Schaad, Andreas  M.Sc.

Schaad, Andreas

Prof. Dr. phil. M.Sc.
Software Security, Cloud Security, IT Security, Informatik
  • Room: D304
  • Badstraße 24, 77652 Offenburg

Curriculumvitae

Academic Career

1999-2003 PhD (EPSRC Scholarship) am Lehrstuhl High Integrity Systems, University of York, GB

1998-1999 MSc in Software Engineering, University of York, GB

1995-1998 Dipl. Betriebswirt (Wirtschaftsinformatik) Roche AG BA Mannheim, Deutschland

 

Occupation

03/2018 - jetzt Hochschule Offenburg Offenburg, DE
Professor (W2) für Informatik (insb. IT-Sicherheit)

2017 - 2018 Wibu-Systems AG Karlsruhe, DE
Leiter Stabstelle Corporate Technology

2015 - 2017 HUAWEI European Security Competence Center Darmstadt, DE
Wissenschaftlicher Leiter

2011 - 2014 SAP Product & Innovation Research Karlsruhe, DE
Research Manager

2006-2010 SAP Research Security & Trust Karlsruhe, DE
Research Architekt

2004-2006 SAP Research Security & Trust Sophia Antipolis, FR
(Senior) Researcher

2003-2004 Ernst & Young London, UK
IT Security Auditor

 

Awards

1999-2003 Scholarship EPSRC

Research Interests

Research Projects

2021 - 2024 KMU Innovativ „OVVL"

2018 - 2021 KMU Innovativ „CloudProtect"

2015 - 2018 EU H2020 „ESCUDO - Cloud"

2010 - 2013 BMBF / ANR Projekt „RescueIT"

2008 - 2010 BMBF Projekt „ORKA"

2006 - 2009 EU Integrated Project „R4eGov"

 

Cooperations practice

2022 WIBU-Systems AG Projekt MLSec IV "Machine Learning"

2021 WIBU-Systems AG Projekt MLSec III "Machine Learning"

2020 WIBU-Systems AG Projekt MLSec II "Machine Learning"

2019 WIBU-Systems AG Projekt MLSec I "Machine Learning"

2019 WIBU-Systems AG Projekt CBSec "Blockchain Security"

 

Patents

9,495,545 Automatically generate attributes and access policies for securely processing outsourced audit data using attribute-based encryption (100%)
9,342,707 Searchable encryption for infrequent queries in adjustable enc. databases (20%)
9,037,860 Average Complexity Ideal-Security Order Preserving Encryption (20%)
9,213,764 Encrypted In-Memory Column-Store (20%)
9,003,204 Optimal Re-Encryption Strategy for Joins in Encrypted Databases (20%)
8,788,313 Decentralised audit system in collaborative workflow environment (100%)
8,751,282 Controls in collaborative workflow environment (50%)
8,689,352 Distributed access control for document centric collaborations (50%)
8,620,713 Mechanism to control delegation and revocation of tasks in workflow system (100%)
8,130,947 Privacy preserving social network analysis (50%)
8,726,151 Comparing encrypted Documents Having Structured Data (50%)
7,831,978 Review mechanism for controlling delegation of tasks in a workflow system (100%)
7,689,562 Access control system, a rule engine adaptor, a rule-based enforcement platform and a method for performing access control (100%)

Publication

Reviewed Papers

Vanessa Barnekow, Dominik Binder, Niclas Kromrey, Pascal Munaretto, Andreas Schaad, Felix Schmieder:
Creation and Detection of German Voice Deepfakes. FPS 2021: 355-364

Andreas Schaad, Dominik Binder: FEX - A Feature Extractor for Real-Time IDS. ISC 2021: 221-2371)

Vanessa Barnekow, Dominik Binder, Niclas Kromrey, Pascal Munaretto, Andreas Schaad, Felix Schmieder:
Creation and Detection of German Voice Deepfakes. CoRR abs/2108.01469 (2021)

Andreas Schaad, Dominik Binder: ML-Supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool. DBSec 2020: 274-285

