Skip to main content

Showing 1–16 of 16 results for author: Aßmuth, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.16719  [pdf, other

    cs.CR

    Practical Acoustic Eavesdropping On Typed Passphrases

    Authors: Darren Fürst, Andreas Aßmuth

    Abstract: Cloud services have become an essential infrastructure for enterprises and individuals. Access to these cloud services is typically governed by Identity and Access Management systems, where user authentication often relies on passwords. While best practices dictate the implementation of multi-factor authentication, it's a reality that many such users remain solely protected by passwords. This reli… ▽ More

    Submitted 7 April, 2025; v1 submitted 20 March, 2025; originally announced March 2025.

    Comments: 8 pages, 9 figures

    Journal ref: Proc of the 16th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2025), pp. 9-16, Valencia, Spain, April 2025, ISSN 2308-4294

  2. arXiv:2503.16392  [pdf, ps, other

    cs.CR cs.AI cs.DC

    Graph of Effort: Quantifying Risk of AI Usage for Vulnerability Assessment

    Authors: Anket Mehra, Andreas Aßmuth, Malte Prieß

    Abstract: With AI-based software becoming widely available, the risk of exploiting its capabilities, such as high automation and complex pattern recognition, could significantly increase. An AI used offensively to attack non-AI assets is referred to as offensive AI. Current research explores how offensive AI can be utilized and how its usage can be classified. Additionally, methods for threat modeling are… ▽ More

    Submitted 7 April, 2025; v1 submitted 20 March, 2025; originally announced March 2025.

    Comments: 8 pages, 4 figures

    Journal ref: Proc of the 16th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2025), Valencia, Spain, April 2025, pp. 17-24, ISSN 2308-4294

  3. arXiv:2407.09142  [pdf, other

    cs.CR cs.DC cs.SE

    Securing Confidential Data For Distributed Software Development Teams: Encrypted Container File

    Authors: Tobias J. Bauer, Andreas Aßmuth

    Abstract: In the context of modern software engineering, there is a trend towards Cloud-native software development involving international teams with members from all over the world. Cloud-based version management services like GitHub are commonly used for source code and other files. However, a challenge arises when developers from different companies or organizations share the platform, as sensitive data… ▽ More

    Submitted 12 July, 2024; originally announced July 2024.

    Comments: 18 pages, for associated implementation etc., see https://github.com/Hirnmoder/ECF

    Journal ref: International Journal On Advances in Security, vol. 17, no. 1 and 2, pp. 11-28, 2024, ISSN 1942-2636

  4. arXiv:2405.16318  [pdf, other

    cs.CR cs.DC

    Analyzing the Attack Surface and Threats of Industrial Internet of Things Devices

    Authors: Simon Liebl, Leah Lathrop, Ulrich Raithel, Andreas Aßmuth, Ian Ferguson, Matthias Söllner

    Abstract: The growing connectivity of industrial devices as a result of the Internet of Things is increasing the risks to Industrial Control Systems. Since attacks on such devices can also cause damage to people and machines, they must be properly secured. Therefore, a threat analysis is required in order to identify weaknesses and thus mitigate the risk. In this paper, we present a systematic and holistic… ▽ More

    Submitted 25 May, 2024; originally announced May 2024.

    Comments: 12 pages

    Journal ref: International Journal On Advances in Security, vol. 14, no. 1 and 2, pp. 59-70, 2021

  5. arXiv:2405.16314  [pdf, other

    cs.CR

    Threat Analysis of Industrial Internet of Things Devices

    Authors: Simon Liebl, Leah Lathrop, Ulrich Raithel, Matthias Söllner, Andreas Aßmuth

    Abstract: As part of the Internet of Things, industrial devices are now also connected to cloud services. However, the connection to the Internet increases the risks for Industrial Control Systems. Therefore, a threat analysis is essential for these devices. In this paper, we examine Industrial Internet of Things devices, identify and rank different sources of threats and describe common threats and vulnera… ▽ More

    Submitted 25 May, 2024; originally announced May 2024.

