Refine
H-BRS Bibliography
- yes (107) (remove)
Departments, institutes and facilities
- Institut für Cyber Security & Privacy (ICSP) (107) (remove)
Document Type
- Conference Object (74)
- Article (18)
- Part of a Book (4)
- Preprint (4)
- Doctoral Thesis (3)
- Conference Proceedings (2)
- Contribution to a Periodical (1)
- Research Data (1)
Year of publication
Language
- English (107) (remove)
Keywords
- Robotics (6)
- Usable Security (5)
- GDPR (4)
- Risk-based Authentication (4)
- Big Data Analysis (3)
- Cooperative Awareness Message (3)
- IP protection (3)
- Intelligent Transport System (3)
- Machine Learning (3)
- Pseudonym Concept (3)
- Vehicular Ad hoc Networks (3)
- Authentication (2)
- DPA (2)
- Embedded software (2)
- Fault analysis (2)
- Human-Centered Design (2)
- LOTUS Sensor Node (2)
- MESD (2)
- Password (2)
- Privacy (2)
- Rapid Prototyping (2)
- Risk-based Authentication (RBA) (2)
- SEMA (2)
- Side Channel Analysis (2)
- Side-channel analysis (2)
- Smart Card (2)
- TinyECC 2.0 (2)
- Usable Security and Privacy (2)
- User Interface Design (2)
- Vehicle-to-Vehicle Communication (2)
- Wireless Sensor Network (2)
- usable privacy (2)
- AES (1)
- AMD Family 15h (1)
- API Documentation (1)
- ARM Cortex M3 Processor (1)
- Account (Datenverarbeitung) (1)
- Account Security (1)
- Antifuse memory (1)
- Artificial Intelligence (1)
- Assistive robots (1)
- Authentication features (1)
- Authentifikation (1)
- Authorship watermark (1)
- Autonomous Systems (1)
- Bag of Features (1)
- Beacon Chain (1)
- Behaviour-Driven Development (1)
- Benchmarking (1)
- Block cipher (1)
- CPA (1)
- CPUID instruction (1)
- CUDA (1)
- Cache line fingerprinting (1)
- Cache-independent (1)
- Chip ID (1)
- Code Generation (1)
- Code similarity analysis (1)
- Component Models (1)
- Computersicherheit (1)
- Content Security Policies (1)
- Counterfeit protection (1)
- Covert channel (1)
- Cross-core (1)
- Cypher (1)
- DFA Lab (1)
- DPA Lab (1)
- Data Generation (1)
- Data Protection Officer (1)
- Developer Centered Security (1)
- Differential analysis (1)
- Digital Ecosystem (1)
- Digital watermarking (1)
- Domain Expert (1)
- Domain-Specific Modeling Languages, (1)
- Domestic service robots (1)
- E-Health (1)
- EM leakage (1)
- Earth Observation (1)
- Eclipse Modeling Framework (1)
- Elliptic Curve Cryptography (1)
- Employee Privacy (1)
- Employee data protection (1)
- Ethereum (1)
- Expert Interviews (1)
- FPGA implementation (1)
- Fault Channel Watermarking Lab (1)
- Fault-channel watermarks (1)
- Fingerprint watermark (1)
- Graphics Cards (1)
- HTTP (1)
- Header whitelisting (1)
- Human robot interaction (1)
- Human-Robot Interaction (1)
- Humanoid Robot (1)
- IC identification (1)
- Implementation Challenges (1)
- Information Privacy (1)
- Information hiding (1)
- Instruction scheduling (1)
- Integrate Development Environment (1)
- Interactive Smart Card Applications (1)
- Intermediaries (1)
- Language Engineering (1)
- Large-Scale Online Services (1)
- Leakage circuits (1)
- Login (1)
- Manipulation tasks (1)
- Microarchitectural Data Sampling (MDS) (1)
- Model-Based Software Development (1)
- Model-Driven Engineering (1)
- Model-based Approach (1)
- Model-driven Development (1)
- Model-driven engineering (1)
- Multithreaded and multicore architecture (1)
- Neural Machine Translation (1)
- Online Services (1)
- OpenStack (1)
- PHR (1)
- Passwort (1)
- People Detection (1)
- Periodic structures (1)
- Personal Health Record (1)
- Power Analysis (1)
- Privacy engineering (1)
- Privacy patterns (1)
- Process Models (1)
- Proof of Stake (1)
- Public Key Infrastructure (1)
- Public Key Infrastructures (1)
- QoS (1)
- RBAR (1)
- RGB-D (1)
- Re-authentication (1)
- Requirements (1)
- Requirements Engineering (1)
- Reusable Software (1)
- Right to Informational Self-Determination (1)
- Risk-Based Account Recovery (1)
- Robot software (1)
- Robotics competitions (1)
- Robots (1)
- Runtime Adaptation (1)
- SAML (1)
- SOAP (1)
- SQL (1)
- ScalarMultiplication (1)
- Secure Coding Practices (1)
- Semantic gap (1)
- Semantic scene understanding (1)
- Side Channel Countermeasures (1)
- Side Channel Watermarking Lab (1)
- Side channel attack (1)
- Side channels (1)
- Side-channel watermarking (1)
- Similarity matrix (1)
- Simulator (1)
- Smart Card User Interface Design, Interactive Smart Card Applications (1)
- Software (1)
- Software Architectures (1)
- Software Development Process (1)
- Software IP protection (1)
- Software and Architecture (1)
- Software reverse engineering (1)
- Stream cipher (1)
- Support Vector Machine (1)
- Template Attacks (1)
- Testing (1)
- Timing analysis (1)
- Timing channel (1)
- Two-factor Authentication (1)
- UAV teleoperation (1)
- Usability (1)
- User experience design (1)
- User-Centered Design (1)
- User-centered privacy engineering (1)
- Variability Management (1)
- Variability Resolution (1)
- Vehicle-2-Vehicle Communication (1)
- Vehicle-to- Vehicle Communication (V2V) (1)
- Vehicle-to-Infrastructure Communication (1)
- Vehicle-to-Infrastructure Communication (V2I) (1)
- Vehicle-to-Vehicle Com- munication (1)
- Vehicular Ad hoc Networks (VANETs) (1)
- Watermarking (1)
- Web (1)
- XML Signature (1)
- XML Signature Wrapping (1)
- ZombieLoad (1)
- analyses (1)
- analysis (1)
- benchmarking (1)
- blockchain (1)
- classifier combination (1)
- clustering (1)
- component based (1)
- crawling (1)
- cryptanalytic attacks (1)
