Skip to main content
Log in

Cybersicherheit beyond 2020!

Herausforderungen für die IT-Sicherheitsforschung

  • HAUPTBEITRAG
  • CYBERSICHERHEIT BEYOND 2020!
  • Published:
Informatik-Spektrum Aims and scope

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Angermeier D, Eichler J (2016) Risk-driven security engineering in the automotive domain. Embedded Security in Cars (escar USA)

  2. Backes M, Buxmann P, Eckert C, Holz T, Müller-Quade J, Raabe O, Waidner M (2016) Key Challenges in IT Security Research, Discussion Paper for the Dialogue on IT Security 2016. SecUnity. https://it-security-map.eu

  3. Beyerer J, Eckert C, Martini P, Waidner M (2014) Strategie- und Positionspapier Cyber-Sicherheit 2020, Herausforderungen für die IT-Sicherheitsforschung. Fraunhofer-Gesellschaft. https://www.aisec.fraunhofer.de/content/dam/aisec/Dokumente/Publikationen/Studien_TechReports/Fraunhofer-Strategie-und_Positionspapier_Cyber-Sicherheit2020.pdf

  4. Eckert C (2014) IT-Sicherheit: Konzepte – Verfahren – Protokolle, 9. Aufl. De Gruyter

  5. Eckert C (2017) Cyber-Sicherheit in der Industrie 4.0. In: Reinhart G (Hrsg) Handbuch Industrie 4.0: Geschäftsmodelle, Prozesse, Technik. Carl-Hanser Verlag (im Druck)

  6. Eckert C, Fallenbeck N (2015) Industrie 4.0 meets IT-Sicherheit: eine Herausforderung! Informatik-Spektrum

  7. Huber M, Horsch J, Velten M, Weiß M, Wessel S (2015) A Secure Architecture for Operating System-Level Virtualization on Mobile Devices. In: 11th International Conference on Information Security and Cryptology Inscrypt 2015.

  8. Ibing A (2016) Dynamic Symbolic Execution with Interpolation Based Path Merging. In: Int Conf Advances and Trends in Software Engineering.

  9. Kolosnjaji B, Zarras A, Lengyel T, Webster G, Eckert C (2016) Adaptive Semantics-Aware Malware Classification. In: 13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment.

  10. Lengyel T, Kittel T, Eckert C (2015) Virtual Machine Introspection with Xen on ARM. In: 2nd Workshop on Security in Highly Connected IT Systems (SHCIS).

  11. Leukert B, Kubach T, Eckert C et al. IoT 2020: Smart and Secure IoT Platform. http://www.iec.ch/whitepaper/pdf/iecWP-loT2020-LR.pdf

  12. Merli D, Sigl G, Eckert C (2013) Identities for embedded systems enabled by physical unclonable functions. Number Theory Cryptogr 8260:125–138

    MATH  Google Scholar 

  13. Muntean P, Adnan R, Ibing A, Eckert C (2015) Automated Detection of Information Flow Vulnerabilities in UML State Charts and C Code. In: International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE Computer Society, Vancouver, Canada

  14. Otto B et al. Industrial Data Space. Whitepaper. https://www.fraunhofer.de/de/forschung/fraunhofer-initiativen/industrial-data-space.htm

  15. Pfoh J (2013) Leveraging Derivative Virtual Machine Introspection Methods for Security Applications. Doctoral Thesis, Technische Universität München

  16. Schimmel O, Hennig M (2014) Kopier- und Manipulationsschutz für eingebettete Systeme. Datenschutz Datensicherheit – DuD 38(11):742–746

    Article  Google Scholar 

  17. Schütte J, Brost G (2016) A Data Usage Control System Using Dynamic Taint Tracking. In: Proceedings of the International Conference on Advanced Information Network and Applications (AINA).

  18. Teichmann C, Renatus S, Eichler J (2016) Agile threat assessment and mitigation: an approach for method selection and tailoring. Int J Sec Software Eng (IJSSE) 7(1)

  19. Titze D, Stephanow P, Schütte J (2014) App-Ray: User-Driven and Fully Automated Android App Security Assessment. Fraunhofer AISEC TechReport

  20. Xiao H, Eckert C (2013) Indicative Support Vector Clustering with Its Application on Anomaly Detection. In: IEEE 12th International Conference on Machine Learning and Applications.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Claudia Eckert.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Eckert, C. Cybersicherheit beyond 2020!. Informatik Spektrum 40, 141–146 (2017). https://doi.org/10.1007/s00287-017-1025-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00287-017-1025-6

Navigation