Elektrotechnik und Informatik (ETI)
Refine
Year
Publication Type
- Part of a Book (119)
- Lecture (78)
- Article (66)
- Conference Proceeding (32)
- Book (20)
- Participation in a Norm (DIN, RFC etc.) (13)
- Report (1)
Language
- English (187)
- German (115)
- Multiple languages (27)
Has Fulltext
- no (329) (remove)
Keywords
- Photovoltaik, Solarstrom, Speicher (5)
- Cyber Security (4)
- Photovoltaik (3)
- Outdoor-EL (2)
- Photovoltaics (2)
- Solarstrom (2)
- Algorithm learning (1)
- Analysis (1)
- Author Keywords: Industrial robot, Automatic robot programming, SME, low volume, high variant, path planning, matching, machine vision (1)
- Batteries (1)
ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication
(2021)
TLS is one of today's most widely used and best-analyzed encryption technologies. However, for historical reasons, TLS for email protocols is often not used directly but negotiated via STARTTLS. This additional negotiation adds complexity and was prone to security vulnerabilities such as naive STARTTLS stripping or command injection attacks in the past.
We perform the first structured analysis of STARTTLS in SMTP, POP3, and IMAP and introduce EAST, a semi-automatic testing toolkit with more than 100 test cases covering a wide range of variants of STARTTLS stripping, command and response injections, tampering attacks, and UI spoofing attacks for email protocols. Our analysis focuses on the confidentiality and integrity of email submission (email client to SMTP server) and email retrieval (email client to POP3 or IMAP server). While some of our findings are also relevant for email transport (from one SMTP server to another), the security implications in email submission and retrieval are more critical because these connections involve not only individual email messages but also user credentials that allow access to a user's email archive.
We used EAST to analyze 28 email clients and 23 servers. In total, we reported over 40 STARTTLS issues, some of which allow mailbox spoofing, credential stealing, and even the hosting of HTTPS with a cross-protocol attack on IMAP. We conducted an Internet-wide scan for the particularly dangerous command injection attack and found that 320.000 email servers (2% of all email servers) are affected. Surprisingly, several clients were vulnerable to STARTTLS stripping attacks. In total, only 3 out of 28 clients did not show any STARTTLS-specific security issues. Even though the command injection attack received multiple CVEs in the past, EAST detected eight new instances of this problem. In total, only 7 out of 23 tested servers were never affected by this issue. We conclude that STARTTLS is error-prone to implement, under-specified in the standards, and should be avoided.
Electrical Engineering
(2021)
In this chapter, fundamental properties of charged objects are discussed. It is shown how they may be used to design and use capacitors, resistors and inductors. Function and the usage of bipolar and MOS semiconductor devices are presented. The chapter is concluded by a discussion of DC and AC networks
Dieses Buch erklärt, warum es verschiedene Varianten der Maxwell’schen Gleichungen gibt und was genau die physikalische Bedeutung der in ihnen vorkommenden Größen ist. Gezeigt wird ferner, wie sich die Bestimmungsgleichungen für statische elektrische und magnetische Potenziale aus den Maxwell’schen Gleichungen ergeben. Dabei ist die Rolle der dem Feld ausgesetzter Materie immer von Anfang an integraler Bestandteil der Diskussion.
Multipolentwicklungen werden begründet und hergeleitet. Ferner
wird dargelegt, welches Vereinfachungspotenzial in der Formulierung der dynamischen Theorie als Eichfeldtheorie liegt. Die Gesetze der Optik werden aus denen der Elektrodynamik hergeleitet. Für quasi-stationäre Rechnungen werden Begründungen geliefert, Grenzen formuliert und technische Gegenbeispiele gezeigt. Am Schluss wird auf weiterführende Literatur hingewiesen.
This paper deals with the issue of automating the
process of machine learning and analyzing bio-datasets. For this
a user-friendly website has been developed for the interaction
with the researchers. On this website it is possible to upload
datasets and to share them, if desired, with other scientists. The
uploaded data can also be analyzed by various methods and
functions. The signals inside these datasets can also be visualized.
