Norbert Wiedermann’s research while affiliated with Fraunhofer Institute for Applied and Integrated Security and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (11)


Integrating security evaluations into virtual commissioning
  • Conference Paper

August 2020

·

23 Reads

·

1 Citation

Alexander Giehl

·

Norbert Wiedermann

·

Makan Tayebi Gholamzadeh

·

Claudia Eckert

MERCAT: A Metric for the Evaluation and Reconsideration of Certificate Authority Trustworthiness

November 2019

·

31 Reads

·

18 Citations

·

Alexander Giehl

·

Norbert Wiedermann

·

[...]

·

Frank Kargl

Public key infrastructures (PKIs) build the foundation for secure communication of a vast majority of cloud services. In the recent past, there has been a series of security incidents leading to increasing concern regarding the trust model currently employed by PKIs. One of the key criticisms is the architecture's implicit assumption that certificate authorities (CAs) are trustworthy a priori. This work proposes a holistic metric to compensate this assumption by a differentiating assessment of a CA's individual trustworthiness based on objective criteria. The metric utilizes a wide range of technical and non-technical factors derived from existing policies, technical guidelines, and research. It consists of self-contained submetrics allowing the simple extension of the existing set of criteria. The focus is thereby on aspects which can be assessed by employing practically applicable methods of independent data collection. The metric is meant to help organizations, individuals, and service providers deciding which CAs to trust or distrust. For this, the modularized submetrics are clustered into coherent submetric groups covering a CA's different properties and responsibilities. By applying individually chosen weightings to these submetric groups, the metric's outcomes can be adapted to tailored protection requirements according to an exemplifying attacker model.


A framework to assess impacts of cyber attacks in manufacturing

February 2019

·

38 Reads

·

14 Citations

Recent trends in manufacturing and industry accelerate the interconnection of industrial control systems between each other and over public networks. This brings an increase of cyber attack impact with it as the number of potential targets rises and the consequences of the attacks gain in severity. In order to build secure manufacturing systems, it is paramount to measure the possible impact of cyber attacks. This is required to evaluate security controls towards their effectiveness in attack scenarios. In this work, a proposal for an impact assessment framework in manufacturing is given. A suitable attacker model for execution of the attacks is provided. An evaluation metric for quantifying attack impact on manufacturing systems is developed. A light-weight modeling technique is presented and used to study the impact of cyber attacks on a cellular assembly setup. Different attack scenarios are implemented and simulated within the framework. The simulations provide detailed insight and illustrate attack impact.



Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions

November 2018

·

152 Reads

·

50 Citations

Future Generation Computer Systems

The next industrial revolution is said to be paved by the use of novel Internet of Things (IoT) technology. One important aspect of the modern IoT infrastructures is decentralised communication, often called Peer-to-Peer (P2P). In the context of industrial communication, P2P contributes to resilience and improved stability for industrial components. Current industrial facilities, however, still rely on centralised networking schemes which are considered to be mandatory to comply with security standards. In order to succeed, introduced industrial P2P technology must maintain the current level of protection and also consider possible new threats. The presented work starts with a short analysis of well-established industrial communication infrastructures and how these could benefit from decentralised structures. Subsequently, previously undefined Information Technology (IT) security requirements are derived from the new cloud based decentralised industrial automation model architecture presented in this paper. To meet those requirements, state-of-the-art communication schemes and their open source implementations are presented and assessed for their usability in the context of industrial IoT. Finally, derived building blocks for industrial IoT P2P security are presented which are qualified to comply with the stated industrial IoT security requirements.


