Institut für Verteilte Systeme

Unser Institut beschäftigt sich mit Themen wie Skalierbarkeit, Zuverlässigkeit, Sicherheit und Datenschutz, Selbstorganisation und Beherrschbarkeit von Komplexität in Verteilten Systemen in einer Vielzahl von Einsatzszenarien wie Cloud-Computing oder Fahrzeug-Fahrzeug-Kommunikation.

In der Lehre decken wir das gesamte Spektrum von Rechnernetzen, über verteilte Systeme bis hin zu Sicherheit und Privacy-Schutz ab.

Unsere letzten Publikationen


Erb, Benjamin; Meißner, Dominik; Ogger, Ferdinand; Kargl, Frank
Poster: Log Pruning in Distributed Event-sourced Systems
Proceedings of the 12th ACM International Conference on Distributed Event-Based Systems
Juni 2018
akzeptiert

Zusammenfassung: Event sourcing is increasingly used and implemented in event-based systems for maintaining the evolution of application state. However, unbounded event logs are impracticable for many systems, as it is difficult to align scalability requirements and long-term runtime behavior with the corresponding storage requirements. To this end, we explore the design space of log pruning approaches suitable for event-sourced systems. Furthermore, we survey specific log pruning mechanisms for event-sourced logs. In a brief evaluation, we point out the trade-offs when applying pruning to event logs and highlight the applicability of log pruning to event-sourced systems.

Meißner, Dominik
Doctoral Symposium: Towards Time Travel in Distributed Event-sourced Systems
Proceedings of the 12th ACM International Conference on Distributed Event-Based Systems
Juni 2018
akzeptiert

Zusammenfassung: Stateful applications are based on the state they hold and how it changes over time. This history of state changes is usually discarded as the application progresses. By building on concepts from event processing and storing the application history, we envision a novel programming paradigm that supports retroaction. Retroactive computing introduces new opportunities for a developer to access and even modify an application timeline. By enabling the exploration of alternative scenarios, retroactive computing establishes powerful new ways to debug systems and introduces new approaches to solve problems. Initial work has shown the practicality and possibilities of this new programming paradigm and introduces further research questions and challenges.

Schlee, Winfried; Hall, Deborah A.; Canlon, Barbara; Cima, Rilana F. F.; de Kleine, Emile; Hauck, Franz J.; Huber, Alex; Gallus, Silvano; Kleinjung, Tobias; Kypraios, Theodore; Langguth, Berthold; Lopez-Escamez, José A.; Lugo, Alessandra; Meyer, Martin; Mielczarek, Marzena; Norena, Arnau; Pfiffner, Flurin; Pryss, Rüdiger C.; Reichert, Manfred; Requena, Teresa; Schecklmann, Martin; van Dijk, Pim; van de Heyning, Paul; Weisz, Nathan; Cederroth, Christopher R.
Innovations in doctoral training and research on Tinnitus: the European School on Interdisciplinary Tinnitus Research (ESIT) perspective
Frontiers in Aging Neuroscience, 9:447
Januar 2018

Zusammenfassung: Tinnitus is a common medical condition which interfaces many different disciplines, yet it is not a priority for any individual discipline. A change in its scientific understanding and clinical management requires a shift toward multidisciplinary cooperation, not only in research but also in training. The European School for Interdisciplinary Tinnitus research (ESIT) brings together a unique multidisciplinary consortium of clinical practitioners, academic researchers, commercial partners, patient organizations, and public health experts to conduct innovative research and train the next generation of tinnitus researchers. ESIT supports fundamental science and clinical research projects in order to: (1) advancing new treatment solutions for tinnitus, (2) improving existing treatment paradigms, (3) developing innovative research methods, (4) performing genetic studies on, (5) collecting epidemiological data to create new knowledge about prevalence and risk factors, (6) establishing a pan-European data resource. All research projects involve inter-sectoral partnerships through practical training, quite unlike anything that can be offered by any single university alone. Likewise, the postgraduate training curriculum fosters a deep knowledge about tinnitus whilst nurturing transferable competencies in personal qualities and approaches needed to be an effective researcher, knowledge of the standards, requirements and professionalism to do research, and skills to work with others and to ensure the wider impact of research. ESIT is the seed for future generations of creative, entrepreneurial, and innovative researchers, trained to master the upcoming challenges in the tinnitus field, to implement sustained changes in prevention and clinical management of tinnitus, and to shape doctoral education in tinnitus for the future.

Kleber, Stephan; Maile, Lisa; Kargl, Frank
Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis
IEEE Communications Surveys and Tutorials, tba.
2018
akzeptiert

Zusammenfassung: Knowledge about a network protocol to understand the communication between entities is necessary for vulnerability research, penetration testing, malware analysis, network reconnaissance, and network modeling. Traffic analysis is one approach to infer a protocol. This approach shares common challenges, tasks, methods, and solutions. In this survey, we collect tools proposed by previous work in the research field of protocol reverse engineering by static traffic trace analysis. We dissect each tool to discern the individual mechanisms and the algorithms they are based on. Thereby, we categorize and contrast these mechanisms and algorithms that are used in static traffic trace analysis to discuss how successful they were applied in each case. We compared classification schemes for protocol reverse engineering to structure our discussion about the tools. We present and discuss an explicit process model for static traffic trace analysis revealing the common structure of the decomposed tools and frameworks from previous research. By discussions about the algorithms applied within each tool for each process task, we show relations between tools, methods, and the process. We validate our model by applying it to each of the tools, followed by an outline of the utility of protocol reverse engineering. Starting out from the process description, we deduce which solutions and algorithms have already been investigated and where challenges remain so that novel solutions need to be searched for in the future. Regarding the whole field of protocol reverse engineering, it is a prevalent problem that only very few implementations of tools and frameworks are publicly available.

Kopp, Henning; Kargl, Frank; Bösch, Christoph; Peter, Andreas
uMine: A Blockchain based on Human Miners
ICICS 2018 aus LNCS
Herausgeber: Springer,
2018
Export als: BibTeX, XML

Klicken Sie hier um eine Übersicht aller Publikationen zu erhalten.