@inproceedings{NethSchubaBrodkorbetal.2023, author = {Neth, Jannik and Schuba, Marko and Brodkorb, Karsten and Neugebauer, Georg and H{\"o}ner, Tim and Hack, Sacha}, title = {Digital forensics triage app for android}, series = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, booktitle = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, publisher = {ACM}, isbn = {9798400707728}, doi = {10.1145/3600160.3605017}, pages = {6 Seiten}, year = {2023}, abstract = {Digital forensics of smartphones is of utmost importance in many criminal cases. As modern smartphones store chats, photos, videos etc. that can be relevant for investigations and as they can have storage capacities of hundreds of gigabytes, they are a primary target for forensic investigators. However, it is exactly this large amount of data that is causing problems: extracting and examining the data from multiple phones seized in the context of a case is taking more and more time. This bears the risk of wasting a lot of time with irrelevant phones while there is not enough time left to analyze a phone which is worth examination. Forensic triage can help in this case: Such a triage is a preselection step based on a subset of data and is performed before fully extracting all the data from the smartphone. Triage can accelerate subsequent investigations and is especially useful in cases where time is essential. The aim of this paper is to determine which and how much data from an Android smartphone can be made directly accessible to the forensic investigator - without tedious investigations. For this purpose, an app has been developed that can be used with extremely limited storage of data in the handset and which outputs the extracted data immediately to the forensic workstation in a human- and machine-readable format.}, language = {en} } @article{SchubaWrona1999, author = {Schuba, Marko and Wrona, Konrad}, title = {Electronic Commerce Transactions in a Wireless Environment / Schuba, Marko. ; Wrona, Konrad}, pages = {1 -- 9}, year = {1999}, language = {en} } @article{MausHoefkenSchuba2011, author = {Maus, Stefan and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Forensic Analysis of Geodata in Android Smartphones}, pages = {1 -- 11}, year = {2011}, language = {en} } @inproceedings{BraunHoefkenSchubaetal.2015, author = {Braun, Sebastian and H{\"o}fken, Hans-Wilhelm and Schuba, Marko and Breuer, Michael}, title = {Forensische Sicherung von DSLRoutern}, series = {Proceedings of D-A-CH Security 2015. St. Augustin 8. und 9. September 2015}, booktitle = {Proceedings of D-A-CH Security 2015. St. Augustin 8. und 9. September 2015}, pages = {11 S.}, year = {2015}, language = {de} } @inproceedings{ChristianMontagSchubaetal.2018, author = {Christian, Esser and Montag, Tim and Schuba, Marko and Allhof, Manuel}, title = {Future critical infrastructure and security - cyberattacks on charging stations}, series = {31st International Electric Vehicle Symposium \& Exhibition and International Electric Vehicle Technology Conference (EVS31 \& EVTeC 2018)}, booktitle = {31st International Electric Vehicle Symposium \& Exhibition and International Electric Vehicle Technology Conference (EVS31 \& EVTeC 2018)}, publisher = {Society of Automotive Engineers of Japan (JSAE)}, address = {Tokyo}, isbn = {978-1-5108-9157-9}, pages = {665 -- 671}, year = {2018}, language = {en} } @article{KoenigVoelkerWolfetal.2016, author = {K{\"o}nig, Johannes Alexander and V{\"o}lker, Veronika and Wolf, Martin and Schuba, Marko}, title = {Gamified Hacking Offence Simulation-based Training (GHOST)}, series = {Crisis Prevention}, volume = {2016}, journal = {Crisis Prevention}, number = {3}, publisher = {Beta}, address = {Bonn}, pages = {44 -- 46}, year = {2016}, language = {de} } @article{SchubaReichlHoff1997, author = {Schuba, Marko and Reichl, Peter and Hoff, Simon}, title = {How to Model Complex Periodic Traffic with TES / Reichl, Peter ; Schuba, Marko ; Hoff, Simon}, series = {Proc. of 13th United