Skip to main content

Showing 1–7 of 7 results for author: Dahlmanns, M

.
  1. Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact

    Authors: Markus Dahlmanns, Constantin Sander, Robin Decker, Klaus Wehrle

    Abstract: Containerization allows bundling applications and their dependencies into a single image. The containerization framework Docker eases the use of this concept and enables sharing images publicly, gaining high momentum. However, it can lead to users creating and sharing images that include private keys or API secrets-either by mistake or out of negligence. This leakage impairs the creator's security… ▽ More

    Submitted 8 July, 2023; originally announced July 2023.

    Comments: 15 pages, 7 figures

    Journal ref: In Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security (ASIA CCS '23), Association for Computing Machinery, New York, NY, USA, pages 797-811

  2. Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead

    Authors: Jan Pennekamp, Anastasiia Belova, Thomas Bergs, Matthias Bodenbenner, Andreas Bührig-Polaczek, Markus Dahlmanns, Ike Kunze, Moritz Kröger, Sandra Geisler, Martin Henze, Daniel Lütticke, Benjamin Montavon, Philipp Niemietz, Lucia Ortjohann, Maximilian Rudack, Robert H. Schmitt, Uwe Vroomen, Klaus Wehrle, Michael Zeng

    Abstract: The Internet of Production (IoP) leverages concepts such as digital shadows, data lakes, and a World Wide Lab (WWL) to advance today's production. Consequently, it requires a technical infrastructure that can support the agile deployment of these concepts and corresponding high-level applications, which, e.g., demand the processing of massive data in motion and at rest. As such, key research aspec… ▽ More

    Submitted 17 May, 2023; originally announced May 2023.

    Comments: Published in: Brecher, C., Schuh, G., van der Aalst, W., Jarke, M., Piller, F.T., Padberg, M. (eds) Internet of Production. Interdisciplinary Excellence Accelerator Series. Springer, Cham

  3. Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things

    Authors: Markus Dahlmanns, Johannes Lohmöller, Jan Pennekamp, Jörn Bodenhausen, Klaus Wehrle, Martin Henze

    Abstract: The ongoing trend to move industrial appliances from previously isolated networks to the Internet requires fundamental changes in security to uphold secure and safe operation. Consequently, to ensure end-to-end secure communication and authentication, (i) traditional industrial protocols, e.g., Modbus, are retrofitted with TLS support, and (ii) modern protocols, e.g., MQTT, are directly designed t… ▽ More

    Submitted 1 June, 2022; originally announced June 2022.

    Comments: 15 pages, 6 figures

    Journal ref: In Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (ASIA CCS '22), Association for Computing Machinery, New York, NY, USA, pages 252-266

  4. A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection

    Authors: Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, Martin Henze

    Abstract: Anomaly-based intrusion detection promises to detect novel or unknown attacks on industrial control systems by modeling expected system behavior and raising corresponding alarms for any deviations.As manually creating these behavioral models is tedious and error-prone, research focuses on machine learning to train them automatically, achieving detection rates upwards of 99%. However, these approac… ▽ More

    Submitted 18 May, 2022; originally announced May 2022.

    Comments: ACM CPSS'22

  5. Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use

    Authors: Jan Pennekamp, Erik Buchholz, Markus Dahlmanns, Ike Kunze, Stefan Braun, Eric Wagner, Matthias Brockmann, Klaus Wehrle, Martin Henze

    Abstract: Following the recent Internet of Things-induced trends on digitization in general, industrial applications will further evolve as well. With a focus on the domains of manufacturing and production, the Internet of Production pursues the vision of a digitized, globally interconnected, yet secure environment by establishing a distributed knowledge base. Background. As part of our collaborative resear… ▽ More

    Submitted 21 December, 2021; originally announced December 2021.

    Comments: 16 pages, 2 figures

    Journal ref: Proceedings of the Workshop on Learning from Authoritative Security Experiment Results (LASER '20), 2021, ACSAC

  6. Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments

    Authors: Markus Dahlmanns, Johannes Lohmöller, Ina Berenice Fink, Jan Pennekamp, Klaus Wehrle, Martin Henze

    Abstract: Due to increasing digitalization, formerly isolated industrial networks, e.g., for factory and process automation, move closer and closer to the Internet, mandating secure communication. However, securely setting up OPC UA, the prime candidate for secure industrial communication, is challenging due to a large variety of insecure options. To study whether Internet-facing OPC UA appliances are confi… ▽ More

    Submitted 26 October, 2020; originally announced October 2020.

    Comments: 10 pages, 7 figures

    Journal ref: In Proceedings of the ACM Internet Measurement Conference 2020 (IMC '20). Association for Computing Machinery, New York, NY, USA, 101-110

  7. Assessing the Security of OPC UA Deployments

    Authors: Linus Roepert, Markus Dahlmanns, Ina Berenice Fink, Jan Pennekamp, Martin Henze

    Abstract: To address the increasing security demands of industrial deployments, OPC UA is one of the first industrial protocols explicitly designed with security in mind. However, deploying it securely requires a thorough configuration of a wide range of options. Thus, assessing the security of OPC UA deployments and their configuration is necessary to ensure secure operation, most importantly confidentiali… ▽ More

    Submitted 27 March, 2020; originally announced March 2020.

    Comments: 2 pages, 1 figure, to be published in Proceedings of the 1st ITG Workshop on IT Security (ITSec)