Dr. Heiko Niedermayer

Research Associate
Image 74b0e03b

Postal address

  • Institut für Informatik der
  • Technischen Universität München
  • Lehrstuhl I8
  • Boltzmannstr. 3
  • 85748 Garching bei München - Germany

Contact

  • Tel: +49 89 289 - 18040
  • Fax: +49 89 289 - 18033
  • e-Mail: niedermayerAtnet.in.tum.de
    (GPG: 1D62 3E26 278C 0010 5F5B 3F1C 9544 281E 7909 A882)
  • Building/Room: MI Building, 03.05.040

Research

Topics

  • Realistic Modeling
  • Resilience
  • Social Informatics / Internet Science
  • Security and Privacy

projects

  • SafeCloud (Safe and Privacy-Friendly Cloud Infrastructures) (2015 – 2018)
  • SURF (Systemic Security for Critical Infrastructures) (2014 – 2016)
  • EINS (European Network of Excellence of Internet Science) (2011 – 2015)
  • SecFuNet (Security for Future Networks) (2011 – 2014)
  • ANSII (Anomalieerkennung und eingebettete Sicherheit in industriellen Informationssystemen) (2012 – 2014)

Teaching

  • Network Security
  • Peer-to-Peer Systems and Security
  • Seminar IITM and FI (advisor)

Supervised Theses

Open

Title Type Advisors Links
Measurement and Analysis of Traffic of Mobile Apps BA MA IDP Heiko Niedermayer, Quirin Scheitle Pdf
Analysis and Simulation of Video Popularity Dynamics on Youtube BA MA Heiko Niedermayer Pdf
We continuously offer theses targeting IT and network security related questions in industrial information systems. Interested? Contact us: ansii_at_net_dot_in_dot_tum_dot_de BA MA Heiko Niedermayer
Diverse Themen zu Sicherheit, P2P, Sozialen Netzen, Cloud Computing, Privacy BA MA Heiko Niedermayer Pdf
Peer-to-Peer Video Streaming mit Hilfe von VMs in Computing Clouds BA MA Heiko Niedermayer Pdf

In progress

Student Title Type Advisors Links
Benedikt Engeser Informed Route Selection Strategies for Multipath Routing MA Heiko Niedermayer, Sree Harsha Totakura
Markus Dausch Measurement and Analysis of Traffic of Mobile Apps MA Heiko Niedermayer, Quirin Scheitle Pdf
Nikolai Schwellnus Datamining on IETF data IDP Heiko Niedermayer, Daniel Raumer, Edwin Cordeiro Pdf

