Research Seminar on 29.04.2024 16:00
Room 03.07.023

Analysis of Subject Alternative Names Obtained from CT-Log

Final talk for Bachelor's Thesis
Tobias Zierl (Sattler, Zirngibl)

Exploring the viability of Large Language Models for the assessment of free text answers in an educational environment

Intermediate talk for Master's Thesis
Marco Rubin (Schwarzenberg, Wüstrich, Lübben)

Graph-based Modeling and Analysis of the TLS Ecosystem

Intermediate talk for Master's Thesis
Tim Betzer (Sosnowski)

Extension of the EnGINE Framework and Profiling Blockchains to Identify and Optimize Bottlenecks

Final talk for Interdisciplinary Project
Parshant Singh (Rezabek, von Seck)

User Guidance for Remote Qualified Electronic Signatures

Final talk for Bachelor's Thesis
Timm Bauer (Wüstrich)

Research Seminar on 06.05.2024 16:00
Room 03.07.023

Evaluation of a light-weight approach for device-specific anomaly detection in an IoT network

Final talk for Master's Thesis
Felix Frauenschuh (Lübben, Kinkelin)

Improvements to Forward Erasure Correction Coding

Intermediate talk for Interdisciplinary Project
Nico Greger (Holzinger, Lachnit, Stubbe)

Continuous Monitoring and Quality Assessment of Internet-wide Scans

Final talk for Interdisciplinary Project
Tobias Wasner (Sattler, Zirngibl)

Research Seminar on 15.05.2024 16:00
Room 03.07.023

Data Collection Pipeline for Blockchain Platforms

Intermediate talk for Master's Thesis
Ilteber Ayvaci (Rezabek, Glas)

A Telemetry System for a Solar Car

Final talk for Interdisciplinary Project
Marius-Raphael Schlüter (Gallenmüller)

Research Seminar on 27.05.2024 16:00
Room 03.07.023

Happy Eyeballs: A Comprehensive Analysis of the Deployment and Configuration Across Various Versions and Implementations

Intermediate talk for Bachelor's Thesis
Matthias Kirstein (Sattler, Zirngibl, Wuestrich)

Generation of Artificial Industrial Ethernet Traffic

Final talk for Bachelor's Thesis
Sebastian Gosner (Wiedner, Schwarzenberg)

Passive and Active Measurement Conference (PAM)

QUIC Hunter: Finding QUIC Deployments and Identifying Server Libraries Across the Internet

Authors: Johannes Zirngibl, Florian Gebauer, Patrick Sattler, Markus Sosnowski, Georg Carle

3rd International Workshop on Negative Results in Pervasive Computing (PerFail 2024)

Context Matters: Lessons Learned from Emulated and Simulated TSN Environments

Authors: Filip Rezabek*, Marcin Bosk*, Leander Seidlitz, Jörg Ott, Georg Carle


EFACTLS: Effective Active TLS Fingerprinting for Large-scale Server Deployment Characterization

Active measurements allow the collection of server characteristics on a large scale that can aid in discovering hidden relations and commonalities among server deployments. Finding these relations opens up new possibilities for clustering and classifying server deployments; for example, identifying a previously unknown cybercriminal infrastructure can be valuable cyber-threat intelligence. In this work, we propose a methodology based on active measurements to acquire Transport Layer Security (TLS) metadata from servers and leverage it for fingerprinting. Our fingerprints capture characteristic behavior of the TLS stack, primarily influenced by the server’s implementation, configuration, and hardware support. Using an empirical optimization strategy that maximizes information gained from every handshake to minimize measurement costs, we generated 10 general-purpose Client Hellos. They served as scanning probes to create an extensive database of TLS configurations to classify servers. We propose the Shannon Entropy to measure collected information and compare different approaches. This study fingerprinted 8 million servers from the Tranco top list and two Command and Control (C2) blocklists over 60 weeks with weekly snapshots. The resulting data formed the foundation for two long-term case studies: classification of Content Delivery Network and C2 servers. Moreover, the detection was fine-grained enough to detect C2 server families. The proposed methodology demonstrated a precision of 99% and enabled a stable identification of new servers over time. This study shows how active measurements can provide valuable security-relevant insights and improve our understanding of the Internet.

