S1 - Scalable Trust Infrastructures

S1 – Scalable Trust Infrastructures (ended after CROSSING I)

Download

Trust assessment of digital objects and the provision of trustworthy cryptographic keys are the foundation for secure communications. Exiting solutions mostly focus on “hard trust” and only insufficiently link trust to the physical world, making them inadequate for the Internet of Things (IoT). The goal of Project S1 is to provide a foundation for tamper-proof, context-aware and decentralized trust mechanisms for the IoT. This goal will be achieved by leveraging a cross-layer approach for establishing context information, and adapting the consensus guarantees of blockchain technology to make trust information tamper-proof.

Publications

Fomichev, Mikhail ; Maass, Max ; Almon, Lars ; Molina, Alejandro ; Hollick, Matthias :
Perils of Zero-Interaction Security in the Internet of Things.
ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2019) ACM
[ Konferenzveröffentlichung] , (2019)

Palacios, Joan ; Steinmetzer, Daniel ; Loch, Adrian ; Hollick, Matthias ; Widmer, Joerg :
Adaptive Codebook Optimization for Beam-Training on Off-The-Shelf IEEE 802.11ad Devices.
[Online-Edition: https://sigmobile.org/mobicom/2018/]
In: MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking, 29.10.-2.11.2018, New Delhi, India. MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking ACM
[ Konferenzveröffentlichung] , (2018)

Hanreich, Matthias :
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
TU Darmstadt
[Masterarbeit] , (2018)

Classen, Jiska ; Wegemer, Daniel :
Fitbit Firmware Hacking.
Recon
[Anderes] , (2018)

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Mühlhäuser, Max :
Towards Secure Distributed Trust Management on a Global Scale.
[Online-Edition: https://conferences.sigcomm.org/sigcomm/2018/workshop-iotsp....]
IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy ACM , New York, NY, USA
[ Konferenzveröffentlichung] , (2018)

Franke, Fabian :
Learning the Beams.
TU Darmstadt
[Masterarbeit] , (2018)

Mantz, Dennis :
InternalBlue – A Bluetooth Experimentation Framework Based on Mobile Device Reverse Engineering.
TU Darmstadt
[Masterarbeit] , (2018)

Mehmedovic, Damir :
Wi-Fi Based Key Exchange On Android Smartphones.
TU Darmstadt
[Bachelorarbeit] , (2018)

Rowe, Steven :
Blockchain-based market for alert data exchange in Collaborative Intrusion Detection Systems.
TU Darmstadt
[Bachelorarbeit] , (2018)

Steinmetzer, Daniel ; Yuan, Yimin ; Hollick, Matthias :
Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks.
In: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jun 18, 2018 - Jun 20, 2018, Stockholm, Sweden. Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks
[ Konferenzveröffentlichung] , (2018)

Ullrich, Fabian :
Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems.
TU Darmstadt
[Masterarbeit] , (2018)

Bielsa, Guillermo ; Palacios, Joan ; Loch, Adrian ; Steinmetzer, Daniel ; Cesari, Paolo ; Widmer, Joerg :
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
In: IEEE International Conference on Computer Communications (INFOCOM), 15-19 April 2018, Honolulu, Hawaii, USA.
[ Konferenzveröffentlichung] , (2018)

Neubauer, Sven :
Angriffsanalyse einer TETRA-Basisstation.
TU Darmstadt
[Bachelorarbeit] , (2018)

Classen, Jiska ; Wegemer, Daniel ; Patras, Paul ; Spink, Tom ; Hollick, Matthias :
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) ACM
[ Konferenzveröffentlichung] , (2018)

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max :
M-STAR: A Modular, Evidence-based Software Trustworthiness Framework.
[Online-Edition: http://arxiv.org/abs/1801.05764]
In: CoRR, abs/1801.05764
[Article] , (2018)

Steinmetzer, Daniel ; Wegemer, Daniel ; Hollick, Matthias :
A Practical IEEE 802.11ad Research Platform: The Hidden Potential of Off -the-Shelf Devices.
In: 3rd NSF Millimeter-Wave RCN Workshop. 3rd NSF Millimeter-Wave RCN Workshop
[ Konferenzveröffentlichung] , (2018)

Ay, Serafettin :
Detecting WiFi Covert Channels.
TU Darmstadt
[Masterarbeit] , (2017)

Cordero, Carlos Garcia ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max :
ID2T - The Intrusion Detection Dataset Generation Toolkit.
[Online-Edition: https://www.blackhat.com/eu-17/]

