Institut für Verteilte Systeme

Unser Institut beschäftigt sich mit Themen wie Skalierbarkeit, Zuverlässigkeit, Sicherheit und Datenschutz, Selbstorganisation und Beherrschbarkeit von Komplexität in Verteilten Systemen in einer Vielzahl von Einsatzszenarien wie Cloud-Computing oder Fahrzeug-Fahrzeug-Kommunikation.

In der Lehre decken wir das gesamte Spektrum von Rechnernetzen, über verteilte Systeme bis hin zu Sicherheit und Privacy-Schutz ab.

Unsere letzten Publikationen


Schlee, Winfried; Hall, Deborah A.; Canlon, Barbara; Cima, Rilana F. F.; de Kleine, Emile; Hauck, Franz J.; Huber, Alex; Gallus, Silvano; Kleinjung, Tobias; Kypraios, Theodore; Langguth, Berthold; Lopez-Escamez, José A.; Lugo, Alessandra; Meyer, Martin; Mielczarek, Marzena; Norena, Arnau; Pfiffner, Flurin; Pryss, Rüdiger C.; Reichert, Manfred; Requena, Teresa; Schecklmann, Martin; van Dijk, Pim; van de Heyning, Paul; Weisz, Nathan; Cederroth, Christopher R.
Innovations in doctoral training and research on Tinnitus: the European School on Interdisciplinary Tinnitus Research (ESIT) perspective
Frontiers in Aging Neuroscience, 9:447
Januar 2018
Kleber, Stephan; Maile, Lisa; Kargl, Frank
Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis
IEEE Communications Surveys and Tutorials, tba.
2018
akzeptiert

Zusammenfassung: Knowledge about a network protocol to understand the communication between entities is necessary for vulnerability research, penetration testing, malware analysis, network reconnaissance, and network modeling. Traffic analysis is one approach to infer a protocol. This approach shares common challenges, tasks, methods, and solutions. In this survey, we collect tools proposed by previous work in the research field of protocol reverse engineering by static traffic trace analysis. We dissect each tool to discern the individual mechanisms and the algorithms they are based on. Thereby, we categorize and contrast these mechanisms and algorithms that are used in static traffic trace analysis to discuss how successful they were applied in each case. We compared classification schemes for protocol reverse engineering to structure our discussion about the tools. We present and discuss an explicit process model for static traffic trace analysis revealing the common structure of the decomposed tools and frameworks from previous research. By discussions about the algorithms applied within each tool for each process task, we show relations between tools, methods, and the process. We validate our model by applying it to each of the tools, followed by an outline of the utility of protocol reverse engineering. Starting out from the process description, we deduce which solutions and algorithms have already been investigated and where challenges remain so that novel solutions need to be searched for in the future. Regarding the whole field of protocol reverse engineering, it is a prevalent problem that only very few implementations of tools and frameworks are publicly available.

Kopp, Henning; Kargl, Frank; Bösch, Christoph; Peter, Andreas
uMine: A Blockchain based on Human Miners
ICICS 2018 aus LNCS
Herausgeber: Springer,
2018
Kopp, Henning; Kargl, Frank; Bösch, Christoph
Publicly Verifiable Static Proofs of Storage: A Novel Scheme & Efficiency Comparisons
ICICS 2018 aus LNCS
Herausgeber: Springer,
2018
Bösch, Christoph
An Efficient Privacy-Preserving Outsourced Geofencing Service Using Bloom Filter
IEEE Vehicular Networking Conference, {VNC} 2018, Taipei, Taiwan, December 5-7, 2018.
2018
akzeptiert
Export als: BibTeX, XML

Klicken Sie hier um eine Übersicht aller Publikationen zu erhalten.