Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Henning Kopp is active.

Publication


Featured researches published by Henning Kopp.


privacy enhancing technologies | 2016

Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns

Christoph Bösch; Benjamin Erb; Frank Kargl; Henning Kopp; Stefan Pfattheicher

Abstract Privacy strategies and privacy patterns are fundamental concepts of the privacy-by-design engineering approach. While they support a privacy-aware development process for IT systems, the concepts used by malicious, privacy-threatening parties are generally less understood and known. We argue that understanding the “dark side”, namely how personal data is abused, is of equal importance. In this paper, we introduce the concept of privacy dark strategies and privacy dark patterns and present a framework that collects, documents, and analyzes such malicious concepts. In addition, we investigate from a psychological perspective why privacy dark strategies are effective. The resulting framework allows for a better understanding of these dark concepts, fosters awareness, and supports the development of countermeasures. We aim to contribute to an easier detection and successive removal of such approaches from the Internet to the benefit of its users.


engineering secure software and systems | 2015

Formal Verification of Privacy Properties in Electric Vehicle Charging

Marouane Fazouane; Henning Kopp; Rens Wouter van der Heijden; Daniel Le Métayer; Frank Kargl

Electric vehicles are an up-and-coming technology that provides significant environmental benefits. A major challenge of these vehicles is their somewhat limited range, requiring the deployment of many charging stations. To effectively deliver electricity to vehicles and guarantee payment, a protocol was developed as part of the ISO 15118 standardization effort. A privacy-preserving variant of this protocol, POPCORN, has been proposed in recent work, claiming to provide significant privacy for the user, while maintaining functionality. In this paper, we outline our approach for the verification of privacy properties of the protocol. We provide a formal model of the expected privacy properties in the applied Pi-Calculus and use ProVerif to check them. We identify weaknesses in the protocol and suggest improvements to address them.


international conference on information security | 2016

KopperCoin – A Distributed File Storage with Financial Incentives

Henning Kopp; Christoph Bösch; Frank Kargl

One of the current problems of peer-to-peer-based file storage systems like Freenet is missing participation, especially of storage providers. Users are expected to contribute storage resources but may have little incentive to do so. In this paper we propose KopperCoin, a token system inspired by Bitcoin’s blockchain which can be integrated into a peer-to-peer file storage system. In contrast to Bitcoin, KopperCoin does not rely on a proof of work (PoW) but instead on a proof of retrievability (PoR). Thus it is not computationally expensive and instead requires participants to contribute file storage to maintain the network. Participants can earn digital tokens by providing storage to other users, and by allowing other participants in the network to download files. These tokens serve as a payment mechanism. Thus we provide direct reward to participants contributing storage resources.


ieee european symposium on security and privacy | 2017

Design of a Privacy-Preserving Decentralized File Storage with Financial Incentives

Henning Kopp; David Mödinger; Franz J. Hauck; Frank Kargl; Christoph Bösch

Surveys indicate that users are often afraid to entrust data to cloud storage providers, because these do not offer sufficient privacy. On the other hand, peer-2-peer–based privacy-preserving storage systems like Freenet suffer from a lack of contribution and storage capacity, since there is basically no incentive to contribute own storage capacity to other participants in the network. We address these contradicting requirements by a design which combines a distributed storage with a privacy-preserving blockchain-based payment system to create incentives for participation while maintaining user privacy. By following a Privacy-by-Design strategy integrating privacy throughout the whole system life cycle, we show that it is possible to achieve levels of privacy comparable to state-of-the-art distributed storage technologies, despite integrating a payment mechanism. Our results show that it is possible to combine storage contracts and payments in a privacy-preserving way. Further, our system design may serve as an inspiration for future similar architectures.


workshop scalable and resilient infrastructures for distributed ledgers | 2017

Towards an economic analysis of routing in payment channel networks

Felix Engelmann; Henning Kopp; Frank Kargl; Florian Glaser; Christof Weinhardt

Payment channel networks are supposed to overcome technical scalability limitations of blockchain infrastructure by employing a special overlay network with fast payment confirmation and only sporadic settlement of netted transactions on the blockchain. However, they introduce economic routing constraints that limit decentralized scalability and are currently not well understood. In this paper, we model the economic incentives for participants in payment channel networks. We provide the first formal model of payment channel economics and analyze how the cheapest path can be found. Additionally, our simulation assesses the long-term evolution of a payment channel network. We find that even for small routing fees, sometimes it is cheaper to settle the transaction directly on the blockchain.