[Anderes] , (2017)

Muneeb, Ahmed :
mproving a Linux Device Driver for Visible Light Communication.
TU Darmstadt
[Masterarbeit] , (2017)

Steinmetzer, Daniel ; Wegemer, Daniel ; Schulz, Matthias ; Widmer, Jörg ; Hollick, Matthias :
Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.11ad Devices.
In: CoNEXT ’17: The 13th International Conference on emerging Networking EXperiments and Technologies. ACM
[ Konferenzveröffentlichung] , (2017)

Vasilomanolakis, Emmanouil ; Wolf, Jan Helge ; Böck, Leon ; Mühlhäuser, Max ; Karuppayah, Shankar :
I Trust my Zombies: a Trust-enabled Botnet.
Blackhat Europe
[ Konferenzveröffentlichung] , (2017)

Yuan, Yimin :
Investigating Practical Man-in-the-middle Network Attacks on IEEE 802.11ad.
TU Darmstadt
[Masterarbeit] , (2017)

Afridi, Hassaan Ali Khan :
Investigating the relation between bugs and vulnerabilities in the Debian ecosystem.
TU Darmstadt
[Masterarbeit] , (2017)

Wainakh, Aidmar :
On the Analysis & Generation of Synthetic Attack for Intrusion Detection Systems.
TU Darmstadt
[Masterarbeit] , (2017)

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Mühlhäuser, Max :
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
In: Lecture Notes in Computer Science , 10707 . Springer , Cham, CH
[ Konferenzveröffentlichung] , (2017)

Böck, Leon :
On P2P botnet monitoring in adverse conditions.
TU Darmstadt
[Masterarbeit] , (2017)

Islam, Md. Monirul :
Automating Trustworthiness Assessment of Mobile Applications.
TU Darmstadt
[Masterarbeit] , (2017)

Kornhuber, Tim :
Implementation of a physical layer for visible light communication using the OpenVLC platform.
TU Darmstadt
[Masterarbeit] , (2017)

Kümpel, Michael :
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
TU Darmstadt
[Masterarbeit] , (2017)

Meister, Richard :
Design and evaluation of a hybrid SDR testbed for visible light communication and Wi-Fi.
TU Darmstadt
[Masterarbeit] , (2017)

Steinmetzer, Daniel ; Loch, Adrian ; García-García, Amanda ; Widmer, Jörg ; Hollick, Matthias :
Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks.
1st ACM Workshop on Millimeter Wave Networks and Sensing Systems (mmNets 2017) ACM
[ Konferenzveröffentlichung] , (2017)

Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro :
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
[ Konferenzveröffentlichung] , (2017)

Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias :
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, PP S. 1.
[Article] , (2017)

Alexopoulos, Nikolaos ; Daubert, Jörg ; Mühlhäuser, Max ; Habib, Sheikh Mahbub :
Beyond the Hype: On Using Blockchains in Trust Management for Authentication.
In: IEEE Trustcom IEEE
[ Konferenzveröffentlichung] , (2017)

Alexopoulos, Nikolaos ; Kiayias, Aggelos ; Talviste, Riivo ; Zacharias, Thomas :
MCMix: Anonymous Messaging via Secure Multiparty Computation.
[Online-Edition: https://www.usenix.org/conference/usenixsecurity17]
26th USENIX Security Symposium USENIX Association
[ Konferenzveröffentlichung] , (2017)

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Frieß, Tamara ; Mühlhäuser, Max :
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
USENIX Security Symposium Poster Session
[Anderes] , (2017)

Alexopoulos, Nikolaos :
Student Research Abstract: On Enhancing Trust in Cryptographic Solutions.
Proceedings of the 32nd Annual ACM Symposium on Applied Computing ACM , New York, NY, USA
[ Konferenzveröffentlichung] , (2017)

Chen, Joe ; Steinmetzer, Daniel ; Classen, Jiska ; Knightly, Edward ; Hollick, Matthias :
Pseudo Lateration: Millimeter-Wave Localization Using a Single RF Chain.
In: IEEE WCNC
[ Konferenzveröffentlichung] , (2017)

Traverso, Giulia ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes :
AS³: Adaptive Social Secret Sharing for Distributed Storage Systems.
2016 Privacy, Security and Trust Conference IEEE
[ Konferenzveröffentlichung] , (2016)

