% % This file was created by the TYPO3 extension % bib % --- Timezone: UTC % Creation date: 2024-12-05 % Creation time: 19-34-49 % --- Number of references % 22 % @Inproceedings { 2018-bader-ethereum-car-insurance, title = {Smart Contract-based Car Insurance Policies}, year = {2018}, month = {12}, day = {9}, tags = {mynedata, internet-of-production, rfc}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-bader-ethereum-car-insurance.pdf}, web_url = {https://ieeexplore.ieee.org/document/8644136}, publisher = {IEEE}, booktitle = {2018 IEEE Globecom Workshops (GC Wkshps)}, event_place = {Abu Dhabi, United Arab Emirates}, event_name = {1st International Workshop on Blockchain in IoT, co-located with IEEE Globecom 2018}, event_date = {2018-12-09}, DOI = {10.1109/GLOCOMW.2018.8644136}, reviewed = {1}, author = {Bader, Lennart and B{\"u}rger, Jens Christoph and Matzutt, Roman and Wehrle, Klaus} } @Proceedings { 2018-QuicTesting, title = {Interoperability-Guided Testing of QUIC Implementations using Symbolic Execution}, year = {2018}, month = {12}, day = {4}, tags = {erc,symbiosys}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rath-quictesting.pdf}, web_url = {https://dl.acm.org/citation.cfm?id=3284853}, web_url2 = {https://arxiv.org/abs/1811.12099}, publisher = {ACM}, event_place = {Heraklion, Greece}, event_name = {EPIQ'18 Workshop Paper}, event_date = {4.12.2018}, language = {en}, ISBN = {978-1-4503-6082-1}, DOI = {10.1145/3284850.3284853}, reviewed = {1}, author = {Rath, Felix and Schemmel, Daniel and Wehrle, Klaus} } @Inproceedings { 2018-zimmermann-webready, title = {Is the Web ready for HTTP/2 Server Push?}, year = {2018}, month = {12}, day = {4}, tags = {maki}, url = {https://dl.acm.org/citation.cfm?id=3281434}, web_url = {https://arxiv.org/abs/1810.05554}, web_url2 = {https://http2.netray.io/interleaving.html}, publisher = {ACM}, booktitle = {Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), Crete, Greete}, event_place = {Crete, Greece}, event_name = {CoNEXT 2018}, event_date = {4.12.18 - 7.12.18}, language = {en}, DOI = {10.1145/3281411.3281434}, reviewed = {1}, author = {Zimmermann, Torsten and Wolters, Benedikt and Hohlfeld, Oliver and Wehrle, Klaus} } @Inproceedings { 2018-ziegeldorf-shield, title = {SHIELD: A Framework for Efficient and Secure Machine Learning Classification in Constrained Environments}, year = {2018}, month = {12}, pages = {1-15}, tags = {iop,mynedata}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-ziegeldorf-acsac-shield.pdf}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 34rd Annual Computer Security Applications Conference}, event_place = {San Juan, Puerto Rico, USA}, event_name = {The 34rd Annual Computer Security Applications Conference (ACSAC 2018)}, event_date = {2018-12-03 - 2018-12-07}, language = {English}, DOI = {10.1145/3274694.3274716}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Metzke, Jan and Wehrle, Klaus} } @Article { 2018-stoffers-on-automated-memoization, title = {On Automated Memoization in the Field of Simulation Parameter Studies}, journal = {ACM Transactions on Modeling and Computer Simulation (TOMACS)}, year = {2018}, month = {10}, volume = {28}, number = {4}, number2 = {Article 26}, pages = {26:1-26:25}, tags = {memosim,symbiosys}, url = {file:2213}, DOI = {10.1145/3186316}, reviewed = {1}, author = {Stoffers, Mirko and Schemmel, Daniel and Soria Dustmann, Oscar and Wehrle, Klaus} } @Inproceedings { 2018-hiller-lcn-lowlatencyiiot, title = {Secure Low Latency Communication for Constrained Industrial IoT Scenarios}, year = {2018}, month = {10}, tags = {connect,iop,nerd-nrw}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hiller-lcn-secure_low_latency_communication_iiot.pdf}, publisher = {IEEE}, booktitle = {43rd IEEE Conference on Local Computer Networks (LCN), Chicago, USA}, event_place = {Chicago, USA}, event_name = {43nd IEEE Conference on Local Computer Networks (LCN)}, event_date = {October 1-4, 2018}, language = {en}, ISBN = {978-1-5386-4413-3}, DOI = {10.1109/LCN.2018.8638027}, reviewed = {1}, author = {Hiller, Jens and Henze, Martin and Serror, Martin and Wagner, Eric and Richter, Jan Niklas and Wehrle, Klaus} } @Inproceedings { 2018-hohlfeld-santa, title = {Application-Agnostic Offloading of Datagram Processing}, year = {2018}, month = {9}, day = {3}, tags = {maki,ssiclops,reflexes}, url = {https://ieeexplore.ieee.org/document/8493053}, publisher = {IEEE}, booktitle = {Proceedings of the 2018 30th International Teletraffic Congress (ITC 30), Vienna, Austria}, event_place = {Vienna, Austria}, event_name = {International Teletraffic Congress ITC 30}, event_date = {03.09.2018 - 07-09.2018}, language = {en}, DOI = {10.1109/ITC30.2018.00015}, reviewed = {1}, author = {Hohlfeld, Oliver and Reelfs, Jens Helge and R{\"u}th, Jan and Schmidt, Florian and Zimmermann, Torsten and Hiller, Jens and Wehrle, Klaus} } @Inproceedings { 2018-soria-dustmann-parti, title = {PARTI: A Multi-interval Theory Solver for Symbolic Execution}, year = {2018}, month = {9}, tags = {symbiosys}, url = {file:2195}, booktitle = {Proceedings of the 2018 Conference on Automated Software Engineering (ASE'18)}, DOI = {10.1145/3238147.3238179}, reviewed = {1}, author = {Soria Dustmann, Oscar and Wehrle, Klaus and Cadar, Cristian} } @Inproceedings { 2018-serror-ares-iotsec, title = {Towards In-Network Security for Smart Homes}, year = {2018}, month = {8}, day = {27}, tags = {consent, iotrust}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-serror-iotsecfor-in-network-security.pdf}, publisher = {ACM}, howpublished = {online}, booktitle = {Proceedings of the 2nd International Workshop on Security and Forensics of IoT (IoT-SECFOR), co-located with the 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany}, event_place = {Hamburg, Germany}, event_name = {International Conference on Availability, Reliability and Security}, event_date = {August 27--30, 2018}, ISBN = {978-1-4503-6448-5}, DOI = {10.1145/3230833.3232802}, reviewed = {1}, author = {Serror, Martin and Henze, Martin and Hack, Sacha and Schuba, Marko and Wehrle, Klaus} } @Inproceedings { 2018-krude-circuit, title = {Circuit Switched VM Networks for Zero-Copy IO}, year = {2018}, month = {8}, day = {20}, pages = {1-7}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-krude-xocks.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 2018 Afternoon Workshop on Kernel Bypassing Networks (KBNets'18)}, event_place = {Budapest, Hungary}, event_name = {Afternoon Workshop on Kernel Bypassing Networks}, event_date = {20.8.2018}, DOI = {10.1145/3229538.3229539}, reviewed = {1}, author = {Krude, Johannes and Stoffers, Mirko and Wehrle, Klaus} } @Inproceedings { 2018-rueth-reflexnetcompute, title = {Towards In-Network Industrial Feedback Control}, year = {2018}, month = {8}, day = {20}, tags = {reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-reflexnetcompute.pdf}, publisher = {ACM}, booktitle = {Proceedings of the ACM SIGCOMM 2018 1st Workshop on In-Network Computing (NetCompute '18)}, event_place = {Budapest, Hungary}, event_name = {ACM SIGCOMM 2018 1st Workshop on In-Network Computing (NetCompute 