Match!
Marcus Völp
University of Luxembourg
65Publications
10H-index
459Citations
Publications 65
Newest
Published on Jul 9, 2019
Andrew Paverd8
Estimated H-index: 8
,
Marcus Völp10
Estimated H-index: 10
+ 6 AuthorsThorsten Holz
A significant proportion of today’s information and communication technology (ICT) systems are entrusted with high value assets, and our modern society has become increasingly dependent on these systems operating safely and securely over their anticipated lifetimes. However, we observe a mismatch between the lifetimes expected from ICT-supported systems (such as autonomous cars) and the duration for which these systems are able to remain safe and secure, given the spectrum of threats they face. ...
Published on Oct 1, 2018
Christoph Lambert1
Estimated H-index: 1
(University of Luxembourg),
Marcus Völp10
Estimated H-index: 10
(University of Luxembourg)
+ 1 AuthorsPaulo Esteves-Verissimo3
Estimated H-index: 3
(University of Luxembourg)
Technologies such as Industry 4.0 or assisted/autonomous driving are relying on highly customized cyber-physical realtime systems. Those systems are designed to match functional safety regulations and requirements such as EN ISO 13849, EN IEC 62061 or ISO 26262. However, as systems – especially vehicles – are becoming more connected and autonomous, they become more likely to suffer from new attack vectors. New features may meet the corresponding safety requirements but they do not consider adver...
Published on Aug 1, 2018
Kristin Krüger1
Estimated H-index: 1
(TUK: Kaiserslautern University of Technology),
Gerhard Fohler23
Estimated H-index: 23
(TUK: Kaiserslautern University of Technology)
+ 1 AuthorsPaulo Esteves-Verissimo3
Estimated H-index: 3
(University of Luxembourg)
Time-triggered real-time systems achieve deterministic behaviour, making them suitable for safety-critical environments. However, this determinism also allows attackers to finetune attacks after studying the system behaviour through side channels, targeting safety-critical victim tasks. Assuming fault independence, replication tolerates both random and malicious faults of up to f replicas. Yet, directed attacks violate the fault independence assumption. This violation possibly gives attackers th...
Published on Jul 1, 2018
Jeronimo Castrillon8
Estimated H-index: 8
,
Matthias Lieber7
Estimated H-index: 7
+ 30 AuthorsJochen Fröhlich26
Estimated H-index: 26
Plenty of novel emerging technologies are being proposed and evaluated today, mostly at the device and circuit levels. It is unclear what the impact of different new technologies at the system level will be. What is clear, however, is that new technologies will make their way into systems and will increase the already high complexity of heterogeneous parallel computing platforms, making it ever so difficult to program them. This paper discusses a programming stack for heterogeneous systems that ...
Published on Jun 1, 2018
Kristin Krüger1
Estimated H-index: 1
(TUK: Kaiserslautern University of Technology),
Marcus Völp10
Estimated H-index: 10
(University of Luxembourg),
Gerhard Fohler23
Estimated H-index: 23
(TUK: Kaiserslautern University of Technology)
Published on Jun 1, 2018in Journal of Biomedical Informatics2.95
Jérémie Decouchant3
Estimated H-index: 3
(University of Luxembourg),
Maria Fernandes1
Estimated H-index: 1
(University of Luxembourg)
+ 2 AuthorsPaulo Esteves-Verissimo3
Estimated H-index: 3
(University of Luxembourg)
Abstract Sequencing thousands of human genomes has enabled breakthroughs in many areas, among them precision medicine, the study of rare diseases, and forensics. However, mass collection of such sensitive data entails enormous risks if not protected to the highest standards. In this article, we follow the position and argue that post-alignment privacy is not enough and that data should be automatically protected as early as possible in the genomics workflow, ideally immediately after the data is...
Published on Apr 16, 2018
Vincent Rahli8
Estimated H-index: 8
(University of Luxembourg),
Ivana Vukotic1
Estimated H-index: 1
(University of Luxembourg)
+ 1 AuthorsPaulo Veríssimo39
Estimated H-index: 39
(University of Luxembourg)
Our increasing dependence on complex and critical information infrastructures and the emerging threat of sophisticated attacks, ask for extended efforts to ensure the correctness and security of these systems. Byzantine fault-tolerant state-machine replication (BFT-SMR) provides a way to harden such systems. It ensures that they maintain correctness and availability in an application-agnostic way, provided that the replication protocol is correct and at least \(n-f\) out of n replicas survive ar...
Published on Dec 1, 2017
Martin Küttler1
Estimated H-index: 1
(TUD: Dresden University of Technology),
Michael Roitzsch4
Estimated H-index: 4
(TUD: Dresden University of Technology)
+ 1 AuthorsMarcus Völp10
Estimated H-index: 10
(University of Luxembourg)
Published on Dec 1, 2017
Marcus Völp10
Estimated H-index: 10
(University of Luxembourg),
David Kozhaya1
Estimated H-index: 1
(University of Luxembourg),
Paulo Veríssimo39
Estimated H-index: 39
(University of Luxembourg)
123456