Categories

266498

Research outputs

As an application-oriented research organisation, Fraunhofer aims to conduct highly innovative and solution-oriented research - for the benefit of society and to strengthen the German and European economy.

13927

Projects

Fraunhofer is tackling the current challenges facing industry head on. By pooling their expertise and involving industrial partners at an early stage, the Fraunhofer Institutes involved in the projects aim to turn original scientific ideas into marketable products as quickly as possible.

7740

Researchers

Scientific achievement and practical relevance are not opposites - at Fraunhofer they are mutually dependent. Thanks to the close organisational links between Fraunhofer Institutes and universities, science at Fraunhofer is conducted at an internationally first-class level.

77

Institutes

The Fraunhofer-Gesellschaft is the leading organisation for applied research in Europe. Institutes and research facilities work under its umbrella at various locations throughout Germany.

Recent Additions

  • Publication
    Electron beam induced compatibilization of PLA/ PBAT blends in presence of epoxidized soybean oil
    ( 2024)
    Marbach, Lena
    Employees 608 Strategy UMSICHT.2025-Fraunhofer UMSICHT develops climate-neutral energy systems, resource-efficient processes and circular products.
  • Publication
    Content-type: multipart/oracle - tapping into format oracles in email end-to-end encryption
    ( 2023)
    Ising, Fabian
    ;
    Poddebniak, Damian
    ;
    Kappert, Tobias
    ;
    Saatjohann, Christoph
    ;
    Schinzel, Sebastian
    S/MIME and OpenPGP use cryptographic constructions repeatedly shown to be vulnerable to format oracle attacks in protocols like TLS, SSH, or IKE. However, format oracle attacks in the End-to-End Encryption (E2EE) email setting are considered impractical as victims would need to open many attacker-modified emails and communicate the decryption result to the attacker. But is this really the case? In this paper, we survey how an attacker may remotely learn the decryption state in email E2EE. We analyze the interplay of MIME and IMAP and describe side-channels emerging from network patterns that leak the decryption status in Mail User Agents (MUAs). Concretely, we introduce specific MIME trees that produce decryption-dependent network patterns when opened in a victim's email client. We survey 19 OpenPGP- and S/MIME-enabled email clients and four cryptographic libraries and uncover a side-channel leaking the decryption status of S/MIME messages in one client. Further, we discuss why the exploitation in the other clients is impractical and show that it is due to missing feature support and implementation quirks. These unintended defenses create an unfortunate conflict between usability and security. We present more rigid countermeasures for MUA developers and the standards to prevent exploitation.
  • Publication
    Analysis of the hybrid light field reconstruction and comparison with Richardson-Lucy Light Field Deconvolution
    Conventional microscopes have a high spatial resolution and a low depth-of-field. Light field microscopes have a high depth-of-field but low spatial resolution. A new hybrid approach uses information from both systems to reconstruct a high-resolution light field [Appl. Opt. 58, A142 (2019)]. The resolution of the resulting light field is said to be limited only by diffraction and the size of the pixels. In this paper, we evaluate this method. Using simulation data we compare the output of the hybrid reconstruction algorithm with its simulated ground truth. Our analyses reveal that the observed improvement in the light field quality is not a consequence of data fusion or incorporation of information from a conventional camera, but rather the results of an intermediate interpolation step within the light field itself. This suggests that the required information is already inherent to the light field. By employing the Richardson-Lucy Light Field Deconvolution algorithm, we demonstrate that existing algorithms have already utilized this information.

Most viewed

  • Publication
    Hierarchical Clock Synchronization in MPI
    ( 2018)
    Hunold, S.
    ;
    Carpen-Amarie, A.
    MPI benchmarks are used for analyzing or tuning the performance of MPI libraries. Generally, every MPI library should be adjusted to the given parallel machine, especially on supercomputers. System operators can define which algorithm should be selected for a specific MPI operation, and this decision which algorithm to select is usually made after analyzing bench-mark results. The problem is that the latency of communication operations in MPI is very sensitive to the chosen data acquisition and data processing method. For that reason, depending on how the performance is measured, system operators may end up with a completely different MPI library setup. In the present work, we focus on the problem of precisely measuring the latency of collective operations, in particular, for small payloads, where external experimental factors play a significant role. We present a novel clock synchronization algorithm, which exploits the hierarchical architecture of compute clusters, and we show that it outperforms previous approaches, both in run-time and in precision. We also propose a different scheme to obtain precise MPI run-time measurements (called Round-Time), which is based on given, fixed time slices, as opposed to the traditional way of measuring for a predefined number of repetitions. We also highlight that the use of MPI_Barrier has a significant effect on experimentally determined latency values of MPI collectives. We argue that MPI_Barrier should be avoided if the average run-time of the barrier function is in the same order of magnitude as the run-time of the MPI function to be measured.
  • Publication
    Characterization of self-cleaning properties on superhydrophobic aluminum surfaces fabricated by direct laser writing and direct laser interference patterning
    ( 2020)
    Milles, Stephan
    ;
    Soldera, Marcos
    ;
    ;
    Self-cleaning ability on technical surfaces can increase the added value of a product. A common path to achieve this property is making the surface superhydrophobic so that water droplets can roll down, picking up dirt particles. In this contribution, the self-cleaning efficiency of Al surfaces structured with direct laser writing (DLW), direct laser interference patterning (DLIP) and a combination of both technologies was quantitatively determined. This was performed by developing a characterization method, where the treated samples are firstly covered with either MnO2 or polyamide micro-particles, then tilted by 15° and 30° and finally washed applying up to nine water droplets (10 µl) over the contaminated surfaces. Then, an optical analysis by image processing of the remaining contamination particles on the textured surfaces was realized after each droplet rolled over the surface. The DLIP textures showed the best performance, allowing the removal of more than 90% of the particles after just three droplets were released. High-speed videos and scanning electron microscopy characterization allowed a deeper understanding on the cleaning behavior and on the relationship between surface microstructure and particle size and shape.