This file was created by the TYPO3 extension bib --- Timezone: CEST Creation date: 2024-04-26 Creation time: 01-20-02 --- Number of references 75 incollection 2023_pennekamp_crd-a.i Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead 2023 2 8 35-60 The Internet of Production (IoP) leverages concepts such as digital shadows, data lakes, and a World Wide Lab (WWL) to advance today’s production. Consequently, it requires a technical infrastructure that can support the agile deployment of these concepts and corresponding high-level applications, which, e.g., demand the processing of massive data in motion and at rest. As such, key research aspects are the support for low-latency control loops, concepts on scalable data stream processing, deployable information security, and semantically rich and efficient long-term storage. In particular, such an infrastructure cannot continue to be limited to machines and sensors, but additionally needs to encompass networked environments: production cells, edge computing, and location-independent cloud infrastructures. Finally, in light of the envisioned WWL, i.e., the interconnection of production sites, the technical infrastructure must be advanced to support secure and privacy-preserving industrial collaboration. To evolve today’s production sites and lay the infrastructural foundation for the IoP, we identify five broad streams of research: (1) adapting data and stream processing to heterogeneous data from distributed sources, (2) ensuring data interoperability between systems and production sites, (3) exchanging and sharing data with different stakeholders, (4) network security approaches addressing the risks of increasing interconnectivity, and (5) security architectures to enable secure and privacy-preserving industrial collaboration. With our research, we evolve the underlying infrastructure from isolated, sparsely networked production sites toward an architecture that supports high-level applications and sophisticated digital shadows while facilitating the transition toward a WWL. Cyber-physical production systems; Data streams; Industrial data processing; Industrial network security; Industrial data security; Secure industrial collaboration internet-of-production https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-iop-a.i.pdf Springer Interdisciplinary Excellence Accelerator Series Internet of Production: Fundamentals, Applications and Proceedings 978-3-031-44496-8 10.1007/978-3-031-44497-5_2 1 JanPennekamp AnastasiiaBelova ThomasBergs MatthiasBodenbenner AndreasBührig-Polaczek MarkusDahlmanns IkeKunze MoritzKröger SandraGeisler MartinHenze DanielLütticke BenjaminMontavon PhilippNiemietz LuciaOrtjohann MaximilianRudack Robert H.Schmitt UweVroomen KlausWehrle MichaelZeng inproceedings 2022_pennekamp_cumul CUMUL & Co: High-Impact Artifacts for Website Fingerprinting Research 2022 12 8 RWTH-2022-10811 Anonymous communication on the Internet is about hiding the relationship between communicating parties. At NDSS '16, we presented a new website fingerprinting approach, CUMUL, that utilizes novel features and a simple yet powerful algorithm to attack anonymization networks such as Tor. Based on pattern observation of data flows, this attack aims at identifying the content of encrypted and anonymized connections. Apart from the feature generation and the used classifier, we also provided a large dataset to the research community to study the attack at Internet scale. In this paper, we emphasize the impact of our artifacts by analyzing publications referring to our work with respect to the dataset, feature extraction method, and source code of the implementation. Based on this data, we draw conclusions about the impact of our artifacts on the research field and discuss their influence on related cybersecurity topics. Overall, from 393 unique citations, we discover more than 130 academic references that utilize our artifacts, 61 among them are highly influential (according to SemanticScholar), and at least 35 are from top-ranked security venues. This data underlines the significant relevance and impact of our work as well as of our artifacts in the community and beyond. https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-pennekamp-cumul-artifacts.pdf https://www.acsac.org/2022/program/artifacts_competition/ ACSA Cybersecurity Artifacts Competition and Impact Award at 38th Annual Computer Security Applications Conference (ACSAC '22), December 5-9, 2022, Austin, TX, USA Austin, TX, USA 38th Annual Computer Security Applications Conference (ACSAC '22) December 5-9, 2022 10.18154/RWTH-2022-10811 1 JanPennekamp MartinHenze AndreasZinnen FabianLanze KlausWehrle AndriyPanchenko article 2022-henze-tii-prada Complying with Data Handling Requirements in Cloud Storage Systems IEEE Transactions on Cloud Computing 2022 9 10 3 1661-1674 In past years, cloud storage systems saw an enormous rise in usage. However, despite their popularity and importance as underlying infrastructure for more complex cloud services, today’s cloud storage systems do not account for compliance with regulatory, organizational, or contractual data handling requirements by design. Since legislation increasingly responds to rising data protection and privacy concerns, complying with data handling requirements becomes a crucial property for cloud storage systems. We present Prada , a practical approach to account for compliance with data handling requirements in key-value based cloud storage systems. To achieve this goal, Prada introduces a transparent data handling layer, which empowers clients to request specific data handling requirements and enables operators of cloud storage systems to comply with them. We implement Prada on top of the distributed database Cassandra and show in our evaluation that complying with data handling requirements in cloud storage systems is practical in real-world cloud deployments as used for microblogging, data sharing in the Internet of Things, and distributed email storage. https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-henze-tii-prada.pdf Online en 2168-7161 10.1109/TCC.2020.3000336 1 MartinHenze RomanMatzutt JensHiller ErikMühmer Jan HenrikZiegeldorf Johannesvan der Giet KlausWehrle proceedings 2022-serror-cset PowerDuck: A GOOSE Data Set of Cyberattacks in Substations 2022 8 8 5 data sets, network traffic, smart grid security, IDS https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-serror-cset-powerduck.pdf ACM
New York, NY, USA
online Virtual Cyber Security Experimentation and Test Workshop (CSET 2022) August 8, 2022 978-1-4503-9684-4/22/08 10.1145/3546096.3546102 1 SvenZemanek ImmanuelHacker KonradWolsing EricWagner MartinHenze MartinSerror