    Comments: 7 pages

    Journal ref: Proc of the 11th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2020), Nice, France, Apr 2020, pp. 31-37, ISSN 2308-4294

  6. arXiv:2405.11836  [pdf, other

    cs.DC

    PLASMA -- Platform for Service Management in Digital Remote Maintenance Applications

    Authors: Natascha Stumpp, Doris Aschenbrenner, Manuel Stahl, Andreas Aßmuth

    Abstract: To support maintenance and servicing of industrial machines, service processes are even today often performed manually and analogously, although supportive technologies such as augmented reality, virtual reality and digital platforms already exist. In many cases, neither technicians on-site nor remote experts have all the essential information and options for suitable actions available. Existing s… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

    Comments: 4 pages

    Journal ref: Proc of the 10th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2019), Venice, Italy, May 2019, pp. 78-81, ISSN 2308-4294

  7. arXiv:2405.11368  [pdf, other

    cs.CR cs.DC

    Security of Cloud Services with Low-Performance Devices in Critical Infrastructures

    Authors: Michael Molle, Ulrich Raithel, Dirk Kraemer, Norbert Graß, Matthias Söllner, Andreas Aßmuth

    Abstract: As part of the Internet of Things (IoT) and Industry 4.0 Cloud services are increasingly interacting with low-performance devices that are used in automation. This results in security issues that will be presented in this paper. Particular attention is paid to so-called critical infrastructures. The authors intend to work on the addressed security challenges as part of a funded research project, u… ▽ More

    Submitted 18 May, 2024; originally announced May 2024.

    Comments: 5 pages

    Journal ref: Proc of the 10th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2019), Venice, Italy, May 2019, pp. 88-92, ISSN 2308-4294

  8. arXiv:2405.11350  [pdf, ps, other

    cs.CR cs.DC

    Cloud Security and Security Challenges Revisited

    Authors: Fabian Süß, Marco Freimuth, Andreas Aßmuth, George R. S. Weir, Bob Duncan

    Abstract: In recent years, Cloud Computing has transformed local businesses and created new business models on the Internet- and Cloud services are still flourishing. But after the emphatic hype in the early years, a more realistic perception of Cloud services has emerged. One reason for this surely is that today, Cloud Computing is considered as an established and well-accepted technology and no longer as… ▽ More

    Submitted 18 May, 2024; originally announced May 2024.

    Comments: 6 pages

    Journal ref: Proc of the 10th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2019), Venice, Italy, May 2019, pp. 61-66, ISSN 2308-4294

  9. arXiv:2405.11341  [pdf, other

    cs.CR cs.DC

    A Secure and Privacy-Friendly Logging Scheme

    Authors: Andreas Aßmuth, Robert Duncan, Simon Liebl, Matthias Söllner

    Abstract: Finding a robust security mechanism for audit trail logging has long been a poorly satisfied goal. There are many reasons for this. The most significant of these is that the audit trail is a highly sought after goal of attackers to ensure that they do not get caught. Thus they have an incredibly strong incentive to prevent companies from succeeding in this worthy aim. Regulation, such as the Europ… ▽ More

    Submitted 18 May, 2024; originally announced May 2024.

    Comments: 5 pages

    Journal ref: Proc of the 12th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2021), Porto, Portugal, April 2021, pp. 8-12, ISSN 2308-4294

  10. arXiv:2405.11316  [pdf, other

    cs.CR cs.DC

    Securing 3rd Party App Integration in Docker-based Cloud Software Ecosystems

    Authors: Christian Binkowski, Stefan Appel, Andreas Aßmuth

    Abstract: Open software ecosystems are beneficial for customers; they benefit from 3rd party services and applications, e.g. analysis of data using apps, developed and deployed by other companies or open-source communities. One significant advantage of this approach is that other customers may benefit from these newly developed applications as well. Especially software ecosystems utilizing container technol… ▽ More

    Submitted 18 May, 2024; originally announced May 2024.

