Now showing 1 - 6 of 6
  • Publication
    Leveraging Edge Computing and Differential Privacy to Securely Enable Industrial Cloud Collaboration Along the Value Chain
    ( 2021) ; ;
    Busch, Maximilian
    Big data continues to grow in the manufacturing domain due to increasing interconnectivity on the shop floor in the course of the fourth industrial revolution. The optimization of machines based on either real-time or historical machine data provides benefits to both machine producers and operators. In order to be able to make use of these opportunities, it is necessary to access the machine data, which can include sensitive information such as intellectual property. Employing the use case of machine tools, this paper presents a solution enabling industrial data sharing and cloud collaboration while protecting sensitive information. It employs the edge computing paradigm to apply differential privacy to machine data in order to protect sensitive information and simultaneously allow machine producers to perform the necessary calculations and analyses using this data.
  • Publication
    AntiPatterns Regarding the Application of Cryptographic Primitives by the Example of Ransomware
    ( 2020) ; ;
    Graif, Lukas
    Cryptographic primitives are the basic building blocks for many cryptographic schemes and protocols. Implementing them incorrectly can lead to flaws, making a system or a product vulnerable to various attacks. As shown in the present paper, this statement also applies to ransomware. The paper surveys common errors occurring during the implementation of cryptographic primitives. Based on already existing research, it establishes a categorization framework to match selected ransomware samples by their respective vulnerabilities and assign them to the corresponding error categories. Subsequently, AntiPatterns are derived from the extracted error categories. These AntiPatterns are meant to support the field of software development by helping to detect and correct errors early during the implementation phase of cryptography.
  • Publication
    Integrating security evaluations into virtual commissioning
    ( 2020) ;
    Wiedermann, Norbert
    ;
    Tayebi Gholamzadeh, Makan
    ;
    Virtual commissioning is an important part of modern plant and factory organization. Research in this area focuses on safety, reliability, liveness, and repeatability. Security evaluations are currently not considered in virtual commissioning research and applications. Vulnerabilities in controller software and in the implementation of industrial equipment are receiving increased attention from attackers and cyber criminals. This is due to the rapidly advancing interconnection in modern, digital factories. This increase of the possible attack surface needs to be addressed as a part of comprehensive risk analysis within the domain of Industrie 4.0.Virtual commissioning, as an established process, is well-suited to address this lack of security evaluation. In this work, we propose a conceptual architecture for a simulation testbed that can be integrated in the virtual commissioning toolchain and show how to model and evaluate industrial equipment.
  • Publication
    Edge-computing enhanced privacy protection for industrial ecosystems in the context of SMEs
    ( 2019) ; ;
    Busch, Maximilian
    ;
    Schnoes, Florian
    ;
    Kleinwort, Robin
    ;
    Zaeh, Michael F.
    The ongoing transformation of the manufacturing landscape introduces new business opportunities for enterprises but also brings new challenges with it. Especially small- and medium-sized companies (SMEs) require an increasing effort to stay competitive. Data produced on the shop-floor can be harnessed to conduct analyses useful to plant operators, e.g., for optimization of production capabilities or for increasing plant security. Therefore, we propose a privacy-preserving edge computing architecture to facilitate a platform for utilizing such applications. Our approach is motivated by requirements from SMEs in Germany, e.g., protection of intellectual property, and employs suitable privacy models. We demonstrate the viability of the proposed framework by evaluation of uses cases for machine chatter optimization and anomaly detection within plants.
  • Publication
    MERCAT: A Metric for the Evaluation and Reconsideration of Certificate Authority Trustworthiness
    ( 2019) ; ;
    Wiedermann, Norbert
    ;
    ;
    Kargl, Frank
    Public key infrastructures (PKIs) build the foundation for secure communication of a vast majority of cloud services. In the recent past, there has been a series of security incidents leading to increasing concern regarding the trust model currently employed by PKIs. One of the key criticisms is the architecture's implicit assumption that certificate authorities (CAs) are trustworthy a priori. This work proposes a holistic metric to compensate this assumption by a differentiating assessment of a CA's individual trustworthiness based on objective criteria. The metric utilizes a wide range of technical and non-technical factors derived from existing policies, technical guidelines, and research. It consists of self-contained submetrics allowing the simple extension of the existing set of criteria. The focus is thereby on aspects which can be assessed by employing practically applicable methods of independent data collection. The metric is meant to help organizations, individuals, and service providers deciding which CAs to trust or distrust. For this, the modularized submetrics are clustered into coherent submetric groups covering a CA's different properties and responsibilities. By applying individually chosen weightings to these submetric groups, the metric's outcomes can be adapted to tailored protection requirements according to an exemplifying attacker model.
  • Publication
    Security Verification of Third Party Design Files in Manufacturing
    ( 2018) ;
    Wiedermann, Norbert
    Customer-individual production in manufacturing is a current trend related to the Industrie 4.0 paradigm. Creation of design files by the customers is becoming more frequent. These design files are typically generated outside the company boundaries and then transferred to the organization where they are eventually processed and scheduled for production. From a security perspective, this introduces new attack vectors targeting producing companies. Design files with malicious configuration parameters can threaten the availability of the manufacturing plant resulting in financial risks and can even cause harm to humans. Human verification of design files is error-prone why an automated solution is required. A graph-theoretic modeling framework for machine tools capable of verifying the sec urity of product designs is proposed. This framework is used to model an exemplary production process implemented in a wood processing plant based on the experiences of a real-world case study. Simulation of the modeled scenario shows the feasibility of the framework. Apart from security verification, the approach can be adopted to decide if a product design can be manufactured with a given set of machine tools.