Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 59 results for author: Hollick, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.17480  [pdf, other

    cs.NI

    Resilience-by-Design Concepts for 6G Communication Networks

    Authors: Ladan Khaloopour, Yanpeng Su, Florian Raskob, Tobias Meuser, Roland Bless, Leon Würsching, Kamyar Abedi, Marko Andjelkovic, Hekma Chaari, Pousali Chakraborty, Michael Kreutzer, Matthias Hollick, Thorsten Strufe, Norman Franchi, Vahid Jamali

    Abstract: The sixth generation (6G) mobile communication networks are expected to intelligently integrate into various aspects of modern digital society, including smart cities, homes, healthcare, transportation, and factories. While offering a multitude of services, it is likely that societies become increasingly reliant on 6G infrastructure. Any disruption to these digital services, whether due to human o… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  2. arXiv:2404.19611  [pdf, other

    eess.SP cs.ET cs.IT cs.NI

    Radio Resource Management Design for RSMA: Optimization of Beamforming, User Admission, and Discrete/Continuous Rates with Imperfect SIC

    Authors: L. F. Abanto-Leon, A. Krishnamoorthy, A. Garcia-Saavedra, G. H. Sim, R. Schober, M. Hollick

    Abstract: This paper investigates the radio resource management (RRM) design for multiuser rate-splitting multiple access (RSMA), accounting for various characteristics of practical wireless systems, such as the use of discrete rates, the inability to serve all users, and the imperfect successive interference cancellation (SIC). Specifically, failure to consider these characteristics in RRM design may lead… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

  3. arXiv:2310.11124  [pdf, other

    cs.NI

    Maintaining App Services in Disrupted Cities: A Crisis and Resilience Evaluation Tool

    Authors: Leon Würsching, Matthias Hollick

    Abstract: Disaster scenarios can disconnect entire cities from the core network (CN), isolating base stations (BSs) and disrupting the Internet connection of app services for many users. Such a disruption is particularly disastrous when it affects critical app services such as communication, information, and navigation. Deploying local app servers at the network edge can solve this issue but leaves mobile n… ▽ More

    Submitted 17 October, 2023; originally announced October 2023.

    Comments: 2 pages, 4 figures, source code available at https://github.com/seemoo-lab/caret

  4. arXiv:2306.04458  [pdf, other

    cs.CR

    Hardening and Speeding Up Zero-interaction Pairing and Authentication

    Authors: Mikhail Fomichev, Timm Lippert, Matthias Hollick

    Abstract: Establishing and maintaining secure communications in the Internet of Things (IoT) is vital to protect smart devices. Zero-interaction pairing (ZIP) and zero-interaction authentication (ZIA) enable IoT devices to establish and maintain secure communications without user interaction by utilizing devices' ambient context, e.g., audio. For autonomous operation, ZIP and ZIA require the context to have… ▽ More

    Submitted 28 August, 2023; v1 submitted 7 June, 2023; originally announced June 2023.

    Comments: Accepted to EWSN 2023. Code and data are available at https://github.com/seemoo-lab/hardzipa

  5. arXiv:2303.11220  [pdf, other

    cs.CR cs.PF

    Smartphones with UWB: Evaluating the Accuracy and Reliability of UWB Ranging

    Authors: Alexander Heinrich, Sören Krollmann, Florentin Putz, Matthias Hollick

    Abstract: More and more consumer devices implement the IEEE Ultra-Wide Band (UWB) standard to perform distance measurements for sensitive tasks such as keyless entry and startup of modern cars, to find lost items using coin-sized trackers, and for smart payments. While UWB promises the ability to perform time-of-flight centimeter-accurate distance measurements between two devices, the accuracy and reliabili… ▽ More

    Submitted 20 March, 2023; originally announced March 2023.

    Comments: 16 pages, 14 figures

    MSC Class: 68M25; 62N05 ACM Class: D.4.8; D.4.6; C.4

  6. arXiv:2302.07777  [pdf, other

    cs.CR cs.HC cs.NI

    FIDO2 the Rescue? Platform vs. Roaming Authentication on Smartphones

    Authors: Leon Würsching, Florentin Putz, Steffen Haesler, Matthias Hollick

    Abstract: Modern smartphones support FIDO2 passwordless authentication using either external security keys or internal biometric authentication, but it is unclear whether users appreciate and accept these new forms of web authentication for their own accounts. We present the first lab study (N=87) comparing platform and roaming authentication on smartphones, determining the practical strengths and weaknesse… ▽ More

    Submitted 15 February, 2023; originally announced February 2023.

