Research Seminar on 27.05.2024 16:00
Room 03.07.023

Happy Eyeballs: A Comprehensive Analysis of the Deployment and Configuration Across Various Versions and Implementations

Intermediate talk for Bachelor's Thesis
Matthias Kirstein (Sattler, Zirngibl, Wuestrich)

Operating High-Performance Networking Devices

Final talk for Interdisciplinary Project
Jason Lochert (Stubbe, Gallenmüller, Hauser)

Generation of Artificial Industrial Ethernet Traffic

Final talk for Bachelor's Thesis
Sebastian Gosner (Wiedner, Schwarzenberg)

Scalable Off-Chain Computing on Data Streams using Trusted Execution Environments

Final talk for Bachelor's Thesis
Eric Brendel (Rezabek, Fan)

Research Seminar on 29.05.2024 16:00
Room 03.07.023

Extension of the EnGINE Framework and Profiling Blockchains to Identify and Optimize Bottlenecks

Final talk for Interdisciplinary Project
Shouvik Ghosh (Rezabek, von Seck)

Byzantine Fault Tolerance in CBDC Systems

Final talk for Master's Thesis
Nadeeshani Willliam (Glas, Rezabek, von Seck)

Cooperation and Communication of Swarming UAVs in Disturbed Environments

Final talk for Master's Thesis
Ferdinand List (Lübben, Kinkelin)

Research Seminar on 10.06.2024 16:00
Room 03.07.023

Hardware-assisted instant virtual infrastructure

Final talk for Interdisciplinary Project
Dominik Kreutzer (Wiedner, Andre)

Data Plane based Optimization for Byzantine Fault Tolerant Consensus

Intermediate talk for Master's Thesis
Lukas Schröder (von Seck, Simon)

01.07.2024
Proc. IEEE European Symposium on Security and Privacy (EuroS&P)

An Internet-wide View on HTTPS Certificate Revocations: Observing the Revival of CRLs via Active TLS Scans

Authors: Markus Sosnowski, Johannes Zirngibl, Patrick Sattler, Juliane Aulbach, Jonas Lang, Georg Carle

01.06.2024
International Federation for Information Processing (IFIP) Networking Conference 2024

A Quantum of QUIC: Dissecting Cryptography with Post-Quantum Insights

Authors: Marcel Kempf, Nikolas Gauder, Benedikt Jaeger, Johannes Zirngibl, Georg Carle

01.05.2024
Proc. Network Traffic Measurement and Analysis Conference (TMA)

Propagating Threat Scores With a TLS Ecosystem Graph Model Derived by Active Measurements

The Internet is shaped by independent actors and heterogeneous deployments. With the wide adoption of Transport Layer Security (TLS), a whole ecosystem of intertwined entities emerged. Acquiring a comprehensive view allows searching for previously unknown malicious entities and providing valuable cyber-threat intelligence. Actively collected Internet-wide Domain Name System (DNS) and TLS meta-data can provide the basis for such large-scale analyses. However, in order to efficiently navigate the vast volumes of data, an effective methodology is required. This work proposes a graph model of the TLS ecosystem that utilizes the relationships between servers, domains, and certificates. A Probabilistic Threat Propagation (PTP) algorithm is then used to propagate a threat score from existing blocklists to related nodes. We conducted a one-year-long measurement study of 13 monthly active Internet-wide DNS and TLS measurements to evaluate the methodology. The latest measurement found four highly suspicious clusters among the nodes with high threat scores. External threat intelligence services were used to confirm a high rate of maliciousness in the rest of the newly found servers. With the help of optimized thresholds, we identified 557 domains and 11 IP addresses throughout the last year before they were known to be malicious. Up to 40% of the identified nodes appeared on average three months later on the input blocklist. This work proposes a versatile graph model to analyze the TLS ecosystem and a PTP analysis to help security researchers focus on suspicious subsets of the Internet when searching for unknown threats.

