Biography
I am a computer scientist, specialized in modelling and analysis of IT systems. I also have a keen interest and academic experience in the security of systems and software.
My research is in the area of formal methods for security and more specifically on qualitative and quantitative security analyses of IT systems such as: wireless sensor networks, embedded systems, smart grid, and cyber-physical systems.
Industry Expertise (3)
Computer Software
Research
Computer/Network Security
Areas of Expertise (3)
Sensors
Security
Verification
Accomplishments (6)
Scholarships (professional)
Scholarships: - Erasmus Student Exchange Programme (2006). - DTU Ph.D. Programme (2007).
Invited Speaker (professional)
Invited Speaker: - Oxford University (2008), - Imperial College London (2008), - Alexandra Institute (2008), - East China Normal University (2011), - European ZigBee Developers Conference (2012).
Invited Participant (professional)
Invited Participant: Dagstuhl Seminar “Quantitative and Qualitative Analysis of Network Protocols” (2010).
Award Nomination (professional)
Award Nomination: Nominated to the Best Ph.D. Thesis award of the European Research Consortium for Informatics and Mathematics (2012).
Delegate of Denmark (professional)
Delegate of Denmark: The European Council for Doctoral Candidates and Junior Researchers (2009-2011).
Vice Chairman (professional)
Vice Chairman: Ph.D. Association, Technical University of Denmark (2009).
Education (3)
Technical University of Denmark: PhD, Computer Science 2011
Thesis title: Qualitative and Quantitative Security Analyses for ZigBee Wireless Sensor Networks
Istanbul Technical University: MSc., Computer Engineering 2007
Thesis title: Analysis of the PKMv2 Protocol in IEEE 802.16e-2005 Using Static Analysis
Istanbul Technical University: BSc., Computer Engineering 2003
Thesis title: Virtual Private Network Design and Implementation
Affiliations (2)
- Technical University of Denmark
- Istanbul Technical University
Links (2)
Event Appearances (22)
Smart Grid Security: A Smart Meter-Centric Perspective
2nd General Meeting of the IDEA4CPS Project Shanghai, China
2012-11-21
Key Update Assistant for Resource-Constrained Networks
The 17th IEEE Symposium on Computers and Communications Cappadocia, Turkey
2012-07-01
Modelling and Analysis of Smart Grid: A Stochastic Model Checking Case Study
The 6th IEEE International Symposium on Theoretical Aspects of Software Engineering Beijing, China
2012-07-05
Resilience Analysis of Key Update Strategies for Resource-Constrained Networks
The 3rd International Congress on Ultra Modern Telecommunications and Control Systems Budapest, Hungary
2011-10-06
Characteristics of Key Update Strategies for Wireless Sensor Networks
International Conference on Network Communication and Computer New Delhi, India
2011-03-22
Optimizing Key Updates in Sensor Networks
IEEE Sensors Applications Symposium San Antonio, Texas, USA
2011-02-22
A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks
The 24th International Symposium on Computer and Information Sciences Cyprus
2009-09-14
LBTool: A Stochastic Toolkit for Leave-Based Key Updates
The 4th IEEE International Workshop on Performance Evaluation of Communications in Distributed Systems and Web based Service Architectures Cyprus
2012-06-30
Quantitative Security Analysis of ZigBee Key Updates
The 21st Nordic Workshop on Programming Theory Copenhagen, Denmark
2009-10-13
ZigBee-2007 Security Essentials
The 13rd Nordic Workshop on Secure IT-systems Copenhagen, Denmark
2008-10-08
A Secure Simplification of the PKMv2 Protocol in IEEE 802.16e-2005
Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis Wroclaw, Poland
2007-07-07
Telsiz Yerel Alan Ağlarında Güvenlik Sorunu
Ağ ve Bilgi Güvenliği Ulusal Sempozyumu Istanbul, Turkey
2005-06-08
Sanal Özel Ağ Gerçeklemesi
Ağ ve Bilgi Güvenliği Ulusal Sempozyumu Istanbul, Turkey
2005-06-09
Küresel Ekonomide Şirketlerin Modern Fikri Mülkiyet Stratejisi Ve Sayısal Mülkiyet Hakkının Korunması
Ağ ve Bilgi Güvenliği Ulusal Sempozyumu Istanbul, Turkey
2005-06-09
A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks
Dagstuhl seminar Quantitative and Qualitative Analysis of Network Protocol Schloss Dagstuhl - Leibniz Zentrum für Informatik, Germany
2010-01-31
Time Management
LBT GRUS Denmark
2013-01-14
Static Analysis of Cryptographic Protocols: An Application in ZigBee Wireless Network Security
Seminar, University of Oxford Oxford, UK
2008-09-09
A Secure Simplification of the PKMv2 Protocol in IEEE 802.16e-2005
Seminar, Imperial College London London, UK
2008-09-14
Modelling and Verification of ZigBee Security Sublayer
Modelling and verification of security protocols, KomIalt, Alexandra Instituttet Copenhagen, Denmark
2008-12-14
Timing and research
PhD External Research Stay Event, DTU PhD Association Copenhagen, Denmark
2011-06-28
Strategies for Key Updates in ZigBee: A quantitative approach to security
6th European ZigBee Developers' Conference Munich, Germany
2012-06-26
Life after PhD
Post-PhD Career Event, DTU PhD Association Copenhagen, Denmark
2013-02-05
Sample Talks (1)
Strategies for Key Updates in ZigBee: A quantitative approach to security
ZigBee offers the advantages of simple and low-resource communication. Nevertheless, security is of particular importance in many cases such as when sensitive data is communicated or tamper-resistance is required. Updating the security keys is one of the critical points in security, which restrict the amount of data that may be exposed when a key is compromised. In this talk, we focus on methods for key update and determining optimal key update strategies for custom network scenarios. We take...
Style
Availability
- Keynote
- Moderator
- Panelist
- Workshop Leader
- Host/MC
- Author Appearance
Social