This workshop is a (mandatory!) part of the Network Security lecture held in the winter term 2018/2019. Subject of the workshop are all topics covered in the first chapter "Physical- & Link-Layer Security":
The workshop is organised in a typical computer science research conference manner. It consists of three phases:
After the third phase, we will take the best essays (according to their ratings) and publish them on the lecture's website in form of a workshop proceedings. As already mentioned in the lecture, the successful participation in this workshop (including all three phases) is mandatory and a formal prerequisite to the exam. Successful participation means that the final rating of your essay must be at least 0 (on a Likert scale).
Note: These deadlines are hard deadlines! Missing them results in an immediate exclusion from the workshop and loss of admission. So make sure you are well-organised.
Group registration: | |
Essay submission: | |
Reviews: | Friday, 18.01.2019 (23:59) |
Final version: | Sunday, 03.02.2019 (23:59) |
In order to be accepted for the review process, your essay must strictly conform with the following regulations. Violations will result in exclusion from the workshop and thus, exclusion from the NetSec exam. So please read the following instructions carefully and make sure your essay complies with the submission guidelines.
After you've successfully submitted your essay, it's time to start the review phase of the PhyLiSec workshop. Therefore, you will be added to the so called "Program Committee" on Easychair and Yasmina will assign two essays to each of you. If you have no EasyChair account yet, make sure you register using the email address your group mate entered in your submission. The reviews will be double-blind. This means that neither you know who you are reviewing, nor the other authors will know who reviewed them.
Start with reading the essays assigned to you carefully and then fill in the review form in EasyChair for each essay. You will find the essays assigned to you under "Reviews->Assigned to me". To submit a review, click on the "+"-Button and enter your review into the form. Each section in the review (summary/strengths/weaknesses) should have around 100 words. Be concise and provide arguments for your statements. The reviews will serve as a basis for improvements in the revision phase and all reviewers should keep this in mind. Finally, rate the essay between very bad (-2) and very good (2). Based on this final rating, we will decide whether you'll have to improve your essay in the revision phase or not in order to pass this workshop.
Plagiarism: In case you learn that the essay you are reviewing is a case of plagiarism, we recommend to reject the paper by rating it with -2. In such a case, please provide proof for your allegation by referencing the respective parts of the essay. Examples for plagiarism would be if the essay is almost completely copied from other works.
Misc: If you have any additional comments you would like us to know (but not the authors), use the comments field in the submission form.
The deadline for the review submission is at 23:59 on the 18th of January.
As mentioned in the notification email, those of you who have not achieved an average rating above or equal to 0.5 need to revise their essays. You can upload your revised essay on EasyChair. To do so, please change your role back to author (PhyLiSec16->Change Role).
In addition, everybody needs to upload a final version of the essay which includes the names of all authors.
The final versions of the papers are listed below. They are supposed to serve as an additional source for information for the exam preparation. Thanks everyone for participating and producing these great essays. The three best essays (according to the reviews) are marked with ★. Congratulations!
ID | Author(s) | Title | Link |
Jamming |
|||
J01 | Lucia Eve Berger, Selina Heller, Kamolchanok Tangsri | Reactive Jamming: Challenges and State of the Art | |
J02 | Mark Emmert | Jamming Attacks and Defense Strategies | |
J03 | Ricardo Stadtlober Sabedra, Rubens Ideron dos Santos, Bruno Catellan | On the Efficacy of Jammers | |
J04 | Sebastian Igel, Sebastian Maurice Kohler | Reactive Jamming: Challenges and State of the Art | |
J05 | Anuj Maharjan, Vikas Rajasheker, Mala Mahadevu | A Short Introduction to Jamming | |
IEEE 802.11 |
|||
W01 | Hagen Heermann, Janik Westers, Kevin Bartik | Attacks on IEEE 802.11: A Summary | |
