@inproceedings{RekePeterSchulteTiggesetal.2020, author = {Reke, Michael and Peter, Daniel and Schulte-Tigges, Joschua and Schiffer, Stefan and Ferrein, Alexander and Walter, Thomas and Matheis, Dominik}, title = {A Self-Driving Car Architecture in ROS2}, series = {2020 International SAUPEC/RobMech/PRASA Conference, Cape Town, South Africa}, booktitle = {2020 International SAUPEC/RobMech/PRASA Conference, Cape Town, South Africa}, publisher = {IEEE}, address = {New York, NY}, isbn = {978-1-7281-4162-6}, doi = {10.1109/SAUPEC/RobMech/PRASA48453.2020.9041020}, pages = {1 -- 6}, year = {2020}, abstract = {In this paper we report on an architecture for a self-driving car that is based on ROS2. Self-driving cars have to take decisions based on their sensory input in real-time, providing high reliability with a strong demand in functional safety. In principle, self-driving cars are robots. However, typical robot software, in general, and the previous version of the Robot Operating System (ROS), in particular, does not always meet these requirements. With the successor ROS2 the situation has changed and it might be considered as a solution for automated and autonomous driving. Existing robotic software based on ROS was not ready for safety critical applications like self-driving cars. We propose an architecture for using ROS2 for a self-driving car that enables safe and reliable real-time behaviour, but keeping the advantages of ROS such as a distributed architecture and standardised message types. First experiments with an automated real passenger car at lower and higher speed-levels show that our approach seems feasible for autonomous driving under the necessary real-time conditions.}, language = {en} } @article{SchubaHoefken2012, author = {Schuba, Marko and H{\"o}fken, Hans-Wilhelm}, title = {Backtrack5: Datensammlung und Reporterstellung f{\"u}r Pentester mit MagicTree}, series = {Hakin9}, volume = {73}, journal = {Hakin9}, number = {3}, isbn = {1733-7186}, pages = {12 -- 16}, year = {2012}, language = {de} } @article{Ferrein2010, author = {Ferrein, Alexander}, title = {Robot controllers for highly dynamic environments with real-time constraints}, series = {K{\"u}nstliche Intelligenz : KI}, volume = {24}, journal = {K{\"u}nstliche Intelligenz : KI}, number = {2}, publisher = {Springer}, address = {Heidelberg}, issn = {1610-1987}, doi = {10.1007/s13218-010-0041-3}, pages = {175 -- 178}, year = {2010}, abstract = {In this extended abstract we describe the robot programming and planning language READYLOG, a GOLOG dialect which was developed to support the decision making of robots acting in dynamic real-time domains like robotic soccer. The formal framework of READYLOG, which is based on the situation calculus, features imperative control structures like loops and procedures, allows for decision-theoretic planning, and accounts for a continuously changing world. We developed high-level controllers in READYLOG for our soccer robots in RoboCup's Middle-size league, but also for service robots and for autonomous agents in interactive computer games.}, language = {en} } @article{SchubaHoefkenSchaefer2012, author = {Schuba, Marko and H{\"o}fken, Hans-Wilhelm and Schaefer, Thomas}, title = {Smartphone Forensik}, series = {Hakin9 : Practical Protection}, journal = {Hakin9 : Practical Protection}, isbn = {1733-7186}, pages = {10 -- 20}, year = {2012}, language = {de} } @article{Ferrein2010, author = {Ferrein, Alexander}, title = {golog.lua: Towards a Non-Prolog Implementation of Golog for Embedded Systems}, publisher = {AAAI}, address = {Menlo Park}, pages = {20 -- 28}, year = {2010}, language = {en} } @inproceedings{SchnellBrandesGligorevicetal.2008, author = {Schnell, Michael and Brandes, Sinja and Gligorevic, Snjezana and Walter, Michael and Rihacek, Christoph and Sajatovic, Miodrag and Haindl, Bernhard}, title = {Interference mitigation for broadband L-DACS}, series = {27th IEEE/AIAA Digital Avionics Systems Conference : DASC 2008 : 26-30 Oct. 2008, St. Paul, Minn.}, booktitle = {27th IEEE/AIAA Digital Avionics Systems Conference : DASC 2008 : 26-30 Oct. 2008, St. Paul, Minn.}, organization = {Institute of Electrical and Electronics Engineers}, isbn = {978-1-4244-2207-4 ; 978-1-4244-2208-1}, pages = {2B2-1 -- 2B2-12}, year = {2008}, language = {en} } @inproceedings{BroennerHoefkenSchuba2016, author = {Broenner, Simon and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Streamlining extraction and analysis of android RAM images}, series = {Proceedings of the 2nd international conference on information systems security and privacy}, booktitle = {Proceedings of the 2nd international conference on information systems security and privacy}, organization = {ICISSP International Conference on Information Systems Security and Privacy <2, 2016, Rome, Italy>}, isbn = {978-989-758-167-0}, doi = {10.5220/0005652802550264}, pages = {255 -- 264}, year = {2016}, language = {en} } @inproceedings{LindenlaufHoefkenSchuba2015, author = {Lindenlauf, Simon and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Cold Boot Attacks on DDR2 and DDR3 SDRAM}, series = {10th International Conference on Availability, Reliability and Security (ARES) 2015}, booktitle = {10th International Conference on Availability, Reliability and Security (ARES) 2015}, doi = {10.1109/ARES.2015.28}, pages = {287 -- 292}, year = {2015}, language = {en} } @inproceedings{GranatHoefkenSchuba2017, author = {Granat, Andreas and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Intrusion Detection of the ICS Protocol EtherCAT}, pages = {1 -- 5}, year = {2017}, abstract = {Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward - well known office IT security mechanisms can be used - protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.}, language = {en} } @article{HagemannBachmannLadeetal.1994, author = {Hagemann, Hans-J{\"u}rgen and Bachmann, Peter K. and Lade, H. and Leers, D.}, title = {Diamond chemical vapor deposition: gas compositions and film properties / Bachmann, P.K.; Hagemann, H.-J.; Lade, H; Leers, D.; Picht, F.; Wiechert, D.U.; Wilson, H.}, series = {Diamond, SiC and nitride wide bandgap semiconductors : symposium held April 4 - 8, 1994, San Francisco, California, U.S.A. / ed.: Calvin H. Carter, Jr. ...}, journal = {Diamond, SiC and nitride wide bandgap semiconductors : symposium held April 4 - 8, 1994, San Francisco, California, U.S.A. / ed.: Calvin H. Carter, Jr. ...}, address = {Pittsburgh, Penn.}, isbn = {1-55899-239-1}, pages = {267 -- 277}, year = {1994}, language = {en} }