Match!
Marcus Völp
University of Luxembourg
Scheduling (computing)Distributed computingComputer scienceReal-time computingTheoretical computer science
66Publications
11H-index
572Citations
What is this?
Publications 59
Newest
#1Inês Pinto Gouveia (University of Luxembourg)
#2Marcus Völp (University of Luxembourg)H-Index: 11
Last. Paulo Esteves-Verissimo (University of Luxembourg)H-Index: 4
view all 3 authors...
Today, leveraging the enormous modular power, diversity and flexibility of manycore systems-on-a-chip (SoCs) requires careful orchestration of complex resources, a task left to low-level software, e.g. hypervisors. In current architectures, this software forms a single point of failure and worthwhile target for attacks: once compromised, adversaries gain access to all information and full control over the platform and the environment it controls. This paper proposes Midir, an enhanced manycore a...
#1Paulo Esteves-Verissimo (University of Luxembourg)H-Index: 4
#2Jeremie Decouchant (University of Luxembourg)H-Index: 4
Last. Rafal Graczyk (University of Luxembourg)
view all 5 authors...
Contact tracing is an important instrument for national health services to fight epidemics. As part of the COVID-19 situation, many proposals have been made for scaling up contract tracing capacities with the help of smartphone applications, an important but highly critical endeavor due to the privacy risks involved in such solutions. Extending our previously expressed concern, we clearly articulate in this article, the functional and non-functional requirements that any solution has to meet, wh...
#1Maria Fernandes (University of Luxembourg)H-Index: 1
#2Jeremie Decouchant (University of Luxembourg)H-Index: 4
Last. Paulo Veríssimo (University of Luxembourg)H-Index: 38
view all 5 authors...
Source
#1Andrew PaverdH-Index: 9
#2Marcus VölpH-Index: 11
view all 9 authors...
A significant proportion of today’s information and communication technology (ICT) systems are entrusted with high value assets, and our modern society has become increasingly dependent on these systems operating safely and securely over their anticipated lifetimes. However, we observe a mismatch between the lifetimes expected from ICT-supported systems (such as autonomous cars) and the duration for which these systems are able to remain safe and secure, given the spectrum of threats they face. ...
Source
#1Andrew Paverd (Microsoft)H-Index: 9
#2Marcus Völp (University of Luxembourg)H-Index: 11
Last. Thorsten Holz (RUB: Ruhr University Bochum)
view all 9 authors...
#1Andrew PaverdH-Index: 9
#2Marcus VölpH-Index: 11
view all 9 authors...
#1Christoph Lambert (University of Luxembourg)H-Index: 1
#2Marcus Völp (University of Luxembourg)H-Index: 11
Last. Paulo Esteves-Verissimo (University of Luxembourg)H-Index: 4
view all 4 authors...
Technologies such as Industry 4.0 or assisted/autonomous driving are relying on highly customized cyber-physical realtime systems. Those systems are designed to match functional safety regulations and requirements such as EN ISO 13849, EN IEC 62061 or ISO 26262. However, as systems – especially vehicles – are becoming more connected and autonomous, they become more likely to suffer from new attack vectors. New features may meet the corresponding safety requirements but they do not consider adver...
Source
#1Kristin Krüger (TUK: Kaiserslautern University of Technology)H-Index: 2
#2Gerhard Fohler (TUK: Kaiserslautern University of Technology)H-Index: 23
Last. Paulo Esteves-Verissimo (University of Luxembourg)H-Index: 4
view all 4 authors...
Time-triggered real-time systems achieve deterministic behaviour, making them suitable for safety-critical environments. However, this determinism also allows attackers to finetune attacks after studying the system behaviour through side channels, targeting safety-critical victim tasks. Assuming fault independence, replication tolerates both random and malicious faults of up to f replicas. Yet, directed attacks violate the fault independence assumption. This violation possibly gives attackers th...
Source
#1Jeronimo CastrillonH-Index: 10
#2Matthias LieberH-Index: 8
Last. Sascha WunderlichH-Index: 5
view all 33 authors...
Plenty of novel emerging technologies are being proposed and evaluated today, mostly at the device and circuit levels. It is unclear what the impact of different new technologies at the system level will be. What is clear, however, is that new technologies will make their way into systems and will increase the already high complexity of heterogeneous parallel computing platforms, making it ever so difficult to program them. This paper discusses a programming stack for heterogeneous systems that ...
3 CitationsSource
#1Jeremie Decouchant (University of Luxembourg)H-Index: 4
#2Maria Fernandes (University of Luxembourg)H-Index: 1
Last. Paulo Esteves-Verissimo (University of Luxembourg)H-Index: 4
view all 5 authors...
Abstract Sequencing thousands of human genomes has enabled breakthroughs in many areas, among them precision medicine, the study of rare diseases, and forensics. However, mass collection of such sensitive data entails enormous risks if not protected to the highest standards. In this article, we follow the position and argue that post-alignment privacy is not enough and that data should be automatically protected as early as possible in the genomics workflow, ideally immediately after the data is...
2 CitationsSource
123456