Tobias Hoppe

Learn More
The IT security of automotive systems is an evolving area of research. To analyse the current situation and the potentially growing tendency of arising threats we performed several practical tests on recent automotive technology. With a focus on automotive systems based on CAN bus technology, this article summarises the results of four selected tests(More)
In the last decade, automotive systems changed from traditional mechanical or mechatronical systems towards software intensive systems, because more and more functionality has been implemented by software. Currently, this trend is still ongoing. Due to this increased use of software, more and more data accumulates and thus, has to be handled. Since it was(More)
BACKGROUND Adverse drug reactions are one of the most common causes of death in industrialized Western countries. Nowadays, empirical data from clinical studies for the approval and monitoring of drugs and molecular databases is available. METHODS The integration of database information is a promising method for providing well-based knowledge to avoid(More)
Drugs are essential for the prevention and treatment of diseases. However, co-administration of multiple drugs may cause serious adverse drug reactions, which are usually known but sometimes unknown. Package inserts of prescription drugs are supposed to contain risks and side effects, but such information is not necessarily complete. At the core of efforts(More)
Enterprise information infrastructures are generally characterized by a multitude of information systems which support decision makers in fulfilling their duties. The object of information security management is the protection of these systems, whereas security information and event management (SIEM) addresses those information management tasks which focus(More)
Modern cars offer an increasingly powerful multimedia environment. While also the potential for an application as human computer interface (HCI) is growing, in this paper we concentrate on already existing possibilities for their use as computer-human-interface (CHI) to communicate system security related information to the driver. After identifying the(More)
In this paper we show how to extract graphics content within a memory dump of a Windows-based system. This includes the assurance of integrity and authenticity of evidence gathered this way using cryptographic mechanisms. We introduce a forensic data model and investigate different forensic analysis steps within a phase-oriented manner to classify potential(More)