Sprechstunde

Bitte vereinbaren Sie bei Bedarf einen Termin mit mir über unser Sekretariat (Frau Fehlberg) oder per Email.

              

Prof. Dr. rer. nat. Frank Kargl

Prof. Kargl promovierte 2003 und habilitierte sich 2009 an der Universität Ulm. Davor war er unter anderem Mitgründer der Arago AG und in der Netzgruppe des Rechenzentrums / KIZ der Uni Ulm für Netzwerkbetrieb und -sicherheit verantwortlich. Zwischen Ende 2009 und Anfang 2012 war er als Associate Professor in der Gruppe für Distributed and Embedded Security (DIES) der Universität Twente in den Niederlanden tätig, danach bis Januar 2016 als Adjunct Professor. Seit Februar 2012 leitet Prof. Kargl das Institut für Verteilte Systeme an der Uni Ulm. Von Oktober 2013 bis September 2016 fungierte er als Prodekan der Fakultät für Ingenieurwissenschaften, Informatik und Psychologie, deren Dekan er seit Oktober 2016 ist. Prof. Kargl ist Mitglied der ACM, der IEEE, der Gesellschaft für Informatik, GI und der Fachgruppen Sicherheit und KuVS.

Forschung

Meine Forschungsinteressen liegen im Bereich mobiler und selbst-organisierender Netzwerke, vor allem der Mobilen Ad-hoc Netzwerke und der Fahrzeug-Fahrzeug-Kommunikation. Ein weiterer Schwerpunkt meiner Arbeit sind Security und Privacy in IT-Systemen. Viele meiner Forschungsprojekte bewegen sich im Überlappungsbereich beider Themen, so z.B. Projekte zu Sicherheit und Privacy von Vehicular Ad-hoc Networks. Andere Arbeiten beschäftigen sich mit der Sicherheit von vernetzten eingebetteten Systemen, z.B. im Kontext der Industrial Control Systems oder bei Building Automation. Weitere Projekte beschäftigen sich mit Secure Cloud Computing, Crypto-Currencies, verteiltem Graphen-basiertem Computing und vielen anderen Themen.

Lehre

Die aktuellen Veranstaltungen von Prof. Kargl entnehmen Sie bitte unserer aktuellen Lehre-Seite.

Gremien und Funktionen

Prof. Kargl ist aktuell Dekan der Fakultät für Ingenieurwissenschaften, Informatik und Psychologie.

Publikationen


2017

Lukaseder, Thomas; Hunt, Alexander; Stehle, Christian; Wagner, Denis; van der Heijden, Rens; Kargl, Frank
An Extensible Host-Agnostic Framework for SDN-Assisted DDoS-Mitigation
Proceedings of the 42nd IEEE Conference on Local Computer Networks (LCN),
Oktober 2017
akzeptiert
Bradatsch, Leonard; Lukaseder, Thomas; Kargl, Frank
A Testing Framework for High-Speed Network and Security Devices
Proceedings of the 42nd IEEE Conference on Local Computer Networks (LCN),
Oktober 2017
akzeptiert
Erb, Benjamin; Meißner, Dominik; Pietron, Jakob; Kargl, Frank
Chronograph – A Distributed Processing Platform for Online and Batch Computations on Event-sourced Graphs
Proceedings of the 11th ACM International Conference on Distributed Event-Based Systems
Juni 2017
Corbett, Christopher; Basic, Tobias; Lukaseder, Thomas; Kargl, Frank
A Testing Framework Architecture Concept for Automotive Intrusion Detection Systems
Proceedings of Automotive - Safety and Security 2017
Mai 2017

Zusammenfassung: Vehicles are the target of a rising number of hacking attacks. The integration of in-vehicle intrusion detection systems is a common approach to increase the overall system security. However, testing and evaluating these systems is difficult due to the lack of tools to generate realistic benign and malicious workloads as well as sharing these workloads with other researchers. Currently, test- ing tools are predominantly intended for Network Intrusion Detection System (NIDS) in company or industrial networks where their usefulness became apparent. Yet, in the automotive domain, develop- ment of testing tools is still in the early stages. Existing non-commercial automotive tools only focus on one specific bus technology each. However, in-vehicle communication exceeds bus technology boundaries and a testing tool must cover multiple technologies. We propose a framework architec- ture concept for in-vehicle NIDS testing and evaluation to enable the creation of realistic network traffic and attacks in consideration of automotive specific challenges. Our concept provides the op- portunity to share data without additional anonymization effort therefore improving cooperation and reproducibility of testing results.

Erb, Benjamin; Meißner, Dominik; Habiger, Gerhard; Pietron, Jakob; Kargl, Frank
Consistent Retrospective Snapshots in Distributed Event-sourced Systems
Proceedings of the International Conference on Networked Systems 2017
März 2017

Zusammenfassung: An increasing number of distributed, event-based systems adopt an architectural style called event sourcing, in which entities keep their entire history in an event log. Event sourcing enables data lineage and allows entities to rebuild any previous state. Restoring previous application states is a straightforward task in event-sourced systems with a global and totally ordered event log. However, the extraction of causally consistent snapshots from distributed, individual event logs is rendered non-trivial due to causal relationships between communicating entities. High dynamicity of entities increases the complexity of such reconstructions even more. We present approaches for retrospective and global state extraction of event-sourced applications based on distributed event logs. We provide an overview on historical approaches towards distributed debugging and breakpointing, which are closely related to event log-based state reconstruction. We then introduce and evaluate our approach for non-local state extraction from distributed event logs, which is specifically adapted for dynamic and asynchronous event-sourced systems.

Kopp, Henning; Mödinger, David; Bösch, Christoph; Hauck, Franz; Kargl, Frank
PriCloud: A Distributed File Storage with Financial Incentives
Februar 2017
Kopp, Henning; Mödinger, David; Hauck, Franz J.; Kargl, Frank; Bösch, Christoph
Design of a Privacy-Preserving Decentralized File Storage with Financial Incentives
Proceedings of IEEE Security \& Privacy on the Blockchain (IEEE S\&B) (affiliated with EUROCRYPT 2017)
Herausgeber: IEEE,
2017

Zusammenfassung: Surveys indicate that users are often afraid to entrust data to cloud storage providers, because these do not offer sufficient privacy. On the other hand, peer-2-peer–based privacy-preserving storage systems like Freenet suffer from a lack of contribution and storage capacity, since there is basically no incentive to contribute own storage capacity to other participants in the network. We address these contradicting requirements by a design which combines a distributed storage with a privacy-preserving blockchain-based payment system to create incentives for participation while maintaining user privacy. By following a Privacy-by-Design strategy integrating privacy throughout the whole system life cycle, we show that it is possible to achieve levels of privacy comparable to state-of-the-art distributed storage technologies, despite integrating a payment mechanism. Our results show that it is possible to combine storage contracts and payments in a privacy-preserving way. Further, our system design may serve as an inspiration for future similar architectures.

2016

Erb, Benjamin; Kargl, Frank
Chronograph–A Distributed Platform for Event-Sourced Graph Computing
Proceedings of the Posters and Demos Session of the 17th International Middleware Conference
Dezember 2016

Zusammenfassung: Many data-driven applications require mechanisms for processing interconnected or graph-based data sets. Several platforms exist for offline processing of such data and fewer solutions address online computations on dynamic graphs. We combined a modified actor model, an event-sourced persistence layer, and a vertex-based, asynchronous programming model in order to unify event-driven and graph-based computations. Our distributed chronograph platform supports both near-realtime and batch computations on dynamic, event-driven graph topologies, and enables full history tracking of the evolving graphs over time.

Al-Momani, Ala'a; van der Heijden, Rens W.; Kargl, Frank; Waldschmidt, Christian
Exploiting Propagation Effects for Authentication and Misbehavior Detection in VANETs
Proceedings of the 2016 IEEE Vehicular Networking Conference (VNC)
Herausgeber: IEEE,
Dezember 2016

Zusammenfassung: Vehicular Ad-hoc Networks (VANETs) are a critical and potentially vulnerable target for attacks on both message integrity and authenticity. Existing approaches are based on computationally expensive digital signature, which also creates large message sizes due to the attachment of signatures and certificates to messages. This leads to high communication and verification overheads, both in terms of bandwidth and compu- tational effort. In this paper we discuss an alternative approach to ensure message integrity using characteristics of the received signal for authentication and misbehavior detection.

Kopp, Henning; Bösch, Christoph; Kargl, Frank
KopperCoin - A Distributed File Storage with Financial Incentives
In Bao, Feng and Chen, Liqun and Deng, Robert H. and Wang, Guojun, Editor, Information Security Practice and Experience: 12th International Conference, ISPEC 2016, Proceedings , Seite 79-93.
Herausgeber: Springer,
November 2016
ISBN: 978-3-319-49151-6

Zusammenfassung: One of the current problems of peer-to-peer-based file storage systems like Freenet is missing participation, especially of storage providers. Users are expected to contribute storage resources but may have little incentive to do so. In this paper we propose KopperCoin, a token system inspired by Bitcoin’s blockchain which can be integrated into a peer-to-peer file storage system. In contrast to Bitcoin, KopperCoin does not rely on a proof of work (PoW) but instead on a proof of retrievability (PoR). Thus it is not computationally expensive and instead requires participants to contribute file storage to maintain the network. Participants can earn digital tokens by providing storage to other users, and by allowing other participants in the network to download files. These tokens serve as a payment mechanism. Thus we provide direct reward to participants contributing storage resources.

