Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperOctober 2024
Investigating Domain Bias in NILM
BuildSys '24: Proceedings of the 11th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and TransportationPages 333–336https://doi.org/10.1145/3671127.3699532Enhancing household energy efficiency is crucial, and Non-intrusive Load Monitoring (NILM) offers a valuable solution by giving consumers insights into their energy use without individual device monitoring. However, the deployment of NILM models in new ...
- short-paperOctober 2024
A Critical Review of Household Water Datasets
BuildSys '24: Proceedings of the 11th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and TransportationPages 318–322https://doi.org/10.1145/3671127.3698793The increasing prevalence of water scarcity has spurred a surge in research efforts globally. To test and validate new concepts and ideas, readily accessible data is crucial for thorough evaluation. In this study, we examine recently published household ...
- research-articleJuly 2024
Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityPages 962–976https://doi.org/10.1145/3634737.3637640Industrial control systems increasingly rely on middlebox functionality such as intrusion detection or in-network processing. However, traditional end-to-end security protocols interfere with the necessary access to in-flight data. While recent work on ...
- research-articleJuly 2024
The unresolved need for dependable guarantees on security, sovereignty, and trust in data ecosystems
- Johannes Lohmöller,
- Jan Pennekamp,
- Roman Matzutt,
- Carolin Victoria Schneider,
- Eduard Vlad,
- Christian Trautwein,
- Klaus Wehrle
AbstractData ecosystems emerged as a new paradigm to facilitate the automated and massive exchange of data from heterogeneous information sources between different stakeholders. However, the corresponding benefits come with unforeseen risks as sensitive ...
- ArticleMarch 2024
When and How to Aggregate Message Authentication Codes on Lossy Channels?
AbstractAggregation of message authentication codes (MACs) is a proven and efficient method to preserve valuable bandwidth in resource-constrained environments: Instead of appending a long authentication tag to each message, the integrity protection of ...
-
- ArticleApril 2024
Collectively Enhancing IoT Security: A Privacy-Aware Crowd-Sourcing Approach
AbstractSecurity configurations remain challenging for trained administrators. Nowadays, due to the advent of the Internet of Things (IoT), untrained users operate numerous and heterogeneous Internet-facing services in manifold use case-specific ...
- research-articleNovember 2023
Offering Two-way Privacy for Evolved Purchase Inquiries
- Jan Pennekamp,
- Markus Dahlmanns,
- Frederik Fuhrmann,
- Timo Heutmann,
- Alexander Kreppein,
- Dennis Grunert,
- Christoph Lange,
- Robert H. Schmitt,
- Klaus Wehrle
ACM Transactions on Internet Technology (TOIT), Volume 23, Issue 4Article No.: 53, Pages 1–32https://doi.org/10.1145/3599968Dynamic and flexible business relationships are expected to become more important in the future to accommodate specialized change requests or small-batch production. Today, buyers and sellers must disclose sensitive information on products upfront before ...
- posterNovember 2023
Poster: Vulcan -- Repurposing Accessibility Features for Behavior-based Intrusion Detection Dataset Generation
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 3543–3545https://doi.org/10.1145/3576915.3624404The generation of datasets is one of the most promising approaches to collecting the necessary behavior data to train machine learning models for host-based intrusion detection. While various dataset generation methods have been proposed, they are often ...
- posterNovember 2023
Poster: Bridging Trust Gaps: Data Usage Transparency in Federated Data Ecosystems
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 3582–3584https://doi.org/10.1145/3576915.3624371The evolving landscape of data ecosystems (DEs) increasingly demands integrated and collaborative data-sharing mechanisms that simultaneously ensure data sovereignty. However, recently proposed federated platforms, e.g., Gaia-X, only offer a promising ...
- posterNovember 2023
Poster: Accountable Processing of Reported Street Problems
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 3591–3593https://doi.org/10.1145/3576915.3624367Municipalities increasingly depend on citizens to file digital reports about issues such as potholes or illegal trash dumps to improve their response time. However, the responsible authorities may be incentivized to ignore certain reports, e.g., when ...
- short-paperOctober 2023
Does It Spin? On the Adoption and Use of QUIC's Spin Bit
IMC '23: Proceedings of the 2023 ACM on Internet Measurement ConferencePages 554–560https://doi.org/10.1145/3618257.3624844Encrypted QUIC traffic complicates network management as traditional transport layer semantics can no longer be used for RTT or packet loss measurements. Addressing this challenge, QUIC includes an optional, carefully designed mechanism: the spin bit. ...
