Publications

You can also find my papers on ResearchGate.

Click on the title to get more information.

Security für eingebettete Systeme in kritischen Infrastrukturen: Ergebnisse und Erkenntnisse

Published in Research Report 2023 of the Technical University OTH Amberg- Weiden, 2023

This report summarizes our research project “iSEC” at OTH Amberg-Weiden.

Recommended citation: S. Liebl, A. Aßmuth, and M. Söllner, “Security für eingebettete Systeme in kritischen Infrastrukturen: Ergebnisse und Erkenntnisse,” in Research Report 2023 of the Technical University OTH Amberg- Weiden, 2023, p. 91 to 95.
https://www.researchgate.net/publication/369487960_Security_fur_eingebettete_Systeme_in_kritischen_Infrastrukturen_Ergebnisse_und_Erkenntnisse

Threat Modelling for Internet of Things Devices

Published in Research Report 2023 of the Technical University OTH Amberg- Weiden, 2023

This report introduces the Thing Threat Modelling methodology and Cyber-Physical Data Flow Diagrams.

Recommended citation: S. Liebl, “Threat Modelling for Internet of Things Devices,” in Research Report 2023 of the Technical University OTH Amberg- Weiden, 2023, p. 86 to 90.
https://www.researchgate.net/publication/369488078_Threat_Modelling_for_Internet_of_Things_Devices

Analyzing the Attack Surface and Threats of Industrial Internet of Things Devices

Published in International Journal on Advances in Security, 2021

This paper is an extension of our paper about the threat analysis for industrial IoT devices. It contains more details about device components and assets as well as a categorization for threats and attacks and weaknesses.

Recommended citation: S. Liebl, L. Lathrop, U. Raithel, A. Aßmuth, I. Ferguson, and M. Söllner, “Analyzing the Attack Surface and Threats of Industrial Internet of Things Devices,” International Journal on Advances in Security, vol. 14, no. 1 & 2, pp. 59–70, 2021.
https://www.researchgate.net/publication/358280672_Analyzing_the_Attack_Surface_and_Threats_of_Industrial_Internet_of_Things_Devices

A Secure and Privacy-Friendly Logging Scheme

Published in The Twelfth International Conference on Cloud Computing, GRIDs, and Virtualization, 2021

This paper is about a secure and privacy-friendly logging scheme that uses secret sharing and an immutable database.

Recommended citation: A. Aßmuth, R. Duncan, S. Liebl, and M. Söllner, “A Secure and Privacy-Friendly Logging Scheme,” in The Twelfth International Conference on Cloud Computing, GRIDs, and Virtualization, Proceedings, Porto, Portugal, 18th to 22nd April 2021, p. 8 to 12.
https://www.researchgate.net/publication/351083031_A_Secure_and_Privacy-Friendly_Logging_Scheme

Securing Low-Power Industrial Devices in Critical Infrastructures

Published in Research Report 2021 of the Technical University OTH Amberg- Weiden, 2021

This report summarizes our research project “iSEC” at OTH Amberg-Weiden.

Recommended citation: S. Liebl, L. Lathrop, A. Aßmuth, and M. Söllner, “Securing Low-Power Industrial Devices in Critical Infrastructures,” in Research Report 2021 of the Technical University OTH Amberg- Weiden, 2021, p. 72 to 76.
https://www.researchgate.net/publication/351102754_Securing_Low-Power_Industrial_Devices_in_Critical_Infrastructures

Threat Analysis of Industrial Internet of Things Devices

Published in The Eleventh International Conference on Cloud Computing, GRIDs, and Virtualization, Proceedings, 2020

This paper is about the procedure for the threat analysis in our research project "iSEC" and received the best paper award.

Recommended citation: S. Liebl, L. Lathrop, U. Raithel, M. Söllner, and A. Aßmuth, “Threat Analysis of Industrial Internet of Things Devices,” in The Eleventh International Conference on Cloud Computing, GRIDs, and Virtualization, Proceedings, Nice, France, 25th to 29th October 2020, p. 31 to 37.
https://www.researchgate.net/publication/345060878_Threat_Analysis_of_Industrial_Internet_of_Things_Devices

Securing the Internet of Things from the Bottom Up Using Physical Unclonable Functions

Published in The Eleventh International Conference on Cloud Computing, GRIDs, and Virtualization, Proceedings, 2020

This paper is about Physical Unclonable Functions and their use in Internet of Things devices.

Recommended citation: L. Lathrop, S. Liebl, U. Raithel, M. Söllner, and A. Aßmuth, “Securing the Internet of Things from the Bottom Up Using Physical Unclonable Functions,” in The Eleventh International Conference on Cloud Computing, GRIDs, and Virtualization, Proceedings, Nice, France, 25th to 29th October 2020, p. 44 to 49.
https://www.researchgate.net/publication/344900322_Securing_the_Internet_of_Things_from_the_Bottom_Up_Using_Physical_Unclonable_Functions