Fachbereich Informatik
Institut für Cyber Security & Privacy (ICSP)
Ziele und Aufgaben
Das ICSP erforscht, vermittelt und transferiert Ansätze, Technologien und Lösungen zur Förderung der Sicherheit und Privatheit in der neuen digitalen Realität. Dabei betrachtet das ICSP das Themengebiet facettenreich, technisch und organisatorisch ganzheitlich und interdisziplinär multiperspektivisch. Ziel des Instituts ist, die nationale, europäische und internationale Forschung nachhaltig mitzugestalten sowie das vorliegende Knowhow in der Ausbildung hoch-qualifizierter Bachelor- und Masterabsolventen zu vermitteln und über Kooperationen bzw. Ausgründungen in Wirtschaft und Verwaltung zu transferieren.
Forschungs- und Anwendungsfelder
Cyber Security & Cyber Privacy sind beides Querschnittsdisziplinen, die bereits heute in einer allgegenwärtig digitalisierten und vernetzten Lebensrealität von immenser Bedeutung für Wirtschaft, Verwaltung und Gesellschaft sind – vor allem vor dem Hintergrund stetig zunehmender Bedrohungen und krimineller Handlungen aus dem Netz. Das ICSP konzentriert die Aktivitäten, die zur Prävention, Detektion und Reaktion auf Sicherheitsvorfälle aus technischer und organisatorischer Sicht in Forschung, Entwicklung und Lehre thematisiert werden.
Zentrale Forschungsfelder
Die zentralen Forschungsfelder des ICSP umfassen aktuell die folgende Schwerpunkte:
- Sicherheit und Privatheitsschutz autonomer, mobiler und verteilter Systeme
(z.B. Cloud, IoT, Smart Home, Industrie 4.0, RFID/NFC, Mobile Netze, Gesundheitssysteme, Bezahlsysteme, Robotik, selbstfahrende Systeme, Automobile) - Anwendungen kryptographischer Verfahren
(z.B. kryptographische Protokolle und Anwendungen, Kryptowährungen, Blockchaintechnologie, Identity, Privacy, Anonymity, und PETs) - Hardware-nahe Implementierungssicherheit
(z.B. Hardwaresicherheit, Firmwaresicherheit, Mikroarchitektursicherheit, Implementierung kryptographischer Verfahren, Seitenkanalanalysen, Fehleranalysen, verdeckte Informationskanäle, Embedded Software, Chipkartensicherheit) - IT-Sicherheitskonzeption und -evaluation von IT-Produkten und IT-Systemen
(z.B. Common Criteria, FIPS-140, besonderer Gesichtspunkt: Verbraucherschutz in der Digitalisierung, Data Literacy) - IT-Sicherheitsmanagement
(z.B. Organisation & Prozesse, Governance & Standards, Audits und Controlling, IT-Security-Management in KMU, ISO 27000, VdS 10000) - Sichere und datenschutzfreundliche Entwicklung von Machine Learning (ML)
- Software- und Systemschwachstellenanalyse
(z.B. Sicherheitsanalysen, Penetrationstest) - Schadsoftwareanalyse und Einbrucherkennung
(z.B. Malware Analyse, Indicators of Compromise, Threat Intelligence) - Usable Security & Privacy
Offene Stellen
laufenden Forschungsprojekten und für die Lehrunterstützung in Laboren.
2024
Luigi Lo Iacono, Hartmut Schmitt, Denis Feth, Andreas Heinemann:
10. Usable Security und Privacy Workshop.
PDF Download (CC BY-NC-SA 4.0) doi:10.18420/muc2024-mci-ws17-105 urn:nbn:de:hbz:1044-opus-85614
BibTeX | RIS
Thomas Neteler, Sascha Fahl, Luigi Lo Iacono:
“You received $100,000 from Johnny”: A Mixed-Methods Study on Push Notification Security and Privacy in Android Apps.
PDF Download (CC BY 4.0) doi:10.1109/ACCESS.2024.3439095 urn:nbn:de:hbz:1044-opus-85473
BibTeX | RIS
Florian Dehling, Jan Tolsdorf, Hannes Federrath, Luigi Lo Iacono:
Internet Users' Willingness to Disclose Biometric Data for Continuous Online Account Protection: An Empirical Investigation.
PDF Download (CC BY 4.0) doi:10.56553/popets-2024-0060 urn:nbn:de:hbz:1044-opus-84843
BibTeX | RIS
Jan Tolsdorf, Luigi Lo Iacono:
Expert Perspectives on Information Security Awareness Programs in Medical Care Institutions in Germany.
doi:10.1007/978-3-031-61382-1_7
BibTeX | RIS
Dominik Schneider, Jannik Zeitschner, Michael Kloos, Kerstin Lemke-Rust, Luigi Lo Iacono:
Developers: Beware of Timing Side-Channels.
doi:10.1109/MSEC.2024.3399330
BibTeX | RIS
Stephan Wiefling, Marian Hönscheid, Luigi Lo Iacono:
A Privacy Measure Turned Upside Down? Investigating the Use of HTTP Client Hints on the Web.
PDF Download (postprint version) urn:nbn:de:hbz:1044-opus-83218 doi:10.1145/3664476.3664478
BibTeX | RIS
Andre Büttner, Andreas Thue Pedersen, Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono:
Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication.
doi:10.1007/978-981-97-1274-8_26 arXiv
BibTeX | RIS
Florian Dehling, Stefanie Ludborzs, Andreas Weßner, Rodrigo Falcão:
Konzepte für gebrauchstaugliche Datenschutzfunktionen in digitalen Ökosystemen.
doi:10.1007/s11623-023-1888-4
BibTeX | RIS
Christian K. Bosse, Florian Dehling, Eduard C. Groen, Simone Salemi, Hartmut Schmitt:
Auf dem Weg zu gebrauchstauglichen Datenschutzlösungen für digitale Ökosysteme.
doi:10.1007/s11623-023-1886-6
BibTeX | RIS
Hartmut Schmitt, Christian H. Schunck, Luigi Lo Iacono:
Datenökonomie in digitalen Ökosystemen.
doi:10.1007/s11623-023-1885-7
BibTeX | RIS
Denis Feth, Hartmut Schmitt, Luigi Lo Iacono:
Datenökonomie trifft Datenschutz.
doi:10.1007/s11623-023-1883-9
BibTeX | RIS
2023
Jan Tolsdorf, Luigi Lo Iacono:
Faktor Mensch: Risiko und Chance: Informationssicherheitsbewusstsein in medizinischen Einrichtungen – Expertenansichten (Teil 2).
BibTeX | RIS
Jan Tolsdorf, Luigi Lo Iacono:
Medizinisches Personal sensibilisieren: Bewusstsein für Gefährdungen der Patientenversorgung aus dem Cyberraum schaffen – Teil 1.
BibTeX | RIS
Jan Tolsdorf, Luigi Lo Iacono:
Data Cart: A Privacy Pattern for Personal Data Management in Organizations.
PDF Download (CC BY 4.0) doi:10.1007/978-3-031-28643-8_18 urn:nbn:de:hbz:1044-opus-82545
BibTeX | RIS
Eduard C. Groen, Denis Feth, Svenja Polst, Jan Tolsdorf, Stephan Wiefling, Luigi Lo Iacono, Hartmut Schmitt:
Achieving Usable Security and Privacy Through Human-Centered Design.
PDF Download (CC BY 4.0) doi:10.1007/978-3-031-28643-8_5 urn:nbn:de:hbz:1044-opus-82534
BibTeX | RIS
Luigi Lo Iacono, Stephan Wiefling, Michael Schneider:
Programmieren trainieren: Mit über 150 Workouts in Java und Python.
doi:10.3139/9783446478213
BibTeX | RIS
Salman Omar Sohail, Sven Schneider, Nico Hochgeschwender:
Automated Testing of Standard Conformance for Robots.
doi:10.1109/CASE56687.2023.10260447
BibTeX | RIS
Luigi Lo Iacono, Hartmut Schmitt, Denis Feth, Andreas Heinemann:
9. Usable Security und Privacy Workshop.
doi:10.18420/muc2023-mci-ws11-114
BibTeX | RIS
Minh Nguyen, Nico Hochgeschwender, Sebastian Wrede:
An Analysis of Behaviour-Driven Requirement Specification for Robotic Competitions.
doi:10.1109/RoSE59155.2023.00008
BibTeX | RIS
Desiana Nurchalifah, Sebastian Blumenthal, Luigi Lo Iacono, Nico Hochgeschwender:
Analysing the Safety and Security of a UV-C Disinfection Robot.
doi:10.1109/icra48891.2023.10160527
BibTeX | RIS
Stephan Wiefling:
Usability, security, and privacy of risk-based authentication.
doi:10.13154/294-9901 URL URL
BibTeX | RIS
Florian Nettersheim, Stephan Arlt, Michael Rademacher, Florian Dehling:
Katti: An Extensive and Scalable Tool for Website Analyses.
doi:10.1145/3543873.3587351
BibTeX | RIS
Vincent Unsel, Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono:
Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example.
PDF Download (postprint version) doi:10.1145/3577923.3583634 urn:nbn:de:hbz:1044-opus-66425
BibTeX | RIS
Stephan Wiefling, Jan Tolsdorf, Luigi Lo Iacono:
Data Protection Officers' Perspectives on Privacy Challenges in Digital Ecosystems.
PDF Download (postprint version) doi:10.1007/978-3-031-25460-4_13 urn:nbn:de:hbz:1044-opus-65973
BibTeX | RIS
Stephan Wiefling, Paul René Jørgensen, Sigurd Thunem, Luigi Lo Iacono:
Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service.