Lukaseder, Thomas; Bradatsch, Leonard; Erb, Benjamin; van der Heijden, Rens W.; Kargl, Frank
A Comparison of TCP Congestion Control Algorithms in 10G Networks
Proceedings of the 41st IEEE Conference on Local Computer Networks (LCN) , Seite 706-714.
November 2016

Zusammenfassung: The increasing availability of 10G Ethernet network capabilities challenges existing transport layer protocols. As 10G connections gain momentum outside of backbone networks, the choice of appropriate TCP congestion control algorithms becomes even more relevant for networked applications running in environments such as data centers. Therefore, we provide an extensive overview of relevant TCP congestion control algorithms for high-speed environments leveraging 10G. We analyzed and evaluated six TCP variants using a physical network testbed, with a focus on the effects of propagation delay and significant drop rates. The results indicate that of the algorithms compared, BIC is most suitable when no legacy variant is present; CUBIC is suggested otherwise.

Lukaseder, Thomas; Bradatsch, Leonard; Erb, Benjamin; Kargl, Frank
Setting Up a High-Speed TCP Benchmarking Environment — Lessons Learned
Proceedings of the 41st IEEE Conference on Local Computer Networks (LCN) , Seite 160-163.
November 2016

Zusammenfassung: There are many high-speed TCP variants with different congestion control algorithms, which are designed for specific settings or use cases. Distinct features of these algorithms are meant to optimize different aspects of network performance, and the choice of TCP variant strongly influences application performance. However, setting up tests to help with the decision of which variant to use can be problematic, as many systems are not designed to deal with high bandwidths, such as 10 Gbps or more. This paper provides an overview of pitfalls and challenges of realistic network analysis to help in the decision making process.

Caselli, Marco; Kargl, Frank
A Security Assessment Methodology for Critical Infrastructures
In G. Christos Panayiotou, Georgios Ellinas, Elias Kyriakides and M. Marios Polycarpou, Editor, Critical Information Infrastructures Security: 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers , Seite 332-343.
Herausgeber: Springer International Publishing,
Oktober 2016
ISBN: 978-3-319-31664-2
Meißner, Dominik; Erb, Benjamin; van der Heijden, Rens W.; Lange, Kristin; Kargl, Frank
Mobile Triage Management in Disaster Area Networks Using Decentralized Replication
Proceedings of the Tenth ACM MobiCom Workshop on Challenged Networks , Seite 7-12.
Herausgeber: ACM,
Oktober 2016
ISBN: 978-1-4503-4256-8

Zusammenfassung: In large-scale disaster scenarios, efficient triage management is a major challenge for emergency services. Rescue forces traditionally respond to such incidents with a paper-based triage system, but technical solutions can potentially achieve improved usability and data availability. We develop a triage management system based on commodity hardware and software components to verify this claim. We use a single-hop, ad-hoc network architecture with multi-master replication, a tablet-based device setup and a mobile application for emergency services. We study our system in cooperation with regional emergency services and describe experiences from a field exercise. We show that state-of-the-art commodity technology provides the means necessary to implement a triage management system compatible with existing emergency service procedures, while introducing additional benefits. This work highlights that powerful real-world ad-hoc networking applications do not require unreasonable development effort, as existing tools from distributed systems, like replicating No-SQL databases, can be used successfully.

van der Heijden, Rens W.; Al-Momani, Ala'a; Kargl, Frank; Abu-Sharkh, Osama M.F.
Enhanced Position Verification for VANETs using Subjective Logic
Proceedings of the 2016 IEEE 84th Vehicular Technology Conference: VTC2016-Fall
Herausgeber: IEEE,
September 2016
akzeptiert

Zusammenfassung: The integrity of messages in vehicular ad-hoc networks has been extensively studied by the research community, resulting in the IEEE~1609.2 standard, which provides typical integrity guarantees. However, the correctness of message contents is still one of the main challenges of applying dependable and secure vehicular ad-hoc networks. One important use case is the validity of position information contained in messages: position verification mechanisms have been proposed in the literature to provide this functionality. A more general approach to validate such information is by applying misbehavior detection mechanisms. In this paper, we consider misbehavior detection by enhancing two position verification mechanisms and fusing their results in a generalized framework using subjective logic. We conduct extensive simulations using VEINS to study the impact of traffic density, as well as several types of attackers and fractions of attackers on our mechanisms. The obtained results show the proposed framework can validate position information as effectively as existing approaches in the literature, without tailoring the framework specifically for this use case.

Caselli, Marco; Zambon, Emmanuele; Amann, Johanna; Sommer, Robin; Kargl, Frank
Specification Mining for Intrusion Detection in Networked Control Systems
25th USENIX Security Symposium (USENIX Security 16) , Seite 791-806.
August 2016
ISBN: 978-1-931971-32-4
Kraft, Robin; Erb, Benjamin; Mödinger, David; Kargl, Frank
Using Conflict-Free Replicated Data Types for Serverless Mobile Social Applications
Proceedings of the 8th ACM International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworking , Seite 49-54.
Herausgeber: ACM,
Juli 2016
ISBN: 978-1-4503-4344-2

Zusammenfassung: A basic reason for backend systems in mobile application architectures is the centralized management of state. Mobile clients synchronize local states with the backend in order to maintain an up-to-date view of the application state. As not all mobile social applications require strong consistency guarantees, we survey an alternative approach using special data structures for mobile applications. These data structures only provide eventual consistency, but allow for conflict-free replication between peers. Our analysis collects the requirements of social mobile applications for being suitable for this approach. Based on exemplary mobile social applications, we also point out the benefits of serverless architecture or architectures with a thin backend layer.

Bösch, Christoph; Erb, Benjamin; Kargl, Frank; Kopp, Henning; Pfattheicher, Stefan
Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns
Proceedings on Privacy Enhancing Technologies, 2016(4):237-254
Juli 2016

Zusammenfassung: Privacy strategies and privacy patterns are fundamental concepts of the privacy-by-design engineering approach. While they support a privacy-aware development process for IT systems, the concepts used by malicious, privacy-threatening parties are generally less understood and known. We argue that understanding the ``dark side'', namely how personal data is abused, is of equal importance. In this paper, we introduce the concept of privacy dark strategies and privacy dark patterns and present a framework that collects, documents, and analyzes such malicious concepts. In addition, we investigate from a psychological perspective why privacy dark strategies are effective. The resulting framework allows for a better understanding of these dark concepts, fosters awareness, and supports the development of countermeasures. We aim to contribute to an easier detection and successive removal of such approaches from the Internet to the benefit of its users.

Al-Momani, Ala'a; Kargl, Frank; Waldschmidt, Christian
Physical Layer-Based Message Authentication in VANETs
In Björn Scheuermann, Stefan Dietzel, Editor, Fachgespräch Inter-Vehicle Communication 2016 (FG IVC 2016) , Seite 14-17.
Humboldt-Universität zu Berlin
April 2016

Zusammenfassung: Authenticating legitimate nodes is a major concern of the envisioned vehicular networks. To achieve this, standards and literature propose to use asymmetric cryptographic mechanisms which generate significant overheads in terms of time and power consumption. In this paper, we address this problem and we propose a novel idea of exploiting physical layer characteristics to rely on them for re-authenticating future beacons after verifying the first one cryptographically. Despite the challenges in such high mobility networks, possible concrete approaches to start the evaluation of our scheme are presented. Our approaches are inspired by the vehicular channel related work conclusions which give signs of future success to our scheme in this critical field.

Corbett, Christopher; Schoch, Elmar; Kargl, Frank; Preussner, Felix
Automotive Ethernet: security opportunity or challenge?
In Michael Meier, Delphine Reinhardt, Steffen Wendzel, Editor, Sicherheit 2016. Schutz und Zuverlässigkeit. Konferenzband der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) Band P-256 aus Lecture Notes in Informatics (LNI) , Seite 45-54.
Gesellschaft für Informatik
Herausgeber: Köllen Verlag, Bonn
April 2016
ISBN: 978-3-88579-650-3
Dietzel, Stefan; Gürtler, Julian; Kargl, Frank
A resilient in-network aggregation mechanism for VANETs based on dissemination redundancy
Ad Hoc Networks, 37, Part 1:101 - 109
Februar 2016
ISSN: 1570-8705

Zusammenfassung: Abstract In the field of Vehicular Ad-hoc Networks (VANETs), traffic efficiency applications, such as traffic information systems, are particularly challenging, because they often require the dissemination of information within large geographic areas. Forwarding information over multiple hops is a necessity, and due to the amount of available information, the available wireless capacity is easily exhausted. In-network aggregation protocols are often used to cope with wireless channel restrictions. Their aim is to collaboratively create summaries of traffic information and other information items as information is disseminated within the network. But in-network aggregation is challenging form a security perspective: insider attackers may be able to alter not only their own observations but also modify already aggregated information, or they may introduce false aggregates. As a result, wrong routing decisions may be taken, or drivers may engage in dangerous driving maneuvers. Existing security mechanisms for in-network aggregation often introduce considerable additional overhead, resulting from cryptographic proofs, such as signatures. In this work, we follow a different approach: we design a resilient aggregation mechanism that leverages already existing communication redundancy and combines it with data consistency checks to identify and filter false aggregates information. Our security mechanism introduces limited additional overhead, and simulation results show that at least 20% attacker vehicles can be tolerated by our mechanism.

