Elektrotechnik und Informatik (ETI)
Refine
Publication Type
- Conference Proceeding (32) (remove)
Has Fulltext
- no (32) (remove)
Keywords
- Cyber Security (3)
- Algorithm learning (1)
- Analysis (1)
- Author Keywords: Industrial robot, Automatic robot programming, SME, low volume, high variant, path planning, matching, machine vision (1)
- Deep Learning (1)
- Development and implementation (1)
- End of charge (1)
- GNSS (1)
- Highly Sensitive (1)
- Hochintegrierte Mikro- und Nanosysteme (1)
Durchgängige Digitalisierung industrieller Abläufe am Beispiel der Modellfabrik der FH Münster
(2023)
Die Modellfabrik der FH Münster erlaubt durch den Umfang und die Komplexität der enthaltenen Automatisierungsaufgaben sowie einen Aufbau aus industriellen Komponenten eine praxisnahe Lehre im Bereich aktueller Anlagenautomatisierung und darüber hinausgehenden Funktionen im Sinne einer durchgängigen Digitalisierung. Die verwendete Unterscheidung der durchgängigen Digitalisierung in horizontale und vertikale Verknüpfungen wird veranschaulicht. Aufbauend auf Erfahrungen mit der Vorgängeranlage werden Neuerungen der 2021 aufgebauten neuen Modellfabrik vorgestellt. Neuerungen umfassen insbesondere die Modularisierung der Anlage, das umgesetzte Sicherheitskonzept, einen Webshop mit Onlinekonfigurator, eine Webvisualiserung des Anlagenzustandes inklusive der Energieverbräuche, sowie Möglichkeiten zur virtuellen Inbetriebnahme. Weiterhin wird das aktuelle Konzept zur Erweiterung der horizontalen digitalen Durchgängigkeit mittels der Einbindung eines autonomen mobilen Roboters in die Modellfabrik vorgestellt.
S/MIME and OpenPGP use cryptographic constructions repeatedly shown to be vulnerable to format oracle attacks in protocols like TLS, SSH, or IKE. However, format oracle attacks in the End-to-End Encryption (E2EE) email setting are considered impractical as victims would need to open many attacker-modified emails and communicate the decryption result to the attacker. But is this really the case?
In this paper, we survey how an attacker may remotely learn the decryption state in email E2EE. We analyze the interplay of MIME and IMAP and describe side-channels emerging from network patterns that leak the decryption status in Mail User Agents (MUAs). Concretely, we introduce specific MIME trees that produce decryption-dependent net work patterns when opened in a victim’s email client.
We survey 19 OpenPGP- and S/MIME-enabled email clients and four cryptographic libraries and uncover a side-channel leaking the decryption status of S/MIME messages in one client. Further, we discuss why the exploitation in the other clients is impractical and show that it is due to missing feature support and implementation quirks. These unintended defenses create an unfortunate conflict between usability and security. We present more rigid countermeasures for MUA developers and the standards to prevent exploitation.
OpenPGP is one of the two major standards for end-to-end email security. Several studies showed that serious usability issues exist with tools implementing this standard. However, a widespread assumption is that expert users can handle these tools and detect signature spoofing attacks. We present a user study investigating expert users' strategies to detect signature spoofing attacks in Thunderbird. We observed 25 expert users while they classified eight emails as either having a legitimate signature or not. Studying expert users explicitly gives us an upper bound of attack detection rates of all users dealing with PGP signatures. 52% of participants fell for at least one out of four signature spoofing attacks. Overall, participants did not have an established strategy for evaluating email signature legitimacy. We observed our participants apply 23 different types of checks when inspecting signed emails, but only 8 of these checks tended to be useful in identifying the spoofed or invalid signatures. In performing their checks, participants were frequently startled, confused, or annoyed with the user interface, which they found supported them little. All these results paint a clear picture: Even expert users struggle to verify email signatures, usability issues in email security are not limited to novice users, and developers may need proper guidance on implementing email signature GUIs correctly.
The subject of this paper is the analysis of various switching electronics for batteries with separate electrodes for charging and discharging. The aim is to find a switching method that is energy-efficient on the one hand, but also economically viable on the other. Both relays and MOSFETs are suitable for switching between the electrodes. Both variants have advantages and disadvantages. The results show that a solution with MOSFETs is generally more energy-efficient, but requires a large number of cycles to be economically viable compared to the relay.