article 2022_brauner_iop A Computer Science Perspective on Digital Transformation in Production ACM Transactions on Internet of Things 2022 5 1 3 2 The Industrial Internet-of-Things (IIoT) promises significant improvements for the manufacturing industry by facilitating the integration of manufacturing systems by Digital Twins. However, ecological and economic demands also require a cross-domain linkage of multiple scientific perspectives from material sciences, engineering, operations, business, and ergonomics, as optimization opportunities can be derived from any of these perspectives. To extend the IIoT to a true Internet of Production, two concepts are required: first, a complex, interrelated network of Digital Shadows which combine domain-specific models with data-driven AI methods; and second, the integration of a large number of research labs, engineering, and production sites as a World Wide Lab which offers controlled exchange of selected, innovation-relevant data even across company boundaries. In this article, we define the underlying Computer Science challenges implied by these novel concepts in four layers: Smart human interfaces provide access to information that has been generated by model-integrated AI. Given the large variety of manufacturing data, new data modeling techniques should enable efficient management of Digital Shadows, which is supported by an interconnected infrastructure. Based on a detailed analysis of these challenges, we derive a systematized research roadmap to make the vision of the Internet of Production a reality. Internet of Production; World Wide Lab; Digital Shadows; Industrial Internet of Things internet-of-production https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-brauner-digital-transformation.pdf ACM 2691-1914 10.1145/3502265 1 PhilippBrauner ManuelaDalibor MatthiasJarke IkeKunze IstvánKoren GerhardLakemeyer MartinLiebenberg JudithMichael JanPennekamp ChristophQuix BernhardRumpe Wilvan der Aalst KlausWehrle AndreasWortmann MartinaZiefle inproceedings 2021_mitseva_sequences POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages 2021 11 17 2411-2413 Website fingerprinting (WFP) is a special case of traffic analysis, where a passive attacker infers information about the content of encrypted and anonymized connections by observing patterns of data flows. Although modern WFP attacks pose a serious threat to online privacy of users, including Tor users, they usually aim to detect single pages only. By ignoring the browsing behavior of users, the attacker excludes valuable information: users visit multiple pages of a single website consecutively, e.g., by following links. In this paper, we propose two novel methods that can take advantage of the consecutive visits of multiple pages to detect websites. We show that two up to three clicks within a site allow attackers to boost the accuracy by more than 20% and to dramatically increase the threat to users' privacy. We argue that WFP defenses have to consider this new dimension of the attack surface. Traffic Analysis; Website Fingerprinting; Web Privacy https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-mitseva-fingerprinting-sequences.pdf ACM Proceedings of the 28th ACM SIGSAC Conference on Computer and Communications Security (CCS '21), November 15-19, 2021, Seoul, Korea Seoul, Korea November 15-19, 2021 978-1-4503-8454-4/21/11 10.1145/3460120.3485347 1 AsyaMitseva JanPennekamp JohannesLohmöller TorstenZiemann CarlHoerchner KlausWehrle AndriyPanchenko article 2021_schomakers_insights Insights on Data Sensitivity from the Technical, Legal and the Users' Perspectives Computer Law Review International 2021 2 15 22 1 8-15 Social media, cloud computing, and the Internet of Things connect people around the globe, offering manifold benefits. However, the technological advances and increased user participation generate novel challenges for users' privacy. From the users' perspective, the consequences of data disclosure depend on the perceived sensitivity of that data. But in light of the new technological opportunities to process and combine data, it is questionable whether users can adequately evaluate risks of data disclosures. As mediating authority, data protection laws such as the European General Data Protection Regulation try to protect user data, granting enhanced protection to "special categories" of data. This article assesses the legal, technological, and users' perspectives on information sensitivity and their interplay. Technologically, all data can be referred to as "potentially sensitive." The legal and users' perspective on information sensitivity deviate from this standpoint, as some data types are granted special protection by law but are not perceived as very sensitive by users and vice versa. The key findings here suggest the GDPR adequately protecting users' privacy but for small adjustments. Information Sensitivity, Privacy, European Data Protection Law 1610-7608 10.9785/cri-2021-220103 1 Eva-MariaSchomakers ChantalLidynia DirkMüllmann RomanMatzutt KlausWehrle IndraSpiecker gen. Döhmann MartinaZiefle inproceedings 2019_rut_schomakers_privacy Putting Privacy into Perspective -- Comparing Technical, Legal, and Users' View of Information Sensitivity 2021 1 27 857-870 Social media, cloud computing, and the Internet of Things connect people around the globe, offering manifold benefits. However, the technological advances and increased user participation generate novel challenges for users' privacy. From the users' perspective, the consequences of data disclosure depend on the perceived sensitivity of that data. But in light of the new technological opportunities to process and combine data, it is questionable whether users can adequately evaluate risks of data disclosures. As mediating authority, data protection laws such as the European General Data Protection Regulation try to protect user data, granting enhanced protection to "special categories" of data. In this paper, we assess the legal, technological, and users' perspectives on information sensitivity and their interplay. Technologically, all data can be referred to as "potentially sensitive." The legal and users' perspective on information sensitivity deviate from this standpoint, as some data types are granted special protection by law but are not perceived as very sensitive by users and vice versa. Our key findings still suggest the GDPR adequately protecting users' privacy but for small adjustments. Information Sensitivity,Privacy,European Data Protection Law mynedata https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-schomakers-3perspectives.pdf https://dl.gi.de/handle/20.500.12116/34788 https://arxiv.org/abs/1911.06569 Gesellschaft für Informatik
Bonn
