A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Service-Fingerprinting mittels Fuzzing
[article]
2014
arXiv
pre-print
As a result of this study it is shown that mutation-based fuzzing is an appropriate method for service fingerprinting that even offers advantages over preexisting methods. ...
Service fingerprinting (i.e. the identification of network services and other applications on computing systems) is an essential part of penetration tests. ...
Service-Fingerprinting mittels Fuzzing Um die Suche nach Unterscheidungsmerkmalen zu automatisieren, wird das sogenannte Mutation-Based Fuzzing eingesetzt, ein Verfahren, das normalerweise in der Softwareentwicklung ...
arXiv:1403.0766v1
fatcat:t5qfo6xgivefljmpide4xbs5om
Verbesserung von OS- und Service-Fingerprinting mittels Fuzzing
[article]
2014
arXiv
pre-print
Fingerprinting of services and operating systems is an essential part of penetration tests. ...
In order to successfully penetrate the computing system's security measurements, preexisting fingerprinting methods are described and the paradigm of fingerprinting with mutation-based fuzzing is established ...
, scheint die systematische Erzeugung von Testfällen mittels Fuzzing für die Anwendung im Service-Fingerprinting besonders fruchtbar. ...
arXiv:1403.0439v1
fatcat:gupva5v2xvb7ne5l7kt2fcgk6y
Using honeypots to trace back amplification DDoS attacks
[article]
2022
Zweitens präsentieren wir einen Klassifikator-basierten Ansatz um Angriffe durch Booter-Services mittels vorher durch Selbstangriffe gesammelter Daten zurückzuverfolgen. ...
In today's interconnected world, Denial-of-Service attacks can cause great harm by simply rendering a target system or service inaccessible. ...
This means that services can be fuzzed only if they can be compiled using an LLVM-based toolchain. ...
doi:10.22028/d291-35236
fatcat:6j6rnvgfpfdnvpfyziimqa7ik4
A privacy conserving approach for the development of SIP security services to prevent certain types of MITM and toll fraud attacks in VoIP systems
2014
unpublished
Das Modell basiert auf einem White-, Grey- und Blacklist Ansatz von Konversationen mittels der Analyse von Call Detail Records (CDRs) in Telefonanlagen. ...
including short message services, enhanced media services and multi-media services) [HQW11] . ...
It is believed that by analyzing large amounts of data, from multiple sources around the world, it will be possible to ascertain the fingerprint of a telecom bound attack -being able to alert the respective ...
doi:10.25365/thesis.33491
fatcat:l6qx5yswj5da7myvqhzkrjpsui
Dynamic iOS Privacy Analysis: Verifying App Store Privacy Labels
2021
verwendet werden können, um das Daten-Nutzungsverhalten von Apps zu analysieren und die Privatsphäre-Angaben zu verifizieren.Zu diesem Zweck wurde eine automatisierte Analyse-Plattform entwickelt, die mittels ...
Specifically, we focused on identifying misuse of the "Device ID" label, which apps need to declare if they collect the device's Advertising Identifier, a valuable data point that allows tracking services ...
In practice, this may include binary analysis, inspection of de-compiled
code, or code snippet fingerprinting (i.e., looking for known code parts or patterns in an
app). ...
doi:10.34726/hss.2021.92880
fatcat:xeqh236swnfivk2p62uow3nmpq
2013 Jahresbericht Annual Report
unpublished
It was followed by a presentation of current research by Dominik Herrmann about the usage of fingerprinting in network forensics ("Fingerprinting Techniques for Network Forensics"). ...
A service platform is a combination of technical infrastructure along with domain-specific or business-specific services built according to the service-oriented development paradigm. ...
fatcat:xixyfnmw65ehzlozcfxl55r5uq