S1 - Scalable Trust Infrastructures

S1 – Scalable Trust Infrastructures (ended after CROSSING I)

Download

The goal of S1 is to advance computational trust for the benefit of cryptography. Probabilistic trust values will be computed and continuously managed in concert with cryptographic solutions, reflecting the trustworthiness of cryptographic objects, and linked to various entities. The differentiation of trust contexts shall be supported. The project builds on two fundamental concepts of human trust: (A) personal encounters, and (B) the propagation of trust from acquaintances to communities. The project thus develop concepts coined as (A) situated trust and (B) global trust, plus (C) their interweaving, to yield scalable trust infrastructure for future computing environments.

Publications

Palacios, Joan ; Steinmetzer, Daniel ; Loch, Adrian ; Hollick, Matthias ; Widmer, Joerg :
Adaptive Codebook Optimization for Beam-Training on Off-The-Shelf IEEE 802.11ad Devices.
[Online-Edition: https://sigmobile.org/mobicom/2018/]
In: MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking, 29.10.-2.11.2018, New Delhi, India. MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking ACM
[Conference or workshop item] , (2018)

Hanreich, Matthias :
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
TU Darmstadt
[Masterarbeit] , (2018)

Classen, Jiska ; Wegemer, Daniel :
Fitbit Firmware Hacking.
Recon
[Anderes] , (2018)

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Mühlhäuser, Max :
Towards Secure Distributed Trust Management on a Global Scale.
[Online-Edition: https://conferences.sigcomm.org/sigcomm/2018/workshop-iotsp....]
IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy ACM , New York, NY, USA
[Conference or workshop item] , (2018)

Franke, Fabian :
Learning the Beams.
TU Darmstadt
[Masterarbeit] , (2018)

Mantz, Dennis :
InternalBlue – A Bluetooth Experimentation Framework Based on Mobile Device Reverse Engineering.
TU Darmstadt
[Masterarbeit] , (2018)

Mehmedovic, Damir :
Wi-Fi Based Key Exchange On Android Smartphones.
TU Darmstadt
[Bachelorarbeit] , (2018)

Rowe, Steven :
Blockchain-based market for alert data exchange in Collaborative Intrusion Detection Systems.
TU Darmstadt
[Bachelorarbeit] , (2018)

Steinmetzer, Daniel ; Yuan, Yimin ; Hollick, Matthias :
Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks.
In: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jun 18, 2018 - Jun 20, 2018, Stockholm, Sweden. Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks
[Conference or workshop item] , (2018)

Ullrich, Fabian :
Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems.
TU Darmstadt
[Masterarbeit] , (2018)

Bielsa, Guillermo ; Palacios, Joan ; Loch, Adrian ; Steinmetzer, Daniel ; Cesari, Paolo ; Widmer, Joerg :
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
In: IEEE International Conference on Computer Communications (INFOCOM), 15-19 April 2018, Honolulu, Hawaii, USA.
[Conference or workshop item] , (2018)

Neubauer, Sven :
Angriffsanalyse einer TETRA-Basisstation.
TU Darmstadt
[Bachelorarbeit] , (2018)

Classen, Jiska ; Wegemer, Daniel ; Patras, Paul ; Spink, Tom ; Hollick, Matthias :
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) ACM
[Conference or workshop item] , (2018)

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max :
M-STAR: A Modular, Evidence-based Software Trustworthiness Framework.
[Online-Edition: http://arxiv.org/abs/1801.05764]
In: CoRR, abs/1801.05764
[Article] , (2018)

Steinmetzer, Daniel ; Wegemer, Daniel ; Hollick, Matthias :
A Practical IEEE 802.11ad Research Platform: The Hidden Potential of Off -the-Shelf Devices.
In: 3rd NSF Millimeter-Wave RCN Workshop. 3rd NSF Millimeter-Wave RCN Workshop
[Conference or workshop item] , (2018)

Ay, Serafettin :
Detecting WiFi Covert Channels.
TU Darmstadt
[Masterarbeit] , (2017)

Cordero, Carlos Garcia ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max :
ID2T - The Intrusion Detection Dataset Generation Toolkit.
[Online-Edition: https://www.blackhat.com/eu-17/]

[Anderes] , (2017)