Finished

Author Title Type Advisors Links
Benedikt Peter Isolation Quality of Hypervisors (preliminary working title) BA Holger Kinkelin, Heiko Niedermayer
Cornelius Diekmann Security Requirement Modeling as Configuration Management for Scenario-Specific Networks MA/BA Holger Kinkelin, Dr. Heiko Niedermayer Pdf
Simon Mittelberger Flexible and resilient services for user-centric identity management and access control MA Holger Kinkelin, Heiko Niedermayer
Sebastian Rückerl Presence Detection using passive WLAN measurements BA Dr. Holger Kinkelin, Dr. Heiko Niedermayer
Rupert Schneider Resource Depletion und Denial of Service Angriffe auf Xen und KVM BA Holger Kinkelin, Heiko Niedermayer
Max Tettenborn Permission-aware Resolution of Human-readable Identifiers and Connectivity Establishment in Smart Environments BA Dr. Holger Kinkelin, Dr. Heiko Niedermayer
Daniel Sel Authenticated Scalable Port-Knocking BA Sree Harsha Totakura, Heiko Niedermayer Pdf
Tizian Sarre Popularity over time - Analysis of Videos on Youtube BA Heiko Niedermayer Pdf
Nikolai Schwellnus A Heat Map for IETF Standardization Activities BA Daniel Raumer, Heiko Niedermayer, Edwin Cordeiro Pdf
Benjamin Schöntag Integrating Voice over IP into a privacy friendly network underlay BA Dr. Holger Kinkelin, Dr. Heiko Niedermayer, Marcel von Maltitz
Sebastian Vogl Privatheitsprobleme von Datenmodellen im intelligenten Gebäudeumfeld BA Dr. Holger Kinkelin, Dr. Heiko Niedermayer, Marcel von Maltitz Pdf
Christian Brosche A modular framework for a collaborative solution for privacy-preserving network communication BA Dr. Holger Kinkelin, Dr. Heiko Niedermayer, Marcel von Maltitz Pdf
Sebastian Bendeich Datenmodelle und Konfliktlösung im intelligenten Gebäudeumfeld MA Dr. Holger Kinkelin, Dr. Heiko Niedermayer, Marcel von Maltitz
Philip Wenger Bidirectional Data Queries with TinyIPFIX BA Corinna Schmitt, Heiko Niedermayer, Thomas Kothmayr
Maximilian Szengel Spontaneous Private Networking - Governed by Security Policies Master thesis Ralph Holz, Christian Grothoff, Bart Polot, Heiko Niedermayer Pdf
Elias Tatros Evaluation of Different Caching Strategies for YouTube - Multimedia Content BA Alexander Klein, Heiko Niedermayer Pdf
Philipp Lowack Key Management and Secure Data Aggregation in Wireless Sensor Networks MA Corinna Schmitt, Heiko Niedermayer Pdf
Thomas Riedmaier Turning the Tables - Hunting the SSL/TLS Men-in-the-Middle Master thesis Ralph Holz, Heiko Niedermayer Pdf
David Ellermann Protecting against JavaScript-based attacks with signatures Bachelor thesis Ralph Holz, Heiko Niedermayer, Phillip Fehre
Markus Sieber Online Anomaly Detection for Internet Services Masterarbeit Ali Fessi, Heiko Niedermayer
Blaz Primc Authentisierende Adressierung in Netzwerken Diplomarbeit (University of Ljubljana Slovenia) Marc-Oliver Pahl, Heiko Niedermayer, Holger Kinkelin, Andreas Müller
Deniz Ugurlu Understanding User Input in Home Networks Bachelor / Master / Diploma Thesis Heiko Niedermayer, Marc-Oliver Pahl Pdf
Johann Schlamp Configuration Management via frequency analysis of synthetic load fluctuations Diplomarbeit Marc Fouquet, Heiko Niedermayer Pdf
Sven Wiebusch Entwicklung und Bewertung richtlinienbasierter Sicherheitskonzepte in spontanen virtuellen Netzen Diplomarbeit Ralph Holz, Heiko Niedermayer
Michael Herrmann Privacy in Online-Sozialen-Netzen Semesterprojekt Heiko Niedermayer
Christoph Probst Signalbasierte Analyse von Abhängigkeiten bei Netzwerkdiensten Diplomarbeit University of Tübingen Marc Fouquet, Heiko Niedermayer
Ralph Holz Domain-Based Secure P2P Services: Concept and Implementation Diplomarbeit Ali Fessi, Heiko Niedermayer
Johannes Riedl Authentication in Heterogeneous SIP-based P2P Networks Diplomarbeit Ali Fessi, Heiko Niedermayer
Timo Teifel Clusterbasierter Peer-to-Peer Support für Online-Spiele Diplomarbeit University of Tübingen Marc Fouquet, Heiko Niedermayer, Simon Rieche, Leo Petrak
Andreas Rabius Sichere IP-Kommunikation Diplomarbeit University of Tübingen Heiko Niedermayer, Gerhard Münz
Jirko Cernik Peer-to-Peer-Infrastruktur für Massive Multiplayer Online Role-Playing Games (MMORPGs) Diplomarbeit University of Tübingen Marc Fouquet, Heiko Niedermayer, Simon Rieche, Leo Petrak

Publications

2016.09 Heiko Niedermayer, Daniel Raumer, Nikolai Schwellnus, Edwin Cordeiro, Georg Carle, “An Analysis of IETF Activities Using Mailing Lists and Social Media ,” in Proceedings of the third international conference on Internet Science, INSCI2016, Florence, Italy, Sep. 2016. [Pdf] [Bib]
2016 Jacek Rak, Heiko Niedermayer, Dimitri Papadimitriou, Pablo Romero, “Information-driven network resilience: Research challenges and perspectives,” Optical Switching and Networking, 2016. [Bib]
2014.10 Holger Kinkelin, Marcel von Maltitz, Benedikt Peter, Cornelia Kappler, Heiko Niedermayer, Georg Carle, “Privacy Preserving Energy Management,” in Proceeding of City Labs Workshop in conjunction with the International Conference on Social Informatics (SocInfo 2014), Barcelona, Spain, Oct. 2014. [Pdf] [Bib]
2014.10 Holger Kinkelin, Heiko Niedermayer, Simon Mittelberger, Georg Carle, “Human-Centric and Privacy-Protecting Trust Establishment over the Internet,” in Proceeding of the Seventh International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services (CENTRIC 2014), Nice, France, Oct. 2014. [Bib]
2014.09 Diego Kreutz, Eduardo Feitosa, Hugo Cunha, Heiko Niedermayer, Holger Kinkelin, “Increasing the Resilience and Trustworthiness of OpenID Identity Providers for Future Networks and Services,” in Ninth International Conference on Availability, Reliability and Security (ARES), Sep. 2014, pp. 317–324. [Bib]
2014.06 Cornelius Diekmann, Stephan-A. Posselt, Heiko Niedermayer, Holger Kinkelin, Oliver Hanka, Georg Carle, “Verifying Security Policies using Host Attributes,” in FORTE – 34th IFIP International Conference on Formal Techniques for Distributed Objects, Components and Systems, Berlin, Germany, Jun. 2014, vol. 8461, pp. 133–148. [Pdf] [Preprint] [Slides] [Sourcecode] [Rawdata] [DOI] [Bib]
2013.10 Marc-Oliver Pahl, Heiko Niedermayer, Holger Kinkelin, Georg Carle, “Enabling Sustainable Smart Neighborhoods,” in 3rd IFIP Conference on Sustainable Internet and ICT for Sustainability 2013 (SustainIT 2013), Palermo, Italy, Oct. 2013. [Pdf] [Bib]
2011 Holger Kinkelin, Ralph Holz, Heiko Niedermayer, Simon Mittelberger, Georg Carle, “On Using TPM for Secure Identities in Future Home Networks,” Future Internet, vol. 3, no. 1, pp. 1–13, 2011. [Pdf] [DOI] [Bib]
2010.10.29 Holger Kinkelin, Ralph Holz, Heiko Niedermayer, Georg Carle, “On Using TPM for Secure Identities in Future Networks (ext. abstract),” in Proceedings of Security in NGNs and the Future Internet Workshop, Sep. 2010. [Bib]
2010.08 Ali Fessi, Nathan Evans, Heiko Niedermayer, Ralph Holz, “Pr2-P2PSIP: Privacy Preserving P2P Signaling for VoIP and IM,” in Principles, Systems and Applications of IP Telecommunications (IPTComm), Munich, Aug. 2010. [Pdf] [Bib]
2010.07 Heiko Niedermayer, “Architecture and Components of secure and anonymous Peer-to-Peer Systems,” PhD thesis, Technische Universität München, Jul. 2010. [Pdf] [Bib]
2010.06 Holger Kinkelin, Heiko Niedermayer, Ralph Holz, Georg Carle, “TPM-based Access Control for the Future Internet (ext. abstract),” in 5th GI/ITG KuVS Workshop on Future Internet, Stuttgart, Germany, Jun. 2010. [Bib]
2009.12 Ralph Holz, Christoph P. Mayer, Sebastian Mies, Heiko Niedermayer, Muhammad Adnan Tariq, “SpoVNet Security Task Force Report,” Universität Karlsruhe, Karlsruhe, Germany, Technical Report TM-2009-3, Dec. 2009. [Pdf] [Homepage] [Bib]
2009.12 Marc Fouquet, Heiko Niedermayer, Georg Carle, “Cloud Computing for the Masses,” in Proceedings of the 1st ACM Workshop on User-provided Networking, co-located with CoNEXT 2009, Rome, Italy, Dec. 2009. [Bib]
2009.09 Heiko Niedermayer, Ralph Holz, Marc-Oliver Pahl, Georg Carle, “On Using Home Networks and Cloud Computing for a Future Internet of Things,” in Proc. Future Internet Symposium 2009 (FIS 2009), Berlin, Germany, Sep. 2009. [Bib]
2009.03 Dirk Haage, Ralph Holz, Heiko Niedermayer, Pavel Laskov, “CLIO – A Cross-Layer Information Service for Overlay Network Optimization,” in Kommunikation in Verteilten Systemen (KiVS) 2009, Kassel, Germany, Mar. 2009. [Pdf] [Homepage] [Bib]
2008.12 Simon Rieche, Klaus Wehrle, Marc Fouquet, Heiko Niedermayer, Timo Teifel, Georg Carle, “Clustering Players for Load Balancing in Virtual Worlds,” International Journal of Advanced Media and Communication (IJAMC), vol. 2, no. 4, pp. 351–363, Dec. 2008. [Bib]
2008.07 Georg Carle, Holger Kinkelin, Andreas Müller, Heiko Niedermayer, Marc-Oliver Pahl, Alexander König, Thomas Luckenbach, Klaus Scholl, Mario Schuster, Lasse Thiem, Leo Petrak, Markus Steinmetz, Christoph Niedermeier, Jürgen Reichmann, “Autonomic Home Networks in the BMBF project AutHoNe,” in 8th Würzburg Workshop on IP (EuroView 2008), Jul. 2008. [Bib]
2008.04 Ralph Holz, Heiko Niedermayer, “A Protocol for Inter-Domain Authentication with a Trust-Rating Mechanism.,” in 8. Kryptotag der GI-Fachgruppe KRYPTO (Workshop). Technical Report WSI-2008-02. University of Tübingen, Apr. 2008. [Bib]
2008.03 Simon Rieche, Klaus Wehrle, Marc Fouquet, Heiko Niedermayer, Timo Teifel, Georg Carle, “Clustering Players for Load Balancing in Virtual Worlds,” in Proceedings of 1st International Workshop on Massively Multiuser Virtual Environments at IEEE Virtual Reality 2008 (MMVE 2008), Reno, Nevada, USA, Mar. 2008. [Bib]
2008 Ralph Holz, Heiko Niedermayer, Peter Hauck, Georg Carle, “Trust-Rated Authentication for Domain-Structured Distributed Systems,” in Proc. 5th European PKI Workshop: Theory and Practice (EuroPKI 2008), Trondheim, Norway, 2008. [Pdf] [Bib]
2007.11 Olaf Landsiedel, Alexis Pimenidis, Klaus Wehrle, Heiko Niedermayer, Georg Carle, “Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks,” in Proceedings of IEEE Global Communication Conference (GlobeCom), Washington, DC, USA, Nov. 2007. [Bib]
2007.07 Ali Fessi, Heiko Niedermayer, Holger Kinkelin, Georg Carle, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services,” in Principles, Systems and Applications of IP Telecommunications (IPTComm), New York), Jul. 2007. [Pdf] [Bib]
2007.01 Simon Rieche, Klaus Wehrle, Marc Fouquet, Heiko Niedermayer, Leo Petrak, Georg Carle, “Peer-to-Peer-based Infrastructure Support for Massively Multiplayer Online Games,” in Proceedings of 4th Annual IEEE Consumer Communications and Networking Conference (CCNC 2007), Las Vegas, Nevada, USA, Jan. 2007. [Pdf] [Bib]
2007 Ali Fessi, Heiko Niedermayer, Holger Kinkelin, Georg Carle, “CoSIP - a hybrid architecture for reliable and secure SIP services,” Praxis in der Informationsverarbeitung und Kommunikation (PIK), special issue on Voice over IP, 2007. [Bib]
2006.11 Andreas Klenk, Heiko Niedermayer, Marcus Masekowsky, Georg Carle, “An Architecture for Autonomic Security Adaptation,” Journal Annals of the Telecommunications, vol. 61, no. 9/10, Nov. 2006. [Pdf] [Bib]
2006.08 Simon Rieche, Marc Fouquet, Heiko Niedermayer, Leo Petrak, Klaus Wehrle, Georg Carle, “Peer-to-Peer-based Infrastructure Support for Massively Multiplayer Online Games,” Wilhelm-Schickard-Institute for Computer Science, University of Tübingen, Tübingen, Germany, Technical Report WSI-2006-04, Aug. 2006. [Bib]
2006.06.30 O. Landsiedel, K. Wehrle, H. Niedermayer, “An Infrastructure for Anonymous Internet Services,” in International Workshop on Innovations In Web Infrastructure (IWI2005), 14th International World Wide Web Conference - WWW2005, Chiba/Tokyo, Japan, May 2005. [Bib]
2006.06.30 Andreas Klenk, Marcus Masekowsky, Heiko Niedermayer, GeorgCarle, “ESAF - an Extensible Security Adaptation Framework,” in 10th Nordic Workshop on Secure IT-systems, Tartu, Estonia, Oct. 2005. [Pdf] [Bib]
2006.06.30 O. Landsiedel, S. Rieche, H. Niedermayer, K. Wehrle, Georg Carle, “Anonymous IP-Services via Overlay Routing,” in Extended Abstract at 5th Würzburger Workshop IP Netzmanagement,IP Netzplanung und Optimierung, Würzburg, Jul. 2005. [Bib]
2006.06.30 H. Niedermayer, O. Rose, “Approximation of Cycle Times of Cluster Tools in Semiconductor Manufacturing,” in IERC 2004 (Industrial Engineering Research Conference), Houston, Texas., May 2004. [Bib]
2006.06.30 H. Niedermayer, “Scheduling von Clustertools.” talk on the 6th Workshop Leistungsbewertung und Simulation von Fertigungsanlagen(Performance Analysis and Simulation in Manufacturing), Würzburg, Germany, Nov-2003. [Bib]
2006.06.30 H. Niedermayer, O. Rose, “A Simulation-Based Analysis of the Cycle Time of Cluster Tools in Semiconductor Manufacturing,” in 5th European Simulation Symposium, Delft, Netherlands., Oct. 2003. [Bib]
2006.06.30 T. Heer, H. Niedermayer, L. Petrak, S. Rieche, K. Wehrle, “On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios,” in Informatik 2004 (Workshop on Peer-to-Peer Systems), Ulm, Germany., Sep. 2004. [Bib]
2006.06.30 H. Niedermayer, “Optimierungsmethoden für Fabriken mit Clustertool-Workcentern.” talk on the 7th Workshop Simulation und Leistungsbewertung von Fertigungssystemen(Performance Analysis and Simulation in Manufacturing), TU Dresden, Germany., Nov-2004. [Bib]
2006.06.30 Heiko Niedermayer, Klaus Wehrle, Thomas Schreiner, Georg Carle, “Considering Security in Distributed Hash Tables,” in Abstract at 4th Würzburger Workshop IP Netzmanagement, IP Netzplanung und Optimierung, Würzburg, Germany., Jul. 2004. [Bib]
2006.06.30 H. Niedermayer, O. Rose, “Solution Approaches for the Cluster Tool Scheduling Problem in Semiconductor Manufacturing,” in ESS 2004 (16th European Simulation Symposium), Budapest, Hungary., Oct. 2004. [Bib]
2006.06.30 H. Niedermayer, S. Rieche, K. Wehrle, Georg Carle, “On the Distribution of Nodes in Distributed Hash Tables,” in KiVS 2005 (Workshop Peer-to-Peer-Systeme und Anwendungen), Kaiserslautern, Germany., Mar. 2005. [Bib]
2006.06.30 Heiko Niedermayer, Andreas Klenk, Georg Carle, “The Networking Perspective of Security Performance - a Measurement Study -,” in MMB 2006, Nürnberg, Germany, Mar. 2006. [Pdf] [Bib]
2006.06.30 Simon Rieche, Marc Fouquet, Heiko Niedermayer, Klaus Wehrle, Georg Carle, “On the Use of Structured Peer-to-Peer Systems for Online Gaming,” in Extended Abstract at 5th Würzburger Workshop IP Netzmanagement, IP Netzplanung und Optimierung, Würzburg, Jul. 2005. [Pdf] [Bib]
2006.06.30 S. Rieche, K. Wehrle, H. Niedermayer, S. Götz, “Reliability and Load Balancing in DHTs,” in chapter in the book Ralf Steinmetz, Klaus Wehrle (Eds.) Peer-to-Peer Systems and Applications, Lecture Notes in Computer Science Volume 3485, 657 pages, Springer, Sep. 2005, pp. 129–146. [Bib]
2006.06.30 K. Wehrle, H. Niedermayer, “Improving Performance-oriented Simulation Models for Communication Networks,” in MSO 2004 (Modelling, Simulation, and Optimization), Kauai, Hawaii., Aug. 2004. [Bib]