Dr. Corinna Schmitt

Dr. Corinna Schmitt
CODE
Gebäude Carl-Wery-Str. 22, Zimmer 1606
+49 89 6004 7314
corinna.schmitt@unibw.de

Dr. Corinna Schmitt

PostDoc und Forscherin im Bereich IoT und Mobilkommunikation, sowie Labormanagerin IoT, Koordinatorin der Lehre und Ansprechpartnerin für akademische Belange (u.a. Promotionen) der Professur "Kommunikationssysteme und Netzsicherheit".

 

Homepage: https://www.corinna-schmitt.de

 

 

Sperechstunden

  • Bedingt durch die bekannten Dienstanweisungen unserer Präsidentin findet keine Sprechstunde in-persona bis auf weiteres statt!
  • Als Alternative biete ich eine Telko jeweils mittwochs von 9-11 Uhr an. Also kurz eine Email schreiben, dann bekommt Ihr die Einwahldaten.

 

Awards since 06/2018

  • 1st Place - Best Professional Paper Competition @ ICNS 2019 (see publication no. 21 below)
  • Best Paper Award in Session Secure Communication @ DASC 2019  (see publication no. 15 below)

 

Research topics and open theses (language ENG/GER)

  • SecureWSN - Secure and efficient Wireless Sensor Network (see also https://corinna-schmitt.de/securewsn.html):
    • Implementation of security solutions (pdf) (BA/MA)
    • Optimization of system lifetime using energy harvesting mechanisms
    • Extension of visualization mechanisms
    • Extension of privilege management in WebMaDa (e.g., group management)
    • Linkage of other sensor networks using different operating systems and hardware to CoMaDa and WebMaDa
    • Indoor localization and and their security vulnerabilities

 

  • Topics offered in cooperation with the DLR:
    • Security Architecture for LDACS (pdf) (MA)
    • Distributed Trust in Mobile Environments for Digital Aeronautical Communications (pdf) (MA)

 

  • Topic offered in cooperation with the BND:
    • Automotive Security (MA)

 

  • The content of the proposed topics will be adapted to the thesis type and can be shifted a bit based on discussions and interest.
  • Another idea from your side? Get in touch and let's talk about it!

 

Topics for "Kompetenztraining" (language ENG/GER)

  • Implementation einer automatisierte Routine im WebMaDa-Admin Tool zum Löschen von WSNs in MySQL-Datenbank
  • Implementierungsarbeiten zur Visualization von Sensordaten und Enduser mehr flexiblere Darstellungen zu ermöglichen --> Kurzbeschreibung
  • Integration eines Updatemechanismus für Meßintervalle in SecureWSN nach dem Prinzip der  bidiektionaler Kommunikation
  • AAA Management --> Kurzbeschreibung
  • Datenfilterung --> Kurzbeschreibung

 

  • Laufene Kompetenztrainings:

 

  • Nichts gefunden? Dann einfach mal vorbeikommen und wir überlegen gemeinsam. Es wird sich was finden!

 

Running theses since 06/2018:

  • Secure Communication in the Aerospace - Martin Yankov (BA) (*)
  • Sicherheitskonzept für Fahrzeugarchitekturen mit Fokus auf ein spezifisches Angriffsscenario - Jakob Pachmann (BA) (*)
  • Design &Implemetation of a Code-Staging Solution for WebMaDa - Dario Schaumburger (MA), pdf
  • Design and implementation of CoMaDa instance on Raspberry Pi (Option 2) - Yanal Al-Shool (BA), pdf (*)
  • Creation of a home automation system linked to SecureWSN - Marvin Weber (BA), pdf (*)
  • Integration of room plans to visualize received measurements - Samson Quitt (BA), pdf (*)
  • Design and implementation of CoMaDa instance on Raspberry Pi (Option 1) - Jan Gabriel (BA) (*)
  • Multicast Group-Key Distribution in Constrained Networks under RIOT OS - Konrad Haslberger (MA), pdf (*)
  • Identity-based Cryptography under RIoT OS - Maximilian Dufter (MA) (*)
  • Integration of Warning Mechanism into WebMaDa for Abnormal Node Behavior - Marie-Claire Hanschmann (BA), pdf
  • Trustworthiness Check for Nodes Reporting Measurements in CoMaDa - Philipp Pfefferkorn (BA), pdf (*)
  • Certificateless DTLS Support in a Constrained Network under RIOT OS - Kevin Edmonds (MA), pdf (*)
  • Aggregation Support in Constrained Networks following TinyIPFIX under RIOT OS - Lidia Kondilidis (BA), pdf (*)
  • TinyIPFIX-based Data Collection in Constrained Networks under RIOT OS - Thomas Holger (BA), pdf (*)
  • DTLS-based Security Solution for Constrained Devices using Contiki - Julian Sturm (BA), pdf (*)
  • Gathering Environmental Data using TinyIPFIX under RIOT OS - Yacine Mohammed (MA) (*)
  • Code-Documentation of WebMaDa in SecureWSN - Dimitry Uvarov (BA), pdf (*)
  • Secure Data Transmission in RIOT OS Running Constrained Networks - Marcel Mack (BA) (*)
  • Upgrading SecureWSN's Virtual Machine - Lukas Kaltenbach (Competence Trainings)

