Christian Schanes

Projektass. Dipl.-Ing. Dr.techn.

Publications

(2015). Aktive Bewußtseinsbildung.

Talk: Workshop Internationale Wirtschafts- und Industriespionage, Wien; 09-30-2015.

DB

(2015). Ein realer Cyber-Angriff und seine Abwehr: Struktur und Live-Demo.

Talk: Österreichische Fachtagung zum Thema Industrie 4.0, Zell am See; 09-22-2015 - 09-23-2015.

DB

(2015). Global VoIP Security Threats - Large Scale Validation Based on Independent Honeynets.

Talk: IFIP Networking Conference (IFIP Networking 2015), Toulouse, Frankreich; 05-20-2015 - 05-22-2015; in: “Proceedings of the IFIP Networking Conference 2015”, IEEE Conference Publications, (2015), 1 - 9.

DB

(2015). Mobile Payment Fraud: A Practical View on the Technical Architecture and Starting Points for Forensic Analysis of New Attack Scenarios.

Talk: Ninth International Conference on IT Security Incident Management & IT Forensics (IMF), Magdeburg; 05-18-2015 - 05-20-2015; in: “Proceedings of the 9th International Conference on IT Security Incident Management & IT Forensics (IMF)", IEEE, (2015), ISBN: 978-1-4799-9902-6; 68 - 76.

DB

(2015). Dataset of Developer-Labeled Commit Messages.

Talk: The 12th Working Conference on Mining Software Repositories (MSR), Florenz, Italien; 05-16-2015 - 05-17-2015; in: “Proceedings of the 12th Working Conference on Mining Software Repositories (MSR)", IEEE, (2015), ISBN: 978-0-7695-5594-2; 490 - 493.

DB

(2014). Chaotic ad-hoc data network - a bike based system for city networks.

Talk: The Fifth International Conference on Communications and Electronics (ICCE 2014), Da Nang, Vietnam; 07-30-2014 - 08-01-2014; in: “The 2014 IEEE Fifth International Conference on Communications and Electronics”, IEEE, (2014), ISBN: 978-1-4799-5049-2; 252 - 257.

DB

(2014). Data Retention Services with Soft Privacy Impacts: Concept and Implementation.

Talk: 5th IEEE International Conference on Software Engineering and Service Science (ICSESS 2014), Beijing, China; 06-27-2014 - 06-29-2014; in: “Proceedings of the International Conference on Software Engineering and Service Science”, IEEE, Curran Associates, Inc. (2014), ISBN: 9781479932801; 178 - 181.

DB

(2014). Concept and Design of a Transparent Security Layer to Enable Anonymous VoIP Calls.

Talk: International Conference on Advanced Networking, Distributed Systems and Applications (INDS 2014), Béjaia, Algeria; 06-17-2014 - 06-19-2014; in: “Proceedings of the International Conference on Advanced Networking, Distributed Systems and Applications”, INDS, (2014), 58 - 61.

DB

(2013). Voice calls for free: How the black market establishes free phone calls - Trapped and uncovered by a VoIP honeynet.

Talk: The 11th International Conference on Privacy, Security and Trust (PST 2013), Tarragona, Spain; 07-10-2013 - 07-12-2013; in: “Proceedings of the International Conference on Privacy, Security and Trust”, J. Castellà-Roca et al. (ed.); IEEE, (2013), ISBN: 978-1-4673-5839-2; 205 - 212.

DB

(2013). Extraction of ABNF Rules from RFCs to Enable Automated Test Data Generation.

Talk: 28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference (SEC 2013), Auckland, New Zealand; 07-08-2013 - 07-10-2013; in: “Security and Privacy Protection in Information Processing Systems”, L. Janczewski et al. (ed.); Springer IFIP Advances in Information and Communication Technology, Berlin-Heidelberg (2013), ISBN: 978-3-642-39217-7; 111 - 124.

DB

(2013). Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach.

Talk: 7th International Conference on Network and System Security (NSS 2013), Madrid, Spanien; 06-03-2013 - 06-04-2013; in: “Network and System Security”, J. Lopez, X. Huang, R. Sandhu (ed.); Springer Lecture Notes in Computer Science, Berlin - Heidelberg (2013), ISBN: 978-3-642-38630-5; 628 - 634.

DB

(2013). Improving the Accuracy of Automated Security Tests Based on Learned System Behavior Models.

Talk: The Fourth International Workshop on Security Testing (SECTEST 2013), Luxembourg; 03-22-2013; in: “Proceedings of the Fourth International Workshop on Security Testing (SECTEST 2013)", IEEE, (2013).

DB

(2013). Generic Approach for Security Error Detection Based on Learned System Behavior Models for Automated Security Tests.

