Refine
Year
Publication Type
- Part of a Book (119)
- Lecture (78)
- Article (66)
- Conference Proceeding (31)
- Book (20)
- Participation in a Norm (DIN, RFC etc.) (13)
- Report (1)
Language
- English (186)
- German (115)
- Multiple languages (27)
Has Fulltext
- no (328) (remove)
Keywords
- Photovoltaik, Solarstrom, Speicher (5)
- Cyber Security (4)
- Photovoltaik (3)
- Outdoor-EL (2)
- Photovoltaics (2)
- Solarstrom (2)
- Algorithm learning (1)
- Analysis (1)
- Author Keywords: Industrial robot, Automatic robot programming, SME, low volume, high variant, path planning, matching, machine vision (1)
- Batteries (1)
Faculty
- Elektrotechnik und Informatik (ETI) (328) (remove)
Fault Handling Approaches on Dual-Core Microcontrollers in Safety-Critical Automotive Applications
(2009)
ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication
(2021)
Teaching People to program is a crucial requirement for our society to deal with the complexity of 21st-century challenges. In many teaching systems, the student is required to use a particular programming language or development environment. This paper presents an intelligent tutoring system to support blended learning scenarios, where the students can choose their programming language and development environment. For that, the system provides an interface where the students request test data and submit results to unit test their algorithms. The submitted results are analyzed by a machine learning system that detects common errors and provides adaptive feedback to the student. With this system, we are focusing on teaching algorithms rather than specific programming language semantics. The technical evaluation tested with the implementation of Mean and Median algorithm shows that the system can distinguish between error cases with an error rate under 20%. A first survey, with a small group of students, shows that the system helps them detect common errors and arrive at a correct/valid solution. We are in the process of testing the system with a larger group of students for gathering statistically reliable data.
Concept and Prototyping of a Fault Management Framework for Automotive Safety Relevant Systems
(2007)
Vulnerabilities in private networks are difficult to detect for attackers outside of the network. While there are known methods for port scanning internal hosts that work by luring unwitting internal users to an external web page that hosts malicious JavaScript code, no such method for detailed and precise service identification is known. The reason is that the Same Origin Policy (SOP) prevents access to HTTP responses of other origins by default. We perform a structured analysis of loopholes in the SOP that can be used to identify web applications across network boundaries. For this, we analyze HTML5, CSS, and JavaScript features of standard-compliant web browsers that may leak sensitive information about cross-origin content. The results reveal several novel techniques, including leaking JavaScript function names or styles of cross-origin requests that are available in all common browsers. We implement and test these techniques in a tool called CORSICA. It can successfully identify 31 of 42 (74%) of web services running on different IoT devices as well as the version numbers of the four most widely used content management systems WordPress, Drupal, Joomla, and TYPO3. CORSICA can also determine the patch level on average down to three versions (WordPress), six versions (Drupal), two versions (Joomla), and four versions (TYPO3) with only ten requests on average. Furthermore, CORSICA is able to identify 48 WordPress plugins containing 65 vulnerabilities. Finally, we analyze mitigation strategies and show that the proposed but not yet implemented strategies Cross-Origin Resource Policy (CORP)} and Sec-Metadata would prevent our identification techniques.
About Nuclear Resonant Reaction Analysis for Hydrogen Investigations in Amorphous Silicon Layers
(2015)
Capacitance-voltage spectroscopy and analysis of dielectric intrinsic amorphous silicon thin films
(2016)
Reviewing Cyber Security Research of Implantable Medical Rhythm Devices regarding Patients’ Risk
(2020)
Introduction: The recent publication of several critical cyber security issues in cardiac implantable devices and the resulting press coverage upsets affected users and their trust in medical device producers. Reviewing the published security vulnerabilities regarding networked medical devices, it raises the question, if the reporting media, the responsible security researchers, and the producers handle security vulnerabilities appropriately. Are the media reports of security vulnerabilities in medical devices meaningful in a way that patients can assess their respective risk for an attack via the security vulnerability? The collaboration between IT-security experts and clinicians aims at reviewing published security vulnerabilities of rhythm devices, and evaluate overall patients risks.
Methodology: We performed a literature review on security vulnerabilities in implantable medical devices with a focus on cardiac devices. We analyzed (Fig. 1) the (1) requirements for an attacker and the (2) technical feasibility and clustered them in three different scenarios: The first scenario requires that the attacker physically approaches a victim with a programming device. The second scenario requires proximity to the victim, e.g., within a few meters. The third and strongest attacker scenario is a remote attack that doesn’t require any physical proximity to the victim. We then compare the attacker scenarios and (3) the overall patients’ risks with the press coverage (overhyped, adequate, underhyped). (4) The resulting overall patients’ risk was rated by clinicians (security vulnerability of patients’ data, dangerous programming possible).
Results: Out of the three analyzed incidents, we found one to be underhyped, one to be overhyped, and one was appropriate compared to the medial coverage (Fig. 2). The most occurring technical issues were based on the absence of basic security primitives. The patient damage for all of the analyzed incidents was fatal in the worst-case scenario. Further, the patient damage and the overall patient risks are disjunct due to the missing capability of performing large scale attacks.