INFORMATIK 2020 Karlsruhe, Germany INFORMATIK 2020 2020-09-28 to 2020-10-01 English 10.18420/inf2020_76 1 Eva-MariaSchomakers ChantalLidynia DirkMüllmann RomanMatzutt KlausWehrle IndraSpiecker gen. Döhmann MartinaZiefle
article 2021-wehrle-energy A Novel Receiver Design for Energy Packet‐Based Dispatching Energy Technology 2021 9 2 10.1002/ente.202000937 1 FriedirchWiegel EdoardoDe Din AntonelloMonti KlausWehrle MarcHiller MartinaZitterbart VeitHagenmeyer inproceedings 2020-kosek-tcp-conformance MUST, SHOULD, DON'T CARE: TCP Conformance in the Wild 2020 3 30 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-kosek-tcp-conformance-v2.pdf https://arxiv.org/abs/2002.05400 Springer Proceedings of the Passive and Active Measurement Conference (PAM '20) Eugene, Oregon, USA Passive and Active Measurement Conference (PAM 2020) 30.03.2020 - 31.03.2020 en https://doi.org/10.1007/978-3-030-44081-7_8 1 MikeKosek LeoBlöcher JanRüth TorstenZimmermann OliverHohlfeld article 2020-wehrle-digitalshadows Mit "Digitalen Schatten" Daten verdichten und darstellen : Der Exzellenzcluster "Internet der Produktion" forscht über die Produktionstechnik hinaus Der Profilbereich "Information & Communication Technology" 2020 0179-079X 10.18154/RWTH-2021-02496 MatthiasJarke Wilvan der Aalst ChristianBrecher MatthiasBrockmann IstvánKoren GerhardLakemeyer BernhardRumpe GüntherSchuh KlausWehrle MartinaZiefle inproceedings 2019-hiller-lcn-sessionsharing The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads 2019 10 14 internet-of-production https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hiller-lcn-case_for_tls_session_sharing.pdf IEEE IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), Osnabrück, Germany Osnabrück, Germany 44th IEEE Conference on Local Computer Networks (LCN) October 14-17, 2019 en 978-1-7281-2561-9 10.1109/LCNSymposium47956.2019.9000667 1 JensHiller MartinHenze TorstenZimmermann OliverHohlfeld KlausWehrle phdthesis 2019-tzimmermann-phd-thesis Improving Content and Service Distribution beyond Infrastructure Upgrades 2019 9 31 https://www.shaker.de/de/content/catalogue/index.asp?lang=de&ID=8&ISBN=978-3-8440-6928-0 Shaker Verlag
Shaker Verlag, Düren, Germany
Reports on Communications and Distributed Systems 18 RWTH Aachen University Ph.D. Thesis en 978-3-8440-6928-0 TorstenZimmermann
techreport 2019-hohlfeld-santa-tr Application-Agnostic Offloading of Packet Processing 2019 4 1 arXiv:1904.00671 [cs.NI] 1--14 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hohlfeld-santatr.pdf https://arxiv.org/abs/1904.00671 Online COMSYS, RWTH Aachen University
Ahornstr. 55, 52074 Aachen, Germany
COMSYS, RWTH Aachen University Technical Report en OliverHohlfeld HelgeReelfs JanRüth FlorianSchmidt TorstenZimmermann JensHiller KlausWehrle
inproceedings 2019-rueth-icmp Hidden Treasures - Recycling Large-Scale Internet Measurements to Study the Internet’s Control Plane 2019 3 27 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-icmp.pdf https://arxiv.org/abs/1901.07265 Springer In Proceedings of the Passive and Active Measurement Conference (PAM '19) Puerto Varas, Chile Passive and Active Measurement Conference (PAM 2019) 27.3.2018 - 29.3.2018 en 10.1007/978-3-030-15986-3_4 1 JanRüth TorstenZimmermann OliverHohlfeld inproceedings 2018-zimmermann-webready Is the Web ready for HTTP/2 Server Push? 2018 12 4 maki https://dl.acm.org/citation.cfm?id=3281434 https://arxiv.org/abs/1810.05554 https://http2.netray.io/interleaving.html ACM Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), Crete, Greete Crete, Greece CoNEXT 2018 4.12.18 - 7.12.18 en 10.1145/3281411.3281434 1 TorstenZimmermann BenediktWolters OliverHohlfeld KlausWehrle inproceedings 2018-ziegeldorf-shield SHIELD: A Framework for Efficient and Secure Machine Learning Classification in Constrained Environments 2018 12 1-15 iop,mynedata https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-ziegeldorf-acsac-shield.pdf ACM
New York, NY, USA
Proceedings of the 34rd Annual Computer Security Applications Conference San Juan, Puerto Rico, USA The 34rd Annual Computer Security Applications Conference (ACSAC 2018) 2018-12-03 - 2018-12-07 English 10.1145/3274694.3274716 1 Jan HenrikZiegeldorf JanMetzke KlausWehrle
inproceedings 2018-rueth-mining Digging into Browser-based Crypto Mining 2018 10 31 maki,internet-measurements http://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-mining.pdf https://arxiv.org/abs/1808.00811 ACM Proceedings of the Internet Measurement Conference (IMC '18) Boston, US Internet Measurement Conference 2018 31.10.18 - 2.11.18 en 10.1145/3278532.3278539 1 JanRüth TorstenZimmermann KonradWolsing OliverHohlfeld inproceedings 2018-tzimmermann-toplists A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists 2018 10 31 maki https://dl.acm.org/citation.cfm?id=3278574 https://arxiv.org/abs/1805.11506 ACM Proceedings of the 2018 Internet Measurement Conference (IMC), Boston, USA Boston, US Internet Measurement Conference 2018 31.10.18 - 2.11.18 en 10.1145/3278532.3278574 1 QuirinScheitle OliverHohlfeld JulienGamba JonasJelten TorstenZimmermann Stephen D.Strowes NarseoVallina-Rodriguez inproceedings 2018-hohlfeld-santa Application-Agnostic Offloading of Datagram Processing 2018 9 3 maki,ssiclops,reflexes https://ieeexplore.ieee.org/document/8493053 IEEE Proceedings of the 2018 30th International Teletraffic Congress (ITC 30), Vienna, Austria Vienna, Austria International Teletraffic Congress ITC 30 03.09.2018 - 07-09.2018 en 10.1109/ITC30.2018.00015 1 OliverHohlfeld Jens HelgeReelfs JanRüth FlorianSchmidt TorstenZimmermann JensHiller KlausWehrle inproceedings 2018-matzutt-bitcoin-content-countermeasures Thwarting Unwanted Blockchain Content Insertion 2018 4 17 364-370 Since the introduction of Bitcoin in 2008, blockchain systems have seen an enormous increase in adoption. By providing a persistent, distributed, and append-only ledger, blockchains enable numerous applications such as distributed consensus, robustness against equivocation, and smart contracts. However, recent studies show that blockchain systems such as Bitcoin can be (mis)used to store arbitrary content. This has already been used to store arguably objectionable content on Bitcoin's blockchain. Already single instances of clearly objectionable or even illegal content can put the whole system at risk by making its node operators culpable. To overcome this imminent risk, we survey and discuss the design space of countermeasures against the insertion of such objectionable content. Our analysis shows a wide spectrum of potential countermeasures, which are often combinable for increased efficiency. First, we investigate special-purpose content detectors as an ad hoc mitigation. As they turn out to be easily evadable, we also investigate content-agnostic countermeasures. We find that mandatory minimum fees as well as mitigation of transaction