Now showing 1 - 6 of 6
  • Publication
    Side-Channel Attacks in the Internet of Things
    ( 2017)
    Zankl, A.
    ;
    Seuschek, H.
    ;
    Irazoqui, G.
    ;
    Gulmezoglu, B.
    The Internet of Things (IoT) rapidly closes the gap between the virtual and the physical world. As more and more information is processed through this expanding network, the security of IoT devices and backend services is increasingly important. Yet, side-channel attacks pose a significant threat to systems in practice, as the microarchitectures of processors, their power consumption, and electromagnetic emanation reveal sensitive information to adversaries. This chapter provides an extensive overview of previous attack literature. It illustrates that microarchitectural attacks can compromise the entire IoT ecosystem: from devices in the field to servers in the backend. A subsequent discussion illustrates that many of today's security mechanisms integrated in modern processors are in fact vulnerable to the previously outlined attacks. In conclusion to these observations, new countermeasures are needed that effectively defend against both microarchitectural and power/EM based side-channel attacks.
  • Publication
    Identifying security requirements and privacy concerns in digital health applications
    ( 2015)
    Brost, G.S.
    ;
    Hoffmann, M.
    Security and privacy by design are important paradigms for establishing high protection levels in the eHealth domain. This means that security requirements and privacy concerns are considered and analyzed from the very beginning of any system design. For a reliable and robust system architecture and specification we recommend a four-step approach: (1) Decompose the system and identify the assets on the basis of the multilateral security concept, i.e., taking all participants of an eHealth scenario as potential attackers into account; (2) evaluate threats based on STRIDE for a holistic and systematic modelling of threats; (3) define use case-specific security requirements and privacy concerns as well as their relevance; and (4) mitigate threats by deciding what countermeasures should be implemented. After the introduction of each step this chapter illustrates the practical use in a step-by-step walkthrough with a real-world eHealth scenario and discusses advantages of security and privacy by design as well as its limitations.
  • Publication
    An architecture for trusted PaaS cloud computing for personal data
    ( 2014)
    González-Manzano, Lorena
    ;
    ;
    Aumueller, Matthias
    Cloud computing (CC) has gained much popularity. Large amounts of data, many of them personal, are consumed by CC services. Yet, data security and, derived from that, privacy are topics that are not satisfyingly covered. Especially usage control and data leakage prevention are open problems. We propose the development of a trusted Platform as a Service CC architecture that addresses selected Data security and privacy threats (Data breaches, Insecure interfaces and APIs, Malicious insiders of service providers and Shared technology vulnerabilities). Services that consume personal data and are hosted in the proposed architecture are guaranteed to handle these data according to users' requirements. Our proof of concept shows the feasibility of implementing the presented approach.
  • Publication
    Integrated honeypot based malware collection and analysis
    ( 2013)
    Brunner, M.
    ;
    Fuchs, C.M.
    ;
    Todt, S.
  • Publication
    The many facets of IT early warning - Open issues, current research
    ( 2013)
    Zeilinger, M.
    ;
    Schoo, P.
    ;
    Hermann, E.