    Comments: 16 pages, 6 figures, the dataset is available at https://doi.org/10.5281/zenodo.7572697 and the source code is available at https://github.com/seemoo-lab/fido2-the-smartphone

    Journal ref: ACM CHI 2023

  7. Network Message Field Type Classification and Recognition for Unknown Binary Protocols

    Authors: Stephan Kleber, Milan Stute, Matthias Hollick, Frank Kargl

    Abstract: Reverse engineering of unknown network protocols based on recorded traffic traces enables security analyses and debugging of undocumented network services. In particular for binary protocols, existing approaches (1) lack comprehensive methods to classify or determine the data type of a discovered segment in a message, e.,g., a number, timestamp, or network address, that would allow for a semantic… ▽ More

    Submitted 7 November, 2022; originally announced January 2023.

    Journal ref: Proceedings of the DSN Workshop on Data-Centric Dependability and Security. DCDS 2022. Baltimore, Maryland, USA

  8. arXiv:2301.03201  [pdf, other

    cs.NI

    Safehaul: Risk-Averse Learning for Reliable mmWave Self-Backhauling in 6G Networks

    Authors: Amir Ashtari Gargari, Andrea Ortiz, Matteo Pagin, Anja Klein, Matthias Hollick, Michele Zorzi, Arash Asadi

    Abstract: Wireless backhauling at millimeter-wave frequencies (mmWave) in static scenarios is a well-established practice in cellular networks. However, highly directional and adaptive beamforming in today's mmWave systems have opened new possibilities for self-backhauling. Tapping into this potential, 3GPP has standardized Integrated Access and Backhaul (IAB) allowing the same base station serve both acces… ▽ More

    Submitted 12 January, 2023; v1 submitted 9 January, 2023; originally announced January 2023.

    Comments: To appear in Proceedings of IEEE INFOCOM 2023

  9. arXiv:2210.16352  [pdf

    cs.DC

    Towards Privacy Engineering for Real-Time Analytics in the Human-Centered Internet of Things

    Authors: Thomas Plagemann, Vera Goebel, Matthias Hollick, Boris Koldehofe

    Abstract: Big data applications offer smart solutions to many urgent societal challenges, such as health care, traffic coordination, energy management, etc. The basic premise for these applications is "the more data the better". The focus often lies on sensing infrastructures in the public realm that produce an ever-increasing amount of data. Yet, any smartphone and smartwatch owner could be a continuous so… ▽ More

    Submitted 28 October, 2022; originally announced October 2022.

    ACM Class: H.2.m

  10. Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones

    Authors: Jiska Classen, Alexander Heinrich, Robert Reith, Matthias Hollick

    Abstract: When an iPhone is turned off, most wireless chips stay on. For instance, upon user-initiated shutdown, the iPhone remains locatable via the Find My network. If the battery runs low, the iPhone shuts down automatically and enters a power reserve mode. Yet, users can still access credit cards, student passes, and other items in their Wallet. We analyze how Apple implements these standalone wireless… ▽ More

    Submitted 12 May, 2022; originally announced May 2022.

    Journal ref: WiSec 2022: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks

  11. arXiv:2202.11813  [pdf, other

    cs.CR cs.CY

    AirGuard -- Protecting Android Users From Stalking Attacks By Apple Find My Devices

    Authors: Alexander Heinrich, Niklas Bittner, Matthias Hollick

    Abstract: Finder networks in general, and Apple's Find My network in particular, can pose a grave threat to users' privacy and even health if these networks are abused for stalking. Apple's release of the AirTag, a very affordable tracker covered by the nearly ubiquitous Find My network, amplified this issue. While Apple provides a stalking detection feature within its ecosystem, billions of Android users a… ▽ More

    Submitted 23 February, 2022; originally announced February 2022.

  12. arXiv:2202.05573  [pdf, other

    cs.CR

    Very Pwnable Network: Cisco AnyConnect Security Analysis

    Authors: Gerbert Roitburd, Matthias Ortmann, Matthias Hollick, Jiska Classen

    Abstract: Corporate Virtual Private Networks (VPNs) enable users to work from home or while traveling. At the same time, VPNs are tied to a company's network infrastructure, forcing users to install proprietary clients for network compatibility reasons. VPN clients run with high privileges to encrypt and reroute network traffic. Thus, bugs in VPN clients pose a substantial risk to their users and in turn th… ▽ More

    Submitted 11 February, 2022; originally announced February 2022.

