Skip to main content

Showing 1–3 of 3 results for author: Heyszl, J

Searching in archive cs. Search in all archives.
.
  1. Secure and User-Friendly Over-the-Air Firmware Distribution in a Portable Faraday Cage

    Authors: Martin Striegel, Florian Jakobsmeier, Yacov Matveev, Johann Heyszl, Georg Sigl

    Abstract: Setting up a large-scale wireless sensor network is challenging, as firmware must be distributed and trust between sensor nodes and a backend needs to be established. To perform this task efficiently, we propose an approach named Box, which utilizes an intelligent Faraday cage (FC). The FC acquires firmware images and secret keys from a backend, patches the firmware with the keys and deploys those… ▽ More

    Submitted 25 May, 2020; originally announced May 2020.

    Comments: 11 pages, 5 figures. Accepted at 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20), July 8--10, 2020, Linz (Virtual Event), Austria

  2. arXiv:1907.12364  [pdf

    cs.NI cs.CR cs.HC

    EyeSec: A Retrofittable Augmented Reality Tool for Troubleshooting Wireless Sensor Networks in the Field

    Authors: Martin Striegel, Carsten Rolfes, Johann Heyszl, Fabian Helfert, Maximilian Hornung, Georg Sigl

    Abstract: Wireless Sensor Networks (WSNs) often lack interfaces for remote debugging. Thus, fault diagnosis and troubleshooting are conducted at the deployment site. Currently, WSN operators lack dedicated tools that aid them in this process. Therefore, we introduce EyeSec, a tool for WSN monitoring and maintenance in the field. An Augmented Reality Device (AR Device) identifies sensor nodes using optical m… ▽ More

    Submitted 8 July, 2019; originally announced July 2019.

    Comments: Published at the International Conference on Embedded Wireless Systems and Networks (EWSN) 2019

    ACM Class: H.4.m; H.5.2; C.2.3; C.2.4

    Journal ref: Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, EWSN 2019, Beijing, China, February 25-27, 2019

  3. arXiv:1703.09763  [pdf, other

    cs.CR

    AutoLock: Why Cache Attacks on ARM Are Harder Than You Think

    Authors: Marc Green, Leandro Rodrigues-Lima, Andreas Zankl, Gorka Irazoqui, Johann Heyszl, Thomas Eisenbarth

    Abstract: Attacks on the microarchitecture of modern processors have become a practical threat to security and privacy in desktop and cloud computing. Recently, cache attacks have successfully been demonstrated on ARM based mobile devices, suggesting they are as vulnerable as their desktop or server counterparts. In this work, we show that previous literature might have left an overly pessimistic conclusion… ▽ More

    Submitted 28 March, 2017; originally announced March 2017.