PDF Download (CC BY 4.0) doi:10.1145/3546069 arXiv urn:nbn:de:hbz:1044-opus-62878
BibTeX | RIS
2022
Luigi Lo Iacono, Jan Tolsdorf:
Schlussbericht des Teilvorhabens "Konzeptionierung, Implementierung und Evaluation von Privacy-Dashboards im Arbeitnehmerdatenschutz" im Rahmen des Verbundprojekts "TrUSD - Transparente und selbstbestimmte Ausgestaltung der Datennutzung im Unternehmen".
doi:10.2314/KXP:1843285487
BibTeX | RIS
Argentina Ortega, Nico Hochgeschwender, Thorsten Berger:
Testing Service Robots in the Field: An Experience Report.
doi:10.1109/IROS47612.2022.9981789
BibTeX | RIS
Stephan Wiefling, Paul René Jørgensen, Sigurd Thunem, Luigi Lo Iacono:
Login Data Set for Risk-Based Authentication.
doi:10.5281/zenodo.6782155
BibTeX | RIS
Luigi Lo Iacono, Hartmut Schmitt, Svenja Polst, Andreas Heinemann:
8. Usable Security und Privacy Workshop.
doi:10.18420/muc2022-mci-ws01-101
BibTeX | RIS
Peter Leo Gorski, Luigi Lo Iacono, Matthew Smith:
Eight Lightweight Usable Security Principles for Developers.
PDF Download (CC BY-NC-ND 4.0) doi:10.1109/MSEC.2022.3205484 urn:nbn:de:hbz:1044-opus-64613
BibTeX | RIS
Jan Tolsdorf:
Investigation of Information Privacy in Employment: Fundamental Knowledge and Practical Solutions for the Human-Centered Design of Measures to Preserve the Right to Informational Self-Determination in Employment.
doi:10.53846/goediss-9481
BibTeX | RIS
Dominik Opitz, Nico Hochgeschwender:
From Zero to Hero: Generating Training Data for Question-To-Cypher Models.
URL doi:10.1145/3528588.3528655
BibTeX | RIS
Christian Reuter, Luigi Lo Iacono, Alexander Benlian:
A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead.
doi:10.1080/0144929X.2022.2080908
BibTeX | RIS
Jan Tolsdorf, Florian Dehling, Luigi Lo Iacono:
Data cart – designing a tool for the GDPR-compliant handling of personal data by employees.
doi:10.1080/0144929X.2022.2069596
BibTeX | RIS
Marco Hünseler, Kerstin Lemke-Rust:
Simulating an Ethereum 2.0 Beacon Chain Network.
doi:10.1109/SDS54264.2021.9732095
BibTeX | RIS
Jan Tolsdorf, Delphine Reinhardt, Luigi Lo Iacono:
Employees’ privacy perceptions: exploring the dimensionality and antecedents of personal data sensitivity and willingness to disclose.
PDF Download (CC BY-NC-ND) doi:10.2478/popets-2022-0036 urn:nbn:de:hbz:1044-opus-61328
BibTeX | RIS
Deebul S. Nair, Nico Hochgeschwender, Miguel A. Olivares-Mendez:
Maximum Likelihood Uncertainty Estimation: Robustness to Outliers.
PDF Download (CC BY 4.0) doi:10.48550/arXiv.2202.03870 urn:nbn:de:hbz:1044-opus-61280
BibTeX | RIS
2021
Luigi Lo Iacono, Hartmut Schmitt, Svenja Polst, Andreas Heinemann:
7. Usable Security und Privacy Workshop.
doi:10.18420/muc2021-mci-ws14-124
BibTeX | RIS
Marco Hünseler, Kerstin Lemke-Rust, Eva Pöll, Katja Stoppenbrink:
Digitale Verbraucherteilhabe bei Blockchain-Anwendungen.
PDF Download (CC BY 4.0) doi:10.18418/978-3-96043-095-7_01 urn:nbn:de:hbz:1044-opus-60209
BibTeX | RIS
Stephan Wiefling, Jan Tolsdorf, Luigi Lo Iacono:
Privacy Considerations for Risk-Based Authentication Systems.
PDF Download (CC BY 4.0) doi:10.1109/EuroSPW54576.2021.00040 urn:nbn:de:hbz:1044-opus-58417
BibTeX | RIS
Florian Dehling, Denis Feth, Svenja Polst, Bianca Steffes, Jan Tolsdorf:
Components and Architecture for the Implementation of Technology-Driven Employee Data Protection.
doi:10.1007/978-3-030-86586-3_7
BibTeX | RIS
Artur Baranowski, Nico Hochgeschwender:
Grammar-Constrained Neural Semantic Parsing with LR Parsers.
PDF Download (CC BY 4.0) doi:10.18653/v1/2021.findings-acl.108 urn:nbn:de:hbz:1044-opus-57802
BibTeX | RIS
Sophie Jentzsch, Nico Hochgeschwender:
A qualitative study of Machine Learning practices and engineering challenges in Earth Observation.
PDF Download (CC BY 4.0) doi:10.1515/itit-2020-0045 urn:nbn:de:hbz:1044-opus-57583
BibTeX | RIS
Salman Omar Sohail, Alex Mitrevski, Nico Hochgeschwender, Paul G. Plöger:
Property-Based Testing in Simulation for Verifying Robot Action Execution in Tabletop Manipulation.
arXiv doi:10.1109/ECMR50962.2021.9568837
BibTeX | RIS
Peter Leo Gorski, Sebastian Möller, Stephan Wiefling, Luigi Lo Iacono:
"I just looked for the solution!" - On Integrating Security-Relevant Information in Non-Security API Documentation to Support Secure Coding Practices.
PDF Download (postprint version) doi:10.1109/TSE.2021.3094171 urn:nbn:de:hbz:1044-opus-56314
BibTeX | RIS
Santosh Thoduka, Nico Hochgeschwender:
Benchmarking Robots by Inducing Failures in Competition Scenarios.
doi:10.1007/978-3-030-77820-0_20
BibTeX | RIS
Andre Büttner, Hoai Viet Nguyen, Nils Gruschka, Luigi Lo Iacono:
Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software Systems.
PDF Download (postprint version) doi:10.1007/978-3-030-78120-0_22 urn:nbn:de:hbz:1044-opus-55491
BibTeX | RIS
Paul Höller, Alexander Krumeich, Luigi Lo Iacono:
XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany.
PDF Download (postprint version) doi:10.1007/978-3-030-78120-0_1 urn:nbn:de:hbz:1044-opus-55487 arXiv
BibTeX | RIS
Jan Tolsdorf, Michael Fischer, Luigi Lo Iacono:
A Case Study on the Implementation of the Right of Access in Privacy Dashboards.
doi:10.1007/978-3-030-76663-4_2
BibTeX | RIS
Christian Reuter, Konstantin Aal, Frank Beham, Alexander Boden, Florian Brauner, Frank Fiedrich, Frank Fuchs-Kittowski, Stefan Geisler, Klaus Gennen, Dominik Herrmann, Marc-André Kaufhold, Michael Klafft, Myriam Lipprandt, Luigi Lo Iacono, Thomas Ludwig, Stephan Lukosch, Tilo Mentler, Simon Nestler, Volkmar Pipek, Jens Pottebaum, Sven Quadflieg, Gebhard Rusch, Stefan Sackmann, Stefan Stieglitz, Christian Sturm, Melanie Volkamer, Volker Wulf:
Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion.
doi:10.1007/978-3-658-32795-8_31
BibTeX | RIS
Luigi Lo Iacono, Matthew Smith, Peter Leo Gorski:
Werkzeuge für Usable (Cyber-)Security.
doi:10.1007/978-3-658-32795-8_6
BibTeX | RIS
Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono:
Verify It's You: How Users Perceive Risk-based Authentication.
PDF Download (postprint version) doi:10.1109/MSEC.2021.3077954 urn:nbn:de:hbz:1044-opus-54912
BibTeX | RIS
Johannes Kunke, Stephan Wiefling, Markus Ullmann, Luigi Lo Iacono:
Evaluation of Account Recovery Strategies with FIDO2-based Passwordless Authentication.
PDF Download (CC BY-SA 4.0) URL urn:nbn:de:hbz:1044-opus-54904 arXiv
BibTeX | RIS
Samuel Parra, Sven Schneider, Nico Hochgeschwender:
Specifying QoS Requirements and Capabilities for Component-Based Robot Software.
URL doi:10.1109/RoSE52553.2021.00012
BibTeX | RIS
Jan Tolsdorf, Florian Dehling, Delphine Reinhardt, Luigi Lo Iacono:
Exploring mental models of the right to informational self-determination of office workers in Germany.
PDF Download (CC BY-NC-ND) doi:10.2478/popets-2021-0035 urn:nbn:de:hbz:1044-opus-53837
BibTeX | RIS
Till Schlüter, Kerstin Lemke-Rust:
Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers.
doi:10.1007/978-3-030-68487-7_10
BibTeX | RIS
Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono:
What's in Score for Website Users: A Data-driven Long-term Study on Risk-based Authentication Characteristics.
PDF Download (pre-proceedings version) URL arXiv urn:nbn:de:hbz:1044-opus-53053
BibTeX | RIS
Luigi Lo Iacono, Hartmut Schmitt:
Informationelle Selbstbestimmung am Arbeitsplatz.
doi:10.1007/s11623-020-1379-9
BibTeX | RIS
Jan Tolsdorf, Florian Dehling, Denis Feth:
Benutzerfreundlicher Datenschutz in Cloud-basierten Office-Paketen.
doi:10.1007/s11623-020-1386-x
BibTeX | RIS
Svenja Polst, Jan Tolsdorf, Florian Dehling, Denis Feth:
Verarbeitung von Beschäftigtendaten: Sichtweisen und Wünsche von Beschäftigten.
doi:10.1007/s11623-020-1383-0
BibTeX | RIS
2020
Sophie F. Jentzsch, Nico Hochgeschwender:
Don't Forget Your Roots! Using Provenance Data for Transparent and Explainable Development of Machine Learning Models.
doi:10.1109/ASEW.2019.00025
BibTeX | RIS
Jan Tolsdorf, Florian Dehling, Luigi Lo Iacono:
Take Back Control! The Use of Mental Models to Develop Privacy Dashboards.
