This file was created by the TYPO3 extension bib --- Timezone: CEST Creation date: 2024-04-19 Creation time: 13-58-23 --- Number of references 24 inproceedings 2018-bader-ethereum-car-insurance Smart Contract-based Car Insurance Policies 2018 12 9 mynedata, internet-of-production, rfc https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-bader-ethereum-car-insurance.pdf https://ieeexplore.ieee.org/document/8644136 IEEE 2018 IEEE Globecom Workshops (GC Wkshps) Abu Dhabi, United Arab Emirates 1st International Workshop on Blockchain in IoT, co-located with IEEE Globecom 2018 2018-12-09 10.1109/GLOCOMW.2018.8644136 1 LennartBader Jens ChristophBürger RomanMatzutt KlausWehrle proceedings 2018-QuicTesting Interoperability-Guided Testing of QUIC Implementations using Symbolic Execution 2018 12 4 erc,symbiosys https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rath-quictesting.pdf https://dl.acm.org/citation.cfm?id=3284853 https://arxiv.org/abs/1811.12099 ACM Heraklion, Greece EPIQ'18 Workshop Paper 4.12.2018 en 978-1-4503-6082-1 10.1145/3284850.3284853 1 FelixRath DanielSchemmel KlausWehrle inproceedings 2018-zimmermann-webready Is the Web ready for HTTP/2 Server Push? 2018 12 4 maki https://dl.acm.org/citation.cfm?id=3281434 https://arxiv.org/abs/1810.05554 https://http2.netray.io/interleaving.html ACM Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), Crete, Greete Crete, Greece CoNEXT 2018 4.12.18 - 7.12.18 en 10.1145/3281411.3281434 1 TorstenZimmermann BenediktWolters OliverHohlfeld KlausWehrle inproceedings 2018-ziegeldorf-shield SHIELD: A Framework for Efficient and Secure Machine Learning Classification in Constrained Environments 2018 12 1-15 iop,mynedata https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-ziegeldorf-acsac-shield.pdf ACM
New York, NY, USA
Proceedings of the 34rd Annual Computer Security Applications Conference San Juan, Puerto Rico, USA The 34rd Annual Computer Security Applications Conference (ACSAC 2018) 2018-12-03 - 2018-12-07 English 10.1145/3274694.3274716 1 Jan HenrikZiegeldorf JanMetzke KlausWehrle
inproceedings 2018-rueth-mining Digging into Browser-based Crypto Mining 2018 10 31 maki,internet-measurements http://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-mining.pdf https://arxiv.org/abs/1808.00811 ACM Proceedings of the Internet Measurement Conference (IMC '18) Boston, US Internet Measurement Conference 2018 31.10.18 - 2.11.18 en 10.1145/3278532.3278539 1 JanRüth TorstenZimmermann KonradWolsing OliverHohlfeld article 2018-stoffers-on-automated-memoization On Automated Memoization in the Field of Simulation Parameter Studies ACM Transactions on Modeling and Computer Simulation (TOMACS) 2018 10 28 4 Article 26 26:1-26:25 memosim,symbiosys file:2213 10.1145/3186316 1 MirkoStoffers DanielSchemmel OscarSoria Dustmann KlausWehrle inproceedings 2018-hiller-lcn-lowlatencyiiot Secure Low Latency Communication for Constrained Industrial IoT Scenarios 2018 10 connect,iop,nerd-nrw https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hiller-lcn-secure_low_latency_communication_iiot.pdf IEEE 43rd IEEE Conference on Local Computer Networks (LCN), Chicago, USA Chicago, USA 43nd IEEE Conference on Local Computer Networks (LCN) October 1-4, 2018 en 978-1-5386-4413-3 10.1109/LCN.2018.8638027 1 JensHiller MartinHenze MartinSerror EricWagner Jan NiklasRichter KlausWehrle inproceedings 2018-hohlfeld-santa Application-Agnostic Offloading of Datagram Processing 2018 9 3 maki,ssiclops,reflexes https://ieeexplore.ieee.org/document/8493053 IEEE Proceedings of the 2018 30th International Teletraffic Congress (ITC 30), Vienna, Austria Vienna, Austria International Teletraffic Congress ITC 30 03.09.2018 - 07-09.2018 en 10.1109/ITC30.2018.00015 1 OliverHohlfeld Jens HelgeReelfs JanRüth FlorianSchmidt TorstenZimmermann JensHiller KlausWehrle inproceedings 2018-soria-dustmann-parti PARTI: A Multi-interval Theory Solver for Symbolic Execution 2018 9 symbiosys file:2195 Proceedings of the 2018 Conference on Automated Software Engineering (ASE'18) 10.1145/3238147.3238179 1 OscarSoria Dustmann KlausWehrle CristianCadar inproceedings 2018-serror-ares-iotsec Towards In-Network Security for Smart Homes 2018 8 27 consent, iotrust https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-serror-iotsecfor-in-network-security.pdf ACM online Proceedings of the 2nd International Workshop on Security and Forensics of IoT (IoT-SECFOR), co-located with the 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany Hamburg, Germany International Conference on Availability, Reliability and Security August 27--30, 2018 978-1-4503-6448-5 10.1145/3230833.3232802 1 MartinSerror MartinHenze SachaHack MarkoSchuba KlausWehrle