Förster, David; Kargl, Frank; Löhr, Hans
PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks
Ad Hoc Networks, 37, Part 1:122 - 132
Februar 2016
ISSN: 1570-8705

Zusammenfassung: Abstract Pseudonym certificates are the state-of-the-art approach for secure and privacy-friendly message authentication in vehicular ad-hoc networks. However, most of the proposed pseudonym schemes focus on privacy among participants. Privacy towards backend providers is usually (if at all) only protected by separation of responsibilities. The protection can be overridden, when the entities collaborate, e.g. when revocation of long-term credentials is required. This approach puts the users' privacy at risk, if the backend systems are not fully trusted. We propose PUCA -- a scheme that provides full anonymity for honest users, even against colluding backend providers. The scheme uses anonymous credentials for authentication with the backend, while leaving the communication among vehicles and with road side units unchanged and in compliance with existing standards. For removal of misbehaving vehicles from the system, we leverage a privacy-friendly revocation mechanism, that does not require resolution of pseudonyms. With our scheme, we demonstrate that strong and verifiable privacy protection in vehicular networks can be achieved, while fulfilling common security requirements, such as sybil-resistance and revocation.

2015

Dietzel, Stefan; van der Heijden, Rens W.; Petit, Jonathan; Kargl, Frank
Context-adaptive Detection of Insider Attacks in VANET Information Dissemination Schemes
Vehicular Networking Conference (VNC), 2015 IEEE , Seite 293-300.
Herausgeber: IEEE,
Dezember 2015
Förster, David; Löhr, Hans; Kargl, Frank
Decentralized Enforcement of k-Anonymity for Location Privacy Using Secret Sharing
Vehicular Networking Conference (VNC), 2015 IEEE , Seite 285-292.
Herausgeber: IEEE,
Dezember 2015
Al-Momani, Ala'a; Kargl, Frank; Waldschmidt, Christian; Moser, Steffen; Slomka, Frank
Wireless Channel-Based Message Authentication
Vehicular Networking Conference (VNC), 2015 IEEE , Seite 277-280.
Herausgeber: IEEE,
Dezember 2015

Zusammenfassung: Inter-vehicle communication has attracted a lot of attention in the past. A major concern is the security and especially the integrity and authenticity of messages. Current standards and proposals in literature leverage asymmetric cryptographic mechanisms to achieve this, which is costly both in terms of consumed computational power, bandwidth, and introduced delay. We present a novel idea to use physical characteristics of the wireless channel to verify subsequent messages after initial trust in a first message has been established cryptographically. In this paper, we sketch the concept and provide a first evaluation on its potential for saving named resources.

Petit, Jonathan; Broekhuis, Djurre; Feiri, Michael; Kargl, Frank
Connected Vehicles: Surveillance Threat and Mitigation
Black Hat Europe
November 2015
Petit, Jonathan; Stottelaar, Bas; Feiri, Michael; Kargl, Frank
Remote Attacks on Automated Vehicles Sensors: Experiments on Camera and LiDAR
Black Hat Europe
November 2015
Kleber, Stephan; Unterstein, Florian; Matousek, Matthias; Kargl, Frank; Slomka, Frank; Hiller, Matthias
Design of the Secure Execution PUF-based Processor (SEPP)
Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, TRUDEVICE 2015
September 2015

Zusammenfassung: A persistent problem with program execution is its vulnerability to code injection attacks. Equally unsolved is the susceptibility of software to reverse engineering, which undermines code confidentiality. We propose an approach that solves both kinds of security problems by employing instruction-level code encryption combined with the use of a physical unclonable function (PUF). Our Secure Execution PUF-based Processor (SEPP) architecture is designed to minimize the attack surface, as well as the performance impact, and requires no significant changes to the software development process. Our approach supports distributed systems, as the secure execution environment needs not be physically available to the developer.

Förster, David; Löhr, Hans; Zibuschka, Jan; Kargl, Frank
REWIRE - Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks
In Conti, Mauro and Schunter, Matthias and Askoxylakis, Ioannis, Editor, Trust and Trustworthy Computing Band 9229 aus Lecture Notes in Computer Science , Seite 193-208.
Herausgeber: Springer International Publishing,
August 2015
ISBN: 978-3-319-22845-7
Kleber, Stephan; Unterstein, Florian; Matousek, Matthias; Kargl, Frank; Slomka, Frank; Hiller, Matthias
Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption
IACR,
Juli 2015

Zusammenfassung: A persistent problem with program execution, despite numerous mitigation attempts, is its inherent vulnerability to the injection of malicious code. Equally unsolved is the susceptibility of firmware to reverse engineering, which undermines the manufacturer's code confidentiality. We propose an approach that solves both kinds of security problems employing instruction-level code encryption combined with the use of a physical unclonable function (PUF). Our novel Secure Execution PUF-based Processor (SEPP) architecture is designed to minimize the attack surface, as well as performance impact, and requires no significant changes to the development process. This is possible based on a tight integration of a PUF directly into the processor's instruction pipeline. Furthermore, cloud scenarios and distributed embedded systems alike inherently depend on remote execution; our approach supports this, as the secure execution environment needs not to be locally available at the developers site. We implemented an FPGA-based prototype based on the OpenRISC Reference Platform. To assess our results, we performed a security analysis of the processor and evaluated the performance impact of the encryption. We show that the attack surface is significantly reduced compared to previous approaches while the performance penalty is at a reasonable factor of about 1.5.

Erb, Benjamin; Kargl, Frank
A Conceptual Model for Event-sourced Graph Computing
Proceedings of the 9th ACM International Conference on Distributed Event-Based Systems aus DEBS '15 , Seite 352-355.
Herausgeber: ACM, New York, NY, USA
Juni 2015
ISBN: 978-1-4503-3286-6
Förster, David; Kargl, Frank; Löhr, Hans
A Framework for Evaluating Pseudonym Strategies in Vehicular Ad-hoc Networks
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks aus WiSec '15 , Seite 19:1--19:6.
Herausgeber: ACM, New York, NY, USA
Juni 2015
ISBN: 978-1-4503-3623-9
Feiri, Michael; Pielage, Rolf; Petit, Jonathan; Zannone, Nicola; Kargl, Frank
Pre-Distribution of Certificates for Pseudonymous Broadcast Authentication in VANET
Vehicular Technology Conference (VTC Spring), 2015 IEEE 81st , Seite 1-5.
Mai 2015
Dietzel, Stefan; Peter, Andreas; Kargl, Frank
Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks
Vehicular Technology Conference (VTC Spring), 2015 IEEE 81st , Seite 1-5.
IEEE
Glasgow, U.K.
Mai 2015
Caselli, Marco; Zambon, Emmanuele; Kargl, Frank
Sequence-aware Intrusion Detection in Industrial Control Systems
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security aus CPSS Workshop - AsiaCCS'15 , Seite 13-24.
Herausgeber: ACM, New York, NY, USA
April 2015
ISBN: 978-1-4503-3448-8
Kleber, Stephan; van der Heijden, Rens W.; Kopp, Henning; Kargl, Frank
Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions
Networked Systems (NetSys), 2015 International Conference and Workshops on , Seite 1-8.
Herausgeber: IEEE,
März 2015

Zusammenfassung: Distance bounding protocols (DBPs) are security protocols that aim to limit the maximum possible distance between two partners in a wireless communication. This enables to ensure locality of interaction between two devices. Despite numerous proposed protocols, recent analyses of DBPs have shown the majority of them to be susceptible to attacks. Most prominent among the unsolved security problems of DBPs is terrorist fraud. This type of attack involves collaboration with a legitimate device, after which the attacker can successfully execute the protocol. We show how terrorist fraud can be prevented by replacing shared secrets - commonly used in classical DBPs - with physical unclonable functions (PUFs). Our new approach can be integrated in all current DBPs with minor modifications. We offer two alternate designs: One utilizing challenge-response PUFs and another using so-called SIMPL systems, a PUF-analogue to public-key cryptography. We use a security model proposed by previous work to demonstrate security of our scheme.