Classen, Jiska ; Steinmetzer, Daniel ; Hollick, Matthias :
Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer.
In: 3rd ACM Workshop on Visible Light Communication Systems
[Article] , (2016)

Habib, Sheikh Mahbub ; Vassileva, Julita ; Mauw, Sjouke ; Mühlhäuser, Max (eds.) :
Trust Management X - 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016 Proceedings.
Habib, Sheikh Mahbub ; Vassileva, Julita ; Mauw, Sjouke ; Mühlhäuser, Max (eds.), Springer
[ Konferenzveröffentlichung] , (2016)

Schultes, Tobias ; Grau, Markus ; Steinmetzer, Daniel ; Hollick, Matthias :
Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices (Demo).
ACM Conference on Security and Privacy in Wireless and Mobile Networks 2016 (ACM WiSec'16)
[ Konferenzveröffentlichung] , (2016)

Karuppayah, Shankar ; Vasilomanolakis, Emmanouil ; Haas, Steffen ; Fischer, Mathias ; Mühlhäuser, Max :
BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets.
IEEE ICC Communication and Information Systems Security Symposium IEEE
[ Konferenzveröffentlichung] , (2016)

Classen, Jiska :
Software Defined Radio – Open Source Wireless Hacking.

[Anderes] , (2016)

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias :
Exploring Millimeter-Wave Network Scenarios with Ray-tracing based Simulations in mmTrace.
IEEE Infocom 2016 Poster Presentation (Infocom'16 Posters)
[ Konferenzveröffentlichung] , (2016)

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias :
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Ray-tracing.
In: Millimeter-wave Networking Workshop (mmNet 2016)
[Article] , (2016)

Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max :
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC) IEEE
[ Konferenzveröffentlichung] , (2016)

Daubert, Jörg ; Fischer, Mathias ; Grube, Tim ; Schiffner, Stefan ; Kikiras, Panayotis ; Mühlhäuser, Max :
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Elsevier Computer Communications (ComCom), 76 S. 42-53. ISSN 0140-3664
[Article] , (2016)

Vigil, Martín ; Demirel, Denise ; Habib, Sheikh Mahbub ; Hauke, Sascha ; Buchmann, Johannes ; Mühlhäuser, Max :
LoT: a Reputation-based Trust System for Long-term Archiving.
SECURWARE 2016 Thinkmind Digital Library
[ Konferenzveröffentlichung] , (2016)

Classen, Jiska :
Building and Breaking Wireless Security.

[Anderes] , (2015)

Volk, Florian ; Trüschler, Nadine ; Mühlhäuser, Max :
Rating Decomposition with Conjoint Analysis and Machine Learning.
CENTRIC 2015: The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services IARIA
[ Konferenzveröffentlichung] , (2015)

Böck, Leon ; Karuppayah, Shankar ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max :
Hide And Seek: Detecting Sensors in P2P Botnets.
Communications and Network Security (CNS), 2015 IEEE Conference on IEEE
[ Konferenzveröffentlichung] , (2015)

Classen, Jiska ; Chen, Joe ; Steinmetzer, Daniel ; Hollick, Matthias ; Knightly, Edward :
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications.
2nd ACM Workshop on Visible Light Communication Systems
[ Konferenzveröffentlichung] , (2015)

Classen, Jiska ; Schulz, Matthias ; Hollick, Matthias :
Practical Covert Channels for WiFi Systems.
IEEE Conference on Communications and Network Security (CNS)
[ Konferenzveröffentlichung] , (2015)

Steinmetzer, Daniel ; Chen, Joe ; Classen, Jiska ; Knightly, Edward ; Hollick, Matthias :
Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves.
IEEE Conference on Communications and Network Security 2015 (CNS)
[ Konferenzveröffentlichung] , (2015)

Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max :
Computational trust methods for security quantification in the cloud ecosystem.
In: The Cloud Security Ecosystem, Syngress/Elsevier S. 463-493.
[Article] , (2015)

Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max :
Computational trust methods for security quantification in the cloud ecosystem.
In: nicht bekannt Syngress Boston, USA , S. 463-493. ISBN 978-0-12-801595-7
[Book section] , (2015)

Steinmetzer, Daniel ; Schulz, Matthias ; Hollick, Matthias :
Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec)
[ Konferenzveröffentlichung] , (2015)

Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max :
A Distributed Reputation System for Certification Authority Trust Management.
14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium)
[ Konferenzveröffentlichung] , (2015)

go to TU-biblio search on ULB website