Furthermore several algorithms have been implemented to create
machine learning models with the uploaded data. Based on these
generated models new data can be classified or calculated. For all
these applications the simplest possible handling was
implemented to make the website available to all interested
researchers.
An improvement on a concept for all optical mag- netometry using nitrogen vacancies in diamond is presented. The concept is based on the fluorescence attenuation of optically pumped nitrogen vacancies by magnetic fields up to ≈ 50 mT. The attenuation is registered by modulating the pumping power to generate a constant signal at a photodetector. A sensitivity of 2.6μT/√Hz at a sampling frequency of 500 Hz is achieved.
Background: Modern healthcare devices can be connected to computer networks and many western healthcareinstitutions run those devices in networks. At the same time, cyber attacks are on the rise and there is evidence thatcybercriminals do not spare critical infrastructure such as major hospitals, even if they endanger patients. Intuitively,the more and closer connected healthcare devices are to public networks, the higher the risk of getting attacked.
Methods: To asses the current connectivity status of healthcare devices, we surveyed the field of German hospitalsand especially University Medical Center UMCs.
Results: The results show a strong correlation between the networking degree and the number of medical devices.The average number of medical devices is 25.150, with a median of networked medical devices of 3.600. Actual keyusers of networked medical devices are the departments Radiology, Intensive Care, Radio-Oncology RO, NuclearMedicine NUC, and Anaesthesiology in the group of UMCs. In the next five years, the usage of networked medicaldevices will increase significantly in the departments of Surgery, Intensive Care, and Radiology. We detected a strongcorrelation between the degree of connectivity and the likelihood of being attacked.The survey answers regarding the cyber security status reveal a lack of security basics in some of the inquiredhospitals. We did discover successful attacks in hospitals with separated or subsidiary departments. A fusion ofcompetencies on an organizational level facilitates the right behavior here. Most hospitals rated themselvespredominantly positively in the self-assessment but also stated the usefulness of IT security insurance.Conclusions:Concluding our results, hospitals are already facing the consequences of omitted measures within theirgrowing pool of medical devices. Continuously relying on historically grown structures without adaption and trustingmanufactures to solve vectors is a critical behavior that could seriously endanger patients.
Due to a nonuniform and sometimes unsteady energy yield, a large scale renewable energy supply requires a broadening of centralized and decentralized energy storage systems. On this background, there are high expectations on batteries with regard to various energy storage systems in the near future. In engineering studies, batteries are usually regarded as a black box. However, this point of view is not sufficient and reasonable for the energy storage demands of the near future. Therefore, it is necessary to intensify the knowledge about the advantages and limitations of batteries in engineering lectures – but also in lectures for students of physics or chemistry.
The book is written for graduate students from the engineering disciplines, in particular for graduate students of electrical engineering. It should be also of interest for graduate students of physics, chemistry and even industrial engineering. It is not intended to provide a specialized book for distinguished researchers or experts in electrochemistry and/or highly sophisticated battery technology.
In particular, the book provides a presentation of the physical basics and principles of electrochemical energy storage. It gives an overview and explanation of the functionality of historical batteries. The electrochemical reaction mechanisms in important primary and secondary batteries are discussed in detail. Moreover, the availability of the relevant raw materials for a growing battery market is emphasized.
The book is destined for background reading in corresponding university lectures and useful for self-study, too.
OOXML and ODF are the de facto standard data formats for word processing, spreadsheets, and presentations. Both are XML-based, feature-rich container formats dating back to the early 2000s. In this work, we present a systematic analysis of the capabilities of malicious office documents. Instead of focusing on implementation bugs, we abuse legitimate features of the OOXML and ODF specifications. We categorize our attacks into five classes: (1) Denial-of-Service attacks affecting the host on which the document is processed. (2) Invasion of privacy attacks that track the usage of the document. (3) Information disclosure attacks exfiltrating personal data out of the victim's computer. (4) Data manipulation on the victim's system. (5) Code execution on the victim's machine. We evaluated the reference implementations – Microsoft Office and LibreOffice – and found both of them to be vulnerable to each tested class of attacks. Finally, we propose mitigation strategies to counter these attacks.