Muneeb, Ahmed :
mproving a Linux Device Driver for Visible Light Communication.
TU Darmstadt
[Masterarbeit] , (2017)

Steinmetzer, Daniel ; Wegemer, Daniel ; Schulz, Matthias ; Widmer, Jörg ; Hollick, Matthias :
Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.11ad Devices.
In: CoNEXT ’17: The 13th International Conference on emerging Networking EXperiments and Technologies. ACM
[Conference or workshop item] , (2017)

Vasilomanolakis, Emmanouil ; Wolf, Jan Helge ; Böck, Leon ; Mühlhäuser, Max ; Karuppayah, Shankar :
I Trust my Zombies: a Trust-enabled Botnet.
Blackhat Europe
[Conference or workshop item] , (2017)

Yuan, Yimin :
Investigating Practical Man-in-the-middle Network Attacks on IEEE 802.11ad.
TU Darmstadt
[Masterarbeit] , (2017)

Afridi, Hassaan Ali Khan :
Investigating the relation between bugs and vulnerabilities in the Debian ecosystem.
TU Darmstadt
[Masterarbeit] , (2017)

Wainakh, Aidmar :
On the Analysis & Generation of Synthetic Attack for Intrusion Detection Systems.
TU Darmstadt
[Masterarbeit] , (2017)

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Mühlhäuser, Max :
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
In: Lecture Notes in Computer Science , 10707 . Springer , Cham, CH
[Conference or workshop item] , (2017)

Böck, Leon :
On P2P botnet monitoring in adverse conditions.
TU Darmstadt
[Masterarbeit] , (2017)

Islam, Md. Monirul :
Automating Trustworthiness Assessment of Mobile Applications.
TU Darmstadt
[Masterarbeit] , (2017)

Kornhuber, Tim :
Implementation of a physical layer for visible light communication using the OpenVLC platform.
TU Darmstadt
[Masterarbeit] , (2017)

Kümpel, Michael :
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
TU Darmstadt
[Masterarbeit] , (2017)

Meister, Richard :
Design and evaluation of a hybrid SDR testbed for visible light communication and Wi-Fi.
TU Darmstadt
[Masterarbeit] , (2017)

Steinmetzer, Daniel ; Loch, Adrian ; García-García, Amanda ; Widmer, Jörg ; Hollick, Matthias :
Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks.
1st ACM Workshop on Millimeter Wave Networks and Sensing Systems (mmNets 2017) ACM
[Conference or workshop item] , (2017)

Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro :
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
[Conference or workshop item] , (2017)

Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias :
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, PP S. 1.
[Article] , (2017)

Alexopoulos, Nikolaos ; Daubert, Jörg ; Mühlhäuser, Max ; Habib, Sheikh Mahbub :
Beyond the Hype: On Using Blockchains in Trust Management for Authentication.
In: IEEE Trustcom IEEE
[Conference or workshop item] , (2017)

Alexopoulos, Nikolaos ; Kiayias, Aggelos ; Talviste, Riivo ; Zacharias, Thomas :
MCMix: Anonymous Messaging via Secure Multiparty Computation.
[Online-Edition: https://www.usenix.org/conference/usenixsecurity17]
26th USENIX Security Symposium USENIX Association
[Conference or workshop item] , (2017)

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Frieß, Tamara ; Mühlhäuser, Max :
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
USENIX Security Symposium Poster Session
[Anderes] , (2017)

Alexopoulos, Nikolaos :
Student Research Abstract: On Enhancing Trust in Cryptographic Solutions.
Proceedings of the 32nd Annual ACM Symposium on Applied Computing ACM , New York, NY, USA
[Conference or workshop item] , (2017)

Chen, Joe ; Steinmetzer, Daniel ; Classen, Jiska ; Knightly, Edward ; Hollick, Matthias :
Pseudo Lateration: Millimeter-Wave Localization Using a Single RF Chain.
In: IEEE WCNC
[Conference or workshop item] , (2017)

Traverso, Giulia ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes :
AS³: Adaptive Social Secret Sharing for Distributed Storage Systems.
2016 Privacy, Security and Trust Conference IEEE
[Conference or workshop item] , (2016)

