S1 - Scalable Trust Infrastructures

S1 – Scalable Trust Infrastructures (ended after CROSSING I)

Plugin required: in order to see this object, your browser has to support files of type text/html. Download

Trust assessment of digital objects and the provision of trustworthy cryptographic keys are the foundation for secure communications. Exiting solutions mostly focus on “hard trust” and only insufficiently link trust to the physical world, making them inadequate for the Internet of Things (IoT). The goal of Project S1 is to provide a foundation for tamper-proof, context-aware and decentralized trust mechanisms for the IoT. This goal will be achieved by leveraging a cross-layer approach for establishing context information, and adapting the consensus guarantees of blockchain technology to make trust information tamper-proof.


Mantz, Dennis ; Classen, Jiska ; Schulz, Matthias ; Hollick, Matthias (2019):
InternalBlue - Bluetooth Binary Patching and Experimentation Framework.
In: The 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys ’19), Seoul, South Korea, Jun 17, 2019 - Jun 21, 2019, DOI: 10.1145/3307334.3326089,

Classen, Jiska ; Hollick, Matthias (2019):
Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices.
In: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’19), Miami, FL, USA, May 15, 2019 - May 17, 2019, DOI: https: //doi.org/10.1145/3317549.3319727,

Fomichev, Mikhail ; Maass, Max ; Almon, Lars ; Molina, Alejandro ; Hollick, Matthias (2019):
Perils of Zero-Interaction Security in the Internet of Things.
In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), ACM, 3, (1), DOI: 10.1145/3314397,
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8516],

Palacios, Joan ; Steinmetzer, Daniel ; Loch, Adrian ; Hollick, Matthias ; Widmer, Joerg (2018):
Adaptive Codebook Optimization for Beam-Training on Off-The-Shelf IEEE 802.11ad Devices.
In: MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking, ACM, In: MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking, New Delhi, India, 29.10.-2.11.2018, DOI: 10.1145/3241539.3241576,
[Online-Edition: https://sigmobile.org/mobicom/2018/],

Hanreich, Matthias (2018):
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
TU Darmstadt, [Masterarbeit]

Classen, Jiska ; Wegemer, Daniel (2018):
Fitbit Firmware Hacking.
Recon, [Anderes]

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Mühlhäuser, Max (2018):
Towards Secure Distributed Trust Management on a Global Scale.
In: IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy, New York, NY, USA, ACM, Budapest, HU, 20-25 August 2018, [Online-Edition: https://conferences.sigcomm.org/sigcomm/2018/workshop-iotsp....],

Franke, Fabian (2018):
Learning the Beams.
TU Darmstadt, [Masterarbeit]

Mantz, Dennis (2018):
InternalBlue – A Bluetooth Experimentation Framework Based on Mobile Device Reverse Engineering.
TU Darmstadt, [Masterarbeit]

Mehmedovic, Damir (2018):
Wi-Fi Based Key Exchange On Android Smartphones.
TU Darmstadt, [Bachelorarbeit]

Rowe, Steven (2018):
Blockchain-based market for alert data exchange in Collaborative Intrusion Detection Systems.
TU Darmstadt, [Bachelorarbeit]

Steinmetzer, Daniel ; Yuan, Yimin ; Hollick, Matthias (2018):
Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks.
In: Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, In: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Stockholm, Sweden, Jun 18, 2018 - Jun 20, 2018, DOI: 10.1145/3212480.3212499,

Ullrich, Fabian (2018):
Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems.
TU Darmstadt, [Masterarbeit]

Bielsa, Guillermo ; Palacios, Joan ; Loch, Adrian ; Steinmetzer, Daniel ; Cesari, Paolo ; Widmer, Joerg (2018):
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
In: IEEE International Conference on Computer Communications (INFOCOM), Honolulu, Hawaii, USA, 15-19 April 2018, [Konferenzveröffentlichung]

Neubauer, Sven (2018):
Angriffsanalyse einer TETRA-Basisstation.
TU Darmstadt, [Bachelorarbeit]

