Andreas Aßmuth
Andreas Aßmuth
Home
Teaching
Projects
Talks
Publications
Contact
Light
Dark
Automatic
Publications
Type
Journal article
Book
Conference paper
Report
Thesis
Date
2023
2022
2021
2020
2019
2018
2017
2016
2014
2007
Security Challenges for Cloud or Fog Computing-Based AI Applications
Security challenges for cloud or fog-based machine learning services pose several concerns. Securing the underlying cloud or fog …
Amir Pakmehr
,
Andreas Aßmuth
,
Christoph P. Neumann
,
Gerald Pirkl
PDF
Cite
Encrypted Container File: Design and Implementation of a Hybrid-Encrypted Multi-Recipient File Structure
Modern software engineering trends towards Cloud-native software development by international teams of developers. Cloud-based version …
Tobias J. Bauer
,
Andreas Aßmuth
PDF
Cite
Cloud Computing 2023, The Fourteenth International Conference on Cloud Computing, GRIDs, and Virtualization
Andreas Aßmuth
PDF
Cite
Security für eingebettete Systeme in kritischen Infrastrukturen: Ergebnisse und Erkenntnisse
As the industrial Internet of Things progresses, sensors and actuators become network-enabled and smarter. However, the increasing …
Simon Liebl
,
Andreas Aßmuth
,
Matthias Söllner
Cite
IT Security of Cloud Services and IoT Devices in Healthcare
The healthcare industry worldwide is currently being transformed by digitization and the Internet of Things. As the level of …
Michael Gleißner
,
Johannes Dotzler
,
Juliana Hartig
,
Andreas Aßmuth
,
Clemens Bulitta
,
Steffen Hamm
PDF
Cite
Cloning Optical Physical Unclonable Functions Using Machine Learning Attacks
Physical Unclonable Functions (PUFs) can be used to uniquely identify instances of physical objects that are otherwise constructed in …
Leah Lathrop
,
Andreas Aßmuth
,
Matthias Söllner
Cite
IT Security of Cloud Services and IoT Devices in Healthcare
The continuous evolution of new technologies is going to rapidly transform several sectors. A widespread hypothesis claims that …
Michael Gleißner
,
Johannes Dotzler
,
Juliana Hartig
,
Andreas Aßmuth
,
Clemens Bulitta
,
Steffen Hamm
PDF
Cite
An Approach for Decentralized Authentication in Networks of UAVs
We propose a decentralized authentication system for networks of unmanned aerial vehicles. A blockchain-based public key infrastructure …
Nicholas Jäger
,
Andreas Aßmuth
PDF
Cite
A Secure and Privacy-Friendly Logging Scheme
Finding a robust security mechanism for audit trail logging has long been a poorly satisfied goal. There are many reasons for this. The …
Andreas Aßmuth
,
Robert Duncan
,
Simon Liebl
,
Matthias Söllner
PDF
Cite
Securing Low-Power Industrial Devices in Critical Infrastructures
Through the Internet of Things, more devices from the automation sector are connected to the Internet. These are mainly low-power …
Simon Liebl
,
Leah Lathrop
,
Andreas Aßmuth
,
Matthias Söllner
Cite
Projekt AutoDrive – fail-aware, fail-safe, fail-operational
The AutoDrive project brings together an innovative pan-European ecosystem consisting of 61 partners representing leading semiconductor …
Heike Lepke
,
Mathias Schneider
,
Alfred Höß
,
Nicolas Jäger
,
Andreas Aßmuth
Cite
Forschungsprojekt ADACORSA \"Airborne data collection on resilient system architectures\"
Drones have a great potential in the civilian section, but this potential is currently limited by the fact that drones cannot yet …
Nicholas Jäger
,
Patrick Purucker
,
Christian Reil
,
Alfred Höß
,
Andreas Aßmuth
Cite
Analyzing the Attack Surface and Threats of Industrial Internet of Things Devices
The growing connectivity of industrial devices as a result of the Internet of Things is increasing the risks to Industrial Control …
Simon Liebl
,
Leah Lathrop
,
Ulrich Raithel
,
Andreas Aßmuth
,
Ian Ferguson
,
Matthias Söllner
PDF
Cite
Threat Analysis of Industrial Internet of Things Devices
As part of the Internet of Things, industrial devices are now also connected to cloud services. However, the connection to the Internet …
Simon Liebl
,
Leah Lathrop
,
Ulrich Raithel
,
Matthias Söllner
,
Andreas Aßmuth
PDF
Cite
Securing the Internet of Things from the Bottom Up Using Physical Unclonable Functions
Cyberattacks that target hardware are becoming increasingly prevalent. These include probing attacks that aim at physically extracting …
Leah Lathrop
,
Simon Liebl
,
Ulrich Raithel
,
Matthias Söllner
,
Andreas Aßmuth
PDF
Cite
Cloud Computing 2020, The Eleventh International Conference on Cloud Computing, GRIDs, and Virtualization
Bob Duncan
,
Magnus Westerlund
,
Andreas Aßmuth
,
Sebastian Fischer
,
Aspen Olmsted
PDF
Cite
Cloud-Backup-Strategien
Cloud storage services such as Dropbox, iCloud, Microsoft OneDrive and Amazon S3 are rapidly growing in popularity. The data a user …
Fabian Süß
,
Andreas Aßmuth
Cite
Security of Cloud Services with Low-Performance Devices in Critical Infrastructures
As part of the Internet of Things (IoT) and Industry 4.0 Cloud services are increasingly interacting with low-performance devices that …