Classen, Jiska ; Steinmetzer, Daniel ; Hollick, Matthias :
Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer.
In: 3rd ACM Workshop on Visible Light Communication Systems
[Article] , (2016)

Habib, Sheikh Mahbub ; Vassileva, Julita ; Mauw, Sjouke ; Mühlhäuser, Max (eds.) :
Trust Management X - 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016 Proceedings.
Habib, Sheikh Mahbub ; Vassileva, Julita ; Mauw, Sjouke ; Mühlhäuser, Max (eds.), Springer
[Conference or workshop item] , (2016)

Schultes, Tobias ; Grau, Markus ; Steinmetzer, Daniel ; Hollick, Matthias :
Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices (Demo).
ACM Conference on Security and Privacy in Wireless and Mobile Networks 2016 (ACM WiSec'16)
[Conference or workshop item] , (2016)

Karuppayah, Shankar ; Vasilomanolakis, Emmanouil ; Haas, Steffen ; Fischer, Mathias ; Mühlhäuser, Max :
BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets.
IEEE ICC Communication and Information Systems Security Symposium IEEE
[Conference or workshop item] , (2016)

Classen, Jiska :
Software Defined Radio – Open Source Wireless Hacking.

[Anderes] , (2016)

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias :
Exploring Millimeter-Wave Network Scenarios with Ray-tracing based Simulations in mmTrace.
IEEE Infocom 2016 Poster Presentation (Infocom'16 Posters)
[Conference or workshop item] , (2016)

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias :
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Ray-tracing.
In: Millimeter-wave Networking Workshop (mmNet 2016)
[Article] , (2016)

Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max :
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC) IEEE
[Conference or workshop item] , (2016)

Daubert, Jörg ; Fischer, Mathias ; Grube, Tim ; Schiffner, Stefan ; Kikiras, Panayotis ; Mühlhäuser, Max :
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Elsevier Computer Communications (ComCom), 76 S. 42-53. ISSN 0140-3664
[Article] , (2016)

Vigil, Martín ; Demirel, Denise ; Habib, Sheikh Mahbub ; Hauke, Sascha ; Buchmann, Johannes ; Mühlhäuser, Max :
LoT: a Reputation-based Trust System for Long-term Archiving.
SECURWARE 2016 Thinkmind Digital Library
[Conference or workshop item] , (2016)

Classen, Jiska :
Building and Breaking Wireless Security.

[Anderes] , (2015)

Volk, Florian ; Trüschler, Nadine ; Mühlhäuser, Max :
Rating Decomposition with Conjoint Analysis and Machine Learning.
CENTRIC 2015: The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services IARIA
[Conference or workshop item] , (2015)

Böck, Leon ; Karuppayah, Shankar ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max :
Hide And Seek: Detecting Sensors in P2P Botnets.
Communications and Network Security (CNS), 2015 IEEE Conference on IEEE
[Conference or workshop item] , (2015)

Classen, Jiska ; Chen, Joe ; Steinmetzer, Daniel ; Hollick, Matthias ; Knightly, Edward :
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications.
2nd ACM Workshop on Visible Light Communication Systems
[Conference or workshop item] , (2015)

Classen, Jiska ; Schulz, Matthias ; Hollick, Matthias :
Practical Covert Channels for WiFi Systems.
IEEE Conference on Communications and Network Security (CNS)
[Conference or workshop item] , (2015)

Steinmetzer, Daniel ; Chen, Joe ; Classen, Jiska ; Knightly, Edward ; Hollick, Matthias :
Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves.
IEEE Conference on Communications and Network Security 2015 (CNS)
[Conference or workshop item] , (2015)

Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max :
Computational trust methods for security quantification in the cloud ecosystem.
In: The Cloud Security Ecosystem, Syngress/Elsevier S. 463-493.
[Article] , (2015)

Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max :
Computational trust methods for security quantification in the cloud ecosystem.
In: Keine Angabe Syngress Boston, USA , S. 463-493. ISBN 978-0-12-801595-7
[Book section] , (2015)

Steinmetzer, Daniel ; Schulz, Matthias ; Hollick, Matthias :
Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec)
[Conference or workshop item] , (2015)

Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max :
A Distributed Reputation System for Certification Authority Trust Management.
14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium)
[Conference or workshop item] , (2015)

go to TU-biblio search on ULB website