Skip to main content

Showing 1–17 of 17 results for author: Federrath, H

  1. arXiv:2405.09230  [pdf, ps, other

    cs.CR cs.NI

    Reduce to the MACs -- Privacy Friendly Generic Probe Requests

    Authors: Johanna Ansohn McDougall, Alessandro Brighente, Anne Kunstmann, Niklas Zapatka, Hannes Federrath

    Abstract: Abstract. Since the introduction of active discovery in Wi-Fi networks, users can be tracked via their probe requests. Although manufacturers typically try to conceal Media Access Control (MAC) addresses using MAC address randomisation, probe requests still contain Information Elements (IEs) that facilitate device identification. This paper introduces generic probe requests: By removing all unnece… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

  2. arXiv:2308.15104  [pdf, other

    cs.CR

    LoVe is in the Air -- Location Verification of ADS-B Signals using Distributed Public Sensors

    Authors: Johanna Ansohn McDougall, Alessandro Brighente, Willi Großmann, Ben Ansohn McDougall, Joshua Stock, Hannes Federrath

    Abstract: The Automatic Dependant Surveillance-Broadcast (ADS-B) message scheme was designed without any authentication or encryption of messages in place. It is therefore easily possible to attack it, e.g., by injecting spoofed messages or modifying the transmitted Global Navigation Satellite System (GNSS) coordinates. In order to verify the integrity of the received information, various methods have been… ▽ More

    Submitted 29 August, 2023; originally announced August 2023.

  3. arXiv:2307.15503  [pdf, other

    cs.LG

    The Applicability of Federated Learning to Official Statistics

    Authors: Joshua Stock, Oliver Hauke, Julius Weißmann, Hannes Federrath

    Abstract: This work investigates the potential of Federated Learning (FL) for official statistics and shows how well the performance of FL models can keep up with centralized learning methods.F L is particularly interesting for official statistics because its utilization can safeguard the privacy of data holders, thus facilitating access to a broader range of data. By simulating three different use cases, i… ▽ More

    Submitted 29 September, 2023; v1 submitted 28 July, 2023; originally announced July 2023.

  4. Probing for Passwords -- Privacy Implications of SSIDs in Probe Requests

    Authors: Johanna Ansohn McDougall, Christian Burkert, Daniel Demmler, Monina Schwarz, Vincent Hubbe, Hannes Federrath

    Abstract: Probe requests help mobile devices discover active Wi-Fi networks. They often contain a multitude of data that can be used to identify and track devices and thereby their users. The past years have been a cat-and-mouse game of improving fingerprinting and introducing countermeasures against fingerprinting. This paper analyses the content of probe requests sent by mobile devices and operating syste… ▽ More

    Submitted 6 July, 2022; v1 submitted 8 June, 2022; originally announced June 2022.

  5. arXiv:2205.13776  [pdf, other

    cs.CR

    PrivacyDates: A Framework for More Privacy-Preserving Timestamp Data Types

    Authors: Christian Burkert, Jonathan Balack, Hannes Federrath

    Abstract: Case studies of application software data models indicate that timestamps are excessively used in connection with user activity. This contradicts the principle of data minimisation which demands a limitation to data necessary for a given purpose. Prior work has also identified common purposes of timestamps that can be realised by more privacy-preserving alternatives like counters and dates with pu… ▽ More

    Submitted 7 June, 2022; v1 submitted 27 May, 2022; originally announced May 2022.

    Comments: Accepted and presented at the conference GI Sicherheit 2022

  6. arXiv:2205.08821  [pdf, other

    cs.CR cs.AI cs.LG

    Lessons Learned: Defending Against Property Inference Attacks

    Authors: Joshua Stock, Jens Wettlaufer, Daniel Demmler, Hannes Federrath

    Abstract: This work investigates and evaluates multiple defense strategies against property inference attacks (PIAs), a privacy attack against machine learning models. Given a trained machine learning model, PIAs aim to extract statistical properties of its underlying training data, e.g., reveal the ratio of men and women in a medical training data set. While for other privacy attacks like membership infere… ▽ More

    Submitted 9 October, 2023; v1 submitted 18 May, 2022; originally announced May 2022.

    Journal ref: Proceedings of the 20th International Conference on Security and Cryptography SECRYPT (2023) 312-323

  7. arXiv:2112.06545  [pdf, other

    cs.CR

    A Structured Analysis of Information Security Incidents in the Maritime Sector

    Authors: Monina Schwarz, Matthias Marx, Hannes Federrath

    Abstract: Cyber attacks in the maritime sector can have a major impact on world economy. However, the severity of this threat can be underestimated because many attacks remain unknown or unnoticed. We present an overview about publicly known cyber incidents in the maritime sector from the past 20 years. In total, we found 90 publicly reported attacks and 15 proof of concepts. Furthermore, we interviewed fiv… ▽ More

    Submitted 13 December, 2021; originally announced December 2021.