URL
BibTeX | RIS
Jan Tolsdorf, Florian Dehling:
In Our Employer We Trust: Mental Models of Office Workers’ Privacy Perceptions.
doi:10.1007/978-3-030-54455-3_9
BibTeX | RIS
Jan Tolsdorf, Christian K. Bosse, Aljoscha Dietrich, Denis Feth, Hartmut Schmitt:
Privatheit am Arbeitsplatz: Transparenz und Selbstbestimmung bei Arbeit 4.0.
doi:10.1007/s11623-020-1247-7
BibTeX | RIS
Peter Leo Gorski, Yasemin Acar, Luigi Lo Iacono, Sascha Fahl:
Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs.
doi:10.1145/3313831.3376142
BibTeX | RIS
Hoai Viet Nguyen, Luigi Lo Iacono:
CREHMA: Cache-aware REST-ful HTTP Message Authentication.
doi:10.1145/3374664.3375750
BibTeX | RIS
Christian K. Bosse, Aljoscha Dietrich, Patricia Kelbert, Hagen Küchler, Hartmut Schmitt, Jan Tolsdorf, Andreas Weßner:
Beschäftigtendatenschutz: Rechtliche Anforderungen und Technische Lösungskonzepte.
BibTeX | RIS
Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono:
More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication.
PDF Download (postprint version) doi:10.1145/3427228.3427243 URL arXiv urn:nbn:de:hbz:1044-opus-50707
BibTeX | RIS
Luigi Lo Iacono, Hartmut Schmitt, Svenja Polst, Andreas Heinemann:
6. Usable Security und Privacy Workshop.
doi:10.18420/muc2020-ws119
BibTeX | RIS
Swaroop Bhandary K, Nico Hochgeschwender, Paul Plöger, Frank Kirchner, Matias Valdenegro-Toro:
Evaluating Uncertainty Estimation Methods on 3D Semantic Segmentation of Point Clouds.
arXiv doi:10.48550/arXiv.2007.01787
BibTeX | RIS
Stephan Wiefling, Tanvi Patil, Markus Dürmuth, Luigi Lo Iacono:
Evaluation of Risk-based Re-Authentication Methods.
PDF Download (postprint version) urn:nbn:de:hbz:1044-opus-49521 URL doi:10.1007/978-3-030-58201-2_19 arXiv
BibTeX | RIS
Stephan Wiefling:
Usability, Sicherheit und Privatsphäre von risikobasierter Authentifizierung.
doi:10.18420/sicherheit2020_12
BibTeX | RIS
Luigi Lo Iacono, Stephan Wiefling, Michael Schneider:
Programmieren trainieren: Mit über 130 Workouts in Java und Python.
doi:10.3139/9783446460577
BibTeX | RIS
Jan Tolsdorf, Luigi Lo Iacono:
Vision: Shred If Insecure – Persuasive Message Design as a Lesson and Alternative to Previous Approaches to Usable Secure Email Interfaces.
doi:10.1109/EuroSPW51379.2020.00031
BibTeX | RIS
Carl-Daniel Hailfinger, Kerstin Lemke-Rust, Christof Paar:
CCCiCC: A Cross-Core Cache-Independent Covert Channel on AMD Family 15h CPUs.
doi:10.1007/978-3-030-42068-0_10
BibTeX | RIS
Nico Hochgeschwender, Gary Cornelius, Holger Voos:
Arguing Security of Autonomous Robots.
doi:10.1109/IROS40897.2019.8967670
BibTeX | RIS
2019
Luigi Lo Iacono, Hartmut Schmitt, Svenja Polst, Andreas Heinemann:
5. Usable Security und Privacy Workshop.
doi:10.18420/muc2019-ws-302
BibTeX | RIS
Nadine Meissler, Annika Wohlan, Nico Hochgeschwender, Andreas Schreiber:
Using Visualization of Convolutional Neural Networks in Virtual Reality for Machine Learning Newcomers.
doi:10.1109/AIVR46125.2019.00031
BibTeX | RIS
Nadine Meissler, Annika Wohlan, Nico Hochgeschwender, Andreas Schreiber:
Explore Convolutional Neural Networks in Virtual Reality.
doi:10.1109/AIVR46125.2019.00056
BibTeX | RIS
Peter Seipel, Adrian Stock, Sivasurya Santhanam, Artur Baranowski, Nico Hochgeschwender, Andreas Schreiber:
Speak to your Software Visualization—Exploring Component-Based Software Architectures in Augmented Reality with a Conversational Interface.
doi:10.1109/VISSOFT.2019.00017
BibTeX | RIS
Federico Ciccozzi, Nico Hochgeschwender, Ivano Malavolta, Andreas Wortmann:
Report on the 2nd International Workshop on Robotics Software Engineering (RoSE'19).
doi:10.1145/3356773.3356804
BibTeX | RIS
Annika Wohlan, Nico Hochgeschwender, Nadine Meissler:
Visualizing Convolutional Neural Networks with Virtual Reality.
doi:10.1145/3359996.3364817
BibTeX | RIS
Sophie F. Jentzsch, Sviatlana Höhn, Nico Hochgeschwender:
Conversational Interfaces for Explainable AI: A Human-Centred Approach.
doi:10.1007/978-3-030-30391-4_5
BibTeX | RIS
Nico Hochgeschwender:
Adaptive Deployment of Safety Monitors for Autonomous Systems.
doi:10.1007/978-3-030-26250-1_28
BibTeX | RIS
Peter Seipel, Adrian Stock, Sivasurya Santhanam, Artur Baranowski, Nico Hochgeschwender, Andreas Schreiber:
Adopting Conversational Interfaces for Exploring OSGi-Based Software Architectures in Augmented Reality.
doi:10.1109/BotSE.2019.00013
BibTeX | RIS
Peter L. Gorski, Emanuel von Zezschwitz, Luigi Lo Iacono, Matthew Smith:
On providing systematized access to consolidated principles, guidelines and patterns for usable security research and development.
doi:10.1093/cybsec/tyz014
BibTeX | RIS
Florian Dehling, Tobias Mengel, Luigi Lo Iacono:
Rotten Cellar: Security and Privacy of the Browser Cache Revisited.
doi:10.1007/978-3-030-35055-0_2 URL
BibTeX | RIS
Hoai Viet Nguyen, Luigi Lo Iacono, Hannes Federrath:
Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack.
doi:10.1145/3319535.3354215
BibTeX | RIS
Hans Christian Rudolph, Andreas Kunz, Luigi Lo Iacono, Hoai Viet Nguyen:
Security Challenges of the 3GPP 5G Service Based Architecture.
doi:10.1109/MCOMSTD.2019.1800034
BibTeX | RIS
Hoai Viet Nguyen, Luigi Lo Iacono, Hannes Federrath:
Mind the cache: large-scale explorative study of web caching.
doi:10.1145/3297280.3297526
BibTeX | RIS
Luigi Lo Iacono, Hoai Viet Nguyen, Peter Leo Gorski:
On the Need for a General REST-Security Framework.
doi:10.3390/fi11030056
BibTeX | RIS
Stephan Wiefling, Luigi Lo Iacono, Markus Dürmuth:
Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild.
doi:10.1007/978-3-030-22312-0_10 URL arXiv
BibTeX | RIS
Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono:
Even Turing Should Sometimes Not Be Able To Tell: Mimicking Humanoid Usage Behavior for Exploratory Studies of Online Services.
doi:10.1007/978-3-030-35055-0_12 URL
BibTeX | RIS
Markus Ullmann, Thomas Strubbe, Christian Wieschebrink:
Vernetzter Straßenverkehr: Herausforderungen für die IT-Sicherheit.
doi:10.1007/978-3-658-26945-6_17
BibTeX | RIS
Markus Ullmann, Thomas Strubbe, Christian Wieschebrink:
Nachweismöglichkeiten der IT-Sicherheit.
doi:10.1007/978-3-658-26945-6_19
BibTeX | RIS
Kerstin Lemke-Rust, Peter Samarin:
Exploring Embedded Software with Side Channels and Fault Analysis.
doi:10.1109/EWME.2018.8629479
BibTeX | RIS
Peter Samarin, Kerstin Lemke-Rust:
Detection of Counterfeit ICs using Public Identification Sequences and Side-Channel Leakage.
doi:10.1109/TIFS.2018.2866333
BibTeX | RIS
2018
Luigi Lo Iacono, Hartmut Schmitt, Andreas Heinemann:
4. Usable Security und Privacy Workshop.
doi:10.18420/muc2018-ws08-0538
BibTeX | RIS
Nico Hochgeschwender, Geoffrey Biggs, Holger Voos:
A Reference Architecture for Deploying Component-Based Robot Software and Comparison with Existing Tools.
doi:10.1109/IRC.2018.00026
BibTeX | RIS
Davide Brugali, Nico Hochgeschwender:
Software Product Line Engineering for Robotic Perception Systems.
doi:10.1142/S1793351X18400056
BibTeX | RIS
Gary Cornelius, Nico Hochgeschwender, Holger Voos:
Model-Driven Interaction Design for Social Robots.
doi:10.1007/978-3-319-74730-9_20
BibTeX | RIS
Hoai Viet Nguyen, Luigi Lo Iacono, Hannes Federrath:
Systematic Analysis of Web Browser Caches.
doi:10.1145/3240431.3240443
BibTeX | RIS
Peter Leo Gorski:
Usability von Security-APIs für massiv-skalierbare vernetzte Service-orientierte Systeme.
doi:10.18420/sicherheit2018_26
BibTeX | RIS
Luigi Lo Iacono, Matthew Smith:
Werkzeuge für Usable (Cyber-)Security.
doi:10.1007/978-3-658-19523-6_6
BibTeX | RIS
Luigi Lo Iacono, Matthew Smith, Emanuel von Zezschwitz, Peter Leo Gorski, Peter Nehren:
Consolidating Principles and Patterns for Human-centred Usable Security Research and Development.
doi:10.14722/eurousec.2018.23010
BibTeX | RIS
Silvia Santano Guillén, Luigi Lo Iacono, Christian Meder:
Affective Robots: Evaluation of Automatic Emotion Recognition Approaches on a Humanoid Robot towards Emotionally Intelligent Machines.