manipulability via identifier commitments significantly raise the bar for inserting harmful content into a blockchain. Bitcoin,blockchain,security,objectionable content,countermeasure mynedata,iop https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-matzutt-blockchain-contents-countermeasures.pdf https://ieeexplore.ieee.org/document/8360355 IEEE Proceedings of the First IEEE Workshop on Blockchain Technologies and Applications (BTA), co-located with the IEEE International Conference on Cloud Engineering 2018 (IC2E 2018) Orlando, Florida, USA First IEEE Workshop on Blockchain Technologies and Applications (BTA) 2018-04-17 English 978-1-5386-5008-0 10.1109/IC2E.2018.00070 1 RomanMatzutt MartinHenze Jan HenrikZiegeldorf JensHiller KlausWehrle inproceedings 2018-tzimmermann-metacdn Characterizing a Meta-CDN 2018 3 26 114-128 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hohlfeld-metacdn.pdf https://arxiv.org/abs/1803.09990 Springer, Cham In Proceedings of the Passive and Active Measurement Conference (PAM '18) Berlin, Germany Passive and Active Measurement Conference (PAM 2018) 26.3.2018 - 27.3.2018 en 978-3-319-76480-1 10.1007/978-3-319-76481-8_9 1 OliverHohlfeld JanRüth KonradWolsing TorstenZimmermann article 2016-fgcs-ziegeldorf-bitcoin Secure and anonymous decentralized Bitcoin mixing Future Generation Computer Systems 2018 3 80 448-466 Pseudonymity, anonymity, and untraceability rfc https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-ziegeldorf-fgcs-bitcoin.pdf Online Elsevier en 0167-739X 10.1016/j.future.2016.05.018 1 Jan HenrikZiegeldorf RomanMatzutt MartinHenze FredGrossmann KlausWehrle inproceedings 2018-matzutt-bitcoin-content A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin 2018 2 26 Blockchains primarily enable credible accounting of digital events, e.g., money transfers in cryptocurrencies. However, beyond this original purpose, blockchains also irrevocably record arbitrary data, ranging from short messages to pictures. This does not come without risk for users as each participant has to locally replicate the complete blockchain, particularly including potentially harmful content. We provide the first systematic analysis of the benefits and threats of arbitrary blockchain content. Our analysis shows that certain content, e.g., illegal pornography, can render the mere possession of a blockchain illegal. Based on these insights, we conduct a thorough quantitative and qualitative analysis of unintended content on Bitcoin's blockchain. Although most data originates from benign extensions to Bitcoin's protocol, our analysis reveals more than 1600 files on the blockchain, over 99% of which are texts or images. Among these files there is clearly objectionable content such as links to child pornography, which is distributed to all Bitcoin participants. With our analysis, we thus highlight the importance for future blockchain designs to address the possibility of unintended data insertion and protect blockchain users accordingly. mynedata https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018_matzutt_bitcoin-contents_preproceedings-version.pdf 2018-01-07 Online Springer Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Curaçao Nieuwpoort, Curaçao Financial Cryptography and Data Security 2018 en 10.1007/978-3-662-58387-6_23 1 RomanMatzutt JensHiller MartinHenze Jan HenrikZiegeldorf DirkMüllmann OliverHohlfeld KlausWehrle inproceedings 2018-tzimmermann-split SPLIT: Smart Protocol Loading for the IoT 2018 2 14 iop https://jenshiller.com/publication/2018-zimmermann-ewsn-split/2018-zimmermann-ewsn-split.pdf https://dl.acm.org/citation.cfm?id=3234847.3234854 ACM Proceedings of the 15th European Conference on Wireless Sensor Networks (EWSN 2018), Madrid, Spain Madrid, Spain European Conference on Wireless Sensor Networks (EWSN 2018) 14.2.2018 - 16.2.2018 en 978-0-9949886-2-1 1 TorstenZimmermann JensHiller Jens HelgeReelfs PascalHein KlausWehrle incollection 2017-cps-henze-network Network Security and Privacy for Cyber-Physical Systems 2017 11 13 25-56 sensorcloud,ipacs Song, Houbing and Fink, Glenn A. and Jeschke, Sabina Wiley-IEEE Press First 2 Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications en 978-1-119-22604-8 10.1002/9781119226079.ch2 1 MartinHenze JensHiller RenéHummen RomanMatzutt KlausWehrle Jan HenrikZiegeldorf inproceedings 2017-henze-mobiquitous-comparison Privacy-preserving Comparison of Cloud Exposure Induced by Mobile Apps 2017 11 7 543-544 trinics https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-mobiquitous-comparison.pdf Online ACM Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous) - Poster Session, Melbourne, VIC, Australia en 978-1-4503-5368-7 10.1145/3144457.3144511 1 MartinHenze RitsumaInaba Ina BereniceFink Jan HenrikZiegeldorf inproceedings 2017-henze-mobiquitous-cloudanalyzer CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps 2017 11 7 262-271 Developers of smartphone apps increasingly rely on cloud services for ready-made functionalities, e.g., to track app usage, to store data, or to integrate social networks. At the same time, mobile apps have access to various private information, ranging from users' contact lists to their precise locations. As a result, app deployment models and data flows have become too complex and entangled for users to understand. We present CloudAnalyzer, a transparency technology that reveals the cloud usage of smartphone apps and hence provides users with the means to reclaim informational self-determination. We apply CloudAnalyzer to study the cloud exposure of 29 volunteers over the course of 19 days. In addition, we analyze the cloud usage of the 5000 most accessed mobile websites as well as 500 popular apps from five different countries. Our results reveal an excessive exposure to cloud services: 90 % of apps use cloud services and 36 % of apps used by volunteers solely communicate with cloud services. Given the information provided by CloudAnalyzer, users can critically review the cloud usage of their apps. Privacy; Smartphones; Cloud Computing; Traffic Analysis trinics https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-mobiquitous-cloudanalyzer.pdf Online ACM Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous '17), November 7-10, 2017, Melbourne, VIC, Australia Melbourne, VIC, Australia November 7-10, 2017 en 978-1-4503-5368-7 10.1145/3144457.3144471 1 MartinHenze JanPennekamp DavidHellmanns ErikMühmer Jan HenrikZiegeldorf ArthurDrichel KlausWehrle inproceedings 2017-liew-schemmel-fp Floating-Point Symbolic Execution: A Case Study in N-Version Programming 2017 10 30 symbiosys file:1848 Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering Urbana-Champaign, IL, USA en 978-1-5386-2684-9/17 1 DanielLiew DanielSchemmel CristianCadar