Synergy or rivalry? Join us for a dialectical debate on applications in computational biology, healthcare, telco networks, and crypto!
The rapidly advancing fields of artificial intelligence (AI) and quantum computing (QC) stand at the forefront of technological innovation. Each promising to revolutionise industry and society with their unique capabilities. This keynote of the OpenRheinMain conference at the University of Applied Sciences in Darmstadt features a structured dialectical debate between a leading QC expert and an esteemed AI enthusiast. It will be pivoting around the transformative impact these technologies have on various domains, especially on computational biology, healthcare, telecommunications networks, and cryptographic technologies.
By fostering a rigorous exchange of ideas, this session promises to provide valuable insights and stimulate further research into how these cutting-edge technologies can be collaboratively leveraged to push the boundaries of what is computationally possible today.
We invite academics, students, industry professionals to join this enlightening discussion, which promises to not only clarify the capabilities and challenges of AI and QC but also forecast their future trajectories in critical sectors.
Dr. Thomas Ehmer
Healthcare Digital Innovation
Merck KGaA
Thomas is one of the co-founders of the Merck Quantum Computing Task Force (2017) and speaker on internal and external conferences and representing Merck in the Pharma Industry Quantum computing Consortium QuPharm and the Pistoia Quantum Group. He is working group member for Merck Group in QUTAC - the German Quantum Industry applications consortium, exploring Quantum Machine Learning and Optimization as well as evaluating different hardware platforms and which applications / problems qualify best for the different architectures. He is also the lead for a BMBF-funded project to explore quantum computing approaches for Bayesian Network optimization.
Specific to Quantum Technology and Quantum Mechanics, he believes that there is a need to raise “quantum literacy” and that there lies hidden potential in each of its over ten different philosophical interpretations – namely looking at problems with a different quantum thinking approach – i.e. reformulating and looking from a different angle to see where quantum features (entanglement, superposition, non-determinism) offer potential solutions, and in general where “unconventional creativity” could crack the hard nuts.
Thomas has a PhD in physics, with thesis in computational medical biophysics from the University of Heidelberg. Currently he’s exploring the capabilities and gaps of different Large Language Models (LLM) and other Gen AI capabilities for different use cases cross the healthcare value chain.
Dr. Alexander Ebbes
CTO
Xyna.AI
Alexander has been in deep love with machine learning since the days when this was not yet "deep". Besides the inevitable neural networks that have come back into fashion, he enjoys exploring the whole spectrum from genetic algorithms to symbolic intelligence. Alexander's interests range from the mathematical foundations of AI and machine learning to algorithms, hardware and real-world scenarios with practical benefits. His main area of application for AI is telecommunication networks. There are a variety of applications such as topology optimisation, segment routing, performance prediction, and energy savings that benefit from advanced analytics.
Alexander holds a PhD in physics, with a thesis on model building and parallel computing from the University of Mainz. Alexander holds a couple of granted patents, which bridges innovative spirit and professionalism. In his main job he is CTO for Xyna Factory, an open-source platform for telco network automation. Xyna.AI is a rather new startup within the Xyna family of products, building a community for souverain AI researchers and practitioners that want to focus on the essentials.
Besides his professional targets Alexander has a strong commitment to sharing knowledge and insights. This is evident in his regular contributions to conferences and LinkedIn, where he engages a wide audience with thought-provoking content on networking and AI. Additionally, he is deeply invested in the cultivation of future talent. In the German Physical Society's (DPG) mentoring program, he likes to guide aspiring young professionals towards fulfilling careers in the industry. Alexander's passion for organising hackathons shows his belief that it is important to be a maker and not just a user.
Bei der Einführung von DefectDojo könnte man meinen, dass damit alle Probleme des Schwachstellenmanagements gelöst sind. Ob dem so ist, wird in diesem Vortrag beantwortet.
Behandelt wird die Einführung des Dojos in der Organisation der InfraGo AG, mit allen Höhen und Tiefen. Auch die Integration in die bestehende Toollandschaft wird beleuchtet.
Dazu gehören technische Hürden, organisatorische Anpassungen und die Optimierung der Sicherheitsprozesse. Der Vortrag bietet praxisnahe Einblicke und Best Practices für die erfolgreiche Einführung von DefectDojo in anderen Organisationen.
Tim Stoffel ist Security Engineer bei der DB InfraGo. In der Vergangenheit war er auch als Pentester und ProductOwner unterwegs. In seiner Freizeit backt er gerne Brot und optimiert seinen Espresso Flow.
