Filtern
Erscheinungsjahr
- 2020 (32) (entfernen)
Dokumenttyp
- Wissenschaftlicher Artikel (20)
- Konferenzveröffentlichung (6)
- Sonstiges (3)
- Dissertation (1)
- Masterarbeit (1)
- Video (1)
Sprache
- Englisch (32) (entfernen)
Schlagworte
- Augmented Reality (1)
- Cookie <Internet> (1)
- Cr(VI) and Zn(II) cations (1)
- Datenschutz (1)
- Erweiterte Realität <Informatik> (1)
- Flugkörper (1)
- Hands-free Interaction (1)
- Human-Robot Interaction (1)
- Hydrogen evolution reaction (1)
- MITRE (1)
Institut
- Westfälisches Institut für Gesundheit (6)
- Westfälisches Energieinstitut (5)
- Elektrotechnik und angewandte Naturwissenschaften (4)
- Informatik und Kommunikation (4)
- Institut für biologische und chemische Informatik (3)
- Institut für Internetsicherheit (1)
- Wirtschaft und Informationstechnik Bocholt (1)
- Wirtschaftsingenieurwesen (1)
Advanced Persistent Threats (APTs) are one of the main challenges in modern computer security. They are planned and performed by well-funded, highly-trained and often state-based actors. The first step of such an attack is the reconnaissance of the target. In this phase, the adversary tries to gather as much intelligence on the victim as possible to prepare further actions. An essential part of this initial data collection phase is the identification of possible gateways to intrude the target.
In this paper, we aim to analyze the data that threat actors can use to plan their attacks. To do so, we analyze in a first step 93 APT reports and find that most (80 %) of them begin by sending phishing emails to their victims. Based on this analysis, we measure the extent of data openly available of 30 entities to understand if and how much data they leak that can potentially be used by an adversary to craft sophisticated spear phishing emails. We then use this data to quantify how many employees are potential targets for such attacks. We show that 83 % of the analyzed entities leak several attributes of uses, which can all be used to craft sophisticated phishing emails.
In the modern Web, service providers often rely heavily on third parties to run their services. For example, they make use of ad networks to finance their services, externally hosted libraries to develop features quickly, and analytics providers to gain insights into visitor behavior.
For security and privacy, website owners need to be aware of the content they provide their users. However, in reality, they often do not know which third parties are embedded, for example, when these third parties request additional content as it is common in real-time ad auctions.
In this paper, we present a large-scale measurement study to analyze the magnitude of these new challenges. To better reflect the connectedness of third parties, we measured their relations in a model we call third party trees, which reflects an approximation of the loading dependencies of all third parties embedded into a given website. Using this concept, we show that including a single third party can lead to subsequent requests from up to eight additional services. Furthermore, our findings indicate that the third parties embedded on a page load are not always deterministic, as 50 % of the branches in the third party trees change between repeated visits. In addition, we found that 93 % of the analyzed websites embedded third parties that are located in regions that might not be in line with the current legal framework. Our study also replicates previous work that mostly focused on landing pages of websites. We show that this method is only able to measure a lower bound as subsites show a significant increase of privacy-invasive techniques. For example, our results show an increase of used cookies by about 36 % when crawling websites more deeply.
This thesis evaluates the effects of the GDPR using a technical and human-centric approach. We assess challenges service providers face when they want to design GDPR-proof web applications. On the technical side, we perform two large-scale measurement studies. The first study aims to illuminate third party loading dependencies in web applications. The second study provides a detailed analysis of the information-sharing networks between online adver-tising companies. The human-centric analysis studies how companies implemented the Right to Access and if users can profit from the new right.
Challenging visual localization of an UAV while flying out of a room into a snowy environment (~ 4:50). The UAV is equipped with a 360° camera. The localization is done with OpenVSLAM.
The video was recorded in Jan. 2019 at the Fire Brigade training center in Dortmund
To achieve nearly real time conditions the original resolution of 5k (30 fps) was reduced to 2k (ffmpeg -i video.mp4 -vf scale=1920:-1 -crf 25 vido-small.mp4) with high compression (-crf 25). This reduce the original size from 3.2 GB to 93MB (~ 4 MBit/s which could be transmitted online via a radio link). The localization shown did not use frameskip. With a frameskip above 1 the localization fails while the UAV is flying through the window. Indoor localization can be done with a frameskip of 3 in real time.
The activated sludge respiration inhibition test and the luminescent bacteria test with Vibrio fischeri are important bacterial test systems for evaluation of the toxicity of chemical compounds. These test systems were further optimized to result in better handling, reliability and sensitivity. Concerning the Vibrio fischeri test, media components such as yeast extract and bivalent cation concentrations like Ca2+ and Mg2+ were optimized. The cultivation, storage conditions and reactivation process of the stored bacteria were also improved, which enabled simpler handling and led to good reproducibility. Additionally, the respiration inhibition test with a prolonged incubation time was further analyzed using different chlorinated phenols as reference compounds. It could be stated that a longer incubation period significantly improved the sensitivity of the test system.
A systematic method for obtaining a novel electrode structure based on PtCoMn ternary alloy catalyst supported on graphitic carbon nanofibers (CNF) for hydrogen evolution reaction (HER) in acidic media is proposed. Ternary alloy nanoparticles (Co0.6Mn0.4 Pt), with a mean crystallite diameter under 10 nm, were electrodeposited onto a graphitic support material using a two-step pulsed deposition technique. Initially, a surface functionalisation of the carbon nanofibers is performed with the aid of oxygen plasma. Subsequently, a short galvanostatic pulse electrodeposition technique is applied. It has been demonstrated that, if pulsing current is employed, compositionally controlled PtCoMn catalysts can be achieved. Variations of metal concentration ratios in the electrolyte and main deposition parameters, such as current density and pulse shape, led to electrodes with relevant catalytic activity towards HER. The samples were further characterised using several physico-chemical methods to reveal their morphology, structure, chemical and electrochemical properties. X-ray diffraction confirms the PtCoMn alloy formation on the graphitic support and energy dispersive X-ray spectroscopy highlights the presence of the three metallic components from the alloy structure. The preliminary tests regarding the electrocatalytic activity of the developed electrodes display promising results compared to commercial Pt/C catalysts. The PtCoMn/CNF electrode exhibits a decrease in hydrogen evolution overpotential of about 250 mV at 40 mA cm−2 in acidic solution (0.5 M H2SO4) when compared to similar platinum based electrodes (Pt/CNF) and a Tafel slope of around 120 mV dec−1, indicating that HER takes place under the Volmer-Heyrovsky mechanism.