State of the art classifiers split Alzheimer’s disease progression into a limited number of stages and use a comparatively small database. For the best treatment, it is desirable to have the highest resolution from the progression of the disease. This paper proposes a reliable deep convolutional neural network for the classification of six different Alzheimer’s disease stages based on Magnetic Resonance Imaging (MRI). The peculiarity of this paper is the introduction of a new, sixth, disease stage, and the large amount of data that has been taken into account. Additionally, not only the testing accuracy is analyzed, but also the robustness of the classifier to have feedback on how certain the neural network makes its predictions.
Piston pumps play a key role in factory automation and their availability is very critical for the smooth running of production processes. Modern installations, such as production plants and machines, are becoming increasingly complex. Therefore, the probability of a complete system failure due to a single critical component also increases. Maintenance processes with intelligent devices are therefore very important to achieve maximum economic efficiency and safety. Periodic or continuous monitoring of system components provides key information about the current physical state of the system, enabling early detection of emerging failures. Knowledge of future failures makes it possible to move from the concept of preventive maintenance to intelligent predictive maintenance. In this way, consequential damage and complete system failure can be avoided, maximizing system availability and safety. This paper reflects the development and implementation of a neural network system for abnormal state prediction of piston pumps. After a short introduction into piston pumps and their potential abnormal states, statistical and periodical analysis are presented. Then the design and implementation of suitable neural networks are discussed. Finally, a conclusion is drawn and the observed accuracies as well as potential next steps are discussed.
TLS is one of today's most widely used and best-analyzed encryption technologies. However, for historical reasons, TLS for email protocols is often not used directly but negotiated via STARTTLS. This additional negotiation adds complexity and was prone to security vulnerabilities such as naive STARTTLS stripping or command injection attacks in the past.
We perform the first structured analysis of STARTTLS in SMTP, POP3, and IMAP and introduce EAST, a semi-automatic testing toolkit with more than 100 test cases covering a wide range of variants of STARTTLS stripping, command and response injections, tampering attacks, and UI spoofing attacks for email protocols. Our analysis focuses on the confidentiality and integrity of email submission (email client to SMTP server) and email retrieval (email client to POP3 or IMAP server). While some of our findings are also relevant for email transport (from one SMTP server to another), the security implications in email submission and retrieval are more critical because these connections involve not only individual email messages but also user credentials that allow access to a user's email archive.
We used EAST to analyze 28 email clients and 23 servers. In total, we reported over 40 STARTTLS issues, some of which allow mailbox spoofing, credential stealing, and even the hosting of HTTPS with a cross-protocol attack on IMAP. We conducted an Internet-wide scan for the particularly dangerous command injection attack and found that 320.000 email servers (2% of all email servers) are affected. Surprisingly, several clients were vulnerable to STARTTLS stripping attacks. In total, only 3 out of 28 clients did not show any STARTTLS-specific security issues. Even though the command injection attack received multiple CVEs in the past, EAST detected eight new instances of this problem. In total, only 7 out of 23 tested servers were never affected by this issue. We conclude that STARTTLS is error-prone to implement, under-specified in the standards, and should be avoided.
This paper deals with the issue of automating the
process of machine learning and analyzing bio-datasets. For this
a user-friendly website has been developed for the interaction
with the researchers. On this website it is possible to upload
datasets and to share them, if desired, with other scientists. The
uploaded data can also be analyzed by various methods and
functions. The signals inside these datasets can also be visualized.
Furthermore several algorithms have been implemented to create
machine learning models with the uploaded data. Based on these
generated models new data can be classified or calculated. For all
these applications the simplest possible handling was
implemented to make the website available to all interested
researchers.
An improvement on a concept for all optical mag- netometry using nitrogen vacancies in diamond is presented. The concept is based on the fluorescence attenuation of optically pumped nitrogen vacancies by magnetic fields up to ≈ 50 mT. The attenuation is registered by modulating the pumping power to generate a constant signal at a photodetector. A sensitivity of 2.6μT/√Hz at a sampling frequency of 500 Hz is achieved.