TY - JOUR A1 - Estévez, F. J. A1 - Castillo-Secilla, J. M. A1 - Gonzáles, J. A1 - Olivares, J. A1 - Glösekötter, P. T1 - mDARAL: A Multi-Radio Version for the DARAL Routing Algorithm JF - Sesors (Basel) Y1 - 2017 U6 - https://doi.org/10.3390/s17020324 VL - Vol. 17 (2) ER - TY - CHAP A1 - Glösekötter, P. A1 - Berekovic, M. A1 - Wirth, G. I. T1 - NBTI Degradation and Resilient Circuit Design T2 - Workshop on Impact of Process Variability on Design and Test, held at Design, Automation and Test in Europe Conference Y1 - 2008 CY - Munich ET - March 10-14 ER - TY - GEN A1 - Glösekötter, P. T1 - On the Way to Nanoelectronics, Institute of Computer Engineering, University Lübeck, Germany, April 27 Y1 - 2007 ER - TY - CHAP A1 - Estevez, F. A1 - Gonzales, J. A1 - Glösekötter, P. A1 - Valenzuela, O. A1 - Rojas, I. T1 - Statistical Analysis of the Main Configuration Parameters of the Network Dynamic and Adaptive Radio Protocol (DARP) Y1 - 2017 U6 - https://doi.org/10.3390/s17071502 PB - Sensors CY - Basel ET - 17(7) ER - TY - CHAP A1 - Camargo, V. A1 - da Silva, M. A1 - Brusamarello, L. A1 - Wirth, G. A1 - Glösekötter, P. T1 - Modeling the Impact of NBTI on the Reliability of Arithmetic Circuits T2 - Chip In The Pampa SBCCI Y1 - 2008 ET - September 1-4, SFORU ER - TY - GEN A1 - Glösekötter, P. T1 - Silicon nanoelectronics and mobile broadband wireless technologies, Departamento de Arquitectura Tecnologa de Computadores, Universidad de Granada, Spain, March Y1 - 2005 ER - TY - CHAP A1 - Glösekötter, P. A1 - Pacha, C. A1 - Goser, K. F. T1 - Threshold Logic Circuit Design using the RTBT T2 - Kleinheubacher Berichte Y1 - 2000 ET - Sept. 25-29 ER - TY - CHAP A1 - Jargstorf, Johannes A1 - Job, Reinhart T1 - Technical and Commercial Aspects of Battery Systems for Electric Mobility T2 - Proceedings "3rd European Conference Smart Grids and E-Mobility 2011" Y1 - 2011 SN - 978-3-941785-73-1 PB - Ostbayerisches Technologie-Transfer-Institut (OTTI) e.V. CY - Regensburg ET - 1 ER - TY - CHAP A1 - Johannes, G. A1 - Laven, Reinhart A1 - Job, W. A1 - Schustereder, H.-J. A1 - Schulze, F.- J. A1 - Niedernostheide, H. A1 - Schulze, L. T1 - Conversion Efficiency of Radiation Damage Profiles into Hydrogen-Related Donor Profiles T2 - W. Jantsch, F. Schäfer (Editors): Gettering and Defect Engineering in Semiconductor Technology XIV (GADEST 2011) Y1 - 2011 SP - 375 EP - 384 PB - Trans Tech Publications Ltd. CY - Zürich ET - 1 ER - TY - CHAP A1 - Johannes, G. A1 - Laven, Reinhart A1 - Job, Hans-Joachim A1 - Schulze, Franz-Josef A1 - Niedernostheide, Werner A1 - Schustereder, Lothar T1 - The Thermal Budget of Hydrogen-related Donor Profiles: Diffusion-limited Activation and Thermal Dissociation T2 - E. Simoen, C. L. Claeys, P. Stallhofer, R. Falster, C. Mazuré (Editors): High Purity Silicon 12, ECS Transactions 50(5) Y1 - 2012 SP - 161 EP - 175 ER - TY - GEN A1 - Job, Reinhart T1 - Resources and Environment, Seminar, 6.9.2012, Center for Interdisciplinary Research in Agribusiness, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brasilien Y1 - 2012 ER - TY - CHAP A1 - Gerke, Sebastian A1 - Herguth, Axel A1 - Brinkmann, Nils A1 - Hahn, Giso A1 - Job, Reinhart T1 - Evaluation of Capacitance-Voltage Spectroscopy by Correlation with Minority Carrier Lifetime Measurements of PECV-Deposited Intrinsic Amorphous Layers T2 - Proceedings of the 28th European Photovoltaic Solar Energy Conference and Exhibition Y1 - 2013 SN - 3-936338-33-7 SP - 2600 EP - 2603 ER - TY - GEN A1 - Job, Reinhart T1 - Defect Engineering and Analysis of Light-Ion Implanted Float-Zone Silicon, Seminar, 4.9.2012, Engineering School, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brasilien Y1 - 2012 ER - TY - JOUR A1 - Bauer, Deckert A1 - Dürr, Hinrichs T1 - Global solutions to the electrodynamic two-body problem on a straight line JF - Journal of Applied Mathematics and Physics Y1 - 2017 SN - 0044-2275 VL - 68 ER - TY - CHAP A1 - Müller, Jens A1 - Ising, Fabian A1 - Mla­de­nov, Vla­dis­lav A1 - Mainka, Chris­ti­an A1 - Schinzel, Sebastian A1 - Schwenk, Jörg T1 - Of­fice Do­cu­ment Se­cu­ri­ty and Pri­va­cy T2 - 14th USE­NIX Work­shop on Of­fen­si­ve Tech­no­lo­gies (WOOT 2020) N2 - OOXML and ODF are the de facto standard data formats for word processing, spreadsheets, and presentations. Both are XML-based, feature-rich container formats dating back to the early 2000s. In this work, we present a systematic analysis of the capabilities of malicious office documents. Instead of focusing on implementation bugs, we abuse legitimate features of the OOXML and ODF specifications. We categorize our attacks into five classes: (1) Denial-of-Service attacks affecting the host on which the document is processed. (2) Invasion of privacy attacks that track the usage of the document. (3) Information disclosure attacks exfiltrating personal data out of the victim's computer. (4) Data manipulation on the victim's system. (5) Code execution on the victim's machine. We evaluated the reference implementations – Microsoft Office and LibreOffice – and found both of them to be vulnerable to each tested class of attacks. Finally, we propose mitigation strategies to counter these attacks. KW - Cyber Security KW - Open Document Format KW - docx Y1 - 2020 UR - https://www.usenix.org/conference/woot20/presentation/muller PB - USENIX ER - TY - CHAP A1 - Weβeler, Peter A1 - Kaiser, Benjamin A1 - te Vrugt, Jürgen A1 - Lechler, Armin A1 - Verl, Alexander T1 - Camera based path planning for low quantity - high variant manufacturing with industrial robots T2 - 25th International Conference on Mechatronics and Machine Vision in Practice (M2VIP) N2 - The acquisition costs for industrial robots have been steadily decreasing in past years. Nevertheless, they still face significant drawbacks in the required effort for the preparation of complex robot tasks which causes these systems to be rarely present so far in small and medium-sized enterprises (SME) that focus mainly on small volume, high variant manufacturing. In this paper, we propose a camera-based path planning framework that allows the fast preparation and execution of robot tasks in dynamic environments which leads to less planning overhead, fast program generation and reduced cost and hence overcomes the major impediments for the usage of industrial robots for automation in SMEs with focus on low volume and high variant manufacturing. The framework resolves existing problems in different steps. The exact position and orientation of the workpiece are determined from a 3D environment