Hans-Joachim Hof

Hans-Joachim Hof
Technische Hochschule Ingolstadt · Fakultät für Elektrotechnik und Informatik

Prof. Dr.-Ing.
Researching Artificial Intelligence in Automotive Security

About

107
Publications
21,816
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
626
Citations
Citations since 2016
43 Research Items
246 Citations
20162017201820192020202120220102030405060
20162017201820192020202120220102030405060
20162017201820192020202120220102030405060
20162017201820192020202120220102030405060
Additional affiliations
September 2016 - present
Technische Hochschule Ingolstadt
Position
  • Vice President
March 2011 - August 2016
Munich University of Applied Sciences
Position
  • Professor (Full)
January 2008 - February 2011
Siemens
Position
  • Researcher
Education
October 1996 - December 2002
Karlsruhe Institute of Technology
Field of study
  • Computer Science with a focus on networks and security

Publications

Publications (107)
Conference Paper
Full-text available
The European Union's Green Deal and other similar regulations advocate to reuse batteries of electrical vehicles ("second life") to reduce greenhouse gases. To ease the assessment of the best fitting second life applications for a distinctly used battery, product life cycle data plays an important role. A digital battery pass will be mandatory for...
Conference Paper
Tesla vehicles offer a wide range of services, including an autopilot. As a central vehicle component, the autopilot has been the focus of much media and research attention. Several articles have highlighted flaws in the autopilot service. These flaws make the autopilot service relevant for Automotive Digital Forensics (ADF) investigations since v...
Conference Paper
Full-text available
New technologies and features emerging in modern vehicles are widening the attack surface for malicious tampering. As a result, security incidents including vehicles are on the rise. Automotive digital forensics investigations allow resolving such security incidents. This paper presents a stakeholder-based reference model for automotive digital for...
Conference Paper
The collection and analysis of potential evidence in digital forensic investigations is a challenging task that made its arrival in the automotive domain. It is accompanied by increasingly complex in-vehicle components with high diversity in used technologies and a wide range of external interconnections — which raises the question of what sources...
Article
Full-text available
Zusammenfassung Moderne Fahrzeuge verfügen über eine Vielzahl von Sensoren sowohl zur Umfeld- als auch zur Innenraumwahrnehmung. Fahrzeuge kommunizieren mit Cloud-Diensten der Hersteller ebenso wie mit Smartphones der Insassen. Der Artikel zeigt anhand einer fahrzeugforensischen Untersuchung eines Tesla Autopilot-Steuergeräts die Schwierigkeiten be...
Article
In the past years, software became an essential topic in modern vehicles, e.g., with the rise of more and more complex driver assistance systems. The advent of automated driving will drive this trend even further. Today, accident investigation, as well as warranty claim analysis, need to take into consideration an analysis of the rapidly increasing...
Conference Paper
Full-text available
In this paper, we present a framework for model-based security testing. The primary advantage of our framework will be the automation of manual security reviews as well as automation of security tests like penetration testing. The framework can be used to decide on single steps for the test procedure. This paper focuses on the concept of the framew...
Poster
Full-text available
New functions of modern vehicles (e.g., autonomous driving, early airbag ignition) make heavy use of internal and external communication. The increased usage of communication for the realization of safety-critical functions leads to new challenges for security and safety. In order to meet current as well as future requirements regarding the validit...
Conference Paper
Full-text available
Driverless autonomous vehicles pose new challenges for security due to an increased attack surface and the missing "human in the loop". Future driverless autonomous vehicles could, for example, become targets for large-scale malware attacks. Such malware may spreads over V2X communication, infecting a large number of vehicles. Infected driverless a...
Conference Paper
Full-text available
This paper presents an analysis of automotive security based on a reference model for Automotive Cyber Systems (ACS). In IT security, reference models are useful to conduct security analyses for either systems that do not exist yet, or for a number of existing systems that have similar properties. With Automotive Cyber Systems, both cases are prese...
Conference Paper
Full-text available
Botnets are a big hassle for the Internet. A recent attack by the Mirai botnet showed how easy it is to exploit In-ternet of Things devices and use them for malicious activities, e.g., for sending spam or executing Distributed Denial of Service attacks. Hence, increasing protection of Internet of Things (IoT) devices as well as increasing protectio...
