Florian Fankhauser
Projektass. Dipl.-Ing.
Florian Fankhauser
- Email: florian.fankhauser@tuwien.ac.at
- Phone: +43-1-58801-183410
- Office: (1040 Wien, Favoritenstrasse 11)
- About:
- Orcid:
- Keywords:
- Roles: PreDoc Researcher
Publications
Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach
Markus GruberChristian SchanesFlorian FankhauserMartin MoutranThomas GrechenigJavier LopezXinyi HuangRavi SandhuKeywords:
Astract: Voice over IP systems are more and more replacing Public Switched Telephone Network infrastructures. The number of voice telephony installations and the number of Session Initiation Protocol users is constantly increasing. Attacks against Voice over IP systems are becoming more imaginative and many attacks can cause financial damage, e.g., attackers gain money or create costs for the victim. Therefore, the dependency on available and secure Voice over IP systems to conduct secure business is given. We provide an environment to uncover real-world toll fraud attacks by collecting data using a Voice over IP honeynet solution.
Gruber, M., Schanes, C., Fankhauser, F., Moutran, M., & Grechenig, T. (2013). Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach. In J. Lopez, X. Huang, & R. Sandhu (Eds.), Network and System Security (pp. 628–634). Springer Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/55054
Voice calls for free: How the black market establishes free phone calls - Trapped and uncovered by a VoIP honeynet
Markus GruberChristian SchanesFlorian FankhauserThomas GrechenigJordi Castellà-RocaKeywords:
Astract: The number of Voice over IP systems and the number of Session Initiation Protocol users is constantly increasing. The new Voice over IP infrastructures are connected with the traditional Public Switched Telephone Network and attacks against the phone infrastructure are becoming more imaginative. The attacks can cause financial losses, e.g., attackers steal money or incur costs for the victim. We analyze the current status of toll fraud attacks by analyzing real-world attacks collected in a Voice over IP honeynet solution. Based on the detailed data about real attacks, the creation or adaption of existing prevention mechanisms is possible in order to avoid toll fraud attacks in live environments.
Gruber, M., Schanes, C., Fankhauser, F., & Grechenig, T. (2013). Voice calls for free: How the black market establishes free phone calls - Trapped and uncovered by a VoIP honeynet. In J. Castellà-Roca (Ed.), Proceedings of the International Conference on Privacy, Security and Trust (pp. 205–212). IEEE. http://hdl.handle.net/20.500.12708/55055
Generic Approach for Security Error Detection Based on Learned System Behavior Models for Automated Security Tests
Christian SchanesAndreas HüblerFlorian FankhauserThomas GrechenigKeywords:
Astract: The increasing complexity of software and IT systems creates the necessity for research on technologies addressing current key security challenges. To meet security requirements in IT infrastructures, a security engineering process has to be established. One crucial factor contributing to a higher level of security is the reliable detection of security vulnerabilities during security tests. In the presented approach, we observe the behavior of the system under test and introduce machine learning methods based on derived behavior metrics. This is a generic method for different test targets which improves the accuracy of the security test result of an automated security testing approach. Reliable automated determination of security failures in security test results increases the security quality of the tested software and avoids costly manual validation.
Schanes, C., Hübler, A., Fankhauser, F., & Grechenig, T. (2013). Generic Approach for Security Error Detection Based on Learned System Behavior Models for Automated Security Tests. In Proceedings of the Sixth IEEE International Conference on Software Testing, Verification and Validation (pp. 453–460). IEEE. http://hdl.handle.net/20.500.12708/55058
Improving the Accuracy of Automated Security Tests Based on Learned System Behavior Models
Christian SchanesFlorian FankhauserAndreas HüblerThomas GrechenigKeywords:
Astract: The increasing complexity of software and IT systems creates the necessity for research on technologies addressing current key security challenges. To meet security problems in IT infrastructures, a security engineering process has to be established. One crucial factor contributing to a higher level of security is the reliable detection of security vulnerabilities during security tests. We observe the behavior of the system under test and introduce machine learning methods based on derived behavior metrics. This improves the accuracy of the security test result of an automated security testing approach. Reliable automated determination of security failures in security test results increases the security quality of the tested software and avoids costly manual validation.
Schanes, C., Fankhauser, F., Hübler, A., & Grechenig, T. (2013). Improving the Accuracy of Automated Security Tests Based on Learned System Behavior Models. In Proceedings of the Fourth International Workshop on Security Testing (SECTEST 2013). The Fourth International Workshop on Security Testing (SECTEST 2013), Luxembourg, EU. IEEE. http://hdl.handle.net/20.500.12708/55059
Security test approach for automated detection of vulnerabilities of sip-based voip softphones.
Christian SchanesStefan TaberKarin PoppFlorian FankhauserThomas GrechenigKeywords:
Astract: Voice over Internet Protocol based systems replace phone lines in
many scenarios and are in wide use today. Automated security tests
of such systems are required to detect implementation and configuration
mistakes early and in an efficient way. In this paper we present
a plugin for our fuzzer framework fuzzolution to automatically detect
security vulnerabilities in Session Initiation Protocol based Voice
over Internet Protocol softphones, which are examples for endpoints
in such telephone systems. The presented approach automates the interaction
with the Graphical User Interface of the softphones during test execution
and also observes the behavior of the softphones using multiple metrics.
Results of testing two open source softphones by using our fuzzer
showed that various unknown vulnerabilities could be identified with
the implemented plugin for our fuzzing framework.
Schanes, C., Taber, S., Popp, K., Fankhauser, F., & Grechenig, T. (2011). Security test approach for automated detection of vulnerabilities of sip-based voip softphones. International Journal On Advances in Security, 4(1 & amp;2), 95–105. http://hdl.handle.net/20.500.12708/163156
Teaching
Introduction to Security
Semester: 2024W; Nr: 194.157; Type: VU; Hours: 4.0; Language: German; View on TISSTeam
Business Informatics Group, TU Wien
Professors
Christian Huemer
Ao.Univ.Prof. Mag.rer.soc.oec.Dr.rer.soc.oec.
Dominik Bork
Associate Prof. Dipl.-Wirtsch.Inf.Univ.Dr.rer.pol.
Gerti Kappel
O.Univ.Prof.in Dipl.-Ing.inMag.a Dr.in techn.
Henderik Proper
Univ.Prof. PhDResearchers
Aleksandar Gavric
Univ.Ass. MEng. B.Eng.Galina Paskaleva
Projektass.in Dipl.-Ing.inDipl.-Ing.in BSc
Marianne Schnellmann
Univ.Ass.in BSc MScMarion Murzek
Senior Lecturer Mag.a rer.soc.oec.Dr.in rer.soc.oec.
Marion Scholz
Senior Lecturer Dipl.-Ing.inMag.a rer.soc.oec.