@article{SchaeferHoefkenSchuba2011, author = {Schaefer, Thomas and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Windows Phone 7 from a Digital Forensics' Perspective}, publisher = {Springer}, address = {Berlin}, year = {2011}, language = {en} } @book{GalleyMinoggioSchubaetal.2016, author = {Galley, Birgit and Minoggio, Ingo and Schuba, Marko and Bischoff, Barbara and H{\"o}fken, Hans-Wilhelm}, title = {Unternehmenseigene Ermittlungen : Recht - Kriminalistik - IT}, publisher = {Erich Schmidt Verlag}, address = {Berlin}, isbn = {978-3-503-16531-5}, pages = {XIII, 372 S.}, year = {2016}, language = {de} } @article{SchubaBusboomHerwonoetal.2002, author = {Schuba, Marko and Busboom, Axel and Herwono, Ian and Zavagli, Guido}, title = {Unambiguous Device Identification and Fast Connection Setup in Bluetooth / Busboom, Axel ; Herwono, Ian ; Schuba, Marko ; Zavagli, Guido}, series = {European wireless 2002 : next generation wireless networks: technologies, protocols, services and applications ; technical sessions: 26 - 28 February 2002, tutorials: 25 February 2002, Centro Affari, Florence, Italy ; proceedings / sponsored by EUREL ... General chair: Luciano Lenzini}, journal = {European wireless 2002 : next generation wireless networks: technologies, protocols, services and applications ; technical sessions: 26 - 28 February 2002, tutorials: 25 February 2002, Centro Affari, Florence, Italy ; proceedings / sponsored by EUREL ... General chair: Luciano Lenzini}, pages = {1 -- 5}, year = {2002}, language = {en} } @inproceedings{SerrorHenzeHacketal.2018, author = {Serror, Martin and Henze, Martin and Hack, Sacha and Schuba, Marko and Wehrle, Klaus}, title = {Towards in-network security for smart homes}, series = {13th International Conference on Availability, Reliability and Security, ARES 2018; Hamburg; Germany; 27 August 2018 through 30 August 2018}, booktitle = {13th International Conference on Availability, Reliability and Security, ARES 2018; Hamburg; Germany; 27 August 2018 through 30 August 2018}, isbn = {978-145036448-5}, doi = {10.1145/3230833.3232802}, pages = {Article numer 3232802}, year = {2018}, language = {en} } @book{SchubaLinnhoffPopienReichletal.1996, author = {Schuba, Marko and Linnhoff-Popien, Claudia and Reichl, Peter and Schuba, Marko}, title = {Systemprogrammierung : Skript zur Vorlesung an der RWTH Aachen / Otto Spaniol ...}, publisher = {Verl. der Augustinus-Buchh.}, address = {Aachen}, isbn = {3-86073-470-9}, pages = {VIII, 166 S. : graph. Darst.}, year = {1996}, language = {de} } @inproceedings{BroennerHoefkenSchuba2016, author = {Broenner, Simon and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Streamlining extraction and analysis of android RAM images}, series = {Proceedings of the 2nd international conference on information systems security and privacy}, booktitle = {Proceedings of the 2nd international conference on information systems security and privacy}, organization = {ICISSP International Conference on Information Systems Security and Privacy <2, 2016, Rome, Italy>}, isbn = {978-989-758-167-0}, doi = {10.5220/0005652802550264}, pages = {255 -- 264}, year = {2016}, language = {en} } @article{Schuba1998, author = {Schuba, Marko}, title = {SRMT-a scalable and reliable multicast transport protocol}, series = {IEEE International Conference on Communications, 1998. ICC 98. Vol. 1}, journal = {IEEE International Conference on Communications, 1998. ICC 98. Vol. 1}, isbn = {0-7803-4788-9}, pages = {612 -- 616}, year = {1998}, language = {en} } @article{SchubaHoefkenSchaefer2012, author = {Schuba, Marko and H{\"o}fken, H. and Schaefer, T.