Skip to main content

Showing 1–23 of 23 results for author: Kohler, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.06635  [pdf, other

    cs.CR

    Current Affairs: A Measurement Study of Deployment and Security Trends in EV Charging Infrastructure

    Authors: Marcell Szakály, Sebastian Köhler, Ivan Martinovic

    Abstract: The deployment of electric vehicle charging infrastructure is occurring at a rapid pace. Simultaneously, existing standards, such as ISO 15118, which defines critical charging communication, are being improved and further developed. In this paper, we conduct a measurement study of already deployed DC charging stations to analyze the current state of deployment for various protocols. We present the… ▽ More

    Submitted 9 April, 2024; originally announced April 2024.

  2. Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks

    Authors: Joshua Smailes, Edd Salkield, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic

    Abstract: In the wake of increasing numbers of attacks on radio communication systems, a range of techniques are being deployed to increase the security of these systems. One such technique is radio fingerprinting, in which the transmitter can be identified and authenticated by observing small hardware differences expressed in the signal. Fingerprinting has been explored in particular in the defense of sate… ▽ More

    Submitted 4 April, 2024; v1 submitted 7 February, 2024; originally announced February 2024.

    Comments: 9 pages, 12 figures

  3. arXiv:2305.12948  [pdf, other

    cs.CR

    POSTER: spaceQUIC: Securing Communication in Computationally Constrained Spacecraft

    Authors: Joshua Smailes, Razvan David, Sebastian Kohler, Simon Birnbach, Ivan Martinovic

    Abstract: Recent years have seen a rapid increase in the number of CubeSats and other small satellites in orbit - these have highly constrained computational and communication resources, but still require robust secure communication to operate effectively. The QUIC transport layer protocol is designed to provide efficient communication with cryptography guarantees built-in, with a particular focus on netw… ▽ More

    Submitted 22 May, 2023; originally announced May 2023.

    Comments: 2 pages, 2 figures; the first two authors contributed equally to this paper

  4. Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting

    Authors: Joshua Smailes, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic

    Abstract: Due to an increase in the availability of cheap off-the-shelf radio hardware, spoofing and replay attacks on satellite ground systems have become more accessible than ever. This is particularly a problem for legacy systems, many of which do not offer cryptographic security and cannot be patched to support novel security measures. In this paper we explore radio transmitter fingerprinting in satel… ▽ More

    Submitted 7 September, 2023; v1 submitted 11 May, 2023; originally announced May 2023.

    Comments: 14 pages, 16 figures

  5. arXiv:2305.06901  [pdf, other

    cs.CR

    Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks

    Authors: Marcell Szakály, Sebastian Köhler, Martin Strohmeier, Ivan Martinovic

    Abstract: Many modern devices, including critical infrastructures, depend on the reliable operation of electrical power conversion systems. The small size and versatility of switched-mode power converters has resulted in their widespread adoption. Whereas transformer-based systems passively convert voltage, switched-mode converters feature an actively regulated feedback loop, which relies on accurate sensor… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

  6. arXiv:2303.00582  [pdf, other

    cs.CR cs.NI

    Dishing Out DoS: How to Disable and Secure the Starlink User Terminal

    Authors: Joshua Smailes, Edd Salkield, Sebastian Köhler, Simon Birnbach, Ivan Martinovic

    Abstract: Satellite user terminals are a promising target for adversaries seeking to target satellite communication networks. Despite this, many protections commonly found in terrestrial routers are not present in some user terminals. As a case study we audit the attack surface presented by the Starlink router's admin interface, using fuzzing to uncover a denial of service attack on the Starlink user term… ▽ More

    Submitted 8 March, 2023; v1 submitted 1 March, 2023; originally announced March 2023.

    Comments: 6 pages, 2 figures; the first two authors contributed equally to this paper

  7. arXiv:2209.15140  [pdf, other

    cs.RO eess.SY

    Fully Proprioceptive Slip-Velocity-Aware State Estimation for Mobile Robots via Invariant Kalman Filtering and Disturbance Observer

    Authors: Xihang Yu, Sangli Teng, Theodor Chakhachiro, Wenzhe Tong, Tingjun Li, Tzu-Yuan Lin, Sarah Koehler, Manuel Ahumada, Jeffrey M. Walls, Maani Ghaffari

    Abstract: This paper develops a novel slip estimator using the invariant observer design theory and Disturbance Observer (DOB). The proposed state estimator for mobile robots is fully proprioceptive and combines data from an inertial measurement unit and body velocity within a Right Invariant Extended Kalman Filter (RI-EKF). By embedding the slip velocity into $\mathrm{SE}_3(3)$ matrix Lie group, the develo… ▽ More

    Submitted 30 September, 2023; v1 submitted 29 September, 2022; originally announced September 2022.

