Zum Hauptinhalt springen

Showing 1–15 of 15 results for author: Völker, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.09757  [pdf, other

    cs.CR

    Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates

    Authors: Enze Liu, George Kappos, Eric Mugnier, Luca Invernizzi, Stefan Savage, David Tao, Kurt Thomas, Geoffrey M. Voelker, Sarah Meiklejohn

    Abstract: Scams -- fraudulent schemes designed to swindle money from victims -- have existed for as long as recorded history. However, the Internet's combination of low communication cost, global reach, and functional anonymity has allowed scam volumes to reach new heights. Designing effective interventions requires first understanding the context: how scammers reach potential victims, the earnings they mak… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

    Comments: Under review

  2. Structural Analysis of GRAFCET Control Specifications

    Authors: Aron Schnakenbeck, Robin Mroß, Marcus Völker, Stefan Kowalewski, Alexander Fay

    Abstract: The graphical modeling language GRAFCET is used as a formal specification language in industrial control design. This paper proposes a structural analysis that approximates the variable values of GRAFCET to allow verification on specification level. GRAFCET has different elements resulting in concurrent behavior, which in general results in a large state space for analyses like model checking. The… ▽ More

    Submitted 1 July, 2024; v1 submitted 20 July, 2023; originally announced July 2023.

    Comments: \c{opyright} 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

    Journal ref: 2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)

  3. A Control Flow based Static Analysis of GRAFCET using Abstract Interpretation

    Authors: Aron Schnakenbeck, Robin Mroß, Marcus Völker, Stefan Kowalewski, Alexander Fay

    Abstract: The graphical modeling language GRAFCET is used as a formal specification language in industrial control design. This paper proposes a static analysis approach based on the control flow of GRAFCET using abstract interpretation to allow verification on specification level. GRAFCET has different elements leading to concurrent behavior, which in general results in a large state space. To get precise… ▽ More

    Submitted 25 August, 2023; v1 submitted 2 June, 2023; originally announced June 2023.

    Comments: \c{opyright} 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

    Journal ref: 2023 IEEE 21st International Conference on Industrial Informatics (INDIN), Lemgo, Germany, 2023, pp. 1-7

  4. arXiv:2302.07287  [pdf, other

    cs.CR

    Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy

    Authors: Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, Stefan Savage

    Abstract: The critical role played by email has led to a range of extension protocols (e.g., SPF, DKIM, DMARC) designed to protect against the spoofing of email sender domains. These protocols are complex as is, but are further complicated by automated email forwarding -- used by individual users to manage multiple accounts and by mailing lists to redistribute messages. In this paper, we explore how such em… ▽ More

    Submitted 19 April, 2023; v1 submitted 14 February, 2023; originally announced February 2023.

    Comments: The paper appeared at the 8th IEEE European Symposium on Security and Privacy

    Journal ref: The 8th IEEE European Symposium on Security and Privacy, 2023

  5. arXiv:2105.13442  [pdf, other

    cs.CR

    Hopper: Modeling and Detecting Lateral Movement (Extended Report)

    Authors: Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner

    Abstract: In successful enterprise attacks, adversaries often need to gain access to additional machines beyond their initial point of compromise, a set of internal movements known as lateral movement. We present Hopper, a system for detecting lateral movement based on commonly available enterprise logs. Hopper constructs a graph of login activity among internal machines and then identifies suspicious seque… ▽ More

    Submitted 27 May, 2021; originally announced May 2021.

    Comments: Usenix Security Symposium 2021

  6. arXiv:1910.00790  [pdf, other

    cs.CR cs.SI

    Detecting and Characterizing Lateral Phishing at Scale

    Authors: Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner

    Abstract: We present the first large-scale characterization of lateral phishing attacks, based on a dataset of 113 million employee-sent emails from 92 enterprise organizations. In a lateral phishing attack, adversaries leverage a compromised enterprise account to send phishing emails to other users, benefitting from both the implicit trust and the information in the hijacked user's account. We develop a cl… ▽ More

    Submitted 2 October, 2019; originally announced October 2019.

