IBR Login
- Institute of Operating Systems and Computer Networks
- News
- About us
- Connected and Mobile Systems
- Distributed Systems
- Algorithms
- Microprocessor Lab
- Education
- Services
- Spin-Offs
- Research Cooperations
I am one of the Co-Founders of heylogin GmbH and currently serving as the CEO.
heylogin is a login solution for companies. It reduces costs and improves company processes.
- Time and cost savings for employee logins
- Shorter employee onboarding and offboarding times
- More security and control over your business logins
My research interests focus on these topics:
- Contextual Security for Device-to-Device Pairings based on Human Gait, Ambient Audio
- End-to-End Encrypted Communication: API for NFC Cryptography, ZRTP Analysis, Usability of Key-Fingerprints
- Security in Delay-Tolerant Networks: Forward Secure DTNs, µDTNSec, RAIM: Redundant Array of Motes
- Trustworthy Transportation Systems: Cooperative Charging, Trustworthy Parking Communities
My research and development is influenced by my moral beliefs. They are based on the "Cypherpunk's Manifesto" (Eric Hughes, 1993) and modern critiques of our research field, such as "The Moral Character of Cryptographic Work" (Phillip Rogaway, 2015):
"Cryptography rearranges power: it configures who can do what, from what. This makes cryptography an inherently political tool, and it confers on the field an intrinsically moral dimension. The Snowden revelations motivate a reassessment of the political and moral positioning of cryptography. They lead one to ask if our inability to effectively address mass surveillance constitutes a failure of our field. I believe that it does. I call for a community-wide effort to develop more effective means to resist mass surveillance. I plead for a reinvention of our disciplinary culture to attend not only to puzzles and math, but, also, to the societal implications of our work."
My thesis is an article thesis, not a traditional monograph, i.e., it is a collection of selected research papers with an introductory section consisting of summary chapters.
- Dominik Schürmann: Establishing Trust in Heterogeneous Networks, Kumulative Dissertation, Technische Universität Carolo-Wilhelmina zu Braunschweig, April 2018
- Arne Brüsch, Ngu Nguyen, Dominik Schürmann, Stephan Sigg and Lars Wolf: Security Properties of Gait for Mobile Device Pairing, in IEEE Transactions on Mobile Computing, Vol. 19, No. 3, pages 697-710, March 2020 (schuermann:tmc:2019, DOI, BibTeX)
- Dominik Schürmann, Georg von Zengen, Marvin Priedigkeit and Lars Wolf: uDTNSec: A security layer with lightweight certificates for Disruption-Tolerant Networks on microcontrollers, in Annals of Telecommunications, Vol. 73, No. 9, pages 589-600, October 2018 (schuermann:annals-of-telecommunications:2018, DOI, BibTeX)
- Dominik Schürmann, Arne Brüsch, Ngu Nguyen, Stephan Sigg and Lars Wolf: Moves like Jagger: Exploiting variations in instantaneous gait for spontaneous device pairing, in Pervasive and Mobile Computing, Vol. 47, pages 1 - 12, April 2018 (schuermann:pmc:2018, DOI, BibTeX)
- Ngu Nguyen, Caglar Yuce Kaya, Dominik Schürmann, Arne Brüsch, Stephan Sigg and Lars Wolf: Demo of BANDANA - Body Area Network Device-to-device Authentication Using Natural gAit, March 2018 (schuermann:percomdemo:2018, BibTeX, Poster, Accepted for publication at: IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops))
- Signe Rüsch, Dominik Schürmann, Rüdiger Kapitza and Lars Wolf: Forward Secure Delay-Tolerant Networking, in Proceedings of the 12th Workshop on Challenged Networks, CHANTS '17, Snowbird, Utah, USA, pages 7-12, ACM, October 2017 (ruesch:chants:2017, DOI, BibTeX, Slides)
