Skip to main content

Showing 1–5 of 5 results for author: Hanspach, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:1508.05228  [pdf, other

    cs.CR cs.OS

    A Case Study on Covert Channel Establishment via Software Caches in High-Assurance Computing Systems

    Authors: Wolfgang Schmidt, Michael Hanspach, Jörg Keller

    Abstract: Covert channels can be utilized to secretly deliver information from high privileged processes to low privileged processes in the context of a high-assurance computing system. In this case study, we investigate the possibility of covert channel establishment via software caches in the context of a framework for component-based operating systems. While component-based operating systems offer securi… ▽ More

    Submitted 21 August, 2015; originally announced August 2015.

    Comments: 12 pages, based upon the master's thesis of Schmidt

  2. arXiv:1406.1213  [pdf, other

    cs.CR cs.NI cs.SD

    On Covert Acoustical Mesh Networks in Air

    Authors: Michael Hanspach, Michael Goetz

    Abstract: Covert channels can be used to circumvent system and network policies by establishing communications that have not been considered in the design of the computing system. We construct a covert channel between different computing systems that utilizes audio modulation/demodulation to exchange data between the computing systems over the air medium. The underlying network stack is based on a communica… ▽ More

    Submitted 4 June, 2014; originally announced June 2014.

    Comments: 10 pages, updated version

    Journal ref: Journal of Communications 8(11), Nov. 2013

  3. arXiv:1403.1165  [pdf, other

    cs.CR cs.OS cs.SD

    A Taxonomy for Attack Patterns on Information Flows in Component-Based Operating Systems

    Authors: Michael Hanspach, Jörg Keller

    Abstract: We present a taxonomy and an algebra for attack patterns on component-based operating systems. In a multilevel security scenario, where isolation of partitions containing data at different security classifications is the primary security goal and security breaches are mainly defined as undesired disclosure or modification of classified data, strict control of information flows is the ultimate goal… ▽ More

    Submitted 5 March, 2014; originally announced March 2014.

    Comments: 9 pages

    Journal ref: In Proceedings of the 7th Layered Assurance Workshop, New Orleans, LA, USA, December 2013

  4. arXiv:1403.0766  [pdf

    cs.CR cs.NI

    Service-Fingerprinting mittels Fuzzing

    Authors: Michael Hanspach, Ralf Schumann, Stefan Schemmer, Sebastian Vandersee

    Abstract: Service fingerprinting (i.e. the identification of network services and other applications on computing systems) is an essential part of penetration tests. The main contribution of this paper is a study on the improvement of fingerprinting tools. By applying mutation-based fuzzing as a fingerprint generation method, subtle differences in response messages can be identified. These differences in re… ▽ More

    Submitted 4 March, 2014; originally announced March 2014.

    Comments: 10 pages, May 2009, German language content. This paper is based on the Diplom thesis / Diplomarbeit: "Verbesserung von OS- und Service-Fingerprinting mittels Fuzzing", Michael Hanspach, September 2008. DACH Security 2009: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven, May 2009, ISBN 300027488X

  5. arXiv:1403.0439  [pdf

    cs.CR cs.NI

    Verbesserung von OS- und Service-Fingerprinting mittels Fuzzing

    Authors: Michael Hanspach

    Abstract: Fingerprinting of services and operating systems is an essential part of penetration tests. In order to successfully penetrate the computing system's security measurements, preexisting fingerprinting methods are described and the paradigm of fingerprinting with mutation-based fuzzing is established. A case study about operating system and FTP server fingerprinting is presented whereby the feasibil… ▽ More

    Submitted 3 March, 2014; originally announced March 2014.

    Comments: 75 pages, Diplom thesis / Diplomarbeit. September 2008, German language content