Dataflow challenges in an internet of production: a security & privacy perspective

J Pennekamp, M Henze, S Schmidt… - Proceedings of the …, 2019 - dl.acm.org
The Internet of Production (IoP) envisions the interconnection of previously isolated CPS in
the area of manufacturing across institutional boundaries to realize benefits such as …

Contextual counters and multimodal Deep Learning for activity-level traffic classification of mobile communication apps during COVID-19 pandemic

I Guarino, G Aceto, D Ciuonzo, A Montieri, V Persico… - Computer Networks, 2022 - Elsevier
The COVID-19 pandemic has reshaped Internet traffic due to the huge modifications
imposed to lifestyle of people resorting more and more to collaboration and communication …

Tailoring onion routing to the internet of things: Security and privacy in untrusted environments

J Hiller, J Pennekamp, M Dahlmanns… - 2019 IEEE 27th …, 2019 - ieeexplore.ieee.org
An increasing number of IoT scenarios involve mobile, resource-constrained IoT devices
that rely on untrusted networks for Internet connectivity. In such environments, attackers can …

Goal-driven exploration for android applications

D Lai, J Rubin - 2019 34th IEEE/ACM International Conference …, 2019 - ieeexplore.ieee.org
This paper proposes a solution for automated goal-driven exploration of Android
applications-a scenario in which a user, eg, a security auditor, needs to dynamically trigger …

Stamping process modelling in an internet of production

P Niemietz, J Pennekamp, I Kunze, D Trauth… - Procedia …, 2020 - Elsevier
Sharing data between companies throughout the supply chain is expected to be beneficial
for product quality as well as for the economical savings in the manufacturing industry. To …

The quest for secure and privacy-preserving cloud-based industrial cooperation

M Henze - 2020 IEEE Conference on Communications and …, 2020 - ieeexplore.ieee.org
Industrial cooperation promises to leverage the huge amounts of data generated by and
collected in industrial deployments to realize valuable improvements such as increases in …

Inviseal: A stealthy dynamic analysis framework for android systems

S Kumar, D Mishra, B Panda, SK Shukla - Digital Threats: Research and …, 2023 - dl.acm.org
With wide adaptation of open-source Android into mobile devices by different device
vendors, sophisticated malware are developed to exploit security vulnerabilities. As …

[图书][B] Secure collaborations for the industrial Internet of Things

J Pennekamp, K Wehrle, F Kerschbaum - 2024 - jpennekamp.de
Abstract The Industrial Internet of Things (IIoT) is leading to increasingly-interconnected and
networked industrial processes and environments, which, in turn, results in stakeholders …

[图书][B] Auditing Corporate Surveillance Systems: Research Methods for Greater Transparency

I Wagner - 2022 - books.google.com
News headlines about privacy invasions, discrimination, and biases discovered in the
platforms of big technology companies are commonplace today, and big tech's reluctance to …

The case for session sharing: relieving clients from TLS handshake overheads

J Hiller, M Henze, T Zimmermann… - 2019 IEEE 44th LCN …, 2019 - ieeexplore.ieee.org
In recent years, the amount of traffic protected with Transport Layer Security (TLS) has
significantly increased and new protocols such as HTTP/2 and QUIC further foster this …