Kingdom Workshop on Performance Engineering, Edinburgh, UK, July 1997}, journal = {Proc. of 13th United Kingdom Workshop on Performance Engineering, Edinburgh, UK, July 1997}, pages = {17/1 -- 17/11}, year = {1997}, language = {en} } @article{SchubaReichl1996, author = {Schuba, Marko and Reichl, Peter}, title = {How to Place Connectionless Servers in ATM Networks / Schuba, Marko ; Reichl, Peter}, series = {Proc. of Fourth IFIP Workshop on Performance Modelling and Evaluation of ATM Networks}, journal = {Proc. of Fourth IFIP Workshop on Performance Modelling and Evaluation of ATM Networks}, pages = {09/1 -- 09/10}, year = {1996}, language = {en} } @incollection{EnglaenderKaminskiSchuba2022, author = {Engl{\"a}nder, Jacques and Kaminski, Lars and Schuba, Marko}, title = {Informationssicherheitsmanagement}, series = {Digitalisierungs- und Informationsmanagement}, booktitle = {Digitalisierungs- und Informationsmanagement}, publisher = {Springer Vieweg}, address = {Berlin}, isbn = {978-3-662-63757-9}, doi = {10.1007/978-3-662-63758-6_15}, pages = {373 -- 398}, year = {2022}, abstract = {Daten und Informationen sind die wichtigsten Ressourcen vieler Unternehmen und m{\"u}ssen daher entsprechend gesch{\"u}tzt werden. Getrieben durch die erh{\"o}hte Vernetzung von Informationstechnologie, die h{\"o}here Offenheit infolge datengetriebener Dienstleistungen und eine starke Zunahme an Datenquellen, r{\"u}cken die Gefahren von Informationsdiebstahl, -manipulation und -verlust in den Fokus von produzierenden Unternehmen. Auf dem Weg zum lern- und wandlungsf{\"a}higen Unternehmen kann dies zu einem großen Hindernis werden, da einerseits zu hohe Sicherheitsanforderungen neue Entwicklungen beschr{\"a}nken, andererseits wegen des Mangels an ausreichenden Informationssicherheitskonzepten Unternehmen weniger Innovationen wagen. Deshalb bedarf es individuell angepasster Konzepte f{\"u}r die Bereiche IT-Security, IT-Safety und Datenschutz f{\"u}r vernetzte Produkte, Produktion und Arbeitspl{\"a}tze. Bei der Entwicklung und Durchsetzung dieser Konzepte steht der Faktor Mensch im Zentrum aller {\"U}berlegungen. In diesem Kapitel wird dargestellt, wie der Faktor Mensch bei der Erstellung von Informationssicherheitskonzepten in verschiedenen Phasen zu beachten ist. Beginnend mit der Integration von Informationssystemen und damit verbundenen Sicherheitsmaßnahmen, {\"u}ber die Administration, bis hin zur Anwendung durch den Endnutzer, werden Methoden beschrieben, die den Menschen, verbunden mit seinem Mehrwert wie auch den Risiken, einschließen. Dabei werden sowohl Grundlagen aufgezeigt als auch Konzepte vorgestellt, mit denen Entscheider in der Unternehmens-IT Leitlinien f{\"u}r die Informationssicherheit festlegen k{\"o}nnen.}, language = {de} } @article{SchubaSpaniol1999, author = {Schuba, Marko and Spaniol, Otto}, title = {Interconnection of Local Area Networks via ATM / Spaniol, Otto ; Schuba, Marko}, series = {High performance networks for multimedia applications / edited by Andr{\´e} Danthine ...}, journal = {High performance networks for multimedia applications / edited by Andr{\´e} Danthine ...}, publisher = {Kluwer Academic Publ.}, address = {Dordrecht}, isbn = {0-7923-8274-9}, pages = {1 -- 10}, year = {1999}, language = {en} } @article{SchubaGerstenbergerLahaije2004, author = {Schuba, Marko and Gerstenberger, Volker and Lahaije, Paul}, title = {Internet ID - Flexible Reuse of Mobile Phone Authentication Security for Service Access / Schuba, Marko ; Gerstenberger, Volker, ; Lahaije, Paul}, pages = {1 -- 7}, year = {2004}, language = {en} } @inproceedings{GranatHoefkenSchuba2017, author = {Granat, Andreas and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Intrusion Detection of the ICS Protocol EtherCAT}, pages = {1 -- 5}, year = {2017}, abstract = {Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward - well known office IT security mechanisms can be used - protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.