Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Kleber, Stephan"'
Autor:
Wachter, Patrick, Kleber, Stephan
Publikováno v:
Computer Science in Cars Symposium (CSCS 2022)
DoIP, which is defined in ISO 13400, is a transport protocol stack for diagnostic data. Diagnostic data is a potential attack vector at vehicles, so secure transmission must be guaranteed to protect sensitive data and the vehicle. Previous work analy
Externí odkaz:
http://arxiv.org/abs/2211.12177
Autor:
Kleber, Stephan, Kargl, Frank
Publikováno v:
Proceedings of the Tenth Annual IEEE Conference on Communications and Network Security 2022. CNS. Austin, TX, USA
Reverse engineering of undocumented protocols is a common task in security analyses of networked services. The communication itself, captured in traffic traces, contains much of the necessary information to perform such a protocol reverse engineering
Externí odkaz:
http://arxiv.org/abs/2301.03585
Publikováno v:
Proceedings of the DSN Workshop on Data-Centric Dependability and Security. DCDS 2022. Baltimore, Maryland, USA
Reverse engineering of unknown network protocols based on recorded traffic traces enables security analyses and debugging of undocumented network services. In particular for binary protocols, existing approaches (1) lack comprehensive methods to clas
Externí odkaz:
http://arxiv.org/abs/2301.03584
Publikováno v:
IEEE International Conference on Computer Communications 2020
Protocol reverse engineering based on traffic traces infers the behavior of unknown network protocols by analyzing observable network messages. To perform correct deduction of message semantics or behavior analysis, accurate message type identificati
Externí odkaz:
http://arxiv.org/abs/2002.03391
Distributed Reflective Denial of Service (DRDoS) attacks are an immanent threat to Internet services. The potential scale of such attacks became apparent in March 2018 when a memcached-based attack peaked at 1.7 Tbps. Novel services built upon UDP in
Externí odkaz:
http://arxiv.org/abs/1808.01177
Reverse engineering of unknown network protocols based on recorded traffic traces enables security analyses and debugging of undocumented network services. In particular for binary protocols, existing approaches (1) lack comprehensive methods to clas
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::30b439d7cc5b9a0fdcf7ee35cc673f1a
Autor:
Kleber, Stephan, Wachter, Patrick
Publikováno v:
Datenschutz und Datensicherheit - DuD; Aug2023, Vol. 47 Issue 8, p478-482, 5p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Unterstein, Florian, Kleber, Stephan, Matousek, Matthias, Kargl, Frank, Slomka, Frank, Hiller, Matthias
A persistent problem with program execution is its vulnerability to code injection attacks. Equally unsolved is the susceptibility of software to reverse engineering, which undermines code confidentiality. We propose an approach that solves both kind
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a280dd10dec8751d533aeafd0b7ae97a
Publikováno v:
2015 International Conference & Workshops on Networked Systems (NetSys); 2015, p1-8, 8p