Methods for Privacy-Preserving and Fair Ticketing for Europe-Scale Mobility-as-a-Service

This demonstrator showcases three different methods to realize key functionalities of a multi-provider check-in/out transportation system such as billing, clearance, payments, and further data analytics in a privacy-preserving and scalable way. Our distributed architecture based on trusted execution environments can handle the check-in/out volume of a Europe-scale system even under server dropouts. Our architecture based on secure multi-party computation shows that very strong privacy guarantees for a city-scale system are achievable. With our payment channel network-based protocol, we demonstrate how instantaneous payment and clearing with formally verifiable security can be realized.

Analysis of Everest Modular Framework for EV-Charging

Continuous analysis of software system requirements, design, and implementation is important to detect vulnerabilities in EV charging units to ensure security.

SCAR: Model-driven Development of Provably Correct and Secure Smart Contracts

The SCAR approach enables model-driven development of smart contract applications with formally proven correctness and security properties.

Contributing Scientists
Name E-Mail
beckert does-not-exist.kit edu
3 additional persons visible within KIT only.

Secure Redundancy for Industrial Control Traffic

We demonstrate a novel attack against packet redundancy mechanisms, as used in industrial automation, on a model production process.