Conference Paper
Full-text available
The Internet of Thing (IoT) is the connection of computing devices embedded in everyday devices to enable them to send and retrieve data. To combine the power of connected sensors and actors, IoT platforms are developed to make use of the new data source by analyzing and reporting data streams from all the different devices. IoT platforms have the...
Conference Paper
Full-text available
Nowadays, the Internet of Things (IoT) faces one major enemy: Botnet providers. The Mirai botnet showed that it is quite easy to enslave IoT devices and use them for malicious activities, e.g., for sending spam or executing Distributed Denial of Service campaigns. Currently, defending against big botnets is a huge hassle for everybody using the int...
Conference Paper
Full-text available
Different research work has illustrated that even anonymized databases could be de-anonymized by the right amount of auxiliary information. The objective is to reduce the auxiliary information by increasing the user-awareness about data privacy. Our approach is to visualize how easy it is to create a personality profile with public information on t...
Conference Paper
Full-text available
This paper presents a reference model for automotive cyber systems (ACS). It is the first step towards a security architecture for future ACS. Using a reference model and focus-ing on the whole system instead of separate domains allows for a holistic approach to automotive security. Thereby all interfaces and components are considered and effective...
Conference Paper
Full-text available
The increasing computerization of vehicles and the communication of these with other vehicles and the whole ecosystem allow a myriad of attacks on this so called Automotive Cyber System (ACS). This paper presents a reference model of an ACS as an instrument for a holistic security approach. Thereby not only parts of the system are considered, but t...
Conference Paper
Full-text available
Decisions for automated driving on levels 2 and above rely on accurate information collected by on-board sensors and data received by wireless communication. Based on networking application specific attacker models presented in a previous article, this position paper contributes first steps towards a formal model for evaluating and comparing differ...
Article
Full-text available
In recent time, the standards for Vehicular Ad-hoc Networks (VANETs) and Intelligent Transportation Systems (ITSs) matured and scientific and industry interest is high especially as autonomous driving gets a lot of media attention. Autonomous driving and other assistance systems for cars make heavy use of VANETs to exchange information.They may pro...
Conference Paper
Full-text available
In recent time, the standards for Vehicular Ad-hoc Networks (VANETs) and Intelligent Transportation Systems (ITSs) matured and scientific and industry interest is high especially as autonomous driving gets a lot of media attention. Autonomous driving and other assistance systems for cars make heavy use of VANETs to exchange information.They may pro...
Conference Paper
This poster presents work-in-progress in the field of usable security. The usability of security mechanisms is crucial to avoid unintended misuse of security mechanisms which lowers the security level of a system. It is the goal of the work presented in this poster to identify security design patterns with good usability. Requirements for security...
Conference Paper
Full-text available
Instant messengers are popular communication tools used by many people for everyday communication as well as for work related communication. Following the disclosure of a massive surveillance system by Edward Snowden, many users became aware of the risks of unsecure communication. Users increasingly ask for secure communication. However, unsecure i...
Conference Paper
In recent time, the standards for Vehicular Ad- hoc Networks (VANETs) and Intelligent Transportation Systems (ITSs) matured and scientific and industry interest is high especially as autonomous driving gets a lot of media attention. Autonomous driving and other assistance systems for cars make heavy use of VANETs to exchange information.They may pr...
Conference Paper
Full-text available
In recent time, the standards for Vehicular Ad- hoc Networks (VANETs) and Intelligent Transportation Systems (ITSs) matured and scientific and industry interest is high especially as autonomous driving gets a lot of media attention. Autonomous driving and other assistance systems for cars make heavy use of VANETs to exchange information.They may pr...
Conference Paper
Full-text available
Instant messengers are popular communication tools used by many people for everyday communication as well as for work related communication. Following the disclosure of a massive surveillance system by Edward Snowden, many users became aware of the risks of unsecure communication. Users increasingly ask for secure communication. However, unsecure i...
Poster
Full-text available
This poster presents work-in-progress in the field of usable security. The usability of security mechanisms is crucial to avoid unintended misuse of security mechanisms which lowers the security level of a system. It is the goal of the work presented in this poster to identify security design patterns with good usability. Requirements for security...
