Auflistung nach Autor:in "Westhoff, Dirk"
1 - 4 von 4
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragCode attestation with compressed instruction code(11th International Conference on Innovative Internet Community Systems (I2CS 2011), 2011) Vetter, Benjamin; Westhoff, DirkAvailable purely software based code attestation protocols have recently been shown to be cheatable. In this work we propose to upload compressed instruction code to make the code attestation protocol robust against a so called compresssion attack. The described secure code attestation protocol makes use of proposed microcontroller architectures for reading out compressed instruction code.
- KonferenzbeitragEntity recognition for sensor network motes (Extend abstracts)(Informatik 2005 – Informatik Live! Band 2, 2005) Lucks, Stefan; Zenner, Erik; Weimerskirch, André; Westhoff, DirkMessage authenticity (knowing "who sent this message") is an important security issue for sensor networks, and often difficult to solve. Sometimes, it may be sufficient and more efficient to solve the simpler entitiy recognition problem, instead: "is the message from the same entity that sent the previous messages?". This paper describes entity recognition for sensor network motes. A protocol presented at SAC 2003 [5] is shown to be insecure, and a new and provably secure protocol is proposed.
- KonferenzbeitragAn MTM based watchdog for malware famishment in smartphones(11th International Conference on Innovative Internet Community Systems (I2CS 2011), 2011) Ugus, Osman; Westhoff, DirkDue to their various wireless interfaces, a continuously increasing number of fishy Apps, and due to their raising popularity, smartphones are becoming a promising target for attackers. Independently of the point of entrance, malwares are typically attached to an App to perform their malicious activities. However, malware can only do harm on a smartphone if it is executed. We thus propose a malware prevention architecture for smartphones that exploits App signatures, process authentication during their creation, and process verification during their execution and scheduling. The proposed security mechanism will allow a smartphone to run only those Apps which are classified as trusted (i.e., signed Apps) and which are not modified after their installation. The trust derived from the App signatures and a Mobile Trusted Module (MTM) is propagated through the processes until their execution via process authentication. The MTM serves as a trust anchor for our malware famishment in smartphones. This work presents our solution conceptually. We will soon start with a proof of concept implementation and a performance study using a software based MTM emulator.
- TextdokumentShort Paper: Debating Ethics with Cybersecurity Students(GI SICHERHEIT 2022, 2022) Breig, Jan; Westhoff, DirkWe aim to debate and eventually be able to carefully judge how realistic the following statement of a young computer scientist is: “I would like to become an ethical correctly acting offensive cybersecurity expert”. The objective of this article is not to judge what is good and what is wrong behavior nor to present an overall solution to ethical dilemmas. Instead, the goal is to become aware of the various personal moral dilemmas a security expert may face during his work life. For this, a total of 14 cybersecurity students from HS Offenburg were asked to evaluate several case studies according to different ethical frameworks. The results and particularities are discussed, considering different ethical frameworks. We emphasize, that different ethical frameworks can lead to different preferred actions and that the moral understanding of the frameworks may differ even from student to student.