Authors: Markus Sosnowski, Patrick Sattler, Johannes Zirngibl, Tim Betzer, Georg Carle

01.05.2024
2024 IEEE/IFIP Network Operations and Management Symposium (NOMS 2024)

Shells Bells: Cyber-Physical Anomaly Detection in Data Centers

Authors: Lars Wüstrich, Sebastian Gallenmüller, Stephan Günther, Georg Carle, Marc-Oliver Pahl

01.03.2024
Passive and Active Measurement Conference (PAM)

QUIC Hunter: Finding QUIC Deployments and Identifying Server Libraries Across the Internet

Authors: Johannes Zirngibl, Florian Gebauer, Patrick Sattler, Markus Sosnowski, Georg Carle

01.03.2024
3rd International Workshop on Negative Results in Pervasive Computing (PerFail 2024)

Context Matters: Lessons Learned from Emulated and Simulated TSN Environments

Authors: Filip Rezabek*, Marcin Bosk*, Leander Seidlitz, Jörg Ott, Georg Carle

01.02.2024

EFACTLS: Effective Active TLS Fingerprinting for Large-scale Server Deployment Characterization

Active measurements allow the collection of server characteristics on a large scale that can aid in discovering hidden relations and commonalities among server deployments. Finding these relations opens up new possibilities for clustering and classifying server deployments; for example, identifying a previously unknown cybercriminal infrastructure can be valuable cyber-threat intelligence. In this work, we propose a methodology based on active measurements to acquire Transport Layer Security (TLS) metadata from servers and leverage it for fingerprinting. Our fingerprints capture characteristic behavior of the TLS stack, primarily influenced by the server’s implementation, configuration, and hardware support. Using an empirical optimization strategy that maximizes information gained from every handshake to minimize measurement costs, we generated 10 general-purpose Client Hellos. They served as scanning probes to create an extensive database of TLS configurations to classify servers. We propose the Shannon Entropy to measure collected information and compare different approaches. This study fingerprinted 8 million servers from the Tranco top list and two Command and Control (C2) blocklists over 60 weeks with weekly snapshots. The resulting data formed the foundation for two long-term case studies: classification of Content Delivery Network and C2 servers. Moreover, the detection was fine-grained enough to detect C2 server families. The proposed methodology demonstrated a precision of 99% and enabled a stable identification of new servers over time. This study shows how active measurements can provide valuable security-relevant insights and improve our understanding of the Internet.

Authors: Markus Sosnowski, Johannes Zirngibl, Patrick Sattler, Georg Carle, Claas Grohnfeldt, Michele Russo, Daniele Sgandurra

01.01.2024
2024 19th Wireless On-Demand Network Systems and Services Conference (WONS)

The pos Experiment Controller: Reproducible & Portable Network Experiments

Authors: Henning Stubbe, Sebastian Gallenmüller, Georg Carle

01.01.2024

Playing the MEV Game on a First-Come-First-Served Blockchain

Authors: Burak Öz, Jonas Gebele, Parshant Singh, Filip Rezabek, Florian Matthes

01.12.2023
Proceedings of the 2nd on Graph Neural Networking Workshop 2023

Predicting Latency Quantiles using Network Calculus-assisted GNNs

Authors: Max Helm, Georg Carle

16.05.2024
TUM Blockchain Salon 2024

Abstract

On 16 and 17 May 2024 we organize the second edition of the TUM Blockchain Salon at the Institute of Advanced Studies (IAS). The event will host more than 20 speakers distributed over 8 sessions with a parallel poster session. Researchers involved in SUPREMS will be present both ...

30.01.2024
NetSec Guest Lecture: Cyber Security Assessments in Practice

Abstract

At universities, cyber security is often viewed solely from the perspective of the attackers and defenders. In their guest lecture "Cyber Security Assessments in Practice", Nico Fechtner and Merten Nagel from usd AG shed light on a new perspective: They outline how compliance with legal and regulatory requirements ...

30.06.2023
WueWoWas'23: Best Workshop Contribution Award

Best Contribution Award at WueWoWas 2023

Our publication "Never Miss Twice - Add-On-Miss Table Updates in Software Data Planes" has been awarded as the one Best Workshop Contribution at the KuVS Fachgespräch - Würzburg Workshop on Modeling, Analysis and Simulation of Next-Generation Communication Networks 2023 (WueWoWas’23).

...

29.06.2023
TMA'23: Best Paper Award

Best Paper Award at TMA 2023

Our publication "Target Acquired? Evaluating Target Generation Algorithms for IPv6" has been awarded with the Best Paper Award at the Network Traffic Measurement and Analysis Conference (TMA 2023).

The publication is a collaboration with Oliver Gasser from the Max ...

20.03.2023
PerFail'23: Best Paper Award

Best Paper Award at the PerFail 2023

Our publication "TSN Experiments Using COTS Hardware and Open-Source Solutions: Lessons Learned" has been awarded with the Best Paper Award at the Second International Workshop on Negative Results in Pervasive Computing (PerFail 2023), co-located with IEEE Pervasive Computing (PerCom) 2023, ...