Skip to main content

Showing 1–50 of 111 results for author: Henze, M

.
  1. arXiv:2505.16300  [pdf, ps, other

    cs.CR

    Poster: Towards an Automated Security Testing Framework for Industrial UEs

    Authors: Sotiris Michaelides, Daniel Eguiguren Chavez, Martin Henze

    Abstract: With the ongoing adoption of 5G for communication in industrial systems and critical infrastructure, the security of industrial UEs such as 5G-enabled industrial robots becomes an increasingly important topic. Most notably, to meet the stringent security requirements of industrial deployments, industrial UEs not only have to fully comply with the 5G specifications but also implement and use correc… ▽ More

    Submitted 22 May, 2025; originally announced May 2025.

    Comments: EuroS&P 2025

  2. Assessing the Latency of Network Layer Security in 5G Networks

    Authors: Sotiris Michaelides, Jonathan Mucke, Martin Henze

    Abstract: In contrast to its predecessors, 5G supports a wide range of commercial, industrial, and critical infrastructure scenarios. One key feature of 5G, ultra-reliable low latency communication, is particularly appealing to such scenarios for its real-time capabilities. However, 5G's enhanced security, mostly realized through optional security controls, imposes additional overhead on the network perform… ▽ More

    Submitted 12 May, 2025; originally announced May 2025.

    Journal ref: WiSec 2025

  3. arXiv:2504.16695  [pdf, ps, other

    cs.CR

    CAIBA: Multicast Source Authentication for CAN Through Reactive Bit Flipping

    Authors: Eric Wagner, Frederik Basels, Jan Bauer, Till Zimmermann, Klaus Wehrle, Martin Henze

    Abstract: Controller Area Networks (CANs) are the backbone for reliable intra-vehicular communication. Recent cyberattacks have, however, exposed the weaknesses of CAN, which was designed without any security considerations in the 1980s. Current efforts to retrofit security via intrusion detection or message authentication codes are insufficient to fully secure CAN as they cannot adequately protect against… ▽ More

    Submitted 23 April, 2025; originally announced April 2025.

    Comments: accepted at EuroS&P'25

  4. Simulation of Multi-Stage Attack and Defense Mechanisms in Smart Grids

    Authors: Omer Sen, Bozhidar Ivanov, Christian Kloos, Christoph Zol_, Philipp Lutat, Martin Henze, Andreas Ulbig

    Abstract: The power grid is a critical infrastructure essential for public safety and welfare. As its reliance on digital technologies grows, so do its vulnerabilities to sophisticated cyber threats, which could severely disrupt operations. Effective protective measures, such as intrusion detection and decision support systems, are essential to mitigate these risks. Machine learning offers significant poten… ▽ More

    Submitted 9 December, 2024; originally announced December 2024.

    Journal ref: International Journal of Critical Infrastructure Protection 2024

  5. A cyber-physical digital twin approach to replicating realistic multi-stage cyberattacks on smart grids

    Authors: Omer Sen, Nathalie Bleser, Martin Henze, Andreas Ulbig

    Abstract: The integration of information and communication technology in distribution grids presents opportunities for active grid operation management, but also increases the need for security against power outages and cyberattacks. This paper examines the impact of cyberattacks on smart grids by replicating the power grid in a secure laboratory environment as a cyber-physical digital twin. A simulation is… ▽ More

    Submitted 6 December, 2024; originally announced December 2024.

    Journal ref: 27th International Conference on Electricity Distribution (CIRED 2023)

  6. arXiv:2412.00990  [pdf, other

    cs.CR cs.NI

    Seldom: An Anonymity Network with Selective Deanonymization

    Authors: Eric Wagner, Roman Matzutt, Martin Henze

    Abstract: While anonymity networks such as Tor provide invaluable privacy guarantees to society, they also enable all kinds of criminal activities. Consequently, many blameless citizens shy away from protecting their privacy using such technology for the fear of being associated with criminals. To grasp the potential for alternative privacy protection for those users, we design Seldom, an anonymity network… ▽ More

    Submitted 1 December, 2024; originally announced December 2024.

  7. Unconsidered Installations: Discovering IoT Deployments in the IPv6 Internet

    Authors: Markus Dahlmanns, Felix Heidenreich, Johannes Lohmöller, Jan Pennekamp, Klaus Wehrle, Martin Henze

    Abstract: Internet-wide studies provide extremely valuable insight into how operators manage their Internet of Things (IoT) deployments in reality and often reveal grievances, e.g., significant security issues. However, while IoT devices often use IPv6, past studies resorted to comprehensively scan the IPv4 address space. To fully understand how the IoT and all its services and devices is operated, includin… ▽ More

    Submitted 20 November, 2024; originally announced November 2024.