BibTeX | RIS
Nils Gruschka, Luigi Lo Iacono, Jan Tolsdorf:
Classification of Android App Permissions: Tell me What app you are and I Tell you What you are Allowed to do.
BibTeX | RIS
Peter Leo Gorski, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian Möller, Yasemin Acar, Sascha Fahl:
Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse.
URL
BibTeX | RIS
Christian Reuter, Konstantin Aal, Frank Beham, Alexander Boden, Florian Brauner, Frank Fiedrich, Frank Fuchs-Kittowski, Stefan Geisler, Klaus Gennen, Dominik Herrmann, Marc-André Kaufhold, Michael Klafft, Myriam Lipprandt, Luigi Lo Iacono, Thomas Ludwig, Stephan Lukosch, Tilo Mentler, Simon Nestler, Volkmar Pipek, Jens Pottebaum, Gebhard Rusch, Stefan Sackmann, Stefan Stieglitz, Christian Sturm, Melanie Volkamer, Volker Wulf:
Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion.
doi:10.1007/978-3-658-19523-6_30
BibTeX | RIS
Peter Leo Gorski, Luigi Lo Iacono, Stephan Wiefling, Sebastian Möller:
Warn if Secure or How to Deal with Security by Default in Software Development?.
URL
BibTeX | RIS
Luigi Lo Iacono, Stephan Wiefling, Michael Schneider:
Programmieren trainieren: Mit über 120 Workouts in Java und Python.
doi:10.3139/9783446455030
BibTeX | RIS
Kerstin Lemke-Rust, Peter Samarin:
Detektion von Plagiaten eingebetteter Software mittels Seitenkanalanalysen (DePlagEmSoft): Schlussbericht, Berichtszeitraum: 1. Dezember 2013-31. Mai 2018, Projektstart: 1. Dezember 2013, Laufzeit: 4 Jahre, 6 Monate.
doi:10.2314/KXP:1667395300
BibTeX | RIS
Sandro Berndt, Thomas Strubbe, Nicolas Thenee, Markus Ullmann, Christian Wieschebrink:
Sichere Vehicle-to-X Kommunikation in Europa.
BibTeX | RIS
Peter Samarin, Kerstin Lemke-Rust:
Detecting Similar Code Segments Through Side Channel Leakage in Microcontrollers.
doi:10.1007/978-3-319-78556-1_9
BibTeX | RIS
2017
Thomas Barabosch, Niklas Bergmann, Adrian Dombeck, Elmar Padilla:
Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps.
doi:10.1007/978-3-319-60876-1_10
BibTeX | RIS
Luigi Lo Iacono, Hartmut Schmitt, Andreas Heinemann:
3. Workshop Usable Security: Ziele der Usability und Security ausbalancieren.
doi:10.18420/muc2017-ws05-0401
BibTeX | RIS
Holger Harms, Collin Rogowski, Luigi Lo Iacono:
Guidelines for adopting frontend architectures and patterns in microservices-based systems.
doi:10.1145/3106237.3117775
BibTeX | RIS
Hoai Viet Nguyen, Jan Tolsdorf, Luigi Lo Iacono:
On the Security Expressiveness of REST-Based API Definition Languages.
doi:10.1007/978-3-319-64483-7_14
BibTeX | RIS
Luigi Lo Iacono, Nils Gruschka, Peter Nehren:
Mobile Personal Identity Provider Based on OpenID Connect.
doi:10.1007/978-3-319-64483-7_2
BibTeX | RIS
Peter Leo Gorski, Luigi Lo Iacono, Hartmut Schmitt, Peter Nehren, Hoai Viet Nguyen:
Usable Security by Design: Unterstützung für kleine und mittlere Softwarehersteller in frühen Phasen der Produktentwicklung.
BibTeX | RIS
Hoai Viet Nguyen, Luigi Lo Iacono:
Sicherheit für REST-basierte Systeme: Zur Notwendigkeit eines generischen Sicherheitsframeworks für REST.
doi:10.1007/s11623-017-0736-9
BibTeX | RIS
Hartmut Schmitt, Peter Leo Gorski, Luigi Lo Iacono:
Usable Security – Benutzerfreundliche Sicherheitsfunktionen für Software und interaktive Produkte.
URL
BibTeX | RIS
Peter Nehren, Hartmut Schmitt, Luigi Lo Iacono:
Usable Security – Werkzeuge für Entwickler.
URL
BibTeX | RIS
Peter Leo Gorski, Luigi Lo Iacono:
Computer-Sicherheitswarnungen – Benutzerzentrierte Entwurfsansätze der Usable Security-Forschung.
URL
BibTeX | RIS
Hartmut Schmitt, Peter Nehren, Luigi Lo Iacono, Peter Leo Gorski:
Usable Security und Privacy by Design.
URL
BibTeX | RIS
Luigi Lo Iacono, Peter Leo Gorski, Josephine Grosse, Nils Gruschka:
Signalling over-privileged mobile applications using passive security indicators.
doi:10.1016/j.jisa.2016.11.006
BibTeX | RIS
Luigi Lo Iacono, Peter Leo Gorski:
I Do and I Understand. Not Yet True for Security APIs. So Sad.
doi:10.14722/eurousec.2017.23015
BibTeX | RIS
Stephan Wiefling, Luigi Lo Iacono, Frederik Sandbrink:
Anwendung der Blockchain außerhalb von Geldwährungen.
doi:10.1007/s11623-017-0816-x URL
BibTeX | RIS
Torsten Jandt, Padmaja Kulkarni, José C. Mayoral, Deebul Nair, Boris Ndimubanzi Senga, Santosh Thoduka, Iman Awaad, Nico Hochgeschwender, Sven Schneider, Gerhard K. Kraetzschmar:
b-it-bots RoboCup@Work Team Description Paper.
BibTeX | RIS
Sandro Berndt, Lutz Rittershaus, Carsten Kühnei, Thomas Strubbe, Nicolas Thenee, Markus Ullmann, Hans-Peter Wagner, Christian Wieschebrink:
Sichere Vehicle-2-X-Kommunikation in Europa.
BibTeX | RIS
Maik Riestock, Frank Engelhardt, Sebastian Zug, Nico Hochgeschwender:
User study on remotely controlled UAVs with focus on interfaces and data link quality.
doi:10.1109/IROS.2017.8206179
BibTeX | RIS
Nico Hochgeschwender:
Model-Based Specification, Deployment and Adaptation of Robot Perception Systems.
URL
BibTeX | RIS
Gary Cornelius, Patrice Caire, Nico Hochgeschwender, Miguel A. Olivares-Mendez, Paulo Esteves-Verissimo, Marcus Völp, Holger Voos:
A Perspective of Security for Mobile Service Robots.
doi:10.1007/978-3-319-70833-1_8
BibTeX | RIS
Rainer Bischoff, Tim Friedrich, Gerhard K. Kraetzschmar, Sven Schneider, Nico Hochgeschwender:
RoCKIn@Work: Industrial Robot Challenge.
PDF Download (CC BY 3.0) doi:10.5772/intechopen.70014 urn:nbn:de:hbz:1044-opus-33084
BibTeX | RIS
Markus Ullmann, Thomas Strubbe, Christian Wieschebrink:
Misuse Capabilities of the V2V Communication to Harm the Privacy of Vehicles and Drivers.
URL
BibTeX | RIS
Peter Samarin, Kerstin Lemke-Rust:
Detection of counterfeit ICs using public identification sequences.
doi:10.1109/HST.2017.7951827
BibTeX | RIS
Ulrik Pagh Schultz, Mirko Bordignon, Kasper Stoy, Arne Nordmann, Nico Hochgeschwender, Sebastian Wrede:
DSLs in Robotics: A Case Study in Programming Self-reconfigurable Robots.
doi:10.1007/978-3-319-60074-1_5
BibTeX | RIS
Davide Brugali, Nico Hochgeschwender:
Managing the Functional Variability of Robotic Perception Systems.
doi:10.1109/IRC.2017.20
BibTeX | RIS
Michael Kiometzis, Markus Ullmann:
Fahrdaten für alle? Car-2-Car Kommunikation und die Folgen.
doi:10.1007/s11623-017-0763-6
BibTeX | RIS
Maik Riestock, Frank Engelhardt, Sebastian Zug, Nico Hochgeschwender:
Exploring Gridmap-based Interfaces for the Remote Control of UAVs under Bandwidth Limitations.
doi:10.1145/3029798.3038350
BibTeX | RIS
Kerstin Lemke-Rust, Michael Tunstall (Hg.):
Smart Card Research and Advanced Applications: 15th International Conference, CARDIS 2016, Cannes, France, November 7–9, 2016, Revised Selected Papers.
doi:10.1007/978-3-319-54669-8
BibTeX | RIS
Loic Gammaitoni, Nico Hochgeschwender:
RPSL meets lightning: A model-based approach to design space exploration of robot perception systems.
doi:10.1109/SIMPAR.2016.7862378
BibTeX | RIS
Nico Hochgeschwender, Sven Schneider, Holger Voos, Herman Bruyninckx, Gerhard K. Kraetzschmar:
Graph-based software knowledge: Storage and semantic querying of domain models for run-time adaptation.
doi:10.1109/SIMPAR.2016.7862379
BibTeX | RIS
Markus Ullmann, Thomas Strubbe, Christian Wieschebrink:
Poster: V2V communication — Keeping you under non-disputable surveillance.
doi:10.1109/VNC.2016.7835975
BibTeX | RIS
Sebastian Zug, Tim Niemueller, Nico Hochgeschwender, Kai Seidensticker, Martin Seidel, Tim Friedrich, Tobias Neumann, Ulrich Karras, Gerhard Kraetzschmar, Alexander Ferrein:
An Integration Challenge to Bridge the Gap among Industry-inspired RoboCup Leagues.
doi:10.1007/978-3-319-68792-6_13
BibTeX | RIS
2016
Khaled Yakdan, Sergej Dechand, Elmar Gerhards-Padilla, Matthew Smith:
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study.
doi:10.1109/SP.2016.18
BibTeX | RIS
Daniel Plohmann, Khaled Yakdan, Michael Klatt, Johannes Bader, Elmar Gerhards-Padilla:
A Comprehensive Measurement Study of Domain Generating Malware.