Poster
Full-text available
The poster presents privacy problems in Smart Cities resulting from deanonymization of previously anonymized data. The implementation of a so called Privacy Dashboard is a method to allow users to judge on their current privacy risk level.
Poster
Full-text available
The poster presents realistic attacker models for smart cities. Such models are of great use for simulations of smart cities. They can be used to observe the behavior of smart city IT architectures under attacks.
Poster
Full-text available
The poster presents a system to enforce policies on network traffic in smart homes. Traffic policies are based on device classes.
Poster
Full-text available
The poster presents a system to enforce policies on network traffic in smart homes. Traffic policies are based on device classes.
Conference Paper
Digital Transformation is of crucial importance for many enterprises and creates new challenges both on the conceptual and architectural level. Therefore, a new, secure, and layered architecture is introduced that separates the process from the decision model in order to quickly react to changed requirements. It provides flexibility by separating t...
Conference Paper
For information dissemination in highly dynamic vehicular networks, two technological approaches can be considered: Cellular communication standards are continually evolving to incorporate the requirements of vehicular applications. An alternative is ad-hoc communication which is restricted to direct, short range communication between vehicles/road...
Presentation
Full-text available
Aktuelle Umsetzung von SMTP over TLS - Ein Realitätscheck
Presentation
Full-text available
The Internet was scanned for usage of SMTP and TLS. The security of SMTP installations was analyzed.
Article
Recent years saw serious attacks on software, e.g., the Heartbleed attack. Improving software security should be a main concern in all software development projects. Currently, Scrum is a popular agile software development method, used all around companies and universities. However, addressing IT security in Scrum projects is different to tradition...
Article
—Timing attacks are a challenge for current intrusion detection solutions. Timing attacks are dangerous for web applications because they may leak information about side channel vulnerabilities. This paper presents a methodology that is especially good at detecting timing attacks. Unlike current solutions, the proposed Intrusion Detection System us...
Article
Full-text available
CONTENTS pages: 90 - 100 On the Resilience of a QKD Key Synchronization Protocol for IPsec Stefan Marksteiner, JOANNEUM RESEARCH, Austria Benjamin Rainer, University of Klagenfurt, Austria Oliver Maurhart, AIT Austrian Institute of Technology GmbH, Austria pages: 101 - 110 Prospects of Software-Defined Networking in Industrial Operations György Ká...
Book
This volume presents the revised and peer reviewed contributions of the ‘ERP Future 2015’ conference held in Munich, Germany on November 16-17, 2015. The ERP Future 2015 Research conference is a scientific platform for research on enterprise information systems in general and specifically on core topics like business process management (BPM), busin...
Article
Full-text available
Major standardization bodies developed and designed systems that should be used in vehicular ad-hoc networks. The Institute of Electrical and Electronics Engineers (IEEE) in America designed the wireless access in vehicular environments (WAVE) system. The European Telecommunications Standards Institute (ETSI) did come up with the "ITS-G5" system. T...
Conference Paper
Full-text available
Nowadays, the use of agile software development methods like Scrum is common in industry and academia. Considering the current attacking landscape, it is clear that developing secure software should be a main concern in all software development projects. In traditional software projects, security issues require detailed planning in an initial plann...
Conference Paper
Full-text available
Honeypots are used in IT Security to detect and gather information about ongoing intrusions, e.g., by documenting the approach of an attacker. Honeypots do so by presenting an interactive system that seems just like a valid application to an attacker. One of the main design goals of honeypots is to stay unnoticed by attackers as long as possible. T...
Conference Paper
Full-text available
Honeypots are used in IT-Security to detect and gather information about ongoing intrusions, e.g. by documenting the approach of an attacker. Honeypots do so by presenting an interactive system that seems just like a valid application to an attacker. This paper presents a part of APATE, a Linux Kernel Module (LKM) that is able to log, block and man...
Conference Paper
Full-text available
Honeypots are used in IT Security to detect and gather information about ongoing intrusions by presenting an interactive system as attractive target to an attacker. They log all actions of an attacker for further analysis. The longer an attacker interacts with a honeypot, the more valuable information about the attack can be collected. Thus, it sho...
Conference Paper
Full-text available
This paper presents BREW (Breakable Web Application), a tool for teaching IT Security. BREWs main teaching targets are identification and exploitation of vulnerabilities, using technologies and methodologies for software auditing and testing, and bug detection, fixation, and writing of secure code. Main advantages of BREW include that it is easy to...
