Refine
Year of publication
- 2015 (234) (remove)
Document Type
- Conference Proceeding (72)
- Article (unreviewed) (52)
- Article (reviewed) (50)
- Part of a Book (29)
- Book (13)
- Patent (10)
- Other (7)
- Report (1)
Conference Type
- Konferenzartikel (61)
- Konferenz-Abstract (7)
- Sonstiges (3)
- Konferenz-Poster (1)
Language
- English (126)
- German (106)
- Other language (1)
- Spanish (1)
Has Fulltext
- no (234) (remove)
Is part of the Bibliography
- yes (234)
Keywords
- Kommunikation (7)
- Ausbildung (6)
- Applikation (5)
- Digitalisierung (5)
- Finite-Elemente-Methode (5)
- Abtragung (4)
- Bildung (4)
- Funktechnik (4)
- Herz (4)
- Physik (4)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (68)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (63)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (58)
- Fakultät Wirtschaft (W) (48)
- INES - Institut für nachhaltige Energiesysteme (20)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (14)
- ACI - Affective and Cognitive Institute (9)
- WLRI - Work-Life Robotics Institute (6)
- IUAS - Institute for Unmanned Aerial Systems (3)
- POIM - Peter Osypka Institute of Medical Engineering (3)
Open Access
- Closed Access (94)
- Open Access (52)
- Bronze (9)
- Closed (1)
- Diamond (1)
Wir brauchen mehr Klarheit
(2015)
Covert and Side-Channels have been known for a long time due to their versatile forms of appearance. For nearly every technical improvement or change in technology, such channels have been (re-)created or known methods have been adapted. For example the introduction of hyperthreading technology has introduced new possibilities for covert communication between malicious processes because they can now share the arithmetic logical unit (ALU) as well as the L1 and L2 cache which enables establishing multiple covert channels. Even virtualization which is known for its isolation of multiple machines is prone to covert and side-channel attacks due to the sharing of resources. Therefore itis not surprising that cloud computing is not immune to this kind of attacks. Even more, cloud computing with multiple, possibly competing users or customers using the same shared resources may elevate the risk of unwanted communication. In such a setting the ”air gap” between physical servers and networks disappears and only the means of isolation and virtual separation serve as a barrier between adversary and victim. In the work at hand we will provide a survey on weak spots an adversary trying to exfiltrate private data from target virtual machines could exploit in a cloud environment. We will evaluate the feasibility of example attacks and point out possible mitigation solutions if they exist.
Eine Mitte November veröffentlichte EU-Richtlinie sieht vor, dass ab 2017 Unternehmen mit durchschnittlich mehr als 500 Mitarbeitern bestimmte Nachhaltigkeitsangaben im Lagebericht veröffentlichen müssen. Auf den ersten Blick scheint hier weiterer administrativer Ballast für die wenigen betroffenen Genossenschaftsbanken zu entstehen. Doch daraus ergeben sich für die Institute auch Chancen. Es lohnt sich zu prüfen, ob ein aktives Nachhaltigkeitsmanagement sinnvoll erscheint.