}, language = {en} } @book{SchubaSchubaReichletal.1998, author = {Schuba, Marko and Schuba, Marko and Reichl, Peter and Schneider, Gaby}, title = {Lokale Netze - Skript zur Vorlesung an der RWTH Aachen / Spaniol, Otto,}, publisher = {Mainz}, address = {Aachen}, isbn = {3-86073-721-X}, pages = {138 S. : graph. Darst.}, year = {1998}, language = {de} } @inproceedings{SchuetzBreuerHoefkenetal.2013, author = {Sch{\"u}tz, P. and Breuer, M. and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Malware proof on mobile phone exhibits based on GSM/GPRS traces}, series = {The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec 2013) : 04.03. - 06.03.2013, Kuala Lumpur, Malaysia}, booktitle = {The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec 2013) : 04.03. - 06.03.2013, Kuala Lumpur, Malaysia}, publisher = {The Society of Digital Information and Wireless Communication}, isbn = {978-0-9853483-7-3}, pages = {89 -- 96}, year = {2013}, language = {en} } @article{SchubaWrona2000, author = {Schuba, Marko and Wrona, Konrad}, title = {Mobile Chip Electronic Commerce: Enabling Credit Card Payment for Mobile Devices / Schuba, Marko ; Wrona, Konrad}, pages = {1 -- 6}, year = {2000}, language = {en} } @article{SchubaWronaZavagli2001, author = {Schuba, Marko and Wrona, Konrad and Zavagli, Guido}, title = {Mobile Payments - State of the Art and Open Problems / Wrona, Konrad ; Schuba, Marko ; Zavagli, Guido}, series = {Electronic commerce : second international workshop ; proceedings / WELCOM 2001, Heidelberg, Germany, November 16-17, 2001. Ludger Fiege ... (ed.)}, journal = {Electronic commerce : second international workshop ; proceedings / WELCOM 2001, Heidelberg, Germany, November 16-17, 2001. Ludger Fiege ... (ed.)}, publisher = {Springer}, address = {Berlin}, isbn = {978-3-540-42878-7}, pages = {88 -- 100}, year = {2001}, language = {en} } @article{SchubaHermanns1994, author = {Schuba, Marko and Hermanns, Oliver}, title = {Modellierung von Multicastmechanismen zur Unterst{\"u}tzung von Gruppenkommunikation / Schuba, Marko ; Hermanns, Oliver}, series = {Neue Konzepte f{\"u}r die offene verteilte Verarbeitung : Tagungsband des 1. Arbeitstreffens an der RWTH Aachen, 5. September 1994 / Hrsg. des Bd.: Claudia Popien und Bernd Meyer}, journal = {Neue Konzepte f{\"u}r die offene verteilte Verarbeitung : Tagungsband des 1. Arbeitstreffens an der RWTH Aachen, 5. September 1994 / Hrsg. des Bd.: Claudia Popien und Bernd Meyer}, publisher = {Verl. der Augustinus-Buchh.}, address = {Aachen}, isbn = {3-86073-143-2}, pages = {137 -- 147}, year = {1994}, language = {de} } @article{SchubaReichl1998, author = {Schuba, Marko and Reichl, Peter}, title = {On large-scale reliable multicast protocols / Schuba, M. ; Reichl, P.}, series = {6th IEE Conference on Telecommunications}, journal = {6th IEE Conference on Telecommunications}, isbn = {0-85296-700-4}, pages = {133 -- 137}, year = {1998}, language = {en} } @article{Schuba1999, author = {Schuba, Marko}, title = {Performance Analysis of Reliable Multicast Mechanisms for Widely Spread Distributed Applications in the Internet}, series = {International Conference on Parallel and Distributed Processing Techniques and Applications : PDPTA '99 ; June 28 - July 1, 1999, Las Vegas, Nevada, USA / ed.: Hamid R. Arabnia}, journal = {International Conference on Parallel and Distributed Processing Techniques and Applications : PDPTA '99 ; June 28 - July 1, 1999, Las Vegas, Nevada, USA / ed.: Hamid R. Arabnia}, isbn = {1892512157}, pages = {1 -- 7}, year = {1999}, language = {en} } @article{SchubaHaverkortSchneider2000, author = {Schuba, Marko and Haverkort, Boudewijn R. and Schneider, Gaby}, title = {Performance evaluation of multicast communication in packet-switched networks / Schuba, Marko ; Haverkort, Boudewijn R. ; Schneider, Gaby}, series = {Performance Evaluation. 39 (2000), H. 1-4}, journal = {Performance Evaluation. 39 (2000), H. 1-4}, isbn = {0166-5316}, pages = {61 -- 80}, year = {2000}, language = {en} }