W02 | Roman Krafft, Marcel Wölki | Comparison of Security in WEP, WPA and WPA2 | |
W03 | Rouven Heyne | Attacks on IEEE 802.11: A Summary | |
W04 | Maurice Hipp, Bjarne Janson | An Introduction to Security in IEEE 802.11 | |
Cellular Networks |
|||
M01 | Fehemi Lecini, Giovanni Capone | Security Measures in Cellular Networks: How good are they? | |
M02 | Deepak Paramashivam, Yash Rohilla | Security Measures in Cellular Networks: How good are they? | |
M03 | Nicolas Belliard, Mohammadali Forouzesh, Bogdan Alin Muresan | Attacks on GSM and LTE Networks | |
M04 | Jean-François Nies, Samir Bouchama | Attacks on GSM and LTE Networks | |
Air Trafic Surveillance |
|||
A01 | Eric Kinner, Dominik Kratz, Marco Stricker | Security of ADS-B: Attack Scenarios★ | |
A02 | Lisa Busser, Sviatlana Shukailava, Frederik Stegner | How to fix ADS-B | |
A03 | Patrick Hansert, Michele Klein, Christopher Queling | How to fix ADS-B Security | |
A04 | Martin Reber, Tim Aries | How to fix ADS-B Security | |
A05 | Tillmann Angeli, Marc Kraft, Paul Paulsen | Privacy and ADS-B | |
A06 | Kayvan Faghih Mirzaei, Bruno Pessanha de Carvalho, Patrick Pschorn | Security of ADS-B: Attack Scenarios★★★ | |
A07 | Jan Schnurpfeil, Anna Kleiner | Privacy and ADS-B★★ | |
Global Positioning System |
|||
G01 | Gabriel Alexandre Zillmer, Praveen Annamalai Nathan, Somesh Gireesan Pillai | (In)Security Of GPS: How to Fix The Lack of Security of GPS? | |
G02 | Martin Böh, Joshua Koch, Johannes Roob | (In)security of GPS: How to fix the lack of security of GPS? | |
G03 | Steffen Lauer, Jonas Elsler, Alwin Zaft | (In)security of GPS: How to fix the lack of security of GPS? | |
Location & Track Verification |
|||
L01 | Jephte Abijuru, Oliver Berg | Security by Mobility: How does mobility improve security in location-aware networks? | |
L02 | Khakim Akhunov, Taimoor Bin Khalid, Anja Hamscher | How To Defeat Relay Attacks? | |
L03 | Sophie Kadel, Leonie Stetter, Mischa Helfenstein | Angle vs. Time vs. Strength vs. Mobility: Pros and Cons of different features for location verification | |
L04 | Michael Kessler, Michael Weinberg, Shun-Jie Yan | Security by Mobility: How does mobility improve security in location-aware networks? | |
L05 | Arthur Just, Fabian Coenen, Jonas Henrich | Angle vs. Time vs. Strength vs. Mobility: Pros and Cons of different features for location verification | |
L06 | Philipp Horn, Stephane Ngambo, Jennifer Haessel | Methods for secure Location Verification: An overview |
News: |
|
Lecture: |
Approx. 8 blocks on Fridays 8;15-11:15, Room 11/260 Dates November 08, 15, 22, December: 06, 13, 20 (hands-on), January: 10, 24, 31 |
Exercise |
see link to download area below |
Contact: |
The lecture opens the door for you to become a future embedded systems programmer, where we start from scratch. This means, first, we have a detailed introduction to the C-programming languages and deepen our newly learned C-programming skills by looking at a fairly simple Real-time Operating System called FreeRTOS. We look at concepts, programming patterns and problems inherent to embedded real-time systems and features of the ARM Cortex M architecture, and hit topics such as the programming of interrupt service routines, bit-band aliasing and memory protection units. This is followed by a deep dive into the programming of embedded Linux, where we do not stop at the Kernel-interface. Finally, we look at programming of multicore systems on top of a microkernel and take note of the latest HW virtualization techniques. I welcome all those of you who are willing to roll up their sleeves and get ready for some coding.
Topics covert
Unit 1: Introduction and C-Recap (uploaded)
Unit 2: Free RTOS, Task scheduling, Queues, Semaphores and PI-Problem (uploaded)
Unit 3: Intro to Cortex M3, Interrupt/Exception handling, Memory Management (uploaded)
Unit 4 & 5: Embedded Linux and its device drivers (uploaded)
Unit 6 - 8: Microkernel, Virtualization in Embedded Systems, Introduction to the EB corbos HV (uploaded)
Exam: |
Oral exams are conducted on April 1 and April 29. In order to register for them, please contact our secretary Mrs. Gerber (This email address is being protected from spambots. You need JavaScript enabled to view it., room 36-430) |
Lectures: |
On Wednesdays, 10:00-11:30, in room 36-438 |
Exercises: |
On Tuesdays, 15:30-17:00, in room 36-438 (exact dates are announced below) |
Contact: |
Prof. Dr.-Ing. Jens Schmitt |
The objective of this lecture is to introduce performance modeling of complex distributed systems.