    Comments: Extended report of conference paper presented at the 26th USENIX Security Symposium (USENIX Security 19). USENIX Association, 2019

  7. arXiv:1908.05188  [pdf, other

    cs.HC eess.IV

    A Research Framework for Virtual Reality Neurosurgery Based on Open-Source Tools

    Authors: Lukas D. J. Fiederer, Hisham Alwanni, Martin Völker, Oliver Schnell, Jürgen Beck, Tonio Ball

    Abstract: Fully immersive virtual reality (VR) has the potential to improve neurosurgical planning. For example, it may offer 3D visualizations of relevant anatomical structures with complex shapes, such as blood vessels and tumors. However, there is a lack of research tools specifically tailored for this area. We present a research framework for VR neurosurgery based on open-source tools and preliminary ev… ▽ More

    Submitted 14 August, 2019; originally announced August 2019.

  8. arXiv:1806.09532  [pdf, other

    q-bio.NC cs.HC

    Cross-paradigm pretraining of convolutional networks improves intracranial EEG decoding

    Authors: Joos Behncke, Robin Tibor Schirrmeister, Martin Völker, Jiří Hammer, Petr Marusič, Andreas Schulze-Bonhage, Wolfram Burgard, Tonio Ball

    Abstract: When it comes to the classification of brain signals in real-life applications, the training and the prediction data are often described by different distributions. Furthermore, diverse data sets, e.g., recorded from various subjects or tasks, can even exhibit distinct feature spaces. The fact that data that have to be classified are often only available in small amounts reinforces the need for te… ▽ More

    Submitted 20 July, 2018; v1 submitted 20 June, 2018; originally announced June 2018.

  9. arXiv:1806.07741  [pdf, other

    eess.SP cs.LG cs.NE q-bio.NC stat.ML

    A large-scale evaluation framework for EEG deep learning architectures

    Authors: Felix A. Heilmeyer, Robin T. Schirrmeister, Lukas D. J. Fiederer, Martin Völker, Joos Behncke, Tonio Ball

    Abstract: EEG is the most common signal source for noninvasive BCI applications. For such applications, the EEG signal needs to be decoded and translated into appropriate actions. A recently emerging EEG decoding approach is deep learning with Convolutional or Recurrent Neural Networks (CNNs, RNNs) with many different architectures already published. Here we present a novel framework for the large-scale eva… ▽ More

    Submitted 25 July, 2018; v1 submitted 18 June, 2018; originally announced June 2018.

    Comments: 7 pages, 3 figures, final version accepted for presentation at IEEE SMC 2018 conference

  10. arXiv:1805.01667  [pdf, other

    cs.LG q-bio.NC q-bio.QM stat.ML

    Intracranial Error Detection via Deep Learning

    Authors: Martin Völker, Jiří Hammer, Robin T. Schirrmeister, Joos Behncke, Lukas D. J. Fiederer, Andreas Schulze-Bonhage, Petr Marusič, Wolfram Burgard, Tonio Ball

    Abstract: Deep learning techniques have revolutionized the field of machine learning and were recently successfully applied to various classification problems in noninvasive electroencephalography (EEG). However, these methods were so far only rarely evaluated for use in intracranial EEG. We employed convolutional neural networks (CNNs) to classify and characterize the error-related brain response as measur… ▽ More

    Submitted 2 November, 2018; v1 submitted 4 May, 2018; originally announced May 2018.

    Comments: 8 pages, 6 figures. Accepted at the 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC2018)

    ACM Class: I.2.6; I.2.8; I.5.0; J.2; J.3

  11. arXiv:1710.09139  [pdf

    cs.LG cs.HC q-bio.NC

    Deep Transfer Learning for Error Decoding from Non-Invasive EEG

    Authors: Martin Völker, Robin T. Schirrmeister, Lukas D. J. Fiederer, Wolfram Burgard, Tonio Ball

    Abstract: We recorded high-density EEG in a flanker task experiment (31 subjects) and an online BCI control paradigm (4 subjects). On these datasets, we evaluated the use of transfer learning for error decoding with deep convolutional neural networks (deep ConvNets). In comparison with a regularized linear discriminant analysis (rLDA) classifier, ConvNets were significantly better in both intra- and inter-s… ▽ More

    Submitted 10 January, 2018; v1 submitted 25 October, 2017; originally announced October 2017.

