Research Seminar on 08.07.2024 16:00
Room 03.07.023

Developement of a Framework for IEEE 802.11 Beacon Frame Injection and Response Evaluation

Intermediate talk for Bachelor's Thesis
Efe Kamasoglu (Seidlitz)

Oblivious HTTP: Analyzing Developments for Emerging Privacy-Preserving Networks

Intermediate talk for Bachelor's Thesis
Kay Schneider (Steger, Kempf)

Research Seminar on 10.07.2024 16:00
Room 03.07.023

Correction Workflow Optimizations for Practical Network Courses

Intermediate talk for Bachelor's Thesis
Robin Wölfel (Wiedner, Wüstrich)

Ensuring the Integrity of Submissions in Digital eLearning Platforms

Intermediate talk for Bachelor's Thesis
Benjamin Schaible (Wiedner, Wüstrich)

Research Seminar on 22.07.2024 16:00
Room 03.07.023

Improvements to Convolutional Forward Erasure Correction Coding

Final talk for Interdisciplinary Project
Michael Hackl (Holzinger, Lachnit, Stubbe, Günther)

Modeling Web Page Performance Improvements via Loading Graphs and Testbed Simulations

Intermediate talk for Master's Thesis
Jonas Merforth (Sosnowski, Wiedner)

Research Seminar on 24.07.2024 16:00
Room 03.07.023

Happy Eyeballs: A Comprehensive Analysis of the Deployment and Configuration Across Various Versions and Implementations

Final talk for Bachelor's Thesis
Matthias Kirstein (sattler, wuestrich, zirngibl)

01.08.2024
Proceedings of the 2nd SIGCOMM 2024 Workshop on eBPF and Kernel Extensions

Honey for the Ice Bear - Dynamic eBPF in P4

Authors: Manuel Simon, Henning Stubbe, Sebastian Gallenmüller, Georg Carle

01.07.2024

QUIC on the Fast Lane: Extending Performance Evaluations on High-rate Links

Authors: Marcel Kempf, Benedikt Jaeger, Johannes Zirngibl, Kevin Ploch, Georg Carle

01.07.2024
To be published: The 6th ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI:’24)

On the Impact of Network Transport Protocols on Leader-Based Consensus Communication

Authors: Richard Von Seck, Filip Rezabek, Sebastian Gallenmüller, Georg Carle

01.07.2024
Proc. IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)

An Internet-wide View on HTTPS Certificate Revocations: Observing the Revival of CRLs via Active TLS Scans

Authors: Markus Sosnowski, Johannes Zirngibl, Patrick Sattler, Juliane Aulbach, Jonas Lang, Georg Carle

01.06.2024
International Federation for Information Processing (IFIP) Networking Conference 2024

A Quantum of QUIC: Dissecting Cryptography with Post-Quantum Insights

Authors: Marcel Kempf, Nikolas Gauder, Benedikt Jaeger, Johannes Zirngibl, Georg Carle

01.06.2024
International Federation for Information Processing (IFIP) Networking Conference 2024 - SLICES Workshop

RO-Crate for Testbeds: Automated Packaging of Experimental Results

Authors: Eric Hauser, Sebastian Gallenmüller, Georg Carle

01.05.2024
Proc. Network Traffic Measurement and Analysis Conference (TMA)

Propagating Threat Scores With a TLS Ecosystem Graph Model Derived by Active Measurements

The Internet is shaped by independent actors and heterogeneous deployments. With the wide adoption of Transport Layer Security (TLS), a whole ecosystem of intertwined entities emerged. Acquiring a comprehensive view allows searching for previously unknown malicious entities and providing valuable cyber-threat intelligence. Actively collected Internet-wide Domain Name System (DNS) and TLS meta-data can provide the basis for such large-scale analyses. However, in order to efficiently navigate the vast volumes of data, an effective methodology is required. This work proposes a graph model of the TLS ecosystem that utilizes the relationships between servers, domains, and certificates. A Probabilistic Threat Propagation (PTP) algorithm is then used to propagate a threat score from existing blocklists to related nodes. We conducted a one-year-long measurement study of 13 monthly active Internet-wide DNS and TLS measurements to evaluate the methodology. The latest measurement found four highly suspicious clusters among the nodes with high threat scores. External threat intelligence services were used to confirm a high rate of maliciousness in the rest of the newly found servers. With the help of optimized thresholds, we identified 557 domains and 11 IP addresses throughout the last year before they were known to be malicious. Up to 40% of the identified nodes appeared on average three months later on the input blocklist. This work proposes a versatile graph model to analyze the TLS ecosystem and a PTP analysis to help security researchers focus on suspicious subsets of the Internet when searching for unknown threats.

Authors: Markus Sosnowski, Patrick Sattler, Johannes Zirngibl, Tim Betzer, Georg Carle

01.05.2024
2024 IEEE/IFIP Network Operations and Management Symposium (NOMS 2024)

Shells Bells: Cyber-Physical Anomaly Detection in Data Centers

Authors: Lars Wüstrich, Sebastian Gallenmüller, Stephan Günther, Georg Carle, Marc-Oliver Pahl

01.03.2024
Passive and Active Measurement Conference (PAM)

QUIC Hunter: Finding QUIC Deployments and Identifying Server Libraries Across the Internet

Authors: Johannes Zirngibl, Florian Gebauer, Patrick Sattler, Markus Sosnowski, Georg Carle

01.03.2024
3rd International Workshop on Negative Results in Pervasive Computing (PerFail 2024)

Context Matters: Lessons Learned from Emulated and Simulated TSN Environments

Authors: Filip Rezabek*, Marcin Bosk*, Leander Seidlitz, Jörg Ott, Georg Carle

16.05.2024
TUM Blockchain Salon 2024

Abstract

On 16 and 17 May 2024 we organize the second edition of the TUM Blockchain Salon at the Institute of Advanced Studies (IAS). The event will host more than 20 speakers distributed over 8 sessions with a parallel poster session. Researchers involved in SUPREMS will be present both ...

30.01.2024
NetSec Guest Lecture: Cyber Security Assessments in Practice

Abstract

At universities, cyber security is often viewed solely from the perspective of the attackers and defenders. In their guest lecture "Cyber Security Assessments in Practice", Nico Fechtner and Merten Nagel from usd AG shed light on a new perspective: They outline how compliance with legal and regulatory requirements ...

30.06.2023
WueWoWas'23: Best Workshop Contribution Award

Best Contribution Award at WueWoWas 2023

Our publication "Never Miss Twice - Add-On-Miss Table Updates in Software Data Planes" has been awarded as the one Best Workshop Contribution at the KuVS Fachgespräch - Würzburg Workshop on Modeling, Analysis and Simulation of Next-Generation Communication Networks 2023 (WueWoWas’23).

...

29.06.2023
TMA'23: Best Paper Award

Best Paper Award at TMA 2023

Our publication "Target Acquired? Evaluating Target Generation Algorithms for IPv6" has been awarded with the Best Paper Award at the Network Traffic Measurement and Analysis Conference (TMA 2023).

The publication is a collaboration with Oliver Gasser from the Max ...

20.03.2023
PerFail'23: Best Paper Award

Best Paper Award at the PerFail 2023

Our publication "TSN Experiments Using COTS Hardware and Open-Source Solutions: Lessons Learned" has been awarded with the Best Paper Award at the Second International Workshop on Negative Results in Pervasive Computing (PerFail 2023), co-located with IEEE Pervasive Computing (PerCom) 2023, ...