 

Concluded theses since 06/2018:

  • SecureWSN's Virtual Machine Migration - Dario Schaumburger (Competence Trainings)
  • Qualitätssicherung der Weboberfläche des mobilen Frameworks von SecureWSN - Marie-Claire Hanschmann (Competence Trainings)
  • Design and Implementation of a Geospatial IoTNaming System: Geographic Polygons - Alexander Nussbaum (BA)
  • Design and Implementation of a Geospatial IoTNaming System: Database and Web Application - Dario Schaumburger (BA)
  • Earlier advised theses see https://corinna-schmitt.de/student-theses.html

 

Teaching

Eine kurzbeschreibung der Kurse ist zu finden, wenn sie hier klicken.

 

  • BA/MA Market Place

 

  • Lecture Secure Mobile Systems / Sichere Mobile Systeme

    • M.Sc.
    • NEW Lecture in FT 2020
    • Lecturer

 

  • Lecture Mobile Communicationssystems / Mobile Kommunikationssysteme

    • M.Sc.
    • Spring term 2018, 2019
    • Lecturer substitute and exercise involvement

 

  • Lecture Introduction to Computer Networks / Einführung in Rechnernetze

    • B.Sc.
    • Spring term 2018, 2019
    • Lecturer substitute and exercise organizer in 2018
    • Invited lecturer in 2019 on behalf of Prof. Dreo Rodosek (on sabbatical)

 

  • Seminar IT-Sicherheit / IT-Security

    • B.Sc., M.Sc.
    • Winter terms 2020 and 2019
    • Organizer and supervisor of various topics

 

  • Seminar Cyber Defense

    • B.Sc., M.Sc.
    • Autumn term 2019
    • Organizer and supervisor of various topics

 

Publications since 06/2018:

  1. N.Mäurer, T.Gräupl, C.Schmitt: L-band Digital Aeronautical Communications System (LDACS). IETF Internet Draft, Informational Draft, Fremont, CA, USA, Version 04, draft-maeurer-raw-ldacs-04, July 2020
  2. P. Thubert, D. Cavalcanti, X. Vilajosana, C.Schmitt: Reliable and Available Wireless Technologies. IETF Internet Draft, Informational Draft, Fremont, CA, USA, Version 05, draft-thubert-raw-technologies-05, May 2020
  3. N.Mäurer, T.Gräupl, C.Schmitt: L-band Digital Aeronautical Communications System (LDACS). IETF Internet Draft, Informational Draft, Fremont, CA, USA, Version 03, draft-maeurer-raw-ldacs-03, May 2020
  4. N.Mäurer, T.Gräupl, C.Schmitt: Comparing different Diffie-Hellman Key Exchange Flavors for LDACS. 9th Digital Avionics Systems Conference, San Antonio, TX, USA, October 2020 (acceptance notification received Apr. 24, 2020)
  5. C.Perner, C.Schmitt: Security Concept for Unoccupied Aerial Systems. 9th Digital Avionics Systems Conference, San Antonio, TX, USA, October 2020 (acceptance notification received Apr. 24, 2020)
  6. C.Perner, C.Schmitt, G.Carle: Dynamic Network Reconfiguration in Safety-Critical Aeronautical Systems. 39th Digital Avionics Systems Conference, San Antonio, TX, USA, October 2020 (acceptance notification received Apr. 24, 2020)
  7. K.Streit, C.Schmitt, C.Giannelli: SDN-based regulated flow routing in MANETs. 6th IEEE International Conference on Smart Computing, Bologna, Italy, September 2020 (acceptance notification received Apr. 10, 2020)
  8. N.Mäurer, T.Gräupl, C.Schmitt: L-band Digital Aeronautical Communications System (LDACS). IETF Internet Draft, Informational Draft, Fremont, CA, USA, Version 02, draft-maeurer-raw-ldacs-02, April 2020
  9. N.Mäurer, T.Gräupl, C.Schmitt: L-band Digital Aeronautical Communications System (LDACS). IETF Internet Draft, Informational Draft, Fremont, CA, USA, Version 01, draft-maeurer-raw-ldacs-01, March 2020
  10. P. Thubert, D. Cavalcanti, X. Vilajosana, C.Schmitt: Reliable and Available Wireless Technologies. IETF Internet Draft, Informational Draft, Fremont, CA, USA, Version 04, draft-thubert-raw-technologies-04, January 2020
  11. C. Schmitt, D. Bünzli, B. Stiller: WebMaDa 2.1 - A Web-based Framework for Handling User Requests Automatically and Addressing Data Control in Parallel. IoT Security: Advances in Authentication, M. Liyanage, A. Braeken, P. Kumar, and M. Yliantilla, Wiley Publishers, pp. 159-184, December 2019 (pdf)

