Honorary Professor
University of Bremen, Department 03
Department of Cyber-Physical Systems
www.dfki.de/web/forschung/forschungsbereiche/cyber-physical-systems
- Verifiable security
- Formal security policies and security protocols
- Logic and verification methods
- Model checking, automatic proof, SMT, and other optimization techniques
- Security of AI systems, hybrid (“fast and slow”) AI approaches
- Security and privacy (i.e., confidentiality of individual IP) in the (logistical) interaction of independent actors
- Cryptographic multi-party protocols
- Secure IoT applications
- Logistics applications, e.g., in ports or space
- Security of autonomous AI-based applications
- Modeling formal security policies and selecting suitable security mechanisms to enforce the chosen policy
- Security and privacy for data science applications
- Autonomous secure AI applications
Prof. Dr. Dieter Hutter
German Research Center for Artificial Intelligence GmbH (DFKI)
Dieter Hutter studied computer science at what was then the University of Karlsruhe (now KIT). One focus of his studies was his work in the Collaborative Research Center 314 “Artificial Intelligence, Knowledge-Based Systems,” initially as a student assistant and, after graduating, with a doctorate on the automation of mathematical induction proofs. In 1993, he moved to the German Research Center for Artificial Intelligence in Saarbrücken, where he led numerous projects in the field of formal program verification and change management of formal developments. In 2006, he moved to the DFKI's new location in Bremen. Today, he is deputy head of the Cyber-Physical Systems department at DFKI Bremen and honorary professor at the University of Bremen. His current research focuses on the formal specification and verification of security and data protection requirements. In recent years, he has been particularly interested in logistical applications involving multiple actors with different interests but also common goals. Typical examples are supply chains that require both the integrity of the transmitted data and the traceability of the actors involved. Coopetition, i.e., cooperation between competitors, increases the need for formal and cryptographic mechanisms to identify and control the flow of information between the actors.