    Comments: 8 pages, 2 figures

    Journal ref: In Proceedings of the 2024 IEEE/IFIP Network Operations and Management Symposium (NOMS '24), May 6-10, 2024, Seoul, Korea

  8. arXiv:2411.01971  [pdf, other

    cs.CR cs.NI

    Adaptive Optimization of TLS Overhead for Wireless Communication in Critical Infrastructure

    Authors: Jörn Bodenhausen, Laurenz Grote, Michael Rademacher, Martin Henze

    Abstract: With critical infrastructure increasingly relying on wireless communication, using end-to-end security such as TLS becomes imperative. However, TLS introduces significant overhead for resource-constrained devices and networks prevalent in critical infrastructure. In this paper, we propose to leverage the degrees of freedom in configuring TLS to dynamically adapt algorithms, parameters, and other s… ▽ More

    Submitted 4 November, 2024; originally announced November 2024.

    Comments: To be published in Proceedings of the 2024 8th Cyber Security in Networking Conference (CSNet)

  9. Secure Integration of 5G in Industrial Networks: State of the Art, Challenges and Opportunities

    Authors: Sotiris Michaelides, Stefan Lenz, Thomas Vogt, Martin Henze

    Abstract: The industrial landscape is undergoing a significant transformation, moving away from traditional wired fieldbus networks to cutting-edge 5G mobile networks. This transition, extending from local applications to company-wide use and spanning multiple factories, is driven by the promise of low-latency communication and seamless connectivity for various devices in industrial settings. However, besid… ▽ More

    Submitted 6 December, 2024; v1 submitted 29 August, 2024; originally announced August 2024.

    Comments: 15 pages, 5 figures

    Journal ref: Future Generation Computer Systems, Volume 166, 2025

  10. Introducing a Comprehensive, Continuous, and Collaborative Survey of Intrusion Detection Datasets

    Authors: Philipp Bönninghausen, Rafael Uetz, Martin Henze

    Abstract: Researchers in the highly active field of intrusion detection largely rely on public datasets for their experimental evaluations. However, the large number of existing datasets, the discovery of previously unknown flaws therein, and the frequent publication of new datasets make it hard to select suitable options and sufficiently understand their respective limitations. Hence, there is a great risk… ▽ More

    Submitted 5 August, 2024; originally announced August 2024.

    Comments: To be published in Proceedings of the 17th Cyber Security Experimentation and Test Workshop (CSET 2024)

  11. arXiv:2402.14599  [pdf, other

    cs.CR

    Enhancing SCADA Security: Developing a Host-Based Intrusion Detection System to Safeguard Against Cyberattacks

    Authors: Omer Sen, Tarek Hassan, Andreas Ulbig, Martin Henze

    Abstract: With the increasing reliance of smart grids on correctly functioning SCADA systems and their vulnerability to cyberattacks, there is a pressing need for effective security measures. SCADA systems are prone to cyberattacks, posing risks to critical infrastructure. As there is a lack of host-based intrusion detection systems specifically designed for the stable nature of SCADA systems, the objective… ▽ More

    Submitted 22 February, 2024; originally announced February 2024.

  12. arXiv:2401.13306  [pdf, other

    cs.CR

    POSTER: Towards Secure 5G Infrastructures for Production Systems

    Authors: Martin Henze, Maximilian Ortmann, Thomas Vogt, Osman Ugus, Kai Hermann, Svenja Nohr, Zeren Lu, Sotiris Michaelides, Angela Massonet, Robert H. Schmitt

    Abstract: To meet the requirements of modern production, industrial communication increasingly shifts from wired fieldbus to wireless 5G communication. Besides tremendous benefits, this shift introduces severe novel risks, ranging from limited reliability over new security vulnerabilities to a lack of accountability. To address these risks, we present approaches to (i) prevent attacks through authentication… ▽ More

    Submitted 24 January, 2024; originally announced January 2024.

    Comments: Accepted to the poster session of the 22nd International Conference on Applied Cryptography and Network Security (ACNS 2024)

  13. An Approach to Abstract Multi-stage Cyberattack Data Generation for ML-Based IDS in Smart Grids

    Authors: Ömer Sen, Philipp Malskorn, Simon Glomb, Immanuel Hacker, Martin Henze, Andreas Ulbig

    Abstract: Power grids are becoming more digitized, resulting in new opportunities for the grid operation but also new challenges, such as new threats from the cyber-domain. To address these challenges, cybersecurity solutions are being considered in the form of preventive, detective, and reactive measures. Machine learning-based intrusion detection systems are used as part of detection efforts to detect and… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

    Journal ref: Proceedings of 2023 IEEE Belgrade PowerTech

  14. arXiv:2312.13705  [pdf, other

    cs.CR eess.SY

    Benchmark Evaluation of Anomaly-Based Intrusion Detection Systems in the Context of Smart Grids