Die XZ Schwachstelle ist ein faszinierendes und zugleich alarmierendes Beispiel für die Risiken in der Open Source Entwicklung. Während Open Source Projekte oft als Paradebeispiel für Innovation und Gemeinschaftsarbeit gefeiert werden, birgt diese Offenheit auf der anderen Seite auch potenzielle Angriffsvekoren. Macht das aber Open Source aus der Security-Perspektive wirklich unsicherer als einen Closed Source Ansatz?
Mit dieser Fragestellung beschäftigen wir uns in diesem Vortrag. Wir analysieren dafür die XZ Schwachstelle und die für die Erzeugung ausgenutzten Angriffsvektoren. Diese zeigen auf eindrucksvolle Weise, wie böswillige Akteure den offenen Entwicklungsprozess ausnutzen konnten, um Schadcode einzuschleusen. Im zweiten Schritt betrachten wir, wie die Schwachstelle aufgedeckt und geschlossen werden konnte und hinterfragen insgesamt, ob die Transparenz und Zugänglichkeit des Quellcodes ein Vorteil oder ein Nachteil aus der Security-Perspektive war.
Danijels Interesse an Security begann mit dem Herunterladen einer Trojaner-infizierten Firewall.exe vor 30 Jahren und die anschließende wutentbrannte Suche nach dem 'Hacker'. Auf diesem Weg studierte er Wirtschaftsinformatik, forschte ein wenig zu evidenzbasiertem Informationssicherheitsmanagement und fand seinen Weg über Banken und Beratungen schließlich zur DB InfraGO, wo er das Security Engineering leiten darf.
Stellen Sie sich vor: keine Notizen mehr mit kryptischen Kombinationen auf einem zerknitterten Zettel in der Handyhülle, keine endlosen “Passwort vergessen”-Schleifen und vor allem keine komplizierten, nervenaufreibenden Sicherheitsfragen mehr. Stattdessen betreten wir das Zeitalter der Passkeys – die elegante Lösung für alle, die bei der Authentifizierung gerne die 1960er verlassen wollen.
Unser Fokus liegt auf einer besonderen Herausforderung: Wie ermöglichen wir einem nicht IT-affinen Nutzerkreis eine starke Authentifizierung, die so einfach und intuitiv ist, dass man keine Bedienungsanleitung braucht? Genau hier kommen die Passkeys ins Spiel. Sie machen den Passwort-Stress überflüssig und bieten gleichzeitig höchste Sicherheit.
Erfahren Sie, wie wir in unserer mobilen App die passwortbasierte Authentifizierung erfolgreich durch Passkeys ersetzt haben und damit nicht nur die Sicherheit erhöht, sondern auch die Benutzerfreundlichkeit massiv verbessern konnten. Anekdoten aus dem Design- und Entwicklungsprozess sind inklusive.
André König ist Security Engineer bei der DB InfraGO AG. Er konzipiert IT Security Lösungen für das Unternehmen und berät IT Architekten und Entwicklungsteams bei der Umsetzung von Security-Anforderungen.
Complex programs written in memory-unsafe languages tend to contain memory corruption bugs. Adversaries commonly employ code-reuse attacks to exploit these bugs. Control-flow Integrity (CFI) enforcement schemes try to prevent such attacks from achieving arbitrary code execution. Developers can apply these schemes to existing code bases by setting compiler flags, requiring less effort than rewriting code in memory-safe languages. In this talk, we discuss CFI solutions that are used in practice in real-world systems. We describe how currently deployed CFI schemes work, where they are used, and what their weaknesses are. Furthermore, we plan to present some examples of how CFI mitigations have been bypassed in recent exploits.
Lucas Becker is a PhD researcher in the area of software security and privacy, from the SEEMOO group at the TU Darmstadt.
Im Rahmen des Vortrags werden zwei Projekte vorstellen, die das Potenzial von BigBlueButton (BBB) durch den Einsatz von Bots erweitern. Beide Projekte befinden sich derzeit in der Entwicklungsphase, und es stehen funktionsfähige Demoversionen zur Verfügung, die die Möglichkeiten dieser Technologien aufzeigen.
