This file was created by the TYPO3 extension
bib
--- Timezone: CEST
Creation date: 2024-04-20
Creation time: 13-48-45
--- Number of references
24
inproceedings
2019-krude-online-reprogramming
Online Reprogrammable Multi Tenant Switches
2019
12
9
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-krude-online-reprogramming.pdf
ACM
1st ACM CoNEXT Workshop on Emerging in-Network Computing Paradigms (ENCP '19)
978-1-4503-7000-4/19/12
10.1145/3359993.3366643
1
JohannesKrude
JacoHofmann
MatthiasEichholz
KlausWehrle
AndreasKoch
MiraMezini
inproceedings
2019-glebke-in-network-cv
Towards Executing Computer Vision Functionality on Programmable Network Devices
2019
12
9
reflexes,maki,internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-glebke-in-network-cv.pdf
Online
ACM
1st ACM CoNEXT Workshop on Emerging in-Network Computing Paradigms (ENCP '19)
en
978-1-4503-7000-4/19/12
10.1145/3359993.3366646
1
RenéGlebke
JohannesKrude
IkeKunze
JanRüth
FelixSenger
KlausWehrle
inproceedings
2019_pennekamp_securityConsiderations
Security Considerations for Collaborations in an Industrial IoT-based Lab of Labs
2019
12
4
The productivity and sustainability advances for (smart) manufacturing resulting from (globally) interconnected Industrial IoT devices in a lab of labs are expected to be significant. While such visions introduce opportunities for the involved parties, the associated risks must be considered as well. In particular, security aspects are crucial challenges and remain unsolved. So far, single stakeholders only had to consider their local view on security. However, for a global lab, we identify several fundamental research challenges in (dynamic) scenarios with multiple stakeholders: While information security mandates that models must be adapted wrt. confidentiality to address these new influences on business secrets, from a network perspective, the drastically increasing amount of possible attack vectors challenges today's approaches. Finally, concepts addressing these security challenges should provide backwards compatibility to enable a smooth transition from today's isolated landscape towards globally interconnected IIoT environments.
secure industrial collaboration; interconnected cyber-physical systems; stakeholders; Internet of Production
internet-of-production; iotrust
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-security-considerations.pdf
IEEE
Proceedings of the 3rd IEEE Global Conference on Internet of Things (GCIoT '19), December 4–7, 2019, Dubai, United Arab Emirates
Dubai, United Arab Emirates
December 4–7, 2019
978-1-7281-4873-1
10.1109/GCIoT47977.2019.9058413
1
JanPennekamp
MarkusDahlmanns
LarsGleim
StefanDecker
KlausWehrle
inproceedings
2019-rueth-quic-userstudy
Perceiving QUIC: Do Users Notice or Even Care?
2019
12
maki,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-quic-userstudy.pdf
https://arxiv.org/abs/1910.07729
ACM
In Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '19)
Orlando, Florida, USA
International Conference on emerging Networking EXperiments and Technologies
9.12.2019-12.12.2019
10.1145/3359989.3365416
1
JanRüth
KonradWolsing
KlausWehrle
OliverHohlfeld
article
2019-unterberg-matclass
In-situ material classification in sheet-metal blanking using deep convolutional neural networks
Production Engineering
2019
11
13
13
6
743-749
internet-of-production
10.1007/s11740-019-00928-w
1
MartinUnterberg
PhillipNiemietz
DanielTrauth
KlausWehrle
ThomasBergs
inproceedings
2019_delacadena_countermeasure
POSTER: Traffic Splitting to Counter Website Fingerprinting
2019
11
12
2533-2535
Website fingerprinting (WFP) is a special type of traffic analysis, which aims to infer the websites visited by a user. Recent studies have shown that WFP targeting Tor users is notably more effective than previously expected. Concurrently, state-of-the-art defenses have been proven to be less effective. In response, we present a novel WFP defense that splits traffic over multiple entry nodes to limit the data a single malicious entry can use. Here, we explore several traffic-splitting strategies to distribute user traffic. We establish that our weighted random strategy dramatically reduces the accuracy from nearly 95% to less than 35% for four state-of-the-art WFP attacks without adding any artificial delays or dummy traffic.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-delacadena-splitting-defense.pdf