model scanned by an optical sensor. The so retrieved information is used to plan a collision-free path that meets the boundary conditions of the specific robot task. Experiments show the potential and effectiveness of the the framework presented here by evaluating a case study. KW - Author Keywords: Industrial robot, Automatic robot programming, SME, low volume, high variant, path planning, matching, machine vision KW - IEEE Keywords: Solid modeling, Path planning, Three-dimensional displays, Robot kinematics, Pipelines, Task analysis KW - INSPEC (Controlled Indexing): cameras, collision avoidance, industrial robots, mobile robots, small-to-medium enterprises KW - INSPEC (Non-Controlled Indexing): high variant manufacturing, industrial robots, complex robot tasks, medium-sized enterprises, camera-based path, planning overhead, fast program generation, collision-free path, specific robot task, SME Y1 - 2019 UR - https://ieeexplore.ieee.org/document/8600833 SN - 978-1-5386-7544-1 U6 - https://doi.org/10.1109/M2VIP.2018.8600833 SP - 1 EP - 6 PB - IEEE ER - TY - JOUR A1 - Gerke, Sebastian A1 - Micard, Gabriel A1 - Job, Reinhart A1 - Hahn, Giso A1 - Terheiden, Barbara T1 - Capacitance-voltage spectroscopy and analysis of dielectric intrinsic amorphous silicon thin films JF - Physica Status Solidi (c) Y1 - 2016 U6 - https://doi.org/10.1002/pssc.201600019 SP - 1 EP - 5 ER - TY - CHAP A1 - Atkinson, Colin A1 - Gerbig, Ralph A1 - Barth, Florian A1 - Freiling, Felix A1 - Schinzel, Sebastian A1 - Hadasch, Frank A1 - Maedche, Alexander A1 - Müller, Benjamin T1 - Reducing the Incidence of Unintended, Human-Caused Information Flows in Enterprise Systems T2 - Enterprise Distributed Object Computing Conference Workshops (EDOCW), 2012 IEEE 16th International Y1 - 2012 U6 - https://doi.org/10.1109/EDOCW.2012.12 SP - 11 EP - 18 ET - 3M4SE 2012 ER - TY - JOUR A1 - Horbelt, Renate A1 - Giso, Hahn A1 - Job, Reinhart A1 - Terheiden, Barbara T1 - Void formation in PERC solar cells and their impact on the electrical cell parameters verified by luminescence and scanning acoustic microscope measurements JF - Energy Proceedia Y1 - 2015 U6 - https://doi.org/10.1016/j.egypro.2015.12.294 VL - 84 SP - 47 EP - 55 ER - TY - CHAP A1 - Willing, Markus A1 - Dresen, Christian A1 - Haverkamp, Uwe A1 - Schinzel, Sebastian T1 - Analyzing medical device connectivity and its effect on cyber security in german hospitals N2 - Background: Modern healthcare devices can be connected to computer networks and many western healthcareinstitutions run those devices in networks. At the same time, cyber attacks are on the rise and there is evidence thatcybercriminals do not spare critical infrastructure such as major hospitals, even if they endanger patients. Intuitively,the more and closer connected healthcare devices are to public networks, the higher the risk of getting attacked. Methods: To asses the current connectivity status of healthcare devices, we surveyed the field of German hospitalsand especially University Medical Center UMCs. Results: The results show a strong correlation between the networking degree and the number of medical devices.The average number of medical devices is 25.150, with a median of networked medical devices of 3.600. Actual keyusers of networked medical devices are the departments Radiology, Intensive Care, Radio-Oncology RO, NuclearMedicine NUC, and Anaesthesiology in the group of UMCs. In the next five years, the usage of networked medicaldevices will increase significantly in the departments of Surgery, Intensive Care, and Radiology. We detected a strongcorrelation between the degree of connectivity and the likelihood of being attacked.The survey answers regarding the cyber security status reveal a lack of security basics in some of the inquiredhospitals. We did discover successful attacks in hospitals with separated or subsidiary departments. A fusion ofcompetencies on an organizational level facilitates the right behavior here. Most hospitals rated themselvespredominantly positively in the self-assessment but also stated the usefulness of IT security insurance.Conclusions:Concluding our results, hospitals are already facing the consequences of omitted measures within theirgrowing pool of medical devices. Continuously relying on historically grown structures without adaption and trustingmanufactures to solve vectors is a critical behavior that could seriously endanger patients. Y1 - 2020 U6 - https://doi.org/10.1186/s12911-020-01259-y PB - BMC Medical Informatics and Decision Making volume ER - TY - JOUR A1 - Horbelt, Renate A1 - Micard, Gabriel A1 - Keller, Phillip A1 - Hahn, Giso A1 - Job, Reinhart A1 - Terheiden, Barbara T1 - Characterization of local Al-contacts by light beam induced current measurements and their verification by 2D simulation using flexPDE JF - Physica Status Solidi (a) Y1 - 2016 U6 - https://doi.org/10.1002/pssa.201532753 VL - 213 IS - 5 SP - 1317 EP - 1323 ER - TY - CHAP A1 - Goser, K. A1 - Glösekötter, P. A1 - Dienstuhl, J. T1 - Nanoelectronics and Nanosystems - From Transistors to Molecular and Quantum Devices Y1 - 2004 SN - 3-540-40443-0 PB - Springer CY - Berlin, Heidelberg, New York ER - TY - JOUR A1 - Gerke, Sebastian A1 - Becker, Hans-Werner A1 - Rogalla, Detlef A1 - Job, Reinhart A1 - Terheiden, Barbara T1 - Model based prediction of the trap limited diffusion of hydrogen in post-hydrogenated amorphous silicon JF - Physika Status Solidi (RRL) Y1 - 2016 U6 - https://doi.org/10.1002/pssr.201600303 SP - 1 EP - 5 ER - TY - CHAP A1 - Glösekötter, P. A1 - Prost, W. A1 - Pacha, C. A1 - Kim, S. O. A1 - van Husen, H. A1 - Reimann, T. A1 - Tegude, F.