- Dominik Schürmann, Sergej Dechand and Lars Wolf: OpenKeychain: An Architecture for Cryptography with Smart Cards and NFC Rings on Android, in Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., Vol. 1, No. 3, New York, NY, USA, pages 99:1-99:24, ACM, September 2017 (schuermann:imwut:2017, DOI, BibTeX, Slides)
- Dominik Schürmann, Fabian Kabus, Gregor Hildermeier and Lars Wolf: Wiretapping End-to-End Encrypted VoIP Calls: Real-World Attacks on ZRTP, in Proceedings on Privacy Enhancing Technologies, Vol. 2017, No. 3, pages 4-20, July 2017 (schuermann:popets:2017, DOI, BibTeX, Slides)
- Dominik Schürmann, Georg von Zengen, Marvin Priedigkeit and Lars Wolf: uDTNSec: A Security Layer for Disruption-Tolerant Networks on Microcontrollers, in Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), pages 1-7, June 2017 (schuermann:medhocnet:2017, BibTeX, Slides)
- Dominik Schürmann, Julian Timpner and Lars Wolf: Cooperative Charging in Residential Areas, in IEEE Transactions on Intelligent Transportation Systems, Vol. 18, No. 4, pages 834-846, IEEE Comput. Soc, April 2017 (schuermann:tits:2016, DOI, BibTeX)
- Dominik Schürmann, Felix Büsching, Sebastian Willenborg and Lars C Wolf: RAIM: Redundant Array of Independent Motes, in International Conference on Networked Systems (NetSys), Göttingen, Germany, pages 1-8, March 2017 (schuermann:RAIM:2017, DOI, BibTeX, Slides)
- Dominik Schürmann, Arne Brüsch, Stephan Sigg and Lars Wolf: BANDANA - Body Area Network Device-to-device Authentication using Natural gAit, in IEEE International Conference on Pervasive Computing and Communications (PerCom), pages 190-196, March 2017 (schuermann:percom:2017, DOI, BibTeX, Slides)
- Dominik Schürmann: Establishing Trust in Heterogeneous Networks, in IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pages 107-108, March 2017 (schuermann:phdforum:2017, DOI, BibTeX)
- Sergej Dechand, Dominik Schürmann, Karoline Busse, Yasemin Acar, Sascha Fahl and Matthew Smith: An Empirical Study of Textual Key-Fingerprint Representations, in 25th USENIX Security Symposium (USENIX Security 16), Austin, TX, pages 193-208, USENIX Association, August 2016 (schuermann:usenixsecurity:2016, BibTeX)
- Dominik Schürmann and Lars Wolf: Surreptitious Sharing on Android, in Sicherheit 2016, Lecture Notes in Informatics, Bonn, Germany, pages 137-148, Gesellschaft für Informatik, April 2016 (schuermann:sicherheit:2016, BibTeX)
- Julian Timpner, Dominik Schürmann and Lars Wolf: Trustworthy Parking Communities: Helping Your Neighbor to Find a Space, in IEEE Transactions on Dependable and Secure Computing, Vol. 13, No. 1, pages 120-132, IEEE Comput. Soc, 2016 (Timpner:TDSC:2016, DOI, BibTeX)
- Sergej Dechand, Dominik Schürmann, Jürgen Koslowski and Matthew Smith: Poster: CryptoCall: Simple End-to-End Cryptography for Voice Calls on Android, in Network and Distributed System Security Symposium (NDSS), February 2014 (schuermann:ndss:2014, BibTeX)
- Julian Timpner, Dominik Schürmann and Lars Wolf: Secure Smartphone-based Registration and Key Deployment for Vehicle-to-Cloud Communications, in Proceedings of the ACM CCS Workshop on Security, Privacy and Dependability for Cyber Vehicles (CyCAR '13), Berlin, Germany, pages 31-36, ACM Press, November 2013 (Timpner:CyCAR:2013, DOI, BibTeX, Slides)
- Dominik Schürmann and Stephan Sigg: Poster: Handsfree ZRTP - A Novel Key Agreement for RTP, Protected by Voice Commitments, in Symposium On Usable Privacy and Security (SOUPS), July 2013 (schuermann:soups:2013, BibTeX, Poster)