Feiri, Michael; Petit, Jonathan; Kargl, Frank
The case for announcing pseudonym changes
In Frank, Raphael and Sommer, Christoph and Kargl, Frank and Dietzel, Stefan and van der Heijden, Rens W., Editor, Proceedings of 3rd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2015) Band 2015-03 aus Ulmer Informatikberichte , Seite 31-33.
Ulm, Germany
März 2015
Caselli, Marco; Zambon, Emmanuele; Petit, Jonathan; Kargl, Frank
Modeling message sequences for intrusion detection in industrial control systems
In Rice, M. and Shenoi, S., Editor, Proceedings of the Ninth IFIP 11.10 International Conference aus Critical Infrastructure Protection IX , Seite 49-71.
Herausgeber: Springer Verlag, Arlington, Virginia, US
März 2015

Zusammenfassung: Compared with standard information technology systems, industrial control systems show more consistent and regular communications patterns. This characteristic contributes to the stability of controlled processes in critical infrastructures such as power plants, electric grids and water treatment facilities. However, Stuxnet has demonstrated that skilled attackers can strike critical infrastructures by leveraging knowledge about these processes. Sequence attacks subvert infrastructure operations by sending misplaced industrial control system messages. This chapter discusses four main sequence attack scenarios against industrial control systems. Real Modbus, Manufacturing Message Specification and IEC 60870-5-104 traffic samples were used to test sequencing and modeling techniques for describing industrial control system communications. The models were then evaluated to verify the feasibility of identifying sequence attacks. The results create the foundation for developing ?sequence-aware? intrusion detection systems.

Fazouane, Marouane; Kopp, Henning; van der Heijden, Rens W.; Le Metayer, Daniel; Kargl, Frank
Formal Verification of Privacy Properties in Electric Vehicle Charging
In Piessens, Frank and Caballero, Juan and Bielova, Nataliia, Editor, Engineering Secure Software and Systems Band 8978 aus Lecture Notes in Computer Science , Seite 17-33.
Herausgeber: Springer International Publishing,
März 2015
ISBN: 978-3-319-15617-0
Kargl, Frank; Petit, Jonathan
Security and privacy in vehicular networks
In Wai Chen, Editor, Vehicular Communications and Networks: Architectures, Protocols, Operation and Deployment
Kapitel 9, Seite 171-190.
Herausgeber: Woodhead Publishing,
März 2015
ISBN: 978-1-78242-211-2
Petit, Jonathan; Schaub, Florian; Feiri, Michael; Kargl, Frank
Pseudonym Schemes in Vehicular Networks: A Survey
Communications Surveys Tutorials, IEEE, 17(1):228-255
Januar 2015
ISSN: 1553-877X
akzeptiert

2014

Dacier, Marc C.; Kargl, Frank; van der Heijden, Rens W.; König, Hartmut; Valdes, Alfonso
Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures
Informatik Spektrum, 37(6):605-607
Dezember 2014
ISSN: 0170-6012
Dietzel, Stefan; Petit, Jonathan; Kargl, Frank; Scheuermann, Björn
In-Network Aggregation for Vehicular Ad Hoc Networks
IEEE Communications Surveys and Tutorials, 16(4):1909-1932
Dezember 2014
ISSN: 1553-877X
Kargl, Frank; van der Heijden, Rens W.; König, Hartmut; Valdes, Alfonso; Dacier, Marc C.
Insights on the Security and Dependability of Industrial Control Systems
IEEE Security and Privacy Magazine, 12(6):75-78
Dezember 2014
ISSN: 1540-7993
akzeptiert
Dietzel, Stefan; Gürtler, Julian; van der Heijden, Rens; Kargl, Frank
Redundancy-based statistical analysis for insider attack detection in VANET aggregation schemes
Vehicular Networking Conference (VNC), 2014 IEEE , Seite 135-142.
Dezember 2014
Feiri, Michael; Petit, Jonathan; Kargl, Frank
Formal model of certificate omission schemes in VANET
Vehicular Networking Conference (VNC), 2014 IEEE , Seite 41-44.
Herausgeber: IEEE,
Dezember 2014
Förster, David; Kargl, Frank; Löhr, Hans
PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET)
Vehicular Networking Conference (VNC), 2014 IEEE , Seite 25-32.
Herausgeber: IEEE,
Dezember 2014
Dacier, Marc C.; Kargl, Frank; König, Hartmut; Valdes, Alfonso
Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292)
Dagstuhl Reports, 4(7):62-79
November 2014
ISSN: 2192-5283
Buchenscheit, Andreas; Könings, Bastian; Neubert, Andreas; Schaub, Florian; Schneider, Matthias; Kargl, Frank
Privacy Implications of Presence Sharing in Mobile Messaging Applications
Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia , Seite 20-29.
November 2014
ISBN: 978-1-4503-3304-7
Petit, Jonathan; Feiri, Michael; Kargl, Frank
Revisiting attacker model for smart vehicles
Wireless Vehicular Communications (WiVeC), 2014 IEEE 6th International Symposium on
Herausgeber: IEEE,
September 2014
Erb, Benjamin; Kargl, Frank
Combining Discrete Event Simulations and Event Sourcing
7th International ICST Conference on Simulation Tools and Techniques, SIMUTools '14 , Seite 51-55.
August 2014
ISBN: 978-1-63190-007-5
Engelmann, Felix; Lukaseder, Thomas; Erb, Benjamin; van der Heijden, Rens W.; Kargl, Frank
Dynamic Packet-filtering in High-speed Networks Using NetFPGAs
Proceedings of the 3rd International Conference on Future Generation Communication Technology (Best Paper Award) , Seite 55-59.
Herausgeber: IEEE,
August 2014
Dietzel, Stefan; van der Heijden, Rens W.; Decke, Hendrik; Kargl, Frank
A Flexible, Subjective Logic-based Framework for Misbehavior Detection in V2V Networks
Proceedings of the 1st WoWMoM Workshop on Smart Vehicles: Connectivity Technologies and ITS Applications
IEEE
Juni 2014
akzeptiert

Zusammenfassung: Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication aims to increase safety, efficiency, and comfort of drivers. Vehicles periodically broadcast their current status, such as position, velocity, and other information. Received information is stored in a local knowledge base, often called world model, and used for application decisions. Because of the potential impact, V2V communication is an interesting target for malicious attackers. Message integrity protection using cryptographic signatures only protects against outsider attackers. In addition to signatures, misbehavior detection mechanisms comparable to intrusion detection systems (IDS) are needed to detect insider attackers. Given the complexity and large number of foreseen V2V and V2I applications, misbehavior detection cannot be a one-size-fits-all solution. In this paper, we present a flexible framework that can combine a range of different misbehavior detection mechanisms by modeling their outputs using subjective logic. We demonstrate the feasibility of our framework by using a combination of existing detection mechanisms to increase their misbehavior detection results.

Erb, Benjamin; Kargl, Frank; Domaschka, Jörg
Concurrent programming in web applications
it-Information Technology, 56(3):119--126
Mai 2014
Feiri, Michael; Petit, Jonathan; Kargl, Frank
An evaluation framework for pre-distribution strategies of certificates in VANETs
Proceedings of 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2014)
Februar 2014
Feiri, Michael; Petit, Jonathan; Kargl, Frank
Real World Privacy Expectations in VANETs Real World Privacy Expectations in VANETs
Proceedings of 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2014)
Februar 2014
van der Heijden, Rens W.; Kargl, Frank
Open issues in differentiating misbehavior and anomalies for VANETs
Proceedings of 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2014)
Februar 2014

Zusammenfassung: This position paper proposes new challenges in data-centric misbehavior detection for vehicular ad-hoc networks (VANETs). In VANETs, which aim to improve safety and efficiency of road transportation by enabling communication between vehicles, an important challenge is how vehicles can be certain that messages they receive are correct. Incorrectness of messages may be caused by malicious participants, damaged sensors, delayed messages or they may be triggered by software bugs. An essential point is that due to the wide deployment in these networks, we cannot assume that all vehicles will behave correctly. This effect is stronger due to the privacy requirements, as those requirements include multiple certificates per vehicle to hide its identity. To detect these incorrect messages, the research community has developed misbehavior data-centric detection mechanisms, which attempt to recognize the messages by semantically analyzing the content. The detection of anomalous messages can be used to detect and eventually revoke the certificate of the sender, if the message was malicious. However, this approach is made difficult by rare events –such as accidents–, which are essentially anomalous messages that may trigger the detection mechanisms. The idea we wish to explore in this paper is how attack detection may be improved by also considering the detection of specific types of anomalous events, such as accidents.

