@inproceedings{GranatHoefkenSchuba2017, author = {Granat, Andreas and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Intrusion Detection of the ICS Protocol EtherCAT}, pages = {1 -- 5}, year = {2017}, abstract = {Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward - well known office IT security mechanisms can be used - protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.}, language = {en} } @inproceedings{SchwankeHoefkenSchuba2017, author = {Schwanke, Peter and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Security Analysis of the ADS Protocol of a Beckhoff CX2020 PLC}, pages = {1 -- 5}, year = {2017}, abstract = {ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.}, language = {en} } @inproceedings{BitzKraffOrzadaetal.2010, author = {Bitz, Andreas and Kraff, O. and Orzada, S. and Maderwald, S. and Brote, I. and Ladd, M.}, title = {Experimental and Numerical Assessment of RF Safety of Transmit Coils at 7 Tesla}, series = {ISMRM workshop on MR safety 2010 : RF heating of the human in MRI : workshop series. The Washington County Historic Courthouse, Stillwater, Minnesota, USA, 15 - 17 October 2010}, booktitle = {ISMRM workshop on MR safety 2010 : RF heating of the human in MRI : workshop series. The Washington County Historic Courthouse, Stillwater, Minnesota, USA, 15 - 17 October 2010}, isbn = {978-1-62276-088-6}, pages = {195}, year = {2010}, language = {en} } @inproceedings{BitzKraffOrzadaetal.2012, author = {Bitz, Andreas and Kraff, O. and Orzada, S. and Maderwald, S. and Brote, I. and Johst, S. and Ladd, E.}, title = {Assessment of RF Safety of Transmit Coils at 7 Tesla by Experimental and Numerical Procedures (490.)}, series = {19th annual ISMRM scientific meeting and exhibition 2011 : Montreal, Quebec, Canada, 7 - 13 May 2011}, booktitle = {19th annual ISMRM scientific meeting and exhibition 2011 : Montreal, Quebec, Canada, 7 - 13 May 2011}, number = {Volume 1}, publisher = {Curran}, address = {Red Hook, NY}, isbn = {978-1-61839-284-8}, pages = {475}, year = {2012}, language = {en} } @inproceedings{BitzKobusScheenenetal.2013, author = {Bitz, Andreas and Kobus, Thiele and Scheenen, Tom W. J. and Ladd, Mark E.}, title = {RF Safety of the Combination of a 31P Tx/Rx Endorectal Coil \& a 1H Tx/Rx Body Array for 31P MRSI of the Prostate at 7T (311.)}, series = {20th Annual ISMRM scientific meeting and exhibition 2012 : Melbourne, Australia, 5 - 11 May 2012}, booktitle = {20th Annual ISMRM scientific meeting and exhibition 2012 : Melbourne, Australia, 5 - 11 May 2012}, number = {Volume 1}, publisher = {Curran}, address = {Red Hook, NY}, isbn = {978-1-62276-943-8}, issn = {1545-4428}, pages = {311}, year = {2013}, language = {en} } @inproceedings{HeuermannSadeghfam2016, author = {Heuermann, Holger and Sadeghfam, Arash}, title = {Analog Amplitude-Locked Loop Circuit to Support RF Energy Solutions}, series = {IEEE MTT-S International Microwave Symposium Digest}, booktitle = {IEEE MTT-S International Microwave Symposium Digest}, isbn = {978-150900698-4}, doi = {10.1109/MWSYM.2016.7540092}, pages = {4 Seiten}, year = {2016}, language = {de} } @inproceedings{BonneyNagelSchuba2016, author = {Bonney, Gregor and Nagel, Stefan and Schuba, Marko}, title = {Risiko Smart Home - Angriff auf ein Babymonitorsystem}, series = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, booktitle = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, editor = {Schartner, P.