Classen, Jiska ; Wegemer, Daniel ; Patras, Paul ; Spink, Tom ; Hollick, Matthias (2018):
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
In: PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), ACM, [Konferenzveröffentlichung]

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max (2018):
M-STAR: A Modular, Evidence-based Software Trustworthiness Framework.
In: CoRR, abs/1801.05764, [Online-Edition: http://arxiv.org/abs/1801.05764],

Steinmetzer, Daniel ; Wegemer, Daniel ; Hollick, Matthias (2018):
A Practical IEEE 802.11ad Research Platform: The Hidden Potential of Off -the-Shelf Devices.
In: 3rd NSF Millimeter-Wave RCN Workshop, In: 3rd NSF Millimeter-Wave RCN Workshop, [Konferenzveröffentlichung]

Ay, Serafettin (2017):
Detecting WiFi Covert Channels.
Darmstadt, Technische Universität, [Masterarbeit]

Cordero, Carlos Garcia ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max (2017):
ID2T - The Intrusion Detection Dataset Generation Toolkit.
London, UK, [Online-Edition: https://www.blackhat.com/eu-17/],

Muneeb, Ahmed (2017):
mproving a Linux Device Driver for Visible Light Communication.
Darmstadt, Technische Universität, [Masterarbeit]

Steinmetzer, Daniel ; Wegemer, Daniel ; Schulz, Matthias ; Widmer, Jörg ; Hollick, Matthias (2017):
Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.11ad Devices.
ACM, In: CoNEXT ’17: The 13th International Conference on emerging Networking EXperiments and Technologies, DOI: 10.1145/3143361.3143384,

Vasilomanolakis, Emmanouil ; Wolf, Jan Helge ; Böck, Leon ; Mühlhäuser, Max ; Karuppayah, Shankar (2017):
I Trust my Zombies: a Trust-enabled Botnet.
In: Blackhat Europe, London, UK, [Konferenzveröffentlichung]

Yuan, Yimin (2017):
Investigating Practical Man-in-the-middle Network Attacks on IEEE 802.11ad.
Darmstadt, Technische Universität, [Masterarbeit]

Afridi, Hassaan Ali Khan (2017):
Investigating the relation between bugs and vulnerabilities in the Debian ecosystem.
Darmstadt, Technische Universität, [Masterarbeit]

Wainakh, Aidmar (2017):
On the Analysis & Generation of Synthetic Attack for Intrusion Detection Systems.
Darmstadt, Technische Universität, [Bachelorarbeit]

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Mühlhäuser, Max (2017):
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
In: Critical Information Infrastructures Security (CRITIS), Cham, CH, Springer, Lucca, Italy, 8-13 October 2018, In: Lecture Notes in Computer Science, 10707, [Konferenzveröffentlichung]

Böck, Leon (2017):
On P2P botnet monitoring in adverse conditions.
Darmstadt, Technische Universität, [Masterarbeit]

Islam, Md. Monirul (2017):
Automating Trustworthiness Assessment of Mobile Applications.
Darmstadt, Technische Universität, [Masterarbeit]

Kornhuber, Tim (2017):
Implementation of a physical layer for visible light communication using the OpenVLC platform.
Darmstadt, Technische Universität, [Bachelorarbeit]

Kümpel, Michael (2017):
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
Darmstadt, Technische Universität, [Bachelorarbeit]

Meister, Richard (2017):
Design and evaluation of a hybrid SDR testbed for visible light communication and Wi-Fi.
Darmstadt, Technische Universität, [Masterarbeit]

Steinmetzer, Daniel ; Loch, Adrian ; García-García, Amanda ; Widmer, Jörg ; Hollick, Matthias (2017):
Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks.
In: 1st ACM Workshop on Millimeter Wave Networks and Sensing Systems (mmNets 2017), ACM, Snowbird, Utah, USA, ISBN 978-1-4503-5143-0/17/10,
DOI: 10.1145/3130242.3130244,

Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro (2017):
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
In: Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Atlanta, Georgia, USA, [Konferenzveröffentlichung]

Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias (2017):
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, S. 1, PP, DOI: 10.1109/COMST.2017.2748278,

Funke, Sebastian ; Wiesmaier, Alexander ; Daubert, Jörg (2017):
Constrained PET Composition for Measuring Enforced Privacy.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), ACM, DOI: 10.1145/3098954.3098968,

Alexopoulos, Nikolaos ; Daubert, Jörg ; Mühlhäuser, Max ; Habib, Sheikh Mahbub (2017):
Beyond the Hype: On Using Blockchains in Trust Management for Authentication.
In: IEEE TrustCom 2017, IEEE, Sydney, Australia, 1-4 August 2017, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.283,

Alexopoulos, Nikolaos ; Kiayias, Aggelos ; Talviste, Riivo ; Zacharias, Thomas (2017):
MCMix: Anonymous Messaging via Secure Multiparty Computation.
In: 26th USENIX Security Symposium, USENIX Association, Vancouver, BC, Canada, 16-18 August 2018, [Online-Edition: https://www.usenix.org/conference/usenixsecurity17],

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Frieß, Tamara ; Mühlhäuser, Max (2017):
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
In: USENIX Security Symposium Poster Session, Vancouver, Canada, [Anderes]

Funke, Sebastian
Daubert, Jörg (Hrsg.) (2017):
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
In: Proceedings of the DACH Security 2017, München, DACH Security 2017, [Konferenzveröffentlichung]

Alexopoulos, Nikolaos (2017):
Student Research Abstract: On Enhancing Trust in Cryptographic Solutions.
In: Proceedings of the 32nd Annual ACM Symposium on Applied Computing, New York, NY, USA, ACM, Marrakech, Morocco, 3-6 April 2017, DOI: 10.1145/3019612.3019921,

Chen, Joe ; Steinmetzer, Daniel ; Classen, Jiska ; Knightly, Edward ; Hollick, Matthias (2017):
Pseudo Lateration: Millimeter-Wave Localization Using a Single RF Chain.
In: IEEE WCNC, [Konferenzveröffentlichung]

Traverso, Giulia ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes (2016):
AS³: Adaptive Social Secret Sharing for Distributed Storage Systems.
In: 2016 Privacy, Security and Trust Conference, IEEE, Auckland, New Zealand, [Konferenzveröffentlichung]

Classen, Jiska ; Steinmetzer, Daniel ; Hollick, Matthias (2016):
Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer.
In: 3rd ACM Workshop on Visible Light Communication Systems, [Article]

Pfeiffer, Martin ; Kwiotek, Jan-Pascal ; Classen, Jiska ; Klose, Robin ; Hollick, Matthias (2016):
Analyzing TETRA Location Privacy and Network Availability.
New York, NY, USA, ACM, In: 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, Vienna, Austria, In: SPSM '16, DOI: 10.1145/2994459.2994463,
[Online-Edition: http://doi.acm.org/10.1145/2994459.2994463],

Vasilomanolakis, Emmanouil ; Stahn, Michael ; Cordero, Carlos Garcia ; Mühlhäuser, Max (2016):
On Probe-Response Attacks in Collaborative Intrusion Detection Systems.
In: IEEE Conference on Communications and Network Security, IEEE, Philadelphia, USA, ISBN 978-1-5090-3065-1,
DOI: 10.1109/CNS.2016.7860495,

Habib, Sheikh Mahbub ; Vassileva, Julita ; Mauw, Sjouke ; Mühlhäuser, Max (Hrsg.) (2016):
Trust Management X - 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016 Proceedings.
Springer, Darmstadt, Germany, IFIP AICT 473, [Konferenzveröffentlichung]

Schultes, Tobias ; Grau, Markus ; Steinmetzer, Daniel ; Hollick, Matthias (2016):
Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices (Demo).
In: ACM Conference on Security and Privacy in Wireless and Mobile Networks 2016 (ACM WiSec'16), [Konferenzveröffentlichung]

Karuppayah, Shankar ; Vasilomanolakis, Emmanouil ; Haas, Steffen ; Fischer, Mathias ; Mühlhäuser, Max (2016):
BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets.
In: IEEE ICC Communication and Information Systems Security Symposium, IEEE, Kuala Lumpur, Malaysia, ISBN 978-1-4799-6664-6,
DOI: 10.1109/ICC.2016.7510885,

Classen, Jiska (2016):
Software Defined Radio – Open Source Wireless Hacking.

