Fabian Franzen's research while affiliated with Technische Universität München and other places

Publications (7)

Article
Full-text available
Zusammenfassung Eine etablierte Methode der Sicherheitsforschung zur Feststellung von Schwachstellen in Software ist Reverse Engineering. Verstößt eine solche Analyse von Programmen gegen das Urheberrecht? Mehrere deutsche Forscherteams erhielten nach der Veröffentlichung von gefundenen Schwachstellen Unterlassungserklärungen sowie Anträge auf eins...
Conference Paper
On Linux, most---if not all---debuggers use ptrace debugging API to control their target processes. However, ptrace proves unsatisfactory for many malware analysis and reverse engineering tasks: So-called split-personality malware often adapts its behavior in the presence of a debugger, yet ptrace makes no attempt to hide from a target process. Fur...
Conference Paper
With the increasing use of Ethernet-based communication backbones in safety-critical real-time domains, both efficient and predictable interfacing and cryptographically secure authentication of high-speed data streams are becoming very important. Although the increasing data rates of in-vehicle networks allow the integration of more demanding (e.g....

Citations

... To combat such threats, much research is carried out in various fields, including deep learning, memory forensics, number theory, and so on [4][5][6]. Memory forensics offers unique insights into the internal state of kernel system and running programs [7]. Memory has a high potential to contain malicious code from an infection, in whole or in part, even if it is never written to disk, because it must be loaded in memory to execute [8]. ...
... Franzen Et al 2022 [24] discussed the gaps in the traditional honeypot based security and their deteriorating contribution in cyber security ecosystem. He highlighted some online platforms such as Censys.io ...
... Being a vital short-range wireless communication technology, Bluetooth has been used by numerous devices for various applications (e.g., earbuds, wearables, and sensors) [12]. Unfortunately, the past several years have also witnessed numerous security flaws, from implementation (e.g., leaking UUIDs [61], or misconfigurations [54]) to specification (e.g., BAIS attacks [5] and Method confusion attacks [53]) that have rendered billions of Bluetooth devices vulnerable to intruders [51]. While luckily these flaws have been discovered, most of them were identified with manual efforts. ...
... At the kernel space level, the cryptographic file system can be implemented as a middleware layer to encrypt individual files or directories using file system filter driver technology in the Windows kernel [1,4,6,7] and Unix-like stackable file system [8,9]. Furthermore, a cryptographic file system can be implemented as a low-level file system layer, operating under the real file system, either as a block device layer attached to the storage disk itself [10] or a virtual disk driver [11] providing encryption for all single-or multiple-disk partitions. ...
... With plutonium-dbg, Holl et al. [98] tried to overcome the shortcomings of the Ptrace mechanism by implementing a Uprobes-based kernel-level debugging facility that provides a GDB-compatible interface. While building plutonium-gdb on top of Uprobes eliminates detectable artifacts created by Ptrace, debuggees might still discover the inserted probes, as stated by the authors. ...
... There is now a rapid growth in the number of applications that involve some image or video processing within a control loop [24]. In other words, one or more sensors in such applications are video cameras or radar sensors, and they are referred to as visual servoing systems [25]. ...