URL
BibTeX | RIS
Sebastian Eschweiler, Khaled Yakdan, Elmar Gerhards-Padilla:
discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code.
doi:10.14722/ndss.2016.23185
BibTeX | RIS
Hartmut Schmitt, Luigi Lo Iacono, Sascha Wagner:
Workshop des Arbeitskreises „Usable Security & Privacy“ – Ziele, Themen, Ausblick.
doi:10.18420/muc2016-up-0012
BibTeX | RIS
Luigi Lo Iacono, Hartmut Schmitt:
Usable Security and Privacy: Ansätze und Lösungen zur nutzerzentrierten Entwicklung und Ausgestaltung von digitalen Schutzmechanismen.
doi:10.18420/muc2016-ws03-0000
BibTeX | RIS
Hoai Viet Nguyen, Luigi Lo Iacono:
RESTful IoT Authentication Protocols.
doi:10.1016/B978-0-12-804629-6.00010-9
BibTeX | RIS
Luigi Lo Iacono, Hoai Viet Nguyen, Hartmut Schmitt:
Usable Security – Results from a Field Study.
doi:10.1515/icom-2016-0026
BibTeX | RIS
Aline Jaritz, Luigi Lo Iacono:
Untersuchung des Datenverkehrs aktueller Smart-TVs.
doi:10.1007/s11623-016-0648-0
BibTeX | RIS
Marc Skutnik, Luigi Lo Iacono, Christian Neuhaus:
Methods of Data Processing and Communication for a Web-based Wind Flow Visualization.
doi:10.5220/0005846800320041
BibTeX | RIS
Luigi Lo Iacono, Silvia Santano Guillén:
Adaptive Push-based Media Streaming in the Web.
doi:10.5220/0005813501210129 URL
BibTeX | RIS
Hoai Viet Nguyen, Luigi Lo Iacono:
REST-ful CoAP Message Authentication.
doi:10.1109/SIOT.2015.8
BibTeX | RIS
Hartmut Schmitt, Peter Nehren:
Usable Security and Privacy by Design - Teil 2: Anwendungsfälle und Musterlösungen für Unternehmenssoftware.
URL
BibTeX | RIS
Peter Leo Gorski, Luigi Lo Iacono:
Towards the Usability Evaluation of Security APIs.
URL
BibTeX | RIS
Markus Ullmann, Christian Wieschebrink, Thomas Strubbe, Dennis Kuegler:
Secure Vehicle-to-Infrastructure Communication: Secure Roadside Stations, Key Management, and Crypto Agility.
URL
BibTeX | RIS
Markus Ullmann, Thomas Strubbe, Christian Wieschebrink:
Technical Limitations, and Privacy Shortcomings of the Vehicle-to-Vehicle Communication.
URL
BibTeX | RIS
Markus Ullmann, Khalil El-Khatib (Hg.):
VEHICULAR 2016: The Fifth International Conference on Advances in Vehicular Systems, Technologies and Applications. November 13-17, 2016, Barcelona, Spain.
URL
BibTeX | RIS
Matthias Neu, Ulrike Korte, Markus Ullmann:
Improvement of Fuzzy Vault for Multiple Fingerprints with Angles.
doi:10.1109/BIOSIG.2016.7736926 URL
BibTeX | RIS
Jacek Samotyja, Kerstin Lemke-Rust:
Practical Results of ECC Side Channel Countermeasures on an ARM Cortex M3 Processor.
doi:10.1145/2996366.2996371
BibTeX | RIS
Peter Samarin, Alexander Skripnik, Kerstin Lemke-Rust:
Fault-Channel Watermarks.
doi:10.1007/978-3-319-45931-8_13
BibTeX | RIS
Arne Nordmann, Nico Hochgeschwender, Dennis Wigand, Sebastian Wrede:
A Survey on Domain-Specific Modeling and Languages in Robotics.
PDF Download (CC BY 3.0) doi:10.6092/JOSER_2016_07_01_p75 urn:nbn:de:hbz:1044-opus-26746
BibTeX | RIS
Shehzad Ahmed, Torsten Jandt, Padmaja Kulkarni, Oscar Lima, Arka Mallick, Alexander Moriarty, Deebul Nair, Santosh Thoduka, Iman Awaad, Rhama Dwiputra, Frederik Hegger, Nico Hochgeschwender, Jose Sanchez, Sven Schneider, Gerhard K. Kraetzschmar:
b-it-bots RoboCup@Work Team Description Paper.
BibTeX | RIS
Kerstin Lemke-Rust:
Sicherheit der Verbraucher in vernetzten Fahrzeugen.
PDF Download (CC BY-SA 3.0) doi:10.15501/978-3-86336-912-5_4 urn:nbn:de:hbz:1044-opus-25482
BibTeX | RIS
Nico Hochgeschwender, Holger Voos, Gerhard K. Kraetzschmar:
Towards Persistent Storage and Retrieval of Domain Models using Graph Database Technology.
arXiv
BibTeX | RIS
Jose Sanchez, Sven Schneider, Nico Hochgeschwender, Gerhard Kraetzschmar, Paul G. Plöger:
Context-Based Adaptation of In-Hand Slip Detection for Service Robots.
doi:10.1016/j.ifacol.2016.07.765
BibTeX | RIS
Peter Samarin, Kerstin Lemke-Rust, Christof Paar:
IP core protection using voltage-controlled side-channel receivers.
doi:10.1109/HST.2016.7495585
BibTeX | RIS
2015
Thomas Barabosch, Adrian Dombeck, Khaled Yakdan, Elmar Gerhards-Padilla:
BotWatcher - Transparent and Generic Botnet Tracking.
doi:10.1007/978-3-319-26362-5_26
BibTeX | RIS
Khaled Yakdan, Sebastian Eschweiler, Elmar Gerhards-Padilla, Matthew Smith:
No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations.
URL
BibTeX | RIS
Viviane Zwanger, Elmar Gerhards-Padilla, Michael Meier:
Codescanner: Detecting (Hidden) x86/x64 code in arbitrary files.
doi:10.1109/MALWARE.2014.6999403
BibTeX | RIS
Thomas Barabosch, Elmar Gerhards-Padilla:
Host-based code injection attacks: A popular technique used by malware.
doi:10.1109/MALWARE.2014.6999410
BibTeX | RIS
Luigi Lo Iacono, Hartmut Schmitt:
Usable Security and Privacy: Nutzerzentrierte Lösungsansätze zum Schutz sensibler Daten.
URL
BibTeX | RIS
Sven Hricaj, Luigi Lo Iacono, Hoai Viet Nguyen, Marc Skutnik, Annette Ricke, Sven Wagner:
WHELP: Web-Based Holistic E-Learning Platform.
URL
BibTeX | RIS
Luigi Lo Iacono:
Partial Data Protection via Structure-Preserving Document Partitioning.
doi:10.1109/Trustcom.2015.450
BibTeX | RIS
Wolfgang Börger, Luigi Lo Iacono:
User Perception and Response to Computer Security Warnings.
doi:10.1515/9783110443905-087
BibTeX | RIS
Hoai Viet Nguyen:
WebSocket - WS^2 2.0.
URL
BibTeX | RIS
Luigi Lo Iacono, Hoai Viet Nguyen:
Towards Conformance Testing of REST-based Web Services.
doi:10.5220/0005412202170227
BibTeX | RIS
Luigi Lo Iacono, Hoai Viet Nguyen:
Authentication Scheme for REST.
doi:10.1007/978-3-319-19210-9_8
BibTeX | RIS
Peter Leo Gorski, Luigi Lo Iacono, Hoai Viet Nguyen, Daniel Behnam Torkian:
Web of Services Security: Mehr als die Sicherheit von Webanwendungen.
doi:10.1007/s11623-015-0420-x
BibTeX | RIS
Luigi Lo Iacono, Hoai Viet Nguyen, Tobias Hirsch, Maurice Baiers, Sebastian Möller:
UI-Dressing to Detect Phishing.
doi:10.1109/HPCC.2014.126
BibTeX | RIS
Luigi Lo Iacono:
Signalschutz im Zeitalter von TV-Ökosystemen: Sicherheits- und Datenschutzaspekte von Google TV.
doi:10.1007/s11623-015-0371-2
BibTeX | RIS
Peter Leo Gorski, Luigi Lo Iacono, Hoai Viet Nguyen:
WebSockets: Moderne HTML5-Echtzeitanwendungen entwickeln.
doi:10.3139/9783446444386
BibTeX | RIS
Peter Leo Gorski, Luigi Lo Iacono, Hartmut Schmitt:
Usable Security und Privacy by Design - Teil 1: Benutzerzentrierte Entwicklung von Sicherheitsfunktionen.
