7 research outputs found

    Metadata Schema x-econ Repository

    Get PDF
    Since May 2017, the x-hub project partners OVGU Magdeburg, University of Vienna, and GESIS dispose of a new repository, called x-econ (https://x-econ.org). The service is dedicated to all experimental economics research projects to disseminate user-friendly archiving and provision of experimental economics research data. The repository x-econ contains all necessary core functionalities of a modern repository and is in a continuous optimization process aiming at functionality enhancement and improvement. x-econ is also one pillar of the multidisciplinary repository x-science (https://x-science.org). The present documentation, which is primarily based on the GESIS Technical Reports on datorium 2014|03 and da|ra 4.0, lists and explains the metadata elements, used to describe research information

    Middle East - North Africa and the millennium development goals : implications for German development cooperation

    Get PDF
              Closed-loop controlled combustion is a promising technique to improve the overall performance of internal combustion engines and Diesel engines in particular. In order for this technique to be implemented some form of feedback from the combustion process is required. The feedback signal is processed and from it combustionrelated parameters are computed. These parameters are then fed to a control process which drives a series of outputs (e.g. injection timing in Diesel engines) to control their values. This paper’s focus lies on the processing and computation that is needed on the feedback signal before this is ready to be fed to the control process as well as on the electronics necessary to support it. A number of feedback alternatives are briefly discussed and for one of them, the in-cylinder pressure sensor, the CA50 (crank angle in which the integrated heat release curve reaches its 50% value) and the IMEP (Indicated Mean Effective Pressure) are identified as two potential control variables. The hardware architecture of a system capable of calculating both of them on-line is proposed and necessary feasibility size and speed considerations are made by implementing critical blocks in VHDL targeting a flash-based Actel ProASIC3 automotive-grade FPGA

    C3-Sched — A cache covert channel robust cloud computing scheduler

    No full text
    Several cloud schedulers have been proposed in the literature with different optimization goals such as reducing power consumption, reducing the overall operational costs or decreasing response times. A less common goal is to enhance the system security by applying specific scheduling decisions. The security risk of covert channels is known for quite some time, but is now back in the focus of research because of the multitenant nature of cloud computing and the co-residency of several per-tenant virtual machines on the same physical machine. Especially several cache covert channels have been identified that aim to bypass a cloud infrastructure's sandboxing mechanism. For instance, cache covert channels like the one proposed by Xu et. al. use the idealistic scenario with two alternately running colluding processes in different VMs accessing the cache to transfer bits by measuring cache access time. Therefore, in this paper we present a cascaded cloud scheduler coined C 3 -Sched aiming at mitigating the threat of a leakage of customers data via cache covert channels by preventing processes to access cache lines alternately. At the same time we aim at maintaining the cloud performance and minimizing the global scheduling overhead

    CPU-based covert- and side-channels in cloud ecosystems

    No full text
    Covert and Side-Channels have been known for a long time due to their versatile forms of appearance. For nearly every technical improvement or change in technology, such channels have been (re-)created or known methods have been adapted. For example the introduction of hyperthreading technology has introduced new possibilities for covert communication between malicious processes because they can now share the arithmetic logical unit (ALU) as well as the L1 and L2 cache which enables establishing multiple covert channels. Even virtualization which is known for its isolation of multiple machines is prone to covert and side-channel attacks due to the sharing of resources. Therefore itis not surprising that cloud computing is not immune to this kind of attacks. Even more, cloud computing with multiple, possibly competing users or customers using the same shared resources may elevate the risk of unwanted communication. In such a setting the ”air gap” between physical servers and networks disappears and only the means of isolation and virtual separation serve as a barrier between adversary and victim. In the work at hand we will provide a survey on weak spots an adversary trying to exfiltrate private data from target virtual machines could exploit in a cloud environment. We will evaluate the feasibility of example attacks and point out possible mitigation solutions if they exist

    Survey on covert channels in virtual machines and cloud computing

    No full text
    Covert channels have been known for a long time because of their versatile forms of appearance. For nearly every technical improvement or change in technology, such channels have been (re-)created or known methods have been adapted. For example, the introduction of hyperthreading technology has introduced new possibilities for covert communication between malicious processes because they can now share the arithmetic logical unit as well as the L1 and L2 caches, which enable establishing multiple covert channels. Even virtualization, which is known for its isolation of multiple machines, is prone to covert- and side-channel attacks because of the sharing of resources. Therefore, it is not surprising that cloud computing is not immune to this kind of attacks. Moreover, cloud computing with multiple, possibly competing users or customers using the same shared resources may elevate the risk of illegitimate communication. In such a setting, the “air gap” between physical servers and networks disappears, and only the means of isolation and virtual separation serve as a barrier between adversary and victim. In the work at hand, we will provide a survey on vulnerable spots that an adversary could exploit trying to exfiltrate private data from target virtual machines through covert channels in a cloud environment. We will evaluate the feasibility of example attacks and point out proposed mitigation solutions in case they exist

    in Frankfurt am Main als Dissertation angenommen

    No full text
    repräsentiert eine Frühphase unseres Universums und kann in Schwerionenkollisionen erzeugt werden. Seine Eigenschaften sind Gegenstand der aktuellen Forschung. Da der Vergleich von Meßdaten und Modellrechnungen nahelegt, dass sich das Quark-Gluon-Plasma wie eine nahezu ideale Flüssigkeit verhält, läßt sich das bei einer Schwerionenkollision gebildete Medium mittels hydrodynamischer Simulationen beschreiben. Eine der in diesem Zusammenhang grundlegenden Fragestellungen ist, ob energiereiche Teilchen (sogenannte Jets), die zu Beginn einer Kollision erzeugt werden und das Medium durchqueren, zur Bildung eines Machkegels führen. Dieser kann theoretisch immer erwartet werden, wenn sich ein Jet mit Überschallgeschwindigkeit relativ zum Medium bewegt. Die gemessene Winkelverteilung der aus der Kollision hervorgehenden und in den Detektoren gemessenen Teilchen sollte dann eine charakteristische Struktur aufweisen, aus der man auf direktem Wege Rückschlüsse auf die Zustandsgleichung des Mediums, im Besonderen auf seine Schallgeschwindigkeit, ziehen kann. Es werden unterschiedliche Szenarien eines Jetenergieverlustes betrachtet, dessen exakte For

    Appendix

    No full text
    corecore