To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.

More information about cookies

Search form

Research Map in cybersecurity
Go back

GUTI - Grupo Universitario de Tecnologías de Identificación

Universidad Carlos III de Madrid
Comunidad de Madrid
Address: Avenida de la Universidad 30
Contact person
Raúl Sánchez Reillo

Investigation areas
Areas of interest Attacks and defense against threats Evaluation of systems and cyber risk Promotion and awareness of safety Identity Management Interaction with the user: usability Privacy Data processing Reliable and upgradeable systems
Lines of investigation
Adaptation of the identification process to the user Analysis of robustness against vulnerabilities in systems of biometric recognition, through the recreation of impersonation and obfuscation attacks Analysis of subject behaviour to detect abnormal situations Analysis of use of facial recognition on travel documents Anonymization of biometric data to prevent reconstruction of said data in case of robbery of the stored information (Template Protection) Application of authentication systems for the fight against networks fraud (e.g. Authentication by written signature or protection of smart card transactions) Testing laboratory audits on identification cards Co-design hardware/software for optimization of biometric information processing Development of international standards Detection of non-reliable samples in biometric recognition system Design and development of embedded systems for identification of persons Identification devices (in particular smartcards and RFID) Teaching of degree and postgraduate courses and training and outreach seminars Standardization of biometric identification systems (ISO/IEC JTC1 SC17 y SC37; CEN TC224 Evaluation of compliance with new international standards Evaluation of interoperability of identification systems Evaluation of biometric security systems Evaluation of performance in biometric data capture, both at performance and security level Evaluation and detection of attacks on identification systems, both impersonation and obfuscation Management and secure transmission of personal data R&D evaluation of interoperability of data and and identification processes between platforms Integration of biometry in smart cards and identification devices Integration of facial recognition solutions on multiple platforms Human-machine interaction in identification systems Mechanisms for identifying users of solutions and devices and traceable registration of these identifications Security and encryption mechanisms (both in public-key and in secret) Evaluation methodology for identification systems: performance, security and usability, since 2008 Mobile computing Biometric models: iris, hand geometry, vascular, signature, fingerprint, etc. Multi-biometrics: multi-mode, multi-sensor, multi-algorithm, both in fusion and complexity Active participation on national and international normalization committees relating to identification technologies: ISO/IEC JTC1 SC17 y SC37; CEN TC224; AEN CTN71 SC17, SC27 y SC37 Preservation of anonymity of data captured in biometric system evaluation processes Promotion of standards that assist interoperability between solutions and platforms Promotion of the independent evaluation of solutions and their certification E-commerce protection M-commerce protection Biometric recognition by signature and gait Biometric protection: processing, storage, communication, detection of reliable sample, etc. Close monitoring of the Data Protection Act (LOPD) both in terms of identification processes and the evaluation of biometric solutions Centralized systems and distributed systems Biometric recognition systems on mobile platforms Biometric recognition systems on mobile platforms with both live and latent sample Biometric recognition systems Smart cards Identification solutions on mobile devices, since 2009 Multi-platform identification solutions Biometric recognition solutions Usability and accessibility in identification systems Use of smart cards to preserve privacy of personal data, increasing the security of the system in the identification process Use of cards, tokens and/or biometric solutions in systems where the identification of citizens is required Use of the smart card technology and contactless interfaces for identification systems on mobiles (for example NFC)
Download file
Downloadable agent file
374.46 KB

Do you want to participate in the Network?

Join the Network of Excellence: Become part of this community of research teams to get involved in joint initiatives and projects.
Request admission