Conclusion: The resulting overall patients’ risks may not adequately reflect the patient damage in the considered cases. Often, the overall patient risk is not as severe as the necessary attacker capabilities are high and it would require strongly motivated attackers to perform the attack. Therefore, most of the reviewed cases are considered with a smaller overall patient risk than implied by press reports. Reviewing the ongoing IT-Security trends regarding implantable medical devices shows an increasing focus on researching in the field of medical device security. Therefore, further findings in the near future are to be expected. To deal with this fact in a responsible way, proper proactive knowledge management is mandatory. We recommend medical staff to critically reflect reports in mass media due to possible sensationalism. Therefore, we propose a joint approach in combining the technical expertise of cyber security experts with clinical aspects of medical experts, to ensure a solid understanding of a newly published vulnerability. The combination of both communities promises to result in better predictions for patients’ risks from security vulnerabilities in implanted cardiac devices.
Asynchronous Circuit Design Based on the RTBT Monostable-Bistable-Logic-Transiton-Element (MOBILE)
(2002)
Die Beiträge, der Konferenz:
• Nanotechnologie –Von Wunder-Materialien und solchen die es werden wollen
• Mikrotechnik –to improve the qualityof live
• Quantum Sensing for Industrial Applications
• Geordnete Defekte in Graphit: Ein Fahrplan in Richtung Raumtemperatur Supraleitung
• Funktionale mikro-und nanostrukturierte Folien als Bestandteil hochintegrierter Systeme
Piston pumps play a key role in factory automation and their availability is very critical for the smooth running of production processes. Modern installations, such as production plants and machines, are becoming increasingly complex. Therefore, the probability of a complete system failure due to a single critical component also increases. Maintenance processes with intelligent devices are therefore very important to achieve maximum economic efficiency and safety. Periodic or continuous monitoring of system components provides key information about the current physical state of the system, enabling early detection of emerging failures. Knowledge of future failures makes it possible to move from the concept of preventive maintenance to intelligent predictive maintenance. In this way, consequential damage and complete system failure can be avoided, maximizing system availability and safety. This paper reflects the development and implementation of a neural network system for abnormal state prediction of piston pumps. After a short introduction into piston pumps and their potential abnormal states, statistical and periodical analysis are presented. Then the design and implementation of suitable neural networks are discussed. Finally, a conclusion is drawn and the observed accuracies as well as potential next steps are discussed.
Cache Attacks on Intel SGX
(2017)
This work describes the setup of an ultrawideband (UWB)
realtime localization system (RTLS) for tracking of particles.We describe
how the RTLS obtains distances and positions through radio waves and
the setup and evaluation of a real world system is stated in detail. In
the proposed system the particles track a subtrates surface
ow inside a
biogas plant for verication of agitation processes.
Quantum magnetometry based on optically detected magnetic resonance (ODMR) of nitrogen vacancy centers in nano- or micro-diamonds is a promising technology for precise magnetic-field sensors. Here, we propose a new, low-cost and stand-alone sensor setup that employs machine learning on an embedded device, so-called edge machine learning. We train an artificial neural network with data acquired from a continuous-wave ODMR setup and subsequently use this pre-trained network on the sensor device to deduce the magnitude of the magnetic field from recorded ODMR spectra. In our proposed sensor setup, a low-cost and low-power ESP32 microcontroller development board is employed to control data recording and perform inference of the network. In a proof-of-concept study, we show that the setup is capable of measuring magnetic fields with high precision and has the potential to enable robust and accessible sensor applications with a wide measuring range.
An improvement on a concept for all optical mag- netometry using nitrogen vacancies in diamond is presented. The concept is based on the fluorescence attenuation of optically pumped nitrogen vacancies by magnetic fields up to ≈ 50 mT. The attenuation is registered by modulating the pumping power to generate a constant signal at a photodetector. A sensitivity of 2.6μT/√Hz at a sampling frequency of 500 Hz is achieved.
Magnetometry with nitrogen–vacancy (NV) defects in diamond has been extensively stud-ied in the past [1]. While most approaches in-clude the use of microwaves (MW) for the de-tection of electron spin resonance, only few investigate the sensitivity of the photolumines-cence (PL) from NV centers to an external magnetic field without MW [2, 3, 4]. This work aims to utilize this effect to build a highly sensi-tive and compact room temperature magne-tometer. The avoidance of MW serves the re-duction of production costs and allows a com-mercialization at the current patent situation.
Due to a nonuniform and sometimes unsteady energy yield, a large scale renewable energy supply requires a broadening of centralized and decentralized energy storage systems. On this background, there are high expectations on batteries with regard to various energy storage systems in the near future. In engineering studies, batteries are usually regarded as a black box. However, this point of view is not sufficient and reasonable for the energy storage demands of the near future. Therefore, it is necessary to intensify the knowledge about the advantages and limitations of batteries in engineering lectures – but also in lectures for students of physics or chemistry.
The book is written for graduate students from the engineering disciplines, in particular for graduate students of electrical engineering. It should be also of interest for graduate students of physics, chemistry and even industrial engineering. It is not intended to provide a specialized book for distinguished researchers or experts in electrochemistry and/or highly sophisticated battery technology.
In particular, the book provides a presentation of the physical basics and principles of electrochemical energy storage. It gives an overview and explanation of the functionality of historical batteries. The electrochemical reaction mechanisms in important primary and secondary batteries are discussed in detail. Moreover, the availability of the relevant raw materials for a growing battery market is emphasized.
The book is destined for background reading in corresponding university lectures and useful for self-study, too.