    Comments: The work will be presented in IROS2023. github repository at https://github.com/UMich-CURLY/slip_detection_DOB. arXiv admin note: text overlap with arXiv:1805.10410 by other authors

  8. arXiv:2209.05778  [pdf, other

    cs.CV cs.AI

    Self-supervised motion descriptor for cardiac phase detection in 4D CMR based on discrete vector field estimations

    Authors: Sven Koehler, Tarique Hussain, Hamza Hussain, Daniel Young, Samir Sarikouch, Thomas Pickhardt, Gerald Greil, Sandy Engelhardt

    Abstract: Cardiac magnetic resonance (CMR) sequences visualise the cardiac function voxel-wise over time. Simultaneously, deep learning-based deformable image registration is able to estimate discrete vector fields which warp one time step of a CMR sequence to the following in a self-supervised manner. However, despite the rich source of information included in these 3D+t vector fields, a standardised inter… ▽ More

    Submitted 18 September, 2022; v1 submitted 13 September, 2022; originally announced September 2022.

    Comments: accepted for the STACOM2022 workshop @ MICCAI2022

  9. Brokenwire : Wireless Disruption of CCS Electric Vehicle Charging

    Authors: Sebastian Köhler, Richard Baker, Martin Strohmeier, Ivan Martinovic

    Abstract: We present a novel attack against the Combined Charging System, one of the most widely used DC rapid charging technologies for electric vehicles (EVs). Our attack, Brokenwire, interrupts necessary control communication between the vehicle and charger, causing charging sessions to abort. The attack requires only temporary physical proximity and can be conducted wirelessly from a distance, allowing… ▽ More

    Submitted 26 March, 2024; v1 submitted 4 February, 2022; originally announced February 2022.

    Journal ref: 30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023. The Internet Society 2023

  10. arXiv:2201.10410  [pdf, other

    cs.CV

    Comparison of Evaluation Metrics for Landmark Detection in CMR Images

    Authors: Sven Koehler, Lalith Sharan, Julian Kuhm, Arman Ghanaat, Jelizaveta Gordejeva, Nike K. Simon, Niko M. Grell, Florian André, Sandy Engelhardt

    Abstract: Cardiac Magnetic Resonance (CMR) images are widely used for cardiac diagnosis and ventricular assessment. Extracting specific landmarks like the right ventricular insertion points is of importance for spatial alignment and 3D modeling. The automatic detection of such landmarks has been tackled by multiple groups using Deep Learning, but relatively little attention has been paid to the failure case… ▽ More

    Submitted 28 January, 2022; v1 submitted 25 January, 2022; originally announced January 2022.

    Comments: Accepted at Bildverarbeitung für die Medizin (BVM), Informatik aktuell. Springer Vieweg, Wiesbaden 2022

  11. A Simple Standard for Sharing Ontological Map**s (SSSOM)

    Authors: Nicolas Matentzoglu, James P. Balhoff, Susan M. Bello, Chris Bizon, Matthew Brush, Tiffany J. Callahan, Christopher G Chute, William D. Duncan, Chris T. Evelo, Davera Gabriel, John Graybeal, Alasdair Gray, Benjamin M. Gyori, Melissa Haendel, Henriette Harmse, Nomi L. Harris, Ian Harrow, Harshad Hegde, Amelia L. Hoyt, Charles T. Hoyt, Dazhi Jiao, Ernesto Jiménez-Ruiz, Simon Jupp, Hyeongsik Kim, Sebastian Koehler , et al. (19 additional authors not shown)

    Abstract: Despite progress in the development of standards for describing and exchanging scientific information, the lack of easy-to-use standards for map** between different representations of the same or similar objects in different databases poses a major impediment to data integration and interoperability. Map**s often lack the metadata needed to be correctly interpreted and applied. For example, ar… ▽ More

    Submitted 13 December, 2021; originally announced December 2021.

    Comments: Corresponding author: Christopher J. Mungall <[email protected]>

  12. arXiv:2108.08881  [pdf, other

    cs.CR cs.CV

    Signal Injection Attacks against CCD Image Sensors

    Authors: Sebastian Köhler, Richard Baker, Ivan Martinovic

    Abstract: Since cameras have become a crucial part in many safety-critical systems and applications, such as autonomous vehicles and surveillance, a large body of academic and non-academic work has shown attacks against their main component - the image sensor. However, these attacks are limited to coarse-grained and often suspicious injections because light is used as an attack vector. Furthermore, due to t… ▽ More

    Submitted 13 December, 2021; v1 submitted 19 August, 2021; originally announced August 2021.

