Search Results - "Wasicek, Armin"

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Summary of DNS Over HTTPS Abuse by Hynek, Karel, Vekshin, Dmitrii, Luxemburk, Jan, Cejka, Tomas, Wasicek, Armin

    Published in IEEE access (2022)
    “…The Internet Engineering Task Force adopted the DNS over HTTPS protocol in 2018 to remediate privacy issues regarding the plain text transmission of the DNS…”
    Get full text
    Journal Article
  2. 2

    Aspect-oriented modeling of attacks in automotive Cyber-Physical Systems by Wasicek, Armin, Derler, Patricia, Lee, Edward A.

    “…This paper introduces aspect-oriented modeling (AOM) as a powerful, model-based design technique to assess the security of Cyber-Physical Systems (CPS)…”
    Get full text
    Conference Proceeding
  3. 3

    A Vision of Swarmlets by Latronico, Elizabeth, Lee, Edward A., Lohstroh, Marten, Shaver, Chris, Wasicek, Armin, Weber, Matthew

    Published in IEEE internet computing (01-03-2015)
    “…Swarmlets are applications and services that leverage networked sensors and actuators with cloud services and mobile devices. This article offers a way to…”
    Get full text
    Journal Article
  4. 4

    Secure channels in an integrated MPSoC architecture by Isakovic, Haris, Wasicek, Armin

    “…Providing security in an embedded system often boils down to solving a trade-off problem between security and performance. Simultaneously, Multi-Processor…”
    Get full text
    Conference Proceeding
  5. 5

    Copy protection for automotive electronic control units using authenticity heartbeat signals by Wasicek, A.

    “…Protection of intellectual property rights is a vital aspect for the future automotive supplier market, in particular for the aftersales market for ECUs…”
    Get full text
    Conference Proceeding
  6. 6

    Invited: Actors Revisited for Time-Critical Systems by Lohstroh, Marten, Schoeberl, Martin, Goens, Andres, Wasicek, Armin, Gill, Christopher, Sirjani, Marjan, Lee, Edward A.

    “…Programming time-critical systems is notoriously difficult. In this paper we propose an actor-oriented programming model with a semantic notion of time and a…”
    Get full text
    Conference Proceeding
  7. 7

    The ACROSS MPSoC – A new generation of multi-core processors designed for safety–critical embedded systems by El Salloum, Christian, Elshuber, Martin, Höftberger, Oliver, Isakovic, Haris, Wasicek, Armin

    Published in Microprocessors and microsystems (01-11-2013)
    “…The European ARTEMIS ACROSS project aims to overcome the limitations of existing Multi-Processor Systems-on-a-Chip (MPSoC) architectures with respect to…”
    Get full text
    Journal Article
  8. 8

    A System-on-a-Chip Platform for Mixed-Criticality Applications by Wasicek, Armin, El-Salloum, Christian, Kopetz, Hermann

    “…High-integrity systems are deployed in order to realize safety-critical applications. To meet the rigorous requirements in this domain, these systems require a…”
    Get full text
    Conference Proceeding
  9. 9

    Virtual CAN Lines in an Integrated MPSoC Architecture by Wasicek, Armin, Hoftberger, Oliver, Elshuber, Martin, Isakovic, Haris, Fleck, Andreas

    “…The standard solution for automotive control networks is the Control Area Network (CAN) bus. Almost any vehicular computer system comprehends at least one CAN…”
    Get full text
    Conference Proceeding
  10. 10

    System simulation from operational data by Wasicek, Armin, Lee, Edward A., Hokeun Kim, Greenberg, Lev, Iwai, Akihito, Akkaya, Ilge

    “…System simulation is a valuable tool to unveil inefficiencies and to test new strategies when implementing and revising systems. Often, simulations are…”
    Get full text
    Conference Proceeding
  11. 11

    Authentication in Time-Triggered Systems Using Time-Delayed Release of Keys by Wasicek, A, El-Salloum, C, Kopetz, H

    “…This paper investigates on the security of time -- triggered transmission channels, which are used to establish a predictable and timely message transfer in a…”
    Get full text
    Conference Proceeding
  12. 12

    Large Scale Measurement on the Adoption of Encrypted DNS by García, Sebastián, Hynek, Karel, Vekshin, Dmtrii, Čejka, Tomáš, Wasicek, Armin

    Published 09-07-2021
    “…Several encryption proposals for DNS have been presented since 2016, but their adoption was not comprehensively studied yet. This research measured the current…”
    Get full text
    Journal Article
  13. 13

    A simulation framework for IEEE 1588 by Wallner, Wolfgang, Wasicek, Armin, Grosu, Radu

    “…IEEE 1588 specifies the Precision Time Protocol (PTP). The design space for PTP implementations is large, and system designers have to make trade-offs. A…”
    Get full text
    Conference Proceeding
  14. 14

    A Secure Network Architecture for the Internet of Things Based on Local Authorization Entities by Hokeun Kim, Wasicek, Armin, Mehne, Benjamin, Lee, Edward A.

    “…Security is essential to enable the Internet of Things (IoT). Key security measures that work well on the traditional Internet, however, do not necessarily…”
    Get full text
    Conference Proceeding
  15. 15

    Internet Firewalls in the DECOS System-on-a-Chip Architecture by Wasicek, A., Elmenreich, W.

    “…A big part of requests in today's Internet are malicious connection attempts aimed at compromising hosts in order to gain illegal access. Intrusion tools…”
    Get full text
    Conference Proceeding
  16. 16

    The ACROSS MPSoC -- A New Generation of Multi-core Processors Designed for Safety-Critical Embedded Systems by Salloum, C. E., Elshuber, M., Hoftberger, O., Isakovic, H., Wasicek, A.

    “…The European ARTEMIS ACROSS project aims to overcome the limitations of existing Multi-Processor System-on-a-Chip (MPSoC) architectures with respect to…”
    Get full text
    Conference Proceeding
  17. 17

    Enhancing security in CAN systems using a star coupling router by Kammerer, Roland, Fromel, B., Wasicek, A.

    “…Controller Area Network (CAN) is the most widely used protocol in the automotive domain. Bus-based CAN does not provide any security mechanisms to counter…”
    Get full text
    Conference Proceeding