RESEARCH
  • Overview
  • Cryptography
  • Cyber Security Policy
  • Digital Forensics
  • Hardware Security
  • Information Assurance
  • Information Security
  • Mobile Device Security
  • SCADA Security
  • Software Security
  • System Security
  • Threat Analysis
  • Wireless & Network Security

Overview

Cyber Security Center (CSC) was established as an organizational unit of American University in Bosnia and Herzegovina (AUBiH) with the aim of developing scientific work in which is the expected step in the continuous growth and development of the Center. The CSC vision is to become, significant regional organization that joins European and American academics, scholars, and students engaged in research work and analysis, start a dialogue and publicly present their work who has a serious impact in region.

CSC researchers and scientists are applying their knowledge and skills in following areas:

  • Cryptography
  • Cyber Security Policy
  • Digital Forensics
  • Hardware Security
  • Information Assurance
  • Information Security
  • Mobile Device Security
  • SCADA Security
  • Software Security
  • System Security
  • Threat Analysis
  • Wireless & Network Security

Cryptography

The CSC researchers study the protocols, algorithms, and strategies to securely and consistently prevent or postpone unauthorized access to sensitive information; and enable verifiability of every component in a communication. Researchers and scientists also designand evaluate algorithms and secure cryptographic protocols in cooperation with standard bodies. Our team conducts cryptanalysis to assess information systems, research the hidden system parts, and assess current standards.

Cyber Security Policy

The CSC researchers are working on development of new cybersecurity policies to protect organization assets from sophisticated cyber attacks. Main focus of research is creating protective cyber security policies for securing critical infrastructure industry.

Digital Forensics

The CSC is a leader in digital forensics research and development in the region. Researchers develop advanced technologies to assist in conducting sophisticated digital investigations in cloud, data recovery, and child pornography. We cooperate closely with the government and law enforcement agencies and perform complex digital forensics investigations.

Hardware Security

The CSC researchers are developing solutions and technologies to prevent and discover Trojans and other malicious programs, including hardware obfuscation method to defend hardware intellectual property from various attacks. We also design affordable methods for preventing intellectual property violation at different phases of intellectual property life time.

Information Assurance

The CSC researches and scientist are focusing on development of new interdisciplinary methods to provide strong and trustworthy transmission of physically disseminated information.The CSC is exploring ways to provide the best information security in businesses and consultative services to maintain data integrity and assets security.

Information Security

The CSC researchers and scientists are focusing on the developments, methods, and techniques required to safeguard information from unlawful access. We also develop technologies and tools that are implemented locally to protect information without dependence on imported commercial tools as they can contain malicious codes that can access important information using backdoors.

Mobile Device Security

Our main focus of research includes developing tools to protect mobile devices, including computerized reverse engineering of malware and framework for automated discovery of malicious applications.The CSC researchers are exploring different security processes ranging from security in different layers of software to the information delivery to users.

SCADA Security

The CSC researchers study metrics and models for evaluating and controlling SCADA security, and develop innovative advanced SCADA systems with incorporated security. We also design technologies for information sharing and their implementation into specific industry. Our team is studying new intrusion detection systems to improve SCADA monitoring abilities.

Partnering with government and industry sectors,the CSC researchers are developing solutions to enhance the critical infrastructure security, including the power grid, telecommunications, refineries, and financial systems.

Software Security

The CSC software security researchers study mechanisms for improving software security and avoiding insecure behaviors. Main focus of the research is exploring security policies with main goal on providing guarantees that software performs in compliance with chosen policies and simplifying the tasks of identifying and implementing such policies.

System Security

The CSC researchers develop security mechanisms to secure systems from emerging systems security threats. Main focus of the research is developing a strict and uncompromising structure to assess security policies to improve information transmission security over the network.

Threat Analysis

The CSC researchers develop methods to perform threat analysis focusing on identifying the intrusion detection system warnings and assessingcyber attacks especially ones that are invisible to system administrators.

We compare every bit of data with current IDS signatures, past historic information, and security weaknesses. Our researchers also design technologies to perform malware and malicious software analysis, and identify vulnerabilities.

Wireless & Network Security

The CSC researchers develop technologies to protect the network performance and operations. Our current focus of wireless & network security research is designing technologies to discover and act in response to security breaches. Researchers also study secure communication networks, signal processing, algorithm and protocol development, network optimization, intrusion detection systems, and intrusion prevention systems.

We implement recognition algorithms together with network packet sniffers to discover potential prohibited movements through network or eavesdropping.