    Journal ref: IEEE Conference on Communications and Network Security 2021

  13. arXiv:2201.10426  [pdf, ps, other

    cs.IT cs.NI eess.SP

    Sequential Parametric Optimization for Rate-Splitting Precoding in Non-Orthogonal Unicast and Multicast Transmissions

    Authors: Luis F. Abanto-Leon, Matthias Hollick, Bruno Clerckx, Gek Hong Sim

    Abstract: This paper investigates rate-splitting (RS) precoding for non-orthogonal unicast and multicast (NOUM) transmissions using fully-digital and hybrid precoders. We study the nonconvex weighted sum-rate (WSR) maximization problem subject to a multicast requirement. We propose FALCON, an approach based on sequential parametric optimization, to solve the aforementioned problem. We show that FALCON conve… ▽ More

    Submitted 25 January, 2022; originally announced January 2022.

    Comments: 7 pages / ICC 2022

  14. arXiv:2201.10297  [pdf, ps, other

    eess.SP cs.IT cs.NI

    RadiOrchestra: Proactive Management of Millimeter-wave Self-backhauled Small Cells via Joint Optimization of Beamforming, User Association, Rate Selection, and Admission Control

    Authors: L. F. Abanto-Leon, A. Asadi, G. H. Sim, A. Garcia-Saavedra, M. Hollick

    Abstract: Millimeter-wave self-backhauled small cells are a key component of next-generation wireless networks. Their dense deployment will increase data rates, reduce latency, and enable efficient data transport between the access and backhaul networks, providing greater flexibility not previously possible with optical fiber. Despite their high potential, operating dense self-backhauled networks optimally… ▽ More

    Submitted 13 July, 2022; v1 submitted 25 January, 2022; originally announced January 2022.

    Comments: 19 pages

    Journal ref: IEEE Transactions on Wireless Communications, 2022

  15. arXiv:2112.05719  [pdf, other

    cs.CR cs.AR

    Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation

    Authors: Jiska Classen, Francesco Gringoli, Michael Hermann, Matthias Hollick

    Abstract: Modern mobile devices feature multiple wireless technologies, such as Bluetooth, Wi-Fi, and LTE. Each of them is implemented within a separate wireless chip, sometimes packaged as combo chips. However, these chips share components and resources, such as the same antenna or wireless spectrum. Wireless coexistence interfaces enable them to schedule packets without collisions despite shared resources… ▽ More

    Submitted 10 December, 2021; originally announced December 2021.

  16. arXiv:2112.02382  [pdf, other

    cs.CR cs.LG eess.SP

    My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack

    Authors: Matthias Gazzari, Annemarie Mattmann, Max Maass, Matthias Hollick

    Abstract: Wearables that constantly collect various sensor data of their users increase the chances for inferences of unintentional and sensitive information such as passwords typed on a physical keyboard. We take a thorough look at the potential of using electromyographic (EMG) data, a sensor modality which is new to the market but has lately gained attention in the context of wearables for augmented reali… ▽ More

    Submitted 4 December, 2021; originally announced December 2021.

    Comments: 24 pages, 10 figures, the source code is available at https://github.com/seemoo-lab/myo-keylogging and the dataset is available at https://doi.org/10.5281/zenodo.5594651

    Journal ref: Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., Vol. 5, No. 4, Article 157, December 2021

  17. arXiv:2111.05313  [pdf, other

    cs.CR

    Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging

    Authors: Patrick Leu, Giovanni Camurati, Alexander Heinrich, Marc Roeschlin, Claudio Anliker, Matthias Hollick, Srdjan Capkun, Jiska Classen

    Abstract: We present the first over-the-air attack on IEEE 802.15.4z High-Rate Pulse Repetition Frequency (HRP) Ultra-WideBand (UWB) distance measurement systems. Specifically, we demonstrate a practical distance reduction attack against pairs of Apple U1 chips (embedded in iPhones and AirTags), as well as against U1 chips inter-operating with NXP and Qorvo UWB chips. These chips have been deployed in a wid… ▽ More

    Submitted 9 November, 2021; originally announced November 2021.

  18. Next2You: Robust Copresence Detection Based on Channel State Information

    Authors: Mikhail Fomichev, Luis F. Abanto-Leon, Max Stiegler, Alejandro Molina, Jakob Link, Matthias Hollick

    Abstract: Context-based copresence detection schemes are a necessary prerequisite to building secure and usable authentication systems in the Internet of Things (IoT). Such schemes allow one device to verify proximity of another device without user assistance utilizing their physical context (e.g., audio). The state-of-the-art copresence detection schemes suffer from two major limitations: (1) they cannot a… ▽ More

    Submitted 22 February, 2022; v1 submitted 9 November, 2021; originally announced November 2021.