AlastairDonaldson RafaelZähl KlausWehrle inproceedings 2017-zimmermann-qoe A QoE Perspective on HTTP/2 Server Push 2017 8 21 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-zimmermann-internetqoe-push.pdf ACM ACM SIGCOMM 2017 2nd Workshop on QoE-based Analysis and Management of Data Communication Networks (Internet-QoE 2017), Los Angeles, USA Los Angeles, USA ACM SIGCOMM 2017 2nd Workshop on QoE-based Analysis and Management of Data Communication Networks (Internet-QoE 2017) 21.8.2017 - 25.8.2017 en 978-1-4503-5056-3 10.1145/3098603.3098604 1 TorstenZimmermann BenediktWolters OliverHohlfeld inproceedings 2017-henze-trustcom-dcam Distributed Configuration, Authorization and Management in the Cloud-based Internet of Things 2017 8 1 185-192 sscilops, ipacs https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-trustcom-dcam.pdf Online IEEE Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), Sydney, NSW, Australia en 978-1-5090-4905-9 2324-9013 10.1109/Trustcom/BigDataSE/ICESS.2017.236 1 MartinHenze BenediktWolters RomanMatzutt TorstenZimmermann KlausWehrle article 2017-ziegeldorf-bmcmedgenomics-bloom BLOOM: BLoom filter based Oblivious Outsourced Matchings BMC Medical Genomics 2017 7 26 10 Suppl 2 29-42 Whole genome sequencing has become fast, accurate, and cheap, paving the way towards the large-scale collection and processing of human genome data. Unfortunately, this dawning genome era does not only promise tremendous advances in biomedical research but also causes unprecedented privacy risks for the many. Handling storage and processing of large genome datasets through cloud services greatly aggravates these concerns. Current research efforts thus investigate the use of strong cryptographic methods and protocols to implement privacy-preserving genomic computations. We propose FHE-Bloom and PHE-Bloom, two efficient approaches for genetic disease testing using homomorphically encrypted Bloom filters. Both approaches allow the data owner to securely outsource storage and computation to an untrusted cloud. FHE-Bloom is fully secure in the semi-honest model while PHE-Bloom slightly relaxes security guarantees in a trade-off for highly improved performance. We implement and evaluate both approaches on a large dataset of up to 50 patient genomes each with up to 1000000 variations (single nucleotide polymorphisms). For both implementations, overheads scale linearly in the number of patients and variations, while PHE-Bloom is faster by at least three orders of magnitude. For example, testing disease susceptibility of 50 patients with 100000 variations requires only a total of 308.31 s (σ=8.73 s) with our first approach and a mere 0.07 s (σ=0.00 s) with the second. We additionally discuss security guarantees of both approaches and their limitations as well as possible extensions towards more complex query types, e.g., fuzzy or range queries. Both approaches handle practical problem sizes efficiently and are easily parallelized to scale with the elastic resources available in the cloud. The fully homomorphic scheme, FHE-Bloom, realizes a comprehensive outsourcing to the cloud, while the partially homomorphic scheme, PHE-Bloom, trades a slight relaxation of security guarantees against performance improvements by at least three orders of magnitude. Proceedings of the 5th iDASH Privacy and Security Workshop 2016 Secure outsourcing; Homomorphic encryption; Bloom filters sscilops; mynedata; rfc https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-ziegeldorf-bmcmedgenomics-bloom.pdf Online BioMed Central Chicago, IL, USA November 11, 2016 en 1755-8794 10.1186/s12920-017-0277-y 1 Jan HenrikZiegeldorf JanPennekamp DavidHellmanns FelixSchwinger IkeKunze MartinHenze JensHiller RomanMatzutt KlausWehrle inproceedings 2017-zimmermann-networking-http2 How HTTP/2 Pushes the Web: An Empirical Study of HTTP/2 Server Push 2017 6 12 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-zimmermann-networking-push.pdf IEEE Proceedings of the 16th International IFIP Networking Conference (NETWORKING'17), Stockholm, Sweden Stockholm, Sweden IFIP Networking 2017 12.-16.6.2017 978-3-901882-94-4 10.23919/IFIPNetworking.2017.8264830 1 TorstenZimmermann JanRüth BenediktWolters OliverHohlfeld inproceedings 2017-zimmermann-secon Resource and Execution Control for Mobile Offloadee Devices 2017 6 12 maki IEEE 14th IEEE International Conference on Sensing, Communication, and Networking (SECON 2017), San Diego, USA San Diego, USA 14th IEEE International Conference on Sensing, Communication, and Networking (SECON 2017) 12.06.2017 - 14.06.2017 en 978-1-5090-6599-8 10.1109/SAHCN.2017.7964939 1 TorstenZimmermann HannoWirtz Jan HenrikZiegeldorf ChristianSteinhaus KlausWehrle inproceedings 2017-henze-ic2e-prada Practical Data Compliance for Cloud Storage 2017 4 4 252-258 ssiclops, ipacs https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-ic2e-prada.pdf Online IEEE Proceedings of the 2017 IEEE International Conference on Cloud Engineering (IC2E 2017), Vancouver, BC, Canada en 978-1-5090-5817-4 10.1109/IC2E.2017.32 1 MartinHenze RomanMatzutt JensHiller ErikMühmer Jan HenrikZiegeldorf Johannesvan der Giet KlausWehrle inproceedings 2017-ziegeldorf-codaspy-priward Privacy-Preserving HMM Forward Computation 2017 3 22 83-94 mynedata https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-ziegeldorf-codaspy-priward.pdf Online ACM Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY 2017), Scottsdale, AZ, USA en 978-1-4503-4523-1 10.1145/3029806.3029816 1 Jan HenrikZiegeldorf JanMetzke JanRüth MartinHenze KlausWehrle inproceedings 2017-wirtz-zimmermann-percom-etc Encrypting Data to Pervasive Contexts 2017 3 13 https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-wirtz-zimmermann-percom-etc.pdf Online IEEE Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom), Kona, Big Island, HI, USA en 978-1-5090-4328-6 10.1109/PERCOM.2017.7917877 1 HannoWirtz TorstenZimmermann MatteoCeriotti KlausWehrle inproceedings 2017-ziegeldorf-wons-tracemixer TraceMixer: Privacy-Preserving Crowd-Sensing sans Trusted Third Party 2017 2 21 17-24 mynedata https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-ziegeldorf-wons-tracemixer.pdf Online IEEE Proceedings of the 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Jackson Hole, WY, USA en 978-3-901882-88-3 10.1109/WONS.2017.7888771 1 Jan HenrikZiegeldorf MartinHenze JensBavendiek KlausWehrle incollection 2016-iiot-rueth-comm Communication and Networking for the Industrial Internet of Things 2017 317-346 Online Jeschke, Sabina and Brecher, Christian and Song, Houbing and Rawat, Danda B. Springer Industrial Internet of Things en 978-3-319-42558-0 10.1007/978-3-319-42559-7_12 1 JanRüth FlorianSchmidt MartinSerror KlausWehrle TorstenZimmermann inproceedings 2017-matzutt-mynedata