SURF

Systemic Security for Critical Infrastructures

Partners:

  • Airbus Group Innovations
  • Fraunhofer SIT
  • Infineon Technologies AG
  • Hirschmann Automation and Control GmbH
  • Technische Hochschule Deggendorf
  • Flughafen München GmbH

Related publications

2016-10-01 Daniel Raumer, Sebastian Gallenmüller, Paul Emmerich, Lukas Märdian, Florian Wohlfart, Georg Carle, “Efficient Serving of VPN Endpoints on COTS Server Hardware,” in 2016 IEEE 5th tnternational Conference on Cloud Networking (CloudNet’16), Pisa, Italy, Oct. 2016. [Pdf] [Bib]
2016-07-01 Daniel Raumer, Sebastian Gallenmüller, Florian Wohlfart, Paul Emmerich, Patrick Werneck, Georg Carle, “Revisiting Benchmarking Methodology for Interconnect Devices,” in The Applied Networking Research Workshop 2016 (ANRW ’16), Berlin, Germany, Jul. 2016. [Pdf] [Bib]
2016-05-02 Matthias Wachs, Nadine Herold, Stephan-A. Posselt, Florian Dold, Georg Carle, “GPLMT: A Lightweight Experimentation and Testbed Management Framework,” in Passive and Active Measurement: 17th International Conference, PAM 2016, Heraklion, Greece, Mar. 2016. [Url] [Pdf] [DOI] [Bib]
2016-05-01 Cornelius Diekmann, Julius Michaelis, Maximilian Haslbeck, Georg Carle, “Verified iptables Firewall Analysis,” in IFIP Networking 2016, Vienna, Austria, May 2016. [Url] [Pdf] [Slides] [Sourcecode] [Rawdata] [Bib]
2016-04-01 N. Herold, S. Posselt, O. Hanka, G. Carle, “Anomaly Detection for SOME/IP using Complex Event Processing,” in 2ND IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT), Apr. 2016. [Bib]
2016-04-01 Oliver Gasser, Felix Emmert, Georg Carle, “Digging for Dark IPMI Devices: Advancing BMC Detection and Evaluating Operational Security,” in Proc. 8th Int. Workshop on Traffic Monitoring and Analysis, Louvain-la-Neuve, Belgium, Apr. 2016. [Pdf] [Bib]
2016-04-01 Oliver Gasser, Quirin Scheitle, Sebastian Gebhard, Georg Carle, “Scanning the IPv6 Internet: Towards a Comprehensive Hitlist,” in Proc. 8th Int. Workshop on Traffic Monitoring and Analysis, Louvain-la-Neuve, Belgium, Apr. 2016. [Url] [Pdf] [Slides] [Bib]
2016-01-01 Nadine Herold, Holger Kinkelin, Georg Carle, “Collaborative Incident Handling Based on the Blackboard-Pattern,” in Proceedings of the 3rd ACM Workshop on Information Sharing and Collaborative Security, New York, NY, USA, 2016. [Bib]
2016-01-01 Nadine Herold, Matthias Wachs, Stephan-A. Posselt, Georg Carle, “An Optimal Metric-Aware Response Selection Strategy for Intrusion Response Systems,” in Foundations and Practice of Security: 8th International Symposium, FPS 2016, Quebec, Canada, October 24-26, 2016, Springer International Publishing, 2016. [Bib]
2015-11-01 Cornelius Diekmann, Andreas Korsten, Georg Carle, “Demonstrating topoS: Theorem-Prover-Based Synthesis of Secure Network Configurations,” in 2nd International Workshop on Management of SDN and NFV Systems, manSDN/NFV, Barcelona, Spain, Nov. 2015. [Url] [Preprint] [Slides] [Sourcecode] [DOI] [Bib]
2015-11-01 Cornelius Diekmann, Lukas Schwaighofer, Georg Carle, “Certifying Spoofing-Protection of Firewalls,” in 11th International Conference on Network and Service Management, CNSM, Barcelona, Spain, Nov. 2015. [Url] [Preprint] [Sourcecode] [Rawdata] [DOI] [Bib]

Finished student theses

Author Title Type Advisors Year Links
Marko Dorfhuber Information Collection for Temporal Variation Analysis on Networks BA Nadine Herold, Matthias Wachs, Stefan Liebald 2016
Christoph Rudolf Automated Planning, Setup and Configuration for Scientific Testbed Environments BA Nadine Herold, Matthias Wachs, Stefan Liebald 2016
Clemens Paul Modellierung und Anwendung von Redundanz MA Nadine Herold, Stephan-A. Posselt 2015
Christian Lübben Implementing an Attack Framework for Generating Test Data Sets for Intrusion Detection Systems IDP Nadine Herold, Stephan-A. Posselt 2015
Sebastian Kiwus Botnet-Evaluierung und Botnet-Erkennung BA Nadine Herold, Stephan-A. Posselt 2015
Richard Kaufhold Konzepte zur Priorisierung von Alarmen in heterogenen IDS-Umgebungen MA Nadine Herold, Stephan-A. Posselt 2015
Max Helm Konzeption eines Systems zur Erkennung von Sicherheitsverletzungen in Netzwerken BA Nadine Herold, Stephan-A. Posselt 2015
Sebastian Gebhard IPv6 Scanning - Smart Address Selection and Comparison to Legacy IP MA Oliver Gasser, Quirin Scheitle 2015
Felix Emmert Messung und Evalution der Verbreitung von IPMI-Geräten mit aktiven Scans BA Oliver Gasser 2015
Simon Bauer Evaluation of Port Scanners and Port Scan Detection Tools BA Nadine Herold, Stephan-A. Posselt 2015
Christian Lübben Erstellung von Testdatensätzen für Intrusion Detection Systeme BA Nadine Herold, Stephan-A. Posselt 2014