Refine
Departments, institutes and facilities
- Fachbereich Informatik (42)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (23)
- Fachbereich Ingenieurwissenschaften und Kommunikation (21)
- Institut für Cyber Security & Privacy (ICSP) (16)
- Fachbereich Wirtschaftswissenschaften (15)
- Institute of Visual Computing (IVC) (11)
- Institut für Verbraucherinformatik (IVI) (9)
- Internationales Zentrum für Nachhaltige Entwicklung (IZNE) (6)
- Fachbereich Angewandte Naturwissenschaften (5)
- Fachbereich Sozialpolitik und Soziale Sicherung (4)
Document Type
- Conference Object (105) (remove)
Year of publication
- 2016 (105) (remove)
Keywords
- IEEE802.11 (2)
- Large, high-resolution displays (2)
- Long-Distance WiFi (2)
- Privacy (2)
- SpMV (2)
- User Experience (2)
- WiLD (2)
- 3D user interface (1)
- API usability (1)
- ARM Cortex M3 Processor (1)
- Actuators (1)
- Adaptive Media Streaming (1)
- Adaptive optics (1)
- Aneignungsstudie (1)
- Autoimmune disease (1)
- BCL2 (1)
- Biometrics of chips (1)
- Blocking (1)
- Business Models (1)
- CUDA (1)
- Collaboration and e-Services (1)
- Community of Practice (1)
- Consumer Online Behaviour (1)
- Cooperative Awareness Message (1)
- Corporate Social Responsibility (1)
- Data Compression (1)
- Data Reduction (1)
- Data Tiles (1)
- Difference-coding (1)
- Directional Antenna (1)
- Distributed rendering (1)
- E-Business (1)
- E-Learning (1)
- Elliptic Curve Cryptography (1)
- Embedded software (1)
- Empirical study (1)
- Enterprise Engineering (1)
- Enterprise Information Systems (1)
- Enterprise Resource Planning (1)
- Ethnographic Research (1)
- Evaluation (1)
- Experten (1)
- Fas (1)
- Fault analysis (1)
- Fault-channel watermarks (1)
- Field Study (1)
- Field programmable gate arrays (1)
- Fog (1)
- Force (1)
- Force field (1)
- Framing (1)
- Free space optics (1)
- Friction (1)
- GPU (1)
- Gradient-boosting (1)
- Grasping (1)
- HPC (1)
- Hand Tracking (1)
- Heart Rate Prediction (1)
- High-performance computing (1)
- IP protection (1)
- Informationssicherheit (1)
- Instance-based learning (1)
- Intelligent Transport System (1)
- Interaction (1)
- Issue tracking systems (1)
- KNN (1)
- Lighting simulation (1)
- Linear regression (1)
- Living Lab (1)
- Longley-Rice (1)
- Lymphoproliferative disorder (1)
- MAC (1)
- Machine Learning (1)
- Method of lines (1)
- Mining Software Repositories (1)
- Model Fitting (1)
- Modular software packages (1)
- Molecular modeling (1)
- Motion Capture (1)
- Musical Performance (1)
- Natural Language Processing (1)
- Navigation interface (1)
- Network simulation (1)
- Numerical optimization (1)
- Open-source (1)
- OpenACC (1)
- OpenFlow (1)
- OpenMP, unrolling (1)
- Performance Simulation (1)
- Performance prediction (1)
- Predictive Models (1)
- Propagation (1)
- Pseudonym Concept (1)
- Push-based Streaming (1)
- Q measurement (1)
- QPSK (1)
- ROW methods (1)
- River alarm systems (1)
- Robotics (1)
- Robustness (1)
- SDN (1)
- SDWN (1)
- ScalarMultiplication (1)
- Security (1)
- Security APIs (1)
- Self-driving (1)
- Service Design (1)
- Side Channel Countermeasures (1)
- Silicon biometrics (1)
- Single Instruction Multiple Data (SIMD) (1)
- Smart Home (1)
- Software Feature Request Detection (1)
- Software Security (1)
- Sparse Matrix Vector Multiplication (1)
- Sparse Matrix Vector multiply (SpMV) (1)
- Strong Physical Unclonable Functions (PUFs) (1)
- Sustainability (1)
- Symmetry detector (1)
- Token (1)
- Traceability (1)
- Traffic sign detection (1)
- Traffic sign recognition (1)
- Training Model (1)
- Training Optimization (1)
- Two-Ray (1)
- Ubiquity (1)
- Unity (1)
- Usable Security (1)
- VR (1)
- Vector Intrinsics (1)
- Vehicle-to-Vehicle Communication (1)
- Vehicular Ad hoc Networks (1)
- WDS (1)
- Water supply networks (1)
- Water supply systems (1)
- Watermarking (1)
- Web (1)
- Web Content Analysis (1)
- Web Mining (1)
- WebSocket (1)
- WiFi (1)
- Wicked Problems (1)
- Wind Fields (1)
- Wind Flow Visualization (1)
- Wissensaustausch (1)
- autonomous sensor system (1)
- bass-shaker (1)
- brute force methods (1)
- citizen participation (1)
- collaboration (1)
- computer-supported collaborative work (1)
- crisis exercise (1)
- cuSPARSE (1)
- curing behavior (1)
- dielectric analysis (1)
- energy harvesting (1)
- engage exchange model (1)
- erp4students (1)
- food systems (1)
- gaming (1)
- generator (1)
- human-centric lighting (1)
- intrinsics (1)
- ion viscosity (1)
- leaning (1)
- optimization of telecommunications systems (1)
- outbreak management (1)
- peripheral vision (1)
- reaction kinetics (1)
- regional food production (1)