    Authors: Ömer Sen, Simon Glomb, Martin Henze, Andreas Ulbig

    Abstract: The increasing digitization of smart grids has made addressing cybersecurity issues crucial in order to secure the power supply. Anomaly detection has emerged as a key technology for cybersecurity in smart grids, enabling the detection of unknown threats. Many research efforts have proposed various machine-learning-based approaches for anomaly detection in grid operations. However, there is a need… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

    Comments: To be published in Proceedings of 2023 IEEE PES Innovative Smart Grid Technologies Europe (ISGT EUROPE)

  15. Investigation of Multi-stage Attack and Defense Simulation for Data Synthesis

    Authors: Ömer Sen, Bozhidar Ivanov, Martin Henze, Andreas Ulbig

    Abstract: The power grid is a critical infrastructure that plays a vital role in modern society. Its availability is of utmost importance, as a loss can endanger human lives. However, with the increasing digitalization of the power grid, it also becomes vulnerable to new cyberattacks that can compromise its availability. To counter these threats, intrusion detection systems are developed and deployed to det… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

    Journal ref: Proceedings of the 2023 International Conference on Smart Energy Systems and Technologies (SEST)

  16. arXiv:2312.09660  [pdf, other

    cs.CR cs.NI

    When and How to Aggregate Message Authentication Codes on Lossy Channels?

    Authors: Eric Wagner, Martin Serror, Klaus Wehrle, Martin Henze

    Abstract: Aggregation of message authentication codes (MACs) is a proven and efficient method to preserve valuable bandwidth in resource-constrained environments: Instead of appending a long authentication tag to each message, the integrity protection of multiple messages is aggregated into a single tag. However, while such aggregation saves bandwidth, a single lost message typically means that authenticati… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

    Comments: accepted at ACNS'24

  17. Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication

    Authors: Eric Wagner, David Heye, Martin Serror, Ike Kunze, Klaus Wehrle, Martin Henze

    Abstract: Industrial control systems increasingly rely on middlebox functionality such as intrusion detection or in-network processing. However, traditional end-to-end security protocols interfere with the necessary access to in-flight data. While recent work on middlebox-aware end-to-end security protocols for the traditional Internet promises to address the dilemma between end-to-end security guarantees a… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

    Comments: accepted at AsiaCCS'24

  18. arXiv:2311.10197  [pdf, other

    cs.CR

    You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks

    Authors: Rafael Uetz, Marco Herzog, Louis Hackländer, Simon Schwarz, Martin Henze

    Abstract: Cyberattacks have grown into a major risk for organizations, with common consequences being data theft, sabotage, and extortion. Since preventive measures do not suffice to repel attacks, timely detection of successful intruders is crucial to stop them from reaching their final goals. For this purpose, many organizations utilize Security Information and Event Management (SIEM) systems to centrally… ▽ More

    Submitted 19 December, 2023; v1 submitted 16 November, 2023; originally announced November 2023.

    Comments: To be published in Proceedings of the 33rd USENIX Security Symposium (USENIX Security 2024)

  19. SoK: Evaluations in Industrial Intrusion Detection Research

    Authors: Olav Lamberts, Konrad Wolsing, Eric Wagner, Jan Pennekamp, Jan Bauer, Klaus Wehrle, Martin Henze

    Abstract: Industrial systems are increasingly threatened by cyberattacks with potentially disastrous consequences. To counter such attacks, industrial intrusion detection systems strive to timely uncover even the most sophisticated breaches. Due to its criticality for society, this fast-growing field attracts researchers from diverse backgrounds, resulting in 130 new detection approaches in 2021 alone. This… ▽ More

    Submitted 6 November, 2023; originally announced November 2023.

    Journal ref: Journal of Systems Research (JSys) Volume 3(1) 2023

  20. arXiv:2311.01338  [pdf, other

    cs.NI cs.CR

    Securing Wireless Communication in Critical Infrastructure: Challenges and Opportunities

    Authors: Jörn Bodenhausen, Christian Sorgatz, Thomas Vogt, Kolja Grafflage, Sebastian Rötzel, Michael Rademacher, Martin Henze

    Abstract: Critical infrastructure constitutes the foundation of every society. While traditionally solely relying on dedicated cable-based communication, this infrastructure rapidly transforms to highly digitized and interconnected systems which increasingly rely on wireless communication. Besides providing tremendous benefits, especially affording the easy, cheap, and flexible interconnection of a large nu… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

    Comments: Author's version of a paper accepted for publication in Proceedings of the 20th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2023)

