Florian Fankhauser


Image
Projektass. Dipl.-Ing.

Florian Fankhauser

  • About:
  • Orcid:
  • Keywords:
  • Roles: PreDoc Researcher

Publications

Security test environment for voip research
Florian FankhauserMaximilian RonnigerChristian SchanesThomas Grechenig

View .bib

Handle: 20.500.12708/163157; Year: 2011; Issued On: 2011-01-01; Type: Publication; Subtype: Article;

Keywords:
Astract: Voice over IP (VoIP) is in wide use today, replacing phone lines in many scenarios. However, often, security isn't considered well enough, even though many security attacks are already known. More research on VoIP security is needed to enhance the level of security of VoIP systems and to show the implications of failing to take appropriate security measures. This paper presents a short introduc- tion in testing VoIP components, proposes an architecture and implementation of a robust, flexible and efficient VoIP test environment for security related tests. Experiences us- ing the implemented environment for different VoIP security tests are shown to demonstrate the suitability of the pro- posed test environment for research and teaching purposes

Fankhauser, F., Ronniger, M., Schanes, C., & Grechenig, T. (2011). Security test environment for voip research. International Journal for Information Security Research, 1(1), 53–60. http://hdl.handle.net/20.500.12708/163157
Trapping and analyzing malicious voip traffic using a honeynet approach.
Markus GruberFlorian FankhauserStefan TaberChristian SchanesThomas Grechenig

View .bib

Handle: 20.500.12708/54037; Year: 2011; Issued On: 2011-01-01; Type: Publication; Subtype: Inproceedings; Peer Reviewed:

Keywords:
Astract: Since several years the number of VoIP (Voice over IP) infrastructures increases and, consequently, the number of VoIP users increases too. Under these circumstances VoIP systems get more and more attractive for attackers, since the probability of successful attacks increases and attackers gain benefits, e.g., money with fee-based telephone numbers. Therefore, this paper describes a solution to capture, monitor and report VoIP attacks to gain more knowledge on current and new VoIP attacks.

Gruber, M., Fankhauser, F., Taber, S., Schanes, C., & Grechenig, T. (2011). Trapping and analyzing malicious voip traffic using a honeynet approach. In Proceedings of the 6th International Conference on Internet Technology and Secured Transactions (pp. 442–447). IEEE. http://hdl.handle.net/20.500.12708/54037
Generic data format approach for generation of security test data
Christian SchanesFlorian FankhauserStefan TaberThomas Grechenig

View .bib

Handle: 20.500.12708/54038; Year: 2011; Issued On: 2011-01-01; Type: Publication; Subtype: Inproceedings; Peer Reviewed:

Keywords:
Astract: Security testing is an important and at the same time also expensive task for developing robust and secure systems. Test automation can reduce costs of security tests and increase test coverage and, therefore, increase the number of detected security issues during development. A common data format as the basis for specific test cases ensures that the implementation of the generation logic for security test data is only needed once and can be used for various data formats by transforming the data to the common data format, generating the test data and transforming back to the original data format. The introduced approach enables to generate test data for various formats using a single implementation of the generation algorithm and applying the results for specific test cases in different data formats.

Schanes, C., Fankhauser, F., Taber, S., & Grechenig, T. (2011). Generic data format approach for generation of security test data. In Proceedings of the Third International Conference on Advances in System Testing and Validation Lifecycle (pp. 103–108). IARIA. http://hdl.handle.net/20.500.12708/54038
Security status of voip based on the observation of real-world attacks on a honeynet
Markus GruberFlorian FankhauserStefan TaberChristian SchanesThomas Grechenig

View .bib

Handle: 20.500.12708/54039; Year: 2011; Issued On: 2011-01-01; Type: Publication; Subtype: Inproceedings; Peer Reviewed:

Keywords:
Astract: VoIP (Voice over IP) systems more and more replacing PSTN (Public Switched Telephone Network) infrastructureswhat increases dependency of available and secure VoIP systems for successful business. Attacks against VoIP systems are becoming more imaginative and many attacks can cause damage, e.g., gain money for attackers or create costs for the victim. Therefore, in this paper the current security status of VoIP systems are described with observations of VoIP attacks in a honeynet. The achieved results can help to adapt existing prevention system to avoid the recognized and analyzed attacks in a productive environment.

