% % This file was created by the TYPO3 extension % bib % --- Timezone: CEST % Creation date: 2024-04-24 % Creation time: 04-32-53 % --- Number of references % 75 % @Incollection { 2023_pennekamp_crd-a.i, title = {Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead}, year = {2023}, month = {2}, day = {8}, pages = {35-60}, abstract = {The Internet of Production (IoP) leverages concepts such as digital shadows, data lakes, and a World Wide Lab (WWL) to advance today’s production. Consequently, it requires a technical infrastructure that can support the agile deployment of these concepts and corresponding high-level applications, which, e.g., demand the processing of massive data in motion and at rest. As such, key research aspects are the support for low-latency control loops, concepts on scalable data stream processing, deployable information security, and semantically rich and efficient long-term storage. In particular, such an infrastructure cannot continue to be limited to machines and sensors, but additionally needs to encompass networked environments: production cells, edge computing, and location-independent cloud infrastructures. Finally, in light of the envisioned WWL, i.e., the interconnection of production sites, the technical infrastructure must be advanced to support secure and privacy-preserving industrial collaboration. To evolve today’s production sites and lay the infrastructural foundation for the IoP, we identify five broad streams of research: (1) adapting data and stream processing to heterogeneous data from distributed sources, (2) ensuring data interoperability between systems and production sites, (3) exchanging and sharing data with different stakeholders, (4) network security approaches addressing the risks of increasing interconnectivity, and (5) security architectures to enable secure and privacy-preserving industrial collaboration. With our research, we evolve the underlying infrastructure from isolated, sparsely networked production sites toward an architecture that supports high-level applications and sophisticated digital shadows while facilitating the transition toward a WWL.}, keywords = {Cyber-physical production systems; Data streams; Industrial data processing; Industrial network security; Industrial data security; Secure industrial collaboration}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-iop-a.i.pdf}, publisher = {Springer}, series = {Interdisciplinary Excellence Accelerator Series}, booktitle = {Internet of Production: Fundamentals, Applications and Proceedings}, ISBN = {978-3-031-44496-8}, DOI = {10.1007/978-3-031-44497-5_2}, reviewed = {1}, author = {Pennekamp, Jan and Belova, Anastasiia and Bergs, Thomas and Bodenbenner, Matthias and B{\"u}hrig-Polaczek, Andreas and Dahlmanns, Markus and Kunze, Ike and Kr{\"o}ger, Moritz and Geisler, Sandra and Henze, Martin and L{\"u}tticke, Daniel and Montavon, Benjamin and Niemietz, Philipp and Ortjohann, Lucia and Rudack, Maximilian and Schmitt, Robert H. and Vroomen, Uwe and Wehrle, Klaus and Zeng, Michael} } @Inproceedings { 2022_pennekamp_cumul, title = {CUMUL \& Co: High-Impact Artifacts for Website Fingerprinting Research}, year = {2022}, month = {12}, day = {8}, number = {RWTH-2022-10811}, abstract = {Anonymous communication on the Internet is about hiding the relationship between communicating parties. At NDSS '16, we presented a new website fingerprinting approach, CUMUL, that utilizes novel features and a simple yet powerful algorithm to attack anonymization networks such as Tor. Based on pattern observation of data flows, this attack aims at identifying the content of encrypted and anonymized connections. Apart from the feature generation and the used classifier, we also provided a large dataset to the research community to study the attack at Internet scale. In this paper, we emphasize the impact of our artifacts by analyzing publications referring to our work with respect to the dataset, feature extraction method, and source code of the implementation. Based on this data, we draw conclusions about the impact of our artifacts on the research field and discuss their influence on related cybersecurity topics. Overall, from 393 unique citations, we discover more than 130 academic references that utilize our artifacts, 61 among them are highly influential (according to SemanticScholar), and at least 35 are from top-ranked security venues. This data underlines the significant relevance and impact of our work as well as of our artifacts in the community and beyond.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-pennekamp-cumul-artifacts.pdf}, web_url = {https://www.acsac.org/2022/program/artifacts_competition/}, publisher = {ACSA}, booktitle = {Cybersecurity Artifacts Competition and Impact Award at 38th Annual Computer Security Applications Conference (ACSAC '22), December 5-9, 2022, Austin, TX, USA}, event_place = {Austin, TX, USA}, event_name = {38th Annual Computer Security Applications Conference (ACSAC '22)}, event_date = {December 5-9, 2022}, DOI = {10.18154/RWTH-2022-10811}, reviewed = {1}, author = {Pennekamp, Jan and Henze, Martin and Zinnen, Andreas and Lanze, Fabian and Wehrle, Klaus and Panchenko, Andriy} } @Article { 2022-henze-tii-prada, title = {Complying with Data Handling Requirements in Cloud Storage Systems}, journal = {IEEE Transactions on Cloud Computing}, year = {2022}, month = {9}, volume = {10}, number = {3}, pages = {1661-1674}, abstract = {In past years, cloud storage systems saw an enormous rise in usage. However, despite their popularity and importance as underlying infrastructure for more complex cloud services, today’s cloud storage systems do not account for compliance with regulatory, organizational, or contractual data handling requirements by design. Since legislation increasingly responds to rising data protection and privacy concerns, complying with data handling requirements becomes a crucial property for cloud storage systems. We present Prada , a practical approach to account for compliance with data handling requirements in key-value based cloud storage systems. To achieve this goal, Prada introduces a transparent data handling layer, which empowers clients to request specific data handling requirements and enables operators of cloud storage systems to comply with them. We implement Prada on top of the distributed database Cassandra and show in our evaluation that complying with data handling requirements in cloud storage systems is practical in real-world cloud deployments as used for microblogging, data sharing in the Internet of Things, and distributed email storage.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-henze-tii-prada.pdf}, misc2 = {Online}, language = {en}, ISSN = {2168-7161}, DOI = {10.1109/TCC.2020.3000336}, reviewed = {1}, author = {Henze, Martin and Matzutt, Roman and Hiller, Jens and M{\"u}hmer, Erik and Ziegeldorf, Jan Henrik and van der Giet, Johannes and Wehrle, Klaus} } @Proceedings { 2022-serror-cset, title = {PowerDuck: A GOOSE Data Set of Cyberattacks in Substations}, year = {2022}, month = {8}, day = {8}, pages = {5}, keywords = {data sets, network traffic, smart grid security, IDS}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-serror-cset-powerduck.pdf}, publisher = {ACM}, address = {New York, NY, USA}, howpublished = {online}, event_place = {Virtual}, event_name = {Cyber Security Experimentation and Test Workshop (CSET 2022)}, event_date = {August 8, 2022}, ISBN = {978-1-4503-9684-4/22/08}, DOI = {10.1145/3546096.3546102}, reviewed = {1}, author = {Zemanek, Sven and Hacker, Immanuel and Wolsing, Konrad and Wagner, Eric and Henze, Martin and Serror, Martin} } @Article { 2022_brauner_iop, title = {A Computer Science Perspective on Digital Transformation in Production}, journal = {ACM Transactions on Internet of Things}, year = {2022}, month = {5}, day = {1}, volume = {3}, number = {2}, abstract = {The Industrial Internet-of-Things (IIoT) promises significant improvements for the manufacturing industry by facilitating the integration of manufacturing systems by Digital Twins. However, ecological and economic demands also require a cross-domain linkage of multiple scientific perspectives from material sciences, engineering, operations, business, and ergonomics, as optimization opportunities can be derived from any of these perspectives. To extend the IIoT to a true Internet of Production, two concepts are required: first, a complex, interrelated network of Digital Shadows which combine domain-specific models with data-driven AI methods; and second, the integration of a large number of research labs, engineering, and production sites as a World Wide Lab which offers controlled exchange of selected, innovation-relevant data even across company boundaries. In this article, we define the underlying Computer Science challenges implied by these novel concepts in four layers: Smart human interfaces provide access to information that has been generated by model-integrated AI. Given the large variety of manufacturing data, new data modeling techniques should enable efficient management of Digital Shadows, which is supported by an interconnected infrastructure. Based on a detailed analysis of these challenges, we derive a systematized research roadmap to make the vision of the Internet of Production a reality.