ACM
Proceedings of the 26th ACM SIGSAC Conference on Computer and Communications Security (CCS '19), November 11-15, 2019, London, United Kingdom
London, United Kingdom
November 11-15, 2019
978-1-4503-6747-9/19/11
10.1145/3319535.3363249
1
WladimirDe la Cadena
AsyaMitseva
JanPennekamp
JensHiller
FabianLanze
ThomasEngel
KlausWehrle
AndriyPanchenko
inproceedings
2019_pennekamp_dataflows
Dataflow Challenges in an Internet of Production: A Security & Privacy Perspective
2019
11
11
27-38
The Internet of Production (IoP) envisions the interconnection of previously isolated CPS in the area of manufacturing across institutional boundaries to realize benefits such as increased profit margins and product quality as well as reduced product development costs and time to market. This interconnection of CPS will lead to a plethora of new dataflows, especially between (partially) distrusting entities. In this paper, we identify and illustrate these envisioned inter-organizational dataflows and the participating entities alongside two real-world use cases from the production domain: a fine blanking line and a connected job shop. Our analysis allows us to identify distinct security and privacy demands and challenges for these new dataflows. As a foundation to address the resulting requirements, we provide a survey of promising technical building blocks to secure inter-organizational dataflows in an IoP and propose next steps for future research. Consequently, we move an important step forward to overcome security and privacy concerns as an obstacle for realizing the promised potentials in an Internet of Production.
Internet of Production; dataflows; Information Security
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-dataflows.pdf
ACM
Proceedings of the 5th ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC '19), co-located with the 26th ACM SIGSAC Conference on Computer and Communications Security (CCS '19), November 11-15, 2019, London, United Kingdom
London, United Kingdom
November 11-15, 2019
978-1-4503-6831-5/19/11
10.1145/3338499.3357357
1
JanPennekamp
MartinHenze
SimoSchmidt
PhilippNiemietz
MarcelFey
DanielTrauth
ThomasBergs
ChristianBrecher
KlausWehrle
inproceedings
2019-hiller-lcn-sessionsharing
The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads
2019
10
14
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hiller-lcn-case_for_tls_session_sharing.pdf
IEEE
IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), Osnabrück, Germany
Osnabrück, Germany
44th IEEE Conference on Local Computer Networks (LCN)
October 14-17, 2019
en
978-1-7281-2561-9
10.1109/LCNSymposium47956.2019.9000667
1
JensHiller
MartinHenze
TorstenZimmermann
OliverHohlfeld
KlausWehrle
inproceedings
2019-hiller-icnp-tailoringOR
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments
2019
10
10
An increasing number of IoT scenarios involve mobile, resource-constrained IoT devices that rely on untrusted networks for Internet connectivity. In such environments, attackers can derive sensitive private information of IoT device owners, e.g., daily routines or secret supply chain procedures, when sniffing on IoT communication and linking IoT devices and owner. Furthermore, untrusted networks do not provide IoT devices with any protection against attacks from the Internet. Anonymous communication using onion routing provides a well-proven mechanism to keep the relationship between communication partners secret and (optionally) protect against network attacks. However, the application of onion routing is challenged by protocol incompatibilities and demanding cryptographic processing on constrained IoT devices, rendering its use infeasible. To close this gap, we tailor onion routing to the IoT by bridging protocol incompatibilities and offloading expensive cryptographic processing to a router or web server of the IoT device owner. Thus, we realize resource-conserving access control and end-to-end security for IoT devices. To prove applicability, we deploy onion routing for the IoT within the well-established Tor network enabling IoT devices to leverage its resources to achieve the same grade of anonymity as readily available to traditional devices.
