Searched for: author%3A%22Fiebig%2C+T.%22
(1 - 7 of 7)
document
Pletinckx, S.R.G. (author), Borgolte, K. (author), Fiebig, T. (author)
Security misconfigurations and neglected updates commonly lead to systems being vulnerable. Especially in the context of websites, we often find pages that were forgotten, that is, they were left online after they served their purpose and never updated thereafter. In this paper, we introduce new methodology to detect such forgotten or...
conference paper 2021
document
Borgolte, Kevin (author), Fiebig, T. (author), Hao, Shuang (author), Kruegel, Christopher (author), Vigna, Giovanni (author)
Infrastructure-as-a-Service (IaaS), and more generallythe “cloud,” like Amazon Web Services (AWS) or MicrosoftAzure, have changed the landscape of system operations on theInternet. Their elasticity allows operators to rapidly allocate anduse resources as needed, from virtual machines, to storage, tobandwidth, and even to IP addresses, which is...
conference paper 2018
document
Borgolte, Kevin (author), Hao, Shuang (author), Fiebig, T. (author), Vigna, Giovanni (author)
Security research has made extensive use of exhaustive Internet-wide scans over the recent years, as they can provide significant insights into the overall state of security of the Internet, and ZMap made scanning the entire IPv4 address space practical. However, the IPv4 address space is exhausted, and a switch to IPv6, the only accepted long...
conference paper 2018
document
Thimmaraju, Kashyap (author), Shastry, Bhargava (author), Fiebig, T. (author), Hetzelt, Felicitas (author), Seifert, Jean-Pierre (author), Feldmann, Anja (author), Schmid, Stefan (author)
Virtual switches are a crucial component of SDN-based cloud systems, enabling the interconnection of virtual machines in a flexible and “software-defined” manner. This paper raises the alarm on the security implications of virtual switches. In particular, we show that virtual switches not only increase the attack surface of the cloud, but...
conference paper 2018
document
Fiebig, T. (author), Borgolte, Kevin (author), Hao, Shuang (author), Kruegel, Christopher (author), Vigna, Giovanni (author), Feldmann, Anja (author)
Reverse DNS (rDNS) is regularly used as a data source in Internet measurement research. However, existing work is polarized on its reliability, and new techniques to collect active IPv6 datasets have not yet been sufficiently evaluated. In this paper, we investigate active and passive data collection and practical use aspects of rDNS datasets.We...
conference paper 2018
document
Fiebig, T. (author), Borgolte, Kevin (author), Hao, Shuang (author), Kruegel, Christopher (author), Vigna, Giovanni (author)
Current large-scale IPv6 studies mostly rely on non-public datasets, asmost public datasets are domain specific. For instance, traceroute-based datasetsare biased toward network equipment. In this paper, we present a new methodologyto collect IPv6 address datasets that does not require access to restrictednetwork vantage points. We collect a new...
conference paper 2017
document
Shastry, Bhargava (author), Leutner, Markus (author), Fiebig, T. (author), Thimmaraju, Kashyap (author), Yamaguchi, Fabian (author), Rieck, Konrad (author), Schmid, Stefan (author), Seifert, Jean-Pierre (author), Feldmann, Anja (author)
conference paper 2017
Searched for: author%3A%22Fiebig%2C+T.%22
(1 - 7 of 7)