Michael Molle
,
Ulrich Raithel
,
Dirk Kraemer
,
Norbert Graß
,
Andreas Aßmuth
,
Matthias Söllner
PDF
Cite
PLASMA – Platform for Service Management in Digital Remote Maintenance Applications
To support maintenance and servicing of industrial machines, service processes are even today often performed manually and analogously, …
Natascha Stumpp
,
Doris Aschenbrenner
,
Manuel Stahl
,
Andreas Aßmuth
PDF
Cite
Cloud Security and Security Challenges revisited
In recent years, Cloud Computing has transformed local businesses and created new business models on the Internet– and Cloud services …
Fabian Süß
,
Marco Freimuth
,
Andreas Aßmuth
,
George Weir
,
Robert Duncan
PDF
Cite
Cloud Computing 2019, The Tenth International Conference on Cloud Computing, GRIDs, and Virtualization
Bob Duncan
,
Yong Woo Lee
,
Magnus Westerlund
,
Andreas Aßmuth
PDF
Cite
Sicherheitsprobleme und -herausforderungen beim autonomen Fahren
Individual mobility is currently undergoing a change to meet future challenges. Autonomous driving could play an important role in the …
Nicholas Jäger
,
Andreas Aßmuth
Cite
Analysis of the Internet Security Protocol TLS Version 1.3
The Transport Layer Security (TLS) protocol is probably the most important security protocol on the Internet. It is generally used for …
Ahmed Alqattaa
,
Andreas Aßmuth
Cite
Securing 3rd Party App Integration in Docker-based Cloud Software Ecosystems
Open software ecosystems are beneficial for customers; they benefit from 3rd party services and applications, e.g., analysis of data …
Christian Binkowski
,
Stefan Appel
,
Andreas Aßmuth
PDF
Cite
Managing Forensic Recovery in the Cloud
As organisations move away from locally hosted computer services toward Cloud platforms, there is a corresponding need to ensure the …
George Weir
,
Andreas Aßmuth
,
Nicholas Jäger
PDF
Cite
Forensic Recovery and Intrusion Monitoring in the Cloud
As organisations move away from locally hosted computer services toward Cloud platforms, there is a corresponding need to ensure the …
George Weir
,
Andreas Aßmuth
,
Nicholas Jäger
PDF
Cite
Bedrohungen durch Scheduling-basierende Angriffsszenarien im Automotive-Bereich
To provide an intuitive experience for the driver, connecting objects and devices (Internet of Things IoT) as well as the …
Tobias Nickl
,
Benjamin Weigl
,
Andreas Aßmuth
Cite
Strategies for intrusion monitoring in cloud services
Effective activity and event monitoring is an essential aspect of digital forensic readiness. Techniques for capturing log and other …
George Weir
,
Andreas Aßmuth
PDF
Cite
Cloud Accounting Systems, the Audit Trail, Forensics and the EU GDPR: How Hard Can It Be?
Ahead of the introduction of the EU General Data Privacy Regulation (GDPR), we consider some important unresolved issues with cloud …
George Weir
,
Andreas Aßmuth
,
Mark Whittington
,
Robert Duncan
Cite
Bedrohungslage fahrzeuginterner Kommunikationsnetzwerke und Bus-Systeme
The increasing number of connected cars interacting with each other and the environment has revealed a variety of vulnerabilities. …
Benjamin Weigl
,
Andreas Aßmuth
Cite
Setting up a Multi-core Computing System for Cryptanalytic Problems and Evaluation of Password Cracking Algorithms
Every Internet user has to cope with a lot of different passwords every day. These passwords should be pseudorandom strings of a …
Tilo Fischer
,
Andreas Aßmuth
Cite
Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors
Industrial control systems (ICSs) are, at present, extremely vulnerable to cyber attack because they are homogenous and interconnected. …
Andreas Aßmuth
,
Paul Cockshott
,
Jana Kipke
,
Karen Renaud
,
Lewis Mackenzie
,
Wim Vanderbauwhede
,
Matthias Söllner
,
Tilo Fischer
,
George Weir
Cite
DOI
Ein Supercomputer für (fast) 0 €
Andreas Aßmuth
,
Matthias Söllner
Cite
The role of atomic hydrogen in pre-epitaxial silicon substrate cleaning
The cleaning of silicon (Si) surfaces is a very important issue for the fabrication of novel semiconductor devices on the nanoscale. …
Andreas Aßmuth
,
Tanja Stimpel-Lindner
,
Oliver Senftleben
,
Anton Bayerstadler
,
Torsten Sulima
,
Hermann Baumgärtner
,
Ignaz Eisele
Cite
DOI
URL
Photonenaktivierte Reinigungs- und Oxidationsprozesse für die Nanoelektronik
Andreas Aßmuth
Cite
Laser Activated Radical Generation in Rapid Thermal Processing
In the present paper it will be shown that RTP combined with laser irradiation parallel to the wafer surface yields an optimum control …
Ignaz Eisele
,
Andreas Aßmuth
,
Torsten Sulima
Cite
DOI
Doping profile dependence of the vertical impact ionization MOSFET’s (I-MOS) performance
This paper presents experimental results and explanations on the doping profile dependence of the electrical behavior of the vertical …
Ulrich Abelein
,
Andreas Aßmuth
,
Peter Iskra
,
Markus Schindler
,
Torsten Sulima
,
Ignaz Eisele
Cite
DOI
URL
Cite
×