Auflistung nach Autor:in "Altschaffel, Robert"
1 - 5 von 5
Treffer pro Seite
Sortieroptionen
- ZeitschriftenartikelAdapting Organic Computing Architectures to an Automotive Environment to Increase Safety & Security(Automotive - Safety & Security 2017 - Sicherheit und Zuverlässigkeit für automobile Informationstechnik, 2017) Lamshöft, Kevin; Altschaffel, Robert; Dittmann, JanaModern cars are very complex systems operating in a diverse environment. Today they incorporate an internal network connecting an array of actuators and sensors to ECUs (Electronic Control Units) which implement basic functions and advanced driver assistance systems. Opening these networks to outside communication channels (like Car-to-X-communication) new possibilities but also new attack vectors arise. Recent work has shown that it is possible for an attacker to infiltrate the ECU network insides a vehicle using these external communication channels. Any attack on the security of a vehicle comes implies an impact on the safety of road traffic. This paper discusses the possibilities of using architectures suggested by Organic Computing to reduce these arising security risks and therefore improve safety. A proposed architecture is implemented in a demonstrator and evaluated using different attack scenarios.
- KonferenzbeitragAttribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT)(Sicherheit 2024, 2024) Dittmann, Jana; Krätzer, Christian; Kiltz, Stefan; Altschaffel, Robert; Vielhauer, Claus; Wendzel, Steffen; Wefel, Sandro; Nitsch, HolgerDieser Beitrag beschreibt Motivation, Perspektiven und Möglichkeiten der Attribution bei StegoMalware im Projekt ATTRIBUT - Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion. Das Projekt ist durch die Agentur für Innovation in der Cybersicherheit GmbH: Forschung zu “Existenzbedrohenden Risiken aus dem Cyber- und Informationsraum – Hochsicherheit in sicherheitskritischen und verteidigungsrelevanten Szenarien” (HSK) – https://www.cyberagentur.de/tag/hsk/, siehe auch in https://attribut. cs.uni-magdeburg.de/ beauftragt.
- KonferenzbeitragGeneration of Plausible Synthetic Data for Stego-Malware Detection for Inter-zone IACS Protocols(INFORMATIK 2023 - Designing Futures: Zukünfte gestalten, 2023) Edeh, Natasha; Altschaffel, Robert; Waedt, KarlISO/IEC 27002:2022 distinguishes between the following types of security controls corrective: preventive, detective and corrective. The focus of this paper is on the support for testing of detective security controls for Industrial Automation and Control Systems. More specifically we will only address the generation of synthetic data that can be used for the detection of selected, advanced detective security controls. The proposed approach will be justified, while a comprehensive validation of the effectiveness of the synthetic data is beyond the scope of this paper. This work aims to contribute to the comprehension and improvement of security measures in Industrial Automation and Control Systems by focusing on the development of synthetic data and its consequences for the identification of specific detective security controls.
- TextdokumentSupporting Security in Industrial Automation and Control Systems using Domain-Specific Modelling(INFORMATIK 2021, 2021) Altschaffel, Robert; Hempel, Ivo; Keil, Oliver; Schindler, Josef; Szemkus, Martin; Dittmann, Jana; Lange, Matthias; Waedt, Karl; Ding, YongjianThis paper explores how domain specific modelling can be used to support the identification of potential vulnerabilities and risks in Industrial Automation and Control Systems (IACS) to enhance security by enabling a mitigation of these vulnerabilities. This approach can be used to support already deployed IACS or to include Security-by-Design and Security Defence-in-Depth principles in the planning of future facilities. This paper explores the requirements for such a modelling approach including domain and security specific aspects. Three interlinked aspects of IACS which require different modelling approaches are identified leading to three distinct types of models: Infrastructure, cyber-process, and physical process. These three types are relevant for different attack vectors and to judge the potential impact of any attack. This paper shows examples for these three models and how these models can be used to identify vulnerabilities with the aim to close them.
- KonferenzbeitragA transparent Bridge for forensic sound network traffic data acquisition(Sicherheit 2010. Sicherheit, Schutz und Zuverlässigkeit, 2010) Kiltz, Stefan; Hildebrandt, Mario; Altschaffel, Robert; Dittmann, JanaIn this paper we introduce a prototype that is designed to produce forensic sound network data recordings using inexpensive hardand software, the Linux Forensic Transparent Bridge (LFTB). It supports the investigation of the network communication parameters and the investigation of the payload of network data. The basis for the LFTB is a self-developed model of the forensic process which also addresses forensically relevant data types and considerations for the design of forensic software using software engineering techniques. LFTB gathers forensic evidence to support cases such as malfunctioning hardand software and for investigating malicious activity. In the latter application the stealthy design of the proposed device is beneficial. Experiments as part of a first evaluation show its usability in a support case and a malicious activity scenario. Effects to latency and throughput were tested and limitations for packet recording analysed. A live monitoring scheme warning about potential packet loss endangering evidence has been implemented.