URL
BibTeX | RIS
Christoph Pörschmann, Stephan Wiefling:
Dynamische Binauralsynthese auf Basis gemessener einkanaliger Raumimpulsantworten.
BibTeX | RIS
Christoph Pörschmann, Stephan Wiefling:
Perceptual Aspects of Dynamic Binaural Synthesis based on measured Omnidirectional Room Impulse Responses.
BibTeX | RIS
Markus Ullmann, Ralph Breithaupt:
Hands-on Smart Card User Interface Research, Development, and Testing.
URL
BibTeX | RIS
Markus Ullmann, Christian Wieschebrink, Dennis Kügler:
Public Key Infrastructure and Crypto Agility Concept for Intelligent Transportation Systems.
URL
BibTeX | RIS
Jacek Samotyja, Kerstin Lemke-Rust, Markus Ullmann:
SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node.
PDF Download (CC BY 4.0) URL urn:nbn:de:hbz:1044-opus-25248
BibTeX | RIS
Peter Schartner, Kerstin Lemke-Rust, Markus Ullmann (Hg.):
D-A-CH security 2015: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven: Arbeitskonferenz D-A-CH Security in St. Augustin bei Bonn, 08.-09. September 2015 ergänzt durch die Workshops der GI Fachgruppe SECMGT und der Allianz für Cyber-Sicherheit.
BibTeX | RIS
Luca Gherardi, Nico Hochgeschwender:
RRA: Models and tools for robotics run-time adaptation.
doi:10.1109/IROS.2015.7353608
BibTeX | RIS
Luca Gherardi, Nico Hochgeschwender:
Poster: Model-based Run-time Variability Resolution for Robotic Applications.
doi:10.1109/ICSE.2015.269
BibTeX | RIS
Sebastian Blumenthal, Nico Hochgeschwender, Erwin Prassler, Holger Voos, Herman Bruyninckx:
An Approach for a Distributed World Model with QoS-based Perception Algorithm Adaptation.
doi:10.1109/IROS.2015.7353612
BibTeX | RIS
Sven Schneider, Frederik Hegger, Nico Hochgeschwender, Rhama Dwiputra, Alexander Moriarty, Jakob Berghofer, Gerhard K. Kraetzschmar:
Design and development of a benchmarking testbed for the Factory of the Future.
doi:10.1109/ETFA.2015.7301423
BibTeX | RIS
Nico Hochgeschwender, Miguel A. Olivares-Mendez, Holger Voos, Gerhard K. Kraetzschmar:
Context-based selection and execution of robot perception graphs.
doi:10.1109/ETFA.2015.7301631
BibTeX | RIS
Francesco Amigoni, Emanuele Bastianelli, Jakob Berghofer, Andrea Bonarini, Giulio Fontana, Nico Hochgeschwender, Luca Iocchi, Gerhard Kraetzschmar, Pedro Lima, Matteo Matteucci, Pedro Miraldo, Daniele Nardi, Viola Schiaffonati:
Competitions for Benchmarking: Task and Functionality Scoring Complete Performance Assessment.
doi:10.1109/MRA.2015.2448871
BibTeX | RIS
Ariano-Tim Donda, Peter Samarin, Jacek Samotyja, Kerstin Lemke-Rust, Christof Paar:
Remote IP Protection Using Timing Channels.
doi:10.1007/978-3-319-15943-0_14
BibTeX | RIS
Gerhard K. Kraetzschmar, Nico Hochgeschwender, Walter Nowak, Frederik Hegger, Sven Schneider, Rhama Dwiputra, Jakob Berghofer, Rainer Bischoff:
RoboCup@Work: Competing for the Factory of the Future.
doi:10.1007/978-3-319-18615-3_14
BibTeX | RIS
2014
Martin Lambertz, Rafael Uetz, Elmar Gerhards-Padilla:
Resurrection: A Carver for Fragmented Files.
doi:10.1007/978-3-319-14289-0_5
BibTeX | RIS
Khaled Yakdan, Sebastian Eschweiler, Elmar Gerhards-Padilla:
REcompile: A decompilation framework for static analysis of binaries.
doi:10.1109/MALWARE.2013.6703690
BibTeX | RIS
Thomas Barabosch, Sebastian Eschweiler, Elmar Gerhards-Padilla:
Bee Master: Detecting Host-Based Code Injection Attacks.
doi:10.1007/978-3-319-08509-8_13
BibTeX | RIS
Luigi Lo Iacono, Silvia Santano Guillén:
Efficient and Adaptive Web-native Live Video Streaming.
URL
BibTeX | RIS
Peter Leo Gorski, Christian Naldony, Markus Roskosch, Benjamin Horvat, Daniel Behnam Torkian, Hoai Viet Nguyen, Luigi Lo Iacono:
SOA und REST-Services: Ist REST reif genug, um SOA-Umgebungen zu verwirklichen?.
URL
BibTeX | RIS
Peter Leo Gorski, Luigi Lo Iacono, Hoai Viet Nguyen, Daniel Behnam Torkian:
Service Security Revisited.
doi:10.1109/SCC.2014.68
BibTeX | RIS
Luigi Lo Iacono, Silvia Santano Guillén:
Web-native Video Live Streaming.
doi:10.13140/2.1.1729.4400
BibTeX | RIS
Luigi Lo Iacono, Daniel Torkian:
A System-Oriented Approach to Full-Text Search on Encrypted Cloud Storage.
doi:10.1109/CSC.2013.12
BibTeX | RIS
Peter Leo Gorski, Luigi Lo Iacono, Hoai Viet Nguyen, Daniel Behnam Torkian:
SOA-Readiness of REST.
doi:10.1007/978-3-662-44879-3_6
BibTeX | RIS
Markus Ullmann, Ralph Breithaupt:
Scuid^Sim: A Platform for Smart Card User Interface Research, Development and Testing.
URL
BibTeX | RIS
Nico Hochgeschwender, Roland Philippsen:
From the Guest Editors of the Special Issue on Best Practice in Robotic Software Development.
PDF Download (CC BY 3.0) doi:10.6092/JOSER_2014_05_01_p1 urn:nbn:de:hbz:1044-opus-26570
BibTeX | RIS
Luca Gherardi, Nico Hochgeschwender, Christian Schlegel, Ulrik Pagh Schultz, Serge Stinckwich (Hg.):
Proceedings of the Fifth International Workshop on Domain-Specific Languages and Models for Robotic Systems (DSLRob 2014).
arXiv
BibTeX | RIS
Arne Nordmann, Nico Hochgeschwender, Sebastian Wrede:
A Survey on Domain-Specific Languages in Robotics.
doi:10.1007/978-3-319-11900-7_17
BibTeX | RIS
Nico Hochgeschwender, Sven Schneider, Holger Voos, Gerhard K. Kraetzschmar:
Towards a Robot Perception Specification Language.
arXiv
BibTeX | RIS
Rhama Dwiputra, Jakob Berghofer, Aamir Ahmad, Iman Awaad, Francesco Amigoni, Rainer Bischoff, Andrea Bonarini, Giulio Fontana, Frederik Hegger, Nico Hochgeschwender, Luca Iocchi, Gerhard Kraetzschmar, Pedro Lima, Matteo Matteucci, Daniele Nardi, Viola Schiaffonati, Sven Schneider:
The RoCKIn@Work Challenge.
URL
BibTeX | RIS
Nico Hochgeschwender, Luca Gherardi, Azamat Shakhirmardanov, Gerhard K. Kraetzschmar, Davide Brugali, Herman Bruyninckx:
A model-based approach to software deployment in robotics.
doi:10.1109/IROS.2013.6696915
BibTeX | RIS
Sven Schneider, Nico Hochgeschwender, Gerhard K. Kraetzschmar:
Declarative specification of task-based grasping with constraint validation.
doi:10.1109/IROS.2014.6942669
BibTeX | RIS
Sven Schneider, Nico Hochgeschwender, Gerhard K. Kraetzschmar:
Structured Design and Development of Domain-Specific Languages in Robotics.
doi:10.1007/978-3-319-11900-7_20
BibTeX | RIS
Nico Hochgeschwender, Sven Schneider, Holger Voos, Gerhard K. Kraetzschmar:
Declarative Specification of Robot Perception Architectures.
doi:10.1007/978-3-319-11900-7_25
BibTeX | RIS
2013
Timo Bartkewitz, Kerstin Lemke-Rust:
Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines.
doi:10.1007/978-3-642-37288-9_18
BibTeX | RIS
Daniel Plohmann, Sebastian Eschweiler, Elmar Gerhards-Padilla:
Patterns of a cooperative malware analysis workflow.