- J. A1 - Goser, K. F. T1 - Pseudo Dynamic Gate Design based on the Resonant-Tunneling-Bipolar-Transistor (RTBT) T2 - 32nd European Solid-State Device Research Conference (ESSDERC) Y1 - 2002 CY - Florence, Italy ET - Sept. 24-26 ER - TY - BOOK A1 - Schinzel, Sebastian T1 - Unintentional and Hidden Information Leaks in Networked Software Applications Y1 - 2012 SP - 1 EP - 103 CY - University of Erlangen-Nuernberg ET - Dissertation ER - TY - JOUR A1 - Johannes, G. A1 - Laven, Moriz A1 - Jelinek, Reinhart A1 - Job, Hans-Joachim A1 - Schulze, Werner A1 - Schustereder, Stefan A1 - Kirnstötter, Mathias A1 - Rommel, Lothar T1 - DLTS Characterization of Proton Implanted Silicon under Varying Annealing Conditions JF - Physica Status Solidi (b) Y1 - 2014 VL - 251 IS - 11 SP - 2189 EP - 2192 ER - TY - JOUR A1 - Schinzel, Sebastian T1 - Side Channel Attacks: Error messages and verbose log entries can tip off intruders JF - LINUX Magazine Y1 - 2012 IS - #143 ER - TY - BOOK A1 - Salewski, F. T1 - Empirical Evaluations of Safety-Critical Embedded Systems, PhD Thesis Y1 - 2008 ER - TY - CHAP A1 - Jelinek, Moriz A1 - Johannes, G. A1 - Laven, Reinhart A1 - Job, Werner A1 - Schustereder, Hans-Joachim A1 - Schulze, Mathias A1 - Rommel, Lothar T1 - A New Method to Increase the Doping Efficiency of Proton Implantation in a High-Dose Regime T2 - E. Simoen, C. Claeys, O. Kakatsuka, R. Falster, C. Mazuré (Editors): High Purity Silicon XIII, ECS Transactions 64(11) Y1 - 2014 SP - 199 EP - 208 ER - TY - CHAP A1 - Stollenwerk, A. A1 - Derks, A. A1 - Kowalewski, S. A1 - Salewski, Falk T1 - A Modular, Robust and Open Source Microcontroller Platform for Broad Educational Usage T2 - Proc. Workshop on Embedded Systems Education (WESE10), Scottsdale, AZ, USA Y1 - 2010 U6 - https://doi.org/10.1145/1930277.1930285 SP - 48 EP - 54 PB - ACM ER - TY - CHAP A1 - Schinzel, Sebastian T1 - An Efficient Mitigation Method for Timing Side Channels on the Web T2 - 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2011) Y1 - 2011 ER - TY - GEN A1 - Zimmer, Cordula A1 - Yoganathan, K. A1 - Giebel, Friederike A1 - Luetzenkirchen-Hecht, Dirk A1 - Klaus, T. A1 - Peter, Kallis. T1 - Photoemission properties of LaB6 thin films for the use in PIDs Y1 - 2014 ER - TY - GEN A1 - Yoshida, Akira A1 - Job, Reinhart T1 - Cathode ray-luminescent phosphor and method for the preparation thereof, United States Patent BT - Dec. 5 Y1 - 2000 N1 - US6156233A ER - TY - JOUR A1 - Armoush, A. A1 - Salewski, F. A1 - Kowalewski, S. T1 - Design Pattern Representation for Safety-Critical Embedded Systems JF - Journal of Software Engineering and Applications (JSEA) Y1 - 2009 U6 - https://doi.org/10.4236/jsea.2009.21001 VL - 2 IS - 1 SP - 1 EP - 12 ER - TY - CHAP A1 - Schinzel, Sebastian A1 - Schmucker, Martin A1 - Ebinger, Peter T1 - Security mechanisms of a legal peer-to-peer file sharing system (http://www.iadis.net/dl/Search_list_open.asp?code=6365) T2 - IADIS International Journal on Computer Science and Information Systems Y1 - 2009 ER - TY - JOUR A1 - Seggelmann, R. A1 - Tüxen, M. A1 - Rathgeb, E. T1 - Strategies to Secure End-to-End Communication - And Their Application to SCTP-Based Communication JF - PIK - Praxis der Informationsverarbeitung und Kommunikation Y1 - 2011 VL - 34 IS - 4 ER - TY - JOUR A1 - Job, Reinhart A1 - Johannes, G. A1 - Laven, Franz-Josef A1 - Niedernostheide, Hans-Joachim A1 - Schulze, Holger A1 - Schulze, Werner T1 - Defect Engineering for Modern Power Devices JF - Physica Status Solidi (a) Y1 - 2012 VL - 209 SP - 1940 EP - 1949 ER - TY - JOUR A1 - Löchte, A. A1 - Hoffmann, F. A1 - Krimphove, C. A1 - Rebel, G. A1 - Glösekötter, P. T1 - Is LiFePO4 Technology Ready for Internet of Things? JF - Advances in Internet of Things (http://www.scirp.org/journal/ait), http://dx.doi.org/10.4236/ait.2014.41001) Y1 - 2014 VL - Januar IS - 4 SP - 1 EP - 4 ER - TY - CHAP A1 - Olivares, A. A1 - Górriz, J. M. A1 - Olivares, G. A1 - Ramírez, J. A1 - Glösekötter, P. T1 - A Study of Vibration-Based Energy Harvesting in Activities of Daily Living T2 - 4th International ICST Conference on Pervasive Computing Technologies for Healthcare Y1 - 2010 CY - Munich, Germany ET - March ER - TY - JOUR A1 - Johannes, G. A1 - Laven, Reinhart A1 - Job, Hans A1 - Schulze, -Joachim A1 - Niedernostheide, Franz-Josef A1 - Schustereder, Werner A1 - Frey, Lothar T1 - Activation and Dissociation of Proton-Induced Donor Profiles in Silicon JF - ECS Journal of Solid State Science and Technology Y1 - 2013 VL - 2 IS - 9 SP - 389 EP - 394 ER - TY - CHAP A1 - Salewski, F. A1 - Wilking, D. A1 - Kowalewski, S. T1 - Diverse hardware platforms in embedded systems lab courses: A way to teach the differences T2 - Proc. Special Issue: The First Workshop on Embedded System Education (WESE), vol. 2 Y1 - 2005 U6 - https://doi.org/10.1145/1121812.1121825 SP - 70 EP - 74 PB - ACM ER - TY - CHAP A1 - Schreiber-Prillwitz, Wolfgang A1 - Job, Reinhart T1 - Development process for MEMS pressure sensors for standarized CMOS read-out circuitry T2 - 29th Symposium on Integrated Circuits and Systems Design (SBCCI), IEEE Conference Publications Y1 - 2016 U6 - https://doi.org/10.1109/SBCCI.2016.7724037 SP - 1 EP - 6 ER - TY - CHAP A1 - Salewski, F. A1 - Kowalewski, S. T1 - Testing Issues in Empirical Reliability Evaluation of Embedded Real-Time Systems T2 - Proc. IEEE Real-Time and Embedded Technology and Applications Symposium, WiP session (RTAS 07), vol. Technical Report WUCSE-2007-17 Y1 - 2007 SP - 48 EP - 51 PB - Washington University in St. Louis ER - TY - CHAP A1 - Beckschulze, E. A1 - Salewski, F. A1 - Kowalewski, S. T1 - A Comparison of Dual-Core Approaches for Safety-Critical Automotive Applications T2 - Proc. Safety-Critical Systems, 2009 (SAE World Congress 2009), 2009, SAE International Y1 - 2009 SP - 209 EP - 216 ER - TY - THES A1 - Scharlau, Lukas T1 - Multi-part Nanocubes N2 - This thesis describes the development of Multi-part Nanocubes. It is a further development of Nanocubes, an in-memory data structure for spatiotemporal data cubes. "Nanocubes provides you with real-time visualization of large datasets. Slice and dice your data with respect to space, time, or some of your data attributes, and view the results in real-time on a web browser over heatmaps, bar charts, and histograms." Partitioning the structure to parallelize the build process as well as merging query results is the principal part of this document. Furthermore, a new memory management (slab allocation with offset pointers) was implemented to enable 32-bit support and faster load times of already built nanocubes. Porting the project to Windows and implementing on-the-fly compression and decompression of nanocube files is also described. N2 - Diese Bachelorarbeit beschreibt die Weiterentwicklung des Projektes Nanocubes zu Multi-part Nanocubes. Das Projekt erlaubt die Visualisierung und Filterung extrem großer Datensätze (Big Data), üblicherweise auf einer Heatmap mit zusätzlichen Diagramm. Beschrieben wird die Partitionierung der Datenstruktur, wodurch ermöglicht wird, dass moderne Mehrkernprozessoren während des Ausbauprozesses voll ausgelastet werden können. Auch das Zusammenfügen der Abfrageergebnisse ist Teil der Arbeit. Zusätzlich wurde ein neues Speicher Management System (Slab Allocation mit Offset Pointern) implementiert, was die Kompatibilität zu 32-bit Systemen ermöglicht, sowie auch schnellere Ladezeiten von bereits erzeugten und gespeicherten