}, keywords = {Internet of Production; World Wide Lab; Digital Shadows; Industrial Internet of Things}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-brauner-digital-transformation.pdf}, publisher = {ACM}, ISSN = {2691-1914}, DOI = {10.1145/3502265}, reviewed = {1}, author = {Brauner, Philipp and Dalibor, Manuela and Jarke, Matthias and Kunze, Ike and Koren, Istv{\'a}n and Lakemeyer, Gerhard and Liebenberg, Martin and Michael, Judith and Pennekamp, Jan and Quix, Christoph and Rumpe, Bernhard and van der Aalst, Wil and Wehrle, Klaus and Wortmann, Andreas and Ziefle, Martina} } @Inproceedings { 2021_mitseva_sequences, title = {POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages}, year = {2021}, month = {11}, day = {17}, pages = {2411-2413}, abstract = {Website fingerprinting (WFP) is a special case of traffic analysis, where a passive attacker infers information about the content of encrypted and anonymized connections by observing patterns of data flows. Although modern WFP attacks pose a serious threat to online privacy of users, including Tor users, they usually aim to detect single pages only. By ignoring the browsing behavior of users, the attacker excludes valuable information: users visit multiple pages of a single website consecutively, e.g., by following links. In this paper, we propose two novel methods that can take advantage of the consecutive visits of multiple pages to detect websites. We show that two up to three clicks within a site allow attackers to boost the accuracy by more than 20\% and to dramatically increase the threat to users' privacy. We argue that WFP defenses have to consider this new dimension of the attack surface.}, keywords = {Traffic Analysis; Website Fingerprinting; Web Privacy}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-mitseva-fingerprinting-sequences.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 28th ACM SIGSAC Conference on Computer and Communications Security (CCS '21), November 15-19, 2021, Seoul, Korea}, event_place = {Seoul, Korea}, event_date = {November 15-19, 2021}, ISBN = {978-1-4503-8454-4/21/11}, DOI = {10.1145/3460120.3485347}, reviewed = {1}, author = {Mitseva, Asya and Pennekamp, Jan and Lohm{\"o}ller, Johannes and Ziemann, Torsten and Hoerchner, Carl and Wehrle, Klaus and Panchenko, Andriy} } @Article { 2021_schomakers_insights, title = {Insights on Data Sensitivity from the Technical, Legal and the Users' Perspectives}, journal = {Computer Law Review International}, year = {2021}, month = {2}, day = {15}, volume = {22}, number = {1}, pages = {8-15}, abstract = {Social media, cloud computing, and the Internet of Things connect people around the globe, offering manifold benefits. However, the technological advances and increased user participation generate novel challenges for users' privacy. From the users' perspective, the consequences of data disclosure depend on the perceived sensitivity of that data. But in light of the new technological opportunities to process and combine data, it is questionable whether users can adequately evaluate risks of data disclosures. As mediating authority, data protection laws such as the European General Data Protection Regulation try to protect user data, granting enhanced protection to ''special categories'' of data. This article assesses the legal, technological, and users' perspectives on information sensitivity and their interplay. Technologically, all data can be referred to as ''potentially sensitive.'' The legal and users' perspective on information sensitivity deviate from this standpoint, as some data types are granted special protection by law but are not perceived as very sensitive by users and vice versa. The key findings here suggest the GDPR adequately protecting users' privacy but for small adjustments.}, tags = {Information Sensitivity, Privacy, European Data Protection Law}, ISSN = {1610-7608}, DOI = {10.9785/cri-2021-220103}, reviewed = {1}, author = {Schomakers, Eva-Maria and Lidynia, Chantal and M{\"u}llmann, Dirk and Matzutt, Roman and Wehrle, Klaus and Spiecker gen. D{\"o}hmann, Indra and Ziefle, Martina} } @Inproceedings { 2019_rut_schomakers_privacy, title = {Putting Privacy into Perspective -- Comparing Technical, Legal, and Users' View of Information Sensitivity}, year = {2021}, month = {1}, day = {27}, pages = {857-870}, abstract = {Social media, cloud computing, and the Internet of Things connect people around the globe, offering manifold benefits. However, the technological advances and increased user participation generate novel challenges for users' privacy. From the users' perspective, the consequences of data disclosure depend on the perceived sensitivity of that data. But in light of the new technological opportunities to process and combine data, it is questionable whether users can adequately evaluate risks of data disclosures. As mediating authority, data protection laws such as the European General Data Protection Regulation try to protect user data, granting enhanced protection to ''special categories'' of data. In this paper, we assess the legal, technological, and users' perspectives on information sensitivity and their interplay. Technologically, all data can be referred to as ''potentially sensitive.'' The legal and users' perspective on information sensitivity deviate from this standpoint, as some data types are granted special protection by law but are not perceived as very sensitive by users and vice versa. Our key findings still suggest the GDPR adequately protecting users' privacy but for small adjustments.}, keywords = {Information Sensitivity,Privacy,European Data Protection Law}, tags = {mynedata}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-schomakers-3perspectives.pdf}, web_url = {https://dl.gi.de/handle/20.500.12116/34788}, web_url2 = {https://arxiv.org/abs/1911.06569}, publisher = {Gesellschaft f{\"u}r Informatik}, address = {Bonn}, booktitle = {INFORMATIK 2020}, event_place = {Karlsruhe, Germany}, event_name = {INFORMATIK 2020}, event_date = {2020-09-28 to 2020-10-01}, language = {English}, DOI = {10.18420/inf2020_76}, reviewed = {1}, author = {Schomakers, Eva-Maria and Lidynia, Chantal and M{\"u}llmann, Dirk and Matzutt, Roman and Wehrle, Klaus and Spiecker gen. D{\"o}hmann, Indra and Ziefle, Martina} } @Article { 2021-wehrle-energy, title = {A Novel Receiver Design for Energy Packetā€Based Dispatching}, journal = {Energy Technology}, year = {2021}, volume = {9}, number = {2}, DOI = {10.1002/ente.202000937}, reviewed = {1}, author = {Wiegel, Friedirch and De Din, Edoardo and Monti, Antonello and Wehrle, Klaus and Hiller, Marc and Zitterbart, Martina and Hagenmeyer, Veit} } @Inproceedings { 2020-kosek-tcp-conformance, title = {MUST, SHOULD, DON'T CARE: TCP Conformance in the Wild}, year = {2020}, month = {3}, day = {30}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-kosek-tcp-conformance-v2.pdf}, web_url2 = {https://arxiv.org/abs/2002.05400}, publisher = {Springer}, booktitle = {Proceedings of the Passive and Active Measurement Conference (PAM '20)}, event_place = {Eugene, Oregon, USA}, event_name = {Passive and Active Measurement Conference (PAM 2020)}, event_date = {30.03.2020 - 31.03.2020}, language = {en}, DOI = {https://doi.org/10.1007/978-3-030-44081-7_8}, reviewed = {1}, author = {Kosek, Mike and Bl{\"o}cher, Leo and R{\"u}th, Jan and Zimmermann, Torsten and Hohlfeld, Oliver} } @Article { 2020-wehrle-digitalshadows, title = {Mit ''Digitalen Schatten'' Daten verdichten und darstellen : Der Exzellenzcluster ''Internet der Produktion'' forscht {\"u}ber die Produktionstechnik hinaus}, journal = {Der Profilbereich ''Information \& Communication Technology''}, year = {2020}, ISSN = {0179-079X}, DOI = {10.18154/RWTH-2021-02496}, author = {Jarke, Matthias and van der Aalst, Wil and Brecher, Christian and Brockmann, Matthias and Koren, Istv{\'a}n and