Frank, Raphaël; Forster, Markus; Sommer, Christoph; Kargl, Frank; Engel, Thomas
Proceedings of 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2014)
Vehicular Lab, University of Luxemburg,
Februar 2014
Knapik, Peter; Petit, Jonathan; Kargl, Frank; Schoch, Elmar
Cooperative Home Light: Assessment of a Security Function for the Automotive Field
IARIA Journal on Advances in Security, 7(1&2):1-14
2014
ISSN: 1942-2636

2013

Lefevre, Stephanie; Petit, Jonathan; Bajcsy, Ruzena; Laugier, Christian; Kargl, Frank
Impact of V2X Privacy Strategies on Intersection Collision Avoidance Systems
Proceedings of the IEEE Vehicular Networking Conference 2013 (VNC 2013)
Herausgeber: IEEE Communications Society,
Dezember 2013
Feiri, Michael; Petit, Jonathan; Schmidt, Robert K.; Kargl, Frank
The Impact of Security on Cooperative Awareness in VANET
Proceedings of the IEEE Vehicular Networking Conference 2013 (VNC 2013)
Herausgeber: IEEE Communications Society,
Dezember 2013
Dietzel, Stefan; Balanici, Mihail; Kargl, Frank
Short Paper: Towards Data-similarity-based Clustering for Inter-vehicle Communication
Proceedings of the IEEE Vehicular Networking Conference 2013 (VNC 2013) , Seite 238-241.
Herausgeber: IEEE,
Dezember 2013
Feiri, Michael; Petit, Jonathan; Kargl, Frank
Efficient and Secure Storage of Private Keys for Pseudonymous Vehicular Communication
First Workshop on Security, Privacy and Dependability for CyberVehicles (CyCar) at 20th ACM Conference on Computer and Communications Security (ACM CCS 2013)
Herausgeber: ACM,
November 2013
Höfer, Christina; Petit, Jonathan; Schmidt, Robert; Kargl, Frank
POPCORN: Privacy-Preserving Charging for eMobility
First Workshop on Security, Privacy and Dependability for CyberVehicles (CyCar) at 20th ACM Conference on Computer and Communications Security (ACM CCS 2013)
Herausgeber: ACM,
November 2013
Knapik, Peter; Schoch, Elmar; Kargl, Frank
Security-Funktionen zur Bekämpfung fahrzeug-bezogener Kriminalität
29. VDI/VW-Gemeinschaftstagung Automotive Security
VDI
September 2013
Caselli, Marco; Hadziosmanovic, Dina; Zambon, Emmanuele; Kargl, Frank
On the feasibility of device fingerprinting in Industrial Control Systems
8th International Conference on Critical Information Infrastructures Security (CRITIS 2013) Band 8328 aus LNCS , Seite 155-166.
Herausgeber: Springer,
September 2013
Höfer, Christina; Petit, Jonathan; Kargl, Frank; Schmidt, Robert
POPCORN: Privacy-preserving Charging for e-Mobility
29. VDI/VW-Gemeinschaftstagung Automotive Security
VDI
September 2013
Knapik, Peter; Schoch, Elmar; Kargl, Frank
Simulation of a Security Function Based on Vehicle-to-X Communication and Automotive Lighting
The Second International Conference on Advances in Vehicular Systems, Technologies and Applications (Vehicular 2013) , Seite 8-11.
IARIA
Juli 2013
ISBN: 978-1-61208-288-2
Schaub, Florian; Hipp, Markus; Kargl, Frank; Weber, Michael
On Credibility Improvements for Automotive Navigation Systems
Personal and Ubiquitous Computing, 17(5)
Juni 2013
Gozalvez, Javier; Kargl, Frank; Mittag, Jens; Kravets, Robin; Tsai, Michael
VANET '13: Proceeding of the Tenth ACM International Workshop on Vehicular Inter-networking, Systems, and Applications
Herausgeber: ACM, New York, NY, USA
Juni 2013
ISBN: 978-1-4503-2073-3
Knapik, Peter; Schoch, Elmar; Kargl, Frank
Electronic Decal: A Security Function Based on V2X Communication
The 77th IEEE Vehicular Technology Conference (VTC 2013-Spring)
Herausgeber: IEEE,
Juni 2013
Dietzel, Stefan; Petit, Jonathan; Heijenk, Geert; Kargl, Frank
Graph-based Metrics for Insider Attack Detection in VANET Multi-hop Data Dissemination Protocols
IEEE Transactions on Vehicular Technology, 62(4)
April 2013
ISSN: 0018-9545
Kargl, Frank; Friedman, Arik; Boreli, Roksana
Differential privacy in intelligent transportation systems
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks (ACM WiSec 2013) , Seite 107-112.
Herausgeber: ACM, New York, NY, USA
April 2013
ISBN: 978-1-4503-1998-0
van der Heijden, Rens W.; Dietzel, Stefan; Kargl, Frank
SeDyA: Secure Dynamic Aggregation in VANETs
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks (ACM WiSec 2013) , Seite 131-142.
Herausgeber: ACM, New York, NY, USA
April 2013
ISBN: 978-1-4503-1998-0
van der Heijden, Rens W.; Dietzel, Stefan; Kargl, Frank
Misbehavior Detection in Vehicular Ad-hoc Networks
Proceedings of 1st GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2013)
Seite 23-25.
Februar 2013
Dacier, Marc; Kargl, Frank; Valdes, Alfonso
Securing Critical Infrastructures from Targeted Attacks (Dagstuhl Seminar 12502)
Dagstuhl Reports, 2(12):49--63
2013
ISSN: 2192-5283

2012

Bißmeyer, Norbert; Mauthofer, Sebastian; Bayarou, Kpatcha; Kargl, Frank
Assessment of Node Trustworthiness in VANETs Using Data Plausibility Checks with Particle Filters
Proceedings of the IEEE Vehicular Networking Conference 2012 (VNC 2012)
Herausgeber: IEEE,
November 2012
Feiri, Michael; Petit, Jonathan; Kargl, Frank
Evaluation of Congestion-based Certificate Omission in VANETs
Proceedings of the IEEE Vehicular Networking Conference 2012 (VNC 2012)
Herausgeber: IEEE,
November 2012
Knapik, Peter; Schoch, Elmar; Müller, Maik; Kargl, Frank
Understanding Vehicle Related Crime to Elaborate on Countermeasures Based on ADAS and V2X Communication
Proceedings of the IEEE Vehicular Networking Conference 2012 (VNC 2012)
Herausgeber: IEEE,
November 2012
Petit, Jonathan; Bösch, Christoph; Feiri, Michael; Kargl, Frank
On the Potential of PUF for Pseudonym Generation in Vehicular Networks
Proceedings of the IEEE Vehicular Networking Conference 2012 (VNC 2012)
Herausgeber: IEEE,
November 2012
Dressler, Falko; Kargl, Frank
Towards security in nano-communication: Challenges and opportunities
Elsevier Nano Communication Networks, 3(3):151 - 160
August 2012
ISSN: 1878-7789
Dressler, Falko; Kargl, Frank
Security in Nano Communication: Challenges and Open Research Issues
IEEE International Conference on Communications (ICC 2012), IEEE International Workshop on Molecular and Nanoscale Communications (MoNaCom 2012)
Juni 2012
Dietzel, Stefan; Petit, Jonathan; Kargl, Frank; Heijenk, Geert
Analyzing Dissemination Redundancy to Achieve Data Consistency in VANETs
Ninth ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2012)
Low Wood Bay, Lake District, United Kingdom
Juni 2012
Feiri, Michael; Petit, Jonathan; Kargl, Frank
Congestion-based Certificate Omission in VANETs
Ninth ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2012)
Low Wood Bay, Lake District, United Kingdom
Juni 2012
Schaub, Florian; Könings, Bastian; Weber, Michael; Kargl, Frank
Towards Context Adaptive Privacy Decisions in Ubiquitous Computing
IEEE International Conference on Pervasive Computing and Communications (PerCom 2012), Work in Progress (WiP) Session
Lugano, Switzerland
Juni 2012
Schaub, Florian; Hipp, Markus; Kargl, Frank; Weber, Michael
On Credibility Improvements for Automotive Navigation Systems
Springer Personal and Ubiquitous Computing, (Online-Prepublication)
April 2012
Schaub, Florian; Könings, Bastian; Dietzel, Stefan; Weber, Michael; Kargl, Frank
Privacy Context Model for Dynamic Privacy Adaptation in Ubiquitous Computing
6th International Workshop on Context-Awareness for Self-Managing Systems (Casemans 2012)
2012
Dietzel, Stefan; Kost, Martin; Schaub, Florian; Kargl, Frank
CANE: A Controlled Application Environment for Privacy Protection in ITS
Proceedings of the 12th International Conference on Intelligent Transport Systems Telecommunications (ITST 2012)
2012
akzeptiert

2011

Kargl, Frank; Papadimitratos, Panos
ACM WiSec 2011 poster and demo session
ACM SIGMOBILE Mobile Computing and Communications Review, 15:34--34
2011
ISSN: 1559-1662
Schaub, Florian; Hipp, Markus; Kargl, Frank; Weber, Michael
On Credibility Improvements for Automotive Navigation Systems
Personal and Ubiquitous Computing,
2011
Dietzel, Stefan; Kargl, Frank; Heijenk, Geert; Schaub, Florian
Modeling In-Network Aggregation in VANETs
IEEE Communications Magazine, 49(11):142-148
2011

Zusammenfassung: The multitude of applications envisioned for vehicular ad-hoc networks (VANETs) requires efficient com- munication and dissemination mechanisms to prevent network congestion. In-network data aggregation promises to reduce bandwidth requirements and enable scalability in large vehicular networks. However, most existing aggregation schemes are tailored to specific applications and types of data. Proper comparative evaluation of different aggregation schemes is difficult. Yet, comparability is essential to properly measure accuracy, performance, and efficiency. We outline a modeling approach for VANET aggregation schemes to achieve objective comparability. Our modeling approach consists of three models, which provide different perspectives on an aggregation scheme. The generalized architecture model facilitates categorization of aggregation schemes. The aggregation information flow model supports analysis of where information is aggregated by a scheme. The aggregation state graph models how knowledge about the road network and its environment is represented by a scheme. Further, it facilitates error estimation with respect to the ground truth. We apply each modeling approach to existing aggregation schemes from the literature and highlight strengths, as well as weaknesses, that can be used as starting point for designing a more generic aggregation scheme.

