Mattis van 't Schip

Picture of Mattis.

Ph.D. Researcher @ Radboud University

Research Interests

    European Law / Cybersecurity Law / Law & Technology / Science & Technology Studies

Recent research

See all research
  • The Cyber Resilience Act and Open-Source Software: A Fine Balancing Act
    Mattis van 't Schip
    In
    JIPITEC

    Open-source software, a type of software that can be publicly accessed, shared, and modified, is an integral part of modern digital infrastructure. Many products, from personal computers to internet-connected devices, run on open-source systems (e.g., Linux). Developers may work voluntarily or for limited compensation on such software. The character of this work, however, does not reduce the impact of cybersecurity incidents within these environments. Proprietary software, meaning software with restrictive license models, regularly implements open-source software: a vulnerability in the open-source software thus directly affects proprietary software too. Recent large-scale vulnerabilities (e.g., Log4j) highlighted this dual nature of open-source software: developers work on projects based on personal passion or ideologies, while the software is often equally as critical as software created and maintained by larger technology enterprises. The Cyber Resilience Act, the recently proposed European cybersecurity legislation for products, aims to offer a legal response to cybersecurity problems in modern software and hardware. This paper addresses the role of open-source software cybersecurity in the Cyber Resilience Act with specific attention to the difficulties of reconciling cybersecurity responsibilities and open-source products. I show that the Cyber Resilience Act does achieve a balance between regulation for open-source software and advancing cybersecurity, but only through a narrowly applicable and, at times, complex legislative approach.

  • The Regulation of Supply Chain Cybersecurity in the NIS2 Directive in the Context of the Internet of Things
    Mattis van 't Schip
    In
    European Journal of Law & Technology

    An increasing number of actors design, develop and produce modern ICT products in a collaborative network: a supply chain. From a cybersecurity perspective, each actor brings new vulnerabilities for the entire chain and, in turn, the ICT product created by the chain. This problem should be addressed by supply chain cybersecurity, a type of cybersecurity policy that aims to prevent disruption of a supply chain’s digital assets by internal or external actors. The EU Network and Information Systems (NIS2) Directive, which was adopted in 2023, introduces rules on supply chain cybersecurity for the network and information systems (e.g., Internet of Things devices) of entities in critical sectors (e.g., energy providers, hospitals). This article shows that the NIS2 Directive aligns closely with established risk management guidelines. Thus, the Directive, at first glance, offers a proper response to supply chain cybersecurity problems. However, the supply chain cybersecurity provisions are a missed opportunity: the provisions build on a flawed and limited understanding of the intricacies of supply chain cybersecurity in practice.

  • Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally Responsible
    Lorenz Kustosch, Carlos Gañán, Mattis van ’t Schip, Michel van Eeten, Simon Parkin
    In
    32nd USENIX Security Symposium

    With continued cases of security and privacy incidents with consumer Internet-of-Things (IoT) devices comes the need to identify which actors are in the best place to respond. Previous literature studied expectations of consumers regarding how security and privacy should be implemented and who should take on preventive efforts. But how do such normative consumer expectations differ from what is actually realistic, or reasonable to expect how security and privacy-related events will be handled? Using a vignette survey with 862 participants, we studied consumer expectations on how IoT manufacturers and users would and should respond when confronted with a potentially infected or privacy-invading IoT device. We find that expectations differ considerably between what is realistic and what is appropriate. Furthermore, security and privacy lead to different expectations around users’ and manufacturers’ actions, with a general diffusion of expectations on how to handle privacy-related events. We offer recommendations to IoT manufacturers and regulators on how to support users in addressing security and privacy issues.

News