  13. Mutually improved endoscopic image synthesis and landmark detection in unpaired image-to-image translation

    Authors: Lalith Sharan, Gabriele Romano, Sven Koehler, Halvar Kelm, Matthias Karck, Raffaele De Simone, Sandy Engelhardt

    Abstract: The CycleGAN framework allows for unsupervised image-to-image translation of unpaired data. In a scenario of surgical training on a physical surgical simulator, this method can be used to transform endoscopic images of phantoms into images which more closely resemble the intra-operative appearance of the same surgical target structure. This can be viewed as a novel augmented reality approach, whic… ▽ More

    Submitted 31 August, 2021; v1 submitted 14 July, 2021; originally announced July 2021.

    Comments: Accepted for IEEE JBHI 2021, 13 pages, 8 figures, 4 tables

  14. arXiv:2104.05642  [pdf, other

    eess.IV cs.CV

    Common Limitations of Image Processing Metrics: A Picture Story

    Authors: Annika Reinke, Minu D. Tizabi, Carole H. Sudre, Matthias Eisenmann, Tim Rädsch, Michael Baumgartner, Laura Acion, Michela Antonelli, Tal Arbel, Spyridon Bakas, Peter Bankhead, Arriel Benis, Matthew Blaschko, Florian Buettner, M. Jorge Cardoso, Jianxu Chen, Veronika Cheplygina, Evangelia Christodoulou, Beth Cimini, Gary S. Collins, Sandy Engelhardt, Keyvan Farahani, Luciana Ferrer, Adrian Galdran, Bram van Ginneken , et al. (68 additional authors not shown)

    Abstract: While the importance of automatic image analysis is continuously increasing, recent meta-research revealed major flaws with respect to algorithm validation. Performance metrics are particularly key for meaningful, objective, and transparent performance assessment and validation of the used automatic algorithms, but relatively little attention has been given to the practical pitfalls when using spe… ▽ More

    Submitted 6 December, 2023; v1 submitted 12 April, 2021; originally announced April 2021.

    Comments: Shared first authors: Annika Reinke and Minu D. Tizabi. This is a dynamic paper on limitations of commonly used metrics. It discusses metrics for image-level classification, semantic and instance segmentation, and object detection. For missing use cases, comments or questions, please contact [email protected]. Substantial contributions to this document will be acknowledged with a co-authorship

  15. arXiv:2101.10011  [pdf, other

    cs.CV cs.CR

    They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors

    Authors: Sebastian Köhler, Giulio Lovisotto, Simon Birnbach, Richard Baker, Ivan Martinovic

    Abstract: In this paper, we describe how the electronic rolling shutter in CMOS image sensors can be exploited using a bright, modulated light source (e.g., an inexpensive, off-the-shelf laser), to inject fine-grained image disruptions. We demonstrate the attack on seven different CMOS cameras, ranging from cheap IoT to semi-professional surveillance cameras, to highlight the wide applicability of the rolli… ▽ More

    Submitted 1 December, 2021; v1 submitted 25 January, 2021; originally announced January 2021.

    Comments: 15 pages, 15 figures

  16. arXiv:2101.07653  [pdf, other

    eess.IV cs.CV cs.LG

    Unsupervised Domain Adaptation from Axial to Short-Axis Multi-Slice Cardiac MR Images by Incorporating Pretrained Task Networks

    Authors: Sven Koehler, Tarique Hussain, Zach Blair, Tyler Huffaker, Florian Ritzmann, Animesh Tandon, Thomas Pickardt, Samir Sarikouch, Heiner Latus, Gerald Greil, Ivo Wolf, Sandy Engelhardt

    Abstract: Anisotropic multi-slice Cardiac Magnetic Resonance (CMR) Images are conventionally acquired in patient-specific short-axis (SAX) orientation. In specific cardiovascular diseases that affect right ventricular (RV) morphology, acquisitions in standard axial (AX) orientation are preferred by some investigators, due to potential superiority in RV volume measurement for treatment planning. Unfortunatel… ▽ More

    Submitted 20 January, 2021; v1 submitted 19 January, 2021; originally announced January 2021.

    Comments: Accepted for IEEE Transaction on Medical Imaging (TMI) 2021 on 13.01.2021

  17. arXiv:2101.02737  [pdf, other

    cs.CV cs.LG eess.IV

    Heatmap-based 2D Landmark Detection with a Varying Number of Landmarks

    Authors: Antonia Stern, Lalith Sharan, Gabriele Romano, Sven Koehler, Matthias Karck, Raffaele De Simone, Ivo Wolf, Sandy Engelhardt

    Abstract: Mitral valve repair is a surgery to restore the function of the mitral valve. To achieve this, a prosthetic ring is sewed onto the mitral annulus. Analyzing the sutures, which are punctured through the annulus for ring implantation, can be useful in surgical skill assessment, for quantitative surgery and for positioning a virtual prosthetic ring model in the scene via augmented reality. This work… ▽ More

    Submitted 7 January, 2021; originally announced January 2021.