Dressler, Falko; Kargl, Frank; Ott, Jörg; K. Tonguz, Ozan; Wischof, Lars
Research Challenges in Intervehicular Communication: Lessons of the 2010 Dagstuhl Seminar
IEEE Communications Magazine, 49(5):158 - 164
2011
Schmidt, Robert K.; Brakemeier, Achim; Leinmüller, Tim; Kargl, Frank; Schäfer, Günter
Advanced carrier sensing to resolve local channel congestion
Proceedings of the Eighth ACM international workshop on Vehicular inter-networking aus VANET '11 , Seite 11--20.
Herausgeber: ACM, New York, NY, USA
2011
ISBN: 978-1-4503-0869-4
Petit, Jonathan; Feiri, Michael; Kargl, Frank
Spoofed Data Detection in VANETs using Dynamic Thresholds
Proceedings of the 3rd IEEE Vehicular Networking Conference (VNC 2011) , Seite 25-32.
Herausgeber: IEEE, Amsterdam, The Netherlands
2011
Kost, Martin; Freytag, Johann-Christoph; Kargl, Frank; Kung, Antonio
Privacy Verification using Ontologies
First International Workshop on Privacy by Design , Seite 627 - 632.
Herausgeber: IEEE Computer Society, Vienna, Austria
2011

Zusammenfassung: As information systems extensively exchange information between participants, privacy concerns may arise from its potential misuse. A Privacy by Design (PbD) approach considers privacy requirements of different stakeholders during the design and the implementation of a system. Currently, a comprehensive approach for privacy requirement engineering, implementation, and verification is largely missing. This paper extends current design methods by additional (formal) steps which take advantage of ontologies. The proposed extensions result in a systematic approach that better protects privacy in future information systems.

Kung, Antonio; Freytag, Johann-Christoph; Kargl, Frank
Privacy-by-Design in ITS Applications - The Way Forward
Second International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN 2011)
Lucca, Italy
2011

2010

Ma, Zhendong; Kargl, Frank; Weber, Michael
Measuring long-term location privacy in vehicular communication systems
Elsevier Computer Communications, 33(12):1414-1427
2010
K. Schmidt, Robert; Leinmüller, Tim; Schoch, Elmar; Kargl, Frank; Schäfer, Günter
Exploration of Adaptive Beaconing for Efficient Intervehicle Safety Communication
IEEE Network - Special Issue on "Advances in Vehicular Communications Networks", 24(1)
2010
Dietzel, Stefan; Schoch, Elmar; Kargl, Frank; Könings, Bastian; Weber, Michael
Resilient Secure Aggregation for Resilient Secure Aggregation for Vehicular Networks
IEEE Network - Special Issue on "Advances in Vehicular Communications Networks", 24(1)
2010
Leinmüller, Tim; Schoch, Elmar; Kargl, Frank; Maihöfer, Christian
Decentralized position verification in geographic ad hoc routing
Wiley Security and Communication Networks Journal, 3(4):289--302
2010
Kargl, Frank; Schaub, Florian; Dietzel, Stefan
Mandatory Enforcement of Privacy Policies using Trusted Computing Principles
Intelligent Information Privacy Management Symposium (Privacy 2010)
Herausgeber: AAAI, Stanford University, USA
2010
Könings, Bastian; Schaub, Florian; Kargl, Frank; Weber, Michael
Towards Territorial Privacy in Smart Environments (Privacy 2010)
Intelligent Information Privacy Management Symposium
Herausgeber: AAAI, Stanford University, USA
2010
Dietzel, Stefan; Kargl, Frank; Heijenk, Geert J.; Schaub, Florian
On the Potential of Generic Modeling for VANET Data Aggregation Protocols
2nd IEEE Vehicular Networking Conference (IEEE VNC 2011) , Seite 78-85.
IEEE Communications Society
Jersey City, New Jersey, USA
2010
ISBN: 978-1-4244-9524-5
Hipp, Markus; Schaub, Florian; Kargl, Frank; Weber, Michael
Interaction Weaknesses of Personal Navigation Devices
Automotive User Interfaces and Interactive Vehicular Applications (AutomotiveUI 2010)
Pittsburgh, Pennsylvania
2010
Schoch, Elmar; Bako, Boto; Dietzel, Stefan; Kargl, Frank
Dependable and Secure Geocast in Vehicular Networks
Seventh ACM International Workshop on Vehicular Inter-Nnetworking (VANET 2010) , Seite 61-68.
Herausgeber: ACM,
2010
Wiedersheim, Björn; Kargl, Frank; Ma, Zhendong; Papadimitratos, Panagiotis
Privacy in Inter-Vehicular Networks: Why simple pseudonym change is not enough
The Seventh International Conference on Wireless On-demand Network Systems and Services (WONS 2010)
2010
Schaub, Florian; Kargl, Frank; Ma, Zhendong; Weber, Michael
V-tokens for Conditional Pseudonymity in VANETs
IEEE Wireless Communications & Networking Conference (IEEE WCNC 2010)
Herausgeber: IEEE, Sydney, Australia
2010
Schoch, Elmar; Kargl, Frank
On the Efficiency of Secure Beaconing in VANETs
ACM Conference on Wireless Security (WiSec `10)
2010

2009

Ma, Zhendong; Kargl, Frank; Weber, Michael
A location privacy metric for V2X communication systems
IEEE Sarnoff Symposium 2009 (SARNOFF 2009)
Princeton, NJ, USA
2009
Schaub, Florian; Ma, Zhendong; Kargl, Frank
Privacy Requirements in Vehicular Communication Systems
IEEE International Conference on Privacy, Security, Risk, and Trust (PASSAT 2009), Symposium on Secure Computing (SecureCom09)
Vancouver, Canada
2009
Koenings, Bastian; Schaub, Florian; Kargl, Frank
Channel Switch and Quiet Attack: New DoS Attacks exploiting the 802.11 Standard
Demonstration at 34th IEEE Conference on Local Computer Networks (LCN 2009)
Zurich, Switzerland
2009
Dietzel, Stefan; Bako, Boto; Schoch, Elmar; Kargl, Frank
A Fuzzy Logic based Approach for Structure-free Aggregation in Vehicular Ad-Hoc Networks
Sixth ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2009),
Beijing, China
2009
Dietzel, Stefan; Schoch, Elmar; Bako, Boto; Kargl, Frank
A Structure-free Aggregation Framework for Vehicular Ad Hoc Networks
6th International Workshop on Intelligent Transportation (WIT 2009)
Hamburg, Germany
2009
Buchenscheit, Andreas; Schaub, Florian; Kargl, Frank; Weber, Michael
A VANET-based Emergency Vehicle Warning System
First IEEE Vehicular Networking Conference (VNC 2009)
Herausgeber: IEEE, Tokyo, Japan
2009
Koenings, Bastian; Schaub, Florian; Kargl, Frank
Channel Switch and Quiet Attack: New DoS Attacks exploiting the 802.11 Standard
Demonstration at 7th Annual International Conference on Mobile Systems, Applications and Services (ACM MobiSys 2009)
Krakow, Poland
2009
Könings, Bastian; Schaub, Florian; Kargl, Frank; Dietzel, Stefan
Channel Switch and Quiet attack: New DoS attacks exploiting the 802.11 standard
The 34th IEEE Conference on Local Computer Networks (LCN 2009)
Zurich, Switzerland
2009
Kargl, Frank; Papadimitratos, Panagiotis
Secure Vehicle Communication (SeVeCom)
Demonstration at 7th Annual International Conference on Mobile Systems, Applications and Services (ACM MobiSys 2009)
Krakow, Poland
2009
Kargl, Frank; Dietzel, Stefan; Schaub, Florian; Freytag, Johann-Christoph
Enforcing Privacy Policies in Cooperative Intelligent Transportation Systems
ACM 15th Annual International Conference on Mobile Computing and Networking (ACM Mobicom 2009) Poster Session
Beijing, China
2009
Ma, Zhendong; Kargl, Frank; Weber, Michael
Measuring location privacy in V2X communication systems with accumulated information
The Sixth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS09)
Macau SAR, China
2009

