Skip to main content

Publication records

Online article

Cyberattacks against hospitals during a pandemic and the case for an emergency regime for cyberspace

fifteeneightyfour
Henning Christian Lahmann (2020)
Subject(s)
Health and environment; Information technology and systems
Keyword(s)
COVID-19, pandemic, cyberattacks, necessity, attribution, rule of law, international law, hospitals
Conference Proceeding

Breaking the lightweight secure PUF: Understanding the relation of input transformations and machine learning resistance

Lecture Notes in Computer Science (LNCS) 11833: 40–54
Nils Wisiol, Georg T. Becker, Marian Margraf, Tudor A. A. Soroceanu, Johannes Tobisch, Benjamin Zengin (2020)
Subject(s)
Information technology and systems
Keyword(s)
Applications, Physically Unclonable Function, machine learning, modelling attack
Physical Unclonable Functions (PUFs) and, in particular, XOR Arbiter PUFs have gained much research interest as an authentication mechanism for embedded systems. One of the biggest problems of (strong) PUFs is their vulnerability to so called machine learning attacks. In this paper we take a closer look at one aspect of machine learning attacks that has not yet gained the needed attention: the generation of the sub-challenges in XOR Arbiter PUFs fed to the individual Arbiter PUFs. Specifically, we look at one of the most popular ways to generate sub-challenges based on a combination of permutations and XORs as it has been described for the "Lightweight Secure PUF". Previous research suggested that using such a sub-challenge generation increases the machine learning resistance significantly.
Our contribution in the field of sub-challenge generation is three-fold: First, drastically improving attack results by Rührmair et al., we describe a novel attack that can break the Lightweight Secure PUF in time roughly equivalent to an XOR Arbiter PUF without transformation of the challenge input. Second, we give a mathematical model that gives insight into the weakness of the Lightweight Secure PUF and provides a way to study generation of sub-challenges in general. Third, we propose a new, efficient, and cost-effective way for sub-challenge generation that mitigates the attack strategy we used and outperforms the Lightweight Secure PUF in both machine learning resistance and resource overhead.
Volume
11833
ISBN
978-3-030-42068-0
Journal Pages
40–54
Online article

In hiring, the less you know, the more you'll grow

Forbes
Subject(s)
Strategy and general management; Technology, R&D management
Keyword(s)
Learning-by-hiring, inter-firm mobility, innovation, patents
ISSN (Print)
0015-6914
Expert testimony paper

Stellungnahme: Anhörung im Deutschen Bundestag, Ausschuss Digitale Agenda, Anhörung "IT-Sicherheit von Hard- und Software als Voraussetzung für Digitale Souveränit" am 11.12.2019 [Testimony: Hearing in the German Bundestag, Digital Agenda Committee, hearing "IT security of hardware and software as a prerequisite for digital sovereignty" on 11.12.2019]

German Federal Parliament No. 19(23)080 (Digital Agenda Committee Paper)
Subject(s)
Economics, politics and business environment; Information technology and systems; Technology, R&D management
Keyword(s)
IT-Security, Digital Sovereignty, Industrial policy
The public hearing of the Digital Agenda Committee on the topic of "IT security of hardware and software as a precondition for digital sovereignty" on Wednesday, December 11, 2019, analyzed how citizens, companies, but also public administration organizations in Germany are positioned with regard to digital sovereignty . The Committee led by Hansjörg Durz (CDU/CSU) focused primarily on the current state of Germany's IT infrastructure and governance, the need for legislative action, and security gaps.
In her statement, Isabel Skierka gives an assessment of Germany's industrial policy position in the field of digital technologies and the IT security situation and recommendations for strengthening digital sovereignty and IT security at the national and European level.

[Wie die Bürger, Unternehmen, aber auch die Verwaltung in Deutschland hinsichtlich der digitalen Souveränität aufgestellt sind, dazu gaben die Sachverständigen bei einer öffentlichen Anhörung des Ausschusses Digitale Agenda zum Thema „IT-Sicherheit von Hard- und Software als Voraussetzung für Digitale Souveränität“ am Mittwoch, 11. Dezember 2019, unterschiedliche Einschätzungen ab. Bei der Expertenbefragung unter Leitung von Hansjörg Durz (CDU/CSU) ging es vor allem um den Ist-Zustand der IT-Struktur Deutschlands, gesetzgeberischen Handlungsbedarf und Sicherheitslücken.
In ihrer Stellungnahme gibt Isabel Skierka eine Einsch¨ätzung zur industriepolitischen Stellung Deutschlands im Bereich digitaler Technologien sowie der IT-Sicherheitslage und Empfehlungen für die Stärkung digitaler Souveränität und der IT-Sicherheit auf nationaler und europäischer Ebene.]
Online article

Huge success in business is largely based on luck – new research

The Conversation
Subject(s)
Strategy and general management
Keyword(s)
Luck, music industry, business, success, S&P 500
Online article

Mistake of fact in putative self-defence against cyber attacks

EJIL: Talk! (Blog of the European Journal of International Law)
Henning Christian Lahmann (2020)
Subject(s)
Information technology and systems
Keyword(s)
international law, cybersecurity, cyberattacks, evidence, self-defence, countermeasures, mistake of fact
Magazine article

Strengthen digital strategy in the public sector

Today's General Counsel 16 (4): 36–38
Martin Schallbruch (2019)
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
Cybersecurity, digital strategy
Volume
16
Journal Pages
36–38
Online article

Three lessons leaders can learn from Don Quixote about strategizing

Forbes
Subject(s)
Human resources management/organizational behavior; Strategy and general management
ISSN (Print)
0015-6914
DSI Industrial & Policy Recommendations Series (IPR)

Europas dritter Weg im Cyberraum [Europe's third way in cyberspace]

DSI Industrial & Policy Recommendations Series (IPR)
Annegret Bendiek, Martin Schallbruch (2019)
Subject(s)
Economics, politics and business environment; Information technology and systems; Technology, R&D management
Keyword(s)
cybersecurity, digital sovereignty
Cybersicherheit ist für Europa zu einer Schlüsselfrage der globalen digitalen Transformation geworden. Mit dem Cybersecurity Act, also der Cybersicherheitsverordnung, hat die EU einen rechtlichen Rahmen mit dem Anspruch globaler Ausstrahlung vorgelegt. Eingebettet in eine Politik, die digitale Souveränität mit strategischer Verflechtung kombiniert, kann die Verordnung das Tor zu einem dritten Weg Europas im Cyberraum sein, der zwischen dem US-amerikanischen Modell der Marktfreiheit und dem chinesischen Modell des autori- tären Staatskapitalismus verläuft. Der Cybersecurity Act wird verbindlicher Handlungsrahmen und Rückenwind für die bundesdeutsche Cybersicherheitspolitik sein.
Pages
7
Online article

Dreaming up a world: How luxury brands create desire

Forbes
Hannes Gurzki (2019)
Subject(s)
Marketing
Keyword(s)
Luxury, branding
ISSN (Print)
0015-6914