Category: Secure Systems
The development of the intranet into BeyondCorp
Aron Köcher, Miro Bilge Only a few years earlier, the solution to exchange digital information like documents or pictures was to establish a physical connection between the participants. A usb stick was passed around the class to exchange music, you went to your friends house to print some urgent papers or a group of friends…
How are vulnerabilities exploited to compromise a system?
This article is a recap of the “Live Hack” presentation, held in the lecture “Sichere Systeme” in SS 2020. It will introduce different vulnerabilities like XSS and SQL-Injection and shows how passwords can be cracked under certain circumstances. The last step explains how a SUID binary was exploited to gain root access on the target…
Behind the scenes of modern operating systems — Security through isolation (Part 1)
In recent years, since the Internet has become available to almost anyone, application and runtime security is important more than ever. Be it an (unknown) application you download and run from the Internet or some server application you expose to the Internet, it’s almost certainly a bad idea to run apps without any security restrictions…
Stromnetze
Strom wird für fast alles benötigt. Von Computern und Servern, welche ausfallsicher laufen sollen um den Nutzern zuverlässig ihren Service bieten zu können, bis hin zu Wasserpumpen und Medizinischen Geräten, die die Grundversorgung bereitstellen und das Überleben sichern – ein Ausfall dieser Infrastruktur ist daher sehr ungünstig. In diesem Beitrag geht es um mehrere Aspekte…
Fake news with reference to information warfare
Through networking and the Internet, more and more people can share their opinions and spread news. This has positive and negative consequences. On the one hand, it is much easier to get the news you want and to publish it. On the other hand it is relatively easy to influence other users. An insight into…
Corona Warning App
In 2020 many things are different. People work and study from home, wear face masks and are facing restrictions in their fundamental rights. These measures and restrictions were taken to bring the global pandemic under control. More than 800.000 people have died as a result of Covid-19 (SARS-CoV-2) (25.08.2020). “Let’s build an app for it”…
The financial system
Everyone interacts with it, often on a daily basis, everyone is part of it and everyone will suffer from the consequences of a crisis hitting the system, but only few reap the benefits. The financial system has become huge and ominous, it is hard to understand how it works or even fully comprehend it. This…
The Dark Side of AI – Part 2: Adversarial Attacks
Find out how AI may become an attack vector! Could an attacker use your models against your? Also, what’s the worst that could happen? Welcome to the domain of adversarial AI!
The Dark Side of AI – Part 1: Cyberattacks and Deepfakes
Introduction Who hasn’t seen a cinema production in which an AI-based robot threatens individual people or the entire human race? It is in the stars when or if such a technology can really be developed. With this series of blog entries we want to point out that AI does not need robots to cause damage.…