    Comments: Added correct metadata from ACM Transactions on Internet of Things. Code and data are available at https://github.com/seemoo-lab/next2you

  19. Happy MitM: Fun and Toys in Every Bluetooth Device

    Authors: Jiska Classen, Matthias Hollick

    Abstract: Bluetooth pairing establishes trust on first use between two devices by creating a shared key. Similar to certificate warnings in TLS, the Bluetooth specification requires warning users upon issues with this key, because this can indicate ongoing Machine-in-the-Middle (MitM) attacks. This paper uncovers that none of the major Bluetooth stacks warns users, which violates the specification. Clear wa… ▽ More

    Submitted 16 August, 2021; originally announced August 2021.

    Journal ref: WiSec 2021: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks

  20. arXiv:2108.04313  [pdf, other

    eess.SP cs.IT

    BEAMWAVE: Cross-Layer Beamforming and Scheduling for Superimposed Transmissions in Industrial IoT mmWave Networks

    Authors: Luis F. Abanto-Leon, Matthias Hollick, Gek Hong Sim

    Abstract: The omnipresence of IoT devices in Industry 4.0 is expected to foster higher reliability, safety, and efficiency. However, interconnecting a large number of wireless devices without jeopardizing the system performance proves challenging. To address the requirements of future industries, we investigate the cross-layer design of beamforming and scheduling for layered-division multiplexing (LDM) syst… ▽ More

    Submitted 9 August, 2021; originally announced August 2021.

    Comments: 8 pages. Accepted at WiOpt 2021

    Journal ref: WiOpt 2021

  21. Best Practices for Notification Studies for Security and Privacy Issues on the Internet

    Authors: Max Maass, Henning Pridöhl, Dominik Herrmann, Matthias Hollick

    Abstract: Researchers help operators of vulnerable and non-compliant internet services by individually notifying them about security and privacy issues uncovered in their research. To improve efficiency and effectiveness of such efforts, dedicated notification studies are imperative. As of today, there is no comprehensive documentation of pitfalls and best practices for conducting such notification studies,… ▽ More

    Submitted 15 June, 2021; originally announced June 2021.

    Comments: Accepted to the 3rd International Workshop on Information Security Methodology and Replication Studies (IWSMR '21), colocated with ARES '21

  22. Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet

    Authors: Max Maass, Marc-Pascal Clement, Matthias Hollick

    Abstract: In the era of large-scale internet scanning, misconfigured websites are a frequent cause of data leaks and security incidents. Previous research has investigated sending automated email notifications to operators of insecure or compromised websites, but has often met with limited success due to challenges in address data quality, spam filtering, and operator distrust and disinterest. While several… ▽ More

    Submitted 15 June, 2021; originally announced June 2021.

    Comments: Accepted at The 16th International Conference on Availability, Reliability and Security (ARES '21). Code and data: https://doi.org/10.5281/zenodo.4817463

  23. FastZIP: Faster and More Secure Zero-Interaction Pairing

    Authors: Mikhail Fomichev, Julia Hesse, Lars Almon, Timm Lippert, Jun Han, Matthias Hollick

    Abstract: With the advent of the Internet of Things (IoT), establishing a secure channel between smart devices becomes crucial. Recent research proposes zero-interaction pairing (ZIP), which enables pairing without user assistance by utilizing devices' physical context (e.g., ambient audio) to obtain a shared secret key. The state-of-the-art ZIP schemes suffer from three limitations: (1) prolonged pairing t… ▽ More

    Submitted 23 February, 2022; v1 submitted 9 June, 2021; originally announced June 2021.

    Comments: ACM MobiSys '21; Fixed ambiguity in flow diagram (Figure 2). Code and data are available at: https://github.com/seemoo-lab/fastzip

  24. arXiv:2103.02282  [pdf, other

    cs.CR cs.NI

    Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System

    Authors: Alexander Heinrich, Milan Stute, Tim Kornhuber, Matthias Hollick

    Abstract: Overnight, Apple has turned its hundreds-of-million-device ecosystem into the world's largest crowd-sourced location tracking network called offline finding (OF). OF leverages online finder devices to detect the presence of missing offline devices using Bluetooth and report an approximate location back to the owner via the Internet. While OF is not the first system of its kind, it is the first to… ▽ More

    Submitted 3 March, 2021; originally announced March 2021.