myneData: Towards a Trusted and User-controlled Ecosystem for Sharing Personal Data 2017 1073-1084 Personal user data is collected and processed at large scale by a handful of big providers of Internet services. This is detrimental to users, who often do not understand the privacy implications of this data collection, as well as to small parties interested in gaining insights from this data pool, e.g., research groups or small and middle-sized enterprises. To remedy this situation, we propose a transparent and user-controlled data market in which users can directly and consensually share their personal data with interested parties for monetary compensation. We define a simple model for such an ecosystem and identify pressing challenges arising within this model with respect to the user and data processor demands, legal obligations, and technological limits. We propose myneData as a conceptual architecture for a trusted online platform to overcome these challenges. Our work provides an initial investigation of the resulting myneData ecosystem as a foundation to subsequently realize our envisioned data market via the myneData platform. Presentation slides are in German Personal User Data, Personal Information Management, Data Protection Laws, Privacy Enhancing Technologies, Platform Design, Profiling mynedata_show https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-matzutt-informatik-mynedata.pdf https://www.comsys.rwth-aachen.de/fileadmin/misc/mynedata/talks/2017-matzutt-informatik-mynedata-presentation.pdf Presentation slides Eibl, Maximilian and Gaedke, Martin Gesellschaft für Informatik, Bonn INFORMATIK 2017 Chemnitz INFORMATIK 2017 2017-09-28 English 978-3-88579-669-5 1617-5468 10.18420/in2017_109 1 RomanMatzutt DirkMüllmann Eva-MariaZeissig ChristianeHorst KaiKasugai SeanLidynia SimonWieninger Jan HenrikZiegeldorf GerhardGudergan IndraSpiecker gen. Döhmann KlausWehrle MartinaZiefle phdthesis 2017-ziegeldorf-phdthesis Designing Digital Services with Cryptographic Guarantees for Data Security and Privacy 2017 RWTH Aachen University Jan HenrikZiegeldorf inproceedings 2016-henze-wpes-cppl CPPL: Compact Privacy Policy Language 2016 10 24 99-110 ssiclops https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-henze-wpes-cppl.pdf Online ACM Proceedings of the 15th Workshop on Privacy in the Electronic Society (WPES), co-located with the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria en 978-1-4503-4569-9 10.1145/2994620.2994627 1 MartinHenze JensHiller SaschaSchmerling Jan HenrikZiegeldorf KlausWehrle inproceedings 2016-matzutt-ccs-bitcoin POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store 2016 10 24 1769-1771 mynedata /fileadmin/papers/2016/2016-matzutt-ccs-blockchaincontent.pdf Online ACM Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria en 978-1-4503-4139-4 10.1145/2976749.2989059 1 RomanMatzutt OliverHohlfeld MartinHenze RobinRawiel Jan HenrikZiegeldorf KlausWehrle inproceedings 2016-werner-networking-stean STEAN: A Storage and Transformation Engine for Advanced Networking Context 2016 5 17 maki IEEE Proceedings of the 15th International IFIP Networking Conference (NETWORKING'16), Vienna, Austira Vienna, Austria IFIP Networking 2016 17.-19.5.2016 978-3-9018-8283-8 10.1109/IFIPNetworking.2016.7497203 1 MarcWerner JohannesSchwandtke MatthiasHollick OliverHohlfeld TorstenZimmermann KlausWehrle inproceedings 2016-zimmermann-remp ReMP TCP: Low Latency Multipath TCP 2016 5 IEEE Proceedings of the IEEE International Conference on Communications (ICC 2016), Kuala Lumpur, Malaysia Kuala Lumpur, Malaysia ICC 2016 23.-27.5.2016 978-1-4799-6664-6 1938-1883 10.1109/ICC.2016.7510787 1 AlexanderFrömmgen TobiasErbshäuser TorstenZimmermann KlausWehrle AlejandroBuchmann inproceedings 2016-panchenko-ndss-fingerprinting Website Fingerprinting at Internet Scale 2016 2 21 The website fingerprinting attack aims to identify the content (i.e., a webpage accessed by a client) of encrypted and anonymized connections by observing patterns of data flows such as packet size and direction. This attack can be performed by a local passive eavesdropper – one of the weakest adversaries in the attacker model of anonymization networks such as Tor. In this paper, we present a novel website fingerprinting attack. Based on a simple and comprehensible idea, our approach outperforms all state-of-the-art methods in terms of classification accuracy while being computationally dramatically more efficient. In order to evaluate the severity of the website fingerprinting attack in reality, we collected the most representative dataset that has ever been built, where we avoid simplified assumptions made in the related work regarding selection and type of webpages and the size of the universe. Using this data, we explore the practical limits of website fingerprinting at Internet scale. Although our novel approach is by orders of magnitude computationally more efficient and superior in terms of detection accuracy, for the first time we show that no existing method – including our own – scales when applied in realistic settings. With our analysis, we explore neglected aspects of the attack and investigate the realistic probability of success for different strategies a real-world adversary may follow. https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-panchenko-ndss-fingerprinting.pdf https://www.informatik.tu-cottbus.de/~andriy/zwiebelfreunde/ Internet Society Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS '16), February 21-24, 2016, San Diego, CA, USA San Diego, CA, USA February 21-24, 2016 978-1-891562-41-9 10.14722/ndss.2016.23477 1 AndriyPanchenko FabianLanze AndreasZinnen MartinHenze JanPennekamp KlausWehrle ThomasEngel inproceedings 2016-zimmermann-wons-mirco Maintaining Integrity and Reputation in Content Offloading 2016 1 25-32 maki http://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-zimmermann-wons-mirco.pdf IEEE 12th International Conference on Wireless On-demand Network Systems and Services (WONS), Cortina d'Ampezzo, Italy Cortina d'Ampezzo, Italy 12th International Conference on Wireless On-demand Network Systems and Services (WONS) January 20 - 22 2016 en 978-3-901882-80-7 1 TorstenZimmermann JanRüth HannoWirtz KlausWehrle article 2016-sdnflex_si Editorial: Special issue on Software-Defined Networking and Network Functions Virtualization for flexible network management Wiley Journal of Network Management 2016 26 1 http://onlinelibrary.wiley.com/doi/10.1002/nem.1915/pdf OliverHohlfeld ThomasZinner TheophilusBenson DavidHausheer conference 2016-erwin ERWIN - Enabling the Reproducible Investigation of Waiting Times for Arbitrary Workflows 2016 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7498938&tag=1 IEEE QoMEX IEEE QoMEX 10.1109/QoMEX.2016.7498938 ThomasZinner MatthiasHirth ValentinFischer OliverHohlfeld inproceedings 2015-ziegeldorf-cans-boma Bandwidth-optimized Secure Two-Party Computation of Minima 2015 12 8 9476 197-213 /fileadmin/papers/2015/2015-ziegeldorf-cans-boma.pdf Online Springer Lecture Notes in Computer Science 14th International Conference on Cryptology and Network Security (CANS 2015), Marrakesh, Morocco en 978-3-319-26822-4 10.1007/978-3-319-26823-1_14 1 Jan HenrikZiegeldorf JensHiller MartinHenze HannoWirtz KlausWehrle inproceedings 2015-zimmermann-remp Remp TCP: Low latency Multipath TCP 2015 12 1 ACM Proceedings of the 2015 CoNEXT on Student Workshop, CoNEXT Student Workshop, Heidelberg, Germany Heidelberg, Germany CoNEXT 2015 1.