Home
Team
Staff Overview
Alumni
Research Alumni
Student Alumni
Teaching
Overview
Thesis Topics
Thesis Process
PhD Process
Available Theses
Ongoing Theses
Past Theses
Past PhD Theses
Permanent Services
Thesis Examiner
Oral Exams
Courses
Current Courses
Upcoming Courses
Past Courses
Exchange Student Advisory Service
News & Overview
Incomings
Miscellaneous
Internet4Kids
Research
Vision
Openings
Theses
HiWi Calls
PhD and PostDoc Positions
Research @ COMSYS
Publications
Projects
Past Projects
Research Groups
Cyber-Physical Systems
Network Architectures
Security and Privacy
Systems Analysis
Research Overview
Future Power Grids
Industrial Internet of Things
Internet Measurements
Medical Data (Privacy)
Contact
Light
Dark
Automatic
Home
Publication_types
Paper-Conference
Paper-Conference
The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures
Jens Hiller
,
Johanna Amann
,
Oliver Hohlfeld
PDF
Cite
DOI
GitHub
TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting
Website fingerprinting (WFP) aims to infer information about the content of encrypted and anonymized connections by observing patterns …
Wladimir De La Cadena
,
Asya Mitseva
,
Jens Hiller
,
Jan Pennekamp
,
Sebastian Reuter
,
Julian Filter
,
Thomas Engel
,
Klaus Wehrle
,
Andriy Panchenko
PDF
Cite
DOI
GitHub
Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments
Due to increasing digitalization, formerly isolated industrial networks, e.g., for factory and process automation, move closer and …
Markus Dahlmanns
,
Johannes Lohmöller
,
Ina Berenice Fink
,
Jan Pennekamp
,
Klaus Wehrle
,
Martin Henze
PDF
Cite
DOI
GitHub
GitHub
arXiv
Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services
Distributed anonymity services, such as onion routing networks or cryptocurrency tumblers, promise privacy protection without trusted …
Roman Matzutt
,
Jan Pennekamp
,
Erik Buchholz
,
Klaus Wehrle
PDF
Cite
DOI
GitHub
arXiv
Improving MAC Protocols for Wireless Industrial Networks via Packet Prioritization and Cooperation
Jörg Christian Kirchhof
,
Martin Serror
,
René Glebke
,
Klaus Wehrle
PDF
Cite
DOI
Secure End-to-End Sensing in Supply Chains
Trust along digitalized supply chains is challenged by the aspect that monitoring equipment may not be trustworthy or unreliable as …
Jan Pennekamp
,
Fritz Alder
,
Roman Matzutt
,
Jan Tobias Mühlberg
,
Frank Piessens
,
Klaus Wehrle
PDF
Cite
DOI
Symbolic Partial-Order Execution for Testing Multi-Threaded Programs
Daniel Schemmel
,
Julian Büning
,
César Rodríguez
,
David Laprell
,
Klaus Wehrle
PDF
Cite
DOI
Extended Version (arXiv)
How to Securely Prune Bitcoin’s Blockchain
Bitcoin was the first successful decentralized cryptocurrency and remains the most popular of its kind to this day. Despite the …
Roman Matzutt
,
Benedikt Kalde
,
Jan Pennekamp
,
Arthur Drichel
,
Martin Henze
,
Klaus Wehrle
PDF
Cite
GitHub
coinprune.comsys.rwth-aachen.de
arXiv
Private Multi-Hop Accountability for Supply Chains
Today’s supply chains are becoming increasingly flexible in nature. While adaptability is vastly increased, these more dynamic …
Jan Pennekamp
,
Lennart Bader
,
Roman Matzutt
,
Philipp Niemietz
,
Daniel Trauth
,
Martin Henze
,
Thomas Bergs
,
Klaus Wehrle
PDF
Cite
DOI
GitHub
QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation
Martin Serror
,
Eric Wagner
,
René Glebke
,
Klaus Wehrle
PDF
Cite
IEEE Xplore
1
...
11
12
13
...
48
Cite
×