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hiller-tailoring.pdf
IEEE
Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP '19), October 7-10, 2019, Chicago, IL, USA
Chicago, IL, USA
27th IEEE International Conference on Network Protocols (ICNP 2019)
7-10. Oct. 2019
978-1-7281-2700-2
2643-3303
10.1109/ICNP.2019.8888033
1
JensHiller
JanPennekamp
MarkusDahlmanns
MartinHenze
AndriyPanchenko
KlausWehrle
inproceedings
2019-dahlmanns-icnp-knowledgeSystem
Privacy-Preserving Remote Knowledge System
2019
10
7
More and more traditional services, such as malware detectors or collaboration services in industrial scenarios, move to the cloud. However, this behavior poses a risk for the privacy of clients since these services are able to generate profiles containing very sensitive information, e.g., vulnerability information or collaboration partners. Hence, a rising need for protocols that enable clients to obtain knowledge without revealing their requests exists. To address this issue, we propose a protocol that enables clients (i) to query large cloud-based knowledge systems in a privacy-preserving manner using Private Set Intersection and (ii) to subsequently obtain individual knowledge items without leaking the client’s requests via few Oblivious Transfers. With our preliminary design, we allow clients to save a significant amount of time in comparison to performing Oblivious Transfers only.
Poster Session
private query protocol; knowledge system; remote knowledge; private set intersection; oblivious transfer
kimusin; internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-dahlmanns-knowledge-system.pdf
IEEE
Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP '19), October 7-10, 2019, Chicago, IL, USA
Chicago, IL, USA
27th IEEE International Conference on Network Protocols (ICNP 2019)
7-10. Oct. 2019
978-1-7281-2700-2
2643-3303
10.1109/ICNP.2019.8888121
1
MarkusDahlmanns
ChrisDax
RomanMatzutt
JanPennekamp
JensHiller
KlausWehrle
inproceedings
2019_pennekamp_multipath
Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing
2019
10
7
Users of an onion routing network, such as Tor, depend on its anonymity properties. However, especially malicious entry nodes, which know the client’s identity, can also observe the whole communication on their link to the client and, thus, conduct several de-anonymization attacks. To limit this exposure and to impede corresponding attacks, we propose to multipath traffic between the client and the middle node to reduce the information an attacker can obtain at a single vantage point. To facilitate the deployment, only clients and selected middle nodes need to implement our approach, which works transparently for the remaining legacy nodes. Furthermore, we let clients control the splitting strategy to prevent any external manipulation.
Poster Session
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-multipathing.pdf
IEEE
Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP '19), October 7-10, 2019, Chicago, IL, USA
Chicago, IL, USA
27th IEEE International Conference on Network Protocols (ICNP 2019)
7-10. Oct. 2019
978-1-7281-2700-2
2643-3303
10.1109/ICNP.2019.8888029
1
JanPennekamp
JensHiller
SebastianReuter
WladimirDe la Cadena
AsyaMitseva
MartinHenze
ThomasEngel
KlausWehrle
AndriyPanchenko
inproceedings
2019-hiller-aeit-regaining
Regaining Insight and Control on SMGW-based Secure Communication in Smart Grids
2019
9
Smart Grids require extensive communication to enable safe and stable energy supply in the age of decentralized and dynamic energy production and consumption. To protect the communication in this critical infrastructure, public authorities mandate smart meter gateways (SMGWs) to intercept all inbound and outbound communication of premises such as a factory or smart home, and forward the communication data on secure channels established by the SMGW itself to be in control of the communication security. However, using the SMGW as proxy, local devices can neither review the security of these remote connections established by the SMGW nor enforce higher security guarantees than established by the all in one configuration of the SMGW which does not allow for use case-specific security settings. We present mechanisms that enable local devices to regain this insight and control over the full connection, i.e., up to the final receiver, while retaining the SMGW's ability to ensure a suitable security level. Our evaluation shows modest computation and transmission overheads for this increased security in the critical smart grid infrastructure.
ECSEL; European Union (EU); Horizon 2020; CONNECT Innovative smart components, modules and appliances for a truly connected, efficient and secure smart grid; Grant Agreement No 737434
connect
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hiller-aeit-regaining.pdf
IEEE
Proceedings of the 2019 AEIT International Annual Conference, September 18-20, 2019, Firenze, Italy
Firenze, Italy
AEIT International Annual Conference
September 18-20, 2019
978-8-8872-3745-0
10.23919/AEIT.2019.8893406
1
JensHiller
KarstenKomanns
MarkusDahlmanns
KlausWehrle
inproceedings
2019-krude-chain-opt
Optimizing Data Plane Programs for the Network
2019
8
23
With the move of Software-defined networking from fixed to programmable data planes, network functions are written with P4 or eBPF for targets such as programmable switches, CPU based flow processors and commodity CPUs.