    Comments: Accepted at Privacy Enhancing Technologies Symposium (PETS) 2021

  25. arXiv:2011.12644  [pdf, other

    cs.CR cs.CY cs.NI cs.PF

    Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints

    Authors: Luis F. Abanto-Leon, Andreas Baeuml, Gek Hong, Sim, Matthias Hollick, Arash Asadi

    Abstract: The intrinsic hardware imperfection of WiFi chipsets manifests itself in the transmitted signal, leading to a unique radiometric fingerprint. This fingerprint can be used as an additional means of authentication to enhance security. In fact, recent works propose practical fingerprinting solutions that can be readily implemented in commercial-off-the-shelf devices. In this paper, we prove analytica… ▽ More

    Submitted 27 November, 2020; v1 submitted 25 November, 2020; originally announced November 2020.

    Comments: ACM Sigmetrics 2021 / In Proc. ACM Meas. Anal. Comput. Syst., Vol. 4, 3, Article 44 (December 2020)

  26. arXiv:2011.06260  [pdf, other

    cs.CR

    Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support

    Authors: Max Maass, Alina Stöver, Henning Pridöhl, Sebastian Bretthauer, Dominik Herrmann, Matthias Hollick, Indra Spiecker

    Abstract: Misconfigurations and outdated software are a major cause of compromised websites and data leaks. Past research has proposed and evaluated sending automated security notifications to the operators of misconfigured websites, but encountered issues with reachability, mistrust, and a perceived lack of importance. In this paper, we seek to understand the determinants of effective notifications. We ide… ▽ More

    Submitted 12 November, 2020; originally announced November 2020.

    Comments: Published at USENIX Security '21

  27. ReactiFi: Reactive Programming of Wi-Fi Firmware on Mobile Devices

    Authors: Artur Sterz, Matthias Eichholz, Ragnar Mogk, Lars Baumgärtner, Pablo Graubner, Matthias Hollick, Mira Mezini, Bernd Freisleben

    Abstract: Network programmability will be required to handle future increased network traffic and constantly changing application needs. However, there is currently no way of using a high-level, easy to use programming language to program Wi-Fi firmware. This impedes rapid prototyping and deployment of novel network services/applications and hinders continuous performance optimization in Wi-Fi networks, sin… ▽ More

    Submitted 4 March, 2021; v1 submitted 1 October, 2020; originally announced October 2020.

    Journal ref: The Art, Science, and Engineering of Programming, 2021, Vol. 5, Issue 2, Article 4

  28. arXiv:2008.07600  [pdf, other

    eess.SP cs.IT

    SWAN: Swarm-Based Low-Complexity Scheme for PAPR Reduction

    Authors: Luis F. Abanto-Leon, Gek Hong Sim, Matthias Hollick, Amnart Boonkajay, Fumiyuki Adachi

    Abstract: Cyclically shifted partial transmit sequences (CS-PTS) has conventionally been used in SISO systems for PAPR reduction of OFDM signals. Compared to other techniques, CS-PTS attains superior performance. Nevertheless, due to the exhaustive search requirement, it demands excessive computational complexity. In this paper, we adapt CS-PTS to operate in a MIMO framework, where singular value decomposit… ▽ More

    Submitted 15 September, 2020; v1 submitted 17 August, 2020; originally announced August 2020.

    Comments: IEEE GLOBECOM 2020

  29. arXiv:2008.03913  [pdf, other

    cs.CR

    NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit

    Authors: Steffen Klee, Alexandros Roussos, Max Maass, Matthias Hollick

    Abstract: Near-Field Communication (NFC) is being used in a variety of security-critical applications, from access control to payment systems. However, NFC protocol analysis typically requires expensive or conspicuous dedicated hardware, or is severely limited on smartphones. In 2015, the NFCGate proof of concept aimed at solving this issue by providing capabilities for NFC analysis employing off-the-shelf… ▽ More

    Submitted 10 August, 2020; originally announced August 2020.

    Comments: Accepted to Usenix WOOT'20. Source Code and binaries available at https://github.com/nfcgate/nfcgate

  30. Optimal and Approximation Algorithms for Joint Routing and Scheduling in Millimeter-Wave Cellular Networks

    Authors: Dingwen Yuan, Hsuan-Yin Lin, Jörg Widmer, Matthias Hollick

    Abstract: Millimeter-wave (mmWave) communication is a promising technology to cope with the exponential increase in 5G data traffic. Such networks typically require a very dense deployment of base stations. A subset of those, so-called macro base stations, feature high-bandwidth connection to the core network, while relay base stations are connected wirelessly. To reduce cost and increase flexibility,… ▽ More

    Submitted 6 July, 2020; originally announced July 2020.