2018)}, event_date = {20.08.2018}, DOI = {10.1145/3229591.3229592}, reviewed = {1}, author = {R{\"u}th, Jan and Glebke, Ren{\'e} and Wehrle, Klaus and Causevic, Vedad and Hirche, Sandra} } @Inproceedings { 2018-cav-schemmel-liveness, title = {Symbolic Liveness Analysis of Real-World Software}, year = {2018}, month = {7}, day = {14}, tags = {symbiosys}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-schemmel-symbolic-liveness-analysis-of-real-world-software.pdf}, booktitle = {Computer Aided Verification (CAV 2018)}, event_place = {Oxford, Great Britain}, event_name = {30th International Conference on Computer Aided Verification}, event_date = {2018-07-14 to 2018-07-17}, language = {en}, DOI = {10.1007/978-3-319-96142-2_27}, reviewed = {1}, author = {Schemmel, Daniel and B{\"u}ning, Julian and Soria Dustmann, Oscar and Noll, Thomas and Wehrle, Klaus} } @Article { 2018-serror-tvt-fb, title = {Finite Blocklength Performance of Cooperative Multi-Terminal Wireless Industrial Networks}, journal = {IEEE Transactions on Vehicular Technology}, year = {2018}, month = {7}, volume = {67}, number = {7}, pages = {5778-5792}, tags = {koi}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-serror-tvt-fbl-performance.pdf}, publisher = {IEEE}, howpublished = {online}, ISSN = {0018-9545}, DOI = {10.1109/TVT.2018.2794178}, reviewed = {1}, author = {Hu, Yulin and Serror, Martin and Wehrle, Klaus and Gross, James} } @Inproceedings { 2018-serror-wowmom-relaying, title = {Practical Evaluation of Cooperative Communication for Ultra-Reliability and Low-Latency}, year = {2018}, month = {6}, day = {11}, tags = {iop}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-serror-wowmom-relaying.pdf}, publisher = {IEEE}, howpublished = {online}, booktitle = {19th IEEE International Symposium on ''A World of Wireless, Mobile and Multimedia Networks'' (IEEE WoWMoM 2018), Chania, Greece}, event_place = {Chania, Crete, Greece}, event_name = {WoWMoM}, event_date = {June 12-15, 2018}, ISBN = {978-1-5386-4725-7}, DOI = {10.1109/WoWMoM.2018.8449807}, reviewed = {1}, author = {Serror, Martin and Vaa{\ss}en, Sebastian and Wehrle, Klaus and Gross, James} } @Inproceedings { 2018-hiller-ic2e-cpplintegration, title = {Giving Customers Control over Their Data: Integrating a Policy Language into the Cloud}, year = {2018}, month = {4}, day = {19}, pages = {241-249}, tags = {ssiclops,iop}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hiller-ic2e-policy-aware-cloud.pdf}, web_url = {https://ieeexplore.ieee.org/document/8360335}, publisher = {IEEE}, booktitle = {Proceedings of the 2018 IEEE International Conference on Cloud Engineering (IC2E 2018), Orlando, Florida, USA}, event_place = {Orlando, Florida, USA}, event_name = {2018 IEEE International Conference on Cloud Engineering (IC2E 2018)}, event_date = {2018-04-19}, ISBN = {978-1-5386-5008-0}, DOI = {10.1109/IC2E.2018.00050}, reviewed = {1}, author = {Hiller, Jens and Kimmerlin, Mael and Plauth, Max and Heikkila, Seppo and Klauck, Stefan and Lindfors, Ville and Eberhardt, Felix and Bursztynowski, Dariusz and Santos, Jesus Llorente and Hohlfeld, Oliver and Wehrle, Klaus} } @Inproceedings { 2018-matzutt-bitcoin-content-countermeasures, title = {Thwarting Unwanted Blockchain Content Insertion}, year = {2018}, month = {4}, day = {17}, pages = {364-370}, abstract = {Since the introduction of Bitcoin in 2008, blockchain systems have seen an enormous increase in adoption. By providing a persistent, distributed, and append-only ledger, blockchains enable numerous applications such as distributed