The focus will be on different analytical methods for performance modeling, namely stochastic network calculus (SNC) with
The slides are only accessible from within the university network (131.246.*). You can use SSH or VPN for remote access.
Chapter | Title | Last Update | Slides |
---|---|---|---|
0 | Organization | Oct 24, 2018 | |
1 | Introduction | Oct 30, 2018 | |
2 | Probability Basics | Nov 28, 2018 | PDF annotated |
3 | SNC with Moment Generating Functions | Jan 23, 2019 | PDF annotated |
4 | SNC with Tail Bounds | Jan 30, 2019 | PDF annotated |
We will provide a script in the further course. Be aware that it might undergo many changes and hence should never be seen as a "final version".
Last Update | Changelog | Script |
---|---|---|
Mar 28, 2019 | Fixed typo in the proof of Theorem 3.39, thx Bruno for pointing at it :-) |
For those who are curious about what previous StocADS-lectures looked like, you can check out Michael's Script.
The exercise sheets are only accessible from within the university network (131.246.*). You can use SSH or VPN for remote access.
Sheet | Day | Submission Deadline | Exercise | Download |
---|---|---|---|---|
1 | Nov 20, 2018 | 10.30am | 3.30pm | |
2 | Dec 04, 2018 | 10.30am | 3.30pm | |
3 | Jan 15, 2019 | 10.30am | 3.30pm | |
4 | Jan 22, 2019 | 10.30am | 3.30pm | |
5 | Feb 05, 2019 | 10.30am | 3.30pm |
News: |
Next meeting is on March 20 at 3.30pm in our seminar room (36-438). |
Lecture: |
On Wednesdays, 15:30-17:00, in room 32-411 / 36-438 |
Contact: |
M.Sc. Carolina Nogueira |
The project "Performance Evaluation of Distributed Systems" this year will focus on security aspects of distributed systems. It will be composed of different labs, where you perform and analyze attacks and countermeasures. The main goal is to be able to understand how theory and practice relate, and build some necessary skills for detecting security weaknesses in order to fix them.
Basic programming skills and network knowledge are necessary. The labs will use a Unix-like operating system and some previous knowledge would help you. We will, however, provide some basic information and show you how to search for more. So, if you don't have the experience yet, but are willing to make the effort to learn it, you'll have the tools.
Official module entry: [89-4245] INF-42-45-L-6
We consider the following guidelines to be very important, so please read them thoroughly:
Title | Slides | Homework | Warm-Up Tasks Test | Status Update | Report Submission |
---|---|---|---|---|---|
Kickoff Meeting | Please register until the deadline! | ||||
TCP Attack Lab | Project Guidelines | Feb 01 | Feb 06 |
Feb 13 Mar 06 (Extended) |
|
Steganography | Feb 13 | Feb 20 | Feb 27 | ||
Wireless | Mar 06 | Mar 13 | Mar 20 |
News: |
Exam results were published via email (contact Matthias if you didn't receive anything) |
Examination: |
Post-exam review is on Friday, March 29 at 2 pm in room 36-438 |
Lecture: |
On Tuesdays, 10:00-11:30, in room 13-222 |
Contact: |
Matthias Schäfer |
This course covers aspects and principles of network security. Based on many attacks on common technologies used in communication systems, this course illustrates how things can go wrong and provides basic measures to protect a network from mistakes committed in the past. It covers furthermore the fundamental concepts of security and security problems.
Areas covered in this lecture:
Please note that it is strongly recommended to attend communication systems first since it provides the background knowledge for this lecture.
To participate in the exercise, you need to register here. The registration will be open until 06/11/2018. Note that the three choices must be made due to a restriction of the registration form and they don't have any effect or meaning.
The exercises will be split into two parts: a workshop and a network hack challenge. Successful participation both parts is a mandatory admission requirement for the final exam.
The workshop (first exercise) website can be found here.
The website for the first hack challenge can be found here.
The slides are accessible only from within the university network (131.246.*). Please use SSH or VPN for remote access.
Title | Last Update |
Slides |
---|---|---|
Organization | 29.10.2018 | |
Introduction | 29.10.2018 | |
Physical- & Link-Layer | 13.12.2018 | |
Network- & Transport-Layer | 26.01.2018 | |
Application Layer | 26.01.2018 | |
Recap | 16.03.2018 |
We offer a variety of bachelor and master theses at any point in the academic year. Also check out some of our completed theses. Read more...