TF

T. Fiebig

38 records found

Authored

We outline possible approaches to cybersecurity governance and compare them against the proposed European Union network of competence centers. We survey stakeholders for their opinions about the centers and analyze the results.

@en
Nowadays, security incidents have become a familiar “nuisance,” and they regularly lead to the exposure of private and sensitive data. The root causes for such incidents are rarely complex attacks. Instead, the attacks are straight-forward, and they are enabled by simple misconfi ...
Virtual switches are a crucial component of SDN-based cloud systems, enabling the interconnection of virtual machines in a flexible and “software-defined” manner. This paper raises the alarm on the security implications of virtual switches. In particular, we show that virtual swi ...
Network protocols define how networked computer systems exchange data. As they define all aspects of this communication, the way they are designed is also security sensitive. If communication is supposed to be encrypted, this has to be outlined in the protocol’s specification. If ...
Security research has made extensive use of exhaustive Internet-wide scans over the recent years, as they can provide significant insights into the overall state of security of the Internet, and ZMap made scanning the entire IPv4 address space practical. However, the IPv4 address ...

In rDNS We Trust

Revisiting a Common Data-Source’s Reliability

Reverse DNS (rDNS) is regularly used as a data source in Internet measurement research. However, existing work is polarized on its reliability, and new techniques to collect active IPv6 datasets have not yet been sufficiently evaluated. In this paper, we investigate active and pa ...
Infrastructure-as-a-Service (IaaS), and more generallythe “cloud,” like Amazon Web Services (AWS) or MicrosoftAzure, have changed the landscape of system operations on theInternet. Their elasticity allows operators to rapidly allocate anduse resources as needed, from virtual mach ...
Current large-scale IPv6 studies mostly rely on non-public datasets, asmost public datasets are domain specific. For instance, traceroute-based datasetsare biased toward network equipment. In this paper, we present a new methodologyto collect IPv6 address datasets that does not r ...
Virtual switches are a crucial component of cloud operating systems that interconnect virtual machines in a flexible manner. They implement complex network protocol parsing in the unified packet parser - parsing all supported packet header fields in a single pass - and are common ...
Along with the significant growth in the popularity of smartphones and the number of available mobile applications, the amount of threats that harm users or compromise their privacy has dramatically increased. The mobile security research community constantly uncovers new threats ...
In the field of IT security the development of Proof of Concept (PoC) implementations is a commonly accepted method to determine the exploitability of an identified weakness. Most security issues provide a rather straightforwad method of asserting the PoCs efficiency. That is, it ...
Nearly every modern mobile device includes two cameras. With advances in technology the resolution of these sensors has constantly increased. While this development provides great convenience for users, for example with video-telephony or as dedicated camera replacement, the secu ...

Contributed

The Network Predictors

Monitoring Network Measurements To Predict Corporate Performance Before It Is Public Knowledge

Network measurments are mostly used to studynetwork topology, performance and security. The thesis uses network measurements in relation to large Internet corporations like Salesforce, Netflix and Snapchat. The thesis attempts to verify whether it is possible to predict company p ...
In recent years, many countries and administrative domains exploit control over their communication infrastructures to censor online materials. The concrete reasons behind the Internet censorship remain poorly understood due to the opaque nature of the systems. Generally, Interne ...

CAML-IDS

A framework for the correct assessment of machine learning-based intrusion detection systems

The Internet is a relatively new technology that the world has become immensely dependent on. It is a tool that makes it possible to simplify our lives and better our society. But as with many things, there are people who with to exploit this tool we have for their own malicious ...

Customer Acceptance of a Revenue Management Platform with Multi-Party Computation

Application of Multi-Party Computation to Revenue Management in the Semiconductor Industry

Research ProblemIn today’s competitive and fast-paced nature of conducting business in the semiconductor industry, the discipline of revenue management (RM) is often mentioned. Through a dynamic pricing capability, RM enables firms to maximize profits by capitalizing on missed re ...
In this study, a analysis was performed to analyze why there are differences in port configuration between IPv4 and IPv6. For this, the current state of adoption and implantation processes of IPv6 were researched. Currently, 4,8% of all dual-stack hosts have a different configura ...

Development of Injected Code Attacks in Online Banking Fraud Incidents

An exploratory study for understanding the evolution of code used by cyber criminals in financial malware

The frequency of online banking fraud incidents has increased over the last years. A method used by different cybercriminals is the injection of malicious code into the targeted web pages. For example, attackers might inject an additional piece code into the webpage of a targeted ...