TY - JOUR A1 - Schaefer, Thomas A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Windows Phone 7 from a Digital Forensics’ Perspective Y1 - 2011 N1 - ICDF2C <3, 2011, Dublin> PB - Springer CY - Berlin ER - TY - JOUR A1 - Schuba, Marko A1 - Busboom, Axel A1 - Herwono, Ian A1 - Zavagli, Guido T1 - Unambiguous Device Identification and Fast Connection Setup in Bluetooth / Busboom, Axel ; Herwono, Ian ; Schuba, Marko ; Zavagli, Guido JF - European wireless 2002 : next generation wireless networks: technologies, protocols, services and applications ; technical sessions: 26 - 28 February 2002, tutorials: 25 February 2002, Centro Affari, Florence, Italy ; proceedings / sponsored by EUREL ... General chair: Luciano Lenzini Y1 - 2002 SP - 1 EP - 5 ER - TY - CHAP A1 - Serror, Martin A1 - Henze, Martin A1 - Hack, Sacha A1 - Schuba, Marko A1 - Wehrle, Klaus T1 - Towards in-network security for smart homes T2 - 13th International Conference on Availability, Reliability and Security, ARES 2018; Hamburg; Germany; 27 August 2018 through 30 August 2018 Y1 - 2018 SN - 978-145036448-5 U6 - http://dx.doi.org/10.1145/3230833.3232802 SP - Article numer 3232802 ER - TY - CHAP A1 - Broenner, Simon A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Streamlining extraction and analysis of android RAM images T2 - Proceedings of the 2nd international conference on information systems security and privacy Y1 - 2016 SN - 978-989-758-167-0 U6 - http://dx.doi.org/10.5220/0005652802550264 SP - 255 EP - 264 ER - TY - JOUR A1 - Schuba, Marko T1 - SRMT-a scalable and reliable multicast transport protocol JF - IEEE International Conference on Communications, 1998. ICC 98. Vol. 1 Y1 - 1998 SN - 0-7803-4788-9 SP - 612 EP - 616 ER - TY - JOUR A1 - Schuba, Marko A1 - Reichl, Peter A1 - Kesdogan, Dogan A1 - Junghärtchen, Klaus T1 - Simulative Performance Evaluation of the Temporary Pseudonym Method for Protecting Location Information in GSM Networks / Reichl, P. ; Kesdogan, D. ; Junghärtchen, K. ; Schuba, M. JF - Computer Performance Evaluation - Modelling Techniques and Tools / Puigjaner, Ramon (eds.) Y1 - 1998 SN - 3-540-64949-2 N1 - Lecture notes in computer science ; 1469 SP - 105 EP - 116 PB - Springer CY - Berlin ER - TY - CHAP A1 - Logen, Steffen A1 - Höfken, Hans A1 - Schuba, Marko T1 - Simplifying RAM Forensics : A GUI and Extensions for the Volatility Framework T2 - 2012 Seventh International Conference on Availability, Reliability and Security (ARES), 20-24 August 2012, Prague, Czech Republic N2 - The Volatility Framework is a collection of tools for the analysis of computer RAM. The framework offers a multitude of analysis options and is used by many investigators worldwide. Volatility currently comes with a command line interface only, which might be a hinderer for some investigators to use the tool. In this paper we present a GUI and extensions for the Volatility Framework, which on the one hand simplify the usage of the tool and on the other hand offer additional functionality like storage of results in a database, shortcuts for long Volatility Framework command sequences, and entirely new commands based on correlation of data stored in the database. Y1 - 2012 SN - 978-1-4673-2244-7 U6 - http://dx.doi.org/10.1109/ARES.2012.12 SP - 620 EP - 624 PB - IEEE CY - New York ER - TY - JOUR A1 - Schuba, Marko A1 - Wrona, Konrad T1 - Security for Mobile Commerce Applications / Schuba, Marko ; Wrona, Konrad Y1 - 2001 N1 - Multimedia, Internet, Video Technologies 2001 (MIV 2001), Malta, September 1-6, 2001 ; WSEAS Conference ; World Scientific and Engineering Academy and Society SP - 1 EP - 8 ER - TY - CHAP A1 - Küppers, Malte A1 - Schuba, Marko A1 - Neugebauer, Georg A1 - Höner, Tim A1 - Hack, Sacha T1 - Security analysis of the KNX smart building protocol T2 - ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security N2 - KNX is a protocol for smart building automation, e.g., for automated heating, air conditioning, or lighting. This paper analyses and evaluates state-of-the-art KNX devices from manufacturers Merten, Gira and Siemens with respect to security. On the one hand, it is investigated if publicly known vulnerabilities like insecure storage of passwords in software, unencrypted communication, or denialof-service attacks, can be reproduced in new devices. On the other hand, the security is analyzed in general, leading to the discovery of a previously unknown and high risk vulnerability related to so-called BCU (authentication) keys. Y1 - 2023 U6 - http://dx.doi.org/10.1145/3600160.3605167 N1 - Article No.: 87 ARES 2023, August 29–September 01, 2023, Benevento, Italy SP - 1 EP - 7 PB - ACM ER - TY - CHAP A1 - Schwanke, Peter A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Security Analysis of the ADS Protocol of a Beckhoff CX2020 PLC N2 - ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER -