Institut für Verteilte Systeme

Unser Institut beschäftigt sich mit Themen wie Skalierbarkeit, Zuverlässigkeit, Sicherheit und Datenschutz, Selbstorganisation und Beherrschbarkeit von Komplexität in Verteilten Systemen in einer Vielzahl von Einsatzszenarien wie Cloud-Computing oder Fahrzeug-Fahrzeug-Kommunikation.

In der Lehre decken wir das gesamte Spektrum von Rechnernetzen, über verteilte Systeme bis hin zu Sicherheit und Privacy-Schutz ab.

Unsere letzten Publikationen


Kleber, Stephan; Maile, Lisa; Kargl, Frank
Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis
IEEE Communications Surveys and Tutorials, tba.
2018
akzeptiert

Zusammenfassung: Knowledge about a network protocol to understand the communication between entities is necessary for vulnerability research, penetration testing, malware analysis, network reconnaissance, and network modeling. Traffic analysis is one approach to infer a protocol. This approach shares common challenges, tasks, methods, and solutions. In this survey, we collect tools proposed by previous work in the research field of protocol reverse engineering by static traffic trace analysis. We dissect each tool to discern the individual mechanisms and the algorithms they are based on. Thereby, we categorize and contrast these mechanisms and algorithms that are used in static traffic trace analysis to discuss how successful they were applied in each case. We compared classification schemes for protocol reverse engineering to structure our discussion about the tools. We present and discuss an explicit process model for static traffic trace analysis revealing the common structure of the decomposed tools and frameworks from previous research. By discussions about the algorithms applied within each tool for each process task, we show relations between tools, methods, and the process. We validate our model by applying it to each of the tools, followed by an outline of the utility of protocol reverse engineering. Starting out from the process description, we deduce which solutions and algorithms have already been investigated and where challenges remain so that novel solutions need to be searched for in the future. Regarding the whole field of protocol reverse engineering, it is a prevalent problem that only very few implementations of tools and frameworks are publicly available.

Kopp, Henning; Kargl, Frank; Bösch, Christoph; Peter, Andreas
uMine: A Blockchain based on Human Miners
ICICS 2018 aus LNCS
Herausgeber: Springer,
2018
Kopp, Henning; Kargl, Frank; Bösch, Christoph
Publicly Verifiable Static Proofs of Storage: A Novel Scheme & Efficiency Comparisons
ICICS 2018 aus LNCS
Herausgeber: Springer,
2018
Agrawal, Kushal; Mehdi, Muntazir; Reichert, Manfred; Hauck, Franz J.; Schlee, Winfried; Probst, Thomas; Pryss, Rüdiger
Towards incentive management mechanisms in the context of crowdsensing technologies based on TrackYour Tinnitus insights
Proc. of the 15th Int. Conf. on Mobile Sys. and Perv. Comp. (MobiSPC)
2018
akzeptiert
Mehdi, Muntazir; Mühlmeier, Guido; Agrawal, Kushal; Pryss, Rüdiger; Schlee, Winfried; Hauck, Franz J.
Referenceable mobile crowdsensing architecture
Proc. of the 1st Int. Worksh. on Serv. for Mobile Data Coll. (MoDaC)
2018
akzeptiert
Export als: BibTeX, XML

Klicken Sie hier um eine Übersicht aller Publikationen zu erhalten.