Article
Full-text available
Information provided by whistleblower Edward Snowden imposingly demonstrated the advanced capabilities of intelligence agencies, especially the National Security Agency (NSA), to monitor Internet usage on a large scale. Huge amounts of data are collected day by day, violating the privacy of millions of people. Public media suggest that IT security...
Patent
In a method for activating a destination network node (SN) to be woken up in a wireless network (1), in particular a sensor network, the destination network node (SN) is woken from a sleep operating mode if the destination network node verifies a received secret wake-up token (WUT) by a predefined test function and at least one stored wake-up token...
Conference Paper
Full-text available
Timing attacks are a challenge for current intrusion detection solutions. Timing attacks are dangerous for web applications because they may leak information about side channel vulnerabilities. This paper presents a massive-multi-sensor zero-configuration Intrusion Detection System that is especially good at detecting timing attacks. Unlike current...
Article
Full-text available
Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system. However, most of these systems have not been designed with focus on good usability for the average end user. Today, the aver...
Conference Paper
Full-text available
Unsolicited email (spam) is still a problem for users of the email service. Even though current email anti-spam solutions filter most spam emails, some spam emails still are delivered to the inbox of users. A special class of spam emails advertises websites, e.g., online dating sites or online pharmacies. The success rate of this kind of advertisem...
Conference Paper
Full-text available
Abstract: Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system. However, most of these systems have not been designed with focus on good usability for the average end user. Today...
Conference Paper
Full-text available
With the advent of the smart energy grid - an energy transportation and distribution network being combined with an IT network for its monitoring and control - information security has gained tremendous importance for energy distribution and energy automa- tion systems. Integrated security functionality is crucial to ensure a reliable and continuou...
Article
Full-text available
Using communication services is a common part of everyday life in a personal or business context. Communication services include Internet services like voice services, chat service, and web 2.0 technologies (wikis, blogs, etc), but other usage areas like home energy management and eMobility are will be increasingly tackled. Such communication servi...
Article
Full-text available
The industrial application of wireless sensor-actuator networks is attractive due to their flexibility, saving potential and ease of use. However, weak or missing security would restrain the acceptance and hinder a wide-spread use. This paper presents a security design for wireless sensor-actuator networks in industrial settings. The security desig...
Conference Paper
Full-text available
Today's Smart Grid initiatives propose highly decentralized power supplies with an increased number of providers utilizing renewable energy resources. This idea is driven by the imminent requirement for improved sustainability of power industries and also by the legislative demand for more competitive energy market structures. Due to these intentio...
Conference Paper
Full-text available
Using communication services like voice services, chat services and web 2.0 technologies (wikis, blogs, etc) are a common part of everyday life in a personal or business context. These communication services typically authenticate participants. Identities identify the communication peer to users of the service or to the service itself. Calling line...
Article
Full-text available
Wireless sensor-actuator networks have a big usage potential in numerous industrial use cases. They allow easy and flexible deployment of nodes for monitoring and controlling various industrial applications as for example the supervision of critical infrastructures or monitoring and control in factory and process automation. However, missing or wea...
Conference Paper
Full-text available
Information security has gained tremendous importance for energy distribution and energy automation systems over the last years. Standards like IEC61850 offer standardized communication services and standardized data models for communication in energy automation. IEC 61850 is flanked by the standard IEC 62351 that especially addresses security and...
Article
Full-text available
Information security has gained tremendous importance for energy distribution and energy automation systems over the last years. Security for the smart grid is crucial to ensure reliability and continuous operation of the smart grid. However, the smart grid comes along with new use cases that impose new challenges on existing standards like IEC6185...
Article
Full-text available
Purpose – Secure communication is very important for computer networks. Thereby, authentication is one of the most eminent preconditions. In ad hoc networks, common authentication schemes are not applicable since public key infrastructures with a centralized certification authority are hard to deploy in ad hoc networking environments. This paper ai...
Conference Paper
Full-text available
Sleep deprivation attacks are still an unsolved but critical problem in sensor networks. They aim on quickly exhausting energy reserves of battery powered sensor nodes by continuously sending messages to the node, preventing the attacked node to switch to an energy saving sleep state. Sleep deprivation attacks come also in the form of sending traff...