  21. Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead

    Authors: Jan Pennekamp, Anastasiia Belova, Thomas Bergs, Matthias Bodenbenner, Andreas Bührig-Polaczek, Markus Dahlmanns, Ike Kunze, Moritz Kröger, Sandra Geisler, Martin Henze, Daniel Lütticke, Benjamin Montavon, Philipp Niemietz, Lucia Ortjohann, Maximilian Rudack, Robert H. Schmitt, Uwe Vroomen, Klaus Wehrle, Michael Zeng

    Abstract: The Internet of Production (IoP) leverages concepts such as digital shadows, data lakes, and a World Wide Lab (WWL) to advance today's production. Consequently, it requires a technical infrastructure that can support the agile deployment of these concepts and corresponding high-level applications, which, e.g., demand the processing of massive data in motion and at rest. As such, key research aspec… ▽ More

    Submitted 17 May, 2023; originally announced May 2023.

    Comments: Published in: Brecher, C., Schuh, G., van der Aalst, W., Jarke, M., Piller, F.T., Padberg, M. (eds) Internet of Production. Interdisciplinary Excellence Accelerator Series. Springer, Cham

  22. Comprehensively Analyzing the Impact of Cyberattacks on Power Grids

    Authors: Lennart Bader, Martin Serror, Olav Lamberts, Ömer Sen, Dennis van der Velde, Immanuel Hacker, Julian Filter, Elmar Padilla, Martin Henze

    Abstract: The increasing digitalization of power grids and especially the shift towards IP-based communication drastically increase the susceptibility to cyberattacks, potentially leading to blackouts and physical damage. Understanding the involved risks, the interplay of communication and physical assets, and the effects of cyberattacks are paramount for the uninterrupted operation of this critical infrast… ▽ More

    Submitted 16 May, 2023; originally announced May 2023.

    Comments: 14 pages, 13 figures, accepted at EuroS&P 2023

  23. arXiv:2302.11900  [pdf, other

    astro-ph.HE astro-ph.GA astro-ph.SR

    On the Observability of Recurrent Nova Super-Remnants

    Authors: M. W. Healy-Kalesh, M. J. Darnley, E. J. Harvey, C. M. Copperwheat, P. A. James, T. Andersson, M. Henze, T. J. O'Brien

    Abstract: The nova super-remnant (NSR) surrounding M31N 2008-12a (12a), the annually erupting recurrent nova (RN), is the only known example of this phenomenon. As this structure has grown as a result of frequent eruptions from 12a, we might expect to see NSRs around other RNe; this would confirm the RN--NSR association and strengthen the connection between novae and type Ia supernovae (SN Ia) as NSRs cente… ▽ More

    Submitted 23 February, 2023; originally announced February 2023.

    Comments: 20 pages, 20 figures; Accepted for publication in Monthly Notices of the Royal Astronomical Society. For the animation in Figure 4, see https://www.dropbox.com/s/7a6zbu4eyv6kv8x/coolRun1.mp4?dl=0

  24. On Specification-based Cyber-Attack Detection in Smart Grids

    Authors: Ömer Sen Dennis van der Velde, Maik Lühman, Florian Sprünken, Immanuel Hacker, Andreas Ulbig, Michael Andres, Martin Henze

    Abstract: The transformation of power grids into intelligent cyber-physical systems brings numerous benefits, but also significantly increases the surface for cyber-attacks, demanding appropriate countermeasures. However, the development, validation, and testing of data-driven countermeasures against cyber-attacks, such as machine learning-based detection approaches, lack important data from real-world cybe… ▽ More

    Submitted 9 September, 2022; originally announced September 2022.

    Journal ref: Energy Inform 5 (Suppl 1), 23 (2022)

  25. PowerDuck: A GOOSE Data Set of Cyberattacks in Substations

    Authors: Sven Zemanek, Immanuel Hacker, Konrad Wolsing, Eric Wagner, Martin Henze, Martin Serror

    Abstract: Power grids worldwide are increasingly victims of cyberattacks, where attackers can cause immense damage to critical infrastructure. The growing digitalization and networking in power grids combined with insufficient protection against cyberattacks further exacerbate this trend. Hence, security engineers and researchers must counter these new risks by continuously improving security measures. Data… ▽ More

    Submitted 11 July, 2022; originally announced July 2022.

    Comments: Cyber Security Experimentation and Test Workshop (CSET 2022)

  26. Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things

    Authors: Markus Dahlmanns, Johannes Lohmöller, Jan Pennekamp, Jörn Bodenhausen, Klaus Wehrle, Martin Henze

    Abstract: The ongoing trend to move industrial appliances from previously isolated networks to the Internet requires fundamental changes in security to uphold secure and safe operation. Consequently, to ensure end-to-end secure communication and authentication, (i) traditional industrial protocols, e.g., Modbus, are retrofitted with TLS support, and (ii) modern protocols, e.g., MQTT, are directly designed t… ▽ More

    Submitted 1 June, 2022; originally announced June 2022.