Das erste Projekt ist ein prototypischer API Wrapper, geschrieben in Go, der entwickelt wurde, um mit den Backend-APIs von BigBlueButton zu interagieren, ohne dass ein headless Browser erforderlich ist. Das Ziel ist es, einen leistungsfähigen Bot zu erstellen, der in der Lage ist, alle Funktionen eines regulären BBB-Benutzers zu nutzen. Dieser API Wrapper ermöglicht die Integration verschiedener Bot-Typen in BBB, ohne die bestehende Infrastruktur zu verändern. Derzeit unterstützt er Funktionen wie Chat, Untertitel und die Teilnahme an Audio-Kanälen.
Das zweite Projekt nutzt den API Wrapper, um Echtzeit-Transkriptions- und Übersetzungsdienste bereitzustellen, die das Ziel haben Sprachbarrieren zu überwinden und Nutzern mit Beeinträchtigung beim Hören zu helfen. Dieser Bot verwendet OpenAIs Whisper AI, selbst gehostet unter der MIT-Lizenz, um gesprochene Worte in Text zu transkribieren und ins Englische zu übersetzen. Diese Übersetzungen werden in die Untertitelfunktion von BBB integriert, was die Kommunikation während der Meetings erheblich verbessert. Der Datenschutz steht im Mittelpunkt, um den Schutz aller Nutzer zu gewährleisten.
Darüber hinaus gibt es Ideen für andere Bots, die auf dem BigBlueButton Bot API Wrapper basieren, wie zum Beispiel ein Musik-Bot, ein Frage-Sammel-Bot oder ein KI-Lernassistent-Bot. Insbesondere der KI-Lernassistent-Bot könnte Studenten unterstützen, indem er personalisierte Anleitung bietet und interaktive Lernaktivitäten in BBB integriert, ohne direkt Antworten zu liefern.
Julian arbeitet als dualer Student Hochschule Darmstadt bei COUNT+CARE, auch bekannt als entega. Im dortigen IT-Lab baut und programmiert er zusammen mit Auszubildenden und Studenten alle möglichen Prototypen. Zurzeit konzentriert er sich auf das Schreiben meiner Bachelorarbeit. Wenn er nicht mit der Uni beschäftigt bin, trifft er sich gerne mit Freunden, spielt Badminton und geht Stand-Up-Paddeln.
Acceptance of AI systems is at a crossroads: Without careful evaluation by scientists and ethicists, there is a risk that generative outputs face rejection. It is therefore crucial to develop AI systems in a safe, trustworthy, and ethically responsible way to ensure their acceptance and longevity. This talk will highlight the significance of incorporating responsible values into AI system development — a practice that not only benefits society, but also creates business opportunities. Leveraging the framework provided by Microsoft's Responsible AI standard, we will showcase interactive methods to facilitate the integration of these values into AI projects. Participants will learn hands-on workshop techniques to
and thereby explore the strategic advantage of responsible design in AI system development. MaibornWolff GmbH is at the forefront of responsible AI implementation, fostering the understanding of AI's impact expected of a forward-thinking consultancy. This talk will provide insights into how MaibornWolff actively integrates responsible design practices as a core competency within its teams, and how this competency can be leveraged for business advantage.
Paul-Anton Gerlitz graduated with a BSc in Computer Science in 2023 from Hochschule Darmstadt. He is currently enrolled in a Master's program. He works as an IT consultant at MaibornWolff GmbH with a focus on requirement engineering and project management.
In a team of software engineers, every code should be reviewed one way or another. Maybe through pair programming, maybe through pull requests. But what if we get stuck in tiny nit-picky things like semi-colons, or indentation? What if we could automate part of our code reviews?
What if we could detect all the tiny issues with our code, and fix them even before anyone else had a look at the code.
These are the things that eslint can do for you. It can find potential bugs, fix them for you, enforce code style. There are preset configurations that allow you an easy startup with best practices. But it is very flexible and can be tailored to your own needs.
In this talk, we will learn how to set up eslint with basic preset. We will also learn how it works and how we use lesser known rules to fill our specific needs and see how to write our own rules if necessary.
Nils has been writing code since he was a child and has been working as a web-developer since 2007. His passion is clean code, automated testing, CI/CD and TypeScript.
Fifth-generation (5G) mobile networks are becoming increasingly important in everyday life, enabling mission-critical applications such as smart manufacturing and autonomous driving. To this end, mobile networks need to be well protected against security attacks. In this talk, we will discuss recent attacks on 5G infrastructure, namely 5Ghoul and Smart Jamming. We will see how these attacks work, will review experimental evidence, and will discuss mitigation techniques. Then, we will present a powerful approach that combines physical layer security and machine learning. This method is then demonstrated live, showing how our Wireless Intrusion Prevention System (WIPS) immediately detects and disrupts an attack on an operating 5G network. Finally, we will discuss further research to remove threats from already deployed 5G networks and to harden mobile networks against new threats in the advent of 6G.
