Filtern
Erscheinungsjahr
- 2015 (169) (entfernen)
Dokumenttyp
- Wissenschaftlicher Artikel (59)
- Beitrag zu einer (nichtwissenschaftlichen) Zeitung oder Zeitschrift (28)
- Konferenzveröffentlichung (26)
- Teil eines Buches (Kapitel) (23)
- Buch (Monographie) (17)
- Video (5)
- Bericht (5)
- Rezension (2)
- Bachelorarbeit (1)
- Dissertation (1)
Schlagworte
- Juristenausbildung (5)
- Wirtschaftsjurist (4)
- Hochschuldidaktik (2)
- Journalismus (2)
- Juristisches Studium (2)
- Polymer-Elektrolytmembran-Brennstoffzelle (2)
- adhesion (2)
- Akte (1)
- Alternative Geschäftsmodelle (1)
- Archivrecht (1)
Institut
- Wirtschaftsrecht (77)
- Institut für Internetsicherheit (19)
- Informatik und Kommunikation (15)
- Westfälisches Energieinstitut (13)
- Institut für Innovationsforschung und -management (8)
- Maschinenbau Bocholt (8)
- Wirtschaft und Informationstechnik Bocholt (7)
- Westfälisches Institut für Gesundheit (5)
- Wirtschaft Gelsenkirchen (4)
- Strategische Projekte (3)
- Institut Arbeit und Technik (2)
- Maschinenbau und Facilities Management (2)
- Elektrotechnik und angewandte Naturwissenschaften (1)
- Wirtschaftsingenieurwesen (1)
The video shows a snapshot of a 16 minute flight of a DJI Phantom 3 professional over the Schloss Birlinghoven at Sankt Augustin, Germany. The castle is located at the Fraunhofer Campus at Sankt Augustin. The 3D model is generated out of 400 key frames of the 4k video which are cut out with ffmpeg. The work is part of an evaluation in the Tradr Project (www.tradr-project.eu)
This video shows a model computed from 320 images taken at the Tjex 2015 of the trade project (www.tradr-project.eu). The images were acquired with a falcan 8 drone (AscTec) and reconstruct the structure with VisualSfm software. The flight was in 150 m. The Tower is about 95 meter high.
This video shows a model computed from 124 images taken at the Tjex 2015 of the trade project (www.tradr-project.eu). The images were acquired by walking around the object and reconstruct the structure with VisualSfm software.
Steganography, the art of concealing information in different types of medias, is a very old practice. Yet, it only recently started being used by malware operators on a large scale. Malware programmers and operators are increasing their efforts in developing covert communication channels between infected computers and their command and control servers. In addition to steganography, recent examples include hiding communication in inconspicuous network traffic such as DNS queries or HTTP 404 error messages.
When used properly, these covert communication channels can bypass many automated detection mechanisms and render malware communication difficult to detect and block. From an attacker's perspective, covert communication channels are a valuable addition because they allow messages to blend in with legitimate traffic and thus significantly lower the chance of being detected even when inspected by a human analyst.
This presentation studies recent advances in covert communication channels used by real-world malware. First, we will show how steganography has recently been used in three different malware families (Stegoloader, Vawtrak, and Lurk). We will dive into the implementation details on how steganography is implemented and discuss the strengths and weaknesses of each approach. Furthermore, we will detail and compare the usage of inconspicuous carrier protocols for covert communication channels in malware. Examples will span commodity cybercrime as well as targeted attack malware.
The cases that are discussed in this presentation are based on real life incidents. While it is easy to speculate how covert communication channels might be used by malicious actors, documentation of real-world cases is sparse. Yet covert communication channels have arrived in both, the commodity cybercrime and targeted attack world. It is thus vital to understand the status-quo and identify current trends in cybercriminal and targeted attack malware. As such, we believe that it is mandatory to highlight what is currently being used in the wild.
Das härteste Wettbewerbsumfeld ist die Natur. Ein hoher Selektionsdruck führt dort zu Organismen, die mit geringem Aufwand besser an die herrschenden Bedingungen angepasst sind, als die Wettbewerber. Die hierzu verwendeten Strategien zum Materialeinsatz sind sehr effizient und als Strukturoptimierung abstrahiert auch in der Technik anwendbar. In diesem Vortrag werden Optimierungsmethoden und Vorgehensweisen für einen effizienten Materialverbrauch vorgestellt und diskutiert.