    Comments: 15 pages, 6 figures

    Journal ref: In Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (ASIA CCS '22), Association for Computing Machinery, New York, NY, USA, pages 252-266

  27. Scalable and Privacy-Focused Company-Centric Supply Chain Management

    Authors: Eric Wagner, Roman Matzutt, Jan Pennekamp, Lennart Bader, Irakli Bajelidze, Klaus Wehrle, Martin Henze

    Abstract: Blockchain technology promises to overcome trust and privacy concerns inherent to centralized information sharing. However, current decentralized supply chain management systems do either not meet privacy and scalability requirements or require a trustworthy consortium, which is challenging for increasingly dynamic supply chains with constantly changing participants. In this paper, we propose CCCh… ▽ More

    Submitted 22 May, 2022; originally announced May 2022.

    Comments: IEEE ICBC'22

    Journal ref: In Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC '22)

  28. BP-MAC: Fast Authentication for Short Messages

    Authors: Eric Wagner, Martin Serror, Klaus Wehrle, Martin Henze

    Abstract: Resource-constrained devices increasingly rely on wireless communication for the reliable and low-latency transmission of short messages. However, especially the implementation of adequate integrity protection of time-critical messages places a significant burden on these devices. We address this issue by proposing BP-MAC, a fast and memory-efficient approach for computing message authentication c… ▽ More

    Submitted 19 May, 2022; originally announced May 2022.

    Comments: ACM WiSec'22

  29. A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection

    Authors: Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, Martin Henze

    Abstract: Anomaly-based intrusion detection promises to detect novel or unknown attacks on industrial control systems by modeling expected system behavior and raising corresponding alarms for any deviations.As manually creating these behavioral models is tedious and error-prone, research focuses on machine learning to train them automatically, achieving detection rates upwards of 99%. However, these approac… ▽ More

    Submitted 18 May, 2022; originally announced May 2022.

    Comments: ACM CPSS'22

  30. Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use

    Authors: Jan Pennekamp, Erik Buchholz, Markus Dahlmanns, Ike Kunze, Stefan Braun, Eric Wagner, Matthias Brockmann, Klaus Wehrle, Martin Henze

    Abstract: Following the recent Internet of Things-induced trends on digitization in general, industrial applications will further evolve as well. With a focus on the domains of manufacturing and production, the Internet of Production pursues the vision of a digitized, globally interconnected, yet secure environment by establishing a distributed knowledge base. Background. As part of our collaborative resear… ▽ More

    Submitted 21 December, 2021; originally announced December 2021.

    Comments: 16 pages, 2 figures

    Journal ref: Proceedings of the Workshop on Learning from Authoritative Security Experiment Results (LASER '20), 2021, ACSAC

  31. CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively

    Authors: Roman Matzutt, Benedikt Kalde, Jan Pennekamp, Arthur Drichel, Martin Henze, Klaus Wehrle

    Abstract: Popular cryptocurrencies continue to face serious scalability issues due to their ever-growing blockchains. Thus, modern blockchain designs began to prune old blocks and rely on recent snapshots for their bootstrapping processes instead. Unfortunately, established systems are often considered incapable of adopting these improvements. In this work, we present CoinPrune, our block-pruning scheme wit… ▽ More

    Submitted 26 November, 2021; originally announced November 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:2004.06911

    Journal ref: in IEEE Transactions on Network and Service Management, vol. 18, no. 3, pp. 3064-3078, Sept. 2021

  32. Challenges and Opportunities in Securing the Industrial Internet of Things

    Authors: Martin Serror, Sacha Hack, Martin Henze, Marko Schuba, Klaus Wehrle

    Abstract: Given the tremendous success of the Internet of Things in interconnecting consumer devices, we observe a natural trend to likewise interconnect devices in industrial settings, referred to as Industrial Internet of Things or Industry 4.0. While this coupling of industrial components provides many benefits, it also introduces serious security challenges. Although sharing many similarities with the c… ▽ More

    Submitted 23 November, 2021; originally announced November 2021.

    Comments: 12 pages, 2 figures, published in IEEE Transactions on Industrial Informatics

    Journal ref: IEEE Transactions on Industrial Informatics 17 (5), 2985-2996, 2021

  33. Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments

    Authors: Rafael Uetz, Christian Hemminghaus, Louis Hackländer, Philipp Schlipper, Martin Henze

    Abstract: Artifacts such as log data and network traffic are fundamental for cybersecurity research, e.g., in the area of intrusion detection. Yet, most research is based on artifacts that are not available to others or cannot be adapted to own purposes, thus making it difficult to reproduce and build on existing work. In this paper, we identify the challenges of artifact generation with the goal of conduct… ▽ More

    Submitted 15 November, 2021; originally announced November 2021.

