@inproceedings{BedburMoorkampPetersonetal.2020, author = {Bedbur, Christian and Moorkamp, Wilfried and Peterson, Leif Arne and Uibel, Thomas}, title = {Holzbr{\"u}cken mit Natursteinbel{\"a}gen - Untersuchungen zur Aktivierung der Verbundwirkung}, series = {Doktorandenkolloquium Holzbau Forschung + Praxis 2020}, booktitle = {Doktorandenkolloquium Holzbau Forschung + Praxis 2020}, editor = {Kuhlmann, Ulrike}, publisher = {Universit{\"a}t Stuttgart, Institut f{\"u}r Konstruktion und Entwurf}, address = {Stuttgart}, pages = {53 -- 60}, year = {2020}, language = {de} } @inproceedings{HoeflingSchirraSpohretal.2013, author = {Hoefling, J. and Schirra, Julian and Spohr, A. and Sch{\"a}fer, Daniel}, title = {Induced drag computation with wake model schemes for highly non-planar wing systems}, series = {Deutscher Luft- und Raumfahrtkongress 2013 : 10.9. - 12.9.2013, Stuttgart}, booktitle = {Deutscher Luft- und Raumfahrtkongress 2013 : 10.9. - 12.9.2013, Stuttgart}, publisher = {Dt. Ges. f{\"u}r Luft- und Raumfahrt}, address = {Bonn}, organization = {Deutscher Luft- und Raumfahrtkongress <62, 2013, Stuttgart>}, pages = {1 -- 10}, year = {2013}, language = {en} } @inproceedings{BeckerHoefkenSchuetzetal.2016, author = {Becker, Sebastian and H{\"o}fken, Hans-Wilhelm and Sch{\"u}tz, Philip and Schuba, Marko}, title = {IT-forensische Erkennung modifizierter Android-Apps}, series = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, booktitle = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, editor = {Schartner, P.}, pages = {120 -- 125}, year = {2016}, abstract = {Malware auf Smartphones ist ein Problem, dem auch Strafverfolgungsbeh{\"o}rden immer h{\"a}ufiger gegen{\"u}berstehen. Insbesondere Telefone, bei denen potentiell schadhafte Apps zu einem finanziellen Schaden gef{\"u}hrt haben, finden sich auf den Schreibtischen der Polizei wieder. Dabei m{\"u}ssen die Ermittler m{\"o}glichst schnell und gezielt erkennen k{\"o}nnen, ob eine App tats{\"a}chlich schadhaft manipuliert wurde, was manipuliert wurde und mit wem die App kommuniziert. Klassische Malware-Erkennungsverfahren helfen zwar bei der generellen Erkennung schadhafter Software, sind aber f{\"u}r die polizeiliche Praxis nicht geeignet. Dieses Paper stellt ein Programm vor, welches gerade die forensischen Fragestellungen ber{\"u}cksichtigt und so f{\"u}r den Einsatz in der Strafverfolgung in Frage kommt.}, language = {de} } @inproceedings{SchubaHoefkenLinzbach2022, author = {Schuba, Marko and H{\"o}fken, Hans-Wilhelm and Linzbach, Sophie}, title = {An ICS Honeynet for Detecting and Analyzing Cyberattacks in Industrial Plants}, series = {2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, booktitle = {2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, publisher = {IEEE}, isbn = {978-1-6654-4231-2}, doi = {10.1109/ICECET52533.2021.9698746}, pages = {6 Seiten}, year = {2022}, abstract = {Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed}, language = {en} } @inproceedings{KirchnerHenkelNaetheretal.2008, author = {Kirchner, Patrick and Henkel, H. and N{\"a}ther, Niko and Spelthahn, H. and Schneider, A. and Berger, J{\"o}rg and Kolstad, J. and Friedrich, P. and Sch{\"o}ning, Michael Josef}, title = {RFID-basiertes Sensorsystem zur Realisierung intelligenter Verpackungen f{\"u}r die Nahrungsmittelindustrie}, series = {KMU - innovativ: IKT 2008. CD-ROM : BMBF-Statustagung KMU - innovativ: IKT, Darmstadt, 17. - 18. Nov. 2008}, booktitle = {KMU - innovativ: IKT 2008. CD-ROM : BMBF-Statustagung KMU - innovativ: IKT, Darmstadt, 17. - 18. Nov. 2008}, number = {CD-ROM-Ausg.}, publisher = {BMBF}, address = {Berlin}, pages = {9 S.