Florian Fankhauser

Projektass. Dipl.-Ing.

Publications

(2015). Aktive Bewußtseinsbildung.

Talk: Workshop Internationale Wirtschafts- und Industriespionage, Wien; 09-30-2015.

DB

(2015). Global VoIP Security Threats - Large Scale Validation Based on Independent Honeynets.

Talk: IFIP Networking Conference (IFIP Networking 2015), Toulouse, Frankreich; 05-20-2015 - 05-22-2015; in: “Proceedings of the IFIP Networking Conference 2015”, IEEE Conference Publications, (2015), 1 - 9.

DB

(2013). Voice calls for free: How the black market establishes free phone calls - Trapped and uncovered by a VoIP honeynet.

Talk: The 11th International Conference on Privacy, Security and Trust (PST 2013), Tarragona, Spain; 07-10-2013 - 07-12-2013; in: “Proceedings of the International Conference on Privacy, Security and Trust”, J. Castellà-Roca et al. (ed.); IEEE, (2013), ISBN: 978-1-4673-5839-2; 205 - 212.

DB

(2013). Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach.

Talk: 7th International Conference on Network and System Security (NSS 2013), Madrid, Spanien; 06-03-2013 - 06-04-2013; in: “Network and System Security”, J. Lopez, X. Huang, R. Sandhu (ed.); Springer Lecture Notes in Computer Science, Berlin - Heidelberg (2013), ISBN: 978-3-642-38630-5; 628 - 634.

DB

(2013). Improving the Accuracy of Automated Security Tests Based on Learned System Behavior Models.

Talk: The Fourth International Workshop on Security Testing (SECTEST 2013), Luxembourg; 03-22-2013; in: “Proceedings of the Fourth International Workshop on Security Testing (SECTEST 2013)", IEEE, (2013).

DB

(2013). Generic Approach for Security Error Detection Based on Learned System Behavior Models for Automated Security Tests.

Talk: Sixth IEEE International Conference on Software Testing, Verification and Validation (ICST 2013), Luxembourg; 03-18-2013 - 03-22-2013; in: “Proceedings of the Sixth IEEE International Conference on Software Testing, Verification and Validation”, IEEE, (2013), ISBN: 978-1-4799-1324-4; 453 - 460.

DB

(2011). Trapping and analyzing malicious voip traffic using a honeynet approach.

Talk: The 6th International Conference on Internet Technology and Secured Transactions, Abu Dhabi, UAE; 12-11-2011 - 12-14-2011; in: “Proceedings of the 6th International Conference on Internet Technology and Secured Transactions”, IEEE, (2011), ISBN: 978-1-908320-00-1; 442 - 447.

DB

(2011). Generic data format approach for generation of security test data.

Talk: The Third International Conference on Advances in System Testing and Validation Lifecycle, Barcelona, Spain; 10-23-2011 - 10-28-2011; in: “Proceedings of the Third International Conference on Advances in System Testing and Validation Lifecycle”, IARIA, 2011 (2011), ISBN: 978-1-61208-168-7; 103 - 108.

DB

(2011). Security status of voip based on the observation of real-world attacks on a honeynet.

Talk: The Third IEEE International Conference on Information Privacy, Security, Risk and Trust, MIT, Boston, USA; 10-09-2011 - 10-11-2011; in: “Proceedings of the Third IEEE International Conference on Information Privacy, Security, Risk and Trust”, IEEE, (2011), ISBN: 978-0-7695-4578-3; 1041 - 1047.

DB

(2011). Security test approach for automated detection of vulnerabilities of sip-based voip softphones.

International Journal On Advances in Security, 4 (2011), 1&2; 95 - 105.

DB

(2011). Security test environment for voip research.

International Journal for Information Security Research, 1 (2011), 1; 53 - 60.

DB

(2010). A Robust and Flexible Test Environment for VoIP Security Tests.

Talk: International Conference for Internet Technology and Secured Transactions (ICITST-2010), London, UK; 11-08-2010 - 11-11-2010; in: “Proceedings of The 5th International Conference for Internet Technology and Secured Transactions”, Infonomics Society, UK, (2010), ISBN: 978-0-9564263-6-9; 96 - 101.

DB

(2010). Automated Security Test Approach for SIP based VoIP Softphones.

Talk: The Second International Conference on Advances in System Testing and Validation Lifecycle, Nice, France; 08-22-2010 - 08-27-2010; in: “Proceedings of The Second International Conference on Advances in System Testing and Validation Lifecycle”, IEEE Computer Society Press, (2010), ISBN: 978-0-7695-4146-4; 114 - 119.

DB

(2010). Work in progress: Black-Box approach for testing quality of service in case of security incidents on the example of a SIP-based VoIP service.

Talk: Principles, Systems and Applications of IP Telecommunications (IPTComm'10), München, Deutschland; 08-02-2010 - 08-03-2010; in: “Proceedings of IPTComm 2010 Principles, Systems and Applications of IP Telecommunications”, Technische Universität München, Germany, (2010), ISSN: 1868-2642; 107 - 116.

DB

(2010). Mining security changes in freebsd.

Talk: 7th IEEE Working Conference on Mining Software Repositories (MSR), Cape Town, South Africa; 05-02-2010 - 05-03-2010; in: “Proceedings of 7th IEEE Working Conference on Mining Software Repositories (MSR)", IEEE, (2010), ISBN: 978-1-4244-6803-4; 90 - 93.

DB

(2009). Problem space and special characteristics of security testing in live and operational environments of large systems exemplified by a nationwide IT infrastructure.

Talk: Advances in System Testing and Validation Lifecycle 2009, Porto; 09-20-2009 - 09-25-2009; in: “Advances in System Testing and Validation Lifecycle”, IEEE, (2009), ISBN: 978-1-4244-4862-3; 161 - 166.

PDF DB