This talk will present research that has been supported by the German Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik, BSI) within the project ADWISOR5G.
Stefan Valentin is Professor for Mobile Networks at the Darmstadt University of Applied Sciences, where he also serves as chairman of the examination board and speaker of the Telecommunications Group. His research contributed mostly to indoor localization and resource allocation in mobile networks. Stefan’s algorithms are deployed in mobile networks around the world and more than 30 patent applications have been filed for them. His research papers have received various awards. Stefan is a member of the IEEE, founded the Steinbeis Center for Wireless Technologies and co-founded the startup Industrial Radio Systems.
Dieser Vortrag richtet sich an Entwickler und Anwender, die sich für Open Source Lösungen, Hausautomation und Energieeffizienz interessieren. Vorgestellt wird die Entwicklung einer intelligenten Hausautomatisierung auf FreeBSD, unter Einsatz von Home Assistant, Apache Kafka und Opensearch. Die Session zeigt, wie verschiedene Open Source Komponenten nahtlos zusammenarbeiten, um ein vollständig digital gesteuertes Haus zu schaffen, das sowohl energieeffizient als auch komfortabel ist. Dabei werden die Vorteile und Herausforderungen der Integration dieser Technologien beleuchtet und praktische Tipps zur Implementierung gegeben. Teilnehmer erfahren aus erster Hand, wie durch den Einsatz dieser Lösungen Kosteneinsparungen und ein höherer Wohnkomfort erreicht werden können.
Sven ist ein Data Science Student mit mehr als zehn Jahren Erfahrung im Bereich Open Source, insbesondere in den Bereichen Linux, BSDs und Big Data Technologien. Sein Schwerpunkt liegt auf der Integration und Entwicklung von Open Source Lösung, sowie im Bereich Big-Data Technologien.
In the rapidly evolving world of DevOps, mastering Infrastructure as Code (IaC) is crucial for achieving seamless automation and efficient resource management across both cloud and on-premises environments. This session will elevate your DevOps practice by diving into essential IaC principles and advanced techniques. We'll explore industry-leading tools like Terraform and Ansible to automate and manage infrastructure across AWS, Azure, and GCP.
You'll learn how to integrate IaC with CI/CD pipelines, ensuring the continuous delivery and deployment of applications and provision and management of IT infrastructure with confidence. Additionally, we'll cover containerization using Docker, Kubernetes, and Helm, and delve into GitOps methodologies with tools like ArgoCD and FluxCD. Through practical examples, you'll gain insights into building, deploying, and managing complex infrastructures with ease, becoming an Infra-as-Code Automation Ninja ready to tackle any challenge in the DevOps landscape.
Vincent Camacho is a Senior Consultant at ALTEN GmbH, a leader in Engineering and IT Services. Vincent is a seasoned Senior DevOps Engineer and Solutions Architect with 15 years of international experience spanning multiple countries, including France, Germany, and The Netherlands. His expertise encompasses a wide range of areas such as Site Reliability Engineering (SRE), DevOps, Cloud Computing, IT Architecture, and Datacenters. His work in Automation and Infrastructure-as-Code has been pivotal in driving the successful adoption of DevOps methodologies and significantly enhancing Cloud infrastructures across diverse teams, projects, and industries.
He possesses a comprehensive skill set that includes architectural design, programming/coding, system administration, databases, networking, security and more. This diverse expertise has enabled him to lead complex projects from inception to delivery at major international companies such as ALTEN, ZEISS, AIRBUS, ATOS, and many others. Vincent excels at integrating and adapting various technologies to solve complex IT challenges, demonstrating exceptional problem-solving skills, a commitment to continuous learning, and a deep passion for exploring and mastering new technologies.
To ensure safe and efficient railroad operations, European railway infrastructure companies maintain extensive communication networks. Traditionally, these networks relied on technologies specifically designed for the rail industry. However, in recent years, the trend has shifted towards using standardized and widely adopted technologies, with a particular focus on IP-based solutions.
In this presentation, we will explore the role of IP-based communication in railway operations, discussing the background, challenges, requirements, and opportunities that come with its adoption. We will also provide insights into current and future projects and applications in this area.