consensus, robustness against equivocation, and smart contracts. However, recent studies show that blockchain systems such as Bitcoin can be (mis)used to store arbitrary content. This has already been used to store arguably objectionable content on Bitcoin's blockchain. Already single instances of clearly objectionable or even illegal content can put the whole system at risk by making its node operators culpable. To overcome this imminent risk, we survey and discuss the design space of countermeasures against the insertion of such objectionable content. Our analysis shows a wide spectrum of potential countermeasures, which are often combinable for increased efficiency. First, we investigate special-purpose content detectors as an ad hoc mitigation. As they turn out to be easily evadable, we also investigate content-agnostic countermeasures. We find that mandatory minimum fees as well as mitigation of transaction manipulability via identifier commitments significantly raise the bar for inserting harmful content into a blockchain.}, keywords = {Bitcoin,blockchain,security,objectionable content,countermeasure}, tags = {mynedata,iop}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-matzutt-blockchain-contents-countermeasures.pdf}, web_url = {https://ieeexplore.ieee.org/document/8360355}, publisher = {IEEE}, booktitle = {Proceedings of the First IEEE Workshop on Blockchain Technologies and Applications (BTA), co-located with the IEEE International Conference on Cloud Engineering 2018 (IC2E 2018)}, event_place = {Orlando, Florida, USA}, event_name = {First IEEE Workshop on Blockchain Technologies and Applications (BTA)}, event_date = {2018-04-17}, language = {English}, ISBN = {978-1-5386-5008-0}, DOI = {10.1109/IC2E.2018.00070}, reviewed = {1}, author = {Matzutt, Roman and Henze, Martin and Ziegeldorf, Jan Henrik and Hiller, Jens and Wehrle, Klaus} } @Inproceedings { 2018-rueth-reflexdemo, title = {Demo: Towards In-Network Processing for Low-Latency Industrial Control}, year = {2018}, month = {4}, day = {15}, tags = {reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-reflexdemo.pdf}, publisher = {IEEE Computer Society}, booktitle = {In Proceedings of IEEE INFOCOM 2018 - IEEE Conference on Computer Communications}, event_place = {Honolulu, HI, USA}, event_name = {International Conference on Computer Communications (INFOCOM)}, event_date = {15.04.2018 - 19.04.2018}, language = {en}, DOI = {10.1109/INFCOMW.2018.8406844}, reviewed = {1}, author = {R{\"u}th, Jan and Glebke, Ren{\'e} and Ulmen, Tanja and Wehrle, Klaus} } @Inproceedings { 2018-cpsbench-schemmel-equiv, title = {Towards Benchmark Optimization by Automated Equivalence Detection}, year = {2018}, month = {4}, day = {10}, tags = {symbiosys,reflexes}, url = {file:2196}, booktitle = {Proceedings of the 1st Workshop on Benchmarking Cyber-Physical Networks and Systems (CPSBench'18)}, event_place = {Porto, Portugal}, event_name = {1st Workshop on Benchmarking Cyber-Physical Networks and Systems}, event_date = {2018-04-10}, ISBN = {978-1-5386-6742-2}, DOI = {10.1109/CPSBench.2018.00011}, reviewed = {1}, author = {Schemmel, Daniel and Glebke, Ren{\'e} and Stoffers, Mirko and Wehrle, Klaus} } @Article { 2016-fgcs-ziegeldorf-bitcoin, title = {Secure and anonymous decentralized Bitcoin mixing}, journal = {Future Generation Computer Systems}, year = {2018}, month = {3}, volume = {80}, pages = {448-466}, keywords = {Pseudonymity, anonymity, and untraceability}, tags = {rfc}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-ziegeldorf-fgcs-bitcoin.pdf}, misc2 = {Online}, publisher = {Elsevier}, language = {en}, ISSN = {0167-739X}, DOI = {10.1016/j.future.2016.05.018}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Matzutt, Roman and Henze, Martin and Grossmann, Fred and Wehrle, Klaus} } @Inproceedings { 2018-matzutt-bitcoin-content, title = {A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin}, year = {2018}, month = {2}, day = {26}, abstract = {Blockchains primarily enable credible accounting of digital events, e.g., money transfers in cryptocurrencies. However, beyond this original purpose, blockchains also irrevocably record arbitrary data, ranging from short messages to pictures. This does not come without risk for users as each participant has to locally replicate the complete blockchain, particularly including potentially harmful content. We provide the first systematic analysis of the benefits and threats of arbitrary blockchain content. Our analysis shows that certain content, e.g., illegal pornography, can render the mere possession of a blockchain illegal. Based on these insights, we conduct a thorough quantitative and qualitative analysis of unintended content on Bitcoin's blockchain. Although most data originates from benign extensions to Bitcoin's protocol, our analysis reveals more than 1600 files on the blockchain, over 99\% of which are texts or images. Among these files there is clearly objectionable content such as links to child pornography, which is distributed to all Bitcoin participants. With our analysis, we thus highlight the importance for future blockchain designs to address the possibility of unintended data insertion and protect blockchain users accordingly.}, tags = {mynedata}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018_matzutt_bitcoin-contents_preproceedings-version.pdf}, web_url_date = {2018-01-07}, misc2 = {Online}, publisher = {Springer}, booktitle = {Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Cura\c{c}ao}, event_place = {Nieuwpoort, Cura\c{c}ao}, event_name = {Financial Cryptography and Data Security 2018}, language = {en}, DOI = {10.1007/978-3-662-58387-6_23}, reviewed = {1}, author = {Matzutt, Roman and Hiller, Jens and Henze, Martin and Ziegeldorf, Jan Henrik and M{\"u}llmann, Dirk and Hohlfeld, Oliver and Wehrle, Klaus} } @Inproceedings { 2018-tzimmermann-split, title = {SPLIT: Smart Protocol Loading for the IoT}, year = {2018}, month = {2}, day = {14}, tags = {iop}, url = {https://jenshiller.com/publication/2018-zimmermann-ewsn-split/2018-zimmermann-ewsn-split.pdf}, web_url = {https://dl.acm.org/citation.cfm?id=3234847.3234854}, publisher = {ACM}, booktitle = {Proceedings of the 15th European Conference on Wireless Sensor Networks (EWSN 2018), Madrid, Spain}, event_place = {Madrid, Spain}, event_name = {European Conference on Wireless Sensor Networks (EWSN 2018)}, event_date = {14.2.2018 - 16.2.2018}, language = {en}, ISBN = {978-0-9949886-2-1}, reviewed = {1}, author = {Zimmermann, Torsten and Hiller, Jens and Reelfs, Jens Helge and Hein, Pascal and Wehrle, Klaus} } @Inproceedings { 2018-dedin-energy-packets, title = {A new solution for the Energy Packet-based Dispatching using power/signal dual modulation}, year = {2018}, booktitle = {Proceedings of the Ninth International Conference on Future Energy Systems (ACM e-Energy '18)}, event_place = {Karlsruhe, Germany}, event_name = {Ninth International Conference on Future Energy Systems}, event_date = {2018-06-15}, DOI = {10.1145/3208903.3208931}, reviewed = {1}, author = {De Din, Edoardo and Monti, Antonello and Hagenmeyer, Veit and Wehrle, Klaus} }