Nanocubes. Die Portierung des Projektes auf Windows als auch die on-the-fly Komprimierung und Dekomprimierung während des Speichern und Laden eines Nanocubes wird beschrieben. (Linux und Mac Betriebssysteme werden auch unterstützt) KW - Massendaten KW - Visualisierung KW - Weltkarte KW - Filtration KW - Quaternärbaum KW - Heatmap KW - Parallelisation KW - echtzeit Erkundung KW - Quadtree KW - Big Data KW - Heatmap KW - Threading KW - realtime exploration Y1 - 2016 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-9500 PB - FH Münster ER - TY - CHAP A1 - Schreiber-Prillwitz, Wofgang A1 - Job, Reinhart T1 - Improvement of Integrated Pressure Sensor Systems Fabricated by a Combined CMOS- and MEMS-Technology with regard to Low Pressure Ranges T2 - G. Wirth, N. Morimoto, D. Vasileska (Editors): Microelectronics Technology and Devices - SBMicro 2012, ECS Transactions 49(1) Y1 - 2012 SP - 417 EP - 424 ER - TY - CHAP A1 - Chen, X. A1 - Salewski, F. A1 - Kowalewski, S. T1 - Concept and Prototyping of a Fault Management Framework for Automotive Safety Relevant Systems T2 - Proc. Moderne Elektronik im Kraftfahrzeug II Y1 - 2007 SP - 70 EP - 79 PB - expert-verlag ER - TY - CHAP A1 - Salewski, Falk T1 - COTS or Custom Made? Design Decisions for Industrial Control Systems T2 - Proc. of the Eighth International Conference on Advances in Circuits, Electronics and Micro-electronics (CENICS 2015) Y1 - 2015 SN - 978-1-61208-430-5 SP - 7 EP - 12 PB - IARIA CY - Venice, Italy ER - TY - JOUR A1 - Salewski, Falk T1 - COTS or Custom Made? A Multi-Criteria Decision Analysis for Industrial Control Systems JF - International Journal on Advances in Systems and Measurements Y1 - 2016 UR - https://www.iariajournals.org/systems_and_measurements/sysmea_v9_n12_2016_paged.pdf SN - 1942-261x VL - 9 IS - 1 & 2 SP - 122 EP - 131 ER - TY - JOUR A1 - Herguth, Axel A1 - Horbelt, Renate A1 - Wilking, Svenja A1 - Job, Reinhart A1 - Hahn, Giso T1 - Comparison of BO Regeneration dynamics in PERC and Al-BSF solar cells JF - Energy Procedia Y1 - 2015 U6 - https://doi.org/10.1016/j.egypro.2015.07.012 VL - 77 SP - 75 EP - 82 ER - TY - JOUR A1 - Gerke, Sebastian A1 - Becker, Hans-Werner A1 - Rogalla, Detlef A1 - Hahn, Giso A1 - Job, Reinhart A1 - Terheiden, Barbara T1 - Morphology and Hydrogen in Passivating Amorphous Silicon Layers JF - Energy Procedia Y1 - 2015 U6 - https://doi.org/10.1016/j.egypro.2015.07.112 VL - 77 SP - 791 EP - 798 ER - TY - CHAP A1 - Rojas, I. A1 - Pomares, H. A1 - Gonzalez, J. A1 - Glösekötter, P. A1 - Dienstuhl, J. A1 - Goser, K. F. T1 - A new sequential learning algorithm using pseudo-Gaussian functions for neuro-fuzzy systems T2 - 10th IEEE International Conference on Fuzzy Systems Y1 - 2001 SP - 1243 EP - 1246 ET - Volume: 3, 2-5 Dez. ER - TY - CHAP A1 - Estevez, F. A1 - García, A. A1 - Glösekötter, P. T1 - An application of people's sentiment from social media to smart cities Y1 - 2016 PB - El Profesional de la Informacion ET - Vol. 25, Nr. 6 ER - TY - CHAP A1 - Glösekötter, P. A1 - Prost, W. A1 - Pacha, C. A1 - Kim, S. O. A1 - van Husen, H. A1 - Reimann, T. A1 - Tegude, F.- J. A1 - Goser, K. F. T1 - Asynchronous Circuit Design Based on the RTBT Monostable-Bistable-Logic-Transiton-Element (MOBILE) T2 - 15th Symposium on Integrated Circuits and System Design, Chip in the Pampa Y1 - 2002 CY - Porto Alegre, RS, Brazil ET - Sept. 9-14 ER - TY - GEN A1 - Tsekoura, Ioanna A1 - Rebel, Gregor A1 - Berekovic, Mladen A1 - Glösekötter, P. T1 - An evaluation of energy efficient microcontrollers Y1 - 2014 ER - TY - CHAP A1 - Glösekötter, P. A1 - Pacha, C. A1 - Goser, K. F. T1 - Associative Matrix for Nano-scale Integratd Circuits T2 - 7th International Conference on Microelectronics for Neural, Fuzzy and Bio-Inspired Systems (MicroNeuro) Y1 - 1999 SP - 352 EP - 358 PB - IEEE Computer Society Press, Los Alamitos, CA CY - Granada, Spain ET - March ER - TY - GEN A1 - Tüxen, M. A1 - Seggelmann, R. A1 - Stewart, R. A1 - Loreto, S. T1 - Additional Policies for the Partially Reliable Stream Control Transmission Protocol Extension BT - April 2015 Y1 - 2015 U6 - https://doi.org/10.17487/RFC7496 SN - 2070-1721 N1 - RFC 7496 ER - TY - GEN A1 - Glösekötter, P. T1 - Aspects of Micro- and Nanosystems for Wireless Health Monitoring Applicaitons, Departamento de Arquitectura Tecnologa de Computadores, Universidad de Granada, Spain, September Y1 - 2010 ER - TY - CHAP A1 - Rojas, I. A1 - Anguita, M. A1 - Pelayo, F. J. A1 - Glösekötter, P. A1 - Prieto, A. T1 - CMOS implementation of RBF Neural Networks using Adaptive Baussian Radial Functions T2 - Proceedings of the 6th International Conference on Microelectronics for Neural Networks, Evolutionary & Fuzzy Systems (MicroNeuro'97) Y1 - 1997 CY - Dresden, Germany ET - September ER - TY - CHAP A1 - Estevez, F. A1 - Glösekötter, P. A1 - González, J. T1 - DARAL: A Dynamic and Adaptive Routing Algorithm for Wireless Sensor Networks Y1 - 2016 U6 - https://doi.org/10.3390/s16070960 PB - Sensors CY - Basel ER - TY - CHAP A1 - Meyer, Christopher A1 - Somorovsky, Juraj A1 - Weiss, Eugen A1 - Schwenk, Jörg A1 - Schinzel, Sebastian A1 - Tews, Erik T1 - Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks. T2 - 23rd USENIX Security Symposium (USENIX Security 14) Y1 - 2014 SN - ISBN 978-1-931971- SP - 733 EP - -748 PB - USENIX Association CY - San Diego, CA ER - TY - JOUR A1 - Beckschulze, E. A1 - Salewski, F. A1 - Kowalewski, S. T1 - A Comparison of Dual-Core Approaches for Safety-Critical Automotive Applications JF - SAE International Journal of Passenger Cars - Electronic and Electrical Systems Y1 - 2009 U6 - https://doi.org/10.4271/2009-01-0761 IS - 1 SP - 301 EP - 308 ER - TY - JOUR A1 - Dreibholz, T. A1 - Rüngeler, I. A1 - Seggelmann, R. A1 - Tüxen, M. A1 - Rathgeb, E. A1 - Stewart, R. T1 - Stream Control Transmission Protocol: Past, Current, and Future Standardization Activities JF - IEEE Communications Magazine Y1 - 2011 VL - 49 IS - 4 SP - 82 EP - 88 ER - TY - GEN A1 - Estevez, Francisco A1 - Rebel, Gregor A1 - Jose, M. A1 - Castillo-Secilla, Jesús A1 - Gonzáles, Peter T1 - Cognitive Radio as solution for Saturation Problem in Wireless Sensor Networks: A survey of Cognitive Radio policies Y1 - 2014 ER - TY - JOUR A1 - Estévez, F. A1 - Rebel, G. A1 - González, J. A1 - Glösekötter, P. T1 - DARP: Dynamic and adaptive radio protocol for Wireless Sensor Networks JF - Electronics Letters Y1 - 2014 VL - 01/2014 ER - TY - CHAP A1 - Rebel, G. A1 - Estevez, F. A1 - Schulz, I. A1 - Glösekötter, P. T1 - Fast Constant Time Memory Allocator for inter Task