Ferdinand von Tüllenburg is an expert in communication systems for critical infrastructures. Since 2023, he has been working at InfraGO AG, the German railway infrastructure operator, where his primary focus is on developing and implementing an all-IP network for railway operations. Prior to joining InfraGO, he accumulated over 10 years of research experience, with a strong emphasis on communication in critical infrastructures and distributed systems.
Large scale telco networks are expected to provide uninterrupted service for private as well as commercial applications. Thus it is vital that they are monitored in real-time to detect and resolve issues as soon as possible. This is a demanding task for operations teams and would be all but impossible without the help of automated tools.
In this talk, we will see how statistical methods help operators by detecting anomalies in a stream of logs and metrics. Models are trained in an unsupervised setting to fit the distribution of input data over time. These are used to mark low probability events as outliers and assign them a degree of severity. Anomalies are annotated and correlated with information from neighbouring systems. We will see examples of how such domain knowledge about the network hierarchy can help operators to track down the underlying root cause.
Volker Schmidt is a Data Engineer and Mathematician at UNIBERG GmbH. The focus of this work is on statistical modelling, outlier detection and Real-time Data Analytics.
Private 5G networks are based on the same technologies that have been used to build mobile networks for 30 years. User devices typically use SIM card technology for authentication in both private and public networks.
The ongoing shift towards eSIM technology presents new challenges for operators of private 5G networks, especially in constellations where devices are expected to connect to multiple different 5G networks.
This presentation aims to explain the basics of the technology, the challenges in addressing these issues and possible solutions.
David Bauer is working as Software Developer at UNIBERG GmbH. He is working on innovative Products in the Field of 5G and other Networking Technologies. In his free time, he is actively contributing and maintaining various network-centric Open Source projects.
According to the authors of "Continuous Delivery" poor version control practices are one of the most common barriers to fast, low-risk releases.
Many teams treat using feature branches as best practice. What they often don't realize is that using this kind of version control practice even hinders Continuous Integration and leads to Continuous Isolation.But, what's the alternative. The most promissing one in terms of CI/CD is Trunk Based Development. I will show why this strategy makes sense and how to tackle common problems.
Konstantin Diener is CTO at cosee. He has been developing software for more than 20 years. His CTO role made him shift his focus to (agile) leadership topics and to Product Management eventually.
Konstantin speaks at conferences and was author of „DevOps Stories“, a column about culture, leadership, agile and DevOps.
The workshop session dives into the transformative impact of TM Forum's Open APIs on telecommunications service providers. This session will explore how these standardized RESTful OAS-interfaces streamline Business Support Systems (BSS) and Operations Support Systems (OSS) integration, enabling seamless interoperability across diverse IT landscapes. Attendees will gain insights into the benefits of adopting these APIs, including reduced integration complexity, faster time-to-market for new services, and enhanced operational efficiency. Finally, it is shown how easy it is to implement such APIs with a workflow automation platform such as Xyna Factory.
Dr. Sascha Krause works as a senior consultant in the Telco OSS Advisory / Xyna Application Development at GIP Exyr GmbH. He holds a doctorate in physics and, before his industrial career, worked at the PRISMA Cluster of Excellence (Precision Physics, Fundamental Interactions and Structure of Matter). In recent years, he has focused on the further development of demanding OSS applications for leading telco providers.
With the launch of first Raspberry Pi in 2011, the adaption of the Linux running on ARM has transformed the computing landscape. While compute environments have been traditionally dominated by x86 hardware, Linux on ARM nowadays has paved the way for advancements in industrial and edge computing, energy-efficient notebooks and is now becoming increasingly relevant for cloud and general-purpose computing. However, unlike the standardised boot process and broad upstream Linux kernel supporting commodity x86 systems, the ARM64 ecosystem still faces fragmentation
In this session, we will explore the state of ARM64 as Linux computing platform and examine Kubernetes as a modern platform for energy-efficient edge computing. We will begin by delving into the low-level boot process of the BCM2711, which powers the RaspberryPi 4, and gradually work our way up to deploying and managing a fully operational Kubernetes cluster on ARM64 hardware.
Matthias Riegler is a Senior Staff Engineer at Ankorstore, specialising in scalable and reliable software architecture and the evolution of internal platforms. He holds a Master's degree in Communications Engineering and began his career as embedded developer for flight control systems. In 2017, he discovered Kubernetes, which has since become integral to his work. For the Compute-Blade kickstarter project, he contributed to low-level hardware abstractions and prepared strategies for operating a fleet of RaspberryPis in a production-like environment.
