TY - CHAP A1 - Granat, Andreas A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Intrusion Detection of the ICS Protocol EtherCAT N2 - Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER - TY - CHAP A1 - Schwanke, Peter A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Security Analysis of the ADS Protocol of a Beckhoff CX2020 PLC N2 - ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER - TY - CHAP A1 - Bitz, Andreas A1 - Kraff, O. A1 - Orzada, S. A1 - Maderwald, S. A1 - Brote, I. A1 - Ladd, M. T1 - Experimental and Numerical Assessment of RF Safety of Transmit Coils at 7 Tesla T2 - ISMRM workshop on MR safety 2010 : RF heating of the human in MRI : workshop series. The Washington County Historic Courthouse, Stillwater, Minnesota, USA, 15 - 17 October 2010 Y1 - 2010 SN - 978-1-62276-088-6 SP - 195 ER - TY - CHAP A1 - Bitz, Andreas A1 - Kraff, O. A1 - Orzada, S. A1 - Maderwald, S. A1 - Brote, I. A1 - Johst, S. A1 - Ladd, E. T1 - Assessment of RF Safety of Transmit Coils at 7 Tesla by Experimental and Numerical Procedures (490.) T2 - 19th annual ISMRM scientific meeting and exhibition 2011 : Montreal, Quebec, Canada, 7 - 13 May 2011 Y1 - 2012 SN - 978-1-61839-284-8 IS - Volume 1 SP - 475 PB - Curran CY - Red Hook, NY ER - TY - CHAP A1 - Bitz, Andreas A1 - Kobus, Thiele A1 - Scheenen, Tom W. J. A1 - Ladd, Mark E. T1 - RF Safety of the Combination of a 31P Tx/Rx Endorectal Coil & a 1H Tx/Rx Body Array for 31P MRSI of the Prostate at 7T (311.) T2 - 20th Annual ISMRM scientific meeting and exhibition 2012 : Melbourne, Australia, 5 - 11 May 2012 Y1 - 2013 SN - 978-1-62276-943-8 SN - 1545-4428 IS - Volume 1 SP - 311 PB - Curran CY - Red Hook, NY ER - TY - CHAP A1 - Heuermann, Holger A1 - Sadeghfam, Arash T1 - Analog Amplitude-Locked Loop Circuit to Support RF Energy Solutions T2 - IEEE MTT-S International Microwave Symposium Digest Y1 - 2016 SN - 978-150900698-4 U6 - http://dx.doi.org/10.1109/MWSYM.2016.7540092 ER - TY - CHAP A1 - Bonney, Gregor A1 - Nagel, Stefan A1 - Schuba, Marko ED - Schartner, P. T1 - Risiko Smart Home – Angriff auf ein Babymonitorsystem T2 - Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016 N2 - Unser Zuhause wird zunehmend intelligenter. Smart Homes bieten uns die Steuerung von Haus- oder Unterhaltungstechnik bequem vom Smartphone aus. Junge Familien nutzen die Technologie, um mittels vernetzten Babymonitorsystemen ihren Nachwuchs von überall aus im Blick zu haben. Davon auszugehen, dass solche Systeme mit einem Fokus auf Sicherheit entwickelt wurden, um die sehr persönlichen Daten zu schützen, ist jedoch ein Trugschluss. Die Untersuchung eines handelsüblichen und keineswegs billigen Systems zeigt, dass die Geräte sehr einfach kompromittiert und missbraucht werden können. Y1 - 2016 SP - 371 EP - 378 ER - TY - CHAP A1 - Becker, Sebastian A1 - Höfken, Hans-Wilhelm A1 - Schütz, Philip A1 - Schuba, Marko ED - Schartner, P. T1 - IT-forensische Erkennung modifizierter Android-Apps T2 - Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016 N2 - Malware auf Smartphones ist ein Problem, dem auch Strafverfolgungsbehörden immer häufiger gegenüberstehen. Insbesondere Telefone, bei denen potentiell schadhafte Apps zu einem finanziellen Schaden geführt haben, finden sich auf den Schreibtischen der Polizei wieder. Dabei müssen die Ermittler möglichst schnell und gezielt erkennen können, ob eine App tatsächlich schadhaft manipuliert wurde, was manipuliert wurde und mit wem die App kommuniziert. Klassische Malware-Erkennungsverfahren helfen zwar bei der generellen Erkennung schadhafter Software, sind aber für die polizeiliche Praxis nicht geeignet. Dieses Paper stellt ein Programm vor, welches gerade die forensischen Fragestellungen berücksichtigt und so für den Einsatz in der Strafverfolgung in Frage kommt. Y1 - 2016 SP - 120 EP - 125 ER - TY - CHAP A1 - Neumann, Tobias A1 - Dülberg, Enno A1 - Schiffer, Stefan A1 - Ferrein, Alexander T1 - A rotating platform for swift acquisition of dense 3D point clouds T2 - Intelligent Robotics and Applications: 9th International Conference, ICIRA 2016, Tokyo, Japan, August 22-24, 2016, Proceedings, Part I Y1 - 2016 SN - 978-3-319-43505-3 (Print) SN - 978-3-319-43506-0 (Online) U6 - http://dx.doi.org/10.1007/978-3-319-43506-0_22 N1 - Series: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) VL - 9834 SP - 257 EP - 268 PB - Springer ER - TY - CHAP A1 - Ferrein, Alexander A1 - Maier, Christopher A1 - Mühlbacher, Clemens A1 - Niemüller, Tim A1 - Steinbauer, Gerald A1 - Vassos, Stravros T1 - Controlling logistics robots with the action-based language YAGI T2 - Intelligent Robotics and Applications: 9th International Conference, ICIRA 2016, Tokyo, Japan, August 22-24, 2016, Proceedings, Part I Y1 - 2016 SN - 978-3-319-43505-3 (Print) SN - 978-3-319-43506-0 (Online) U6 - http://dx.doi.org/10.1007/978-3-319-43506-0_46 N1 - Series: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) VL - 9834 SP - 525 EP - 537 PB - Springer ER -