These data plane programs are, however, limited in per-packet time budget (e.g., 67.2 ns at 10GbE) and program size, making program optimization imperative.
Existing approaches focus on optimizing the distribution of flow rules in fixed data planes or they are limited to a single switch.
We see great potential in integrating the network topology into program optimization.
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-krude-chain-opt.pdf
ACM
NetPL '19: ACM SIGCOMM Workshop on Networking and Programming Languages
Beijing, China
978-1-4503-6877-3/19/08
10.1145/3341561.3349590
1
JohannesKrude
MatthiasEichholz
MaximilianWinck
KlausWehrle
MiraMezini
inproceedings
2019-sander-depcci
DeePCCI: Deep Learning-based Passive Congestion Control Identification
2019
8
18
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-sander-deepcci.pdf
https://arxiv.org/abs/1907.02323
ACM
In Proceedings of the ACM SIGCOMM Workshop on Network Meets AI & ML (NetAI '19)
Beijing, China
Workshop on Network Meets AI & ML
18.08.2019
10.1145/3341216.3342211
1
ConstantinSander
JanRüth
OliverHohlfeld
KlausWehrle
inproceedings
2019-wolsing-quicperf
A Performance Perspective on Web Optimized Protocol Stacks: TCP+TLS+HTTP/2 vs. QUIC
2019
7
22
maki,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-wolsing-quicperf.pdf
https://arxiv.org/abs/1906.07415
ACM
In Proceedings of the Applied Networking Research Workshop (ANRW '19)
Montreal, Quebec, Canada
Applied Networking Research Workshop at IETF-105
2019-07-22
10.1145/3340301.3341123
1
KonradWolsing
JanRüth
KlausWehrle
OliverHohlfeld
inproceedings
2019-hohlfeld-bpfperf
Demystifying the Performance of XDP BPF
2019
6
25
maki,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hohlfeld-bpfperf.pdf
IEEE
IEEE International Conference on Network Softwarization (NetSoft)
IEEE International Conference on Network Softwarization
10.1109/NETSOFT.2019.8806651
1
OliverHohlfeld
JohannesKrude
Jens HelgeReelfs
JanRüth
KlausWehrle
inproceedings
2019_pennekamp_infrastructure
Towards an Infrastructure Enabling the Internet of Production
2019
5
8
31-37
New levels of cross-domain collaboration between manufacturing companies throughout the supply chain are anticipated to bring benefits to both suppliers and consumers of products. Enabling a fine-grained sharing and analysis of data among different stakeholders in an automated manner, such a vision of an Internet of Production (IoP) introduces demanding challenges to the communication, storage, and computation infrastructure in production environments. In this work, we present three example cases that would benefit from an IoP (a fine blanking line, a high pressure die casting process, and a connected job shop) and derive requirements that cannot be met by today’s infrastructure. In particular, we identify three orthogonal research objectives: (i) real-time control of tightly integrated production processes to offer seamless low-latency analysis and execution, (ii) storing and processing heterogeneous production data to support scalable data stream processing and storage, and (iii) secure privacy-aware collaboration in production to provide a basis for secure industrial collaboration. Based on a discussion of state-of-the-art approaches for these three objectives, we create a blueprint for an infrastructure acting as an enabler for an IoP.