- Dominik Schürmann, Jörg Ott and Lars Wolf: Authenticated Resource Management in Delay-Tolerant Networks using Proxy Signatures, in 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Banff, Alberta, Canada, pages 44-51, March 2013 (schuermann:wons:2013, DOI, BibTeX, Slides)
- Felix Büsching, Andreas Figur, Dominik Schürmann and Lars Wolf: Poster: Utilizing Hardware AES Encryption for WSNs, in Proceedings of the 10th European Conference on Wireless Sensor Networks, EWSN 2013, Ghent, Belgium, pages 33-36, February 2013 (Buesching:EWSN2013, BibTeX, Slides, Poster)
- Dominik Schürmann and Stephan Sigg: Secure Communication Based on Ambient Audio, in IEEE Transactions on Mobile Computing (TMC), Vol. 12, No. 2, pages 358-370, February 2013 (schuermann:tmc:2013, DOI, BibTeX)
- Stephan Sigg, Dominik Schürmann and Yusheng Ji: PINtext: A Framework for Secure Communication Based on Context, in Mobile and Ubiquitous Systems: Computing, Networking, and Services, Puiatti, Alessandro and Gu, Tao, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 314-325, Springer Berlin Heidelberg, December 2011 (schuermann:mobiquitous:2011, DOI, BibTeX, Slides)
Finished Student Theses:
Title | Type | Supervisor | Status |
---|---|---|---|
Arbiter-based Device Pairing Using Unidirectional Out-of-Band Channels | Bachelor Thesis | Prof. Dr. Felix Büsching, Dr. Dominik Schürmann | finished |
Design, Implementierung und Evaluation eines sicheren verteilten Datenspeichers für drahtlose Sensornetze | Master Thesis | Prof. Dr. Felix Büsching, Dr. Dominik Schürmann | finished |
Implementation of BANDANA on Android | Project Thesis | Dr. Dominik Schürmann | finished |
Memory-Safe Implementation and Timing Analysis of a Microcontroller-based CTAP2 Authenticator | Master Thesis | Dr. Dominik Schürmann | finished |
DHCP Vulnerabilities | Project Thesis | Dr. Dominik Schürmann | finished |
Implementation of Forward Security for Delay-Tolerant Networks | Project Thesis | Dr. Dominik Schürmann | finished |
Implementation and Evaluation of Identity-Based Cryptography for Delay-Tolerant Networks, ... | Master Thesis, Project Thesis | Dr. Dominik Schürmann | finished |
Development of a X.509-based Public-Key Infrastructure for Delay-Tolerant Networks, ... | Bachelor Thesis | Dr. Dominik Schürmann | finished |
Hardware Security Key for the Matrix Protocol | Master Thesis | Dr. Dominik Schürmann | finished |
Security Evaluation of Cryptographic Schemes in OpenPGP, ... | Master Thesis, Project Thesis | Dr. Dominik Schürmann, Dr. Jürgen Koslowski | finished |
Complementing the Web of Trust with Affirmations, ... | Master Thesis | Dr. Dominik Schürmann | finished |
NFC-Based Communication between Hardware Security Modules and Smartphones, ... | Bachelor Thesis | Dr. Dominik Schürmann | finished |
Development of an On-Screen Keyboard for Automatic Encryption and Decryption on Android, ... | Bachelor Thesis | Dr. Dominik Schürmann | finished |
On Quantization Schemes And Security Aspects For Biometrical Key Generation | Master Thesis | Dr. Dominik Schürmann | finished |
Teamprojekt: International Cyber Security Contests, ... | Dr. Dominik Schürmann | finished | |
Implementing a Man-in-the-middle attack on a VoIP Session, ... | Project Thesis | Dr. Dominik Schürmann | finished |
Evaluation of Attacks against ZRTP | Bachelor Thesis | Dr. Dominik Schürmann | finished |
Cooperative Usage of Charging Stations for Autonomous Vehicles, ... | Master Thesis | Dr. Julian Timpner, Dr. Dominik Schürmann | finished |
Evaluation of Security Mechanisms in Wireless Sensor Networks based on the Bundle Protocol, ... | Bachelor Thesis | Dr. Georg von Zengen, Dr. Dominik Schürmann, Prof. Dr. Felix Büsching | finished |
last changed 2021-12-07, 16:46 (dynamic content), maintained by Dominik Schürmann