    Comments: To be published in Proceedings of the 2021 Annual Computer Security Applications Conference (ACSAC '21)

  34. IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems

    Authors: Konrad Wolsing, Eric Wagner, Antoine Saillard, Martin Henze

    Abstract: The increasing interconnection of industrial networks exposes them to an ever-growing risk of cyber attacks. To reveal such attacks early and prevent any damage, industrial intrusion detection searches for anomalies in otherwise predictable communication or process behavior. However, current efforts mostly focus on specific domains and protocols, leading to a research landscape broken up into isol… ▽ More

    Submitted 11 July, 2022; v1 submitted 5 November, 2021; originally announced November 2021.

    Journal ref: Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2022)

  35. arXiv:2110.09162  [pdf, other

    cs.CR cs.NI eess.SY

    Investigating Man-in-the-Middle-based False Data Injection in a Smart Grid Laboratory Environment

    Authors: Ömer Sen, Dennis van der Velde, Philipp Linnartz, Immanuel Hacker, Martin Henze, Michael Andres, Andreas Ulbig

    Abstract: With the increasing use of information and communication technology in electrical power grids, the security of energy supply is increasingly threatened by cyber-attacks. Traditional cyber-security measures, such as firewalls or intrusion detection/prevention systems, can be used as mitigation and prevention measures, but their effective use requires a deep understanding of the potential threat lan… ▽ More

    Submitted 18 October, 2021; originally announced October 2021.

    Comments: To be published in Proceedings of 2021 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe)

  36. arXiv:2110.02040  [pdf

    cs.CR cs.NI eess.SY

    An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment

    Authors: Ömer Sen, Dennis van der Velde, Sebastian N. Peters, Martin Henze

    Abstract: While the digitization of power distribution grids brings many benefits, it also introduces new vulnerabilities for cyber-attacks. To maintain secure operations in the emerging threat landscape, detecting and implementing countermeasures against cyber-attacks are paramount. However, due to the lack of publicly available attack data against Smart Grids (SGs) for countermeasure development, simulati… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

    Comments: To be published in Proceedings of the CIRED 2021 Conference

  37. arXiv:2109.07768  [pdf, ps, other

    cs.NI

    Path Loss in Urban LoRa Networks: A Large-Scale Measurement Study

    Authors: Michael Rademacher, Hendrik Linka, Thorsten Horstmann, Martin Henze

    Abstract: Urban LoRa networks promise to provide a cost-efficient and scalable communication backbone for smart cities. One core challenge in rolling out and operating these networks is radio network planning, i.e., precise predictions about possible new locations and their impact on network coverage. Path loss models aid in this task, but evaluating and comparing different models requires a sufficiently la… ▽ More

    Submitted 16 September, 2021; originally announced September 2021.

    Comments: Author's version of a paper accepted for publication in Proceedings of the 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall)

  38. Towards an Approach to Contextual Detection of Multi-Stage Cyber Attacks in Smart Grids

    Authors: Ömer Sen, Dennis van der Velde, Katharina A. Wehrmeister, Immanuel Hacker, Martin Henze, Michael Andres

    Abstract: Electric power grids are at risk of being compromised by high-impact cyber-security threats such as coordinated, timed attacks. Navigating this new threat landscape requires a deep understanding of the potential risks and complex attack processes in energy information systems, which in turn demands an unmanageable manual effort to timely process a large amount of cross-domain information. To provi… ▽ More

    Submitted 6 September, 2021; originally announced September 2021.

    Comments: To be published in Proceedings of the 2021 International Conference on Smart Energy Systems and Technologies (SEST)

  39. arXiv:2105.05346  [pdf, other

    astro-ph.HE astro-ph.SR

    Nova LMC 2009a as observed with XMM-Newton, compared with other novae

    Authors: Marina Orio, Andrej Dobrotka, Ciro Pinto, Martin Henze, Jan-Uwe Ness, Nataly Ospina, Songpeng Pei, Ehud Behar, Michael F. Bode, Sou Her, Margarita Hernanz, Gloria Sala

    Abstract: We examine four high resolution reflection grating spectrometers (RGS) spectra of the February 2009 outburst of the luminous recurrent nova LMC 2009a. They were very complex and rich in intricate absorption and emission features. The continuum was consistent with a dominant component originating in the atmosphere of a shell burning white dwarf (WD) with peak effective temperature between 810,000 K… ▽ More

    Submitted 11 May, 2021; originally announced May 2021.