Lakemeyer, Gerhard and Rumpe, Bernhard and Schuh, G{\"u}nther and Wehrle, Klaus and Ziefle, Martina} } @Inproceedings { 2019-hiller-lcn-sessionsharing, title = {The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads}, year = {2019}, month = {10}, day = {14}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hiller-lcn-case_for_tls_session_sharing.pdf}, publisher = {IEEE}, booktitle = {IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), Osnabr{\"u}ck, Germany}, event_place = {Osnabr{\"u}ck, Germany}, event_name = {44th IEEE Conference on Local Computer Networks (LCN)}, event_date = {October 14-17, 2019}, language = {en}, ISBN = {978-1-7281-2561-9}, DOI = {10.1109/LCNSymposium47956.2019.9000667}, reviewed = {1}, author = {Hiller, Jens and Henze, Martin and Zimmermann, Torsten and Hohlfeld, Oliver and Wehrle, Klaus} } @Phdthesis { 2019-tzimmermann-phd-thesis, title = {Improving Content and Service Distribution beyond Infrastructure Upgrades}, year = {2019}, month = {9}, day = {31}, web_url = {https://www.shaker.de/de/content/catalogue/index.asp?lang=de\&ID=8\&ISBN=978-3-8440-6928-0}, publisher = {Shaker Verlag}, address = {Shaker Verlag, D{\"u}ren, Germany}, series = {Reports on Communications and Distributed Systems}, edition = {18}, school = {RWTH Aachen University}, type = {Ph.D. Thesis}, language = {en}, ISBN = {978-3-8440-6928-0}, author = {Zimmermann, Torsten} } @Techreport { 2019-hohlfeld-santa-tr, title = {Application-Agnostic Offloading of Packet Processing}, year = {2019}, month = {4}, day = {1}, number2 = {arXiv:1904.00671 [cs.NI]}, pages = {1--14}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hohlfeld-santatr.pdf}, web_url = {https://arxiv.org/abs/1904.00671}, misc2 = {Online}, publisher = {COMSYS, RWTH Aachen University}, address = {Ahornstr. 55, 52074 Aachen, Germany}, institution = {COMSYS, RWTH Aachen University}, type = {Technical Report}, language = {en}, author = {Hohlfeld, Oliver and Reelfs, Helge and R{\"u}th, Jan and Schmidt, Florian and Zimmermann, Torsten and Hiller, Jens and Wehrle, Klaus} } @Inproceedings { 2019-rueth-icmp, title = {Hidden Treasures - Recycling Large-Scale Internet Measurements to Study the Internet’s Control Plane}, year = {2019}, month = {3}, day = {27}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-icmp.pdf}, web_url2 = {https://arxiv.org/abs/1901.07265}, publisher = {Springer}, booktitle = {In Proceedings of the Passive and Active Measurement Conference (PAM '19)}, event_place = {Puerto Varas, Chile}, event_name = {Passive and Active Measurement Conference (PAM 2019)}, event_date = {27.3.2018 - 29.3.2018}, language = {en}, DOI = {10.1007/978-3-030-15986-3_4}, reviewed = {1}, author = {R{\"u}th, Jan and Zimmermann, Torsten and Hohlfeld, Oliver} } @Inproceedings { 2018-zimmermann-webready, title = {Is the Web ready for HTTP/2 Server Push?}, year = {2018}, month = {12}, day = {4}, tags = {maki}, url = {https://dl.acm.org/citation.cfm?id=3281434}, web_url = {https://arxiv.org/abs/1810.05554}, web_url2 = {https://http2.netray.io/interleaving.html}, publisher = {ACM}, booktitle = {Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), Crete, Greete}, event_place = {Crete, Greece}, event_name = {CoNEXT 2018}, event_date = {4.12.18 - 7.12.18}, language = {en}, DOI = {10.1145/3281411.3281434}, reviewed = {1}, author = {Zimmermann, Torsten and Wolters, Benedikt and Hohlfeld, Oliver and Wehrle, Klaus} } @Inproceedings { 2018-ziegeldorf-shield, title = {SHIELD: A Framework for Efficient and Secure Machine Learning Classification in Constrained Environments}, year = {2018}, month = {12}, pages = {1-15}, tags = {iop,mynedata}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-ziegeldorf-acsac-shield.pdf}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 34rd Annual Computer Security Applications Conference}, event_place = {San Juan, Puerto Rico, USA}, event_name = {The 34rd Annual Computer Security Applications Conference (ACSAC 2018)}, event_date = {2018-12-03 - 2018-12-07}, language = {English}, DOI = {10.1145/3274694.3274716}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Metzke, Jan and Wehrle, Klaus} } @Inproceedings { 2018-rueth-mining, title = {Digging into Browser-based Crypto Mining}, year = {2018}, month = {10}, day = {31}, tags = {maki,internet-measurements}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-mining.pdf}, web_url2 = {https://arxiv.org/abs/1808.00811}, publisher = {ACM}, booktitle = {Proceedings of the Internet Measurement Conference (IMC '18)}, event_place = {Boston, US}, event_name = {Internet Measurement Conference 2018}, event_date = {31.10.18 - 2.11.18}, language = {en}, DOI = {10.1145/3278532.3278539}, reviewed = {1}, author = {R{\"u}th, Jan and Zimmermann, Torsten and Wolsing, Konrad and Hohlfeld, Oliver} } @Inproceedings { 2018-tzimmermann-toplists, title = {A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists}, year = {2018}, month = {10}, day = {31}, tags = {maki}, url = {https://dl.acm.org/citation.cfm?id=3278574}, web_url = {https://arxiv.org/abs/1805.11506}, publisher = {ACM}, booktitle = {Proceedings of the 2018 Internet Measurement Conference (IMC), Boston, USA}, event_place = {Boston, US}, event_name = {Internet Measurement Conference 2018}, event_date = {31.10.18 - 2.11.18}, language = {en}, DOI = {10.1145/3278532.3278574}, reviewed = {1}, author = {Scheitle, Quirin and Hohlfeld, Oliver and Gamba, Julien and Jelten, Jonas and Zimmermann, Torsten and Strowes, Stephen D. and Vallina-Rodriguez, Narseo} } @Inproceedings { 2018-hohlfeld-santa, title = {Application-Agnostic Offloading of Datagram Processing}, year = {2018}, month = {9}, day = {3}, tags = {maki,ssiclops,reflexes}, url = {https://ieeexplore.ieee.org/document/8493053}, publisher = {IEEE}, booktitle = {Proceedings of the 2018 30th International Teletraffic Congress (ITC 30), Vienna, Austria}, event_place = {Vienna, Austria}, event_name = {International Teletraffic Congress ITC 30}, event_date = {03.09.2018 - 07-09.2018}, language = {en}, DOI = {10.1109/ITC30.2018.00015}, reviewed = {1}, author = {Hohlfeld, Oliver and Reelfs, Jens Helge and R{\"u}th, Jan and Schmidt, Florian and Zimmermann, Torsten and Hiller, Jens and Wehrle, Klaus} } @Inproceedings { 2018-matzutt-bitcoin-content-countermeasures, title = {Thwarting Unwanted Blockchain Content Insertion}, year = {2018}, month = {4}, day = {17}, pages = {364-370}, abstract = {Since the introduction of Bitcoin in 2008, blockchain systems have seen an enormous increase in adoption. By providing a persistent, distributed, and append-only ledger, blockchains enable numerous applications such as distributed consensus, robustness against equivocation, and smart contracts. However, recent studies show that blockchain systems such as Bitcoin can be (mis)used to store arbitrary content. This has already been used to store arguably objectionable content on Bitcoin's blockchain. Already single instances of clearly objectionable or even illegal content can put the whole system at risk by making its node operators culpable. To overcome this imminent risk, we survey and discuss the design space of countermeasures against the insertion of such objectionable content. Our analysis shows a wide spectrum of potential countermeasures, which are often combinable for increased efficiency. First, we investigate special-purpose content detectors as an ad hoc mitigation. As they turn out to be easily evadable, we also investigate content-agnostic countermeasures. We find that mandatory minimum fees as well as mitigation of transaction manipulability via identifier commitments significantly raise the bar for inserting harmful content into a blockchain.