Communication in Ultra Low Energy Embedded Systems T2 - 9th Conference on Ph.D. Research in Microelectonics & Electronics N2 - Fast Constant Time Memory Allocator for Inter Task Communication in Ultra Low Energy Embedded Systems Y1 - 2013 SN - 978-1-4673-4580-4 U6 - https://doi.org/10.25974/fhms-708 SP - 149 PB - IEEE ER - TY - GEN A1 - Glösekötter, P. T1 - From Transistors to Molecular and Quantum Devices?, invited TechTalk on Information Processing Technologies at Intel Corp. Braunschweig, Germany, September 18 Y1 - 2009 ER - TY - CHAP A1 - Mertens, K. T1 - "Do Photovoltaics make sense in countries like Germany?", Invited Paper zur 7th International Energy and Sustainability Confrerence, Cologne Institute for Renewable Energy CIRE der TH Köln, 17.05.2018, Köln Y1 - 2018 ER - TY - JOUR A1 - Pineres-Espitia, G. A1 - Cama-Pinto, A. A1 - De, D. A1 - rosa, la A1 - Morron, F. A1 - Estevez, D. T1 - Design of a low cost weather station for detecting environmental changes Y1 - 2017 SN - 0798 1015 VL - Vol. 38 IS - Revista Espacios ER - TY - CHAP A1 - Glösekötter, P. A1 - Pacha, C. A1 - Goser, K. F. T1 - Design of Arithmetic Circuits Using the RTBT T2 - ITG-Fachbericht 162, Mikroelektronik für die Informationstechnik Y1 - 2000 SN - 3-8007-2586-X SP - 147 EP - 150 ET - Nov. 20-21 ER - TY - CHAP A1 - Völker, Timo A1 - Tüxen, Michael T1 - Packet Too Big Detection and its Integration into QUIC T2 - 2023 16th International Conference on Signal Processing and Communication System (ICSPCS) N2 - A communication over an Internet Protocol (IP) based network fails if an endpoint sends packets that are too big to reach their destination and if the sender is unable to detect that. The node on the path that drops these packets should respond with a Packet Too Big (PTB) message. However, multiple scenarios exist in which the sender will not receive a PTB message. Even if it does, it refrains from using the information in case it suspects that a potential attacker forged the message. In particular, we are not aware of any implementation of the secure transport protocol QUIC (e.g., used by HTTP/3) that processes PTB messages. In this paper, we present a novel parameterizable PTB detection algorithm for reliable transport protocols that does not depend on PTB messages. We further describe how to integrate our algorithm into QUIC, present results from an evaluation using the algorithm within a QUIC simulation model and, based on these results, suggest concrete parameter values. KW - PMTUD KW - PTB KW - black hole KW - transport protocol KW - QUIC Y1 - 2023 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-174119 SN - 979-8-3503-3351-0 PB - IEEE CY - New York, NY, USA ER - TY - CHAP A1 - Jelinek, Moriz A1 - Johannes, G. A1 - Laven, Naveen A1 - Ganagona, Goud A1 - Job, Reinhart A1 - Schustereder, Werner A1 - Schulze, Hans-Joachim A1 - Rommel, Matthias A1 - Frey, Lothar T1 - Metastable Defects in Proton Implanted and Annealed Silicon T2 - P. Pichler (Editor): Gettering and Defect Engineering in Semiconductor Technology XVI (GADEST 2015) Y1 - 2016 SN - 978-3-03835-608-0 SP - 169 EP - 174 PB - Trans Tech Publications Ltd. CY - Zürich ER - TY - CHAP A1 - Glösekötter, P. A1 - Pacha, C. A1 - Goser, K. F. A1 - Wirth, G. I. A1 - Prost, W. A1 - Auer, U. A1 - Agethen, M. A1 - Tegude, F. J. T1 - Digital Circuit Design Based on the Resonant-Tunneling-Hetero-Junction-Bipolar-Transistor T2 - SBCCI Y1 - 2000 CY - Manaus, Brasil ET - Sept. 18-24 ER - TY - CHAP A1 - Rebel, G. A1 - Estevez, F. A1 - Schulz, I. A1 - Glösekötter, P. T1 - Fast Constant Time Memory Allocator for Inter Task Communication in Ultra Low Energy Embedded Systems T2 - 9th Conferrence on Ph.D. Research in Microelectronics & Electronics Y1 - 2013 SN - 978-1-4673-4580-4 U6 - https://doi.org/10.1109 SP - 149 EP - 152 PB - Villach, Austria ET - 24th - 27th June 201 ER - TY - JOUR A1 - Estévez, F. A1 - García, J. M. A1 - Secilla-Castillo, J. M. A1 - González, J. A1 - Glösekötter, P. T1 - Enabling validation of the IEEE 802.15.4 performance through a new dual-radio OMNeT++ model JF - Elektronika IR Electrotechnika Date: Accepted - Pending of Publication Y1 - 2016 SN - 1392-1215 VL - Vol. 22, No 3 IS - Impact Factor: 0.561 ER - TY - CHAP A1 - Ising, Fabian A1 - Poddebniak, Damian A1 - Kappert, Tobias A1 - Saatjohann, Christoph A1 - Schinzel, Sebastian T1 - Content-Type: multipart/oracle - Tapping into Format Oracles in Email End-to-End Encryption T2 - 32nd USENIX Security Symposium (USENIX Security 23) N2 - S/MIME and OpenPGP use cryptographic constructions repeatedly shown to be vulnerable to format oracle attacks in protocols like TLS, SSH, or IKE. However, format oracle attacks in the End-to-End Encryption (E2EE) email setting are considered impractical as victims would need to open many attacker-modified emails and communicate the decryption result to the attacker. But is this really the case? In this paper, we survey how an attacker may remotely learn the decryption state in email E2EE. We analyze the interplay of MIME and IMAP and describe side-channels emerging from network patterns that leak the decryption status in Mail User Agents (MUAs). Concretely, we introduce specific MIME trees that produce decryption-dependent network patterns when opened in a victim’s email client. We survey 19 OpenPGP- and S/MIME-enabled email clients and four cryptographic libraries and uncover a side-channel leaking the decryption status of S/MIME messages in one client. Further, we discuss why the exploitation in the other clients is impractical and show that it is due to missing feature support and implementation quirks. These unintended defenses create an unfortunate conflict between usability and security. We present more rigid countermeasures for MUA developers and the standards to prevent exploitation. Y1 - 2023 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-183333 UR - https://www.usenix.org/conference/usenixsecurity23/presentation/ising SN - 978-1-939133-37-3 PB - USENIX Association ER - TY - CHAP A1 - Puschner, Endres A1 - Saatjohann, Christoph A1 - Willing, Markus A1 - Dresen, Christian A1 - Köbe, Julia A1 - Rath, Benjamin A1 - Paar, Christof A1 - Eckardt, Lars A1 - Haverkamp, Uwe A1 - Schinzel, Sebastian T1 - Listen to Your Heart: Evaluation of the Cardiologic Ecosystem T2 - ARES 2021: The 16th International Conference on Availability, Reliability and Security N2 - Modern implantable cardiologic devices communicate via radio frequency techniques and nearby gateways to a backend server on the internet. Those implanted