Sina Rafati Niya, DLIT: A Scalable Distributed Ledger for IoT Data , In: International Conference on Blockchain Computing and Applications (BCCA 2020). 2020. (Conference Presentation)
|
|
Clemens Jeger, Analysis of Stablecoins during the Global COVID-19 Pandemic , In: The Second International Conference on Blockchain Computing and Applications (BCCA 2020). 2020. (Conference Presentation)
|
|
Sina Rafati Niya, Raphael Beckmann, Burkhard Stiller, DLIT: A Scalable Distributed Ledger for IoT Data, In: International Conference on Blockchain Computing and Applications (BCCA2020), IEEE, Antalya, Turkey, 2020-11-03. (Conference or Workshop Paper published in Proceedings)
|
|
Muriel Figueredo Franco, Bruno Rodrigues, Eder John Scheid, Arthur Jacobs, Christian Killer, Lisandro Zambenedetti Granville, Burkhard Stiller, SecBot: a Business-Driven Conversational Agent for Cybersecurity Planning and Management, In: 16th International Conference on Network and Service Management (CNSM 2020), IFIP, Izmir, Turkey, 2020-11-02. (Conference or Workshop Paper published in Proceedings)
Businesses were moving during the past decades to-ward full digital models, which made companies face new threatsand cyberattacks affecting their services and, consequently, theirprofits. To avoid negative impacts, companies’ investments incybersecurity are increasing considerably. However, Small andMedium-sized Enterprises (SMEs) operate on small budgets,minimal technical expertise, and few personnel to address cy-bersecurity threats. In order to address such challenges, it isessential to promote novel approaches that can intuitively presentcybersecurity-related technical information.This paper introduces SecBot, a cybersecurity-driven conver-sational agent (i.e., chatbot) for the support of cybersecurityplanning and management. SecBot applies concepts of neuralnetworks and Natural Language Processing (NLP), to interactand extract information from a conversation. SecBot can(a)identify cyberattacks based on related symptoms,(b)indicatesolutions and configurations according to business demands,and(c)provide insightful information for the decision on cy-bersecurity investments and risks. A formal description hadbeen developed to describe states, transitions, a language, anda Proof-of-Concept (PoC) implementation. A case study and aperformance evaluation were conducted to provide evidence ofthe proposed solution’s feasibility and accuracy |
|
Clemens Jeger, Bruno Rodrigues, Eder John Scheid, Burkhard Stiller, Analysis of Stablecoins during the Global COVID-19 Pandemic, In: International Conference on Blockchain Computing and Applications (BCCA2020), IEEE, Antalya, Turkey, 2020. (Conference or Workshop Paper published in Proceedings)
|
|
Alexander Hofmann, Security Analysis and Improvements of a Blockchain-based Remote Electronic Voting System, University of Zurich, Faculty of Business, Economics and Informatics, 2020. (Master's Thesis)
Voting is one of the cornerstones of any democracy. With Electronic Voting (E-Voting), the Swiss confederation wants to advance Switzerland's voting and electoral system to the digital age. One of the main targets of its e-government initiative is the development of a
Remote E-Voting (REV) system, with which voters can easily vote from their own devices via the internet. However, this electronic channel, which is proposed as an additional option to in-person and postal voting, poses unique challenges. Digitizing the human right of ballot secrecy to REV systems is not straightforward. Indeed, enabling the verifiability required in order for any voter to check that their vote was counted, is in direct opposition to privacy. Blockchains (BC) promise to bring many of the properties we look for in a voting system: transparency, resilience, tamper-proof, and decentralization. Switzerland, with its federalistic structure, provides a perfect political analogy for implementing a REV system, where trust is distributed among multiple authorities. Canton and municipalities can collaborate to establish a network running the voting software, removing the need to trust any single entity with the correctness of the vote { it would provide transparency to voters and resilience against voting suppression.
This thesis conducts a security analysis of the Provotum REV system in order to assess risks and threats to the current design. Based on the results of the security audit, and improved design for a fully decentralized voting system is proposed. The new architecture brings an advanced notion of voter privacy to BC-based voting: Receipt-Freeness - a measure against vote selling. By introducing a new authority called Randomizer, the voter can not prove to a vote buyer how she voted while maintaining the ability to verify the correctness of her vote. Finally, the new scheme is analyzed proving that Provotum 3.0 achieves Receipt-Freeness while maintaining Ballot-Secrecy and verifiability. The evaluation includes a scalability analysis, showing any cryptographic material can be generated and verified in linear time, proving that the system can scale to nation-wide elections and votes. |
|
Ramon Huber, Python-based TinyIPFIX for IEEE 802.15.4-based Wireless Sensor Networks using ESP32 Microcontrollers, University of Zurich, Faculty of Business, Economics and Informatics, 2020. (Bachelor's Thesis)
The goal of this thesis is to implement TinyIPFIX, which is an application layer protocol to send data in a Wireless Sensor Network (WSN). Devices used in a WSN are often battery powered, therefore, it is important that the protocol used to send data is very efficient. The main principle of TinyIPFIX is to send data and metadata in separate messages, such that the metadata messages can be sent less often than the data messages,
which decreases overhead and saves energy. The implementation is performed for the Espressif ESP32-WROOM-32D module, which becomes popular, while it is cheap and more powerful than older devices. The implementation is provided using the MicroPython programming language, which implies that the code is more readable and simple in comparison to a lower level programming language. TinyIPFIX has already been demonstrated on older devices using a low level language; the goal of this thesis is to bring TinyIPFIX to the next generation of devices and provide it as extensible software. |
|
Anna Katharina Fitze, AVVS - Automated Video UZH-ID Verification System, University of Zurich, Faculty of Business, Economics and Informatics, 2020. (Bachelor's Thesis)
Caused by digitization and the Covid-19 pandemic courses are transformed to remote classes. In usual exams the presence of students is verified and validated by the teacher, who checks on every student with a list of students and with the UZH-Card. Digitally this is way more difficult. In this thesis a prototype is developed to tackle this problem.