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias (2016):
Exploring Millimeter-Wave Network Scenarios with Ray-tracing based Simulations in mmTrace.
In: IEEE Infocom 2016 Poster Presentation (Infocom'16 Posters), San Francisco, [Konferenzveröffentlichung]

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias (2016):
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Ray-tracing.
In: Millimeter-wave Networking Workshop (mmNet 2016), [Article]

Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2016):
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
In: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), IEEE, Las Vegas, USA, ISBN 978-1-4673-9292-1,
DOI: 10.1109/CCNC.2016.7444871,

Daubert, Jörg (2016):
Anonymous Publish-Subscribe Overlays.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5473],

Daubert, Jörg ; Fischer, Mathias ; Grube, Tim ; Schiffner, Stefan ; Kikiras, Panayotis ; Mühlhäuser, Max (2016):
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Elsevier Computer Communications (ComCom), Elsevier, S. 42-53, 76, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2015.11.004,

Vigil, Martín ; Demirel, Denise ; Habib, Sheikh Mahbub ; Hauke, Sascha ; Buchmann, Johannes ; Mühlhäuser, Max (2016):
LoT: a Reputation-based Trust System for Long-term Archiving.
In: SECURWARE 2016, Thinkmind Digital Library, Nice, France, ISBN 978-1-61208-493-0,

Classen, Jiska (2015):
Building and Breaking Wireless Security.

Volk, Florian ; Trüschler, Nadine ; Mühlhäuser, Max (2015):
Rating Decomposition with Conjoint Analysis and Machine Learning.
In: CENTRIC 2015: The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, IARIA, Barcelona, Spain, ISBN 978-1-61208-440-4,

Böck, Leon ; Karuppayah, Shankar ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2015):
Hide And Seek: Detecting Sensors in P2P Botnets.
In: Communications and Network Security (CNS), 2015 IEEE Conference on, IEEE, Florence, Italy, DOI: 10.1109/CNS.2015.7346908,

Classen, Jiska ; Chen, Joe ; Steinmetzer, Daniel ; Hollick, Matthias ; Knightly, Edward (2015):
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications.
In: 2nd ACM Workshop on Visible Light Communication Systems, Paris, France, [Konferenzveröffentlichung]

Classen, Jiska ; Schulz, Matthias ; Hollick, Matthias (2015):
Practical Covert Channels for WiFi Systems.
In: IEEE Conference on Communications and Network Security (CNS), Florence, Italy, [Konferenzveröffentlichung]

Steinmetzer, Daniel ; Chen, Joe ; Classen, Jiska ; Knightly, Edward ; Hollick, Matthias (2015):
Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves.
In: IEEE Conference on Communications and Network Security 2015 (CNS), Florence, DOI: 10.1109/CNS.2015.7346844,

Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max
Ko, Ryan ; Choo, Kim-Kwang Raymond (Hrsg.) (2015):
Computational trust methods for security quantification in the cloud ecosystem.
In: The cloud security ecosystem : technical, legal, business and management issues, Amsterdam Heidelberg, Elsevier Syngress, S. 463-493, DOI: 10.1016/B978-0-12-801595-7.00021-5,
[Book section]

Steinmetzer, Daniel ; Schulz, Matthias ; Hollick, Matthias (2015):
Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief.
In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec), New York, ISBN 978-1-4503-3623-9/15/06,
DOI: 10.1145/2766498.2766514,

Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max (2015):
A Distributed Reputation System for Certification Authority Trust Management.
In: 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium), Helsinki, Finland, [Konferenzveröffentlichung]

go to TU-biblio search on ULB website