Skip to main content

Showing 1–14 of 14 results for author: Pennekamp, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.01022  [pdf

    cs.CR cs.CY

    An Interdisciplinary Survey on Information Flows in Supply Chains

    Authors: Jan Pennekamp, Roman Matzutt, Christopher Klinkmüller, Lennart Bader, Martin Serror, Eric Wagner, Sidra Malik, Maria Spiß, Jessica Rahn, Tan Gürpinar, Eduard Vlad, Sander J. J. Leemans, Salil S. Kanhere, Volker Stich, Klaus Wehrle

    Abstract: Supply chains form the backbone of modern economies and therefore require reliable information flows. In practice, however, supply chains face severe technical challenges, especially regarding security and privacy. In this work, we consolidate studies from supply chain management, information systems, and computer science from 2010-2021 in an interdisciplinary meta-survey to make this topic holist… ▽ More

    Submitted 28 September, 2023; originally announced January 2024.

    Journal ref: ACM Computing Surveys 56(2):1-38, 2024

  2. SoK: Evaluations in Industrial Intrusion Detection Research

    Authors: Olav Lamberts, Konrad Wolsing, Eric Wagner, Jan Pennekamp, Jan Bauer, Klaus Wehrle, Martin Henze

    Abstract: Industrial systems are increasingly threatened by cyberattacks with potentially disastrous consequences. To counter such attacks, industrial intrusion detection systems strive to timely uncover even the most sophisticated breaches. Due to its criticality for society, this fast-growing field attracts researchers from diverse backgrounds, resulting in 130 new detection approaches in 2021 alone. This… ▽ More

    Submitted 6 November, 2023; originally announced November 2023.

    Journal ref: Journal of Systems Research (JSys) Volume 3(1) 2023

  3. arXiv:2311.01060  [pdf, other

    cs.CR

    Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation

    Authors: Lennart Bader, Jan Pennekamp, Emildeon Thevaraj, Maria Spiß, Salil S. Kanhere, Klaus Wehrle

    Abstract: Consumers frequently interact with reputation systems to rate products, services, and deliveries. While past research extensively studied different conceptual approaches to realize such systems securely and privacy-preservingly, these concepts are not yet in use in business-to-business environments. In this paper, (1) we thus outline which specific challenges privacy-cautious stakeholders in volat… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

  4. Poster: Accountable Processing of Reported Street Problems

    Authors: Roman Matzutt, Jan Pennekamp, Klaus Wehrle

    Abstract: Municipalities increasingly depend on citizens to file digital reports about issues such as potholes or illegal trash dumps to improve their response time. However, the responsible authorities may be incentivized to ignore certain reports, e.g., when addressing them inflicts high costs. In this work, we explore the applicability of blockchain technology to hold authorities accountable regarding fi… ▽ More

    Submitted 24 September, 2023; v1 submitted 20 September, 2023; originally announced September 2023.

    Comments: Accepted as a poster abstract to CCS'23

  5. Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead

    Authors: Jan Pennekamp, Anastasiia Belova, Thomas Bergs, Matthias Bodenbenner, Andreas Bührig-Polaczek, Markus Dahlmanns, Ike Kunze, Moritz Kröger, Sandra Geisler, Martin Henze, Daniel Lütticke, Benjamin Montavon, Philipp Niemietz, Lucia Ortjohann, Maximilian Rudack, Robert H. Schmitt, Uwe Vroomen, Klaus Wehrle, Michael Zeng

    Abstract: The Internet of Production (IoP) leverages concepts such as digital shadows, data lakes, and a World Wide Lab (WWL) to advance today's production. Consequently, it requires a technical infrastructure that can support the agile deployment of these concepts and corresponding high-level applications, which, e.g., demand the processing of massive data in motion and at rest. As such, key research aspec… ▽ More

    Submitted 17 May, 2023; originally announced May 2023.

    Comments: Published in: Brecher, C., Schuh, G., van der Aalst, W., Jarke, M., Piller, F.T., Padberg, M. (eds) Internet of Production. Interdisciplinary Excellence Accelerator Series. Springer, Cham

  6. Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things

    Authors: Markus Dahlmanns, Johannes Lohmöller, Jan Pennekamp, Jörn Bodenhausen, Klaus Wehrle, Martin Henze

    Abstract: The ongoing trend to move industrial appliances from previously isolated networks to the Internet requires fundamental changes in security to uphold secure and safe operation. Consequently, to ensure end-to-end secure communication and authentication, (i) traditional industrial protocols, e.g., Modbus, are retrofitted with TLS support, and (ii) modern protocols, e.g., MQTT, are directly designed t… ▽ More

    Submitted 1 June, 2022; originally announced June 2022.

    Comments: 15 pages, 6 figures

    Journal ref: In Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (ASIA CCS '22), Association for Computing Machinery, New York, NY, USA, pages 252-266

  7. Scalable and Privacy-Focused Company-Centric Supply Chain Management

    Authors: Eric Wagner, Roman Matzutt, Jan Pennekamp, Lennart Bader, Irakli Bajelidze, Klaus Wehrle, Martin Henze

    Abstract: Blockchain technology promises to overcome trust and privacy concerns inherent to centralized information sharing. However, current decentralized supply chain management systems do either not meet privacy and scalability requirements or require a trustworthy consortium, which is challenging for increasingly dynamic supply chains with constantly changing participants. In this paper, we propose CCCh… ▽ More

    Submitted 22 May, 2022; originally announced May 2022.