}, title = {Smartphone Forensik}, series = {Hakin9 : Practical Protection (2012)}, journal = {Hakin9 : Practical Protection (2012)}, publisher = {-}, isbn = {1733-7186}, pages = {10 -- 20}, year = {2012}, language = {de} } @book{Schuba1999, author = {Schuba, Marko}, title = {Skalierbare und zuverl{\"a}ssige Multicast-Kommunikation im Internet}, publisher = {Shaker}, address = {Aachen}, isbn = {3-8265-6289-5}, pages = {IV, 198 S. : graph. Darst.}, year = {1999}, language = {de} } @article{SchubaReichlKesdoganetal.1998, author = {Schuba, Marko and Reichl, Peter and Kesdogan, Dogan and Jungh{\"a}rtchen, Klaus}, title = {Simulative Performance Evaluation of the Temporary Pseudonym Method for Protecting Location Information in GSM Networks / Reichl, P. ; Kesdogan, D. ; Jungh{\"a}rtchen, K. ; Schuba, M.}, series = {Computer Performance Evaluation - Modelling Techniques and Tools / Puigjaner, Ramon (eds.)}, journal = {Computer Performance Evaluation - Modelling Techniques and Tools / Puigjaner, Ramon (eds.)}, publisher = {Springer}, address = {Berlin}, isbn = {3-540-64949-2}, pages = {105 -- 116}, year = {1998}, language = {en} } @inproceedings{LogenHoefkenSchuba2012, author = {Logen, Steffen and H{\"o}fken, Hans and Schuba, Marko}, title = {Simplifying RAM Forensics : A GUI and Extensions for the Volatility Framework}, series = {2012 Seventh International Conference on Availability, Reliability and Security (ARES), 20-24 August 2012, Prague, Czech Republic}, booktitle = {2012 Seventh International Conference on Availability, Reliability and Security (ARES), 20-24 August 2012, Prague, Czech Republic}, publisher = {IEEE}, address = {New York}, isbn = {978-1-4673-2244-7}, doi = {10.1109/ARES.2012.12}, pages = {620 -- 624}, year = {2012}, abstract = {The Volatility Framework is a collection of tools for the analysis of computer RAM. The framework offers a multitude of analysis options and is used by many investigators worldwide. Volatility currently comes with a command line interface only, which might be a hinderer for some investigators to use the tool. In this paper we present a GUI and extensions for the Volatility Framework, which on the one hand simplify the usage of the tool and on the other hand offer additional functionality like storage of results in a database, shortcuts for long Volatility Framework command sequences, and entirely new commands based on correlation of data stored in the database.}, language = {en} } @article{SchubaWrona2001, author = {Schuba, Marko and Wrona, Konrad}, title = {Security for Mobile Commerce Applications / Schuba, Marko ; Wrona, Konrad}, pages = {1 -- 8}, year = {2001}, language = {en} } @inproceedings{KueppersSchubaNeugebaueretal.2023, author = {K{\"u}ppers, Malte and Schuba, Marko and Neugebauer, Georg and H{\"o}ner, Tim and Hack, Sacha}, title = {Security analysis of the KNX smart building protocol}, series = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, booktitle = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, publisher = {ACM}, doi = {10.1145/3600160.3605167}, pages = {1 -- 7}, year = {2023}, abstract = {KNX is a protocol for smart building automation, e.g., for automated heating, air conditioning, or lighting. This paper analyses and evaluates state-of-the-art KNX devices from manufacturers Merten, Gira and Siemens with respect to security. On the one hand, it is investigated if publicly known vulnerabilities like insecure storage of passwords in software, unencrypted communication, or denialof-service attacks, can be reproduced in new devices. On the other hand, the security is analyzed in general, leading to the discovery of a previously unknown and high risk vulnerability related to so-called BCU (authentication) keys.