}, keywords = {Bitcoin,blockchain,security,objectionable content,countermeasure}, tags = {mynedata,iop}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-matzutt-blockchain-contents-countermeasures.pdf}, web_url = {https://ieeexplore.ieee.org/document/8360355}, publisher = {IEEE}, booktitle = {Proceedings of the First IEEE Workshop on Blockchain Technologies and Applications (BTA), co-located with the IEEE International Conference on Cloud Engineering 2018 (IC2E 2018)}, event_place = {Orlando, Florida, USA}, event_name = {First IEEE Workshop on Blockchain Technologies and Applications (BTA)}, event_date = {2018-04-17}, language = {English}, ISBN = {978-1-5386-5008-0}, DOI = {10.1109/IC2E.2018.00070}, reviewed = {1}, author = {Matzutt, Roman and Henze, Martin and Ziegeldorf, Jan Henrik and Hiller, Jens and Wehrle, Klaus} } @Inproceedings { 2018-tzimmermann-metacdn, title = {Characterizing a Meta-CDN}, year = {2018}, month = {3}, day = {26}, pages = {114-128}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hohlfeld-metacdn.pdf}, web_url = {https://arxiv.org/abs/1803.09990}, publisher = {Springer, Cham}, booktitle = {In Proceedings of the Passive and Active Measurement Conference (PAM '18)}, event_place = {Berlin, Germany}, event_name = {Passive and Active Measurement Conference (PAM 2018)}, event_date = {26.3.2018 - 27.3.2018}, language = {en}, ISBN = {978-3-319-76480-1}, DOI = {10.1007/978-3-319-76481-8_9}, reviewed = {1}, author = {Hohlfeld, Oliver and R{\"u}th, Jan and Wolsing, Konrad and Zimmermann, Torsten} } @Article { 2016-fgcs-ziegeldorf-bitcoin, title = {Secure and anonymous decentralized Bitcoin mixing}, journal = {Future Generation Computer Systems}, year = {2018}, month = {3}, volume = {80}, pages = {448-466}, keywords = {Pseudonymity, anonymity, and untraceability}, tags = {rfc}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-ziegeldorf-fgcs-bitcoin.pdf}, misc2 = {Online}, publisher = {Elsevier}, language = {en}, ISSN = {0167-739X}, DOI = {10.1016/j.future.2016.05.018}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Matzutt, Roman and Henze, Martin and Grossmann, Fred and Wehrle, Klaus} } @Inproceedings { 2018-matzutt-bitcoin-content, title = {A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin}, year = {2018}, month = {2}, day = {26}, abstract = {Blockchains primarily enable credible accounting of digital events, e.g., money transfers in cryptocurrencies. However, beyond this original purpose, blockchains also irrevocably record arbitrary data, ranging from short messages to pictures. This does not come without risk for users as each participant has to locally replicate the complete blockchain, particularly including potentially harmful content. We provide the first systematic analysis of the benefits and threats of arbitrary blockchain content. Our analysis shows that certain content, e.g., illegal pornography, can render the mere possession of a blockchain illegal. Based on these insights, we conduct a thorough quantitative and qualitative analysis of unintended content on Bitcoin's blockchain. Although most data originates from benign extensions to Bitcoin's protocol, our analysis reveals more than 1600 files on the blockchain, over 99\% of which are texts or images. Among these files there is clearly objectionable content such as links to child pornography, which is distributed to all Bitcoin participants. With our analysis, we thus highlight the importance for future blockchain designs to address the possibility of unintended data insertion and protect blockchain users accordingly.}, tags = {mynedata}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018_matzutt_bitcoin-contents_preproceedings-version.pdf}, web_url_date = {2018-01-07}, misc2 = {Online}, publisher = {Springer}, booktitle = {Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Cura\c{c}ao}, event_place = {Nieuwpoort, Cura\c{c}ao}, event_name = {Financial Cryptography and Data Security 2018}, language = {en}, DOI = {10.1007/978-3-662-58387-6_23}, reviewed = {1}, author = {Matzutt, Roman and Hiller, Jens and Henze, Martin and Ziegeldorf, Jan Henrik and M{\"u}llmann, Dirk and Hohlfeld, Oliver and Wehrle, Klaus} } @Inproceedings { 2018-tzimmermann-split, title = {SPLIT: Smart Protocol Loading for the IoT}, year = {2018}, month = {2}, day = {14}, tags = {iop}, url = {https://jenshiller.com/publication/2018-zimmermann-ewsn-split/2018-zimmermann-ewsn-split.pdf}, web_url = {https://dl.acm.org/citation.cfm?id=3234847.3234854}, publisher = {ACM}, booktitle = {Proceedings of the 15th European Conference on Wireless Sensor Networks (EWSN 2018), Madrid, Spain}, event_place = {Madrid, Spain}, event_name = {European Conference on Wireless Sensor Networks (EWSN 2018)}, event_date = {14.2.2018 - 16.2.2018}, language = {en}, ISBN = {978-0-9949886-2-1}, reviewed = {1}, author = {Zimmermann, Torsten and Hiller, Jens and Reelfs, Jens Helge and Hein, Pascal and Wehrle, Klaus} } @Incollection { 2017-cps-henze-network, title = {Network Security and Privacy for Cyber-Physical Systems}, year = {2017}, month = {11}, day = {13}, pages = {25-56}, tags = {sensorcloud,ipacs}, editor = {Song, Houbing and Fink, Glenn A. and Jeschke, Sabina}, publisher = {Wiley-IEEE Press}, edition = {First}, chapter = {2}, booktitle = {Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications}, language = {en}, ISBN = {978-1-119-22604-8}, DOI = {10.1002/9781119226079.ch2}, reviewed = {1}, author = {Henze, Martin and Hiller, Jens and Hummen, Ren{\'e} and Matzutt, Roman and Wehrle, Klaus and Ziegeldorf, Jan Henrik} } @Inproceedings { 2017-henze-mobiquitous-comparison, title = {Privacy-preserving Comparison of Cloud Exposure Induced by Mobile Apps}, year = {2017}, month = {11}, day = {7}, pages = {543-544}, tags = {trinics}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-mobiquitous-comparison.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous) - Poster Session, Melbourne, VIC, Australia}, language = {en}, ISBN = {978-1-4503-5368-7}, DOI = {10.1145/3144457.3144511}, reviewed = {1}, author = {Henze, Martin and Inaba, Ritsuma and Fink, Ina Berenice and Ziegeldorf, Jan Henrik} } @Inproceedings { 2017-henze-mobiquitous-cloudanalyzer, title = {CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps}, year = {2017}, month = {11}, day = {7}, pages = {262-271}, abstract = {Developers of smartphone apps increasingly rely on cloud services for ready-made functionalities, e.g., to track app usage, to store data, or to integrate social networks. At the same time, mobile apps have access to various private information, ranging from users' contact lists to their precise locations. As a result, app deployment models and data flows have become too complex and entangled for users to understand. We present CloudAnalyzer, a transparency technology that reveals the cloud usage of smartphone apps and hence provides users with the means to reclaim informational self-determination. We apply CloudAnalyzer to study the cloud exposure of 29 volunteers over the course of 19 days. In addition, we analyze the cloud usage of the 5000 most accessed mobile websites as well as 500 popular apps from five different countries. Our results reveal an excessive exposure to cloud services: 90 \% of apps use cloud services and 36 \% of apps used by volunteers solely communicate with cloud services. Given the information provided by CloudAnalyzer, users can critically review the cloud usage of their apps.}, keywords = {Privacy; Smartphones; Cloud Computing; Traffic Analysis}, tags = {trinics}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-mobiquitous-cloudanalyzer.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous '17), November 7-10, 2017, Melbourne, VIC, Australia}, event_place = {Melbourne, VIC, Australia}, event_date = {November 7-10, 2017}, language = {en}, ISBN = {978-1-4503-5368-7}, DOI = {10.1145/3144457.3144471}, reviewed = {1}, author = {Henze, Martin and Pennekamp, Jan and Hellmanns, David and M{\"u}hmer, Erik and Ziegeldorf, Jan Henrik and Drichel, Arthur and Wehrle, Klaus} } @Inproceedings { 2017-liew-schemmel-fp, title = {Floating-Point Symbolic Execution: A Case Study in N-Version Programming}, year = {2017}, month = {10}, day = {30}, tags = {symbiosys}, url = {file:1848}, booktitle = {Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering}, event_place = {Urbana-Champaign, IL, USA}, language = {en}, ISBN = {978-1-5386-2684-9/17}, reviewed = {1}, author = {Liew, Daniel and Schemmel, Daniel and Cadar, Cristian and Donaldson, Alastair and Z{\"a}hl, Rafael and Wehrle, Klaus} } @Inproceedings { 2017-zimmermann-qoe, title = {A QoE Perspective on HTTP/2 Server Push}, year = {2017}, month = {8}, day = {21}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-zimmermann-internetqoe-push.pdf}, publisher = {ACM}, booktitle = {ACM SIGCOMM 2017 2nd Workshop on QoE-based Analysis and Management of Data Communication Networks (Internet-QoE 2017), Los Angeles, USA}, event_place = {Los Angeles, USA}, event_name = {ACM SIGCOMM 2017 2nd Workshop on QoE-based Analysis and Management of Data Communication Networks (Internet-QoE 2017)}, event_date = {21.8.2017 - 25.8.2017}, language = {en}, ISBN = {978-1-4503-5056-3}, DOI = {10.1145/3098603.3098604}, reviewed = {1}, author = {Zimmermann, Torsten and Wolters, Benedikt and Hohlfeld, Oliver} } @Inproceedings { 2017-henze-trustcom-dcam, title = {Distributed Configuration, Authorization and Management in the Cloud-based Internet of Things}, year = {2017}, month = {8}, day = {1}, pages = {185-192}, tags = {sscilops, ipacs}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-trustcom-dcam.