Lukas Beierlieb

ORCID: 0000-0003-2512-9292
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software System Performance and Reliability
  • Cloud Computing and Resource Management
  • Software-Defined Networks and 5G
  • Network Security and Intrusion Detection
  • Cryptography and Data Security
  • Software Engineering Research
  • IoT and Edge/Fog Computing
  • Anomaly Detection Techniques and Applications
  • Teaching and Learning Programming
  • Time Series Analysis and Forecasting
  • Security and Verification in Computing
  • Network Packet Processing and Optimization
  • Computational Physics and Python Applications
  • Quantum Computing Algorithms and Architecture
  • Ferroelectric and Negative Capacitance Devices
  • Green IT and Sustainability
  • Educational Technology and Assessment
  • Security in Wireless Sensor Networks
  • Advanced Data Storage Technologies
  • Cryptographic Implementations and Security
  • Chaos-based Image/Signal Encryption
  • Semiconductor Lasers and Optical Devices
  • Thin-Film Transistor Technologies
  • Cryptography and Residue Arithmetic
  • Complexity and Algorithms in Graphs

University of Würzburg
2019-2024

Rostocker Zentrum zur Erforschung des Demografischen Wandels
2022

Virtual Machine Introspection (VMI) is a powerful technology used to detect and analyze malicious software inside Machines (VMs) from outside. Asynchronously accessing the VM’s memory can be insufficient for efficiently monitoring what happening of VM. Active VMI introduces breakpoints intercept VM execution at relevant points. Especially frequently visited breakpoints, it crucial keep their performance overhead as small possible. In this paper, we provide an systematization existing...

10.20944/preprints202501.0111.v1 preprint EN 2025-01-03

Virtual Machine Introspection (VMI) is a powerful technology used to detect and analyze malicious software inside (VMs) from outside. Asynchronously accessing the VM’s memory can be insufficient for efficiently monitoring what happening of VM. Active VMI introduces breakpoints intercept VM execution at relevant points. Especially frequently visited breakpoints, even more so production systems, it crucial keep their performance overhead as low possible. In this paper, we provide...

10.3390/electronics14030534 article EN Electronics 2025-01-28

Attack-awareness recognizes self-awareness for security systems regarding the occurring attacks. More frequent and intense attacks on cloud network infrastructures are pushing to limit. With end of Moore's Law, merely scaling against these is no longer economically justified. Previous works have already dealt with adoption Software-defined Networking Network Function Virtualization in used both approaches optimize performance by intelligent placement functions. In our previous works, we made...

10.1109/acsos-c51401.2020.00055 article EN 2020-08-01

This paper compares the performance of R, Python, and Rust in context data processing tasks. A real-world task form an aggregation benchmark measurement results was implemented each language, their execution times were measured. The indicate that while all languages can perform tasks effectively, there are significant differences performance. Even same code showed runtime depending on interpreter used for execution. Python most efficient, with R requiring much longer times. Additionally,...

10.1145/3578245.3584691 article EN 2023-04-03

In many Internet-of-Things (IoT) scenarios - such as smart home, or intelligent traffic systems groups of devices interact with each other. Such no longer require encryption for individual recipients but recipients, i.e., this is a shift towards 1-to-n and n-to-n schemes. Developers must select the scheme that (1) offers required functional features, (2) has non-functional requirements best fitting specific use case, (3) most performant in group setting. other research domains, benchmarks...

10.1109/ciot53061.2022.9766494 article EN 2022-03-28

Quantum Computing threatens security of today's systems. Confidence in technologies largely relies on Public Key Cryptography (PKC), which depends computational difficulty mathematical problems that cannot be solved efficiently using any technology available today. This will, however, change once a sufficiently capable quantum computer will become available. Similarly, symmetric crypto algorithms also substantially weakened. Current progress research proves is no longer science fiction....

10.1109/ipccc51483.2021.9679412 article EN 2021-10-29

As the market for cloud computing continues to grow, an increasing number of users are deploying applications as microservices. The shift introduces unique challenges in identifying and addressing performance issues, particularly within large complex infrastructures. To address this challenge, we propose a methodology that unveils temporal deviations microservices by clustering containers based on their characteristics at different time intervals. Showcasing our Alibaba dataset, found both...

10.1145/3629527.3651843 article EN other-oa 2024-05-07

Cyberattacks have become more frequent and violent in recent years. To date, defensive infrastructure has been relatively static, security functions are usually placed a common order that does not depend on the current situation. We propose concept of attack-aware Security Service Function Chain reordering. The idea is to change depending malicious traffic observed. present basic idea, evaluate impact function chain order, introduce framework for Our evaluation shows often significant...

10.3390/electronics13173357 article EN Electronics 2024-08-23

With the continuing rise of cloud technology hypervisors play a vital role in performance and reliability current services. As long-running applications, they are susceptible to software aging. Hypervisors offer so-called hypercall interfaces for communication with hosted virtual machines. These require thorough robustness assure performance, security, reliability. Existing research either deals aging properties general without considering hypercalls or focusses on finding related...

10.1109/issrew.2019.00075 article EN 2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) 2019-10-01

Performance regression testing is a foundation of modern DevOps processes and pipelines. Thus, the detection change points, i.e., updates or commits that cause significant in performance software, special importance. Typically, validating potential points relies on humans, which considerable bottleneck costs time effort. This work proposes solution to classify detect automatically. On test data set provided by MongoDB, our approach classifies with an AUC 95.8% accuracy 94.3%, whereas...

10.1145/3491204.3527486 article EN 2022-07-14

Stable and repeatable measurements are essential for comparing the performance of different systems or applications, benchmarks used to ensure accuracy replication. However, if corresponding not stable repeatable, wrong conclusions can be drawn. To facilitate task determining whether similar, we a data set 586 micro-benchmarks (i) analyze itself, (ii) examine our previous approach, (iii) propose evaluate heuristic. approaches, perform peer review assess dissimilarity benchmark runs. Our...

10.1145/3578245.3584693 article EN 2023-04-03

Attack-awareness recognizes self-awareness for security systems regarding the occurring attacks. More frequent and intense attacks on cloud network infrastructures are pushing to limit. With end of Moore's Law, merely scaling against these is no longer economically justified. Previous works have already dealt with adoption Software-defined Networking Network Function Virtualization in used both approaches optimize performance by intelligent placement functions. However, not yet considered...

10.48550/arxiv.2005.08364 preprint EN other-oa arXiv (Cornell University) 2020-01-01

With the continuing rise of cloud technology hypervisors play a vital role in performance and reliability current services. As long-running applications, they are susceptible to software aging. Hypervisors offer so-called hypercall interfaces for communication with hosted virtual machines. These require thorough testing ensure their long-term reliability. Existing research deals aging properties general without considering hypercalls. In this work, we share our experience that collected...

10.1109/issrew53611.2021.00043 article EN 2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) 2021-10-01
Coming Soon ...