    Comments: accepted for publish in the IEEE/ACM Transactions on Networking

  31. DEMO: BTLEmap: Nmap for Bluetooth Low Energy

    Authors: Alexander Heinrich, Milan Stute, Matthias Hollick

    Abstract: The market for Bluetooth Low Energy devices is booming and, at the same time, has become an attractive target for adversaries. To improve BLE security at large, we present BTLEmap, an auditing application for BLE environments. BTLEmap is inspired by network discovery and security auditing tools such as Nmap for IP-based networks. It allows for device enumeration, GATT service discovery, and device… ▽ More

    Submitted 1 July, 2020; originally announced July 2020.

    Comments: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks

  32. arXiv:2006.16921  [pdf, other

    cs.CR cs.AR cs.NI

    Firmware Insider: Bluetooth Randomness is Mostly Random

    Authors: Jörn Tillmanns, Jiska Classen, Felix Rohrbach, Matthias Hollick

    Abstract: Bluetooth chips must include a Random Number Generator (RNG). This RNG is used internally within cryptographic primitives but also exposed to the operating system for chip-external applications. In general, it is a black box with security-critical authentication and encryption mechanisms depending on it. In this paper, we evaluate the quality of RNGs in various Broadcom and Cypress Bluetooth chips… ▽ More

    Submitted 30 June, 2020; originally announced June 2020.

    Comments: WOOT'20

  33. arXiv:2006.09809  [pdf, other

    cs.CR cs.NI

    Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets

    Authors: Jan Ruge, Jiska Classen, Francesco Gringoli, Matthias Hollick

    Abstract: Wireless communication standards and implementations have a troubled history regarding security. Since most implementations and firmwares are closed-source, fuzzing remains one of the main methods to uncover Remote Code Execution (RCE) vulnerabilities in deployed systems. Generic over-the-air fuzzing suffers from several shortcomings, such as constrained speed, limited repeatability, and restricte… ▽ More

    Submitted 17 June, 2020; originally announced June 2020.

    Comments: To be published at USENIX Security

  34. DEMO: Attaching InternalBlue to the Proprietary macOS IOBluetooth Framework

    Authors: Davide Toldo, Jiska Classen, Matthias Hollick

    Abstract: In this demo, we provide an overview of the macOS Bluetooth stack internals and gain access to undocumented low-level interfaces. We leverage this knowledge to add macOS support to the InternalBlue firmware modification and wireless experimentation framework.

    Submitted 29 May, 2020; originally announced May 2020.

    Comments: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks

  35. DEMO: Extracting Physical-Layer BLE Advertisement Information from Broadcom and Cypress Chips

    Authors: Jiska Classen, Matthias Hollick

    Abstract: Multiple initiatives propose utilizing Bluetooth Low Energy (BLE) advertisements for contact tracing and SARS-CoV-2 exposure notifications. This demo shows a research tool to analyze BLE advertisements; if universally enabled by the vendors, the uncovered features could improve exposure notifications for everyone. We reverse-engineer the firmware-internal implementation of BLE advertisements on Br… ▽ More

    Submitted 29 May, 2020; originally announced May 2020.

    Comments: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks

  36. Empirical Insights for Designing Information and Communication Technology for International Disaster Response

    Authors: Milan Stute, Max Maass, Tom Schons, Marc-André Kaufhold, Christian Reuter, Matthias Hollick

    Abstract: Due to the increase in natural disasters in the past years, Disaster Response Organizations (DROs) are faced with the challenge of coping with more and larger operations. Currently appointed Information and Communications Technology (ICT) used for coordination and communication is sometimes outdated and does not scale, while novel technologies have the potential to greatly improve disaster respons… ▽ More

    Submitted 11 May, 2020; originally announced May 2020.

    Journal ref: International Journal of Disaster Risk Reduction, Volume 47, August 2020, 101598

  37. arXiv:2002.00699  [pdf, other

    eess.SP cs.IT

    HydraWave: Multi-Group Multicast Hybrid Precoding and Low-Latency Scheduling for Ubiquitous Industry 4.0 mmWave Communication

    Authors: Luis F. Abanto-Leon, Matthias Hollick, Gek Hong Sim

    Abstract: Industry 4.0 anticipates massive interconnectivity of industrial devices (e.g., sensors, actuators) to support factory automation and production. Due to the rigidity of wired connections to harmonize with automation, wireless information transfer has attracted substantial attention. However, existing solutions for the manufacturing sector face critical issues in coping with the key performance dem… ▽ More

    Submitted 2 September, 2020; v1 submitted 3 February, 2020; originally announced February 2020.

