Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Michael Waidner is active.

Publication


Featured researches published by Michael Waidner.


design automation conference | 2015

Security and privacy challenges in industrial internet of things

Ahmad-Reza Sadeghi; Christian Wachsmann; Michael Waidner

Today, embedded, mobile, and cyberphysical systems are ubiquitous and used in many applications, from industrial control systems, modern vehicles, to critical infrastructure. Current trends and initiatives, such as “Industrie 4.0” and Internet of Things (IoT), promise innovative business models and novel user experiences through strong connectivity and effective use of next generation of embedded devices. These systems generate, process, and exchange vast amounts of security-critical and privacy-sensitive data, which makes them attractive targets of attacks. Cyberattacks on IoT systems are very critical since they may cause physical damage and even threaten human lives. The complexity of these systems and the potential impact of cyberattacks bring upon new threats. This paper gives an introduction to Industrial IoT systems, the related security and privacy challenges, and an outlook on possible solutions towards a holistic security framework for Industrial IoT systems.


applied cryptography and network security | 2014

Fragmentation Considered Leaking: Port Inference for DNS Poisoning

Haya Shulman; Michael Waidner

Internet systems and networks have a long history of attacks by off-path adversaries. An off-path adversary cannot see the traffic exchanged by the legitimate end points, and in the course of an attack it attempts to impersonate some victim by injecting spoofed packets into the communication flow. Such attacks subvert the correctness and availability of Internet services and, among others, were applied for DNS cache poisoning, TCP injections, reflection DDoS attacks.


european symposium on research in computer security | 2015

Towards Security of Internet Naming Infrastructure

Haya Shulman; Michael Waidner

We study the operational characteristics of the server-side of the Internets naming infrastructure. Our findings discover common architectures whereby name servers are hidden behind server-side caching DNS resolvers. We explore the extent and the scope of the name servers that use server-side caching resolvers, and find such configurations in at least


design, automation, and test in europe | 2016

Security in industrie 4.0 - challenges and solutions for the fourth industrial revolution

Michael Waidner; Michael Kasper


international conference on pervasive computing | 2014

Personal DLP for Facebook

Marco Ghiglieri; Martin Stopczynski; Michael Waidner

38,%


ieee symposium on security and privacy | 2016

HbbTV Security and Privacy: Issues and Challenges

Marco Ghiglieri; Michael Waidner


Archive | 2013

Federated Identity Management

Lukas Kalabis; Michael Waidner

of the domains in a forward DNS tree, and higher percents of the domains in a reverse DNS tree. We characterise the operators of the server-side caching resolvers and provide motivations, explaining their prevalence. n nOur experimental evaluation indicates that the caching infrastructures are typically run by third parties, and that the services, provided by the third parties, often do not deploy best practices, resulting in misconfigurations, vulnerabilities and degraded performance of the DNS servers in popular domains.


Archive | 2013

Personal Information Dashboard: Putting the Individual Back in Control

Johannes A. Buchmann; Maxi Nebel; Alexander Roßnagel; Fatemeh Shirazi; Hervais Simo; Michael Waidner

Information technology (IT) is one of the most important drivers of innovation in production and automation. In Germany, the term Industrie 4.0 summarizes various activities and developments involved in the evolution of industrial processes in production, logistics, automation, etc. Many research and development projects work on different aspects of these developments. In the view of politics, industry, and IT enterprises, sufficient IT security is considered an essential prerequisite for the future of production. Although many current IT security solutions can be applied in Industrie 4.0 context, they do not satisfy requirements of processes in Industrie 4.0. Work needs to be done on underlying security mechanisms as well as on security architectures.


Digital Enlightenment Yearbook 2013 : The Value of Personal Data | 2013

Online Privacy: Towards Informational Self-Determination on the Internet

Simone Fischer-Hübner; Chris Jay Hoofnagle; Ioannis Krontiris; Kai Rannenberg; Michael Waidner; Caspar Bowden

Data Loss Prevention (DLP) is a well-established security and privacy concept in enterprise environments: Enterprise DLP tools scan outgoing messages and stop unintended information flows. It may catch malicious insiders, but the main use case is avoiding data leaks due to human errors. Good DLP tools prevent careless employees from doing something they would probably regret if made aware of. Individuals using online social networks are in a very similar situation: Often they share the wrong information with the wrong people, unaware of the risks and often even unaware of the technical meaning of what they are doing. Personal DLP, introduced in this paper, extends the notion of DLP to individual users. It makes the individual users aware of risks and mistakes, and it does so based on rules explicitly set by each user, and rules derived from that users past behavior and individual settings. Personal DLP raises awareness by explaining the risks, but the final decision is always with the user.


Archive | 2016

Survey of Software Protection with Minimal Hardware

Amir Herzberg; Haya Shulman; Michael Waidner

Hybrid Broadcast Broadband TV (HbbTV) is a standardized technology that delivers Web content directly to smart TVs and set-top boxes. Unlike PCs and mobile devices, smart TVs dont allow consumers to configure privacy and security options. A review of HbbTV considers the implications of this limitation.

Collaboration


Dive into the Michael Waidner's collaboration.

Top Co-Authors

Avatar

Marco Ghiglieri

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Haya Shulman

Hebrew University of Jerusalem

View shared research outputs
Top Co-Authors

Avatar

Haya Shulman

Hebrew University of Jerusalem

View shared research outputs
Top Co-Authors

Avatar

Ahmad-Reza Sadeghi

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Christian Wachsmann

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Ioannis Krontiris

Goethe University Frankfurt

View shared research outputs
Top Co-Authors

Avatar

Johannes A. Buchmann

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Kai Rannenberg

Goethe University Frankfurt

View shared research outputs
Top Co-Authors

Avatar

Lukas Kalabis

Technische Universität Darmstadt

View shared research outputs
Researchain Logo
Decentralizing Knowledge