2008

Schoch, Elmar; Keppler, Moritz; Kargl, Frank; Weber, Michael
On the security of context-adaptive information dissemination
Wiley Security and Communication Networks Journal, 1(3)
2008
Papadimitratos, Panos; Buttyan, Levente; Holczer, Tamas; Schoch, Elmar; Freudiger, Julien; Raya, Maxim; Ma, Zhendong; Kargl, Frank; Kung, Antonio; Hubaux, Jean-Pierre
Secure Vehicular Communications: Design and Architecture
IEEE Communications Magazine, 46(11):2--8
2008
Schoch, Elmar; Kargl, Frank; Leinmüller, Tim; Weber, Michael
Communication Patterns in VANETs
IEEE Communications Magazine, 46(11):2--8
2008
Kargl, Frank; Papadimitratos, Panos; Buttyan, Levente; Müter, Michael; Wiedersheim, Björn; Schoch, Elmar; Tongh, Ta-Vinh; Calandriello, Giorgio; Held, Albert; Kung, Antonio; Hubaux, Jean-Pierre
Secure Vehicular Communications: Implementation, Performance, and Research Challenges
IEEE Communications Magazine, 46(11):2--8
2008
Bako, Boto; Kargl, Frank; Schoch, Elmar; Weber, Michael
Location Tracking Attack in Ad Hoc Networks based on Topology Information
In Jiang, Zhen and Pan, Yi, Editor,
Kapitel 2,
Herausgeber: NOVA Publishers,
2008
ISBN: 978-1-60456-457-0
Kargl, Frank; Schoch, Elmar; Weber, Michael
Security for Inter-Vehicular Communication Mechanisms: What is next?
in P. Papadimitratos and J.-P. Hubaux, "Report on the 'Secure Vehicular Communications: Results and Challenges Ahead' Workshop," ACM Mobile Computing and Communications Review (MC2R) Band 12
2008
Traud, Alexander; Nagler-Ihlein, Jürgen; Kargl, Frank; Weber, Michael
Cyclic Data Synchronization through Resusing SyncML
The Ninth International Conference on Mobile Data Management (mdm 2008)
Herausgeber: IEEE, Beijing, China
2008
Ma, Zhendong; Kargl, Frank; Weber, Michael
Pseudonym-on-demand: a new pseudonym refill strategy for vehicular communications
2nd IEEE International Symposium on Wireless Vehicular Communications (WiVeC 2008)
Herausgeber: IEEE, Calgary, Canada
2008
Messina, Marco; Lim, Yen Yang; Lawrence, Elaine; Martin, Don; Kargl, Frank
Implementing and Validating an Environmental and Health Monitoring System
5th International Conference on Information Technology: New Generations (ITNG 2008)
Herausgeber: IEEE, Las Vegas, USA
2008
Schoch, Elmar; Feiri, Michael; Kargl, Frank; Weber, Michael
Simulation of Ad Hoc Networks: ns-2 compared to JiST/SWANS
First International Conference on Simulation Tools and Techniques for Communications, Networks and Systems (Simutools 2008)
Herausgeber: ICST, Marseille, France
2008
Schoch, Elmar; Kargl, Frank; Wolf, Fabian; Weber, Michael
U^2VAS: A Research Communication Stack for Vehicular Networks (Demonstration)
2nd IEEE International Symposium on Wireless Vehicular Communications (WiVeC 2008)
Herausgeber: IEEE, Calgary, Canada
2008
Bako, Boto; Kargl, Frank; Schoch, Elmar; Weber, Michael
Evaluation of Position Based Gossiping for VANETs in an Intersection Scenario
4th International Conference on Networked Computing and Advanced Information Management (NCM 2008)
Herausgeber: IEEE, Gyeongju, Korea
2008
Bako, Boto; Schoch, Elmar; Kargl, Frank; Weber, Michael
Advanced Adaptive Gossiping Using 2-Hop Neighborhood Information
IEEE Globecom 2008
New Orleans, USA
2008
Bako, Boto; Schoch, Elmar; Kargl, Frank; Weber, Michael
Optimized Position Based Gossiping in VANETs
2nd IEEE International Symposium on Wireless Vehicular Communications (WiVeC 2008)
Herausgeber: IEEE, Calgary, Canada
2008
Kargl, Frank; Schoch, Elmar; Wiedersheim, Björn; Leinmüller, Tim
Secure and Efficient Beaconing for Vehicular Networks (Short Paper)
5th ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2008)
Herausgeber: ACM, San Francisco, USA
2008
Lim, Yen Yang; Messina, Marco; Kargl, Frank; Ganguli, Leena; Fischer, Martin; Tsang, Tommy
SNMP-Proxy for wireless sensor networks
5th International Conference on Information Technology: New Generations (ITNG 2008)
Herausgeber: IEEE, Las Vegas, USA
2008
Kargl, Frank; Lawrence, Elaine; Fischer, Martin; Lim, Yen Yang
Security, Privacy, and Legal Issues in Pervasive eHealth Monitoring Systems
7th International Conference on Mobile Business (ICMB 2008)
Herausgeber: IEEE, Barcelona, Spain
2008
Kargl, Frank; Schoch, Elmar; Ma, Zhendong
Aktuelle Trends in der sicheren Fahrzeug-Fahrzeug-Kommunikation
Ulm University, Ulm, Germany
2008

2007

Weingärtner, Elias; Kargl, Frank
Hybrid Sensor-Vehicular Networks in the context of next-generation networking
7th Würzburg Workshop in IP: Joint EuroFGI and ITG Workshop on "Visions of Future Generation Networks" (EuroView 2007)
2007
Moser, Steffen; Kargl, Frank; Keller, Alexander
Interactive Realistic Simulation of Wireless Networks
IEEE/EG Symposium on Interactive Ray Tracing (RT'07)
Herausgeber: IEEE, Ulm, Germany
2007
Papadimitratos, Panos; Buttyan, Levente; Hubaux, Jean-Pierre; Kargl, Frank; Kung, Antonio; Raya, Maxim
Architecture for Secure and Private Vehicular Communications
7th International Conference on ITS Telecommunications (ITST 2007)
Herausgeber: IEEE, Sophia-Antipolis, France
2007
Schoch, Elmar; Kargl, Frank; Leinmüller, Tim
Vulnerabilities in Geocast Message Distribution
2nd IEEE Globecom Workshops, Automotive Networking and Applications (Autonet 2007)
Herausgeber: IEEE, Washington, USA
2007
Bako, Boto; Kargl, Frank; Schoch, Elmar; Chapkin, Sergey
(Ab-)Using DSR Route Information for Node Localization in MANETs
KiVS'07 Workshop on Mobile Ad-Hoc Networks (WMAN'07)
Herausgeber: VDE Verlag, Bern, Switzerland
2007
Bako, Boto; Rikanovic, Igor; Kargl, Frank; Schoch, Elmar
Adaptive Topology Based Gossiping in VANETs Using Position Information
3rd International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2007) Band 4864/2007 aus LNCS
Herausgeber: Springer, Beijing, China
2007
Kargl, Frank; Schoch, Elmar
A Qualitative Comparison between JiST/SWANS and ns-2
ACM Mobisys Workshop, 1st international workshop on System evaluation for mobile platforms (MobiEval '07)
Herausgeber: ACM, San-Juan, Puerto Rico
2007
Kluge, Jonas; Kargl, Frank; Weber, Michael
The Effects of the AJAX Technology on Web Application Usability
3rd International Conference on Web Information Systems and Technologies (WebIST 2007)
Barcelona, Spain
2007
Kargl, Frank; Flerlage, Florian; Gessler, Sascha
The iNAV Indoor Navigation System
International Symposium on Ubiquitous Computing Systems (UCS 2007) Band 4836/2008
Herausgeber: Springer, Tokyo, Japan
2007
Weingärtner, Elias; Kargl, Frank
A Prototype Study on Hybrid Sensor-Vehicular Networks (Ext. Abstract)
Dokument Nummer: AIB 2007-11, ISSN 0935-3232
RWTH-Aachen, Aachen, Germany
2007