  12. P. Porambage, A. Braeken, C.Schmitt, P. Kumar: Public Key Based Protocols - EC Crypto. IoT Security: Advances in Authentication, M. Liyanage, A. Braeken, P. Kumar, and M. Yliantilla, Wiley Publishers, pp. 85-100, December 2019 (pdf)

  13. N.Mäurer, Thomas Gräupl, C. Schmitt: Demo FACT2 - Framework for Aeronautical Communications and Traffic Simulation 2. 22nd ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Miami Beach, FL, USA, November 25-29, 2019 (pdf)

  14. N.Mäurer, T.Gräupl, C.Schmitt: L-band Digital Aeronautical Communications System (LDACS). IETF Internet Draft, Informational Draft, Fremont, CA, USA, Version 00, draft-maeurer-raw-ldacs-00, November 2019

  15. N.Mäurer, Thomas Gräupl, C. Schmitt: Evaluation of the LDACS Cybersecurity Implementation. IEEE 38th Digital Avionics Systems Conference (DACS), San Diego, CA, USA, September 8-12, 2019 (pdf) - Best Paper Award in Session Secure Communication
  16. R.Müller, C.Schmitt, D.Kaiser, M.Waldvogel: HomeCA: Scalable Secure IoT Network Integration. Informatik 2019, Kassel, Germany, September 2019 (pdf)
  17. R. Labaca Castro, C. Schmitt, G. Dreo Rodosek: Applying GAN to Generate Adversarial Malware Examples. Machine Learning Summer School (MLSS) 2019, Moscow, Russia, August 26 - September 6, 2019
  18. R.Labaca Castro, C.Schmitt, G.Dreo-Rodosek: AIMED: Evolving Malware with Genetic Programming to Evade Detection. IEEE 18th International Conference on Trust, Security and Privacy in Computing and Communications, Rotorua, New Zealand, August, 2019 (pdf)
  19. P. Thubert, D. Cavalcanti, X. Vilajosana, C.Schmitt: Reliable and Available Wireless Technologies. IETF Internet Draft, Informational Draft, Fremont, CA, USA, Version 03, draft-thubert-raw-technologies-03, July 2019
  20. R. Labaca Castro, C. Schmitt, G. Dreo Rodosek: Training GANs to Generate Adversarial Examples Against Malware Classification. 40th IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 20, 2019
  21. N.Mäurer, C. Schmitt: Towards Successful Realization of the LDACS Cybersecurity Architecture: An Updated Datalink Security Threat- and Risk Analysis. Integrated Communications, Navigation and Surveillance Conference (ICNS), IEEE, Washington, DC, USA, April 2019 (pdf) - 1st Place - Best Professional Paper Competition
  22. R.Labaca Castro, C.Schmitt, G.Dreo-Rodosek: ARMED: How Automatic Malware Modifications Can Evade Static Detection?. 5th International Conference on Information Management (ICIM), Cambridge, UK, March 2019 (pdf)
  23. R. Labaca Castro, C. Schmitt, G. Dreo Rodosek: AIMED: Genetic Programming to Evade Static Malware Detection. Annual Computer Security Applications Conference, San Juan, Puerto Rico, USA, December 6, 2018
  24. C.Schmitt, Y.Steiner, R.Herzog, N.Terrenghi, and B.Stiller: A 4-step Tool-Chain for IoT Business Model and Sustainability Recommendations. Workshop "Business Model Innovation (BMI) and Socio-Economic Impacts in IoT" at GLOBECOM, Abu Dhabi, United Arab Emirates, pp. 1-6, December 2018 (pdf)
  25. C.Schmitt: Standards und Sicherheitsaspekte von IoT-Netzwerken. Sichere Kommunikation als Basis für IoT, OVEaktuell Schwerpunkt GIT/IoT, Newsletter OVEaktuell, OVE Österreichischer Verband für Elektrotechnik, December 2018
  26. S.Aivalioti, L.Lopez, M. Plociennik, A. Olszewski, C. Schmitt, Y. Steiner, D. Monforte: From Innovative Niches to a Cooperative IoT Ecosystem. 3rd Workshop on Interoperability and Open-Source Solutions for the Internet of Things (InterOSS-IoT 2018), Bilbao, Spain, pp.1-6, June 2018

 

Further publications unter https://corinna-schmitt.de/publications.html