    Comments: IEEE WoWMoM 2020, 10 pages

  38. Zero-Interaction Security -- Towards Sound Experimental Validation

    Authors: Mikhail Fomichev, Max Maass, Matthias Hollick

    Abstract: Reproducibility and realistic datasets are crucial for advancing research. Unfortunately, they are often neglected as valid scientific contributions in many young disciplines, with computer science being no exception. In this article, we show the challenges encountered when reproducing the work of others, collecting realistic data in the wild, and ensuring that our own work is reproducible in turn… ▽ More

    Submitted 18 November, 2019; originally announced November 2019.

    Comments: 6 Pages. Companion article to arXiv:1901.07255 [cs.CR], dataset at https://zenodo.org/record/2537721

    Journal ref: ACM GetMobile, Vol. 23 Issue 2 (June 2019), p. 16-21

  39. arXiv:1909.08094  [pdf, other

    cs.NI

    Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh

    Authors: Flor Álvarez, Lars Almon, Hauke Radtki, Matthias Hollick

    Abstract: Mobile devices have shown to be very useful during and post disaster. If the communication infrastructure breaks down, however, they become almost useless as most services rely on Internet connectivity. Building post-disaster networks based purely on smartphones remains a challenging task, and, as of today, no practical solutions exist. The rapidly growing Internet of Things (IoT) offers the possi… ▽ More

    Submitted 10 September, 2019; originally announced September 2019.

  40. arXiv:1908.02678  [pdf, ps, other

    eess.SP cs.IT

    Hybrid Precoding for Multi-Group Multicasting in mmWave Systems

    Authors: Luis F. Abanto-Leon, Matthias Hollick, Gek Hong, Sim

    Abstract: Multicast beamforming is known to improve spectral efficiency. However, its benefits and challenges for hybrid precoders design in millimeter-wave (mmWave) systems remain understudied. To this end, this paper investigates the first joint design of hybrid transmit precoders (with an arbitrary number of finite-resolution phase shifts) and receive combiners for mmWave multi-group multicasting. Our pr… ▽ More

    Submitted 3 February, 2020; v1 submitted 7 August, 2019; originally announced August 2019.

    Comments: IEEE GLOBECOM 2019, pp. 1-7

  41. arXiv:1907.13085  [pdf, ps, other

    cs.NI

    Joint Relaying and Spatial Sharing Multicast Scheduling for mmWave Networks

    Authors: Gek Hong, Sim, Mahdi Mousavi, Lin Wang, Anja Klein, Matthias Hollick

    Abstract: Millimeter-wave (mmWave) communication plays a vital role to efficiently disseminate large volumes of data in beyond-5G networks. Unfortunately, the directionality of mmWave communication significantly complicates efficient data dissemination, particularly in multicasting, which is gaining more and more importance in emerging applications (e.g., V2X, public safety). While multicasting for systems… ▽ More

    Submitted 30 July, 2019; originally announced July 2019.

    Comments: 11 pages

  42. Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices

    Authors: Jiska Classen, Matthias Hollick

    Abstract: Bluetooth is among the dominant standards for wireless short-range communication with multi-billion Bluetooth devices shipped each year. Basic Bluetooth analysis inside consumer hardware such as smartphones can be accomplished observing the Host Controller Interface (HCI) between the operating system's driver and the Bluetooth chip. However, the HCI does not provide insights to tasks running insid… ▽ More

    Submitted 2 May, 2019; originally announced May 2019.

  43. InternalBlue - Bluetooth Binary Patching and Experimentation Framework

    Authors: Dennis Mantz, Jiska Classen, Matthias Schulz, Matthias Hollick

    Abstract: Bluetooth is one of the most established technologies for short range digital wireless data transmission. With the advent of wearables and the Internet of Things (IoT), Bluetooth has again gained importance, which makes security research and protocol optimizations imperative. Surprisingly, there is a lack of openly available tools and experimental platforms to scrutinize Bluetooth. In particular,… ▽ More

    Submitted 2 May, 2019; originally announced May 2019.