devices, gateways, and servers form an ecosystem of proprietary hardware and protocols that process sensitive medical data and is often vital for patients’ health. This paper analyzes the security of this Ecosystem, from technical gateway aspects, via the programmer, to configure the implanted device, up to the processing of personal medical data from large cardiological device producers. Based on a real-world attacker model, we evaluated different devices and found several severe vulnerabilities. Furthermore, we could purchase a fully functional programmer for implantable cardiological devices, allowing us to re-program such devices or even induce electric shocks on untampered implanted devices. Additionally, we sent several Art. 15 and Art. 20 GDPR inquiries to manufacturers of implantable cardiologic devices, revealing non-conforming processes and a lack of awareness about patients’ rights and companies’ obligations. This, and the fact that many vulnerabilities are still to be found after many vulnerability disclosures in recent years, present a worrying security state of the whole ecosystem. Y1 - 2021 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-139012 ER - TY - JOUR A1 - Khademi, Naeem A1 - Ros, David A1 - Welzl, Michael A1 - Bozakov, Zdravko A1 - Brunstrom, Anna A1 - Fairhurst, Gorry A1 - Grinnemo, Karl-Johan A1 - Hayes, David A. A1 - Hurtig, Per A1 - Jones, Tom A1 - Mangiante, Simone A1 - Tüxen, Michael A1 - Weinrank, Felix T1 - NEAT: A Platform- and Protocol-Independent Internet Transport API JF - IEEE Communications Magazine Y1 - 2017 SN - 0163-6804 VL - 55 IS - 6 SP - 46 EP - 54 ER - TY - CHAP A1 - Horbelt, Renate A1 - Herguth, Axel A1 - Hahn, Giso A1 - Job, Reinhart A1 - Terheiden, Barbara T1 - Temperature Dependence of Void Formation in PERC Cells and their Spatially Resolved Detection by Combining Scanning Acoustic Microscopy and Electroluminescence Measurements T2 - Proceedings of the 29th European Photovoltaic Solar Energy Conference and Exhibition Y1 - 2014 SP - 427 EP - 432 ER - TY - CHAP A1 - Salewski, F. A1 - Kowalewski, S. T1 - The Effect of Hardware Platform Selection on Safety-Critical Software in Embedded Systems: Empirical Evaluations T2 - Proc. IEEE Symposium on Industrial Embedded Systems (SIES 07) Y1 - 2007 U6 - https://doi.org/10.1109/SIES.2007.4297320 SP - 78 EP - 85 PB - IEEE ER - TY - CHAP A1 - Salewski, F. A1 - Taylor, A. T1 - Fault Handling in FPGAs and Microcontrollers in Safety-Critical Embedded Applications: A Comparative Survey T2 - Proc. 10th Euromicro Conference on Digital System Design (DSD 07) Y1 - 2007 U6 - https://doi.org/10.1109/DSD.2007.4341459 SP - 124 EP - 131 PB - IEEE ER - TY - CHAP A1 - Salewski, F. A1 - Kowalewski, S. T1 - Exploring the Differences of FPGAs and Microcontrollers for their Use in Safety-Critical Embedded Applications T2 - Proc. IEEE Symposium on Industrial Embedded Systems (IES 06) Y1 - 2006 U6 - https://doi.org/10.1109/IES.2006.357483 SP - 1 EP - 4 PB - IEEE ER - TY - CHAP A1 - Glösekötter, P. A1 - Kanstein, A. A1 - Jung, S. A1 - Goser, K. F. T1 - Implementation of a RBF Network Based on Possibilistic Reasoning, ISSN 1089-6503 T2 - Proceedings of the 24th EUROMICRO conference Y1 - 1998 SN - 0-8186-8646-4 SP - 677 EP - 682 CY - Västeras, Sweden ET - August 25-27 ER - TY - CHAP A1 - Adhari, H. A1 - Dreibholz, T. A1 - Becke, M. A1 - Rathgeb, E. P. A1 - Tüxen, M. T1 - Evaluation of Concurrent Multipath Transfer over Dissimilar Paths T2 - Proceedings of the 1st International Workshop on Protocols and Applications with Multi-Homing Support (PAMS 2011) Y1 - 2011 SN - 978-1-61284-829-7 SP - 708 EP - 714 CY - Singapore ER - TY - CHAP A1 - Armoush, A. A1 - Salewski, F. A1 - Kowalewski, S. T1 - Effective Pattern Representation for Safety Critical Embedded Systems T2 - Proc. 2008 International Conference on Computer Science and Software Engineering, vol. 4 Y1 - 2008 U6 - https://doi.org/10.1109/CSSE.2008.739 SP - 91 EP - 97 PB - IEEE CS ER - TY - CHAP A1 - Armoush, A. A1 - Salewski, F. A1 - Kowalewski, S. T1 - Recovery Block with Backup Voting: A New Pattern with Extended Representation for Safety Critical Embedded Systems T2 - Proc. 11th International Conference on Information Technology (ICIT 2008) Y1 - 2008 U6 - https://doi.org/10.1109/ICIT.2008.60 SP - 232 EP - 237 PB - IEEE CS ER - TY - GEN A1 - Job, Reinhart A1 - Ungru, Kathrin T1 - Teaching Electrochemical Energy Storage for Undergraduate Electrical Engineers, Workshop, 7.3.2017, Instituto Federal Rio Grande do Norte (IFRN), Natal, Brasilien Y1 - 2017 ER - TY - JOUR A1 - Brinkmann, Marcus A1 - Dresen, Christian A1 - Merget, Robert A1 - Poddebniak, Damian A1 - Müller, Jens A1 - Somorovsky, Juraj A1 - Schwenk, Jörg A1 - Schinzel, Sebastian T1 - ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication JF - 30th USENIX Security Symposium Y1 - 2021 UR - https://www.usenix.org/conference/usenixsecurity21/presentation/brinkmann ER - TY - JOUR A1 - Banos, Oresti A1 - Damas, Miguel A1 - Pomares, Hector A1 - Rojas, Ignacio A1 - Villalonga, Claudia A1 - Glösekötter, Peter T1 - PhysioDroid: Combining Wearable Health Sensors and Mobile Devices for a Ubiquitous, Continuous, and Personal Monitoring JF - Hindawi Publishing Corporation The Scientific World Journal Y1 - 2014 SP - 1 EP - 12 ER - TY - CHAP A1 - Poddebniak, Damian A1 - Ising, Fabian A1 - Böck, Hanno A1 - Schinzel, Sebastian T1 - Why TLS is better without STARTTLS: A Security Analysis of STARTTLS in the Email Context T2 - Proceedings of the 30th USENIX Security Symposium, August 11–13, 2021 N2 - TLS is one of today's most widely used and best-analyzed encryption technologies. However, for historical reasons, TLS for email protocols is often not used directly but negotiated via STARTTLS. This additional negotiation adds complexity and was prone to security vulnerabilities such as naive STARTTLS stripping or command injection attacks in the past. We perform the first structured analysis of STARTTLS in SMTP, POP3, and IMAP and introduce EAST, a semi-automatic testing toolkit with more than 100 test cases covering a wide range of variants of STARTTLS stripping, command and response injections, tampering attacks, and UI spoofing attacks for email protocols. Our analysis focuses on the confidentiality and integrity of email submission (email client to SMTP server) and email retrieval (email client to POP3 or IMAP server). While some of our findings are also relevant for email transport (from one SMTP server to another), the security implications in email submission and retrieval