Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Hiesgen, Raphael"'
Autor:
Tehrani, Pouyan Fotouhi, Hiesgen, Raphael, Lübeck, Teresa, Schmidt, Thomas C., Wählisch, Matthias
Integrity and trust on the web build on X.509 certificates. Misuse or misissuance of these certificates threaten the Web PKI security model, which led to the development of several guarding techniques. In this paper, we study the DNS/DNSSEC records C
Externí odkaz:
http://arxiv.org/abs/2407.02287
Autor:
Nawrocki, Marcin, Kristoff, John, Hiesgen, Raphael, Kanich, Chris, Schmidt, Thomas C., Wählisch, Matthias
Publikováno v:
Proceedings of the IEEE 8th European Symposium on Security and Privacy (EuroS&P), 2023
In this paper, we revisit the use of honeypots for detecting reflective amplification attacks. These measurement tools require careful design of both data collection and data analysis including cautious threshold inference. We survey common amplifica
Externí odkaz:
http://arxiv.org/abs/2302.04614
Autor:
Nawrocki, Marcin, Tehrani, Pouyan Fotouhi, Hiesgen, Raphael, Mücke, Jonas, Schmidt, Thomas C., Wählisch, Matthias
Publikováno v:
Proc. of 18th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), pp. 204--213, New York, NY, USA: ACM, 2022
In this paper, we revisit the performance of the QUIC connection setup and relate the design choices for fast and secure connections to common Web deployments. We analyze over 1M Web domains with 272k QUIC-enabled services and find two worrying resul
Externí odkaz:
http://arxiv.org/abs/2211.02421
Autor:
Mücke, Jonas, Nawrocki, Marcin, Hiesgen, Raphael, Sattler, Patrick, Zirngibl, Johannes, Carle, Georg, Schmidt, Thomas C., Wählisch, Matthias
In this paper, we study the potentials of passive measurements to gain advanced knowledge about QUIC deployments. By analyzing one month backscatter traffic of the /9 CAIDA network telescope, we are able to make the following observations. First, we
Externí odkaz:
http://arxiv.org/abs/2209.00965
The critical remote-code-execution (RCE) Log4Shell is a severe vulnerability that was disclosed to the public on December 10, 2021. It exploits a bug in the wide-spread Log4j library. Any service that uses the library and exposes an interface to the
Externí odkaz:
http://arxiv.org/abs/2205.02544
Autor:
Hiesgen, Raphael, Nawrocki, Marcin, King, Alistair, Dainotti, Alberto, Schmidt, Thomas C., Wählisch, Matthias
Large-scale Internet scans are a common method to identify victims of a specific attack. Stateless scanning like in ZMap has been established as an efficient approach to probing at Internet scale. Stateless scans, however, need a second phase to perf
Externí odkaz:
http://arxiv.org/abs/2110.05160
In this paper, we present first measurements of Internet background radiation originating from the emerging transport protocol QUIC. Our analysis is based on the UCSD network telescope, correlated with active measurements. We find that research proje
Externí odkaz:
http://arxiv.org/abs/2109.01106
IP spoofing enables reflection and amplification attacks, which cause major threats to the current Internet infrastructure. Detecting IP packets with incorrect source addresses would help to improve the situation. This is easy at the attacker's netwo
Externí odkaz:
http://arxiv.org/abs/1911.05164
The message-driven nature of actors lays a foundation for developing scalable and distributed software. While the actor itself has been thoroughly modeled, the message passing layer lacks a common definition. Properties and guarantees of message exch
Externí odkaz:
http://arxiv.org/abs/1810.00401
Publikováno v:
Springer LNCS 10789, pp. 59--93, 2018
The actor model of computation has been designed for a seamless support of concurrency and distribution. However, it remains unspecific about data parallel program flows, while available processing power of modern many core hardware such as graphics
Externí odkaz:
http://arxiv.org/abs/1709.07781