Authors: Markus Sosnowski, Johannes Zirngibl, Patrick Sattler, Georg Carle, Claas Grohnfeldt, Michele Russo, Daniele Sgandurra

2024 19th Wireless On-Demand Network Systems and Services Conference (WONS)

The pos Experiment Controller: Reproducible & Portable Network Experiments

Authors: Henning Stubbe, Sebastian Gallenmüller, Georg Carle


Playing the MEV Game on a First-Come-First-Served Blockchain

Authors: Burak Öz, Jonas Gebele, Parshant Singh, Filip Rezabek, Florian Matthes

Proceedings of the 2nd on Graph Neural Networking Workshop 2023

Predicting Latency Quantiles using Network Calculus-assisted GNNs

Authors: Max Helm, Georg Carle


Packed to the Brim: Investigating the Impact of Highly Responsive Prefixes on Internet-wide Measurement Campaigns

Authors: Patrick Sattler, Johannes Zirngibl, Mattijs Jonker, Oliver Gasser, Georg Carle, Ralph Holz

Proc. International Conference on emerging Networking EXperiments and Technologies (CoNEXT)

The Performance of Post-Quantum TLS 1.3

Quantum Computers (QCs) differ radically from traditional computers and can efficiently solve mathematical problems fundamental to our current cryptographic algorithms. Although existing QCs need to accommodate more qubits to break cryptographic algorithms, the concern of "Store-Now-Decrypt-Later" (i.e., adversaries store encrypted data today and decrypt them once powerful QCs become available) highlights the necessity to adopt quantum-safe approaches as soon as possible. In this work, we investigate the performance impact of Post-Quantum Cryptography (PQC) on TLS 1.3. Different signature algorithms and key agreements (as proposed by the National Institute of Standards and Technology (NIST)) are examined through black- and white-box measurements to get precise handshake latencies and computational costs per participating library. We emulated loss, bandwidth, and delay to analyze constrained environments. Our results reveal that HQC and Kyber are on par with our current state-of-the-art, while Dilithium and Falcon are even faster. We observed no performance drawback from using hybrid algorithms; moreover, on higher NIST security levels, PQC outperformed any algorithm in use today. Hence, we conclude that post-quantum TLS is suitable for adoption in today’s systems.

Authors: Markus Sosnowski, Florian Wiedner, Eric Hauser, Lion Steger, Dimitrios Schoinianakis, Sebastian Gallenmüller, Georg Carle

2023 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)

Control Groups Added Latency in NFVs: An Update Needed?

Authors: Florian Wiedner, Alexander Daichendt, Jonas Andre, Georg Carle


Multilayer Environment and Toolchain for Holistic NetwOrk Design and Analysis

Authors: Filip Rezabek, Kilian Glas, Richard Von Seck, Achraf Aroua, Tizian Leonhardt, Georg Carle

TUM Blockchain Salon 2024


On 16 and 17 May 2024 we organize the second edition of the TUM Blockchain Salon at the Institute of Advanced Studies (IAS). The event will host more than 20 speakers distributed over 8 sessions with a parallel poster session. Researchers involved in SUPREMS will be present both ...

NetSec Guest Lecture: Cyber Security Assessments in Practice


At universities, cyber security is often viewed solely from the perspective of the attackers and defenders. In their guest lecture "Cyber Security Assessments in Practice", Nico Fechtner and Merten Nagel from usd AG shed light on a new perspective: They outline how compliance with legal and regulatory requirements ...

WueWoWas'23: Best Workshop Contribution Award

Best Contribution Award at WueWoWas 2023

Our publication "Never Miss Twice - Add-On-Miss Table Updates in Software Data Planes" has been awarded as the one Best Workshop Contribution at the KuVS Fachgespräch - Würzburg Workshop on Modeling, Analysis and Simulation of Next-Generation Communication Networks 2023 (WueWoWas’23).


TMA'23: Best Paper Award

Best Paper Award at TMA 2023

Our publication "Target Acquired? Evaluating Target Generation Algorithms for IPv6" has been awarded with the Best Paper Award at the Network Traffic Measurement and Analysis Conference (TMA 2023).

The publication is a collaboration with Oliver Gasser from the Max ...

PerFail'23: Best Paper Award

Best Paper Award at the PerFail 2023

Our publication "TSN Experiments Using COTS Hardware and Open-Source Solutions: Lessons Learned" has been awarded with the Best Paper Award at the Second International Workshop on Negative Results in Pervasive Computing (PerFail 2023), co-located with IEEE Pervasive Computing (PerCom) 2023, ...