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), Sydney, NSW, Australia}, language = {en}, ISBN = {978-1-5090-4905-9}, ISSN = {2324-9013}, DOI = {10.1109/Trustcom/BigDataSE/ICESS.2017.236}, reviewed = {1}, author = {Henze, Martin and Wolters, Benedikt and Matzutt, Roman and Zimmermann, Torsten and Wehrle, Klaus} } @Article { 2017-ziegeldorf-bmcmedgenomics-bloom, title = {BLOOM: BLoom filter based Oblivious Outsourced Matchings}, journal = {BMC Medical Genomics}, year = {2017}, month = {7}, day = {26}, volume = {10}, number = {Suppl 2}, pages = {29-42}, abstract = {Whole genome sequencing has become fast, accurate, and cheap, paving the way towards the large-scale collection and processing of human genome data. Unfortunately, this dawning genome era does not only promise tremendous advances in biomedical research but also causes unprecedented privacy risks for the many. Handling storage and processing of large genome datasets through cloud services greatly aggravates these concerns. Current research efforts thus investigate the use of strong cryptographic methods and protocols to implement privacy-preserving genomic computations. We propose FHE-Bloom and PHE-Bloom, two efficient approaches for genetic disease testing using homomorphically encrypted Bloom filters. Both approaches allow the data owner to securely outsource storage and computation to an untrusted cloud. FHE-Bloom is fully secure in the semi-honest model while PHE-Bloom slightly relaxes security guarantees in a trade-off for highly improved performance. We implement and evaluate both approaches on a large dataset of up to 50 patient genomes each with up to 1000000 variations (single nucleotide polymorphisms). For both implementations, overheads scale linearly in the number of patients and variations, while PHE-Bloom is faster by at least three orders of magnitude. For example, testing disease susceptibility of 50 patients with 100000 variations requires only a total of 308.31 s (\(\sigma\)=8.73 s) with our first approach and a mere 0.07 s (\(\sigma\)=0.00 s) with the second. We additionally discuss security guarantees of both approaches and their limitations as well as possible extensions towards more complex query types, e.g., fuzzy or range queries. Both approaches handle practical problem sizes efficiently and are easily parallelized to scale with the elastic resources available in the cloud. The fully homomorphic scheme, FHE-Bloom, realizes a comprehensive outsourcing to the cloud, while the partially homomorphic scheme, PHE-Bloom, trades a slight relaxation of security guarantees against performance improvements by at least three orders of magnitude.}, note = {Proceedings of the 5th iDASH Privacy and Security Workshop 2016}, keywords = {Secure outsourcing; Homomorphic encryption; Bloom filters}, tags = {sscilops; mynedata; rfc}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-ziegeldorf-bmcmedgenomics-bloom.pdf}, misc2 = {Online}, publisher = {BioMed Central}, event_place = {Chicago, IL, USA}, event_date = {November 11, 2016}, language = {en}, ISSN = {1755-8794}, DOI = {10.1186/s12920-017-0277-y}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Pennekamp, Jan and Hellmanns, David and Schwinger, Felix and Kunze, Ike and Henze, Martin and Hiller, Jens and Matzutt, Roman and Wehrle, Klaus} } @Inproceedings { 2017-zimmermann-networking-http2, title = {How HTTP/2 Pushes the Web: An Empirical Study of HTTP/2 Server Push}, year = {2017}, month = {6}, day = {12}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-zimmermann-networking-push.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 16th International IFIP Networking Conference (NETWORKING'17), Stockholm, Sweden}, event_place = {Stockholm, Sweden}, event_name = {IFIP Networking 2017}, event_date = {12.-16.6.2017}, ISBN = {978-3-901882-94-4}, DOI = {10.23919/IFIPNetworking.2017.8264830}, reviewed = {1}, author = {Zimmermann, Torsten and R{\"u}th, Jan and Wolters, Benedikt and Hohlfeld, Oliver} } @Inproceedings { 2017-zimmermann-secon, title = {Resource and Execution Control for Mobile Offloadee Devices}, year = {2017}, month = {6}, day = {12}, tags = {maki}, publisher = {IEEE}, booktitle = {14th IEEE International Conference on Sensing, Communication, and Networking (SECON 2017), San Diego, USA}, event_place = {San Diego, USA}, event_name = {14th IEEE International Conference on Sensing, Communication, and Networking (SECON 2017)}, event_date = {12.06.2017 - 14.06.2017}, language = {en}, ISBN = {978-1-5090-6599-8}, DOI = {10.1109/SAHCN.2017.7964939}, reviewed = {1}, author = {Zimmermann, Torsten and Wirtz, Hanno and Ziegeldorf, Jan Henrik and Steinhaus, Christian and Wehrle, Klaus} } @Inproceedings { 2017-henze-ic2e-prada, title = {Practical Data Compliance for Cloud Storage}, year = {2017}, month = {4}, day = {4}, pages = {252-258}, tags = {ssiclops, ipacs}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-ic2e-prada.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 2017 IEEE International Conference on Cloud Engineering (IC2E 2017), Vancouver, BC, Canada}, language = {en}, ISBN = {978-1-5090-5817-4}, DOI = {10.1109/IC2E.2017.32}, reviewed = {1}, author = {Henze, Martin and Matzutt, Roman and Hiller, Jens and M{\"u}hmer, Erik and Ziegeldorf, Jan Henrik and van der Giet, Johannes and Wehrle, Klaus} } @Inproceedings { 2017-ziegeldorf-codaspy-priward, title = {Privacy-Preserving HMM Forward Computation}, year = {2017}, month = {3}, day = {22}, pages = {83-94}, tags = {mynedata}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-ziegeldorf-codaspy-priward.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY 2017), Scottsdale, AZ, USA}, language = {en}, ISBN = {978-1-4503-4523-1}, DOI = {10.1145/3029806.3029816}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Metzke, Jan and R{\"u}th, Jan and Henze, Martin and Wehrle, Klaus} } @Inproceedings { 2017-wirtz-zimmermann-percom-etc, title = {Encrypting Data to Pervasive Contexts}, year = {2017}, month = {3}, day = {13}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-wirtz-zimmermann-percom-etc.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom), Kona, Big Island, HI, USA}, language = {en}, ISBN = {978-1-5090-4328-6}, DOI = {10.1109/PERCOM.2017.7917877}, reviewed = {1}, author = {Wirtz, Hanno and Zimmermann, Torsten and Ceriotti, Matteo and Wehrle, Klaus} } @Inproceedings { 2017-ziegeldorf-wons-tracemixer, title = {TraceMixer: Privacy-Preserving Crowd-Sensing sans Trusted Third Party}, year = {2017}, month = {2}, day = {21}, pages = {17-24}, tags = {mynedata}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-ziegeldorf-wons-tracemixer.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Jackson Hole, WY, USA}, language = {en}, ISBN = {978-3-901882-88-3}, DOI = {10.1109/WONS.2017.7888771}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Henze, Martin and Bavendiek, Jens and Wehrle, Klaus} } @Incollection { 2016-iiot-rueth-comm, title = {Communication and Networking for the Industrial Internet of Things}, year = {2017}, pages = {317-346}, misc2 = {Online}, editor = {Jeschke, Sabina and Brecher, Christian and Song, Houbing and Rawat, Danda B.}, publisher = {Springer}, booktitle = {Industrial Internet of Things}, language = {en}, ISBN = {978-3-319-42558-0}, DOI = {10.1007/978-3-319-42559-7_12}, reviewed = {1}, author = {R{\"u}th, Jan and Schmidt, Florian and Serror, Martin and Wehrle, Klaus and Zimmermann, Torsten} } @Inproceedings { 2017-matzutt-mynedata, title = {myneData: Towards a Trusted and User-controlled Ecosystem for Sharing Personal Data}, year = {2017}, pages = {1073-1084}, abstract = {Personal user data is collected and processed at large scale by a handful of big providers of Internet services. This is detrimental to users, who often do not understand the privacy implications of this data collection, as well as to small parties interested in gaining insights from this data pool, e.g., research groups or small and middle-sized enterprises. To remedy this situation, we propose a transparent and user-controlled data market in which users can directly and consensually share their personal data with interested parties for monetary compensation. We define a simple model for such an ecosystem and identify pressing challenges arising within this model with respect to the user and data processor demands, legal obligations, and technological limits. We propose myneData as a conceptual architecture for a trusted online platform to overcome these challenges. Our work provides an initial investigation of the resulting myneData ecosystem as a foundation to subsequently realize our envisioned data market via the myneData platform.