Currently browsing category

Seminar

October 24, 2013: Attack surface measurements for state-of-the-art kernel hardening mechanisms

Speaker: Sergej Dechand Title: Attack surface measurements for state-of-the-art kernel hardening mechanisms Abstract: In the light of numerous vulnerabilities in commodity operating systems such as Linux and Windows, many kernel hardening solutions have been proposed in academia and industry. Such security enhancements often come with drawbacks – either in terms of performance, stability, …

September 5, 2013: Modeling Contracts using (Integer) Linear Programs

Speaker: Wenbo Xu Title: Modeling Contracts using (Integer) Linear Programs Abstract: We introduce how to model contracts, such as the ones used in CCC, as integer linear programs (LPs). This makes it possible to treat contracts as sets of objectives and constraints, allowing to solve a number of problems related to contracts in …

August 22, 2013: Trust Management and its application in the CCC security contracts

Speaker: Vassilis Prevelakis Title: Trust Management and its application in the CCC security contracts Abstract: In this talk I will start with a short introduction to Trust Management and then discuss the application of this technique in the access control framework of CCC. I will use a simple actuator – sensor combination to …

August 8, 2013: Adaptive Hardware by Dynamically Reconfigurable FPGA its Application on a Space Science Instrument

Speaker: Björn Fiethe Title: Adaptive Hardware by Dynamically Reconfigurable FPGA its Application on a Space Science Instrument Abstract: A limited telemetry rate combined with a large amount of scientific information retrieved from e.g. camera systems demand that classical ground processing steps like determination of scientific parameters need to be performed already on-board …

July 18, 2013: Algorithmic methods for reconfigurable systems

Speaker: Sándor Fekete Title: Algorithmic methods for reconfigurable systems Abstract: The ReCoNodes project (2003-2009, with followup work until 2012) resulted in 20 highly cited joint publications with the group of Jürgen Teich in Erlangen. The idea was to combine algorithmic theory with the applied problems of Hardware-software-codesign in order to achieve new methods …

June 27, 2013: Safety and availability analysis methods under concurrent change

Speaker: Mischa Möstl Title: Safety and availability analysis methods under concurrent change Abstract: For a wide range of applications safety standards exist as a descendant of general safety norms such as IEC 61508. In current development flows the methods proposed by these standards are usually applied at the system level in order …

June 13, 2013: muXer Efficient network selection in heterogeneous communication scenarios using arbitration

Speaker: Martin Wegner Title: muXer: Efficient network selection in heterogeneous communication scenarios using arbitration Abstract: The usage of mobile internet has steadily increased over the past years. The devices used for accessing the internet often feature multiple communication technologies such as GPRS, UMTS/CDMA, LTE and Wireless LAN. Moreover, technologies over short distances …

May 30, 2013: Dynamic application management and reconfiguration for an embedded hypervisor

Speaker: Johannes Schlatow Title: Dynamic application management and reconfiguration for an embedded hypervisor Abstract: In the scope of his Master’s thesis, Johannes Schlatow has been working on implementing a reconfiguration infrastructure for (isolated) software applications in MicroC/OS-II MMU. For this purpose, an application model has been developed that describes applications as isolated guest …