- resin for 3D-printing (1)
- risk communication (1)
- robots (1)
- rural areas (1)
- short-term memory (1)
- social empirical research (1)
- social media analysis (1)
- socio economic impact (1)
- spectral rendering (1)
- surface textures (1)
- sustainable transition (1)
- territoriality (1)
- urban green spaces (1)
- vibration (1)
- vibration energy (1)
- wavelength (1)
- whole-body interface (1)
- wireless communication (1)
- wmSDN (1)
- workspace awareness (1)
Recent years have seen extensive adoption of domain generation algorithms (DGA) by modern botnets. The main goal is to generate a large number of domain names and then use a small subset for actual C&C communication. This makes DGAs very compelling for botmasters to harden the infrastructure of their botnets and make it resilient to blacklisting and attacks such as takedown efforts. While early DGAs were used as a backup communication mechanism, several new botnets use them as their primary communication method, making it extremely important to study DGAs in detail.
In this paper, we perform a comprehensive measurement study of the DGA landscape by analyzing 43 DGAbased malware families and variants. We also present a taxonomy for DGAs and use it to characterize and compare the properties of the studied families. By reimplementing the algorithms, we pre-compute all possible domains they generate, covering the majority of known and active DGAs. Then, we study the registration status of over 18 million DGA domains and show that corresponding malware families and related campaigns can be reliably identified by pre-computing future DGA domains. We also give insights into botmasters’ strategies regarding domain registration and identify several pitfalls in previous takedown efforts of DGA-based botnets. We will share the dataset for future research and will also provide a web service to check domains for potential DGA identity.
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study
(2016)
Der Arbeitskreis Usable Security & Privacy bietet ein Forum für den Gedankenaustausch und die interdisziplinäre Zusammenarbeit rund um das Thema benutzerfreundliche Informationssicherheit und privatheitsfördernde Technologien. Sicherheit ist bei der Anschaffung von Software und Technikprodukten zwar eines der zentralen Auswahlkriterien – aufgrund mangelnder Gebrauchstauglichkeit werden die vorhandenen Sicherheitsfunktionen und -mechanismen von den Nutzern jedoch oft falsch oder überhaupt nicht bedient. Im alltäglichen Gebrauch ergeben sich hierdurch Sicherheitsgefährdungen beim Umgang mit IKT-Systemen bzw. -Produkten und den darin enthaltenen sensiblen Daten. Im Workshop werden mit den Teilnehmern Beispiele diskutiert und es wird gemeinsam ein Stimmungsbild zum Verständnis, zum Stellenwert und zum aktuellen Grad der Umsetzung von Usable Security & Privacy erhoben. Ergebnis des Workshops ist ein Positionspapier, in dem die aktuellen Problemfelder und die wichtigsten Herausforderungen aus Sicht der Usability und UX Professionals beschrieben sind.
In Fortführung zum erfolgreichen Auftaktworkshop „Usable Security and Privacy: Nutzerzentrierte Lösungsansätze zum Schutz sensibler Daten“ auf der Mensch und Computer 2015 werden in einem zweiten wissenschaftlichen Workshop auf der diesjährigen Mensch und Computer vier Arbeiten auf dem Gebiet Usable Security and Privacy vorgestellt und diskutiert. Das Programm bilden Beiträge aus Forschung und Praxis, die neue nutzerzentrierte Ansätze, aber auch praxisrelevante Lösungen zur nutzerzentrierten Entwicklung und Ausgestaltung von digitalen Schutzmechanismen thematisieren. Mit dem Workshop wird das etablierte Forum weiterentwickelt, in dem sich Experten aus unterschiedlichen Domänen, z. B. dem Usability-Engineering und Security-Engineering, transdisziplinär austauschen können. Der Workshop wird von den Organisatoren als klassischer wissenschaftlicher Workshop ausgestaltet. Ein Programmkomitee hat die Einreichungen bewertet und daraus die zur Präsentation akzeptierten Beiträge ausgewählt.
This paper presents methods for the reduction and compression of meteorological data for web-based wind flow visualizations, which are tailored to the flow visualization technique. Flow data sets represent a large amount of data and are therefore not well suited for mobile networks with low data throughput rates and high latency. Using the mechanisms introduced in this paper, an efficient transfer of thinned out and compressed data can be achieved, while keeping the accuracy of the visualized information almost at the same quality level as for the original data.