are more critical because these connections involve not only individual email messages but also user credentials that allow access to a user's email archive. We used EAST to analyze 28 email clients and 23 servers. In total, we reported over 40 STARTTLS issues, some of which allow mailbox spoofing, credential stealing, and even the hosting of HTTPS with a cross-protocol attack on IMAP. We conducted an Internet-wide scan for the particularly dangerous command injection attack and found that 320.000 email servers (2% of all email servers) are affected. Surprisingly, several clients were vulnerable to STARTTLS stripping attacks. In total, only 3 out of 28 clients did not show any STARTTLS-specific security issues. Even though the command injection attack received multiple CVEs in the past, EAST detected eight new instances of this problem. In total, only 7 out of 23 tested servers were never affected by this issue. We conclude that STARTTLS is error-prone to implement, under-specified in the standards, and should be avoided. Y1 - 2021 UR - https://www.usenix.org/conference/usenixsecurity21/presentation/poddebniak SN - 978-1-939133-24-3 VL - 2021 ER - TY - JOUR A1 - Löchte, Andre A1 - Rojas Ruiz, Ignacio A1 - Glösekötter, Peter T1 - Battery State Estimation with ANN and SVR Evaluating Electrochemical Impedance Spectra Generalizing DC Currents JF - Applied Sciences N2 - The demand for energy storage is increasing massively due to the electrification of transport and the expansion of renewable energies. Current battery technologies cannot satisfy this growing demand as they are difficult to recycle, as the necessary raw materials are mined under precarious conditions, and as the energy density is insufficient. Metal–air batteries offer a high energy density as there is only one active mass inside the cell and the cathodic reaction uses the ambient air. Various metals can be used, but zinc is very promising due to its disposability and non-toxic behavior, and as operation as a secondary cell is possible. Typical characteristics of zinc–air batteries are flat charge and discharge curves. On the one hand, this is an advantage for the subsequent power electronics, which can be optimized for smaller and constant voltage ranges. On the other hand, the state determination of the system becomes more complex, as the voltage level is not sufficient to determine the state of the battery. In this context, electrochemical impedance spectroscopy is a promising candidate as the resulting impedance spectra depend on the state of charge, working point, state of aging, and temperature. Previous approaches require a fixed operating state of the cell while impedance measurements are being performed. In this publication, electrochemical impedance spectroscopy is therefore combined with various machine learning techniques to also determine successfully the state of charge during charging of the cell at non-fixed charging currents. Keywords: electrochemical impedance spectroscopy; artificial neural networks; support vector regression; zinc-air battery; state estimation; state of charge KW - Battery State Estimation Y1 - 2021 SN - 978-84-1117-173-1 U6 - https://doi.org/10.3390/app12010274 VL - 12 IS - 1 SP - 275 ER - TY - CHAP A1 - Romero, Adrian A1 - Estevez, Francisco A1 - Rebel, Gregor A1 - Glösekötter, Peter A1 - Conzáles, Jesús T1 - Distance Estimate with Ultra Wide Band in Interior Environments T2 - Proceedings of Jornadas de Computación Empotrada de Espana (JCE) Y1 - 2015 CY - Cordoba (Spain) ER - TY - CHAP A1 - Rebel, Gregor A1 - Estevez, Francisco A1 - Glösekötter, Peter T1 - Energy Efficiency Study of representative Microcontrollers for Wearable Electonics T2 - International Work-Conference on Bioinformatics and Biomedical Engineering Y1 - 2015 SP - 65 EP - 76 PB - Springer International Publishing Switzerland CY - Granada (Spain) ER - TY - CHAP A1 - Willing, Markus A1 - Saatjohann, Christoph A1 - Rath, Benjamin A1 - Schinzel, Sebastian A1 - Eckardt, Lars A1 - Köbe, Julia T1 - Experiences with General Data Protection Regulations and Remote Monitoring of Implantable Rhythm Devices T2 - 87. Jahrestagung der Deutsche Gesellschaft für Kardiologie – Herz‑ und Kreislauforschung e.V Y1 - 2021 U6 - https://doi.org/10.1007/s00392-021-01843-w PB - Springer-Verlag GmbH ER - TY - JOUR A1 - Weiss, Robin A1 - Glösekötter, Peter A1 - Prestes, Edson A1 - Kolberg, Mariana ED - Springer, T1 - Hybridisation of Sequential Monte Carlo Simulation with Non-linear Bounded-error State Estimation Applied to Global Localisation of Mobile Robots JF - Journal of Intelligent & Robotic Systems N2 - Accurate self-localisation is a fundamental ability of any mobile robot. In Monte Carlo localisation, a probability distribution over a space of possible hypotheses accommodates the inherent uncertainty in the position estimate, whereas bounded-error localisation provides a region that is guaranteed to contain the robot. However, this guarantee is accompanied by a constant probability over the confined region and therefore the information yield may not be sufficient for certain practical applications. Four hybrid localisation algorithms are proposed, combining probabilistic filtering with non-linear bounded-error state estimation based on interval analysis. A forward-backward contractor and the Set Inverter via Interval Analysis are hybridised with a bootstrap filter and an unscented particle filter, respectively. The four algorithms are applied to global localisation of an underwater robot, using simulated distance measurements to distinguishable landmarks. As opposed to previous hybrid methods found in the literature, the bounded-error state estimate is not maintained throughout the whole estimation process. Instead, it is only computed once in the beginning, when solving the wake-up robot problem, and after kidnapping of the robot, which drastically reduces the computational cost when compared to the existing algorithms. It is shown that the novel algorithms can solve the wake-up robot problem as well as the kidnapped robot problem more accurately than the two conventional probabilistic filters. KW - Interval analysis · Particle filtering · Kalman filtering · Bayesian filtering · Sequential Monte Carlo simulation · Bounded-error estimation Y1 - 2019 U6 - https://doi.org/10.1007/s10846-019-01118-7 SP - 1 EP - 23 ER - TY - JOUR A1 - Gierling, Markus A1 - Saatjohann, Christoph A1 - Dresen, Christian A1 - Köbe, Julia A1 - Rath, Benjamin A1 - Eckardt, Lars A1 - Schinzel, Sebastian T1 - Reviewing