Modern cars are complex networks of computers on four wheels. For security research, it is important to understand the car's internal network and exposed interfaces. But what else can you use this knowledge for? You probably guessed it from the title. So we developed a tool to turn our research car into a game controller.
In this talk, we will present Vehicle-to-Game (V2G), a Python-based project that enables the use of cars as game controllers. V2G can either run directly on a laptop or turn a Raspberry Pi Zero WH into a Bluetooth gamepad. In addition, V2G can be used either through the OBD2 diagnostic port or by directly accessing the car's internal CAN busses.
Our project can be a great starting point if you ever wanted to tinker with your car or learn about the CAN bus or diagnostic communication (UDS). Getting V2G to work with your car will require some reverse engineering of CAN messages or diagnostic communication (as well as additional hardware to connect to the CAN bus). Otherwise, if you can get this to work, you can be sure that you have a more expensive game controller than your neighbors.
Timm Lauser received his master's degree in Computer Science from Karlsruhe Institute of Technology, Germany in 2020. Since then, he is a PhD student at Darmstadt University of Applied Sciences, Germany. There, he is researching in the field of automotive cyber security with a focus on communication protocols and their formal verification in the symbolic model.
Jannis Hamborg received his master's degree in Computer Science with a focus on IT-security from the Technical University of Darmstadt, Germany, in 2023. He wrote his master thesis about resilient and self-healing reputation-based networks. In parallel, he worked as a research assistant at the University of Applied Sciences Darmstadt, Germany on various topics of automotive security research. Since the end of 2023, he started his PhD on the design and integration of resilient risk-driven networks with a focus on internal automotive networks.
Both are members of the Applied Cyber Security Darmstadt (ACSD) research group specialized in the protection of IT systems and applications in the fields of automotive, railway, computer networks, embedded systems, IoT and cloud.
Willkommen zu einem Einblick in die aufregende und moderne Welt der Software-Entwicklung bei einer Bank! Ja, Sie haben richtig gelesen – "aufregend", "modern" und "Banken" können tatsächlich in einem Satz vorkommen. In diesem Vortrag präsentiere ich unser aktuelles Projekt, in dem wir eine Cloud Native Anwendung nach dem Domain-Driven Design (DDD) Ansatz entwickeln. Unser technischer Stack besteht aus Vue.js für moderne und interaktive Frontends, Spring Boot für robuste und skalierbare Backends, Apache Kafka für zuverlässige Nachrichtenvermittlung und PostgreSQL als leistungsstarke Datenbanklösung. Durch den Einsatz von DevOps-Praktiken wie Continuous Integration und Continuous Delivery (CI/CD) gewährleisten wir eine effiziente und reibungslose Software-Bereitstellung. Mit dem Scrum-Framework als Grundlage arbeiten wir in einem agilen und flexiblen Umfeld, das die Dynamik und den Innovationsgeist eines Startups mit der Stabilität und Sicherheit einer Bank verbindet. Kommen Sie zu dem Vortrag und entdecken Sie, wie viel Spaß und Kreativität in der modernen Banken-IT steckt.
Yuriy Korolenko ist Software-Architekt bei der DekaBank. Er arbeitet seit mehreren Jahren in der Finanzbranche und hat diese auf ihrem IT-Weg von Mainframes bis zu Cloud mitgestaltet.
Im Rahmen dieses Vortrags werden Begriffe wie Clearnet, Deepnet und Darknet vorgestellt. Das Darknet wird im Zuge einer kleinen Live Session erkundet. Außerdem wird der Kontext hergestellt, wieso das Darkent Einfluss auf das Thema IT-Sicherheit hat. Was für relevante Themen befinden sich im Darknet? Ist das Darkent prinzipiell schlecht oder hat es auch Vorteile?