- denial-of-service (1)
- domestic robots (1)
- eavesdropping (1)
- embedded systems (1)
- employee privacy (1)
- factor analysis (1)
- feature extraction (1)
- force sensing (1)
- human-centred design (1)
- industrial robots (1)
- informational self-determination (1)
- intervention mechanisms (1)
- latent class analysis (1)
- machine learning (1)
- manipulation (1)
- mental models (1)
- multi robot systems (1)
- object categorization (1)
- privacy at work (1)
- privacy by design (1)
- property-based testing for robots (1)
- radio-frequency identification (RFID) systems (1)
- remote-controlled robots (1)
- robot competitions (1)
- robotics (1)
- run-time adaptation (1)
- security (1)
- security and privacy literacy (1)
- sensor fusion (1)
- simulation (1)
- simulation-based robot testing (1)
- slip detection (1)
- structural equation modeling (1)
- tactile sensing (1)
- transparency-enhancing technologies (1)
- usable privacy controls (1)
- usable secure email (1)
- user interface design (1)
- verification and validation of robot action execution (1)
- web (1)
- website (1)
This paper presents the b-it-bots RoboCup@Work team and its current hardware and functional architecture for the KUKA youBot robot.We describe the underlying software framework and the developed capabilities required for operating in industrial environments including features such as reliable and precise navigation, flexible manipulation and robust object recognition.
Competitions for Benchmarking: Task and Functionality Scoring Complete Performance Assessment
(2015)
Target meaning representations for semantic parsing tasks are often based on programming or query languages, such as SQL, and can be formalized by a context-free grammar. Assuming a priori knowledge of the target domain, such grammars can be exploited to enforce syntactical constraints when predicting logical forms. To that end, we assess how syntactical parsers can be integrated into modern encoder-decoder frameworks. Specifically, we implement an attentional SEQ2SEQ model that uses an LR parser to maintain syntactically valid sequences throughout the decoding procedure. Compared to other approaches to grammar-guided decoding that modify the underlying neural network architecture or attempt to derive full parse trees, our approach is conceptually simpler, adds less computational overhead during inference and integrates seamlessly with current SEQ2SEQ frameworks. We present preliminary evaluation results against a recurrent SEQ2SEQ baseline on GEOQUERY and ATIS and demonstrate improved performance while enforcing grammatical constraints.
RoCKIn@Work was focused on benchmarks in the domain of industrial robots. Both task and functionality benchmarks were derived from real world applications. All of them were part of a bigger user story painting the picture of a scaled down real world factory scenario. Elements used to build the testbed were chosen from common materials in modern manufacturing environments. Networked devices, machines controllable through a central software component, were also part of the testbed and introduced a dynamic component to the task benchmarks. Strict guidelines on data logging were imposed on participating teams to ensure gathered data could be automatically evaluated. This also had the positive effect that teams were made aware of the importance of data logging, not only during a competition but also during research as useful utility in their own laboratory. Tasks and functionality benchmarks are explained in detail, starting with their use case in industry, further detailing their execution and providing information on scoring and ranking mechanisms for the specific benchmark.
The BRICS component model: a model-based development paradigm for complex robotics software systems
(2013)
Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software Systems
(2021)
The web is the most wide-spread digital system in the world and is used for many crucial applications. This makes web application security extremely important and, although there are already many security measures, new vulnerabilities are constantly being discovered. One reason for some of the recent discoveries lies in the presence of intermediate systems—e.g. caches, message routers, and load balancers—on the way between a client and a web application server. The implementations of such intermediaries may interpret HTTP messages differently, which leads to a semantically different understanding of the same message. This so-called semantic gap can cause weaknesses in the entire HTTP message processing chain.
In this paper we introduce the header whitelisting (HWL) approach to address the semantic gap in HTTP message processing pipelines. The basic idea is to normalize and reduce an HTTP request header to the minimum required fields using a whitelist before processing it in an intermediary or on the server, and then restore the original request for the next hop. Our results show that HWL can avoid misinterpretations of HTTP messages in the different components and thus prevent many attacks rooted in a semantic gap including request smuggling, cache poisoning, and authentication bypass.
Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication
(2024)
Components and Architecture for the Implementation of Technology-Driven Employee Data Protection
(2021)
The RoCKIn@Work Challenge
(2014)