Martin Serror
YOU?
Author Swipe
View article: MAC Aggregation over Lossy Channels in DTLS 1.3
MAC Aggregation over Lossy Channels in DTLS 1.3 Open
Aggregating Message Authentication Codes (MACs) promises to save valuable bandwidth in resource-constrained environments. The idea is simple: Instead of appending an authentication tag to each message in a communication stream, the integri…
View article: Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication
Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication Open
Industrial control systems increasingly rely on middlebox functionality such as intrusion detection or in-network processing.However, traditional end-to-end security protocols interfere with the necessary access to in-flight data.While rec…
View article: Sherlock: A Dataset for Process-aware Intrusion Detection Research on Power Grid Networks: Dataset Paper
Sherlock: A Dataset for Process-aware Intrusion Detection Research on Power Grid Networks: Dataset Paper Open
Physically distributed components and legacy protocols make the protection of power grids against increasing cyberattack threats challenging. Infamously, the 2015 and 2016 blackouts in Ukraine were caused by cyberattacks, and the German Fe…
View article: Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication
Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication Open
Industrial control systems increasingly rely on middlebox functionality such as intrusion detection or in-network processing. However, traditional end-to-end security protocols interfere with the necessary access to in-flight data. While r…
View article: When and How to Aggregate Message Authentication Codes on Lossy Channels?
When and How to Aggregate Message Authentication Codes on Lossy Channels? Open
Aggregation of message authentication codes (MACs) is a proven and efficient method to preserve valuable bandwidth in resource-constrained environments: Instead of appending a long authentication tag to each message, the integrity protecti…
View article: An Interdisciplinary Survey on Information Flows in Supply Chains
An Interdisciplinary Survey on Information Flows in Supply Chains Open
Supply chains form the backbone of modern economies and therefore require reliable information flows. In practice, however, supply chains face severe technical challenges, especially regarding security and privacy. In this work, we consoli…
View article: Comprehensively Analyzing the Impact of Cyberattacks on Power Grids
Comprehensively Analyzing the Impact of Cyberattacks on Power Grids Open
The increasing digitalization of power grids and especially the shift towards IP-based communication drastically increase the susceptibility to cyberattacks, potentially leading to blackouts and physical damage. Understanding the involved …
View article: PowerDuck: A GOOSE Data Set of Cyberattacks in Substations
PowerDuck: A GOOSE Data Set of Cyberattacks in Substations Open
Power grids worldwide are increasingly victims of cyberattacks, where\nattackers can cause immense damage to critical infrastructure. The growing\ndigitalization and networking in power grids combined with insufficient\nprotection against …
View article: PowerDuck: A GOOSE Data Set of Cyberattacks in Substations
PowerDuck: A GOOSE Data Set of Cyberattacks in Substations Open
A recorded GOOSE data set as described in Sven Zemanek, Immanuel Hacker, Konrad Wolsing, Eric Wagner, Martin Henze, and Martin Serror. 2022. PowerDuck: A GOOSE Data Set of Cyberattacks in Substations. In Cyber Security Experimentation and …
View article: PowerDuck: A GOOSE Data Set of Cyberattacks in Substations
PowerDuck: A GOOSE Data Set of Cyberattacks in Substations Open
A recorded GOOSE data set as described in Sven Zemanek, Immanuel Hacker, Konrad Wolsing, Eric Wagner, Martin Henze, and Martin Serror. 2022. PowerDuck: A GOOSE Data Set of Cyberattacks in Substations. In Cyber Security Experimentation and …
View article: PowerDuck: A GOOSE Data Set of Cyberattacks in Substations
PowerDuck: A GOOSE Data Set of Cyberattacks in Substations Open
A recorded GOOSE data set as described in Sven Zemanek, Immanuel Hacker, Konrad Wolsing, Eric Wagner, Martin Henze, and Martin Serror. 2022. PowerDuck: A GOOSE Data Set of Cyberattacks in Substations. In Cyber Security Experimentation and …
View article: BP-MAC: Fast Authentication for Short Messages
BP-MAC: Fast Authentication for Short Messages Open
Resource-constrained devices increasingly rely on wireless communication for\nthe reliable and low-latency transmission of short messages. However,\nespecially the implementation of adequate integrity protection of time-critical\nmessages …
View article: Challenges and Opportunities in Securing the Industrial Internet of Things
Challenges and Opportunities in Securing the Industrial Internet of Things Open
Given the tremendous success of the Internet of Things in interconnecting consumer devices, we observe a natural trend to likewise interconnect devices in industrial settings, referred to as industrial Internet of Things or Industry 4.0. W…
View article: Blitz-starting QUIC Connections
Blitz-starting QUIC Connections Open
In this paper, we revisit the idea to remove Slow Start from congestion control. To do so, we build upon the newly gained freedom of transport protocol extendability offered by QUIC to hint bandwidth estimates from a typical web client to …
View article: From Radio Design to System Evaluations for Ultra-Reliable and Low-Latency Communication
From Radio Design to System Evaluations for Ultra-Reliable and Low-Latency Communication Open
Ultra-reliable and low-latency communication is the enabler for many new use cases, including wireless industrial automation. Fulfilling varying requirements of these use cases demands a flexible radio design. To address this, a holistic a…
View article: Code-transparent Discrete Event Simulation for Time-accurate Wireless Prototyping
Code-transparent Discrete Event Simulation for Time-accurate Wireless Prototyping Open
Exhaustive testing of wireless communication protocols on prototypical hardware is costly and time-consuming. An alternative approach is network simulation, which, however, often strongly abstracts from the actual hardware. Especially in t…
View article: Finite Blocklength Performance of Multi-Terminal Wireless Industrial Networks
Finite Blocklength Performance of Multi-Terminal Wireless Industrial Networks Open
This work focuses on the performance of multi-terminal wireless industrial networks, where the transmissions of all terminals are required to be scheduled within a tight deadline. The transmissions thus share a fixed amount of resources, i…
View article: Performance analysis of cooperative ARQ systems for wireless industrial networks
Performance analysis of cooperative ARQ systems for wireless industrial networks Open
The proliferation of wireless communications has lead to a high interest to establish this technology in industrial settings. The main arguments in favor of wireless are reduced costs in deployment and maintenance, as well as increased fle…