Internet of Production; Cyber-Physical Systems; Data Processing; Low Latency; Secure Industrial Collaboration
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-iop-infrastructure.pdf
IEEE
Proceedings of the 2nd IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '19), May 6-9, 2019, Taipei, TW
Taipei, TW
May 6-9, 2019
978-1-5386-8500-6/19
10.1109/ICPHYS.2019.8780276
1
JanPennekamp
RenéGlebke
MartinHenze
TobiasMeisen
ChristophQuix
RihanHai
LarsGleim
PhilippNiemietz
MaximilianRudack
SimonKnape
AlexanderEpple
DanielTrauth
UweVroomen
ThomasBergs
ChristianBrecher
AndreasBührig-Polaczek
MatthiasJarke
KlausWehrle
techreport
2019-rueth-blitzstart
Blitz-starting QUIC Connections
2019
5
8
arXiv:1905.03144 [cs.NI]
1--8
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-blitzstart.pdf
https://arxiv.org/abs/1905.03144
Online
COMSYS, RWTH Aachen University
Ahornstr. 55, 52074 Aachen, Germany
COMSYS, RWTH Aachen University
Technical Report
en
JanRüth
KonradWolsing
MartinSerror
KlausWehrle
OliverHohlfeld
inproceedings
2019_wagner_dispute_resolution
Dispute Resolution for Smart Contract-based Two Party Protocols
2019
5
Blockchain systems promise to mediate interactions of mutually distrusting parties without a trusted third party. However, protocols with full smart contract-based security are either limited in functionality or complex, with high costs for secured interactions. This observation leads to the development of protocol-specific schemes to avoid costly dispute resolution in case all participants remain honest. In this paper, we introduce SmartJudge, an extensible generalization of this trend for smart contract-based two-party protocols. SmartJudge relies on a protocol-independent mediator smart contract that moderates two-party interactions and only consults protocol-specific verifier smart contracts in case of a dispute. This way, SmartJudge avoids verification costs in absence of disputes and sustains interaction confidentiality among honest parties. We implement verifier smart contracts for cross-blockchain trades and exchanging digital goods and show that SmartJudge can reduce costs by 46-50% and 22% over current state of the art, respectively.
Ethereum,Bitcoin,smart contracts,two-party protocols,dispute resolution,cross-blockchain trades
mynedata, impact-digital, rfc
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-wagner-dispute.pdf
IEEE
IEEE International Conference on Blockchain and Cryptocurrency 2019 (ICBC 2019)
Seoul, South Korea
IEEE International Conference on Blockchain and Cryptocurrency 2019
English
10.1109/BLOC.2019.8751312
1
EricWagner
AchimVölker
FrederikFuhrmann
RomanMatzutt
KlausWehrle
techreport
2019-hohlfeld-santa-tr
Application-Agnostic Offloading of Packet Processing
2019
4
1
arXiv:1904.00671 [cs.NI]
1--14
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hohlfeld-santatr.pdf
https://arxiv.org/abs/1904.00671
Online
COMSYS, RWTH Aachen University
Ahornstr. 55, 52074 Aachen, Germany
COMSYS, RWTH Aachen University
Technical Report
en
OliverHohlfeld
HelgeReelfs
JanRüth
FlorianSchmidt
TorstenZimmermann
JensHiller
KlausWehrle
article
2019_henze_flexible_netzwerkstrukturen_iop
Flexible Netzwerkarchitekturen für das Internet of Production
ITG-news
2019
4
02/2019
7-8
internet-of-production,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-henze-itg-iop-networkarchitectures.pdf
Informationstechnische Gesellschaft im VDE
Frankfurt am Main
MartinHenze
RenéGlebke
KlausWehrle
inproceedings
2019-glebke-wirelessgain
Enabling Wireless Network Support for Gain Scheduled Control
2019
3
25
reflexes,spp
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-glebke-wirelessgain.pdf
ACM
In Proceedings of the International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2019)
Dresden, Germany
International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2019)
25.03.2019
10.1145/3301418.3313943
1
SebastianGallenmüller
RenéGlebke
StephanGünther
EricHauser
MauriceLeclaire
StefanReif
JanRüth
AndreasSchmidt
GeorgCarle
ThorstenHerfet
WolfgangSchröder-Preikschat
KlausWehrle
inproceedings
2019-glebke-hicss-integrated
A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems
2019
1
8
7252-7261
internet-of-production,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-glebke-integrated.pdf
Online
University of Hawai'i at Manoa / AIS
Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS), Wailea, HI, USA
en
978-0-9981331-2-6
10.24251/HICSS.2019.871
1
RenéGlebke
MartinHenze
KlausWehrle
PhilippNiemietz
DanielTrauth
PatrickMattfeld
ThomasBergs
article
2019_wehrle_dagstuhl_beginners
The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research
ACM SIGCOMM Computer Communication Review
2019
1
49
1
24-30
Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the field, on designing experiments so that their work is more likely to be reproducible and to serve as a foundation for follow-on work by others.
0146-4833
10.1145/3314212.3314217
VaibhavBajpai
AnnaBrunstrom
AnjaFeldmann
WolfgangKellerer
AikoPras
HenningSchulzrinne
GeorgiosSmaragdakis
MatthiasWählisch
KlausWehrle