Andreas Schaad: Project OVVL - Threat Modeling Support for the entire secure development lifecycle. Sicherheit 2020: 121-124

Andreas Schaad, Tobias Reski:"Open Weakness and Vulnerability Modeler" (OVVL): An Updated Approach to Threat Modeling. ICETE (2) 2019: 417-424

Andreas Schaad, Tobias Reski, Oliver Winzenried: Integration of a Secure Physical Element as a Trusted Oracle in a Hyperledger Blockchain. ICETE (2) 2019: 498-503

Andreas Schaad, Björn Grohmann, Oliver Winzenried:
CloudProtect - A Cloud-based Software Protection Service. SACMAT 2019: 219-221

Andreas Schaad, Björn Grohmann, Oliver Winzenried, Ferdinand Brasser, Ahmad-Reza Sadeghi:
Towards a Cloud-based System for Software Protection and Licensing. ICETE (2) 2018: 698-702

Angela Jäschke, Björn Grohmann, Frederik Armknecht, Andreas Schaad: Industrial Feasibility of Private Information Retrieval. SECRYPT 2017, Madrid.

Feng Wang, Mathias Kohler, Andreas Schaad: Initial Encryption of large Searchable Data Sets using Hadoop. SACMAT 2015: 165-168

Patrick Grofig, Isabelle Hang, Martin Härterich, Florian Kerschbaum, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert: Privacy by Encrypted Databases. APF 2014: 56-69

Andreas Schaad, Anis Bkakria, Florian Kerschbaum, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard: Optimized and controlled provisioning of encrypted outsourced data. SACMAT 2014: 141-152

Andreas Schaad, Florian Kerschbaum et al.: Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data. GI Sicherheit, 2014

Florian Kerschbaum, Patrick Grofig, Isabelle Hang, Martin Härterich, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert: Adjustably encrypted in-memory column-store. ACM Conference on Computer and Communications Security 2013: 1325-1328

Florian Kerschbaum, Martin Härterich, Patrick Grofig, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert: Optimal Re-encryption Strategy for Joins in Encrypted Databases. DBSec 2013: 195-210

Florian Kerschbaum, Martin Härterich, Mathias Kohler, Isabelle Hang, Andreas Schaad et al: An Encrypted In-Memory Column-Store: The Onion Selection Problem. ICISS 2013: 14-26

Axel Schröpfer, Andreas Schaad, Florian Kerschbaum, Heiko Boehm, Joerg Jooss: Secure benchmarking in the cloud. SACMAT 2013: 197-200

Ganna Monakova, Cristina Severin, Achim D. Brucker, Ulrich Flegel, Andreas Schaad: Monitoring Security and Safety of Assets in Supply Chains. Future Security 2012: 9-20

Schaad, A., Borozdin, M. TAM2 - Architectural Threat Analysis ACM SAC SE, Riva del Garda 2012

Monakova G., Brucker, A., Schaad, A. Security and Safety of Assets in Business Processes ACM SAC OE, Riva del Garda, 2012

Andreas Schaad, Alexandr Garaga: Automating architectural security analysis. ACM SACMAT 2012

Michael Clasen, Kai Fischbach, Rafael Pietrowski, Andreas Schaad: Sichere Warenketten durch RescueIT. GIL Jahrestagung 2011: 53-56

Ganna Monakova, Andreas Schaad: Visualizing security in business processes. ACM SACMAT 2011

Mohammad Ashiqur Rahaman, Henrik Plate, Yves Roudier, Andreas Schaad: Towards Secure Content Based Dissemination of XML Documents. IAS 2009: 721-724

Mathias Kohler, Achim D. Brucker, Andreas Schaad: ProActive Caching: Generating Caching Heuristics for Business Process Environments. CSE (3) 2009: 297-304

Khaled Gaaloul, François Charoy, Andreas Schaad: Modelling task delegation for human-centric eGovernment workflows. D.GO 2009: 79-87

Mohammad Ashiqur Rahaman, Yves Roudier, Andreas Schaad: A Secure Comparison Technique for Tree Structured Data. ICIW 2009: 304-309