  44. arXiv:1901.07255  [pdf, other

    cs.CR cs.LG

    Perils of Zero-Interaction Security in the Internet of Things

    Authors: Mikhail Fomichev, Max Maass, Lars Almon, Alejandro Molina, Matthias Hollick

    Abstract: The Internet of Things (IoT) demands authentication systems which can provide both security and usability. Recent research utilizes the rich sensing capabilities of smart devices to build security schemes operating without human interaction, such as zero-interaction pairing (ZIP) and zero-interaction authentication (ZIA). Prior work proposed a number of ZIP and ZIA schemes and reported promising r… ▽ More

    Submitted 22 February, 2019; v1 submitted 22 January, 2019; originally announced January 2019.

    Comments: Source code and data available at https://zenodo.org/record/2537721

    Journal ref: Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., Vol. 3, No. 1, Article 10, March 2019

  45. Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link

    Authors: Milan Stute, David Kreitschmann, Matthias Hollick

    Abstract: Apple Wireless Direct Link (AWDL) is a proprietary and undocumented wireless ad hoc protocol that Apple introduced around 2014 and which is the base for applications such as AirDrop and AirPlay. We have reverse engineered the protocol and explain its frame format and operation in our MobiCom '18 paper "One Billion Apples' Secret Sauce: Recipe of the Apple Wireless Direct Link Ad hoc Protocol." AWD… ▽ More

    Submitted 17 December, 2018; originally announced December 2018.

    Comments: The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18)

  46. arXiv:1811.12775  [pdf

    cs.CR cs.CY

    On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market

    Authors: Max Maass, Nicolas Walter, Dominik Herrmann, Matthias Hollick

    Abstract: Today, online privacy is the domain of regulatory measures and privacy-enhancing technologies. Transparency in the form of external and public assessments has been proposed for improving privacy and security because it exposes otherwise hidden deficiencies. Previous work has studied privacy attitudes and behavior of consumers. However, little is known on how organizations react to measures that em… ▽ More

    Submitted 22 February, 2019; v1 submitted 30 November, 2018; originally announced November 2018.

    Comments: Accepted to Wirtschaftsinformatik 2019

  47. Conducting a Large-scale Field Test of a Smartphone-based Communication Network for Emergency Response

    Authors: Flor Álvarez, Lars Almon, Patrick Lieser, Tobias Meuser, Yannick Dylla, Björn Richerzhagen, Matthias Hollick, Ralf Steinmetz

    Abstract: Smartphone-based communication networks form a basis for services in emergency response scenarios, where communication infrastructure is impaired or overloaded. Still, their design and evaluation are largely based on simulations that rely on generic mobility models and weak assumptions regarding user behavior. For a realistic assessment, scenario-specific models are essential. To this end, we cond… ▽ More

    Submitted 14 August, 2018; originally announced August 2018.

  48. Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises

    Authors: Flor Álvarez, Paul Gardner-Stephen, Matthias Hollick

    Abstract: Communications play a vital role in the response to disasters and crises. However, existing communications infrastructure is often impaired, destroyed or overwhelmed during such events. This leads to the use of substitute communications solutions including analog two-way radio or unsecured internet access. Often provided by unknown third parties, these solutions may have less sophisticated securit… ▽ More

    Submitted 14 August, 2018; originally announced August 2018.

  49. arXiv:1808.04671  [pdf, other

    cs.NI cs.CR cs.SI

    Sea of Lights: Practical Device-to-Device Security Bootstrapping in the Dark

    Authors: Flor Álvarez, Max Kolhagen, Matthias Hollick

    Abstract: Practical solutions to bootstrap security in today's information and communication systems critically depend on centralized services for authentication as well as key and trust management. This is particularly true for mobile users. Identity providers such as Google or Facebook have active user bases of two billion each, and the subscriber number of mobile operators exceeds five billion unique use… ▽ More

    Submitted 10 September, 2019; v1 submitted 14 August, 2018; originally announced August 2018.

  50. ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control

    Authors: Santiago Aragon, Marco Tiloca, Max Maass, Matthias Hollick, Shahid Raza

    Abstract: The Authentication and Authorization for Constrained Environments (ACE) framework provides fine-grained access control in the Internet of Things, where devices are resource-constrained and with limited connectivity. The ACE framework defines separate profiles to specify how exactly entities interact and what security and communication protocols to use. This paper presents the novel ACE IPsec profi… ▽ More

    Submitted 14 August, 2018; originally announced August 2018.

    Journal ref: 2018 IEEE Conference on Communications and Network Security (CNS), Beijing, China, 2018, pp. 1-9