inproceedings 2018-krude-circuit Circuit Switched VM Networks for Zero-Copy IO 2018 8 20 1-7 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-krude-xocks.pdf ACM Proceedings of the 2018 Afternoon Workshop on Kernel Bypassing Networks (KBNets'18) Budapest, Hungary Afternoon Workshop on Kernel Bypassing Networks 20.8.2018 10.1145/3229538.3229539 1 JohannesKrude MirkoStoffers KlausWehrle inproceedings 2018-rueth-reflexnetcompute Towards In-Network Industrial Feedback Control 2018 8 20 reflexes https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-reflexnetcompute.pdf ACM Proceedings of the ACM SIGCOMM 2018 1st Workshop on In-Network Computing (NetCompute '18) Budapest, Hungary ACM SIGCOMM 2018 1st Workshop on In-Network Computing (NetCompute 2018) 20.08.2018 10.1145/3229591.3229592 1 JanRüth RenéGlebke KlausWehrle VedadCausevic SandraHirche inproceedings 2018-cav-schemmel-liveness Symbolic Liveness Analysis of Real-World Software 2018 7 14 symbiosys https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-schemmel-symbolic-liveness-analysis-of-real-world-software.pdf Computer Aided Verification (CAV 2018) Oxford, Great Britain 30th International Conference on Computer Aided Verification 2018-07-14 to 2018-07-17 en 10.1007/978-3-319-96142-2_27 1 DanielSchemmel JulianBüning OscarSoria Dustmann ThomasNoll KlausWehrle article 2018-serror-tvt-fb Finite Blocklength Performance of Cooperative Multi-Terminal Wireless Industrial Networks IEEE Transactions on Vehicular Technology 2018 7 67 7 5778-5792 koi https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-serror-tvt-fbl-performance.pdf IEEE online 0018-9545 10.1109/TVT.2018.2794178 1 YulinHu MartinSerror KlausWehrle JamesGross inproceedings 2018-serror-wowmom-relaying Practical Evaluation of Cooperative Communication for Ultra-Reliability and Low-Latency 2018 6 11 iop https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-serror-wowmom-relaying.pdf IEEE online 19th IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (IEEE WoWMoM 2018), Chania, Greece Chania, Crete, Greece WoWMoM June 12-15, 2018 978-1-5386-4725-7 10.1109/WoWMoM.2018.8449807 1 MartinSerror SebastianVaaßen KlausWehrle JamesGross inproceedings 2018-hiller-ic2e-cpplintegration Giving Customers Control over Their Data: Integrating a Policy Language into the Cloud 2018 4 19 241-249 ssiclops,iop https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hiller-ic2e-policy-aware-cloud.pdf https://ieeexplore.ieee.org/document/8360335 IEEE Proceedings of the 2018 IEEE International Conference on Cloud Engineering (IC2E 2018), Orlando, Florida, USA Orlando, Florida, USA 2018 IEEE International Conference on Cloud Engineering (IC2E 2018) 2018-04-19 978-1-5386-5008-0 10.1109/IC2E.2018.00050 1 JensHiller MaelKimmerlin MaxPlauth SeppoHeikkila StefanKlauck VilleLindfors FelixEberhardt DariuszBursztynowski Jesus LlorenteSantos OliverHohlfeld KlausWehrle inproceedings 2018-matzutt-bitcoin-content-countermeasures Thwarting Unwanted Blockchain Content Insertion 2018 4 17 364-370 Since the introduction of Bitcoin in 2008, blockchain systems have seen an enormous increase in adoption. By providing a persistent, distributed, and append-only ledger, blockchains enable numerous applications such as distributed consensus, robustness against equivocation, and smart contracts. However, recent studies show that blockchain systems such as Bitcoin can be (mis)used to store arbitrary content. This has already been used to store arguably objectionable content on Bitcoin's blockchain. Already single instances of clearly objectionable or even illegal content can put the whole system at risk by making its node operators culpable. To overcome this imminent risk, we survey and discuss the design space of countermeasures against the insertion of such objectionable content. Our analysis shows a wide spectrum of potential countermeasures, which are often combinable for increased efficiency. First, we investigate special-purpose content detectors as an ad hoc mitigation. As they turn out to be easily evadable, we also investigate content-agnostic countermeasures. We find that mandatory minimum fees as well as mitigation of transaction manipulability via identifier commitments significantly raise the bar for inserting harmful content into a blockchain. Bitcoin,blockchain,security,objectionable content,countermeasure mynedata,iop https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-matzutt-blockchain-contents-countermeasures.pdf https://ieeexplore.ieee.org/document/8360355 IEEE Proceedings of the First IEEE Workshop on Blockchain Technologies and Applications (BTA), co-located with the IEEE International Conference on Cloud Engineering 2018 (IC2E 2018) Orlando, Florida, USA First IEEE Workshop on Blockchain Technologies and Applications (BTA) 2018-04-17 English 978-1-5386-5008-0 10.1109/IC2E.2018.00070 1 RomanMatzutt MartinHenze Jan HenrikZiegeldorf JensHiller KlausWehrle inproceedings 2018-rueth-reflexdemo Demo: Towards In-Network Processing for Low-Latency Industrial Control 2018 4 15 reflexes https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-reflexdemo.pdf IEEE Computer Society In Proceedings of IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Honolulu, HI, USA International Conference on Computer Communications (INFOCOM) 15.04.2018 - 19.04.2018 en 10.1109/INFCOMW.2018.8406844 1 JanRüth RenéGlebke TanjaUlmen KlausWehrle inproceedings 2018-cpsbench-schemmel-equiv Towards Benchmark Optimization by Automated Equivalence Detection 2018 4 10 symbiosys,reflexes file:2196 Proceedings of the 1st Workshop on Benchmarking Cyber-Physical Networks and Systems (CPSBench'18) Porto, Portugal 1st Workshop on Benchmarking Cyber-Physical Networks and Systems 2018-04-10 978-1-5386-6742-2 10.1109/CPSBench.2018.00011 1 DanielSchemmel RenéGlebke MirkoStoffers KlausWehrle inproceedings 2018-tzimmermann-metacdn Characterizing a Meta-CDN 2018 3 26 114-128 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hohlfeld-metacdn.pdf https://arxiv.org/abs/1803.09990 Springer, Cham In Proceedings of the Passive and Active Measurement Conference (PAM '18) Berlin, Germany Passive and Active Measurement Conference (PAM 2018) 26.3.2018 - 27.3.2018 en 978-3-319-76480-1 10.1007/978-3-319-76481-8_9 1 OliverHohlfeld JanRüth KonradWolsing TorstenZimmermann article 2016-fgcs-ziegeldorf-bitcoin Secure and anonymous decentralized Bitcoin mixing Future Generation Computer Systems 2018 3 80 448-466 Pseudonymity, anonymity, and untraceability rfc https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-ziegeldorf-fgcs-bitcoin.pdf Online Elsevier en 0167-739X 10.1016/j.future.2016.05.018 1 Jan HenrikZiegeldorf RomanMatzutt MartinHenze FredGrossmann KlausWehrle inproceedings 2018-matzutt-bitcoin-content A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin 2018 2 26 Blockchains primarily enable credible accounting of digital events, e.g., money transfers in cryptocurrencies. However, beyond this original purpose, blockchains also irrevocably record arbitrary data, ranging from short messages to pictures. This does not come without risk for users as each participant has to locally replicate the complete blockchain, particularly including potentially harmful content. We provide the first systematic analysis of the benefits and threats of arbitrary blockchain content. Our analysis shows that certain content, e.g., illegal pornography, can render the mere possession of a blockchain illegal. Based on these insights, we conduct a thorough quantitative and qualitative analysis of unintended content on Bitcoin's blockchain. Although most data originates from benign extensions to Bitcoin's protocol, our analysis reveals more than 1600 files on the blockchain, over 99% of which are texts or images. Among these files there is clearly objectionable content such as links to child pornography, which is distributed to all Bitcoin participants. With our analysis, we thus highlight the importance for future blockchain designs to address the possibility of unintended data insertion and protect blockchain users accordingly. mynedata https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018_matzutt_bitcoin-contents_preproceedings-version.pdf 2018-01-07 Online Springer Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Curaçao Nieuwpoort, Curaçao Financial Cryptography and Data Security 2018 en 10.1007/978-3-662-58387-6_23 1 RomanMatzutt JensHiller MartinHenze Jan HenrikZiegeldorf DirkMüllmann OliverHohlfeld KlausWehrle inproceedings 2018-tzimmermann-split SPLIT: Smart Protocol Loading for the IoT 2018 2 14 iop https://jenshiller.com/publication/2018-zimmermann-ewsn-split/2018-zimmermann-ewsn-split.pdf https://dl.acm.org/citation.cfm?id=3234847.3234854 ACM Proceedings of the 15th European Conference on Wireless Sensor Networks (EWSN 2018), Madrid, Spain Madrid, Spain European Conference on Wireless Sensor Networks (EWSN 2018) 14.2.2018 - 16.2.2018 en 978-0-9949886-2-1 1 TorstenZimmermann JensHiller Jens HelgeReelfs PascalHein KlausWehrle inproceedings 2018-dedin-energy-packets A new solution for the Energy Packet-based Dispatching using power/signal dual modulation 2018 Proceedings of the Ninth International Conference on Future Energy Systems (ACM e-Energy '18) Karlsruhe, Germany Ninth International Conference on Future Energy Systems 2018-06-15 10.1145/3208903.3208931 1 EdoardoDe Din AntonelloMonti VeitHagenmeyer KlausWehrle