Zum Hauptinhalt springen

Showing 1–7 of 7 results for author: Scherb, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.14388  [pdf, other

    cs.SE cs.CL cs.CR

    Evaluation of the Programming Skills of Large Language Models

    Authors: Luc Bryan Heitz, Joun Chamas, Christopher Scherb

    Abstract: The advent of Large Language Models (LLM) has revolutionized the efficiency and speed with which tasks are completed, marking a significant leap in productivity through technological innovation. As these chatbots tackle increasingly complex tasks, the challenge of assessing the quality of their outputs has become paramount. This paper critically examines the output quality of two leading LLMs, Ope… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  2. arXiv:2310.03598  [pdf, other

    cs.CR cs.SC eess.SY

    Divide, Conquer and Verify: Improving Symbolic Execution Performance

    Authors: Christopher Scherb, Luc Bryan Heitz, Hermann Grieder, Olivier Mattmann

    Abstract: Symbolic Execution is a formal method that can be used to verify the behavior of computer programs and detect software vulnerabilities. Compared to other testing methods such as fuzzing, Symbolic Execution has the advantage of providing formal guarantees about the program. However, despite advances in performance in recent years, Symbolic Execution is too slow to be applied to real-world software.… ▽ More

    Submitted 7 November, 2023; v1 submitted 5 October, 2023; originally announced October 2023.

  3. arXiv:2310.03583  [pdf, other

    cs.CR cs.CY

    CyMed: A Framework for Testing Cybersecurity of Connected Medical Devices

    Authors: Christopher Scherb, Adrian Hadayah, Luc Bryan Heitz

    Abstract: Connected Medical Devices (CMDs) have a large impact on patients as they allow them to lead a more normal life. Any malfunction could not only remove the health benefits the CMDs provide, they could also cause further harm to the patient. Due to this, there are many safety regulations which must be adhered to prior to a CMD entering the market. However, while many detailed safety regulations exist… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

    Journal ref: Proceedings of the 4th Conference Society 5.0 - 2024

  4. arXiv:2308.01065  [pdf, other

    cs.CR cs.CY

    An Adaptable Approach for Successful SIEM Adoption in Companies

    Authors: Maximilian Rosenberg, Bettina Schneider, Christopher Scherb, Petra Maria Asprion

    Abstract: In corporations around the world, the topic of cybersecurity and information security is becoming increasingly important as the number of cyberattacks on themselves continues to grow. Nowadays, it is no longer just a matter of protecting against cyberattacks, but rather of detecting such attacks at an early stage and responding accordingly. There is currently no generic methodological approach for… ▽ More

    Submitted 2 August, 2023; originally announced August 2023.

    Comments: Submitted to the AC2023 Conference

    Journal ref: IADIS INTERNATIONAL JOURNAL ON COMPUTER SCIENCE AND INFORMATION SYSTEMS 2023

  5. arXiv:2305.03062  [pdf, ps, other

    cs.CR cs.CY cs.HC

    A Serious Game for Simulating Cyberattacks to Teach Cybersecurity

    Authors: Christopher Scherb, Luc Bryan Heitz, Frank Grimberg, Hermann Grieder, Marcel Maurer

    Abstract: With the rising number of cyberattacks, such as ransomware attacks and cyber espionage, educating non-cybersecurity professionals to recognize threats has become more important than ever before. However, traditional training methods, such as phishing awareness campaigns, training videos and assessments have proven to be less effective over time. Therefore, it is time to rethink the approach on how… ▽ More

    Submitted 4 May, 2023; originally announced May 2023.

    Comments: Master Thesis @ FHNW

  6. arXiv:2108.06710  [pdf, other

    cs.NI

    Tangle Centric Networking (TCN)

    Authors: Christopher Scherb, Dennis Grewe, Christian Tschudin

    Abstract: Today's Internet is heavily used for multimedia streaming from cloud backends, while the Internet of Things (IoT) reverses the traditional data flow, with high data volumes produced at the network edge. Information Centric Networking (ICN) advocates against a host-centric communication model which is promising for distributed edge computing environments and the execution of IoT applications in a d… ▽ More

    Submitted 15 August, 2021; originally announced August 2021.

  7. arXiv:2108.06707  [pdf, other

    cs.NI

    SwarMS: Swarm-Computations for Mobile Scenarios

    Authors: Christopher Scherb, Pascal Bürklin, Christian Tschudin

    Abstract: Nowadays, most network systems are based on fixed and reliable infrastructure. In this context Information Centric Networking (ICN) is a novel network approach, where data is in the focus instead of hosts. Therefore, requests for data are independent from the location where the data is actually stored on. This property is optimal for infrastructure-less and swarm networking. However, the ICN does… ▽ More

    Submitted 15 August, 2021; originally announced August 2021.