    Comments: accepted for BVM 2021, 6 pages, 2 figures, 1 table

  18. arXiv:2002.04392  [pdf, other

    eess.IV cs.CV cs.LG stat.ML

    How well do U-Net-based segmentation trained on adult cardiac magnetic resonance imaging data generalise to rare congenital heart diseases for surgical planning?

    Authors: Sven Koehler, Animesh Tandon, Tarique Hussain, Heiner Latus, Thomas Pickardt, Samir Sarikouch, Philipp Beerbaum, Gerald Greil, Sandy Engelhardt, Ivo Wolf

    Abstract: Planning the optimal time of intervention for pulmonary valve replacement surgery in patients with the congenital heart disease Tetralogy of Fallot (TOF) is mainly based on ventricular volume and function according to current guidelines. Both of these two biomarkers are most reliably assessed by segmentation of 3D cardiac magnetic resonance (CMR) images. In several grand challenges in the last yea… ▽ More

    Submitted 10 February, 2020; originally announced February 2020.

    Comments: Accepted for SPIE Medical Imaging 2020

  19. arXiv:1803.03577  [pdf, other

    cs.CV

    Intentions of Vulnerable Road Users - Detection and Forecasting by Means of Machine Learning

    Authors: Michael Goldhammer, Sebastian Köhler, Stefan Zernetsch, Konrad Doll, Bernhard Sick, Klaus Dietmayer

    Abstract: Avoiding collisions with vulnerable road users (VRUs) using sensor-based early recognition of critical situations is one of the manifold opportunities provided by the current development in the field of intelligent vehicles. As especially pedestrians and cyclists are very agile and have a variety of movement options, modeling their behavior in traffic scenes is a challenging task. In this article… ▽ More

    Submitted 9 March, 2018; originally announced March 2018.

  20. arXiv:1701.05699  [pdf, other

    cs.DB

    Efficiently Computing Provenance Graphs for Queries with Negation

    Authors: Seokki Lee, Sven Koehler, Bertram Ludaescher, Boris Glavic

    Abstract: Explaining why an answer is in the result of a query or why it is missing from the result is important for many applications including auditing, debugging data and queries, and answering hypothetical questions about data. Both types of questions, i.e., why and why-not provenance, have been studied extensively. In this work, we present the first practical approach for answering such questions for q… ▽ More

    Submitted 20 January, 2017; originally announced January 2017.

    Comments: Illinois Institute of Technology, IIT/CS-DB-2016-03

  21. arXiv:1605.00695  [pdf, other

    cs.IT

    Cyclone Codes

    Authors: Christian Schindelhauer, Andreas Jakoby, Sven Köhler

    Abstract: We introduce Cyclone codes which are rateless erasure resilient codes. They combine Pair codes with Luby Transform (LT) codes by computing a code symbol from a random set of data symbols using bitwise XOR and cyclic shift operations. The number of data symbols is chosen according to the Robust Soliton distribution. XOR and cyclic shift operations establish a unitary commutative ring if data symbol… ▽ More

    Submitted 2 May, 2016; originally announced May 2016.

  22. Scientific Workflows and Provenance: Introduction and Research Opportunities

    Authors: Víctor Cuevas-Vicenttín, Saumen Dey, Sven Köhler, Sean Riddle, Bertram Ludäscher

    Abstract: Scientific workflows are becoming increasingly popular for compute-intensive and data-intensive scientific applications. The vision and promise of scientific workflows includes rapid, easy workflow design, reuse, scalable execution, and other advantages, e.g., to facilitate "reproducible science" through provenance (e.g., data lineage) support. However, as described in the paper, important researc… ▽ More

    Submitted 23 November, 2013; v1 submitted 18 November, 2013; originally announced November 2013.

    Comments: 12 pages, 2 figures

    Journal ref: Datenbank-Spektrum, November 2012, Volume 12, Issue 3, pp 193-203

  23. First-Order Provenance Games

    Authors: Sven Köhler, Bertram Ludäscher, Daniel Zinn

    Abstract: We propose a new model of provenance, based on a game-theoretic approach to query evaluation. First, we study games G in their own right, and ask how to explain that a position x in G is won, lost, or drawn. The resulting notion of game provenance is closely related to winning strategies, and excludes from provenance all "bad moves", i.e., those which unnecessarily allow the opponent to improve th… ▽ More

    Submitted 10 September, 2013; originally announced September 2013.

    Journal ref: Peter Buneman Festschrift, LNCS 8000, 2013