Refine
Year of publication
- 2016 (63) (remove)
Document Type
- Article (unreviewed) (30)
- Part of a Book (12)
- Conference Proceeding (10)
- Book (4)
- Other (4)
- Article (reviewed) (1)
- Periodical Part (1)
- Report (1)
Conference Type
- Konferenzartikel (10)
- Sonstiges (2)
Has Fulltext
- no (63) (remove)
Is part of the Bibliography
- yes (63)
Keywords
- Digitalisierung (5)
- Bildung (4)
- Schule (3)
- Klang (2)
- Management (2)
- Medienkompetenz (2)
- Social Media (2)
- Urheberrecht (2)
- Virtuelle Realität (2)
- Algorithmus (1)
- Antrieb <Technik> (1)
- Arbeitstag (1)
- Baden-Württemberg (1)
- Bildnis (1)
- Cloud Computing (1)
- Computersimulation (1)
- Controlling (1)
- Datenschutz (1)
- Datensicherung (1)
- Design (1)
- E-Learning (1)
- Einkauf (1)
- Evidenz (1)
- Faseroptik (1)
- Funktechnik (1)
- Fußball (1)
- Gamification (1)
- Ganztagsschule (1)
- Geografie (1)
- Gestaltung (1)
- Gesundheitswesen (1)
- Gut <Landwirtschaft> (1)
- Hyperlink (1)
- Hören (1)
- Impressum (1)
- Industrie 4.0 (1)
- Intelligenz (1)
- Internet (1)
- Journalismus (1)
- Kommunikation (1)
- Korruption (1)
- Krisenmanagement (1)
- Kryptographie (1)
- Leap Motion Controller (1)
- Lehre (1)
- Licht (1)
- Lokalisation (1)
- Markenführung (1)
- Marketing (1)
- Maschinenbau (1)
- Medien (1)
- Mehrwert (1)
- Mensa (1)
- Mensch (1)
- Musik (1)
- Objektverfolgung (1)
- Optik (1)
- Parasit (1)
- Partei (1)
- Phontonik (1)
- Produktion (1)
- Prüfung (1)
- Pädagogik (1)
- Raum (1)
- Rechtsberatung (1)
- Rezension (1)
- Schulverpflegung (1)
- Schweigepflicht (1)
- Sensortechnik (1)
- Simulation (1)
- Software (1)
- Sportökonomie (1)
- Technisierung (1)
- Textmining (1)
- Veranstaltung (1)
- Verlagsrecht (1)
- Vertrag (1)
- Verwertung (1)
- Virtualisierung (1)
- Visualisierung (1)
- Widerruf (1)
- Widerrufsrecht (1)
- Wirtschaft (1)
- Zweiseitiger Markt (1)
- eingebettetes Gerät (1)
- softwaregenerierter Code (1)
Institute
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (63) (remove)
Open Access
- Open Access (11)
- Closed Access (5)
- Closed (1)
Covert channels have been known for a long time because of their versatile forms of appearance. For nearly every technical improvement or change in technology, such channels have been (re-)created or known methods have been adapted. For example, the introduction of hyperthreading technology has introduced new possibilities for covert communication between malicious processes because they can now share the arithmetic logical unit as well as the L1 and L2 caches, which enable establishing multiple covert channels. Even virtualization, which is known for its isolation of multiple machines, is prone to covert- and side-channel attacks because of the sharing of resources. Therefore, it is not surprising that cloud computing is not immune to this kind of attacks. Moreover, cloud computing with multiple, possibly competing users or customers using the same shared resources may elevate the risk of illegitimate communication. In such a setting, the “air gap” between physical servers and networks disappears, and only the means of isolation and virtual separation serve as a barrier between adversary and victim. In the work at hand, we will provide a survey on vulnerable spots that an adversary could exploit trying to exfiltrate private data from target virtual machines through covert channels in a cloud environment. We will evaluate the feasibility of example attacks and point out proposed mitigation solutions in case they exist.
All business is local
(2016)
Journalist
(2016)
The International Year of Light and Light-Based Technologies 2015 (IYL 2015) was celebrated around the world. Worldwide activities were organized to highlight the impact of optics and photonics on life, science, economics, arts and culture, and also in education. With most of our activities at Offenburg University of Applied Sciences (Offenburg/Germany), we reached our own students and the general population of our region: - University for Children: “The Magic of Light“ winter lecture program and “Across the Universe with Relativity and Quantum Theory” summer lecture program - “Students Meet Scientists” - “A Century of General Relativity Theory” lecture program Nevertheless, with some of our activities we also engaged a worldwide audience: - IYL 2015 art poster collection (Magic of Light and No Football, Just Photonics) - Smart Interactive Projection - Twitter Wall - “Invisible Light” - Live broadcasting of the total lunar eclipse - Film Festival Merida Mexico The authors will highlight recent activities at our university dedicated to promote, celebrate, and create a legacy for the IYL 2015.