Match!
Markus Happe
ETH Zurich
24Publications
10H-index
270Citations
Publications 24
Newest
#1David Gugelmann (ETH Zurich)H-Index: 4
#2David M. Sommer (ETH Zurich)H-Index: 3
Last.Laurent Vanbever (ETH Zurich)H-Index: 18
view all 5 authors...
Organizations not only need to defend their IT systems against external cyber attackers, but also from malicious insiders, that is, agents who have infiltrated an organization or malicious members stealing information for their own profit. In particular, malicious insiders can leak a document by simply opening it and taking pictures of the document displayed on the computer screen with a digital camera. Using a digital camera allows a perpetrator to easily avoid a log trail that results from usi...
1 CitationsSource
#1Pavlos Lamprakis (ETH Zurich)H-Index: 1
#2Ruggiero Dargenio (ETH Zurich)H-Index: 1
Last.Laurent Vanbever (ETH Zurich)H-Index: 18
view all 6 authors...
HTTP is the main protocol used by attackers to establish a command and control (CC APT malware are often custom-built and used against selected targets only, making it difficult to collect malware artifacts for supervised machine learning and thus rendering supervised approaches ineffective at detecting APT traffic.
2 CitationsSource
#1Markus Happe (ETH Zurich)H-Index: 10
#2Ariane Trammell-Keller (ETH Zurich)H-Index: 1
This chapter presents flexible protocol stacks as a promising alternative to today’s static Internet architecture. Self-aware/expressive network nodes cooperate to select the protocol stacks that fulfil all communication requirements at minimal cost at run-time. Since the network conditions and the internal state of the communication peers change over time, the communication peers can dynamically adapt the flexible protocol stack to add, remove or replace protocols on-the-fly during communicatio...
1 CitationsSource
#1Andreas Agne (University of Paderborn)H-Index: 8
#2Markus Happe (ETH Zurich)H-Index: 10
Last.Marco Platzner (University of Paderborn)H-Index: 25
view all 5 authors...
Many modern compute nodes are heterogeneous multi-cores that integrate several CPU cores with fixed function or reconfigurable hardware cores. Such systems need to adapt task scheduling and mapping to optimise for performance and energy under varying workloads and, increasingly important, for thermal and fault management and are thus relevant targets for self-aware computing. In this chapter, we take up the generic reference architecture for designing self-aware and self-expressive computing sys...
Source
Aug 17, 2015 in SIGCOMM (ACM Special Interest Group on Data Communication)
#1Michael Alan Chang (Princeton University)H-Index: 2
#2Thomas Holterbach (ETH Zurich)H-Index: 3
Last.Laurent Vanbever (ETH Zurich)H-Index: 18
view all 4 authors...
By enabling logically-centralized and direct control of the forwarding behavior of a network, Software-Defined Networking (SDN) holds great promise in terms of improving network management, performance, and costs. Realizing this vision is challenging though as SDN proposals to date require substantial and expensive changes to the existing network architecture before the benefits can be realized. As a result, the number of SDN deployments has been rather limited in scope. To kickstart a wide-scal...
4 CitationsSource
Aug 1, 2015 in IWCMC (International Conference on Wireless Communications and Mobile Computing)
#1David Gugelmann (ETH Zurich)H-Index: 4
#2Bernhard Ager (ETH Zurich)H-Index: 14
Last.Markus Happe (ETH Zurich)H-Index: 10
view all 4 authors...
While downstream Web traffic has been studied in detail, upstream Web traffic has not received much attention yet. We argue that upstream traffic deserves the same or even higher attention since data flows towards Web servers generally entail privacy-relevant user information. Our aim is to understand where to and how much data users send to Web services. To this end, we examine HTTP(S) requests of two 24 hour traces recorded at a gateway of a campus network. As HTTP is highly repetitive, we int...
1 CitationsSource
Jun 1, 2015 in PETS (Privacy Enhancing Technologies)
#1David Gugelmann (ETH Zurich)H-Index: 4
#2Markus Happe (ETH Zurich)H-Index: 10
Last.Vincent Lenders (armasuisse)H-Index: 25
view all 4 authors...
15 CitationsSource
Apr 13, 2015 in ARC (Applied Reconfigurable Computing)
#1Markus Happe (ETH Zurich)H-Index: 10
#2Andreas Traber (ETH Zurich)H-Index: 3
Last.Ariane Keller (ETH Zurich)H-Index: 5
view all 3 authors...
Preemptive hardware multitasking is not supported in most reconfigurable systems-on-chip (rSoCs), which severely limits the scope of hardware scheduling techniques on these platforms. While modern field-programmable gate arrays (FPGAs) support dynamic partial reconfiguration of any region at any time, most hardware tasks cannot be preempted at arbitrary points in time, because context saving and restoring is not supported out of the box by the vendors. Although hardware task preemption technique...
19 CitationsSource
Dec 1, 2014 in ReConFig (Reconfigurable Computing and FPGAs)
#1Markus Happe (ETH Zurich)H-Index: 10
#2Yujiao Huang (ETH Zurich)H-Index: 1
Last.Ariane Keller (ETH Zurich)H-Index: 5
view all 3 authors...
The term Internet of Things is often used to talk about the trend of embedding microprocessors in everyday devices and connecting them to the Internet. The Internet of Things poses challenging communication requirements since the participating devices are heterogeneous, resource-constrained and operate in an ever changing environment. To cope with those requirements, academic research projects have proposed novel network architectures, such as the Dynamic Protocol Stack (DPS) architecture. In th...
7 CitationsSource
#1Andreas Agne (University of Paderborn)H-Index: 8
#2Hendrik Hangmann (University of Paderborn)H-Index: 2
Last.Christian Plessl (University of Paderborn)H-Index: 15
view all 5 authors...
Due to the continuously shrinking device structures and increasing densities of FPGAs, thermal aspects have become the new focus for many research projects over the last years. Most researchers rely on temperature simulations to evaluate their novel thermal management techniques. However, these temperature simulations require a high computational effort if a detailed thermal model is used and their accuracies are often unclear.In contrast to simulations, the use of synthetic heat sources allows ...
9 CitationsSource
123