2006

Leinmüller, Tim; Schoch, Elmar; Kargl, Frank
Position Verification Approaches for Vehicular Ad Hoc Networks
IEEE Wireless Communication Magazine, 13(5):16-21
2006
Papadimitratos, Panos; Kung, Antonio; Hubaux, Jean-Pierre; Kargl, Frank
Privacy and Identity Management for Vehicular Communication Systems: A Position Paper
Workshop on Standards for Privacy in User-Centric Identity Management
Zurich, Switzerland
2006
Schlott, Stefan; Kargl, Frank; Weber, Michael
Re-identifying Anonymous Nodes
Location- And Context Awareness, Second International Workshop (LoCA 2006) Band 3987/2006 aus LNCS
Herausgeber: Springer, Dublin, Ireland
2006
Schoch, Elmar; Kargl, Frank; Schlott, Stefan; Leinmüller, Tim; Papadimitratos, Panos
Impact of Pseudonym Changes on Geographic Routing in VANETs
Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS 2006) Band 4357/2006 aus LNCS
Herausgeber: Springer, Hamburg, Germany
2006
Bader, Roland; Pinto, Michele; Spenrath, Felix; Wollmann, Philipp; Kargl, Frank
BigNurse: A Wireless Ad Hoc Network for Patient Monitoring
Pervasive Health, First Workshop on Location Based Services for Health Care (Locare'06)
Herausgeber: IEEE, Innsbruck, Austria
2006
Chapkin, Sergey; Bako, Boto; Kargl, Frank; Schoch, Elmar
Location Tracking Attack in Ad Hoc Networks based on Topology Information
IEEE MASS Workshop on Wireless and Sensor Networks Security, WSNS 2006
Herausgeber: IEEE, Vancouver, Canada
2006
Kargl, Frank; Schlott, Stefan; Weber, Michael
Identification in Ad hoc Networks
39th Hawaii International Conference on System Sciences (HICSS-39)
Herausgeber: IEEE, Hawaii, USA
2006
Leinmüller, Tim; Buttyan, Levente; Hubaux, Jean-Pierre; Kargl, Frank; Kroh, Rainer; Papadimitratos, Panos; Raya, Maxim; Schoch, Elmar
SEVECOM - Secure Vehicle Communication (Short Paper)
IST Mobile Summit 2006
Mykonos, Greece
2006
Leinmüller, Tim; Schoch, Elmar; Kargl, Frank; Maihöfer, Christian
Improved Security in Geographic Ad Hoc Routing through Autonomous Position Verification
3rd ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2006)
Herausgeber: ACM, Los Angeles, USA
2006
Kargl, Frank; Dannhäuser, Günter; Schlott, Stefan; Nagler-Ihlein, Jürgen
Semantic Information Retrieval in the COMPASS Location System (Short Paper)
Location- And Context Awareness, Second International Workshop (LoCA 2006)
Dublin, Ireland
2006
Kargl, Frank; Dannhäuser, Günter; Schlott, Stefan; Nagler-Ihlein, Jürgen
Semantic Information Retrieval in the COMPASS Location System
Ubiquitous Computing Systems (UCS 2006) Band 4239/2006 aus LNCS
Herausgeber: Springer, Seoul, Korea
2006
Kargl, Frank; Ma, Zhendong; Schoch, Elmar
Security Engineering for VANETs
4th Workshop on Embedded Security in Cars (escar 2006)
Berlin, Germany
2006

2005

Kargl, Frank; Klenk, Andreas; Weber, Michael; Schlott, Stefan
Sensors for Detection of Misbehaving Nodes in MANETs
PIK - Praxis der Informationstechnik, 28(1):38-44
2005
Schlott, Stefan; Kargl, Frank; Weber, Michael
Random IDs for preserving location privacy (Short Paper)
First IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm 2005)
Herausgeber: IEEE, Athens, Greece
2005
Kargl, Frank; Bernauer, Alexander
The COMPASS Location System
First International Workshop on Location- And Context Awareness (LoCA 2005) Band 3479/2005 aus LNCS
Herausgeber: Springer, Oberpfaffenhofen, Germany
2005
Kargl, Frank; Schlott, Stefan; Weber, Michael
Identitäten in Mobilen Ad hoc Netzwerken
WMAN 2005, part of the Informatik 2005, Annual Meeting of the German Association for Computer Science (GI) Band P-68 aus Lecture Notes in Informatics
Herausgeber: GI e.V., Bonn, Germany
2005
Leinmüller, Tim; Schoch, Elmar; Kargl, Frank; Maihöfer, Christian
Influence of Falsified Position Data on Geographic Ad-Hoc Routing
2nd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005) Band 3813/2005 aus LNCS
Herausgeber: Springer, Visegrad, Hungary
2005
Kargl, Frank; Geiß, Alfred; Schlott, Stefan; Weber, Michael
Secure Dynamic Source Routing
38th Hawaii International Conference on System Sciences (HICSS-38)
Herausgeber: IEEE, Hawaii, USA
2005
Schlott, Stefan; Kargl, Frank
Wiedererkennung anonymer Knoten
Dokument Nummer: TI-1/05
Technical University Darmstadt,
2005

2004

Kargl, Frank
Sicherheit in Mobilen Ad-hoc Netzwerken
In et al., Dorothea Wagner, Editor, Ausgezeichnete Informatikdissertationen 2003 Band D-4 aus Lecture Notes in Informatics
Gesellschaft für Informatik
2004
Kargl, Frank; Schlott, Stefan; Weber, Michael
Integrierte Sicherheit für Mobile Ad-hoc Netzwerke
WMAN 2004, part of the Informatik 2004, Annual Meeting of the German Association for Computer Science (GI) Band P-50/51 aus Lecture Notes in Informatics (LNI)
Herausgeber: GI e.V., Ulm, Germany
2004
Kargl, Frank; Schlott, Stefan; Weber, Michael; Klenk, Andreas; Geiß, Alfred
Securing Ad hoc Routing Protocols
30th Euromicro Conference
Rennes, France
2004
Kargl, Frank; Klenk, Andreas; Schlott, Stefan; Weber, Michael
Advanced Detection of Selfish or Malicious Nodes in Ad hoc Networks
1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004) Band 3313/2005 aus LNCS
Herausgeber: Springer, Heidelberg, Germany
2004
Kargl, Frank; Klenk, Andreas; Weber, Michael; Schlott, Stefan
Sensors for Detection of Misbehaving Nodes in MANETs
Workshop Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2004) Band 46 aus Lecture Notes in Informatics (LNI)
Herausgeber: GI e.V., Dortmund, Germany
2004

2003

Kargl, Frank; Ribhegge, Stefan; Schlott, Stefan; Weber, Michael
Bluetooth-based Ad-Hoc Networks for Voice Transmission
36th Hawaii International Conference on System Sciences (HICSS-36)
Herausgeber: IEEE, Hilton Waikoloa Village, HA, USA
2003
Kargl, Frank
Sicherheit in Mobilen Ad hoc Netzwerken
Ulm University, Faculty of Informatics, Ulm, Germany
2003

2002

Kargl, Frank; Illmann, Torsten; Dong, Bin; Geiß, Alfred; Zeile, Matthias
SmartReminder - Personal Assistance in a Mobile Computing Environment
Demonstration at Pervasive 2002
Zurich, Switzerland
2002
Nagler, Jürgen; Kargl, Frank; Schlott, Stefan; Weber, Michael
Ein Framework für MANET Routing Protokolle
Workshop on Mobile Ad-hoc Networks (WMAN'02) Band P-11 aus Lecture Notes in Informatics (LNI)
Herausgeber: GI e.V., Ulm, Germany
2002
Schalk, Michael; Liebig, Torsten; Illmann, Torsten; Kargl, Frank
Combining FIPA ACL with DAML+OIL - a Case Study
Second International Workshop on Ontologies in Agent Systems (OAS 2002)
Bologna, Italy
2002
Kargl, Frank; Dong, Bin; Illmann, Torsten; Weber, Michael
SmartReminder - Personal Assistance in a Mobile Computing Environment
ACM CSCW 2002 Workshop on Ad hoc Communications and Collaboration in Ubiquitous Computing Environments
New Orleans, USA
2002

2001

Kargl, Frank; Illmann, Torsten; Raschke, Axel; Schlott, Stefan; Weber, Michael
WAPcam - using a WAP application in student education
ACM SIGGROUP Bulletin, 22(1)
2001
Illmann, Torsten; Krüger, Tillmann; Kargl, Frank; Weber, Michael
Transparent Migration of Mobile Agents using Java Platform Debugger Architecture
Mobile Agents (MA'01) Band 2240/2001 aus LNCS
Herausgeber: Springer, Atlanta, USA
2001
Kargl, Frank; Illmann, Torsten; Schlott, Stefan; Weber, Michael
WAPCam - Eine multimediale Anwendung in der Studentenausbildung
Workshop 'WAP - Interaktionsdesign und Benutzbarkeit', Mensch und Computer (MC)
Bad Honnef, Germany
2001
Kargl, Frank; Maier, Jörn; Schlott, Stefan; Weber, Michael
Protecting Web Servers from Distributed Denial of Service Attacks
10th international conference on World Wide Web (WWW10)
Herausgeber: ACM, Hongkong, China
2001

2000

Illmann, Torsten; Krueger, Tillmann; Kargl, Frank; Weber, Michael
Migration in Java: Problems, Classification and Solutions
International ICSC Symposium on Multi-Agents and Mobile Agents in Virtual Organizations and E-Commerce (MAMA'00)
Wollongong, Australia
2000

1999

Illmann, Torsten; Kargl, Frank; Weber, Michael
Design of an Agent Cluster as Integrative Environment of Personal Agents
1999 International Conference on Information Intelligence and Systems (ICIIS'99)
Herausgeber: IEEE, Washington, USA
1999
Kargl, Frank; Illmann, Torsten; Weber, Michael
CIA - A Collaboration and Coordination Infrastructure for Personal Agents
Proceedings of the IFIP TC6 WG6.1 Second International Working Conference on Distributed Applications and Interoperable Systems (DAIS'99)
Helsinki, Finland
1999
Kargl, Frank; Illmann, Torsten; Weber, Michael
Evaluation of Java Messaging Middleware as a Platform for Software Agent Communication
Java Informationstage (JIT'99) aus Informatik Aktuell
Herausgeber: Springer, Düsseldorf, Germany
1999
Kargl, Frank; Illmann, Torsten; Weber, Michael; Ribhegge, Stefan
Dynamic User Interfaces with Java
World Conference on the WWW and Internet (Webnet 1999) , Seite 614-619.
Herausgeber: AACE, Honolulu, USA
1999
Export als: BibTeX, XML