Skip to main content

Department of Computer Science

20151020_fbinf_kw_potrait_ullmann_markus_002.png (DE)

Prof Markus Ullmann

Honorary Professor for Information Security /Head of Unit Evaluation Procedures for eID Technologies at the BSI


Department of Computer Science, Institute of Safety and Security Research (ISF)

Research fields

  • Biometrische Identifikationsverfahren
  • Template Protection Verfahren
  • Physical Fingerprinting drahtloser Transceiver
  • Sensor-Spoofing


Sankt Augustin


Heinemannstr. 11

53133, Bonn


022899 9582-5268

Research Projects

Biolab - Evaluation of biometric verification systems

The Biolab project is dedicated to the continuous and comprehensive evaluation of biometric systems. The project investigates the performance, security and usability aspects of biometric systems. The results lead to training courses and workshops for authorities, police forces, manufacturers and end users. The Biometrics Evaluation Center (BEZ) at the Sankt Augustin campus is the place of implementation.

Project management at the H-BRS

Prof. Dr Norbert Jung Prof. Dr Robert Lange
Secure 3D-Fingerprint capture by means of OCT-Scanners ("3D-Finger")

The fingerprint in the passport or the identification at the entrance, for example in security zones of buildings, since long have become the target of criminals - the aim is to pretend a false identity or to conceal one's own identity: Evidence includes skin transplants, stickers with the imprint of other persons or the removal of the visible lines of the skin relief. Advanced methods are therefore needed to identify people quickly and reliably. The optical coherence tomography (OCT) method, which originated in medicine, promises greater reliability: In the "3D Finger" project, it is to be used in a new type of OCT fingerprint scanner. This opto-electronic process provides additional biometric information for the secure identification of a person and reliably prevents attempts to fool the system. This is made possible by being able to image much finer structures located deeper in the skin. If the system is suitably designed, sweat glands, for example, are imaged, but also whether the structure of the superimposed skin layers - epidermis, dermis and subcutis - match. This is like a second, "internal" fingerprint. Even blood flow can potentially be included to detect fakes with foreign fingerprints on dead carrier material. With the BMBF-funded project "3D-Finger", the Institute for Safety and Security Research (ISF) at the Bonn-Rhein-Sieg University of Applied Sciences aims to achieve automatic evaluation of these biometric features in the registration and authentication of persons. The aim is to improve access controls for critical infrastructure, airports, when crossing borders or at major events by means of automatic access control systems in such a way that even the rush of large crowds can be handled sufficiently quickly and secured against so called "spoofing attacks" - formally specified as Presentatation Attacks according to ISO/IEC 30107.




  • M. Ullmann, and R. Breithaupt, Hands-on Smart Card User Interface Research, Development, and Testing, in International Journal on Advances in Software, 2015 vol. 8 nr. 1&2, pages 65-74
  • M. Ullmann, C. Wieschebrink, and D. Kügler, Public Key Infrastructure and Crypto Agility Concept for Intelligent Transport Systems, in Proceedings VEHICULAR 2015: The Fourth International Conference on Advances in Vehicular Systems, Technologies and Applications, pages 14-19, 2015
  • M. Reuter, D. Loevenich, M. Ullmann, Software-Whitelisting mit Microsoft AppLocker, in Proceedings DACH Security 2015, Seiten 200 – 211
  • T. Bötner, H. Pohl, M. Ullmann, Sicherheitsanforderung an Messenger Apps, in Proceedings Dach Security 2015, Seiten 241-252
  • M. Schneck, M. Ullmann, K. Lemke-Rust, Aktuelle Probleme und Potentiale von Web-App Scannern, in Proceedings DACH Security 2015, Seiten 323 – 332
  • J. Samotyja, K. Lemke-Rust, and M. Ullmann,  SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node,  Cryptology ePrint Archive, Report 2015/354


  • M. Ullmann, T. Strubbe, C. Wieschebrink, and D. Kügler, Secure Vehicle-to-Infrastructure Communication: Secure Roadside Stations, Key Management, and Crypto Agility, International Journal On Advances in Security, vol 9 no 1&2, pages 80-89, 2016
  • M. Neu, U. Korte, and M. Ullmann, Improvement of Fuzzy Vault for Multiple Fingerprints with Angles, in Proceedings of the 15. IEEE International Conference of the Biometric Special Interest Group (BIOSIG 2016), pages 233 - 240
  • M. Ullmann, T. Strubbe, and C. Wieschebrink, Technical Limitations and Privacy Shortcomings of the Vehicle-to-Vehicle Communication, in Proceedings VEHICULAR 2016: The Fifth International Conference on Advances in Vehicular Systems, Technologies and Applications,  Barcelona November 2016
  • M. Ullmann, T. Strubbe, and C. Wieschebrink, V2V Communication - Keeping You Under Non-Disputable Surveillance, Proceedings of the IEEE Vehicular Networking Conference (VNC), Ohio December 2016


  • Michael Kiometzis, Markus Ullmann, Fahrdaten für alle? Car-2-Car Kommunikation und die Folgen, Datenschutz und Datensicherheit (DuD), Ausgabe 4/2017
  • Markus Ullmann, and Thomas Strubbe, and Christian Wieschebrink, Misuse Capabilities of the V2V Communication to Harm the Privacy of Vehicles and Drivers, International Journal On Advances in Networks and Services, vol 10 no 1&2, 2017,
  • Sandro Berndt, Lutz Rittershaus, Carsten Kühnel, Thomas, Strubbe, Nicolas Thenée, Markus Ullmann, Christian Wieschebrink, Hans-Peter Wagner, Sichere Vehicle-2-X Kommunikation ins Europa, Tagungsband zum 15. Deutschen Sicherheitskongress 2017, Seiten 159 - 172
  • Markus Ullmann, Tobias Franz, and Gerd Nolden, Vehicle Identification Based on Secondary Vehicle Identifier - Analysis, and Measurements -, Proceedings VEHICULAR 2017: The Sixth International Conference on Advances in Vehicular Systems, Technologies and Applications, 2017




Further Information

1. Lehrveranstaltungen

  • Identitätsmanagement und PKI (zusammen mit Prof. Dr. Lo Iacono) [Bachelor]
  • Seminar Informationssicherheit [Bachelor]
  • Identification and Privacy Enhanced Technologies (PETs) [Master]


2. Themenbereiche für Projektarbeiten (Bachelor-Projekt, Master-Projekt) und Abschlussarbeiten (Bachelorarbeit, Masterarbeit)

  • Biometrische Authentisierungsverfahren
  • Channel State Information (CSI)
    • Konzeption und Entwicklung von Prototypen zur Erfassung von CSI drahtloser Kommunikationstechnologien
    • Entwicklung und Analyse von Auswerteverfahren  von CSI-Daten zur Bewegungsdetektion, ..., Prüfung der Raumauthentizität
  • Physical Fingerprinting drahtloser Transceiver mittels SDR
    • IEEE 802.11 p
    • Bluetooth
    • ...
  • Automotive Security (Automatisiertes Fahren)
    • Sensor-Spoofing
      • Kamera
      • Lidar
      • Radar
  • Analyse spezieller Sicherheitstechnologien (z.B. Containervirtualisierung)
  • Konzeption und Entwicklung sichere IoT-Anwendungen im Weinbau in Zusammenarbeit mit der Vinophorie GbR
    • Datenerfassung, -speicherung und -auswertung für Use-Cases im Weinberg und im Weinkeller (Gärprozess)

3. Betreuung externer Abschlussarbeiten

  • Auf Anfrage