Gruber, M., Fankhauser, F., Taber, S., Schanes, C., & Grechenig, T. (2011). Security status of voip based on the observation of real-world attacks on a honeynet. In Proceedings of the Third IEEE International Conference on Information Privacy, Security, Risk and Trust (pp. 1041–1047). IEEE. http://hdl.handle.net/20.500.12708/54039
Automated Security Test Approach for SIP based VoIP Softphones
Stefan TaberChristian SchanesClemens HlauschekFlorian FankhauserThomas Grechenig

View .bib

Handle: 20.500.12708/53539; Year: 2010; Issued On: 2010-01-01; Type: Publication; Subtype: Inproceedings; Peer Reviewed:

Keywords:
Astract: Robustness of applications used for Voice over Internet Protocol based systems against attacks is a critical part to secure such systems. Automatic security testing is required to detect security vulnera- bilities in an efficient way. This enables to harden the applications early during the development phase. In the paper we present a fuzzer framework to detect security vulnerabilities in Voice over IP (VoIP) Softphones which implement Session Initiation Protocol (SIP). The pre- sented approach automates the Graphical User Interface (GUI) interaction for softphones during fuzzing and also observes the behavior of the softphone GUIs to automatically detect application errors. Results of testing two open source softphones by using our fuzzer showed that various unknown vulnerabilities could be identified with the implemented fuzzer and some vulnerabilities were found that are only detectable by using GUI observation.

Taber, S., Schanes, C., Hlauschek, C., Fankhauser, F., & Grechenig, T. (2010). Automated Security Test Approach for SIP based VoIP Softphones. In Proceedings of The Second International Conference on Advances in System Testing and Validation Lifecycle (pp. 114–119). IEEE Computer Society Press. http://hdl.handle.net/20.500.12708/53539


Teaching

Introduction to Security
Semester: 2024W; Nr: 194.157; Type: VU; Hours: 4.0; Language: German; View on TISS

Team

Business Informatics Group, TU Wien

Head


Team member

Henderik Proper

Univ.Prof. PhD

Professors


Team member

Christian Huemer

Ao.Univ.Prof. Mag.rer.soc.oec.
Dr.rer.soc.oec.

Team member

Dominik Bork

Associate Prof. Dipl.-Wirtsch.Inf.Univ.
Dr.rer.pol.

Team member

Gerti Kappel

O.Univ.Prof.in Dipl.-Ing.in
Mag.a Dr.in techn.

Team member

Henderik Proper

Univ.Prof. PhD

Visiting Scientists


Team member

Christiane Floyd

Hon.Prof.in Dr.in phil.

Team member

Johanna Barzen

Dr. phil.

Administration



Researchers


Team member

Aleksandar Gavric

Univ.Ass. MEng. B.Eng.

Team member

Galina Paskaleva

Projektass.in Dipl.-Ing.in
Dipl.-Ing.in BSc

Team member

Marianne Schnellmann

Univ.Ass.in BSc MSc

Team member

Marion Murzek

Senior Lecturer Mag.a rer.soc.oec.
Dr.in rer.soc.oec.

Team member

Marion Scholz

Senior Lecturer Dipl.-Ing.in
Mag.a rer.soc.oec.

Team member

Miki Zehetner

Univ.Ass. DI Bakk.rer.soc.oec. MSc

Team member

Syed Juned Ali

Univ.Ass. BSc MSc

External Researchers




Team member

Marco Huymajer

Univ.Ass. Dipl.-Ing.