Pascal Umland und Holger Hofmann sind 3rd Level Analyst und Head of SOC DekaBank
Bei ChipMixer handelte es sich um den bis dato größten, zentralisierten Mixing Dienst für Kryptowährungen, der von den Betreibern als besonders sicher beworben war. Der Dienst wurde von Kriminellen (Ransomwaregruppierungen, Betreibern von Darknetmarktplätzen etc.) genutzt, um die Herkunft von durch kriminelle Handlungen erlangten Geldern zu verschleiern. Der Vortrag stellt dar, wie es dem BKA im Jahr 2023 gelungen ist die technischen Infrastrukturen aufzuspüren, zu sichern und dauerhaft abzuschalten. Schlüssel zum Erfolg war die enge Zusammenarbeit zwischen Ermittlern und IT-Spezialisten. Welche Rolle IT-Experten in Cybercrime Ermittlungen spielen und welche Betätigungsmöglichkeiten das BKA solchen Spezialisten bietet wird ebenfalls dargelegt.
Tim Anders arbeitete als dualer Student bei SAP und studierte Wirtschaftsinformatik mit Fachrichtung Software Engineering an der DHBW Mannheim. Anschließend absolvierter er ein Masterstudium im Breich Maschinelles Lernen an der Hochschule Karlsruhe. Seit 2022 arbeitet Tim beim BKA im Bereich Cybercrime.
LoRaWAN ist ein Niedrigenergie-Funkstandard, der für die drahtlose Kommunikation über große Entfernungen und lange Zeiträume geeignet ist. Er ermöglicht eine sichere Übertragung von Sensordaten dank einer Ende-zu-Ende-Verschlüsselung. In Südhessen wurde eine umfassende LoRaWAN-Infrastruktur aufgebaut, die sowohl der Stadt als auch der Umgebung bei der Implementierung und dem Betrieb solcher Netzwerke unterstützt.
IoT-Lösungen, die auf LoRaWAN basieren, finden Anwendung in Bereichen wie Smart Cities, Umweltmonitoring, Smart Buildings und Asset Tracking. Beispiele hierfür sind intelligente Abfallentsorgungssysteme (Smart Waste) und Parkplatzmanagement (Smart Parking). Zudem ermöglicht die Technologie die Prozessoptimierung durch Zustandsüberwachung und vorausschauende Wartung (Predictive Maintenance) mittels Retrofit-Adaptern. Diese IoT-Anwendungen tragen zur Verbesserung der städtischen Infrastruktur und der Lebensqualität bei, indem sie eine effiziente Datennutzung und datengestützte Entscheidungsfindung ermöglichen.
Antonio Jorba ist Diplom-Informatiker und IT-Ausbilder. Er hat sein Studium in Darmstadt absolviert und engagiert sich seit rund 30 Jahren in sozialen und kulturellen Projekten. Bei der COUNT+CARE ist er für die Ausbildung junger IT-Talente verantwortlich, leitet ein IT-Labor und entwickelt gemeinsam mit diesen Talenten innovative Projekte für die Region. Ein besonderes Anliegen ist ihm die Verbindung von Kunst, Kultur und Informatik.
As organizations migrate their infrastructure to cloud providers like Amazon Web Services (AWS), access control becomes crucial for securing resources. Defining policies manually and balancing between over-privileging and under-privileging are significant challenges. This talk introduces an automated approach for generating least privilege access control policies using Infrastructure as Code (IaC) from Terraform. By deriving resource-based policies directly from the desired infrastructure definitions, the method ensures permissions are minimized to the required level. The approach can be fully integrated into GitLab CI/CD, enabling seamless policy deployment alongside the infrastructure they protect.
Julian is a Software Developer at core sensing GmbH in Darmstadt and just finished his masters degree at Darmstadt University of Applied Sciences.
Thanks to all participants, sponsors and speakers who made the OpenRheinMain Conference a great event! We are looking forward to welcoming you again in 2024.
Here are some impressions of the OpenRheinMain 2023:
Hochschule
Darmstadt
Fachbereich
Informatik
Schöfferstraße
3
64295
Darmstadt
Anschrift
Hochschule Darmstadt
University of Applied
Sciences
Haardtring
100
64295
Darmstadt
Tel.: +49.6151.533-5000
E-mail: info@h-da.de
Verantwortlich für den Inhalt
Für die angebotenen Inhalte sind die jeweiligen Personen verantwortlich.
Freistellungserklärung
Die Angaben wurden nach bestem Wissen erstellt, Fehler können jedoch nicht mit letzter Sicherheit ausgeschlossen werden. Rechtlich verbindlich sind ausschließlich die Festlegungen in den einschlägigen Rechtsgrundlagen (Gesetze, Verordnungen, Satzungen).
Für die Verarbeitung personenbezogener Daten im Rahmen unseres Angebots gilt die Datenschutzerklärung der Hochschule Darmstadt