Publikationen

2021

[21-01]

C. Kessler, S. Litzinger, J. Keller.
Crown-Scheduling of Sets of Parallelizable Tasks for Robustness and Energy-elasticity on Many-core Systems with Discrete Dynamic Voltage and Frequency Scaling.
To appear in:
Journal of Sytems Architecture, 2021.

[21-02]

J. Keller, S. Wendzel.
Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains.
To appear in:
Applied Sciences, 2021.

[21-03]

L. Oden, J. Keller.
Improving Cryptanalytic Applications with Stochastic Runtimes on GPUs.
To appear in:
Proc. 11th International Workshop on Accelerators and Hybrid Emerging Systems (AsHES@IPDPS 2021), May 2020.

[21-04]

D. Spiekermann, J. Keller.
Unsupervised Packet-Based Anomaly Detection in Virtual Networks.
In:
Computer Networks, Vol. 192, p. 108017, June 2021.

[21-05]

D. Spiekermann, J. Keller.
Encapcap: Transforming Network Traces to Virtual Networks.
To appear in:
Proc. 3rd International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft 2021), July 2021.

[21-06]

C. Kessler, J. Keller, S. Litzinger.
Temperature-Aware Energy-Optimal Scheduling of Moldable Streaming Tasks onto 2D-Mesh-Based Many-Core CPUs with DVFS.
To appear in:
Proc. 24th Workshop on Job Scheduling Strategies for Parallel Processing (JSSPP 2021), May 2021.

[21-07]

J. Keller, S. Litzinger, C. Kessler.
Combining Design Space Exploration with Task Scheduling of Moldable Streaming Tasks on Reconfigurable Platforms.
In: Proc. 17th International Symposium on Applied Reconfigurable Computing (ARC 2021), pp. 93-107, June 2021.

[21-08]

J. Keller.
Chaotic Pseudo Random Number Generators: A Case Study on Replication Study Challenges.
To appear in: Proc. 3rd International Workshop on Information Security Methodology and Replication Studies (IWSMR2021@ARES2021), August 2021.

[21-09]

L. Caviglione, W. Mazurczyk, M. Repetto, A. Schaffhauser, M. Zuppelli.
Kernel-level tracing for detecting stegomalware and covert channels in Linux environments.
Computer Networks 191:108010, 2021

[21-10]

S. Wendzel, L. Caviglione, W. Mazurczyk, A. Mileva, J. Dittmann,C. Krätzer, K. Lamshöft, C. Vielhauer, L. Hartmann, J. Keller, T. Neubert.
A Revised Taxonomy of Steganography Embedding Patterns.
To appear in: Proc. 5th International Workshop on Criminal Use of Information Hiding (CUING@ARES 2021), August 2021.

[21-11]

A. Ernstsson, N. Vandenbergen, J. Keller and C. Kessler.
A Deterministic Portable Parallel Pseudo-random Number Generator for Pattern-Based Programming of Heterogeneous Parallel Systems.
To appear in: Proc. 14th International Symposium on International Symposium on High-Level Parallel Programming and Applications (HLPP 2021), July 2021.

[21-12]

L. Caviglione, M. Zuppelli, W. Mazurczyk, A. Schaffhauser, M.Repetto.
Code Augmentation for Detecting Covert Channels Targeting the IPv6 Flow Label.
In: Proc. 3rd International Workshop on Cyber- Security Threats, Trust and Privacy management in Software-defined and Virtualized Infrastructures (SecSoft 20211), July 2021.

[21-13]

S. Wendzel, L. Caviglione, W. Mazurczyk, A. Mileva, J. Dittmann,
C. Krätzer, K. Lamshöft, C. Vielhauer, L. Hartmann, J. Keller, T. Neubert.
A Revised Taxonomy of Steganography Embedding Patterns.
In: Proc. 5th International Workshop on Criminal Use of Information Hiding (CUING2021@ARES2021), August 2021.

[21-14]

D. Spiekermann, J. Keller.
Wiretapping Pods and Nodes - Lawful Interception in Kubernetes.
To appear in: Proc. 1st International Workshop on Cyber Forensics and Advanced Threat Investigations in Emerging Technologies (CFATI3 2021) in conjunction with 5th International Conference on Networked Systems (Netsys 2021),
Lübeck, Germany, Sept 2021.

[21-15]

J. Keller.
Multilevel Network Steganography in Fountain Codes.
To appear in: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2021), Special Session on Advanced and Reliable Solutions to Counter Malware and Stegomalware (DETONATOR 2021), Targu Mures, Romania, Nov 2021.