In a simplified version it models a way to check the identity of a student in a online class. Therefore the information on the UZH-card is read and compared to a stored list of student information. Also the face of the student in front of the computer is compared to stored values. The matching information from both comparisons are again compared to
see if the person in front of the camera is the person, who they claim to be (the person on the UZH card). Obviously the prototype is simplified with dummy databases and access to the own webcam instead of other webcams. Furthermore, it is specified, that this prototype is only available to certain people with a teaching function at the University,
because the system works with personal data, which should not be accessible to everyone. In the end there is an evaluation on the precision and two test cases are presented. |
|
Sandro Padovan, Design and Implementation of a Blockchain Intent Management System, University of Zurich, Faculty of Business, Economics and Informatics, 2020. (Bachelor's Thesis)
|
|
Calvin Falter, Design and Implementation of a Commit Evaluation Engine for an Open Source Donation Platform, University of Zurich, Faculty of Business, Economics and Informatics, 2020. (Bachelor's Thesis)
|
|
Javier Pastor-Galindo, Mattia Zago, Pantaleone Nespoli, Sergio López Bernal, Alberto Huertas Céldran, Manuel Gil Pérez, José A Ruipérez-Valiente, Gregorio Martínez Pérez, Félix Gómez Mármol, Spotting political social bots in Twitter: A use case of the 2019 Spanish general election, IEEE Transactions on Network and Service Management, Vol. 1 (1), 2020. (Journal Article)
|
|
Eryk Jerzy Schiller, Design and Evaluation of an SDR-based LoRa Cloud Radio Access Network , In: The 16th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2020). 2020. (Conference Presentation)
|
|
Eryk Jerzy Schiller, Silas Weber, Burkhard Stiller, Design and Evaluation of an SDR-based LoRa Cloud Radio Access Network, In: The 16th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob'20), IEEE, Piscataway, New Jersey, US, 2020-10-12. (Conference or Workshop Paper published in Proceedings)
Long Range (LoRa) defines a popular modulation scheme based on the chirp spread spectrum technique. It is used in Low Power Wide Area Networks (LP-WANs) for the Internet-of-Things (IoT). Thus, this work here designs, specifies, implements, and evaluates a Cloud Radio Access Network (C-RAN) architecture for LoRa networks, while using (a) Software Defined Radios (SDR) to receive/send radio signals and (b) Docker to virtualize the setup. (c) A software modulator is developed to emit signals on the downlink targeting regular LoRa end-device receivers, such as Semtech SX1276 chips. Finally, the network, processing, and cost requirements of the C-RAN implemented are evaluated. |
|
Muriel Figueredo Franco, Towards a Conversational Agent for Cybersecurity Planning and Management , In: 2nd KuVS Fachgespräch "Machine Learning and Networking". 2020. (Conference Presentation)
|
|
Muriel Figueredo Franco, Lisandro Granville, Burkhard Stiller, Towards a Conversational Agent for Cybersecurity Planning and Management, In: 2nd KuVS Fachgespräch "Machine Learning and Networking, -, Würzburg, Germany, 2020. (Conference or Workshop Paper)
|
|
Salvatore Marco Pappalardo, Marcin Niemiec, Maya Bozhilova, Nikolai Stoianov, Andrzej Dziech, Burkhard Stiller, Multi-Sector Assessment Framework - A New Approach to Analyse Cybersecurity Challenges and Opportunities, In: Multimedia Communications, Services, and Security, Springer, Lecture Notes in Computer Science (LNCS), Krakow, Poland, 2020. (Conference or Workshop Paper published in Proceedings)
|
|
Burkhard Stiller, Blockchains in Use for Commercial Processes - Pros and Cons, In: 18th International Conference on Business Process Management (BPM 2020). 2020. (Conference Presentation)
|
|
Muriel Figueredo Franco, ProtectDDoS: A Platform for Trustworthy Offering and Recommendation of Protections , In: International Conference on Economics of Grids, Clouds, Software and Services (GECON 2020). 2020. (Conference Presentation)
|
|
Muriel Figueredo Franco, Erion Sula, Bruno Rodrigues, Eder John Scheid, Burkhard Stiller, ProtectDDoS: A Platform for Trustworthy Offering and Recommendation of Protections, In: International Conference on Economics of Grids, Clouds, Software and Services (GECON 2020), Springer, Izola, Slovenia, 2020. (Conference or Workshop Paper published in Proceedings)
|
|
Danijel Dordevic, Data Sovereignty Provision in Cloud-and-Blockchain-Integrated IoT Data Trading, University of Zurich, Faculty of Business, Economics and Informatics, 2020. (Master's Thesis)
|
|