2015 International Conference and Workshops on Networked Systems (NetSys) | 2015

Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions

Stephan Kleber; Rens Wouter van der Heijden; Henning Kopp; Frank Kargl

Distance bounding protocols (DBPs) are security protocols that aim to limit the maximum possible distance between two partners in a wireless communication. This enables to ensure locality of interaction between two devices. Despite numerous proposed protocols, recent analyses of DBPs have shown the majority of them to be susceptible to attacks. Most prominent among the unsolved security problems of DBPs is terrorist fraud. This type of attack involves collaboration with a legitimate device, after which the attacker can successfully execute the protocol. We show how terrorist fraud can be prevented by replacing shared secrets - commonly used in classical DBPs - with physical unclonable functions (PUFs). Our new approach can be integrated in all current DBPs with minor modifications. We offer two alternate designs: One utilizing challenge-response PUFs and another using so-called SIMPL systems, a PUF-analogue to public-key cryptography. We use a security model proposed by previous work to demonstrate security of our scheme.


international conference on information fusion | 2018

Multi-Source Fusion Operations in Subjective Logic

Rens Wouter van der Heijden; Henning Kopp; Frank Kargl

The purpose of multi-source fusion is to combine information from more than two evidence sources, or subjective opinions from multiple actors. For subjective logic, a number of different fusion operators have been proposed, each matching a fusion scenario with different assumptions. However, not all of these operators are associative, and therefore multi-source fusion is not well-defined for these settings. In this paper, we address this challenge, and define multi-source fusion for weighted belief fusion (WBF) and consensus & compromise fusion (CCF). For WBF, we show the definition to be equivalent to the intuitive formulation under the bijective mapping between subjective logic and Dirichlet evidence PDFs. For CCF, since there is no independent generalization, we show that the resulting multi-source fusion produces valid opinions, and explain why our generalization is sound. For completeness, we also provide corrections to previous results for averaging and cumulative belief fusion (ABF and CBF), as well as belief constraint fusion (BCF), which is an extension of Dempsters rule. With our generalizations of fusion operators, fusing information from multiple sources is now well-defined for all different fusion types defined in subjective logic. This enables wider applicability of subjective logic in applications where multiple actors interact.


Archive | 2018

Publicly Verifiable Static Proofs of Storage: A Novel Scheme and Efficiency Comparisons

Henning Kopp; Frank Kargl; Christoph Bösch

Proofs of storage are cryptographic primitives that enable a storage provider to prove that it honestly stores files of its users without tampering or deleting parts of them. The performance of publicly verifiable proofs of storage is not well understood and is mostly measured asymptotically in the literature. We propose and implement a novel publicly verifiable static proof of storage based on the RSA assumption, measure its computational performance, and compare it to other state of the art schemes. In our performance evaluation, our scheme outperforms existing schemes with similar security guarantees in the time taken to encode the file. In the other metrics its runtime is comparable to that of existing schemes. We consider our scheme together with our practical evaluations to be an important contribution to the application of cloud storage security mechanisms.


usenix security symposium | 2018

NEMESYS: Network Message Syntax Reverse Engineering by Analysis of the Intrinsic Structure of Individual Messages.

Stephan Kleber; Henning Kopp; Frank Kargl


international conference on distributed computing systems | 2018

A Flexible Network Approach to Privacy of Blockchain Transactions

David Mödinger; Henning Kopp; Frank Kargl; Franz J. Hauck

Collaboration


Dive into the Henning Kopp's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Claudia Roda

American University of Paris

View shared research outputs
Top Co-Authors

Avatar

Susan Perry

American University of Paris

View shared research outputs
Top Co-Authors

Avatar

Fanny Coudert

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge