Left3
Right3

Research Seminar on 17.07.2019 16:00
Room 03.07.023

Self-Adapting IoT User Interfaces

Final talk for Bachelor's Thesis
Julian Ulrich (Lübben, Pahl, Liebald)

Tamper-resistant creation of integrity tokens for trustworthy communication in cyber-physical systems

Intermediate talk for Master's Thesis
Christoph Rudolf (Kinkelin, von Seck)

Interrupts in User Space Drivers

Intermediate talk for Master's Thesis
Thomas Zwickl (Emmerich)

Research Seminar on 29.07.2019 16:00
Room 03.07.023

Comparative Performance Analysis of Userland TCP/IP Implementations

Final talk for Master's Thesis
Simon Mages (Emmerich, Gallenmüller, Scholz)

Research Seminar on 07.08.2019 16:00
Room 03.07.023

Evaluation and Analysis of a Hardware Programmable High-Performance Switch

Final talk for Master's Thesis
Alexander Frank (Gallenmüller, Scholz, Stubbe)

01.06.2019
IFIP TMA Demo

Demonstrating the Cost of Collecting In-Network Measurements for High-Speed VNFs

Authors: Leonardo Linguaglossa, Fabien Geyer, Wenqin Shao, Frank Brockners, Georg Carle

01.05.2019
2019 IEEE International Conference on Communications Workshops (ICC Workshops): The 2nd International Workshop on 5G and Cooperative Autonomous Driving (5G Auto) (ICC 2019 Workshop - 5G Auto)

Comparison of Optimization Goals for Resilient Routing

With the introduction of 5G, flexible network management through Software-Defined Networking will become available in cellular networks. As this has not been designed for safety-critical application such as autonomous driving or aeronautical applications, special care needs to be taken to use it in such contexts. In this work, different objective functions for optimization and their respective impact on performance characteristics such as link utilization and latency are investigated and compared. This allows to better understand the impact of resilient flow placement under constrained capacity and latency on network performance. Results show that for critical systems, objective functions relating to link capacity result in poorer network performance as latency and resilience are more limiting factors. While optimizations for maximum resilience increase network usage, with tight latency constraints they are comparable in performance with link capacity optimization, while providing more resilience against failures.

Authors: Cora Perner, Georg Carle

01.05.2019
Proceedings of the 18th International IFIP TC6 Networking Conference

DeepMPLS: Fast Analysis of MPLS Configurations Using Deep Learning

Authors: Fabien Geyer, Stefan Schmid

08.04.2019
2019 IFIP/IEEE International Symposium on Integrated Network Management

Data Querying and Access Control for Secure Multiparty Computation

Authors: Marcel von Maltitz, Dominik Bitzer, Georg Carle

01.04.2019
IM 2019 - IEEE/IFIP Workshop Dissect 2019

Adaptive Network Management for Safety-Critical Systems

Authors: Cora Perner, Holger Kinkelin, Georg Carle

01.04.2019
IM 2019 - IEEE/IFIP Workshop HotNSM 2019

Multi-party authorization and conflict mediation for decentralized configuration management processes

Authors: Holger Kinkelin, Heiko Niedermayer, Marc-Oliver Müller, Georg Carle

01.04.2019
Proceedings of the 38th IEEE International Conference on Computer Communications (INFOCOM 2019)

DeepTMA: Predicting Effective Contention Models for Network Calculus using Graph Neural Networks

Authors: Fabien Geyer, Steffen Bondorf

01.04.2019
International Symposium on Integrated Network Management (IM)

Giving IoT Edge Services an Identity and Changeable Attributes

The Internet of Things (IoT) is managed by soft- ware. This software interfaces our physical surroundings. For a successful deployment of the IoT, providing adequate service security is essential. However, with its distributed heterogeneous nature, and its different stakeholders in the development process, securing IoT services is challenging. In this work we how certificates can be used to give services an identity for authentication. We show how the mechanism can be used to securely add attributes to the service executable. To reflect the dynamic distributed nature of the IoT, we show how the securely added attributes can be changed at runtime and how security policies can be enforced even on distributed loosely coupled IoT nodes. Our solution is based on pinning X.509v3 certificates to the service executables, and autonomously managing short certificate lifetimes for ensuring the desired security policies within guaranteed time limits. Besides the feasibility of our approach we asses the resulting traffic of the renewals and the power consumption of this process.

Authors: Marc-Oliver Pahl, Lorenzo Donini

29.03.2019
PAM'19: Best Dataset Award

Best Dataset Award at PAM 2019

The publication "A First Look at QNAME Minimization in the Domain Name System" has been awarded with the Best Dataset Award at the Passive and Active Measurement (PAM) Conference (PAM'19).

The publication is an international collaboration with Wouter B. ...

02.11.2018
IMC'18: Community Contribution Award

Community Contribution Award at IMC 2018

The publication "A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists" has been awarded with the Community Contribution Award at the ACM SIGCOMM Internet Measurement Conference (IMC'18).

The publication is an international collaboration with ...

03.07.2018
IEEE ComSoc ITC Best Paper Award 2017

I8 team awarded IEEE ComSoc ITC Best Paper Award for 2017

A team from TUM's Chair of Network Architectures and Services have been awarded the IEEE ComSoc ITC Best Paper Award 2017. This award honors the best paper in the set of IEEE ComSoc ITC sponsored conferences ...

27.03.2018
PAM'18: Best Paper Award

Best Paper Award at PAM 2018

The publication "In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements" has been awarded with the Best Paper Award at the Passive and Active Measurement Conference (PAM'18). The publication is the result of an international ...

09.11.2017
IMC'17: Community Contribution Award

Community Contribution Award at IMC 2017

The publication "Mission Accomplished? HTTP Security After DigiNotar" has been awarded with the Community Contribution Award at the ACM SIGCOMM Internet Measurement Conference (IMC'17). The publication is an international collaboration with Johanna Amann (ICSI), Lexi Brent (University of Sydney) and Ralph ...