Secure your SSH Keys! Motivation and Practical Implementation of a HSM-based Approach Securing Private SSH-Keys

June 2018

·

224 Reads

·

2 Citations

Reliable authentication of entities is the baseline for secure communications infrastructures and services. While traditional password authentication is still widely deployed, while alternatives based on asymmetric cryptography are also available and provide an increased level of security. On the client-side, however, secret keys are often unprotected. Although constantly updated workstations are considered to be trusted environments, security breaches such as Spectre or Meltdown raised doubts in platform integrity. The presented work introduces realistic attack vectors which can be employed to extract cryptographic keys from workstations. Consequently, Hardware Security Modules (HSMs) are introduced which provide secure storage as well as secure utilisation of private cryptographic keys. Due to the huge amount of possible application scenarios, the paper focuses on an application scenario based on the widely used Secure Shell (SSH) protocol. Demonstrating that an improved level of security is not necessarily directly linked to costs, a rough summary of interesting Commercial off the Shelf (COTS) devices is provided.



Security Verification of Third Party Design Files in Manufacturing

February 2018

·

21 Reads

·

9 Citations

Customer-individual production in manufacturing is a current trend related to the Industrie 4.0 paradigm. Creation of design files by the customers is becoming more frequent. These design files are typically generated outside the company boundaries and then transferred to the organization where they are eventually processed and scheduled for production. From a security perspective, this introduces new attack vectors targeting producing companies. Design files with malicious configuration parameters can threaten the availability of the manufacturing plant resulting in financial risks and can even cause harm to humans. Human verification of design files is error-prone why an automated solution is required. A graph-theoretic modeling framework for machine tools capable of verifying the security of product designs is proposed. This framework is used to model an exemplary production process implemented in a wood processing plant based on the experiences of a real-world case study. Simulation of the modeled scenario shows the feasibility of the framework. Apart from security verification, the approach can be adopted to decide if a product design can be manufactured with a given set of machine tools.


Novel weaknesses in IEC 62351 protected Smart Grid control systems

November 2016

·

95 Reads

·

45 Citations

Smart Grids are characterized by a high level of interconnectedness and interdependency between their sub-components. As this increases the surface for potential cyber attacks, the control system communication needs to be protected. IEC 61850 is about to become the most prevalent communication standard in the process related parts of Smart Grid control systems, but it was not designed with security in mind. IEC 62351 extends IEC 61850 by comprehensive security measures. By analyzing the IEC 61850 and IEC 62351 specifications, three novel weaknesses in the IEC 62351 standard were discovered which will be presented in this paper. Two weaknesses allow for replay of GOOSE and Sampled Values messages and one weakness in the protocol used for time exchange (SNTP) leaves the system vulnerable to a variety of attacks.


Adaptive Modelling for Security Analysis of Networked Control Systems

August 2016

·

36 Reads

·

6 Citations

Incomplete information about connectivity and functionality of elements of networked control systems is a challenging issue in applying model-based security analysis in practice. This issue can be addressed by modelling techniques providing inherent mechanisms to describe incomplete information. We present and exemplary demonstrate a new, ontology-based method to adaptively model and analyse networked control systems froma security perspective.Ourmethod allowsmodelling different parts of the systemwith different levels of detail. We include a formalism to handle incomplete information by applying iterative extension and iterative refinement of the model where necessary. By usingmachine-based reasoning on an ontologymodel of the system, security-relevant information is deduced. During this process, non-obvious attack vectors are identified using a structural analysis of the model and by connecting the model to vulnerability information.


Citations (10)


... Previous research [8] suggests assessing a given CA's trustworthiness before relying on digital certificates issued by a specific CA. However, questions regarding trustworthiness and reliability cannot only arise on the side of the CA, but also regarding the software stack used by the RP as demonstrated by various vulnerabilities listed in Table 1. ...

Reference:

ParsEval: Evaluation of Parsing Behavior using Real-world Out-in-the-wild X.509 Certificates
MERCAT: A Metric for the Evaluation and Reconsideration of Certificate Authority Trustworthiness
  • Citing Conference Paper
  • November 2019

... In particular, the impact on industrial manufacturing control systems [1], [4]- [7] has received particular attention due to its integral nature in our everyday lives. For such analyses, experiments on real ICS or experimental testbeds are not feasible as they can damage (impact) physical equipment, the environment, or human lives [5]. Therefore, most of these studies adopt some model-based approach to model and simulate attacks on a running ICS model to uncover how various attacks can delay, disrupt, or halt physical ICS operations [1] causing serious economic, operational, and environmental impacts [8]. ...