Florian Kerschbaum, Andreas Schaad, Debmalya Biswas: Practical privacy-preserving protocols for criminal investigations. ISI 2009: 197-199

Achim D. Brucker, Helmut Petritsch, Andreas Schaad: Delegation Assistance. POLICY 2009: 84-91

Mohammad Ashiqur Rahaman, Yves Roudier, Philip Miseldine, Andreas Schaad: Ontology-Based Secure XML Content Distribution. SEC 2009: 294-306

Mohammad Ashiqur Rahaman, Yves Roudier, Andreas Schaad: Document-Based Dynamic Workflows: Towards Flexible and Stateful Services. SERVICES II 2009: 87-94

Mathias Kohler, Andreas Schaad: Avoiding Policy-based Deadlocks in Business Processes. ARES 2008: 709-716

Mathias Kohler, Andreas Schaad: ProActive Access Control for Business Process-Driven Environments. ACSAC 2008: 153-162

Mohammad Ashiqur Rahaman, Yves Roudier, Andreas Schaad: Distributed Access Control For XML Document Centric Collaborations. EDOC 2008: 267-276

Philip Miseldine, Ulrich Flegel, Andreas Schaad: Supporting Evidence-Based Compliance Evaluation for Partial Business Process Outsourcing Scenarios. RELAW 2008: 31-34

Christian Wolter, Andreas Schaad, Christoph Meinel: Task-based entailment constraints for basic workflow patterns. SACMAT 2008: 51-60

Khaled Gaaloul, Andreas Schaad, Ulrich Flegel, François Charoy: A Secure Task Delegation Model for Workflows. SECURWARE 2008: 10-15

Florian Kerschbaum, Andreas Schaad: Privacy-preserving social network analysis for criminal investigations. WPES 2008: 9-14

C. Wolter, A. Schaad: Modeling of Task-Based Authorization Constraints in BPMN. BPM 2007: 64-79

Mohammad Ashiqur Rahaman, Andreas Schaad: SOAP-based Secure Conversation and Collaboration. ICWS 2007: 471-480

Mathias Kohler, Christian Liesegang, Andreas Schaad: Classification Model for Access Control Constraints. IPCCC 2007: 410-417

Christian Wolter, Andreas Schaad, Christoph Meinel: Deriving XACML Policies from Business Process Models. WISE Workshops 2007: 142-153

Andreas Schaad: A Framework for Evidence Lifecycle Management. WISE Workshops 2007: 191-200

Khaled Gaaloul, François Charoy, Andreas Schaad, Hannah Lee: Collaboration for Human-Centric eGovernment Workflows. WISE Workshops 2007: 201-212

Philip Robinson, Florian Kerschbaum, Andreas Schaad:From Business Process Choreography to Authorization Policies. DBSec 2006: 297-309

Andreas Schaad: Security in enterprise resource planning systems and service-oriented architectures. SACMAT 2006: 69-70

Andreas Schaad, Volkmar Lotz, Karsten Sohr: A model-checking approach to analysing organisational controls in a loan origination process. SACMAT 2006: 139-149

Mohammad A. Rahaman, Andreas Schaad, Maarten Rits: Towards secure SOAP message exchange in a SOA. SWS 2006: 77-84

Andreas Schaad: Revocation of Obligation and Authorisation Policy Objects. DBSec 2005: 28-39

Maarten Rits, Benjamin De Boe, Andreas Schaad: XacT: a bridge between resource management and access control in multi-layered applications. SESS@ICSE 2005: 1-7

Andreas Schaad, Pascal Spadone, Helmut Weichsel: A case study of separation of duty properties in the context of the Austrian "eLaw" process. SAC 2005: 1328-1332

Andreas Schaad: An Extended Analysis of Delegating Obligations. DBSec 2004: 49-64

Andreas Schaad, Jonathan D. Moffett: Separation, review and supervision controls in the context of a credit application process: a case study of organisational control principles. SAC 2004: 1380-1384

Axel Kern, Andreas Schaad, Jonathan D. Moffett: An administration concept for the enterprise role-based access control model. SACMAT 2003: 3-11