Talk: Sixth IEEE International Conference on Software Testing, Verification and Validation (ICST 2013), Luxembourg; 03-18-2013 - 03-22-2013; in: “Proceedings of the Sixth IEEE International Conference on Software Testing, Verification and Validation”, IEEE, (2013), ISBN: 978-1-4799-1324-4; 453 - 460.

DB

(2012). Tracing your maintenance work - a cross-project validation of an automated classification dictionary for commit messages.

Talk: 15th International Conference on Fundamental Approaches to Software Engineering (FASE'12), Tallinn, Estonia; 03-24-2012 - 04-01-2012; in: “Proceedings of the 15th international conference on Fundamental Approaches to Software Engineering (FASE'12)", Springer-Verlag, Berlin, Heidelberg (2012), ISBN: 978-3-642-28871-5; 301 - 315.

DB

(2011). Trapping and analyzing malicious voip traffic using a honeynet approach.

Talk: The 6th International Conference on Internet Technology and Secured Transactions, Abu Dhabi, UAE; 12-11-2011 - 12-14-2011; in: “Proceedings of the 6th International Conference on Internet Technology and Secured Transactions”, IEEE, (2011), ISBN: 978-1-908320-00-1; 442 - 447.

DB

(2011). Generic data format approach for generation of security test data.

Talk: The Third International Conference on Advances in System Testing and Validation Lifecycle, Barcelona, Spain; 10-23-2011 - 10-28-2011; in: “Proceedings of the Third International Conference on Advances in System Testing and Validation Lifecycle”, IARIA, 2011 (2011), ISBN: 978-1-61208-168-7; 103 - 108.

DB

(2011). Security status of voip based on the observation of real-world attacks on a honeynet.

Talk: The Third IEEE International Conference on Information Privacy, Security, Risk and Trust, MIT, Boston, USA; 10-09-2011 - 10-11-2011; in: “Proceedings of the Third IEEE International Conference on Information Privacy, Security, Risk and Trust”, IEEE, (2011), ISBN: 978-0-7695-4578-3; 1041 - 1047.

DB

(2011). Security test approach for automated detection of vulnerabilities of sip-based voip softphones.

International Journal On Advances in Security, 4 (2011), 1&2; 95 - 105.

DB

(2011). Security test environment for voip research.

International Journal for Information Security Research, 1 (2011), 1; 53 - 60.

DB

(2010). A Robust and Flexible Test Environment for VoIP Security Tests.

Talk: International Conference for Internet Technology and Secured Transactions (ICITST-2010), London, UK; 11-08-2010 - 11-11-2010; in: “Proceedings of The 5th International Conference for Internet Technology and Secured Transactions”, Infonomics Society, UK, (2010), ISBN: 978-0-9564263-6-9; 96 - 101.

DB

(2010). Automated Security Test Approach for SIP based VoIP Softphones.

Talk: The Second International Conference on Advances in System Testing and Validation Lifecycle, Nice, France; 08-22-2010 - 08-27-2010; in: “Proceedings of The Second International Conference on Advances in System Testing and Validation Lifecycle”, IEEE Computer Society Press, (2010), ISBN: 978-0-7695-4146-4; 114 - 119.

DB

(2010). Work in progress: Black-Box approach for testing quality of service in case of security incidents on the example of a SIP-based VoIP service.

Talk: Principles, Systems and Applications of IP Telecommunications (IPTComm'10), München, Deutschland; 08-02-2010 - 08-03-2010; in: “Proceedings of IPTComm 2010 Principles, Systems and Applications of IP Telecommunications”, Technische Universität München, Germany, (2010), ISSN: 1868-2642; 107 - 116.

DB

(2010). Mining security changes in freebsd.

Talk: 7th IEEE Working Conference on Mining Software Repositories (MSR), Cape Town, South Africa; 05-02-2010 - 05-03-2010; in: “Proceedings of 7th IEEE Working Conference on Mining Software Repositories (MSR)", IEEE, (2010), ISBN: 978-1-4244-6803-4; 90 - 93.

DB

(2009). Problem space and special characteristics of security testing in live and operational environments of large systems exemplified by a nationwide IT infrastructure.

Talk: Advances in System Testing and Validation Lifecycle 2009, Porto; 09-20-2009 - 09-25-2009; in: “Advances in System Testing and Validation Lifecycle”, IEEE, (2009), ISBN: 978-1-4244-4862-3; 161 - 166.

PDF DB

(2009). Nationwide PKI Testing - Ensuring Interoperability of OCSP Server and Client Implementations Early During Component Tests.

Talk: Sixth European Workshop on Public Key Services, Applications and Infrastructures, Pisa, Italy; 09-10-2009 - 09-11-2009; in: “Proceedings of the Sixth European Workshop on Public Key Services, Applications and Infrastructures”, Springer, (2009), 115 - 130.

DB