A framework to assess impacts of cyber attacks in manufacturing
  • Citing Conference Paper
  • February 2019

... [6] investigated address space layout randomization (ASLR) and evaluated its performance using the proposed Hierarchical Attack Representation Model (HARM). Several lightweight MTD techniques are also proposed by randomly choosing different types of cryptographic primitives [7] or both cryptosystems and firmwares [8] for wireless sensor networks. [9] proposed a dynamically changing IPv6 address assignment approach over the IoT devices using Low-Powered Wireless Personal Area Networks (LPWPANs) protocol to defend against various network attacks. ...

Future Proofing IoT Embedded Platforms for Cryptographic Primitives Support
  • Citing Conference Paper
  • December 2018

... Leveraging IoT alongside intelligent computing, industries are now adopting automated and autonomous processing capabilities, enabling the development of smart factories. Industrial operations are typically stratified across multiple layers, ranging from hands on fieldwork to strategic management activities, with each layer playing a pivotal role in driving production and responding to consumer needs [2]. In the face of growing consumer demands and the push for heightened productivity, industries are compelled to enhance efficiency and accelerate responsiveness. ...

Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions
  • Citing Article
  • November 2018

Future Generation Computer Systems

... Sven Plaga et al. [4] introduce Hardware Security Modules (HSMs) as a robust solution for the secure and efficient storage of cryptographic keys. HSMs are dedicated hardware devices designed to protect keys from physical and logical attacks. ...

Secure your SSH Keys! Motivation and Practical Implementation of a HSM-based Approach Securing Private SSH-Keys
  • Citing Conference Paper
  • June 2018

... Works in this area are presented by staged publications that define new issues (analyzed in [15]), works on detecting attacks based on signatures [16] and big data processing [14, 17, 18]. The authors search for new threat models [19], and consider monitoring individual types of systems [20][21][22] or classes of objects [23][24][25]. These solutions, as well as in domestic works, used traditional approaches to security monitoring, without taking into account the specifics of cyber-physical systems as a special class of security objects [26]. ...

Adaptive Modelling for Security Analysis of Networked Control Systems
  • Citing Conference Paper
  • August 2016

... Besides the PUF solutions there are different methods to secure communication in the IIoT sector. Plaga et al. [15] propose an Out-of Band Authentication (OoBA) protocol with One Time Passwords (OTPs) and Quick Response (QR) codes in an combination with Transport Layer Security (TLS). An IPsec extension for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) in short range wireless networks is descirbed by Raza et al. [16]. ...

Adding Channel Binding for an Out-of-Band OTP Authentication Protocol in an Industrial Use-Case
  • Citing Conference Paper
  • April 2018

... In the case of redundancy, standard protocols like PRP [21] and HSR [22], under the IEC 62439-3 [23], allow a communication network that is not only resilient but also minimizes recovery time in case one fails. These are inclusive of IEEE 1686 [24], IEC 62351 [25] and NERC CIP [26], among others, prescribing the protection and control measures of a system against the cyber threat. There are several recommendations, such as role-based access control, secure protocols for communication, and remote asset management, among others, regarding the safety and security of the critical electrical infrastructure systems. ...

Novel weaknesses in IEC 62351 protected Smart Grid control systems
  • Citing Conference Paper
  • November 2016

... A continuous data flow and continuous data semantics are indispensable for the holistic handling of data and services within the Industry 4.0 [9,10]. One challenge is the generation of semantic interfaces for continuous data transport [11]. ...

Absicherungskonzepte für Industrie 4.0
  • Citing Article
  • Publisher preview available
  • September 2015

Datenschutz und Datensicherheit - DuD