Conference Paper
Full-text available
Fundamental differences exist between academic research on wireless sensor networks and industrial wireless sensor networks as envisaged by the BMBF-funded project ZESAN. Their requirements and underlying assumptions are described to bridge the gap between research and industrial application.
Conference Paper
Full-text available
Sensornetze sind Netze, die aus vielen preisgünstigen Kleinstcomputern, so genannten Sensorknoten, bestehen. Die Sensorknoten kommunizieren dabei drahtlos miteinander. Sensornetze zeichnen sind dadurch aus, dass sie meist ohne eine Infrastruktur auskommen und dezentral und selbstorganisierend arbeiten. Durch die preisgüns-tigen, kleinen Sensorknote...
Conference Paper
Full-text available
In many scenarios, self-organization is the driving force for the use of a peer-to-peer (p2p) network. However, most current p2p networks are not truly self-organizing, as little attention has been paid on how new nodes join a p2p network, the so-called bootstrapping. Current p2p network protocols rely on prior-knowledge of nodes like a list of IP...
Conference Paper
Full-text available
Our demonstrator shows the implementation of a Service- oriented Architecture (SoA) for wireless sensor-actuator net- works (WSAN). It demonstrates the feasibility of our service- oriented system in a real-world, resource-restricted WSAN based on off-the-shelf MICAz motes running the operation system TinyOS. In contrast to data-oriented approaches...
Article
Full-text available
Networks of small sensor nodes, so-called sensor networks, allow to monitor and analyze complex phenomena over a large region and for a long period of time. Recent advances in sensor network research allow for small and cheap sensor nodes which can obtain a lot of data about physical values, e.g. temperature, humidity, lightning condition, pressure...
Conference Paper
Full-text available
Secure Content Addressable Network (SCAN) is an architecture for service discovery in service centric sensor networks that enables dynamic service composition. This paper proposes two new security mechanisms for SCAN: Single Path Key Exchange (SPX) and Multi Path Key Exchange (MPX). Both security mechanisms allow two arbitrary nodes of SCAN to exch...
Thesis
Full-text available
Im Rahmen der Arbeit wird mit Secure Content Addressable Network (SCAN) ein sicheres, verteiltes Diensteverzeichnis vorgestellt, mit Hilfe dessen in dienstorientierten Sensornetzen verfügbare Dienste sicher aufgefunden werden können. SCAN nimmt besondere Rücksicht auf die speziellen Eigenschaften von Sensorknoten, insbesondere auf die sehr beschrän...
Chapter
Full-text available
X.systems.press Sichere NetzwerkkommunikationGrundlagen, Protokolle und Architekturen 10.1007/3-540-27896-6_1 1.Einleitung
Presentation
Full-text available
A talk about security in wireless sensor networks
Article
Sensors and actuators offer services in service-centric sensor networks, e.g. they provide information about the temperature at a certain location. Those services are building blocks for the overall behaviour of the sensor networks. To offer dynamic composition of services and to make services available for every node in the network, a way to secur...
Book
Netzwerke werden in allen Bereichen der IT eingesetzt, und es gibt zahlreiche Technologien zur sicheren Netzwerkkommunikation. Doch welche der verfügbaren Techniken lassen sich kombinieren und in der Praxis effektiv einsetzen? Die Autoren geben eine fundierte Darstellung der zentralen Techniken zur Sicherung von Netzwerken, behandeln deren wichtig...
Poster
Full-text available
Sensor networks are expected to be deployed ubiquitously in our environment serving different purposes ranging from smart dust to ubiquitous/pervasive services. The latter may be viewed in a service centric way, in contrast to the more typical data centric view related to smart dust. These services should be dynamically deployable and composable in...
Conference Paper
Full-text available
Der Einsatz von Sensornetzen ermöglicht die Überwachung verteilter Phänomene und ermöglicht es, die Effizienz von Geschäftsprozessen zu erhöhen. So kann ein Sensornetz z.B. zur Verwaltung eines Fuhrparks eingesetzt werden. Es ist möglich, jederzeit Wartungsdaten der Fahrzeuge zu überwachen (z.B. Ölfüllstand, Fehlerprotokolle) bzw. Kilometerstand un...