renowned university, doctoral students at KIT find excellent working conditions, enabling them to commit fully to their doctorate while contributing to an exciting field of research. Have we sparked your interest? Scroll down to learn more about our scientific profile as well as research and employment opportunities!
At KIT, the combination of university and Helmholtz research offers unique creative opportunities for interdisciplinary work at the intersection of software engineering and cyber security. We are looking for excellent researchers that complement our young and active group with their skills and interests, their curiosity, and particularly their passion for research.
Prof. Dr. Ina Schaefer, Head of the Research Group "Test, Validation and Analysis of Software-Intensive Systems."
As one of Germany's universities of excellence, KIT offers an ideal environment for conducting competitive cyber security research. In the case of my research group, we are working at the intersection of machine learning and computer security. Becoming an active part of our community provides the opportunity to work with exceptional people on exciting questions.
TT.-Prof. Dr. Christian Wressnegger, Head of the Research Group "Intelligent System Security."
Cyber Security at KIT
Network Security & Distributed Systems
The internet is the prime example for a communication network, connecting billions of nodes and enabling services like P2P networks, blockchains, and social media. Security research in this area spans a wide spectrum from network resilience and intrusion detection over access control and identity management to smart contracts and privacy-aware protocols.
Engineering dependable and secure software is a huge challenge. It requires bringing together model-based software engineering and agile methods to deal with changing requirements. Tools assist in software architecture-based analysis of confidentiality, vulnerability, but also maintainability. A structured approach helps to leverage software diversity and handle legacy software.
Formal & Data Security
Algorithms and protocols are the building blocks of information systems. We need to have high confidence in their security, which is impossible without a thorough analysis. Formal verification and cryptographic proofs support the development of practical and efficient systems with real-world applications that offer comprehensive security and privacy guarantees.
Human & Societal Factors in Security
Systems used for electronic voting have a tight coupling with society, but every IT system exists within a societal, legal, and economic context. A complete analysis of any IT system needs to consider all of these aspects. When users interact with the system, they should be aware of security and privacy implications. Economic risk needs to be modelled and GDPR aspects considered.
Often neglected, applied security is crucial because security advances can only have real-world impact if they consider real-world systems. This includes finding vulnerabilities in software and embedded devices, assessing the privacy impact of apps, or analyzing real systems for conceptual flaws, but also applying and improving machine learning methods to computer security.
Our future society will depend on networked critical infrastructures, such as smart grids, autonomous mobility, and intelligent production facilities. All of these have features going beyond classical computer systems: real-time requirements, fluid system boundaries, and possible physical consequences of IT system failures require additional expertise from engineers.
We are looking for researchers that hold a master’s degree with very good grades in computer science, mechanical and electrical engineering, mathematics, psychology (preferably with a relationship to technology) or other related disciplines. Research assistants are expected to work towards their doctorate and are offered full-time positions in salary group TV-L E13 (ca. 51.000 – 55.000€ a year with 30 days of paid vacation).
Do you have the skills and drive to advance cyber security research at KIT? Are you interested in becoming part of our young, motivated, and passionate community? Then send us your application (including motivation letter, CV, university diplomas, awards, and other related and important documents) as a single PDF document to jobs(at)kastel.kit.edu. We are looking forward to your application!
KIT Graduate School Cyber Security
The KIT Graduate School Cyber Security gives doctoral researchers access to high-quality technical, scientific, and interdisciplinary training and exciting community events. With a strong interdisciplinary focus, the Graduate School brings together the different security disciplines and application domains at KIT. Learn more about the school and its offers here.
Selected Research Groups
|Alexander von Humboldt Professorship for Logic of Autonomous Dynamical Systems||Prof. Dr. André Platzer|
|Application-oriented Formal Verification||Prof. Dr. Bernhard Beckert|
|Critical Information Infrastructures||Prof. Dr. Ali Sunyaev|
|Cryptography and IT Security||Prof. Dr. Jörn Müller-Quade|
|Decentralized Systems and Network Services||Prof. Dr. Hannes Hartenstein|
|Dependability of Software-intensive Systems||Prof. Dr. Ralf Reussner|
|Intelligent System Security||TT.-Prof. Dr. Christian Wressnegger|
|Modelling for Continuous Software Engineering||Prof. Dr. Anne Koziolek|
|Practical IT Security||Prof. Dr. Thorsten Strufe|
|Security - Usability - Society||Prof. Dr. Melanie Volkamer|
|Telematics||Prof. Dr. Martina Zitterbart|
|Test, Validation and Analysis of Software-Intensive Systems||Prof. Dr. Ina Schaefer|