Skip to main content

DSI Publications

Other

The public sector's weak digital strategy is threatening society: How can this be changed?

Data Protection Magazine
Martin Schallbruch (2019)
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
Digital strategy, government reform, digital law, digital infrastrucure
Digital innovation can be extremely beneficial to citizens. However, current digital strategies of governments are not strong enough to ensure that digital innovation is not a threat to society – but, only a benefit. Digital innovation will only be effective if governments adopt strong digital strategies. Key issues are a less-specific digital regulation, a greater government’s investment in digital infrastructures, a higher flexibility for local governments, and a strengthening of digital policy leadership within governments.
Online article

Alleged voter fraud: The most dangerous lie

Heinrich Boell Foundation
Henning Christian Lahmann (2019)
Keyword(s)
international human rights, right to vote, voter fraud, disinformation, authoritarianism
Argument

The great anti-China tech alliance

Foreign Policy
Andrew Grotto, Martin Schallbruch (2019)
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
China, privacy, cybersecurity, transatlantic relationship
China, Europe, and the United States are competing over whose image will be most reflected in rules and normst hat define digital markets. Regulatory measures such as Europe’s GDPR and China’s Cybersecurity Law combine privacy, security, and safety regulation. Driving factors are security policy as well as industry and trade policy. With China pulling into the pole position in the digital technology race, it is time for the United States and Europe to forge a digital governance alliance
Conference Proceeding

In­sights into the mind of a tro­jan de­si­gner: The chal­len­ge to in­te­gra­te a tro­jan into the bit­stream

ASPDAC'19 Proceedings
Maik Ender, Pawel Swierczynski, Sebastian Wallat, Matthias Wilhelm, Paul Martin Knopp, Christof Paar (2019)
Subject(s)
Information technology and systems
Keyword(s)
Hardware reverse engineering, malicious design modifications, embedded systems security
The thre­at of in­s­er­ting hard­ware Tro­jans du­ring the de­sign, pro­duc­tion, or in-field poses a dan­ger for in­te­gra­ted cir­cuits in re­al-world ap­p­li­ca­ti­ons. A par­ti­cu­lar cri­ti­cal case of hard­ware Tro­jans is the ma­li­cious ma­ni­pu­la­ti­on of third-par­ty FPGA con­fi­gu­ra­ti­ons. In ad­di­ti­on to at­tack vec­tors du­ring the de­sign pro­cess, FPGAs can be in­fil­tra­ted in a non-in­va­si­ve man­ner after ship­ment through al­te­ra­ti­ons of the bit­stream. First, we pre­sent an im­pro­ved me­tho­do­lo­gy for bit­stream file for­mat re­ver­sing. Se­cond, we in­tro­du­ce a novel idea for Tro­jan in­s­er­ti­on.
Journal Pages
112–119
Conference Proceeding

Attack simulation for a realistic evaluation and comparison of network security techniques

In Secure IT systems, 1st ed., 11252 vols. 236–254. Olso, Norway: Springer International Publishing.
23rd Nordic Conference, NordSec 2018, Oslo, Norway, Proceedings
2018 Other
Alexander Bajic, Georg T. Becker (2018)
Subject(s)
Information technology and systems
Keyword(s)
Moving target defense, attack simulation, attack graphs, network modeling
Secondary Title
Secure IT systems
Edition
1st ed.,
Pages
236–254
Book Review

IT-Sicherheitsrecht [IT-security law]

Review of Buchbesprechungen. Paul Voigt, IT-Sicherheitsrecht, Cologne: Computer und Recht
Martin Schallbruch (2018)
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
Cybersecurity, information security
Book review of Paul Voigt, “IT-Sicherheitsrecht”, (IT security law), 2018
Secondary Title
Buchbesprechungen. Paul Voigt, IT-Sicherheitsrecht
Journal Pages
r81–r81
Conference Proceeding

The governance of safety and security risks in connected healthcare

IET Conference & Seminar Publications CP740
Subject(s)
Health and environment; Information technology and systems
Keyword(s)
Medical devices, e-health, IoT, governance, cybersecurity, safety
Conference Proceeding

A fair and comprehensive large-scale analysis of oscillation-based PUFs for FPGAs

27th International Conference on Field Programmable Logic and Applications (FPL)
Alexander Wild, Georg T. Becker, Tim Gü­ney­su (2017)
Subject(s)
Technology, R&D management
Keyword(s)
Physical Unclonable Function (PUF), ring oscillator PUF, TERO PUF, loop PUF, Field Programmable Gate Array (FPGA)
Magazine article

On cyber attacks and the accidental war

Forbes India
Subject(s)
Technology, R&D management
Keyword(s)
cyber attacks, Internet, crime
Op-Ed

IT-Sicherheit: Bundestag verabschiedet NIS-Umsetzungsgesetz

CRonline
Martin Schallbruch (2017)
Subject(s)
Technology, R&D management