}, pages = {371 -- 378}, year = {2016}, abstract = {Unser Zuhause wird zunehmend intelligenter. Smart Homes bieten uns die Steuerung von Haus- oder Unterhaltungstechnik bequem vom Smartphone aus. Junge Familien nutzen die Technologie, um mittels vernetzten Babymonitorsystemen ihren Nachwuchs von {\"u}berall aus im Blick zu haben. Davon auszugehen, dass solche Systeme mit einem Fokus auf Sicherheit entwickelt wurden, um die sehr pers{\"o}nlichen Daten zu sch{\"u}tzen, ist jedoch ein Trugschluss. Die Untersuchung eines handels{\"u}blichen und keineswegs billigen Systems zeigt, dass die Ger{\"a}te sehr einfach kompromittiert und missbraucht werden k{\"o}nnen.}, language = {de} } @inproceedings{BeckerHoefkenSchuetzetal.2016, author = {Becker, Sebastian and H{\"o}fken, Hans-Wilhelm and Sch{\"u}tz, Philip and Schuba, Marko}, title = {IT-forensische Erkennung modifizierter Android-Apps}, series = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, booktitle = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, editor = {Schartner, P.}, pages = {120 -- 125}, year = {2016}, abstract = {Malware auf Smartphones ist ein Problem, dem auch Strafverfolgungsbeh{\"o}rden immer h{\"a}ufiger gegen{\"u}berstehen. Insbesondere Telefone, bei denen potentiell schadhafte Apps zu einem finanziellen Schaden gef{\"u}hrt haben, finden sich auf den Schreibtischen der Polizei wieder. Dabei m{\"u}ssen die Ermittler m{\"o}glichst schnell und gezielt erkennen k{\"o}nnen, ob eine App tats{\"a}chlich schadhaft manipuliert wurde, was manipuliert wurde und mit wem die App kommuniziert. Klassische Malware-Erkennungsverfahren helfen zwar bei der generellen Erkennung schadhafter Software, sind aber f{\"u}r die polizeiliche Praxis nicht geeignet. Dieses Paper stellt ein Programm vor, welches gerade die forensischen Fragestellungen ber{\"u}cksichtigt und so f{\"u}r den Einsatz in der Strafverfolgung in Frage kommt.}, language = {de} } @inproceedings{NeumannDuelbergSchifferetal.2016, author = {Neumann, Tobias and D{\"u}lberg, Enno and Schiffer, Stefan and Ferrein, Alexander}, title = {A rotating platform for swift acquisition of dense 3D point clouds}, series = {Intelligent Robotics and Applications: 9th International Conference, ICIRA 2016, Tokyo, Japan, August 22-24, 2016, Proceedings, Part I}, volume = {9834}, booktitle = {Intelligent Robotics and Applications: 9th International Conference, ICIRA 2016, Tokyo, Japan, August 22-24, 2016, Proceedings, Part I}, publisher = {Springer}, isbn = {978-3-319-43505-3 (Print)}, doi = {10.1007/978-3-319-43506-0_22}, pages = {257 -- 268}, year = {2016}, language = {en} } @inproceedings{FerreinMaierMuehlbacheretal.2016, author = {Ferrein, Alexander and Maier, Christopher and M{\"u}hlbacher, Clemens and Niem{\"u}ller, Tim and Steinbauer, Gerald and Vassos, Stravros}, title = {Controlling logistics robots with the action-based language YAGI}, series = {Intelligent Robotics and Applications: 9th International Conference, ICIRA 2016, Tokyo, Japan, August 22-24, 2016, Proceedings, Part I}, volume = {9834}, booktitle = {Intelligent Robotics and Applications: 9th International Conference, ICIRA 2016, Tokyo, Japan, August 22-24, 2016, Proceedings, Part I}, publisher = {Springer}, isbn = {978-3-319-43505-3 (Print)}, doi = {10.1007/978-3-319-43506-0_46}, pages = {525 -- 537}, year = {2016}, language = {en} }