    Comments: Accepted for publication in MNRAS

  40. arXiv:2105.00013  [pdf

    cs.CR cs.NI eess.SY

    Cybersecurity in Power Grids: Challenges and Opportunities

    Authors: Tim Krause, Raphael Ernst, Benedikt Klaer, Immanuel Hacker, Martin Henze

    Abstract: Increasing volatilities within power transmission and distribution force power grid operators to amplify their use of communication infrastructure to monitor and control their grid. The resulting increase in communication creates a larger attack surface for malicious actors. Indeed, cyber attacks on power grids have already succeeded in causing temporary, large-scale blackouts in the recent past.… ▽ More

    Submitted 5 October, 2021; v1 submitted 30 April, 2021; originally announced May 2021.

    Comments: 19 pages, 2 figures, 1 table

    Journal ref: Sensors 2021, 21(18), 6225

  41. Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes

    Authors: Eric Wagner, Jan Bauer, Martin Henze

    Abstract: Message authentication guarantees the integrity of messages exchanged over untrusted channels. However, to achieve this goal, message authentication considerably expands packet sizes, which is especially problematic in constrained wireless environments. To address this issue, progressive message authentication provides initially reduced integrity protection that is often sufficient to process mess… ▽ More

    Submitted 19 May, 2022; v1 submitted 15 March, 2021; originally announced March 2021.

    Comments: ACM WiSec'22

  42. Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments

    Authors: Markus Dahlmanns, Johannes Lohmöller, Ina Berenice Fink, Jan Pennekamp, Klaus Wehrle, Martin Henze

    Abstract: Due to increasing digitalization, formerly isolated industrial networks, e.g., for factory and process automation, move closer and closer to the Internet, mandating secure communication. However, securely setting up OPC UA, the prime candidate for secure industrial communication, is challenging due to a large variety of insecure options. To study whether Internet-facing OPC UA appliances are confi… ▽ More

    Submitted 26 October, 2020; originally announced October 2020.

    Comments: 10 pages, 7 figures

    Journal ref: In Proceedings of the ACM Internet Measurement Conference 2020 (IMC '20). Association for Computing Machinery, New York, NY, USA, 101-110

  43. A Theory for the Maximum Magnitude versus Rate of Decline (MMRD) Relation of Classical Novae

    Authors: Izumi Hachisu, Hideyuki Saio, Mariko Kato, Martin Henze, Allen W. Shafter

    Abstract: We propose a theory for the MMRD relation of novae, using free-free emission model light curves built on the optically thick wind theory. We calculated $(t_3,M_{V,\rm max})$ for various sets of $(\dot M_{\rm acc}, M_{\rm WD})$, where $M_{V,\rm max}$ is the peak absolute $V$ magnitude, $t_3$ is the 3-mag decay time from the peak, and $\dot M_{\rm acc}$ is the mass accretion rate on to the white dwa… ▽ More

    Submitted 7 September, 2020; originally announced September 2020.

    Comments: 23 pages, 9 figures, to appear in ApJ

  44. arXiv:2009.00273  [pdf, other

    cs.SE cs.CR cs.NI eess.SY

    Graph-based Model of Smart Grid Architectures

    Authors: Benedikt Klaer, Ömer Sen, Dennis van der Velde, Immanuel Hacker, Michael Andres, Martin Henze

    Abstract: The rising use of information and communication technology in smart grids likewise increases the risk of failures that endanger the security of power supply, e.g., due to errors in the communication configuration, faulty control algorithms, or cyber-attacks. Co-simulations can be used to investigate such effects, but require precise modeling of the energy, communication, and information domain wit… ▽ More

    Submitted 1 September, 2020; originally announced September 2020.

    Comments: 6 pages, 5 figures, to be published in Proceedings of the 3rd International Conference on Smart Energy Systems and Technologies (SEST)

  45. arXiv:2004.06911  [pdf, other

    cs.CR cs.NI

    How to Securely Prune Bitcoin's Blockchain

    Authors: Roman Matzutt, Benedikt Kalde, Jan Pennekamp, Arthur Drichel, Martin Henze, Klaus Wehrle

    Abstract: Bitcoin was the first successful decentralized cryptocurrency and remains the most popular of its kind to this day. Despite the benefits of its blockchain, Bitcoin still faces serious scalability issues, most importantly its ever-increasing blockchain size. While alternative designs introduced schemes to periodically create snapshots and thereafter prune older blocks, already-deployed systems such… ▽ More

    Submitted 15 April, 2020; originally announced April 2020.

    Comments: To be published in the proceedings of the 2020 IFIP Networking Conference (NETWORKING'20)

  46. Assessing the Security of OPC UA Deployments

    Authors: Linus Roepert, Markus Dahlmanns, Ina Berenice Fink, Jan Pennekamp, Martin Henze

    Abstract: To address the increasing security demands of industrial deployments, OPC UA is one of the first industrial protocols explicitly designed with security in mind. However, deploying it securely requires a thorough configuration of a wide range of options. Thus, assessing the security of OPC UA deployments and their configuration is necessary to ensure secure operation, most importantly confidentiali… ▽ More

    Submitted 27 March, 2020; originally announced March 2020.