}, note = {Presentation slides are in German}, keywords = {Personal User Data, Personal Information Management, Data Protection Laws, Privacy Enhancing Technologies, Platform Design, Profiling}, tags = {mynedata_show}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-matzutt-informatik-mynedata.pdf}, web_url = {https://www.comsys.rwth-aachen.de/fileadmin/misc/mynedata/talks/2017-matzutt-informatik-mynedata-presentation.pdf}, web_url_date = {Presentation slides}, editor = {Eibl, Maximilian and Gaedke, Martin}, publisher = {Gesellschaft f{\"u}r Informatik, Bonn}, booktitle = {INFORMATIK 2017}, event_place = {Chemnitz}, event_name = {INFORMATIK 2017}, event_date = {2017-09-28}, language = {English}, ISBN = {978-3-88579-669-5}, ISSN = {1617-5468}, DOI = {10.18420/in2017_109}, reviewed = {1}, author = {Matzutt, Roman and M{\"u}llmann, Dirk and Zeissig, Eva-Maria and Horst, Christiane and Kasugai, Kai and Lidynia, Sean and Wieninger, Simon and Ziegeldorf, Jan Henrik and Gudergan, Gerhard and Spiecker gen. D{\"o}hmann, Indra and Wehrle, Klaus and Ziefle, Martina} } @Phdthesis { 2017-ziegeldorf-phdthesis, title = {Designing Digital Services with Cryptographic Guarantees for Data Security and Privacy}, year = {2017}, school = {RWTH Aachen University}, author = {Ziegeldorf, Jan Henrik} } @Inproceedings { 2016-henze-wpes-cppl, title = {CPPL: Compact Privacy Policy Language}, year = {2016}, month = {10}, day = {24}, pages = {99-110}, tags = {ssiclops}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-henze-wpes-cppl.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 15th Workshop on Privacy in the Electronic Society (WPES), co-located with the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria}, language = {en}, ISBN = {978-1-4503-4569-9}, DOI = {10.1145/2994620.2994627}, reviewed = {1}, author = {Henze, Martin and Hiller, Jens and Schmerling, Sascha and Ziegeldorf, Jan Henrik and Wehrle, Klaus} } @Inproceedings { 2016-matzutt-ccs-bitcoin, title = {POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store}, year = {2016}, month = {10}, day = {24}, pages = {1769-1771}, tags = {mynedata}, url = {/fileadmin/papers/2016/2016-matzutt-ccs-blockchaincontent.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria}, language = {en}, ISBN = {978-1-4503-4139-4}, DOI = {10.1145/2976749.2989059}, reviewed = {1}, author = {Matzutt, Roman and Hohlfeld, Oliver and Henze, Martin and Rawiel, Robin and Ziegeldorf, Jan Henrik and Wehrle, Klaus} } @Inproceedings { 2016-werner-networking-stean, title = {STEAN: A Storage and Transformation Engine for Advanced Networking Context}, year = {2016}, month = {5}, day = {17}, tags = {maki}, publisher = {IEEE}, booktitle = {Proceedings of the 15th International IFIP Networking Conference (NETWORKING'16), Vienna, Austira}, event_place = {Vienna, Austria}, event_name = {IFIP Networking 2016}, event_date = {17.-19.5.2016}, ISBN = {978-3-9018-8283-8}, DOI = {10.1109/IFIPNetworking.2016.7497203}, reviewed = {1}, author = {Werner, Marc and Schwandtke, Johannes and Hollick, Matthias and Hohlfeld, Oliver and Zimmermann, Torsten and Wehrle, Klaus} } @Inproceedings { 2016-zimmermann-remp, title = {ReMP TCP: Low Latency Multipath TCP}, year = {2016}, month = {5}, publisher = {IEEE}, booktitle = {Proceedings of the IEEE International Conference on Communications (ICC 2016), Kuala Lumpur, Malaysia}, event_place = {Kuala Lumpur, Malaysia}, event_name = {ICC 2016}, event_date = {23.-27.5.2016}, ISBN = {978-1-4799-6664-6}, ISSN = {1938-1883}, DOI = {10.1109/ICC.2016.7510787}, reviewed = {1}, author = {Fr{\"o}mmgen, Alexander and Erbsh{\"a}user, Tobias and Zimmermann, Torsten and Wehrle, Klaus and Buchmann, Alejandro} } @Inproceedings { 2016-panchenko-ndss-fingerprinting, title = {Website Fingerprinting at Internet Scale}, year = {2016}, month = {2}, day = {21}, abstract = {The website fingerprinting attack aims to identify the content (i.e., a webpage accessed by a client) of encrypted and anonymized connections by observing patterns of data flows such as packet size and direction. This attack can be performed by a local passive eavesdropper – one of the weakest adversaries in the attacker model of anonymization networks such as Tor. In this paper, we present a novel website fingerprinting attack. Based on a simple and comprehensible idea, our approach outperforms all state-of-the-art methods in terms of classification accuracy while being computationally dramatically more efficient. In order to evaluate the severity of the website fingerprinting attack in reality, we collected the most representative dataset that has ever been built, where we avoid simplified assumptions made in the related work regarding selection and type of webpages and the size of the universe. Using this data, we explore the practical limits of website fingerprinting at Internet scale. Although our novel approach is by orders of magnitude computationally more efficient and superior in terms of detection accuracy, for the first time we show that no existing method – including our own – scales when applied in realistic settings. With our analysis, we explore neglected aspects of the attack and investigate the realistic probability of success for different strategies a real-world adversary may follow.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-panchenko-ndss-fingerprinting.pdf}, web_url = {https://www.informatik.tu-cottbus.de/\verb=~=andriy/zwiebelfreunde/}, publisher = {Internet Society}, booktitle = {Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS '16), February 21-24, 2016, San Diego, CA, USA}, event_place = {San Diego, CA, USA}, event_date = {February 21-24, 2016}, ISBN = {978-1-891562-41-9}, DOI = {10.14722/ndss.2016.23477}, reviewed = {1}, author = {Panchenko, Andriy and Lanze, Fabian and Zinnen, Andreas and Henze, Martin and Pennekamp, Jan and Wehrle, Klaus and Engel, Thomas} } @Inproceedings { 2016-zimmermann-wons-mirco, title = {Maintaining Integrity and Reputation in Content Offloading}, year = {2016}, month = {1}, pages = {25-32}, tags = {maki}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-zimmermann-wons-mirco.pdf}, publisher = {IEEE}, booktitle = {12th International Conference on Wireless On-demand Network Systems and Services (WONS), Cortina d'Ampezzo, Italy}, event_place = {Cortina d'Ampezzo, Italy}, event_name = {12th International Conference on Wireless On-demand Network Systems and Services (WONS)}, event_date = {January 20 - 22 2016}, language = {en}, ISBN = {978-3-901882-80-7}, reviewed = {1}, author = {Zimmermann, Torsten and R{\"u}th, Jan and Wirtz, Hanno and Wehrle, Klaus} } @Article { 2016-sdnflex_si, title = {Editorial: Special issue on Software-Defined Networking and Network Functions Virtualization for flexible network management}, journal = {Wiley Journal of Network Management}, year = {2016}, volume = {26}, number = {1}, url = {http://onlinelibrary.wiley.com/doi/10.1002/nem.1915/pdf}, author = {Hohlfeld, Oliver and Zinner, Thomas and Benson, Theophilus and Hausheer, David} } @Conference { 2016-erwin, title = {ERWIN - Enabling the Reproducible Investigation of Waiting Times for Arbitrary Workflows}, year = {2016}, web_url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7498938\&tag=1}, booktitle = {IEEE QoMEX}, event_name = {IEEE QoMEX}, DOI = {10.1109/QoMEX.2016.7498938}, author = {Zinner, Thomas and Hirth, Matthias and Fischer, Valentin and Hohlfeld, Oliver} } @Inproceedings { 2015-ziegeldorf-cans-boma, title = {Bandwidth-optimized Secure Two-Party Computation of Minima}, year = {2015}, month = {12}, day = {8}, volume = {9476}, pages = {197-213}, url = {/fileadmin/papers/2015/2015-ziegeldorf-cans-boma.pdf}, misc2 = {Online}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, booktitle = {14th International Conference on Cryptology and Network Security (CANS 2015), Marrakesh, Morocco}, language = {en}, ISBN = {978-3-319-26822-4}, DOI = {10.1007/978-3-319-26823-1_14}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Hiller, Jens and Henze, Martin and Wirtz, Hanno and Wehrle, Klaus} } @Inproceedings { 2015-zimmermann-remp, title = {Remp TCP: Low latency Multipath TCP}, year = {2015}, month = {12}, day = {1}, publisher = {ACM}, booktitle = {Proceedings of the 2015 CoNEXT on Student Workshop, CoNEXT Student Workshop, Heidelberg, Germany}, event_place = {Heidelberg, Germany}, event_name = {CoNEXT 2015}, event_date = {1.