Prof. Dr. rer. nat. Frank Kargl

Prof. Kargl promovierte 2003 und habilitierte sich 2009 an der Opens internal link in current windowUniversität Ulm. Davor war er unter anderem Mitgründer der Opens external link in new windowArago AG und in der Netzgruppe des Opens internal link in current windowRechenzentrums / KIZ der Uni Ulm für Netzwerkbetrieb und -sicherheit verantwortlich. Zwischen Ende 2009 und Anfang 2012 war er als Associate Professor in der Gruppe für Opens external link in new windowDistributed and Embedded Security (DIES) der Opens external link in new windowUniversität Twente in den Niederlanden tätig, danach bis Januar 2015 als Adjunct Professor. Seit Februar 2012 leitet Prof. Kargl das Opens internal link in current windowInstitut für Verteilte Systeme an der Uni Ulm. Seit Oktober 2013 fungiert er darüber hinaus als Prodekan der Opens internal link in current windowFakultät für Ingenieurwissenschaften, Informatik und Psychologie.

Forschung

Meine Forschungsinteressen liegen im Bereich mobiler und selbst-organisierender Netzwerke, vor allem der Mobilen Ad-hoc Netzwerke und der Fahrzeug-Fahrzeug-Kommunikation. Ein weiterer Schwerpunkt meiner Arbeit sind Security und Privacy in IT-Systemen. Viele meiner Forschungsprojekte bewegen sich im Überlappungsbereich beider Themen, so z.B. Projekte zu Sicherheit und Privacy von Vehicular Ad-hoc Networks. Andere Arbeiten beschäftigen sich mit der Sicherheit von vernetzten eingebetteten Systemen, z.B. im Kontext der Industrial Control Systems oder bei Building Automation. Weitere Projekte beschäftigen sich mit Secure Cloud Computing, Crypto-Currencies, verteiltem Graphen-basiertem Computing und vielen anderen Themen.

Lehre

Eine ausführliche Auflistung der von mir angebotenen Lehrangebote findet sich Opens internal link in current windowhier.

Projekte

Eine Auflistung von aktuellen und früheren Forschungsprojekten des Instituts findet sich Opens internal link in current windowhier.

Kontakt

Photo of Frank  Kargl
Prof. Dr. rer.nat. Frank Kargl
Institutsdirektor
O27 - 350

+49 731 50-24141
+49 731 50-24142
http://uni-ulm.de/in/vs/~kargl
http://www.kargl.net/

Institut für Verteilte Systeme
Universität Ulm
Albert-Einstein-Allee 11
89081 Ulm
Deutschland

Sprechzeiten

Bitte vereinbaren Sie bei Bedarf einen Termin mit mir über unser Sekretariat (Frau Fehlberg) oder Opens window for sending emailper Email

Publikationen

Jahr:  
Alle :: 1999, ... , 2013, 2014, 2015, 2016
Referenzen
Robin Kraft, Benjamin Erb Person, David Mödinger und Frank Kargl Person
Using Conflict-Free Replicated Data Types for Serverless Mobile Social Applications
Proceedings of the 8th ACM International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworking
Juli 2016

Zusammenfassung: A basic reason for backend systems in mobile application architectures is the centralized management of state. Mobile clients synchronize local states with the backend in order to maintain an up-to-date view of the application state. As not all mobile social applications require strong consistency guarantees, we survey an alternative approach using special data structures for mobile applications. These data structures only provide eventual consistency, but allow for conflict-free replication between peers. Our analysis collects the requirements of social mobile applications for being suitable for this approach. Based on exemplary mobile social applications, we also point out the benefits of serverless architecture or architectures with a thin backend layer.

Christoph Bösch, Benjamin Erb Person, Frank Kargl Person, Henning Kopp und Stefan Pfattheicher
Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns
Proceedings on Privacy Enhancing Technologies, 2016(4)
Juli 2016
akzeptiert

Zusammenfassung: Privacy strategies and privacy patterns are fundamental concepts of the privacy-by-design engineering approach. While they support a privacy-aware development process for IT systems, the concepts used by malicious, privacy-threatening parties are generally less understood and known. We argue that understanding the ``dark side'', namely how personal data is abused, is of equal importance. In this paper, we introduce the concept of privacy dark strategies and privacy dark patterns and present a framework that collects, documents, and analyzes such malicious concepts. In addition, we investigate from a psychological perspective why privacy dark strategies are effective. The resulting framework allows for a better understanding of these dark concepts, fosters awareness, and supports the development of countermeasures. We aim to contribute to an easier detection and successive removal of such approaches from the Internet to the benefit of its users.

Stefan Dietzel, Julian Gürtler und Frank Kargl Person
A resilient in-network aggregation mechanism for VANETs based on dissemination redundancy
Ad Hoc Networks, 37, Part 1:101 - 109
Februar 2016
ISSN: 1570-8705

Schlüsselwörter: Multi-hop communication

Marker: FrankKargl, StefanDietzel, F3

Zusammenfassung: Abstract In the field of Vehicular Ad-hoc Networks (VANETs), traffic efficiency applications, such as traffic information systems, are particularly challenging, because they often require the dissemination of information within large geographic areas. Forwarding information over multiple hops is a necessity, and due to the amount of available information, the available wireless capacity is easily exhausted. In-network aggregation protocols are often used to cope with wireless channel restrictions. Their aim is to collaboratively create summaries of traffic information and other information items as information is disseminated within the network. But in-network aggregation is challenging form a security perspective: insider attackers may be able to alter not only their own observations but also modify already aggregated information, or they may introduce false aggregates. As a result, wrong routing decisions may be taken, or drivers may engage in dangerous driving maneuvers. Existing security mechanisms for in-network aggregation often introduce considerable additional overhead, resulting from cryptographic proofs, such as signatures. In this work, we follow a different approach: we design a resilient aggregation mechanism that leverages already existing communication redundancy and combines it with data consistency checks to identify and filter false aggregates information. Our security mechanism introduces limited additional overhead, and simulation results show that at least 20% attacker vehicles can be tolerated by our mechanism.

Bemerkung: Special Issue on Advances in Vehicular Networks

David Förster, Frank Kargl Person und Hans Löhr
PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks
Ad Hoc Networks, 37, Part 1:122 - 132
Februar 2016
ISSN: 1570-8705

Schlüsselwörter: Anonymous credentials

Marker: FrankKargl, F3

Zusammenfassung: Abstract Pseudonym certificates are the state-of-the-art approach for secure and privacy-friendly message authentication in vehicular ad-hoc networks. However, most of the proposed pseudonym schemes focus on privacy among participants. Privacy towards backend providers is usually (if at all) only protected by separation of responsibilities. The protection can be overridden, when the entities collaborate, e.g. when revocation of long-term credentials is required. This approach puts the users' privacy at risk, if the backend systems are not fully trusted. We propose PUCA -- a scheme that provides full anonymity for honest users, even against colluding backend providers. The scheme uses anonymous credentials for authentication with the backend, while leaving the communication among vehicles and with road side units unchanged and in compliance with existing standards. For removal of misbehaving vehicles from the system, we leverage a privacy-friendly revocation mechanism, that does not require resolution of pseudonyms. With our scheme, we demonstrate that strong and verifiable privacy protection in vehicular networks can be achieved, while fulfilling common security requirements, such as sybil-resistance and revocation.

Bemerkung: Special Issue on Advances in Vehicular Networks

Export als:
BibTeX, XML