    Comments: 7 pages

    Journal ref: Proc of the 9th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2018), Barcelona, Spain, February 2018, pp. 77-83, ISSN 2308-4294

  11. arXiv:2405.09412  [pdf, other

    cs.CR cs.LG cs.NI

    Distinguishing Tor From Other Encrypted Network Traffic Through Character Analysis

    Authors: Pitpimon Choorod, Tobias J. Bauer, Andreas Aßmuth

    Abstract: For journalists reporting from a totalitarian regime, whistleblowers and resistance fighters, the anonymous use of cloud services on the Internet can be vital for survival. The Tor network provides a free and widely used anonymization service for everyone. However, there are different approaches to distinguishing Tor from non-Tor encrypted network traffic, most recently only due to the (relative)… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

    Comments: 5 pages

    Journal ref: Proc of the 15th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2024), Venice, Italy, May 2024, pp. 8-12, ISSN 2308-4294

  12. arXiv:2405.09398  [pdf, ps, other

    cs.DC cs.CR cs.SE

    Encrypted Container File: Design and Implementation of a Hybrid-Encrypted Multi-Recipient File Structure

    Authors: Tobias J. Bauer, Andreas Aßmuth

    Abstract: Modern software engineering trends towards Cloud-native software development by international teams of developers. Cloud-based version management services, such as GitHub, are used for the source code and other artifacts created during the development process. However, using such a service usually means that every developer has access to all data stored on the platform. Particularly, if the develo… ▽ More

    Submitted 18 May, 2024; v1 submitted 15 May, 2024; originally announced May 2024.

    Comments: 7 pages, for associated implementation etc., see https://github.com/Hirnmoder/ECF

    Journal ref: Proc of the 14th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2023), Nice, France, June 2023, pp. 1-7, ISSN 2308-4294

  13. arXiv:2405.07265  [pdf, other

    cs.DC cs.CR

    An Approach for Decentralized Authentication in Networks of UAVs

    Authors: Nicholas Jäger, Andreas Aßmuth

    Abstract: We propose a decentralized authentication system for networks of unmanned aerial vehicles. A blockchain-based public key infrastructure allows the usage of public key cryptography and public key based authentication protocols. The blockchain provides a common storage of the public keys and their relations and can provide the required information for the authentication process. Furthermore, the unm… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

    Comments: 5 pages

    Journal ref: Proc of the 12th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2021), Porto Portugal, April 2021, pp. 13-17, ISSN 2308-4294

  14. arXiv:2405.06455  [pdf, other

    cs.DC

    Managing Forensic Recovery in the Cloud

    Authors: George R. S. Weir, Andreas Aßmuth, Nicholas Jäger

    Abstract: As organisations move away from locally hosted computer services toward Cloud platforms, there is a corresponding need to ensure the forensic integrity of such instances. The primary reasons for concern are (i) the locus of responsibility, and (ii) the associated risk of legal sanction and financial penalty. Building upon previously proposed techniques for intrusion monitoring, we highlight the mu… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

    Comments: 6 pages

    Journal ref: Proc of the 9th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2018), Barcelona, Spain, February 2018, pp. 45-50, ISSN 2308-4294

  15. arXiv:2405.02070  [pdf, other

    cs.CR cs.DC

    Strategies for Intrusion Monitoring in Cloud Services

    Authors: George R. S. Weir, Andreas Aßmuth

    Abstract: Effective activity and event monitoring is an essential aspect of digital forensic readiness. Techniques for capturing log and other event data are familiar from conventional networked hosts and transfer directly to the Cloud context. In both contexts, a major concern is the risk that monitoring systems may be targeted and impaired by intruders seeking to conceal their illicit presence and activit… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

    Comments: 5 pages

    Journal ref: Proc of the 8th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2017), Athens, Greece, February 2017, pp. 49-53, ISSN 2308-4294

  16. arXiv:2310.19459  [pdf, other

    cs.CR cs.AI cs.DC cs.NI cs.SE

    Security Challenges for Cloud or Fog Computing-Based AI Applications

    Authors: Amir Pakmehr, Andreas Aßmuth, Christoph P. Neumann, Gerald Pirkl

    Abstract: Security challenges for Cloud or Fog-based machine learning services pose several concerns. Securing the underlying Cloud or Fog services is essential, as successful attacks against these services, on which machine learning applications rely, can lead to significant impairments of these applications. Because the requirements for AI applications can also be different, we differentiate according to… ▽ More

    Submitted 20 December, 2023; v1 submitted 30 October, 2023; originally announced October 2023.

    Journal ref: Proc of the 14th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2023), Nice, France, June 2023, pp. 21-29, ISSN 2308-4294