-4.12.2015}, reviewed = {1}, author = {Fr{\"o}mmgen, Alexander and Erbsh{\"a}user, Tobias and Zimmermann, Torsten and Wehrle, Klaus and Buchmann, Alejandro} } @Inproceedings { 2015-wirtz-wifi-sharing, title = {Collaborative On-demand Wi-Fi Sharing}, year = {2015}, month = {10}, pages = {19-27}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-wirtz-lcn-cows.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {40th IEEE Conference on Local Computer Networks (LCN), Clearwater Beach, USA}, event_place = {Clearwater Beach, Florida, USA}, event_name = {40th IEEE Conference on Local Computer Networks (LCN)}, event_date = {October 26-29 2015}, language = {en}, DOI = {10.1109/LCN.2015.7366279}, reviewed = {1}, author = {Wirtz, Hanno and Zimmermann, Torsten and Serror, Martin and Wehrle, Klaus} } @Inproceedings { 2015-ziegeldorf-dpm-comparison, title = {Comparison-based Privacy: Nudging Privacy in Social Media (Position Paper)}, year = {2015}, month = {9}, day = {22}, volume = {9481}, pages = {226-234}, url = {fileadmin/papers/2015/2015-ziegeldorf-dpm-cbp.pdf}, misc2 = {Online}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, booktitle = {The 10th DPM International Workshop on Data Privacy Management, Vienna, Austria}, language = {en}, ISBN = {978-3-319-29882-5}, DOI = {10.1007/978-3-319-29883-2_15}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Henze, Martin and Hummen, Ren{\'e} and Wehrle, Klaus} } @Inproceedings { 2015-ahfe-kowalewski-facebook, title = {Like us on Facebook! - Analyzing user preferences regarding privacy settings in Germany}, journal = {Procedia Manufacturing}, year = {2015}, month = {7}, volume = {3}, pages = {815--822}, publisher = {Elsevier}, booktitle = {The 6th International Conference on Applied Humand Factors and Ergonomics (AHFE 2015), Las Vegas, NV, USA}, language = {en}, ISSN = {2351-9789}, DOI = {10.1016/j.promfg.2015.07.336}, reviewed = {1}, author = {Kowalewski, Sylvia and Ziefle, Martina and Ziegeldorf, Jan Henrik and Wehrle, Klaus} } @Inproceedings { 2015-wirtz-secon, title = {Enabling Ubiquitous Interaction with Smart Things}, year = {2015}, month = {6}, day = {24}, pages = {256-264}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-wirtz-secon-stif.pdf}, web_url = {http://www.comsys.rwth-aachen.de/short/secon15-stif}, misc2 = {Online}, publisher = {IEEE}, booktitle = {12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015), Seattle, USA}, event_place = {Seattle, USA}, event_name = {12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015)}, event_date = {22.06.2015 - 25.06.2015}, language = {en}, DOI = {10.1109/SAHCN.2015.7338324}, reviewed = {1}, author = {Wirtz, Hanno and R{\"u}th, Jan and Serror, Martin and Zimmermann, Torsten and Wehrle, Klaus} } @Inproceedings { 2015-ziegeldorf-iwpe-comparison, title = {Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks}, year = {2015}, month = {5}, day = {21}, pages = {198-205}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-ziegeldorf-iwpe-choose.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {2015 International Workshop on Privacy Engineering (IWPE'15), part of 2015 IEEE Security and Privacy Workshops (SPW 2015), San Jose, CA, USA}, language = {en}, DOI = {10.1109/SPW.2015.9}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Metzke, Jan and Henze, Martin and Wehrle, Klaus} } @Proceedings { 2015-sdnflex-heuschkel-dyns, title = {Protocol Virtualization through Dynamic Network Stacks}, year = {2015}, month = {3}, day = {9}, publisher = {IEEE}, event_place = {Cottbus}, event_name = {SDNFlex Workshop (NetSys 2015)}, event_date = {March 2015, 9-12}, language = {en}, DOI = {10.1109/NetSys.2015.7089055}, reviewed = {1}, author = {Heuschkel, Jens and Schweizer, Immanuel and Zimmermann, Torsten and Wehrle, Klaus and M{\"u}hlh{\"a}user, Max} } @Inproceedings { 2014-ziegeldorf-codaspy-coinparty, title = {CoinParty: Secure Multi-Party Mixing of Bitcoins}, year = {2015}, month = {3}, day = {2}, tags = {rfc}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-ziegeldorf-codaspy-coinparty.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA}, event_place = {San Antonio, TX, USA}, event_name = {The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015)}, language = {en}, ISBN = {978-1-4503-3191-3}, DOI = {10.1145/2699026.2699100}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Grossmann, Fred and Henze, Martin and Inden, Nicolas and Wehrle, Klaus} } @Proceedings { 2014-kuvs-zimmermann-mindgap, title = {Mind the Gap – Understanding the Traffic Gap when Switching Communication Protocols}, year = {2014}, month = {9}, day = {29}, event_place = {Stuttgart}, event_name = {1st KuVS Workshop on Anticipatory Networks}, event_date = {September 29-30, 2014}, reviewed = {1}, author = {Werner, Marc and Lange, Tobias and Hollick, Matthias and Zimmermann, Torsten and Wehrle, Klaus} } @Poster { 2014-wisec-ziegeldorf-ipin, title = {POSTER: Privacy-preserving Indoor Localization}, year = {2014}, month = {7}, day = {23}, tags = {rfc}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-ziegeldorf-poster-wisec.pdf}, organization = {7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '14) (Poster)}, language = {en}, DOI = {10.13140/2.1.2847.4886}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Viol, Nicolai and Henze, Martin and Wehrle, Klaus} } @Inproceedings { 2014-wowmom-wirtz-cafi, title = {CA-Fi: Ubiquitous Mobile Wireless Networking without 802.11 Overhead and Restrictions}, year = {2014}, month = {6}, day = {17}, url = {fileadmin/papers/2014/2014-wirtz-wowmom-cafi.pdf}, misc = {online}, publisher = {IEEE}, booktitle = {15th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'14), Sydney, Australia}, language = {en}, DOI = {10.1109/WoWMoM.2014.6918950}, reviewed = {1}, author = {Wirtz, Hanno and Zimmermann, Torsten and Ceriotti, Matteo and Wehrle, Klaus} } @Inproceedings { 2014-smartcity-zimmermann-pubtrans, title = {Analyzing Metropolitan-area Networking within Public Transportation Systems for Smart City Applications}, year = {2014}, month = {3}, day = {30}, url = {fileadmin/papers/2014/2014-zimmermann-smartcity-pubtrans.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 1st International IEEE Workshop on Architectures and Technologies for Smart Cities (SmartCitiy'14), Dubai, UAE}, event_place = {Dubai, UAE}, event_name = {1st International IEEE Workshop on Architectures and Technologies for Smart Cities (SmartCitiy'14)}, event_date = {30 March - 2 April 2014}, language = {en}, DOI = {10.1109/NTMS.2014.6814007}, reviewed = {1}, author = {Zimmermann, Torsten and Wirtz, Hanno and Pu{\~n}al, Oscar and Wehrle, Klaus} } @Inproceedings { 2014-mmsys-wirtz-ubifi, title = {A Wireless Application Overlay for Ubiquitous Mobile Multimedia Sensing and Interaction}, year = {2014}, month = {3}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-wirtz-mmsys-ubifi.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 5th ACM Multimedia Systems Conference (MMSys 2014), Special Session on Mobile Multimedia Sensing, Singapore}, event_place = {Singapore}, event_name = {5th ACM Multimedia Systems Conference}, event_date = {19-21 March 2014}, language = {en}, ISBN = {978-1-4503-2705-3}, DOI = {10.1145/2557642.2578224}, reviewed = {1}, author = {Wirtz, Hanno and R{\"u}th, Jan and Zimmermann, Torsten and Ceriotti, Matteo and Wehrle, Klaus} } @Inproceedings { 2013-icnp-hummen-tailoring, title = {Tailoring End-to-End IP Security Protocols to the Internet of Things}, year = {2013}, month = {10}, day = {7}, pages = {1-10}, tags = {iotsec}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-hummen-tailoring.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {In Proceedings of the 21st IEEE International Conference on Network Protocols (ICNP 2013), G{\"o}ttingen, Germany}, event_place = {G{\"o}ttingen, Germany}, event_name = {21st IEEE International Conference on Network Protocols (ICNP 2013)}, event_date = {7-10 Oct. 2013}, language = {en}, ISBN = {978-1-4799-1270-4}, DOI = {10.1109/ICNP.2013.6733571}, reviewed = {1}, author = {Hummen, Ren{\'e} and Wirtz, Hanno and Ziegeldorf, Jan Henrik and Hiller, Jens and Wehrle, Klaus} } @Inproceedings { 2013-chants-wirtz-heaven, title = {Interest-based Cloud-facilitated Opportunistic Networking}, year = {2013}, month = {9}, day = {30}, pages = {1--8}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-CHANTS-heaven-wirtz.