Lukas Iffländer
YOU?
Author Swipe
View article: Benchmarking Hyper-Breakpoints for Efficient Virtual Machine Introspection
Benchmarking Hyper-Breakpoints for Efficient Virtual Machine Introspection Open
Virtual Machine Introspection (VMI) is a powerful technology used to detect and analyze malicious software inside Virtual Machines (VMs) from outside. Asynchronously accessing the VM’s memory can be insufficient for efficiently monitoring …
View article: Benchmarking Hyper-Breakpoints for Efficient Virtual Machine Introspection
Benchmarking Hyper-Breakpoints for Efficient Virtual Machine Introspection Open
Virtual Machine Introspection (VMI) is a powerful technology used to detect and analyze malicious software inside Virtual Machines (VMs) from outside. Asynchronously accessing the VM’s memory can be insufficient for efficiently monitoring …
View article: Attack-Aware Security Function Chaining
Attack-Aware Security Function Chaining Open
Cyberattacks have become more frequent and more violent in recent years. To date, defensive infrastructure has been relatively static, and security functions are usually placed in a common order that does not depend on the current situatio…
View article: Benchmarking of Secure Group Communication schemes with focus on IoT
Benchmarking of Secure Group Communication schemes with focus on IoT Open
As Internet of Things (IoT) devices become ubiquitous, they face increasing cybersecurity threats. Unlike standard 1-to-1 communication, the unique challenge posed by n-to-n communication in IoT is that messages must not be encrypted for a…
View article: De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem
De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem Open
Cloud computing has become increasingly popular due to its scalability, cost-effectiveness, and ability to handle large volumes of data. However, entrusting (sensitive) data to a third party raises concerns about data security and privacy.…
View article: Securing the Future Railway System: Technology Forecast, Security Measures, and Research Demands
Securing the Future Railway System: Technology Forecast, Security Measures, and Research Demands Open
The railway industry—traditionally a conservative industry with low adaption speed for innovation—is currently entering its digitization phase. The sector faces a challenge in integrating new technologies and approaches into the employed—o…
View article: Physical Attacks on the Railway System
Physical Attacks on the Railway System Open
Recent attacks encouraged public interest in physical security for railways. Knowing about and learning from previous attacks is necessary to secure against them. This paper presents a structured data set of physical attacks against railwa…
View article: Recommendation of secure group communication schemes using multi-objective optimization
Recommendation of secure group communication schemes using multi-objective optimization Open
The proliferation of IoT devices has made them an attractive target for hackers to launch attacks on systems, as was the case with Netflix or Spotify in 2016. As the number of installed IoT devices is expected to increase worldwide, so doe…
View article: Teaching Software Testing Using Automated Grading
Teaching Software Testing Using Automated Grading Open
Software testing has become a standard for most software projects. However, there is a lack of testing in many curricula, and if present, courses lack instant feedback using automated systems. In this work, we show our realization of an ex…
View article: Attack-aware Security Function Management
Attack-aware Security Function Management Open
Over the last decades, cybersecurity has become an increasingly important issue. Between 2019 and 2011 alone, the losses from cyberattacks in the United States grew by 6217%. At the same time, attacks became not only more intensive but als…
View article: Attack-aware Security Function Chain Reordering
Attack-aware Security Function Chain Reordering Open
Attack-awareness recognizes self-awareness for security systems regarding the occurring attacks. More frequent and intense attacks on cloud and network infrastructures are pushing security systems to the limit. With the end of Moore's Law,…
View article: Hands Off my Database: Ransomware Detection in Databases through Dynamic Analysis of Query Sequences
Hands Off my Database: Ransomware Detection in Databases through Dynamic Analysis of Query Sequences Open
Ransomware is an emerging threat which imposed a \$ 5 billion loss in 2017 and is predicted to hit \$ 11.5 billion in 2019. While initially targeting PC (client) platforms, ransomware recently made the leap to server-side databases - start…
View article: PABS - a Programming Assignment Feedback System.
PABS - a Programming Assignment Feedback System. Open
Giving invididual feedback to students in large programming courses is time consuming and in most cases not feasible. In order to provide students with feedback we introduce PABS, a tool for automated feedback generation for programming as…