    Comments: 2 pages, 1 figure, to be published in Proceedings of the 1st ITG Workshop on IT Security (ITSec)

  47. Methods for Actors in the Electric Power System to Prevent, Detect and React to ICT Attacks and Failures

    Authors: Dennis van der Velde, Martin Henze, Philipp Kathmann, Erik Wassermann, Michael Andres, Detert Bracht, Raphael Ernst, George Hallak, Benedikt Klaer, Philipp Linnartz, Benjamin Meyer, Simon Ofner, Tobias Pletzer, Richard Sethmann

    Abstract: The fundamental changes in power supply and increasing decentralization require more active grid operation and an increased integration of ICT at all power system actors. This trend raises complexity and increasingly leads to interactions between primary grid operation and ICT as well as different power system actors. For example, virtual power plants control various assets in the distribution gri… ▽ More

    Submitted 13 March, 2020; originally announced March 2020.

    Comments: 6 pages, 4 figures, to be published in Proceedings of the 2020 6th IEEE International Energy Conference (ENERGYCon)

  48. arXiv:1910.12754  [pdf, other

    astro-ph.HE astro-ph.GA

    Deep XMM-Newton observations of the northern disk of M31 II: Tracing the hot interstellar medium

    Authors: Patrick J. Kavanagh, Manami Sasaki, Dieter Breitschwerdt, Miguel A. de Avillez, Miroslav D. Filipovic, Timothy Galvin, Frank Haberl, Despina Hatzidimitriou, Martin Henze, Paul P. Plucinsky, Sara Saeedi, Kirill V. Sokolovsky, Benjamin F. Williams

    Abstract: Aims: We use new deep XMM-Newton observations of the northern disk of M 31 to trace the hot interstellar medium (ISM) in unprecedented detail and to characterise the physical properties of the X-ray emitting plasmas. Methods: We used all XMM-Newton data up to and including our new observations to produce the most detailed image yet of the hot ISM plasma in a grand design spiral galaxy such as our… ▽ More

    Submitted 31 March, 2020; v1 submitted 28 October, 2019; originally announced October 2019.

    Comments: 23 pages, 14 figures, accepted for publication in Astronomy & Astrophysics

    Journal ref: A&A 637, A12 (2020)

  49. arXiv:1909.10497  [pdf, other

    astro-ph.SR astro-ph.GA astro-ph.HE

    On a century of extragalactic novae and the rise of the rapid recurrent novae

    Authors: Matthew J. Darnley, Martin Henze

    Abstract: Novae are the observable outcome of a transient thermonuclear runaway on the surface of an accreting white dwarf in a close binary system. Their high peak luminosity renders them visible in galaxies out beyond the distance of the Virgo Cluster. Over the past century, surveys of extragalactic novae, particularly within the nearby Andromeda Galaxy, have yielded substantial insights regarding the pro… ▽ More

    Submitted 23 September, 2019; originally announced September 2019.

    Comments: 21 pages, 5 figures, 6 tables. Accepted for publication in a Special Issue of Advances in Space Research, entitled "Nova Eruptions, Cataclysmic Variables and Related Systems: observational vs theoretical challenges in the 2020 era", following COSPAR 2018, edited by Solen Balman

  50. arXiv:1909.03281  [pdf, other

    astro-ph.SR astro-ph.HE

    The January 2016 eruption of recurrent nova LMC 1968

    Authors: N. P. M. Kuin, K. L. Page, P. Mróz, M. J. Darnley, S. N. Shore, J. P. Osborne, F. Walter, F. Di Mille, N. Morrell, U. Munari, T. Bohlsen, A. Evans, R. D. Gehrz, S. Starrfield, M. Henze, S. C. Williams, G. J. Schwarz, A. Udalski, M. K. Szymański, R. Poleski, I. Soszyński, V. A. R. M. Ribeiro, R. Angeloni, A. A. Breeveld, A. P. Beardmore , et al. (1 additional authors not shown)

    Abstract: We present a comprehensive review of all observations of the eclipsing recurrent Nova LMC 1968 in the Large Magellanic Cloud which was previously observed in eruption in 1968, 1990, 2002, 2010, and most recently in 2016. We derive a probable recurrence time of $6.2 \pm 1.2$ years and provide the ephemerides of the eclipse. In the ultraviolet-optical-IR photometry the light curve shows high variabi… ▽ More

    Submitted 20 October, 2019; v1 submitted 7 September, 2019; originally announced September 2019.

    Comments: MNRAS accepted October 18, 2019