6 Hits in 1.6 sec

Service-Fingerprinting mittels Fuzzing [article]

Michael Hanspach, Ralf Schumann, Stefan Schemmer, Sebastian Vandersee
2014 arXiv   pre-print
As a result of this study it is shown that mutation-based fuzzing is an appropriate method for service fingerprinting that even offers advantages over preexisting methods.  ...  Service fingerprinting (i.e. the identification of network services and other applications on computing systems) is an essential part of penetration tests.  ...  Service-Fingerprinting mittels Fuzzing Um die Suche nach Unterscheidungsmerkmalen zu automatisieren, wird das sogenannte Mutation-Based Fuzzing eingesetzt, ein Verfahren, das normalerweise in der Softwareentwicklung  ... 
arXiv:1403.0766v1 fatcat:t5qfo6xgivefljmpide4xbs5om

Verbesserung von OS- und Service-Fingerprinting mittels Fuzzing [article]

Michael Hanspach
2014 arXiv   pre-print
Fingerprinting of services and operating systems is an essential part of penetration tests.  ...  In order to successfully penetrate the computing system's security measurements, preexisting fingerprinting methods are described and the paradigm of fingerprinting with mutation-based fuzzing is established  ...  , scheint die systematische Erzeugung von Testfällen mittels Fuzzing für die Anwendung im Service-Fingerprinting besonders fruchtbar.  ... 
arXiv:1403.0439v1 fatcat:gupva5v2xvb7ne5l7kt2fcgk6y

Using honeypots to trace back amplification DDoS attacks [article]

Johannes Krupp, Universität Des Saarlandes
Zweitens präsentieren wir einen Klassifikator-basierten Ansatz um Angriffe durch Booter-Services mittels vorher durch Selbstangriffe gesammelter Daten zurückzuverfolgen.  ...  In today's interconnected world, Denial-of-Service attacks can cause great harm by simply rendering a target system or service inaccessible.  ...  This means that services can be fuzzed only if they can be compiled using an LLVM-based toolchain.  ... 
doi:10.22028/d291-35236 fatcat:6j6rnvgfpfdnvpfyziimqa7ik4

A privacy conserving approach for the development of SIP security services to prevent certain types of MITM and toll fraud attacks in VoIP systems

Stefan Hofbauer
2014 unpublished
Das Modell basiert auf einem White-, Grey- und Blacklist Ansatz von Konversationen mittels der Analyse von Call Detail Records (CDRs) in Telefonanlagen.  ...  including short message services, enhanced media services and multi-media services) [HQW11] .  ...  It is believed that by analyzing large amounts of data, from multiple sources around the world, it will be possible to ascertain the fingerprint of a telecom bound attack -being able to alert the respective  ... 
doi:10.25365/thesis.33491 fatcat:l6qx5yswj5da7myvqhzkrjpsui

Dynamic iOS Privacy Analysis: Verifying App Store Privacy Labels

Thomas Jirout, Martina Lindorfer
verwendet werden können, um das Daten-Nutzungsverhalten von Apps zu analysieren und die Privatsphäre-Angaben zu verifizieren.Zu diesem Zweck wurde eine automatisierte Analyse-Plattform entwickelt, die mittels  ...  Specifically, we focused on identifying misuse of the "Device ID" label, which apps need to declare if they collect the device's Advertising Identifier, a valuable data point that allows tracking services  ...  In practice, this may include binary analysis, inspection of de-compiled code, or code snippet fingerprinting (i.e., looking for known code parts or patterns in an app).  ... 
doi:10.34726/hss.2021.92880 fatcat:xeqh236swnfivk2p62uow3nmpq

2013 Jahresbericht Annual Report

It was followed by a presentation of current research by Dominik Herrmann about the usage of fingerprinting in network forensics ("Fingerprinting Techniques for Network Forensics").  ...  A service platform is a combination of technical infrastructure along with domain-specific or business-specific services built according to the service-oriented development paradigm.  ...