Cyber Security Research of Implantable Medical Rhythm Devices regarding Patients’ Risk JF - 86. Jahrestagung und Herztage 2020 der DGK N2 - Introduction: The recent publication of several critical cyber security issues in cardiac implantable devices and the resulting press coverage upsets affected users and their trust in medical device producers. Reviewing the published security vulnerabilities regarding networked medical devices, it raises the question, if the reporting media, the responsible security researchers, and the producers handle security vulnerabilities appropriately. Are the media reports of security vulnerabilities in medical devices meaningful in a way that patients can assess their respective risk for an attack via the security vulnerability? The collaboration between IT-security experts and clinicians aims at reviewing published security vulnerabilities of rhythm devices, and evaluate overall patients risks. Methodology: We performed a literature review on security vulnerabilities in implantable medical devices with a focus on cardiac devices. We analyzed (Fig. 1) the (1) requirements for an attacker and the (2) technical feasibility and clustered them in three different scenarios: The first scenario requires that the attacker physically approaches a victim with a programming device. The second scenario requires proximity to the victim, e.g., within a few meters. The third and strongest attacker scenario is a remote attack that doesn’t require any physical proximity to the victim. We then compare the attacker scenarios and (3) the overall patients’ risks with the press coverage (overhyped, adequate, underhyped). (4) The resulting overall patients’ risk was rated by clinicians (security vulnerability of patients’ data, dangerous programming possible). Results: Out of the three analyzed incidents, we found one to be underhyped, one to be overhyped, and one was appropriate compared to the medial coverage (Fig. 2). The most occurring technical issues were based on the absence of basic security primitives. The patient damage for all of the analyzed incidents was fatal in the worst-case scenario. Further, the patient damage and the overall patient risks are disjunct due to the missing capability of performing large scale attacks. Conclusion: The resulting overall patients’ risks may not adequately reflect the patient damage in the considered cases. Often, the overall patient risk is not as severe as the necessary attacker capabilities are high and it would require strongly motivated attackers to perform the attack. Therefore, most of the reviewed cases are considered with a smaller overall patient risk than implied by press reports. Reviewing the ongoing IT-Security trends regarding implantable medical devices shows an increasing focus on researching in the field of medical device security. Therefore, further findings in the near future are to be expected. To deal with this fact in a responsible way, proper proactive knowledge management is mandatory. We recommend medical staff to critically reflect reports in mass media due to possible sensationalism. Therefore, we propose a joint approach in combining the technical expertise of cyber security experts with clinical aspects of medical experts, to ensure a solid understanding of a newly published vulnerability. The combination of both communities promises to result in better predictions for patients’ risks from security vulnerabilities in implanted cardiac devices. KW - Cyber Security KW - Cardiac Implantable Devices Y1 - 2020 U6 - https://doi.org/10.1007/s00392-020-01621-0 VL - Band 109, Supplement 1, April 2020 SP - 1 EP - 2 ER - TY - CHAP A1 - Dresen, Christian A1 - Ising, Fabian A1 - Poddebniak, Damian A1 - Kappert, Tobias A1 - Holz, Thorsten A1 - Schinzel, Sebastian ED - Zhou, Jianying T1 - CORSICA: Cross-Origin Web Service Identification T2 - The 15th ACM ASIA Conference on Computer and Communications Security N2 - Vulnerabilities in private networks are difficult to detect for attackers outside of the network. While there are known methods for port scanning internal hosts that work by luring unwitting internal users to an external web page that hosts malicious JavaScript code, no such method for detailed and precise service identification is known. The reason is that the Same Origin Policy (SOP) prevents access to HTTP responses of other origins by default. We perform a structured analysis of loopholes in the SOP that can be used to identify web applications across network boundaries. For this, we analyze HTML5, CSS, and JavaScript features of standard-compliant web browsers that may leak sensitive information about cross-origin content. The results reveal several novel techniques, including leaking JavaScript function names or styles of cross-origin requests that are available in all common browsers. We implement and test these techniques in a tool called CORSICA. It can successfully identify 31 of 42 (74%) of web services running on different IoT devices as well as the version numbers of the four most widely used content management systems WordPress, Drupal, Joomla, and TYPO3. CORSICA can also determine the patch level on average down to three versions (WordPress), six versions (Drupal), two versions (Joomla), and four versions (TYPO3) with only ten requests on average. Furthermore, CORSICA is able to identify 48 WordPress plugins containing 65 vulnerabilities. Finally, we analyze mitigation strategies and show that the proposed but not yet implemented strategies Cross-Origin Resource Policy (CORP)} and Sec-Metadata would prevent our identification techniques. Y1 - 2020 UR - https://asiaccs2020.cs.nthu.edu.tw/program/ ER - TY - CHAP A1 - Estevez, F. A1 - Rebel, G. A1 - González, J. A1 - Palomares, J.M. A1 - Glösekötter, P. T1 - Body energy harvesting for WSN. State of art and examples T2 - Proceedings JCE 09/2013 N2 - Body energy harvesting for WSN. State of art and examples Y1 - 2013 U6 - https://doi.org/10.25974/fhms-707 PB - JCE ER - TY - JOUR A1 - Seuter, Pfeiffer A1 - Bauer, Zentgraf T1 - Running with Technology: Evaluating the Impact of Interacting with Wearable Devices on Running Movement JF - Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies Y1 - 2017 SN - 2474-9567 VL - 1 IS - 3 ER - TY - GEN A1 - Stewart, R. A1 - Tüxen, M. A1 - Loreto, S. A1 - Seggelmann, R. T1 - Stream Schedulers and User Message Interleaving for the Stream Control Transmission Protocol BT - November 2017 Y1 - 2017 U6 - https://doi.org/10.17487/RFC8260 SN - 2070-1721 N1 - RFC 8260 ER -