Searched for: author%3A%22Fiebig%2C+T.%22
(1 - 13 of 13)
document
Fiebig, T. (author), Gürses, F.S. (author), Hernandez Ganan, C. (author), Kotkamp, E. (author), Kuipers, F.A. (author), Lindorfer, Martina (author), Prisse, M.M.G.C. (author), Sari, P.T. (author)
With the emergence of remote education and work in universi- ties due to COVID-19, the ‘zoomification’ of higher education, i.e., the migration of universities to the clouds, reached the public dis- course. Ongoing discussions reason about how this shift will take control over students’ data away from universities, and may ulti- mately harm the...
book chapter 2023
document
Kaur, M. (author), Sri Ramulu, Harshini (author), Acar, Yasemin (author), Fiebig, T. (author)
In the system and network administration domain, gender diversity remains a distant target. The experiences and perspectives of sysadmins who belong to marginalized genders (non cis-men) are not well understood beyond the fact that sysadmin work environments are generally not equitable. We address this knowledge gap in our study by focusing on...
journal article 2023
document
Jansen, B.A. (author), Kadenko, N.I. (author), Broeders, Dennis (author), van Eeten, M.J.G. (author), Borgolte, K. (author), Fiebig, T. (author)
In just a few years, the issue of “digital sovereignty” has emerged as an important security issue for governments across the globe, reflecting a growing unease about the security risks associated with government services that depend on foreign service providers for digital infrastructure and traffic routing. This work investigates to which...
journal article 2023
document
Streibelt, Florian (author), Lindorfer, Martina (author), Gürses, F.S. (author), Hernandez Ganan, C. (author), Fiebig, T. (author)
Researchers and practitioners often face the issue of having to attribute an IP address to an organization. For current data this is comparably easy, using services like whois or other databases. Similarly, for historic data, several entities like the RIPE NCC provide websites that provide access to historic records. For large-scale network...
conference paper 2023
document
Binkhorst, V.F. (author), Fiebig, T. (author), Krombholz, Katharina (author), Pieters, Wolter (author), Labunets, K. (author)
With the worldwide COVID-19 pandemic in 2020 and 2021 necessitating working from home, corporate Virtual Private Networks (VPNs) have become an important item securing the continued operation of companies around the globe. However, due to their different use case, corporate VPNs and how users interact with them differ from public VPNs, which are...
conference paper 2022
document
Kaur, M. (author), Parkin, S.E. (author), Janssen, M.F.W.H.A. (author), Fiebig, T. (author)
The ongoing global COVID-19 pandemic made working from home – wherever working remotely is possible the norm for what had previously been office-based jobs across the world. This change in how we work created a challenging situation for system administrators (sysadmins), as they are the ones building and maintaining the digital infrastructure...
journal article 2022
document
Pletinckx, S.R.G. (author), Borgolte, K. (author), Fiebig, T. (author)
Security misconfigurations and neglected updates commonly lead to systems being vulnerable. Especially in the context of websites, we often find pages that were forgotten, that is, they were left online after they served their purpose and never updated thereafter. In this paper, we introduce new methodology to detect such forgotten or...
conference paper 2021
document
Borgolte, Kevin (author), Fiebig, T. (author), Hao, Shuang (author), Kruegel, Christopher (author), Vigna, Giovanni (author)
Infrastructure-as-a-Service (IaaS), and more generallythe “cloud,” like Amazon Web Services (AWS) or MicrosoftAzure, have changed the landscape of system operations on theInternet. Their elasticity allows operators to rapidly allocate anduse resources as needed, from virtual machines, to storage, tobandwidth, and even to IP addresses, which is...
conference paper 2018
document
Borgolte, Kevin (author), Hao, Shuang (author), Fiebig, T. (author), Vigna, Giovanni (author)
Security research has made extensive use of exhaustive Internet-wide scans over the recent years, as they can provide significant insights into the overall state of security of the Internet, and ZMap made scanning the entire IPv4 address space practical. However, the IPv4 address space is exhausted, and a switch to IPv6, the only accepted long...
conference paper 2018
document
Fiebig, T. (author), Borgolte, Kevin (author), Hao, Shuang (author), Kruegel, Christopher (author), Vigna, Giovanni (author), Feldmann, Anja (author)
Reverse DNS (rDNS) is regularly used as a data source in Internet measurement research. However, existing work is polarized on its reliability, and new techniques to collect active IPv6 datasets have not yet been sufficiently evaluated. In this paper, we investigate active and passive data collection and practical use aspects of rDNS datasets.We...
conference paper 2018
document
Thimmaraju, Kashyap (author), Shastry, Bhargava (author), Fiebig, T. (author), Hetzelt, Felicitas (author), Seifert, Jean-Pierre (author), Feldmann, Anja (author), Schmid, Stefan (author)
Virtual switches are a crucial component of SDN-based cloud systems, enabling the interconnection of virtual machines in a flexible and “software-defined” manner. This paper raises the alarm on the security implications of virtual switches. In particular, we show that virtual switches not only increase the attack surface of the cloud, but...
conference paper 2018
document
Shastry, Bhargava (author), Leutner, Markus (author), Fiebig, T. (author), Thimmaraju, Kashyap (author), Yamaguchi, Fabian (author), Rieck, Konrad (author), Schmid, Stefan (author), Seifert, Jean-Pierre (author), Feldmann, Anja (author)
conference paper 2017
document
Fiebig, T. (author), Borgolte, Kevin (author), Hao, Shuang (author), Kruegel, Christopher (author), Vigna, Giovanni (author)
Current large-scale IPv6 studies mostly rely on non-public datasets, asmost public datasets are domain specific. For instance, traceroute-based datasetsare biased toward network equipment. In this paper, we present a new methodologyto collect IPv6 address datasets that does not require access to restrictednetwork vantage points. We collect a new...
conference paper 2017
Searched for: author%3A%22Fiebig%2C+T.%22
(1 - 13 of 13)