    Comments: 6 pages, 9 figures, The 6th International Winter Conference on Brain-Computer Interface 2018

    ACM Class: I.2.6; I.2.8; I.5.0; J.2; J.3

  12. arXiv:1707.06633  [pdf, other

    cs.AI cs.CV cs.HC cs.LG cs.RO

    Acting Thoughts: Towards a Mobile Robotic Service Assistant for Users with Limited Communication Skills

    Authors: Felix Burget, Lukas Dominique Josef Fiederer, Daniel Kuhner, Martin Völker, Johannes Aldinger, Robin Tibor Schirrmeister, Chau Do, Joschka Boedecker, Bernhard Nebel, Tonio Ball, Wolfram Burgard

    Abstract: As autonomous service robots become more affordable and thus available also for the general public, there is a growing need for user friendly interfaces to control the robotic system. Currently available control modalities typically expect users to be able to express their desire through either touch, speech or gesture commands. While this requirement is fulfilled for the majority of users, paraly… ▽ More

    Submitted 12 June, 2018; v1 submitted 20 July, 2017; originally announced July 2017.

    Comments: * FB, LDJF, DK, MV and JA contributed equally to the work. Accepted as a conference paper at the European Conference on Mobile Robotics 2017 (ECMR 2017), 6 pages, 3 figures

    ACM Class: I.2.4; I.2.6; I.2.8; I.2.9; I.2.10; I.4.8; I.5.1

    Journal ref: 2017 European Conference on Mobile Robots (ECMR)

  13. arXiv:1409.3518  [pdf, other

    stat.ML cs.IR cs.LG

    Topic Modeling of Hierarchical Corpora

    Authors: Do-kyum Kim, Geoffrey M. Voelker, Lawrence K. Saul

    Abstract: We study the problem of topic modeling in corpora whose documents are organized in a multi-level hierarchy. We explore a parametric approach to this problem, assuming that the number of topics is known or can be estimated by cross-validation. The models we consider can be viewed as special (finite-dimensional) instances of hierarchical Dirichlet processes (HDPs). For these models we show that ther… ▽ More

    Submitted 13 April, 2015; v1 submitted 11 September, 2014; originally announced September 2014.

  14. arXiv:1103.1771  [pdf, other

    cs.DS

    Efficient Algorithms for Distributed Detection of Holes and Boundaries in Wireless Networks

    Authors: Dennis Schieferdecker, Markus Völker, Dorothea Wagner

    Abstract: We propose two novel algorithms for distributed and location-free boundary recognition in wireless sensor networks. Both approaches enable a node to decide autonomously whether it is a boundary node, based solely on connectivity information of a small neighborhood. This makes our algorithms highly applicable for dynamic networks where nodes can move or become inoperative. We compare our algorith… ▽ More

    Submitted 9 March, 2011; originally announced March 2011.

    Comments: extended version of accepted submission to SEA 2011

  15. arXiv:0806.0928  [pdf, other

    cs.DS cs.CG

    Drawing Binary Tanglegrams: An Experimental Evaluation

    Authors: Martin Nöllenburg, Danny Holten, Markus Völker, Alexander Wolff

    Abstract: A binary tanglegram is a pair <S,T> of binary trees whose leaf sets are in one-to-one correspondence; matching leaves are connected by inter-tree edges. For applications, for example in phylogenetics or software engineering, it is required that the individual trees are drawn crossing-free. A natural optimization problem, denoted tanglegram layout problem, is thus to minimize the number of crossi… ▽ More

    Submitted 5 June, 2008; originally announced June 2008.

    Comments: see http://www.siam.org/proceedings/alenex/2009/alx09_011_nollenburgm.pdf

    Journal ref: Proceedings of the 11th Workshop on Algorithm Engineering and Experiments (ALENEX'09), pages 106-119. SIAM, April 2009