    Comments: IEEE ICBC'22

    Journal ref: In Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC '22)

  8. A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection

    Authors: Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, Martin Henze

    Abstract: Anomaly-based intrusion detection promises to detect novel or unknown attacks on industrial control systems by modeling expected system behavior and raising corresponding alarms for any deviations.As manually creating these behavioral models is tedious and error-prone, research focuses on machine learning to train them automatically, achieving detection rates upwards of 99%. However, these approac… ▽ More

    Submitted 18 May, 2022; originally announced May 2022.

    Comments: ACM CPSS'22

  9. Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use

    Authors: Jan Pennekamp, Erik Buchholz, Markus Dahlmanns, Ike Kunze, Stefan Braun, Eric Wagner, Matthias Brockmann, Klaus Wehrle, Martin Henze

    Abstract: Following the recent Internet of Things-induced trends on digitization in general, industrial applications will further evolve as well. With a focus on the domains of manufacturing and production, the Internet of Production pursues the vision of a digitized, globally interconnected, yet secure environment by establishing a distributed knowledge base. Background. As part of our collaborative resear… ▽ More

    Submitted 21 December, 2021; originally announced December 2021.

    Comments: 16 pages, 2 figures

    Journal ref: Proceedings of the Workshop on Learning from Authoritative Security Experiment Results (LASER '20), 2021, ACSAC

  10. CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively

    Authors: Roman Matzutt, Benedikt Kalde, Jan Pennekamp, Arthur Drichel, Martin Henze, Klaus Wehrle

    Abstract: Popular cryptocurrencies continue to face serious scalability issues due to their ever-growing blockchains. Thus, modern blockchain designs began to prune old blocks and rely on recent snapshots for their bootstrap** processes instead. Unfortunately, established systems are often considered incapable of adopting these improvements. In this work, we present CoinPrune, our block-pruning scheme wit… ▽ More

    Submitted 26 November, 2021; originally announced November 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:2004.06911

    Journal ref: in IEEE Transactions on Network and Service Management, vol. 18, no. 3, pp. 3064-3078, Sept. 2021

  11. Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments

    Authors: Markus Dahlmanns, Johannes Lohmöller, Ina Berenice Fink, Jan Pennekamp, Klaus Wehrle, Martin Henze

    Abstract: Due to increasing digitalization, formerly isolated industrial networks, e.g., for factory and process automation, move closer and closer to the Internet, mandating secure communication. However, securely setting up OPC UA, the prime candidate for secure industrial communication, is challenging due to a large variety of insecure options. To study whether Internet-facing OPC UA appliances are confi… ▽ More

    Submitted 26 October, 2020; originally announced October 2020.

    Comments: 10 pages, 7 figures

    Journal ref: In Proceedings of the ACM Internet Measurement Conference 2020 (IMC '20). Association for Computing Machinery, New York, NY, USA, 101-110

  12. arXiv:2004.06911  [pdf, other

    cs.CR cs.NI

    How to Securely Prune Bitcoin's Blockchain

    Authors: Roman Matzutt, Benedikt Kalde, Jan Pennekamp, Arthur Drichel, Martin Henze, Klaus Wehrle

    Abstract: Bitcoin was the first successful decentralized cryptocurrency and remains the most popular of its kind to this day. Despite the benefits of its blockchain, Bitcoin still faces serious scalability issues, most importantly its ever-increasing blockchain size. While alternative designs introduced schemes to periodically create snapshots and thereafter prune older blocks, already-deployed systems such… ▽ More

    Submitted 15 April, 2020; originally announced April 2020.

    Comments: To be published in the proceedings of the 2020 IFIP Networking Conference (NETWORKING'20)

  13. Utilizing Public Blockchains for the Sybil-Resistant Bootstrap** of Distributed Anonymity Services

    Authors: Roman Matzutt, Jan Pennekamp, Erik Buchholz, Klaus Wehrle

    Abstract: Distributed anonymity services, such as onion routing networks or cryptocurrency tumblers, promise privacy protection without trusted third parties. While the security of these services is often well-researched, security implications of their required bootstrap** processes are usually neglected: Users either jointly conduct the anonymization themselves, or they need to rely on a set of non-collu… ▽ More

    Submitted 21 April, 2020; v1 submitted 14 April, 2020; originally announced April 2020.

    Comments: To be published in the proceedings of the 15th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS'20)

  14. Assessing the Security of OPC UA Deployments

    Authors: Linus Roepert, Markus Dahlmanns, Ina Berenice Fink, Jan Pennekamp, Martin Henze

    Abstract: To address the increasing security demands of industrial deployments, OPC UA is one of the first industrial protocols explicitly designed with security in mind. However, deploying it securely requires a thorough configuration of a wide range of options. Thus, assessing the security of OPC UA deployments and their configuration is necessary to ensure secure operation, most importantly confidentiali… ▽ More

    Submitted 27 March, 2020; originally announced March 2020.

    Comments: 2 pages, 1 figure, to be published in Proceedings of the 1st ITG Workshop on IT Security (ITSec)