URL
BibTeX | RIS
Heli Tiirmaa-Klaar, Jan Gassen, Elmar Gerhards-Padilla, Peter Martini:
Botnets.
doi:10.1007/978-1-4471-5216-3
BibTeX | RIS
André Wichmann, Elmar Gerhards-Padilla:
Using Infection Markers as a Vaccine against Malware Attacks.
doi:10.1109/GreenCom.2012.121
BibTeX | RIS
Felix Matenaar, André Wichmann, Felix Leder, Elmar Gerhards-Padilla:
CIS: The Crypto Intelligence System for automatic detection and localization of cryptographic functions in current malware.
doi:10.1109/MALWARE.2012.6461007
BibTeX | RIS
Nils Aschenbruck, Elmar Gerhards-Padilla, Martin Lambertz:
Applicability of crypto-based security approaches in tactical wireless multi-hop networks.
doi:10.1109/LCN.2012.6423584
BibTeX | RIS
Christian Mainka, Meiko Jensen, Luigi Lo Iacono, Jörg Schwenk:
Making XML Signatures Immune to XML Signature Wrapping Attacks.
doi:10.1007/978-3-319-04519-1_10
BibTeX | RIS
Christoph Sorge, Luigi Lo Iacono, Nils Gruschka:
Sicherheit in Kommunikationsnetzen.
doi:10.1524/9783486720174
BibTeX | RIS
Nils Gruschka, Luigi Lo Iacono, Christoph Sorge:
Analysis of the current state in website certificate validation.
doi:10.1002/sec.799
BibTeX | RIS
Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, Ninja Marnau:
Security and Privacy-Enhancing Multicloud Architectures.
doi:10.1109/TDSC.2013.6
BibTeX | RIS
J. Vandorpe, J. Vliegen, R. Smeets, N. Mentens, M. Drutarovsky, M. Varchola, K. Lemke-Rust, P. Plöger, P. Samarin, D. Koch, Y. Hafting, J. Tørresen:
Remote FPGA design through eDiViDe - European Digital Virtual Design Lab.
doi:10.1109/FPL.2013.6645621
BibTeX | RIS
Frederik Hegger, Nico Hochgeschwender, Gerhard K. Kraetzschmar, Paul G. Ploeger:
People Detection in 3d Point Clouds Using Local Surface Normals.
doi:10.1007/978-3-642-39250-4_15
BibTeX | RIS
Timo Bartkewitz, Kerstin Lemke-Rust:
Excellence in security evaluation testing : EXSET: Schlussbericht Hochschule Bonn-Rhein-Sieg, Berichtszeitraum: 1. Juli 2010 - 31. März 2013.
doi:10.2314/GBV:791502910
BibTeX | RIS
Herman Bruyninckx, Markus Klotzbücher, Nico Hochgeschwender, Gerhard Kraetzschmar, Luca Gherardi, Davide Brugali:
The BRICS component model: a model-based development paradigm for complex robotics software systems.
doi:10.1145/2480362.2480693
BibTeX | RIS
2012
Christian A. Mueller, Nico Hochgeschwender, Paul G. Ploeger:
Towards Robust Object Categorization for Mobile Robots with Combination of Classifiers.
doi:10.1007/978-3-642-32060-6_12
BibTeX | RIS
Thomas Breuer, Geovanny R. Giorgana Macedo, Ronny Hartanto, Nico Hochgeschwender, Dirk Holz, Frederik Hegger, Zha Jin, Christian Müller, Jan Paulus, Michael Reckhaus, Jose Antonio Alvarez Ruiz, Paul G. Plöger, Gerhard K. Kraetzschmar:
Johnny: An Autonomous Service Robot for Domestic Environments.
doi:10.1007/s10846-011-9608-y
BibTeX | RIS
Florian Schmitt, Jan Gassen, Elmar Gerhards-Padilla:
PDF Scrutinizer: Detecting JavaScript-based attacks in PDF documents.
doi:10.1109/PST.2012.6297926
BibTeX | RIS
Elmar Gerhards-Padilla:
TOGBAD: ein Verfahren zur Erkennung von Routingangriffen in taktischen multi-hop Netzen.
URL
BibTeX | RIS
Daniel Plohmann, Elmar Gerhards-Padilla:
Case study of the Miner Botnet.
URL
BibTeX | RIS
Daniel Plohmann, Elmar Gerhards-Padilla:
Malware and Botnet Analysis Methodology.
URL
BibTeX | RIS
Jan Gassen, Elmar Gerhards-Padilla:
A Scalable Approach for a Distributed Network of Attack Sensors.
URL
BibTeX | RIS
Jan Gassen, Elmar Gerhards-Padilla, Peter Martini:
Current Botnet-Techniques and Countermeasures.
doi:10.1515/pik-2012-0002
BibTeX | RIS
Sebastian Eschweiler, Elmar Gerhards-Padilla:
Platform-Independent Recognition of Procedures in Binaries Based on Simple Characteristics.
doi:10.1524/itit.2012.0665
BibTeX | RIS
Sebastian Eschweiler, Elmar Gerhards-Padilla:
Towards Sound Forensic Acquisition of Volatile Data.
doi:10.1007/978-3-642-33161-9_43
BibTeX | RIS
Meiko Jensen, Holger Junker, Luigi Lo Iacono, Christian Mainka, Jörg Schwenk:
XML Signature Wrapping Angriffe wirksam unterbinden.
doi:10.1007/s11623-012-0091-9
BibTeX | RIS
Christian Mainka, Meiko Jensen, Luigi Lo Iacono, Jörg Schwenk:
XSpRES - Robust and Effective XML Signatures for Web Services.
doi:10.5220/0003925701870197
BibTeX | RIS
Tobias Hirsch, Luigi Lo Iacono, Ina Wechsung:
How Much Network Security Must Be Visible in Web Browsers?.
doi:10.1007/978-3-642-32287-7_1
BibTeX | RIS
2011
Azamat Shakhimardanov, Nico Hochgeschwender, Michael Reckhaus, Gerhard K. Kraetzschmar:
Analysis of software connectors in robotics.
doi:10.1109/IROS.2011.6095183
BibTeX | RIS
Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini:
TOGBAD - an approach to detect routing attacks in tactical environments.
doi:10.1002/sec.185
BibTeX | RIS
Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini:
TOGBAD-LQ - Using Challenge-Response to Detect Fake Link Qualities.
doi:10.4230/OASIcs.KiVS.2011.85
BibTeX | RIS
Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini:
Wormhole Detection using Topology Graph based Anomaly Detection (TOGBAD).
doi:10.14279/tuj.eceasst.37.503
BibTeX | RIS
Juraj Somorovsky, Mario Heiderich, Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo Iacono:
All your clouds are belong to us.
doi:10.1145/2046660.2046664
BibTeX | RIS
Meiko Jensen, Jorg Schwenk, Jens-Matthias Bohli, Nils Gruschka, Luigi Lo Iacono:
Security Prospects through Cloud Computing by Adopting Multiple Clouds.
doi:10.1109/CLOUD.2011.85
BibTeX | RIS
Nils Gruschka, Luigi Lo Iacono:
Browser as a Service (BaaS): Security and Performance Enhancements for the Rich Web.
doi:10.4230/OASIcs.KiVS.2011.208
BibTeX | RIS
Nils Gruschka, Luigi Lo Iacono:
Server-Side Streaming Processing of Secured MTOM Attachments.
doi:10.1109/ECOWS.2010.23
BibTeX | RIS
Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, Norbert Luttenberger:
Server-Side Streaming Processing of WS-Security.
doi:10.1109/TSC.2010.61
BibTeX | RIS
Timo Bartkewitz, Kerstin Lemke-Rust:
A High-Performance Implementation of Differential Power Analysis on Graphics Cards.
doi:10.1007/978-3-642-27257-8_16
BibTeX | RIS
2010
Heiko Knospe, Kerstin Lemke-Rust:
Towards Secure and Privacy-Enhanced RFID Systems.
doi:10.1002/9780470665251.ch16
BibTeX | RIS
Michael Reckhaus, Nico Hochgeschwender, Paul G. Plöger, Gerhard K. Kraetzschmar:
A Platform-independent Programming Environment for Robot Control.
arXiv doi:10.48550/arXiv.1010.0886
BibTeX | RIS
Nils Aschenbruck, Elmar Gerhards-Padilla, Peter Martini:
Simulative Evaluation of Adaptive Jamming Detection in Wireless Multi-hop Networks.
doi:10.1109/ICDCSW.2010.57
BibTeX | RIS
Nils Aschenbruck, Raphael Ernst, Elmar Gerhards-Padilla, Matthias Schwamborn:
BonnMotion: a mobility scenario generation and analysis tool.
doi:10.4108/ICST.SIMUTOOLS2010.8684
BibTeX | RIS
Tillmann Werner, Christoph Fuchs, Elmar Gerhards-Padilla, Peter Martini:
Nebula - generating syntactical network intrusion signatures.
doi:10.1109/MALWARE.2009.5403022
BibTeX | RIS
Simone Fischer-Hübner, Luigi Lo Iacono, Sebastian Möller:
Usable Security und Privacy.
doi:10.1007/s11623-010-0210-4
BibTeX | RIS
Nils Gruschka, Luigi Lo Iacono, Hariharan Rajasekaran:
Identity and access management in multi-institutional medical research.
doi:10.1007/s00502-010-0734-1
BibTeX | RIS
Siegfried Benkner, Antonio Arbona, Guntram Berti, Alessandro Chiarini, Robert Dunlop, Gerhard Engelbrecht, Alejandro F. Frangi, Christoph M. Friedrich, Susanne Hanser, Peer Hasselmeyer, Rod D. Hose, Jimison Iavindrasana, Martin Köhler, Luigi Lo Iacono, Guy Lonsdale, Rodolphe Meyer, Bob Moore, Hariharan Rajasekaran, Paul E. Summers, Alexander Wöhrer, Steven Wood:
@neurIST: infrastructure for advanced disease management through integration of heterogeneous data, computing, and complex processing services.
doi:10.1109/TITB.2010.2049268 PMID
BibTeX | RIS
Nils Gruschka, Meiko Jensen, Luigi Lo Iacono:
A Design Pattern for Event-Based Processing of Security-Enriched SOAP Messages.
doi:10.1109/ARES.2010.23
BibTeX | RIS
Bernice S. Elger, Jimison Iavindrasana, Luigi Lo Iacono, Henning Müller, Nicolas Roduit, Paul Summers, Jessica Wright:
Strategies for health data exchange for secondary, cross-institutional clinical research.
doi:10.1016/j.cmpb.2009.12.001 PMID
BibTeX | RIS
Matthias Häsel, Luigi Lo Iacono:
Security in OpenSocial-Instrumented Social Networking Services.
doi:10.1007/978-3-642-13241-4_5
BibTeX | RIS
Nils Gruschka, Luigi Lo Iacono, Namhi Kang:
Packaged HTTP: Reconsidering Web Efficiency.