- research-articleOctober 2023
ECN with QUIC: Challenges in the Wild
IMC '23: Proceedings of the 2023 ACM on Internet Measurement ConferencePages 540–553https://doi.org/10.1145/3618257.3624821TCP and QUIC can both leverage ECN to avoid congestion loss and its retransmission overhead. However, both protocols require support of their remote endpoints and it took two decades since the initial standardization of ECN for TCP to reach 80% ECN ...
- ArticleJanuary 2024
One IDS Is Not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection
AbstractIndustrial Intrusion Detection Systems (IIDSs) play a critical role in safeguarding Industrial Control Systems (ICSs) against targeted cyberattacks. Unsupervised anomaly detectors, capable of learning the expected behavior of physical processes, ...
- surveySeptember 2023
An Interdisciplinary Survey on Information Flows in Supply Chains
- Jan Pennekamp,
- Roman Matzutt,
- Christopher Klinkmüller,
- Lennart Bader,
- Martin Serror,
- Eric Wagner,
- Sidra Malik,
- Maria Spiß,
- Jessica Rahn,
- Tan Gürpinar,
- Eduard Vlad,
- Sander J. J. Leemans,
- Salil S. Kanhere,
- Volker Stich,
- Klaus Wehrle
ACM Computing Surveys (CSUR), Volume 56, Issue 2Article No.: 32, Pages 1–38https://doi.org/10.1145/3606693Supply chains form the backbone of modern economies and therefore require reliable information flows. In practice, however, supply chains face severe technical challenges, especially regarding security and privacy. In this work, we consolidate studies ...
- research-articleJuly 2023
Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact
ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications SecurityPages 797–811https://doi.org/10.1145/3579856.3590329Containerization allows bundling applications and their dependencies into a single image. The containerization framework Docker eases the use of this concept and enables sharing images publicly, gaining high momentum. However, it can lead to users ...
- ArticleJune 2023
Designing Secure and Privacy-Preserving Information Systems for Industry Benchmarking
- Jan Pennekamp,
- Johannes Lohmöller,
- Eduard Vlad,
- Joscha Loos,
- Niklas Rodemann,
- Patrick Sapel,
- Ina Berenice Fink,
- Seth Schmitz,
- Christian Hopmann,
- Matthias Jarke,
- Günther Schuh,
- Klaus Wehrle,
- Martin Henze
AbstractBenchmarking is an essential tool for industrial organizations to identify potentials that allows them to improve their competitive position through operational and strategic means. However, the handling of sensitive information, in terms of (i) ...
- ArticleSeptember 2022
Can Industrial Intrusion Detection Be SIMPLE?
AbstractCyberattacks against industrial control systems pose a serious risk to the safety of humans and the environment. Industrial intrusion detection systems oppose this threat by continuously monitoring industrial processes and alerting any deviations ...
- research-articleMay 2022
A False Sense of Security?: Revisiting the State of Machine Learning-Based Industrial Intrusion Detection
- Dominik Kus,
- Eric Wagner,
- Jan Pennekamp,
- Konrad Wolsing,
- Ina Berenice Fink,
- Markus Dahlmanns,
- Klaus Wehrle,
- Martin Henze
CPSS '22: Proceedings of the 8th ACM on Cyber-Physical System Security WorkshopPages 73–84https://doi.org/10.1145/3494107.3522773Anomaly-based intrusion detection promises to detect novel or unknown attacks on industrial control systems by modeling expected system behavior and raising corresponding alarms for any deviations. As manually creating these behavioral models is tedious ...
- research-articleMay 2022
Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things
ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications SecurityPages 252–266https://doi.org/10.1145/3488932.3497762The ongoing trend to move industrial appliances from previously isolated networks to the Internet requires fundamental changes in security to uphold secure and safe operation. Consequently, to ensure end-to-end secure communication and authentication, (...
BP-MAC: Fast Authentication for Short Messages
WiSec '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 201–206https://doi.org/10.1145/3507657.3528554Resource-constrained devices increasingly rely on wireless communication for the reliable and low-latency transmission of short messages. However, especially the implementation of adequate integrity protection of time-critical messages places a ...