}, year = {2008}, language = {de} } @inproceedings{SchuetzBreuerHoefkenetal.2013, author = {Sch{\"u}tz, P. and Breuer, M. and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Malware proof on mobile phone exhibits based on GSM/GPRS traces}, series = {The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec 2013) : 04.03. - 06.03.2013, Kuala Lumpur, Malaysia}, booktitle = {The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec 2013) : 04.03. - 06.03.2013, Kuala Lumpur, Malaysia}, publisher = {The Society of Digital Information and Wireless Communication}, isbn = {978-0-9853483-7-3}, pages = {89 -- 96}, year = {2013}, language = {en} } @inproceedings{ChajanSchulteTiggesRekeetal.2021, author = {Chajan, Eduard and Schulte-Tigges, Joschua and Reke, Michael and Ferrein, Alexander and Matheis, Dominik and Walter, Thomas}, title = {GPU based model-predictive path control for self-driving vehicles}, series = {IEEE Intelligent Vehicles Symposium (IV)}, booktitle = {IEEE Intelligent Vehicles Symposium (IV)}, publisher = {IEEE}, address = {New York, NY}, isbn = {978-1-7281-5394-0}, doi = {10.1109/IV48863.2021.9575619}, pages = {1243 -- 1248}, year = {2021}, abstract = {One central challenge for self-driving cars is a proper path-planning. Once a trajectory has been found, the next challenge is to accurately and safely follow the precalculated path. The model-predictive controller (MPC) is a common approach for the lateral control of autonomous vehicles. The MPC uses a vehicle dynamics model to predict the future states of the vehicle for a given prediction horizon. However, in order to achieve real-time path control, the computational load is usually large, which leads to short prediction horizons. To deal with the computational load, the control algorithm can be parallelized on the graphics processing unit (GPU). In contrast to the widely used stochastic methods, in this paper we propose a deterministic approach based on grid search. Our approach focuses on systematically discovering the search area with different levels of granularity. To achieve this, we split the optimization algorithm into multiple iterations. The best sequence of each iteration is then used as an initial solution to the next iteration. The granularity increases, resulting in smooth and predictable steering angle sequences. We present a novel GPU-based algorithm and show its accuracy and realtime abilities with a number of real-world experiments.}, language = {en} } @inproceedings{SchwankeHoefkenSchuba2017, author = {Schwanke, Peter and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Security Analysis of the ADS Protocol of a Beckhoff CX2020 PLC}, pages = {1 -- 5}, year = {2017}, abstract = {ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.}, language = {en} } @inproceedings{PetersonRoethUibel2017, author = {Peterson, Leif Arne and R{\"o}th, Thilo and Uibel, Thomas}, title = {Holzwerkstoffe in Karosseriestrukturen}, series = {Tagungsband Aachener Holzbautagung 2017}, booktitle = {Tagungsband Aachener Holzbautagung 2017}, editor = {Uibel, Thomas and Peterson, Leif Arne and Baumann, Marcus}, issn = {2197-4489}, pages = {34 -- 45}, year = {2017}, language = {de} } @inproceedings{StoebeHoefkenSchubaetal.2013, author = {St{\"o}be, Rolf and H{\"o}fken, Hans-Wilhelm and Schuba, Marko and Breuer, Michael}, title = {Artificial ageing of mobile devices using a simulated GSM/GPRS network}, series = {Eighth International Conference on Availability, Reliability and Security (ARES) : 2-6 Sept. 2013, Regensburg}, booktitle = {Eighth International Conference on Availability, Reliability and Security (ARES) : 2-6 Sept. 2013, Regensburg}, publisher = {IEEE}, pages = {493 -- 497}, year = {2013}, language = {en} }