BibTeX | RIS
Nils Gruschka, Luigi Lo Iacono:
Security for XML Data Binding.
doi:10.1007/978-3-642-13241-4_6
BibTeX | RIS
Nils Gruschka, Luigi Lo Iacono:
Password Visualization beyond Password Masking.
URL
BibTeX | RIS
Veselina Hensel, Kerstin Lemke-Rust:
On an Integration of an Information Security Management System into an Enterprise Architecture.
doi:10.1109/DEXA.2010.75
BibTeX | RIS
Azamat Shakhimardanov, Nico Hochgeschwender, Gerhard K. Kraetzschmar:
Component models in robotics software.
doi:10.1145/2377576.2377592
BibTeX | RIS
2009
Michael Vahl, Stefan Böhmer, Thomas Oestreich:
Probability Based Risk Analysis for a VoIP System.
doi:10.1109/AICT.2009.79
BibTeX | RIS
Nils Aschenbruck, Elmar Gerhards-Padilla, Peter Martini:
Modeling mobility in disaster area scenarios.
doi:10.1016/j.peva.2009.07.009
BibTeX | RIS
Nils Gruschka, Luigi Lo Iacono:
Session-Based SOAP Transmission and Processing.
doi:10.1109/ECOWS.2009.10
BibTeX | RIS
Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo Iacono:
On Technical Security Issues in Cloud Computing.
doi:10.1109/CLOUD.2009.60
BibTeX | RIS
Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, Jörg Schwenk:
XML Signature Wrapping Angriffe.
doi:10.1007/s11623-009-0142-z
BibTeX | RIS
Luigi Lo Iacono, Hariharan Rajasekaran:
Secure Browser-Based Access to Web Services.
doi:10.1109/ICC.2009.5199439
BibTeX | RIS
Nils Gruschka, Luigi Lo Iacono:
Vulnerable Cloud: SOAP Message Security Validation Revisited.
doi:10.1109/ICWS.2009.70
BibTeX | RIS
Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust:
Differential Cluster Analysis.
doi:10.1007/978-3-642-04138-9_9
BibTeX | RIS
2008
Hariharan Rajasekaran, Luigi Lo Iacono, Peer Hasselmeyer, Jochen Fingberg, Paul Summers, Siegfried Benkner, Gerhard Engelbrecht, Antonio Arbona, Alessandro Chiarini, Christoph M. Friedrich, Martin Hofmann-Apitius, Kai Kumpf, Bob Moore, Philippe Bijlenga, Jimison Iavindrasana, Henning Mueller, Rod D. Hose, Robert Dunlop, Alejandro Frangi:
@neurIST - Towards a System Architecture for Advanced Disease Management through Integration of Heterogeneous Data, Computing, and Complex Processing Services.
doi:10.1109/CBMS.2008.42
BibTeX | RIS
Jun Wang, Luigi Lo Iacono:
Intrusion Detection and tolerance in Grid-based applications.
doi:10.1109/SECCOM.2007.4550328
BibTeX | RIS
Luigi Lo Iacono, Hariharan Rajasekaran:
Security Architecture for Distributed Medical Information Systems.
URL
BibTeX | RIS
Gregory Allen Kohring, Luigi Lo Iacono:
Non-Blocking Signature of very large SOAP Messages.
URL
BibTeX | RIS
Jimison Iavindrasana, Luigi Lo Iacono, Henning Müller, Ivan Periz, Paul E. Summers, Jessica Wright, Christoph M. Friedrich, Holger Dach, Tobias Gattermayer, Gerhard Engelbrecht, Siegfried Benkner, Martin Hofmann-Apitius, Robert Dunlop, Antonio Arbona, Hariharan Rajasekaran, Jochen Fingberg, Alessandro Chiarini, Bob Moore, Philippe Bijlenga, Rod D. Hose, Alejandro F. Frangi:
The @neurIST project.
URL
BibTeX | RIS
Sibylle Hick, Luigi Lo Iacono:
Elliptic Curve Cryptography in x.509-based PKI.
URL
BibTeX | RIS
Robert Dunlop, Antonio Arbona, Hariharan Rajasekaran, Luigi Lo Iacono, Jochen Fingberg, Paul E. Summers, Siegfried Benkner, Gerhard Engelbrecht, Alessandro Chiarini, Christoph M. Friedrich, Bob Moore, Philippe Bijlenga, Jimison Iavindrasana, Rod D. Hose, Alejandro F. Frangi:
@neurIST - Chronic Disease Management through Integration of Heterogeneous Data and Computer-interpretable Guideline Services.
URL
BibTeX | RIS
Kai Reichel, Nico Hochgeschwender, Holger Voos:
OpCog: an industrial development approach for cognitive agent systems in military UAV applications.
URL
BibTeX | RIS
Gordon Meiser, Thomas Eisenbarth, Kerstin Lemke-Rust, Christof Paar:
Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers.
doi:10.1109/SIES.2008.4577681
BibTeX | RIS
Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust:
Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip.
doi:10.1007/978-3-540-85886-7_24
BibTeX | RIS
2007
Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini, Marko Jahnke, Jens Tolle:
Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs.
doi:10.1109/LCN.2007.72
BibTeX | RIS
Nils Aschenbruck, Elmar Gerhards-Padilla, Michael Gerharz, Matthias Frank, Peter Martini:
Modelling mobility in disaster area scenarios.
doi:10.1145/1298126.1298131
BibTeX | RIS
Marko Jahnke, Jens Toelle, Alexander Finkenbrink, Alexander Wenzel, Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini:
Methodologies and frameworks for testing ids in adhoc networks.
doi:10.1145/1298239.1298259
BibTeX | RIS
Luigi Lo Iacono:
Multi-centric Universal Pseudonymisation for Secondary Use of the EHR.
URL
BibTeX | RIS
Yifei Liu, Timo Kasper, Kerstin Lemke-Rust, Christof Paar:
E-Passport: Cracking Basic Access Control Keys.
doi:10.1007/978-3-540-76843-2_30
BibTeX | RIS
Kerstin Lemke-Rust, Christof Paar:
Gaussian Mixture Models for Higher-Order Side Channel Analysis.
doi:10.1007/978-3-540-74735-2_2
BibTeX | RIS
Kerstin Lemke-Rust, Christof Paar:
Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods.
doi:10.1007/978-3-540-74835-9_30
BibTeX | RIS
Kerstin Lemke-Rust:
Models and algorithms for physical cryptanalysis.
BibTeX | RIS
Dario Carluccio, Kerstin Lemke-Rust, Christof Paar, Ahmad-Reza Sadeghi:
E-Passport: The Global Traceability Or How to Feel Like a UPS Package.
doi:10.1007/978-3-540-71093-6_30
BibTeX | RIS
2006
Luigi Lo Iacono, Sibylle Müller, Christoph Ruland, Norbert Zisky:
Sicherheitslösung für die automatisierte Messdatenkommunikation.
doi:10.1007/s11623-006-0105-6
BibTeX | RIS
Jochen Fingberg, Marit Hansen, Markus Hansen, Henry Krasemann, Luigi Lo Iacono, Thomas Probst, Jessica Wright:
Integrating Data Custodians in eHealth Grids - A Digest of Security and Privacy Aspects.
URL
BibTeX | RIS
Luigi Lo Iacono, Christoph Ruland, Norbert Zisky:
Secure transfer of measurement data in open systems.
doi:10.1016/j.csi.2005.07.010
BibTeX | RIS
Wolfgang Ertel, Joachim Fessler, Nico Hochgeschwender:
Flexible Combination of Vision, Control and Drive in Autonomous Mobile Robots.
doi:10.1007/3-540-30292-1_31
BibTeX | RIS
Kerstin Lemke-Rust, Christof Paar:
An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices.
doi:10.1007/11889700_13
BibTeX | RIS
Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi:
Physical Security Bounds Against Tampering.
doi:10.1007/11767480_17
BibTeX | RIS
Benedikt Gierlichs, Kerstin Lemke-Rust, Christof Paar:
Templates vs. Stochastic Methods.
doi:10.1007/11894063_2
BibTeX | RIS
2005
Kihun Hong, Souhwan Jung, Luigi Lo Iacono, Christoph Ruland:
Impacts of Security Protocols on Real-Time Multimedia Communications.
doi:10.1007/978-3-540-31815-6_1
BibTeX | RIS
Lars Dietze, Bernd Holznagel, Luigi Lo Iacono, Christoph Ruland:
Qualifizierte Signatur im eletronischeen Messdatenaustausch.
URL
BibTeX | RIS
Wolfgang Ertel, Joachim Fessler, Nico Hochgeschwender:
A universal modular autonomous robot architecture.
doi:10.5220/0001164903910394
BibTeX | RIS
Werner Schindler, Kerstin Lemke, Christof Paar:
A Stochastic Model for Differential Side Channel Cryptanalysis.
doi:10.1007/11545262_3
BibTeX | RIS
Kerstin Lemke, Ahmad-Reza Sadeghi, Christian Stüble:
An Open Approach for Designing Secure Electronic Immobilizers.
doi:10.1007/978-3-540-31979-5_20
BibTeX | RIS
Kerstin Lemke, Christof Paar:
Physical Attacks.
doi:10.1007/0-387-23483-7_300
BibTeX | RIS
2004
Kerstin Lemke, Kai Schramm, Christof Paar:
DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction.
doi:10.1007/978-3-540-28632-5_15
BibTeX | RIS
2003
Luigi Lo Iacono, Christoph Ruland:
Vertrauliche Video-Konferenzen im Internet.
URL
BibTeX | RIS
Bert den Boer, Kerstin Lemke, Guntram Wicke:
A DPA Attack against the Modular Reduction within a CRT Implementation of RSA.
doi:10.1007/3-540-36400-5_18
BibTeX | RIS