-4.12.2015 1 AlexanderFrömmgen TobiasErbshäuser TorstenZimmermann KlausWehrle AlejandroBuchmann inproceedings 2015-wirtz-wifi-sharing Collaborative On-demand Wi-Fi Sharing 2015 10 19-27 http://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-wirtz-lcn-cows.pdf Online IEEE 40th IEEE Conference on Local Computer Networks (LCN), Clearwater Beach, USA Clearwater Beach, Florida, USA 40th IEEE Conference on Local Computer Networks (LCN) October 26-29 2015 en 10.1109/LCN.2015.7366279 1 HannoWirtz TorstenZimmermann MartinSerror KlausWehrle inproceedings 2015-ziegeldorf-dpm-comparison Comparison-based Privacy: Nudging Privacy in Social Media (Position Paper) 2015 9 22 9481 226-234 fileadmin/papers/2015/2015-ziegeldorf-dpm-cbp.pdf Online Springer Lecture Notes in Computer Science The 10th DPM International Workshop on Data Privacy Management, Vienna, Austria en 978-3-319-29882-5 10.1007/978-3-319-29883-2_15 1 Jan HenrikZiegeldorf MartinHenze RenéHummen KlausWehrle inproceedings 2015-ahfe-kowalewski-facebook Like us on Facebook! - Analyzing user preferences regarding privacy settings in Germany Procedia Manufacturing 2015 7 3 815--822 Elsevier The 6th International Conference on Applied Humand Factors and Ergonomics (AHFE 2015), Las Vegas, NV, USA en 2351-9789 10.1016/j.promfg.2015.07.336 1 SylviaKowalewski MartinaZiefle Jan HenrikZiegeldorf KlausWehrle inproceedings 2015-wirtz-secon Enabling Ubiquitous Interaction with Smart Things 2015 6 24 256-264 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-wirtz-secon-stif.pdf http://www.comsys.rwth-aachen.de/short/secon15-stif Online IEEE 12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015), Seattle, USA Seattle, USA 12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015) 22.06.2015 - 25.06.2015 en 10.1109/SAHCN.2015.7338324 1 HannoWirtz JanRüth MartinSerror TorstenZimmermann KlausWehrle inproceedings 2015-ziegeldorf-iwpe-comparison Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks 2015 5 21 198-205 https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-ziegeldorf-iwpe-choose.pdf Online IEEE 2015 International Workshop on Privacy Engineering (IWPE'15), part of 2015 IEEE Security and Privacy Workshops (SPW 2015), San Jose, CA, USA en 10.1109/SPW.2015.9 1 Jan HenrikZiegeldorf JanMetzke MartinHenze KlausWehrle proceedings 2015-sdnflex-heuschkel-dyns Protocol Virtualization through Dynamic Network Stacks 2015 3 9 IEEE Cottbus SDNFlex Workshop (NetSys 2015) March 2015, 9-12 en 10.1109/NetSys.2015.7089055 1 JensHeuschkel ImmanuelSchweizer TorstenZimmermann KlausWehrle MaxMühlhäuser inproceedings 2014-ziegeldorf-codaspy-coinparty CoinParty: Secure Multi-Party Mixing of Bitcoins 2015 3 2 rfc https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-ziegeldorf-codaspy-coinparty.pdf Online ACM The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA San Antonio, TX, USA The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015) en 978-1-4503-3191-3 10.1145/2699026.2699100 1 Jan HenrikZiegeldorf FredGrossmann MartinHenze NicolasInden KlausWehrle proceedings 2014-kuvs-zimmermann-mindgap Mind the Gap – Understanding the Traffic Gap when Switching Communication Protocols 2014 9 29 Stuttgart 1st KuVS Workshop on Anticipatory Networks September 29-30, 2014 1 MarcWerner TobiasLange MatthiasHollick TorstenZimmermann KlausWehrle poster 2014-wisec-ziegeldorf-ipin POSTER: Privacy-preserving Indoor Localization 2014 7 23 rfc https://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-ziegeldorf-poster-wisec.pdf 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '14) (Poster) en 10.13140/2.1.2847.4886 1 Jan HenrikZiegeldorf NicolaiViol MartinHenze KlausWehrle inproceedings 2014-wowmom-wirtz-cafi CA-Fi: Ubiquitous Mobile Wireless Networking without 802.11 Overhead and Restrictions 2014 6 17 fileadmin/papers/2014/2014-wirtz-wowmom-cafi.pdf online IEEE 15th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'14), Sydney, Australia en 10.1109/WoWMoM.2014.6918950 1 HannoWirtz TorstenZimmermann MatteoCeriotti KlausWehrle inproceedings 2014-smartcity-zimmermann-pubtrans Analyzing Metropolitan-area Networking within Public Transportation Systems for Smart City Applications 2014 3 30 fileadmin/papers/2014/2014-zimmermann-smartcity-pubtrans.pdf Online IEEE Proceedings of the 1st International IEEE Workshop on Architectures and Technologies for Smart Cities (SmartCitiy'14), Dubai, UAE Dubai, UAE 1st International IEEE Workshop on Architectures and Technologies for Smart Cities (SmartCitiy'14) 30 March - 2 April 2014 en 10.1109/NTMS.2014.6814007 1 TorstenZimmermann HannoWirtz OscarPuñal KlausWehrle inproceedings 2014-mmsys-wirtz-ubifi A Wireless Application Overlay for Ubiquitous Mobile Multimedia Sensing and Interaction 2014 3 https://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-wirtz-mmsys-ubifi.pdf Online ACM Proceedings of the 5th ACM Multimedia Systems Conference (MMSys 2014), Special Session on Mobile Multimedia Sensing, Singapore Singapore 5th ACM Multimedia Systems Conference 19-21 March 2014 en 978-1-4503-2705-3 10.1145/2557642.2578224 1 HannoWirtz JanRüth TorstenZimmermann MatteoCeriotti KlausWehrle inproceedings 2013-icnp-hummen-tailoring Tailoring End-to-End IP Security Protocols to the Internet of Things 2013 10 7 1-10 iotsec https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-hummen-tailoring.pdf Online IEEE In Proceedings of the 21st IEEE International Conference on Network Protocols (ICNP 2013), Göttingen, Germany Göttingen, Germany 21st IEEE International Conference on Network Protocols (ICNP 2013) 7-10 Oct. 2013 en 978-1-4799-1270-4 10.1109/ICNP.2013.6733571 1 RenéHummen HannoWirtz Jan HenrikZiegeldorf JensHiller KlausWehrle inproceedings 2013-chants-wirtz-heaven Interest-based Cloud-facilitated Opportunistic Networking 2013 9 30 1--8 https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-CHANTS-heaven-wirtz.pdf Online ACM Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks (CHANTS 2013), Miami, USA Miami, USA Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks (CHANTS 2013) 30 September 