Andreas Schaad, Jonathan D. Moffett: A Framework for Org. Control Principles. ACM ACSAC 2002

Andreas Schaad, Jonathan D. Moffett: Delegation of Obligations. POLICY 2002: 25-35

Andreas Schaad, Jonathan D. Moffett: A lightweight approach to specification and analysis of role-based acess control extensions. SACMAT 2002: 13-22

Axel Kern, Martin Kuhlmann, Andreas Schaad, Jonathan D. Moffett: Observations on the role life-cycle in the context of enterprise security management. SACMAT 2002: 43-51

Andreas Schaad: Detecting Conflicts in a Role-Based Delegation Model. ACSAC 2001: 117-126

Andreas Schaad, Jonathan Moffett: The role-based access control system of a European bank: a case study and discussion. SACMAT 2001: 3-9

 

Vanessa Barnekow, Dominik Binder, Niclas Kromrey, Pascal Munaretto, Andreas Schaad, Felix Schmieder:
Creation and Detection of German Voice Deepfakes. CoRR abs/2108.01469 (2021)

Preliminary interviews

2018, HS Offenburg Cloud Security Workshop "Software Security for Industry 4.0"

2016, Huawei Shenzhen R&D Headquarter Expert Lecture Series „Cloud Encryption"

2015, University of Bristol Workshop on „Industrial R&D in Multiparty Computation" (Prof. Smart)

2014, Swedish Institute of Computer Science „Encrypted Data Processing" (Prof. Gehrman)

2014, University of Royal Holloway „Implementing a searchable encrypted DB" (Prof. Crampton)

2014, Global SAP Security Day „Searchable Encryption in SAP HANA"

2014, Kuppinger& Cole GRC Analystenkonferenz „Searchable Encryption in SAP HANA"

 

Miscellaneous

Professional Organizations

2020 Gutachter für das BMBF: "Zivile Sicherheit"

2018 Gutachter für das BMBF: "Kritische Strukturen und Prozesse in Produktion und Logistik"

2014 - 2016 Gutachter für EU Kommission: H2020 SMEINST

2013-2015 Gutachter für EU Kommission: Projekt SYSSEC (NoE)

2014 Gutachter für das BMBF: "Zivile Sicherheit - Schutz vor organisierter Kriminalität" 2014

2013 Gutachter für das BMBF: "Zivile Sicherheit - Schutz vor Wirtschaftskriminalität" 2013

 

Expertise

2022 BMBF Gutachter "Zivile Sicherheit"

2022 35th Conference on Data and Applications Security and Privacy (DBSEC) PC Member

2021 EU Gutachter Projekt "SANCUS"

2020 Journal of Computer Security

2019 33rd Conference on Data and Applications Security and Privacy (DBSEC) PC Member

2018 ACM Asia Conference on Computer & Communications Security ASIA CCS PC Member

2018 International Conference on Security and Cryptography (SECRYPT 2018) PC Member

2018 ACM Asia Conference on Computer & Communications Security ASIA CCS PC Member

2018 Jahrestagung Gesellschaft für Informatik (GI) Sicherheit PC Member

2014 - 2017 European Symposium on Research in Computer Security (ESORICS) PC Member

2005 - 2015 ACM SACMAT (Symposium of Access Control Models and Technologies) PC Member

2005 - 2015 IFIP WG 11.3 Working Conference on Data and Applications Security PC Member

2005 - 2015 Secure Data Management (SDM), Workshop of the VLDB PC Member

2005 - 2011 IEEE Symposium on Policies for Distributed Systems and Networks PC Member

2016 International Conference on Security and Cryptography (SECRYPT 2016) PC Member

2016 2nd International Workshop on Cloud Security and Data Privacy PC Member

2016 15h International Conference on Cryptology and Network Security (CANS) PC Member

2016 11th International Workshop on Data Privacy Management (DPM) PC Member

2016 15th Workshop on Privacy in the Electronic Society (WPES) PC Member

2015 29th Conference on Data and Applications Security and Privacy (DBSEC) PC Member

2015 Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) PC Member

2015 International Conference on Security and Cryptography (SECRYPT 2015) PC Member