Professor
Computer Engineering Dept. & Informatics Institute
Istanbul Technical University
kemalbicakci(at)itu.edu.tr
Kemal Bıçakcı currently serves as the (Founding) Head of Cybersecurity Vocational School of Istanbul Technical University. He is a full professor at Computer Engineering Department and in Informatics Institute at Istanbul Technical University, Istanbul, Turkey. He is also the co-founder of Securify, a scale-up company founded in 2016, working on cyber security technologies and focused on behavioral biometrics.
He has been teaching graduate and undergraduate level courses in Information Security, Cryptography, Computer Networks and other topics for more than 20 years. He has obtained his PhD degree from Middle East Technical University, Ankara, Turkey in 2003. Between 2004 and 2006, he was a postdoc researcher in Vrije Universiteit Amsterdam working with Prof. Tanenbaum in EU FP6 project named SecurE-Justice. His previous research experience includes several NSF funded security projects in which he participated as a research assistant during his MS studies in University of Southern California, Los Angeles, USA. He has directed / has been directing more than 10 research projects on security funded by Turkish Scientific and Technological Research Institute (TUBITAK).
Beginning with a BS graduation project in Hacettepe University, Dr. Bicakci now has almost 30 years research experience on security and related topics. His current research interests include generative AI, information security, applied cryptography and usability. He has co-authored 20+ international journal and 30+ conference papers. His papers are highly cited (h-index: 25, 8/20/2024, Google Scholar). He is the associate editor of ITU Journal of Wireless Communications and Cybersecurity. He serves in the Editorial Board of Computer Standards and Interfaces (Elsevier) journal.
About
Click here to see my short CV
I have also a longer CV
Recent Publications
- ROSTAM: A passwordless web single sign-on solution mitigating server breaches and integrating credential manager and federated identity systems - A Mahnamfar, K Bicakci, Y Uzunay, Computers & Security 139, 107339, 2024
- QRAuth: A Secure and Accessible Web Authentication Alternative to FIDO2 - K Bıçakcı, A Drobi, 2023
- Optimal data backup policies for information systems subject to sudden failure - S Tekin, K Bicakci, O Mersin, GN Erdem, A Çanbay, Y Uzunay, Journal of Quality in Maintenance Engineering 29 (2), 338-355, 2023
- Authentication-enabled attribute-based access control for smart homes - M Burak Bilgen, O Abul, K Bicakci, International Journal of Information Security 22 (2), 479-495, 2023
- KAIMe: Central bank digital currency with realistic and modular privacy - A Dogan, K Bicakci, Cryptology ePrint Archive, 2023
- Is FIDO2 passwordless authentication a hype or for real?: A position paper - K Bicakci, K Uzunay, 2022
- Should Users Trust Their Android Devices? A Scoring System for Assessing Security and Privacy Risks of Pre-Installed Applications - A Ozbay, K Bicakci, arXiv preprint arXiv:2203.10583, 2022
- Android Pre-installed Applications Effects On User's Privacy - A Ozbay, K Bicakci, 2021
- Towards zero trust: the design and implementation of a secure end-point device for remote working - K Bicakci, Y Uzunay, M Khan, 2021
- Exploring and Improving the Usability of ModSecurity Web Application Firewall - M Alagoz, MS Tok, K Bicakci, 2021
- Method for secure connection - M Gözüküçük, O Serfelisan, K Bıçakcı, US Patent 11,159,320, 2021
- Quantum-Resistance Meets White-Box Cryptography: How to Implement Hash-Based Signatures Against White-Box Attackers? - K Bicakci, K Ülker, Y Uzunay, HT Şahin, MS Gündoğan, Cryptology ePrint Archive, 2021
- Android On yüklü Uygulamaların Kullanıcı Mahremiyetine Etkileri - A Ozbay, K Bicakci, 2021
Videos
Cybersecurity Vocational SchoolCourses
Current Courses
BGK 503E – Information and Computer Security: Basic concepts and principles, Cryptographic building blocks, User authentication, Authentication protocols and key establishment, Operating systems security and access control, Software security – Exploits and Privilege Escalation, Malicious software, Public-key certificate management and use cases, Web and browser security, Firewalls and tunnels, Intrusion detection and Network-based attacks.
BGK 601E – Machine Learning Methods in Security: Why machine learning (ML) in security?, Introduction to ML, ML in practice: A worked example, Classifying and clustering, Anomaly detection, Security applications of ML, ML for security in practice, Adversarial machine learning, lab sessions, paper discussions, project presentations.