2013 en 978-1-4503-2363-5 10.1145/2505494.2505504 1 HannoWirtz JanRüth TorstenZimmermann KlausWehrle inproceedings 2013-wintech-bosling-models Fingerprinting Channel Dynamics in Indoor Low-Power Wireless Networks 2013 9 30 65--72 https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-bosling-wintech-fingerprint.pdf Online ACM Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013), Miami, USA Miami, USA 8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013) 30 September 2013 en 10.1145/2505469.2505477 1 MarcelBosling MatteoCeriotti TorstenZimmermann Jó AgilaBitsch Link KlausWehrle article 2013-scn-ziegeldorf-iot-privacy Privacy in the Internet of Things: Threats and Challenges Security and Communication Networks - Special Issue on 'Security in a Completely Interconnected World' 2013 6 10 http://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-ziegeldorf-scn-privacy-in-the-iot.pdf Online Wiley en 10.1002/sec.795 1 Jan HenrikZiegeldorf OscarGarcia-Morchon KlausWehrle conference 2013-wowmom-punal-RFRA RFRA: Random Forests Rate Adaptation for Vehicular Networks 2013 6 4 IEEE Proceedings of the 14th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'13) Madrid, Spain WoWMoM June, 2013 accepted OscarPuñal HanzhiZhang JamesGross inproceedings 2013-hummen-towards Towards Viable Certificate-based Authentication for the Web of Things 2013 4 19 iotsec fileadmin/papers/2013/2013-hummen-towards.pdf ACM Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec '13) Budapest, Hungary 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy en 978-1-4503-2003-0 10.1145/2463183.2463193 1 RenéHummen Jan HenrikZiegeldorf HosseinShafagh ShahidRaza KlausWehrle inproceedings 2013-wisec-garcia-securing Securing the IP-based Internet of Things with HIP and DTLS 2013 4 119--124 ACM Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13) (short paper) 978-1-4503-1998-0 10.1145/2462096.2462117 1 OscarGarcia-Morchon Sye LoongKeoh Sandeep S.Kumar PedroMoreno-Sanchez FranciscoVidal-Meca Jan HenrikZiegeldorf inproceedings 2013-pitsac-vidalmeca-hip HIP security architecture for the IP-based Internet of Things 2013 3 25 1331 - 1336 The IP-based Internet of Things refers to the pervasive interactions of smart objects and people enabling new applications by means of IP protocols. An application scenario is a Smart City in which the city infrastructure, cars, and people exchange information to enable new services. IP protocols, such as IPv6, TCP and HTTP will be further complemented by IPv6 over Low powerWireless Personal Area Networks and Constrained Application Protocol currently in development in IETF. Security and privacy are a must for the IP-based IoTs in order to ensure its acceptance. However, mobility, limited bandwidth, and resource-constrained devices pose new challenges and require for a sound and efficient security architecture. In particular, dynamic association of mobile smart objects and the management of keys in large-scale networks remain an open challenge. In this context, we propose a flexible security architecture based on the Host Identity Protocol and Multimedia Internet KEYing protocols allowing for secure network association and key management. HIP - based on asymmetric-key cryptography - ensures unambiguous thing identification, mobility support, as well as a lightweight and secure method for network association. In our solution, HIP is extended with MIKEY capabilities to provide enhanced key management using polynomials, which allow to generate pairwise keys with any node based on its identity. This combination of protocols and crypto-algorithms ensures both strong security and very good performance as shown by our implementation and presents clear advantages compared with other alternatives. Internet of Things; Security; Network Access; Key Management Online IEEE Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2013 Barcelona, Spain 25.-28.03.2013 en 10.1109/WAINA.2013.158 1 FranciscoVidal Meca Jan HenrikZiegeldorf OscarGarcia-Morchon Sandeep S.Kumar Sye LoongKeoh PedroMoreno-Sanchez conference EW2013_parruca_gross On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems 2013 8 In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models. ICIC, proportional fair scheduling, power mask, resource block, scheduling, dynamic scheduling, inter cell interference coordination, LTE, OFDMA, WiMAX https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013_ICIC_parruca_grysla_gross.pdf http://www.vde-verlag.de/proceedings-en/563498043.html vde-verlag vde-verlag
http://www.vde-verlag.de/
Proceedings: European Wireless 2013 Guildford, UK 2013 - 19th European Wireless Conference 04/16/2012 - 04/18/2013 English DonaldParruca MariusGrysla PetriMähönen MarinaPetrova HanZhou FarshadNaghibi JamesGross
inproceedings 2012-hummen-seams SEAMS: A Signaling Layer for End-host-Assisted Middlebox Services 2012 6 25 525--532 fileadmin/papers/2012/2012-hummen-seams.pdf Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12) IEEE Liverpool, United Kingdom en 978-1-4673-2172-3 10.1109/TrustCom.2012.250 1 RenéHummen Jan HenrikZiegeldorf TobiasHeer HannoWirtz KlausWehrle article 2011-03-Zimmermann IP address assignment in wireless mesh networks Wireless Communications and Mobile Computing 2011 3 11 3 321-337 Online John Wiley & Sons Ltd.
Hoboken, NJ, USA
en 10.1002/wcm.982 1 AlexanderZimmermann ArndHannemann BenjaminSchleinzer
proceedings 2009-aktas-maple-ModeldrivenSupportforSourceCodeVariabilityinAutomotiveSoftwareEngineering-Workshop Model-driven Support for Source Code Variability in Automotive Software Engineering 2009 8 44-51 Variability on source code level in automotive soft- ware engineering is handled by C/C++ preprocessing directives. It provides fine-grained definition of variation points, but brings highly complex structures into the source code. The software gets more difficult to understand, to maintain and to integrate changes. Current approaches for modeling and managing vari- ability on source code do not consider the specific requirements of the automotive domain. To close this gap, we propose a model- driven approach to support software engineers in handling source code variability and configuration of software variants. For this purpose, a variability model is developed that is linked with the source code. Using this approach, a software engineer can shift work steps to the variability model in order to model and manage variation points and implement their variants in the source code. automotive software engineering; programming; model-driven engineering; variability modeling; Online CEUR 1st International Workshop on Model-driven Approaches in Software Product Line Engineering (MAPLE), San Francisco, CA, USA 1613-0073 1 CemMengi ChristianFuß RubenZimmermann IsmetAktas