}, language = {en} } @inproceedings{SchwankeHoefkenSchuba2017, author = {Schwanke, Peter and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Security Analysis of the ADS Protocol of a Beckhoff CX2020 PLC}, pages = {1 -- 5}, year = {2017}, abstract = {ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.}, language = {en} } @inproceedings{BonneyNagelSchuba2016, author = {Bonney, Gregor and Nagel, Stefan and Schuba, Marko}, title = {Risiko Smart Home - Angriff auf ein Babymonitorsystem}, series = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, booktitle = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, editor = {Schartner, P.}, pages = {371 -- 378}, year = {2016}, abstract = {Unser Zuhause wird zunehmend intelligenter. Smart Homes bieten uns die Steuerung von Haus- oder Unterhaltungstechnik bequem vom Smartphone aus. Junge Familien nutzen die Technologie, um mittels vernetzten Babymonitorsystemen ihren Nachwuchs von {\"u}berall aus im Blick zu haben. Davon auszugehen, dass solche Systeme mit einem Fokus auf Sicherheit entwickelt wurden, um die sehr pers{\"o}nlichen Daten zu sch{\"u}tzen, ist jedoch ein Trugschluss. Die Untersuchung eines handels{\"u}blichen und keineswegs billigen Systems zeigt, dass die Ger{\"a}te sehr einfach kompromittiert und missbraucht werden k{\"o}nnen.}, language = {de} } @book{SchubaSpaniolLinnhoffPopien1995, author = {Schuba, Marko and Spaniol, Otto and Linnhoff-Popien, Claudia}, title = {Rechnerstrukturen : Skript zur Vorlesung an der RWTH Aachen / Spaniol, Otto ; Linnhoff-Popien, Claudia ; Schuba, Marko}, publisher = {Verl. der Augustinus-Buchh.}, address = {Aachen}, isbn = {3-86073-147-5}, pages = {V, 134 S. : graph. Darst.}, year = {1995}, language = {de} } @article{SchubaSchneiderHaverkort1998, author = {Schuba, Marko and Schneider, Gaby and Haverkort, Boudewijn R.}, title = {QNA-MC: A Performance Evaluation Tool for Communication Networks with Multicast Data Streams / Schneider, G. ; Schuba, M. ; Haverkort, B. R.}, series = {Computer Performance Evaluation - Modelling Techniques and Tools / Puigjaner, Ramon (eds.)}, journal = {Computer Performance Evaluation - Modelling Techniques and Tools / Puigjaner, Ramon (eds.)}, publisher = {Springer}, address = {Berlin}, isbn = {3-540-64949-2}, pages = {105 -- 116}, year = {1998}, language = {en} } @article{HulseboschGuentherHornetal.2004, author = {Hulsebosch, R. J. and G{\"u}nther, C. and Horn, C. and Holtmanns, S. and Howker, K. and Paterson, K. and Claessens, J. and Schuba, Marko}, title = {Pioneering Advanced Mobile Privacy and Security}, series = {Security for mobility}, journal = {Security for mobility}, editor = {Mitchell, Chris J.}, publisher = {Institution of Electrical Engineers}, address = {London}, isbn = {9781849190886}, doi = {10.1049/PBTE051E_ch}, pages = {383 -- 432}, year = {2004}, language = {en} } @article{ClaessensFuchsbergerGuentheretal.2003, author = {Claessens, J. and Fuchsberger, A. and G{\"u}nther, C. and Horn, G. and Howker, K. and Hulsebosch, R.J. and Mitchell, C. and Paterson, K. and Preneel, B. and Schellekens, D. and Schuba, Marko}, title = {Pioneering Advanced Mobile Privacy and Security}, pages = {1 -- 17}, year = {2003}, language = {en} } @article{SchubaHermanns1995, author = {Schuba, Marko and Hermanns, Oliver}, title = {Performance Investigations of the IP Multicast Architecture / Hermanns, Oliver ; Schuba, Marko}, series = {Performance of the IP Multicast Achitecture . Proceedings JENC 6. Proceedings of the 6th Joint European Networking Conference, Tel Aviv}, journal = {Performance of the IP Multicast Achitecture . Proceedings JENC 6. Proceedings of the 6th Joint European Networking Conference, Tel Aviv}, pages = {121-1 -- 121-8}, year = {1995}, language = {en} }