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks (CHANTS 2013), Miami, USA}, event_place = {Miami, USA}, event_name = {Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks (CHANTS 2013)}, event_date = {30 September 2013}, language = {en}, ISBN = {978-1-4503-2363-5}, DOI = {10.1145/2505494.2505504}, reviewed = {1}, author = {Wirtz, Hanno and R{\"u}th, Jan and Zimmermann, Torsten and Wehrle, Klaus} } @Inproceedings { 2013-wintech-bosling-models, title = {Fingerprinting Channel Dynamics in Indoor Low-Power Wireless Networks}, year = {2013}, month = {9}, day = {30}, pages = {65--72}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-bosling-wintech-fingerprint.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013), Miami, USA}, event_place = {Miami, USA}, event_name = {8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013)}, event_date = {30 September 2013}, language = {en}, DOI = {10.1145/2505469.2505477}, reviewed = {1}, author = {Bosling, Marcel and Ceriotti, Matteo and Zimmermann, Torsten and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Article { 2013-scn-ziegeldorf-iot-privacy, title = {Privacy in the Internet of Things: Threats and Challenges}, journal = {Security and Communication Networks - Special Issue on 'Security in a Completely Interconnected World'}, year = {2013}, month = {6}, day = {10}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-ziegeldorf-scn-privacy-in-the-iot.pdf}, misc2 = {Online}, publisher = {Wiley}, language = {en}, DOI = {10.1002/sec.795}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Garcia-Morchon, Oscar and Wehrle, Klaus} } @Conference { 2013-wowmom-punal-RFRA, title = {RFRA: Random Forests Rate Adaptation for Vehicular Networks}, year = {2013}, month = {6}, day = {4}, publisher = {IEEE}, booktitle = {Proceedings of the 14th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'13)}, event_place = {Madrid, Spain}, event_name = {WoWMoM}, event_date = {June, 2013}, state = {accepted}, author = {Pu{\~n}al, Oscar and Zhang, Hanzhi and Gross, James} } @Inproceedings { 2013-hummen-towards, title = {Towards Viable Certificate-based Authentication for the Web of Things}, year = {2013}, month = {4}, day = {19}, tags = {iotsec}, url = {fileadmin/papers/2013/2013-hummen-towards.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec '13)}, event_place = {Budapest, Hungary}, event_name = {2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy}, language = {en}, ISBN = {978-1-4503-2003-0}, DOI = {10.1145/2463183.2463193}, reviewed = {1}, author = {Hummen, Ren{\'e} and Ziegeldorf, Jan Henrik and Shafagh, Hossein and Raza, Shahid and Wehrle, Klaus} } @Inproceedings { 2013-wisec-garcia-securing, title = {Securing the IP-based Internet of Things with HIP and DTLS}, year = {2013}, month = {4}, pages = {119--124}, publisher = {ACM}, booktitle = {Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13) (short paper)}, ISBN = {978-1-4503-1998-0}, DOI = {10.1145/2462096.2462117}, reviewed = {1}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Moreno-Sanchez, Pedro and Vidal-Meca, Francisco and Ziegeldorf, Jan Henrik} } @Inproceedings { 2013-pitsac-vidalmeca-hip, title = {HIP security architecture for the IP-based Internet of Things}, year = {2013}, month = {3}, day = {25}, pages = {1331 - 1336}, abstract = {The IP-based Internet of Things refers to the pervasive interactions of smart objects and people enabling new applications by means of IP protocols. An application scenario is a Smart City in which the city infrastructure, cars, and people exchange information to enable new services. IP protocols, such as IPv6, TCP and HTTP will be further complemented by IPv6 over Low powerWireless Personal Area Networks and Constrained Application Protocol currently in development in IETF. Security and privacy are a must for the IP-based IoTs in order to ensure its acceptance. However, mobility, limited bandwidth, and resource-constrained devices pose new challenges and require for a sound and efficient security architecture. In particular, dynamic association of mobile smart objects and the management of keys in large-scale networks remain an open challenge. In this context, we propose a flexible security architecture based on the Host Identity Protocol and Multimedia Internet KEYing protocols allowing for secure network association and key management. HIP - based on asymmetric-key cryptography - ensures unambiguous thing identification, mobility support, as well as a lightweight and secure method for network association. In our solution, HIP is extended with MIKEY capabilities to provide enhanced key management using polynomials, which allow to generate pairwise keys with any node based on its identity. This combination of protocols and crypto-algorithms ensures both strong security and very good performance as shown by our implementation and presents clear advantages compared with other alternatives.}, keywords = {Internet of Things; Security; Network Access; Key Management}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2013}, event_place = {Barcelona, Spain}, event_date = {25.-28.03.2013}, language = {en}, DOI = {10.1109/WAINA.2013.158}, reviewed = {1}, author = {Vidal Meca, Francisco and Ziegeldorf, Jan Henrik and Garcia-Morchon, Oscar and Kumar, Sandeep S. and Keoh, Sye Loong and Moreno-Sanchez, Pedro} } @Conference { EW2013_parruca_gross, title = {On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems}, year = {2013}, pages = {8}, abstract = {In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models.}, keywords = {ICIC, proportional fair scheduling, power mask, resource block, scheduling, dynamic scheduling, inter cell interference coordination, LTE, OFDMA, WiMAX}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013_ICIC_parruca_grysla_gross.pdf}, web_url = {http://www.vde-verlag.de/proceedings-en/563498043.html}, editor = {vde-verlag}, publisher = {vde-verlag}, address = {http://www.vde-verlag.de/}, booktitle = {Proceedings: European Wireless 2013}, event_place = {Guildford, UK}, event_name = {2013 - 19th European Wireless Conference}, event_date = {04/16/2012 - 04/18/2013}, language = {English}, author = {Parruca, Donald and Grysla, Marius and M{\"a}h{\"o}nen, Petri and Petrova, Marina and Zhou, Han and Naghibi, Farshad and Gross, James} } @Inproceedings { 2012-hummen-seams, title = {SEAMS: A Signaling Layer for End-host-Assisted Middlebox Services}, year = {2012}, month = {6}, day = {25}, pages = {525--532}, url = {fileadmin/papers/2012/2012-hummen-seams.pdf}, booktitle = {Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12)}, organization = {IEEE}, event_place = {Liverpool, United Kingdom}, language = {en}, ISBN = {978-1-4673-2172-3}, DOI = {10.1109/TrustCom.2012.250}, reviewed = {1}, author = {Hummen, Ren{\'e} and Ziegeldorf, Jan Henrik and Heer, Tobias and Wirtz, Hanno and Wehrle, Klaus} } @Article { 2011-03-Zimmermann, title = {IP address assignment in wireless mesh networks}, journal = {Wireless Communications and Mobile Computing}, year = {2011}, month = {3}, volume = {11}, number = {3}, pages = {321-337}, misc2 = {Online}, publisher = {John Wiley \& Sons Ltd.}, address = {Hoboken, NJ, USA}, language = {en}, DOI = {10.1002/wcm.982}, reviewed = {1}, author = {Zimmermann, Alexander and Hannemann, Arnd and Schleinzer, Benjamin} } @Proceedings { 2009-aktas-maple-ModeldrivenSupportforSourceCodeVariabilityinAutomotiveSoftwareEngineering-Workshop, title = {Model-driven Support for Source Code Variability in Automotive Software Engineering}, year = {2009}, month = {8}, pages = {44-51}, abstract = {Variability on source code level in automotive soft- ware engineering is handled by C/C++ preprocessing directives. It provides fine-grained definition of variation points, but brings highly complex structures into the source code. The software gets more difficult to understand, to maintain and to integrate changes. Current approaches for modeling and managing vari- ability on source code do not consider the specific requirements of the automotive domain. To close this gap, we propose a model- driven approach to support software engineers in handling source code variability and configuration of software variants. For this purpose, a variability model is developed that is linked with the source code. Using this approach, a software engineer can shift work steps to the variability model in order to model and manage variation points and implement their variants in the source code.}, keywords = {automotive software engineering; programming; model-driven engineering; variability modeling;}, misc2 = {Online}, publisher = {CEUR}, booktitle = {1st International Workshop on Model-driven Approaches in Software Product Line Engineering (MAPLE), San Francisco, CA, USA}, ISSN = {1613-0073}, reviewed = {1}, author = {Mengi, Cem and Fu{\ss}, Christian and Zimmermann, Ruben and Aktas, Ismet} }