  8. arXiv:2106.04277  [pdf, other

    cs.NI

    Operating Tor Relays at Universities: Experiences and Considerations

    Authors: Christoph Döpmann, Matthias Marx, Hannes Federrath, Florian Tschorsch

    Abstract: In today's digital society, the Tor network has become an indispensable tool for individuals to protect their privacy on the Internet. Operated by volunteers, relay servers constitute the core component of Tor and are used to geographically escape surveillance. It is therefore essential to have a large, yet diverse set of relays. In this work, we analyze the contribution of educational institution… ▽ More

    Submitted 9 June, 2021; v1 submitted 8 June, 2021; originally announced June 2021.

  9. PEEPLL: Privacy-Enhanced Event Pseudonymisation with Limited Linkability

    Authors: Ephraim Zimmer, Christian Burkert, Tom Petersen, Hannes Federrath

    Abstract: Pseudonymisation provides the means to reduce the privacy impact of monitoring, auditing, intrusion detection, and data collection in general on individual subjects. Its application on data records, especially in an environment with additional constraints, like re-identification in the course of incident response, implies assumptions and privacy issues, which contradict the achievement of the desi… ▽ More

    Submitted 12 December, 2019; originally announced December 2019.

    Comments: 10 pages. Extended version, Dec. 2019. A shortened version has been accepted for publication in the proceedings of the 35th ACM/SIGAPP Symposium On Applied Computing 2020

  10. arXiv:1907.01291  [pdf, other

    cs.NI

    Accelerating QUIC's Connection Establishment on High-Latency Access Networks

    Authors: Erik Sy, Tobias Mueller, Moritz Moennich, Hannes Federrath

    Abstract: A significant amount of connection establishments on the web require a prior domain name resolution by the client. Especially on high-latency access networks, these DNS lookups cause a significant delay on the client's connection establishment with a server. To reduce the overhead of QUIC's connection establishment with prior DNS lookup on these networks, we propose a novel QuicSocks proxy. Basica… ▽ More

    Submitted 2 July, 2019; originally announced July 2019.

  11. arXiv:1905.03518  [pdf, other

    cs.CR cs.PF

    Enhanced Performance and Privacy for TLS over TCP Fast Open

    Authors: Erik Sy, Tobias Mueller, Christian Burkert, Hannes Federrath, Mathias Fischer

    Abstract: Small TCP flows make up the majority of web flows. For them, the TCP three-way handshake induces significant delay overhead. The TCP Fast Open (TFO) protocol can significantly decrease this delay via zero round-trip time (0-RTT) handshakes for all TCP handshakes that follow a full initial handshake to the same host. However, this comes at the cost of privacy limitations and also has some performan… ▽ More

    Submitted 12 November, 2019; v1 submitted 9 May, 2019; originally announced May 2019.

    Comments: 12 pages

  12. arXiv:1904.06228  [pdf, other

    cs.NI cs.CR

    QUICker connection establishment with out-of-band validation tokens

    Authors: Erik Sy, Christian Burkert, Tobias Mueller, Hannes Federrath, Mathias Fischer

    Abstract: QUIC is a secure transport protocol that improves the performance of HTTPS. An initial QUIC handshake that enforces a strict validation of the client's source address requires two round-trips. In this work, we extend QUIC's address validation mechanism by an out-of-band validation token to save one round-trip time during the initial handshake. The proposed token allows sharing an address validatio… ▽ More

    Submitted 3 May, 2019; v1 submitted 12 April, 2019; originally announced April 2019.

    Comments: 8 pages

  13. arXiv:1902.02531  [pdf, other

    cs.CR

    Enhanced Performance for the encrypted Web through TLS Resumption across Hostnames

    Authors: Erik Sy, Moritz Moennich, Tobias Mueller, Hannes Federrath, Mathias Fischer

    Abstract: TLS can resume previous connections via abbreviated resumption handshakes that significantly decrease the delay and save expensive cryptographic operations. For that, cryptographic TLS state from previous connections is reused. TLS version 1.3 recommends to avoid resumption handshakes, and thus the reuse of cryptographic state, when connecting to a different hostname. In this work, we reassess thi… ▽ More

    Submitted 7 February, 2019; originally announced February 2019.

    Comments: 11 pages

  14. Tracking Users across the Web via TLS Session Resumption

    Authors: Erik Sy, Christian Burkert, Hannes Federrath, Mathias Fischer

    Abstract: User tracking on the Internet can come in various forms, e.g., via cookies or by fingerprinting web browsers. A technique that got less attention so far is user tracking based on TLS and specifically based on the TLS session resumption mechanism. To the best of our knowledge, we are the first that investigate the applicability of TLS session resumption for user tracking. For that, we evaluated the… ▽ More

    Submitted 16 October, 2018; originally announced October 2018.

    Comments: 11 pages

    Journal ref: Published in 2018 Annual Computer Security Applications Conference (ACSAC '18), December 3-7, 2018, San Juan, PR, USA

  15. arXiv:1711.07220  [pdf, ps, other

    cs.CR

    Integrating Privacy-Enhancing Technologies into the Internet Infrastructure

    Authors: David Harborth, Dominik Herrmann, Stefan Köpsell, Sebastian Pape, Christian Roth, Hannes Federrath, Dogan Kesdogan, Kai Rannenberg

    Abstract: The AN.ON-Next project aims to integrate privacy-enhancing technologies into the internet's infrastructure and establish them in the consumer mass market. The technologies in focus include a basis protection at internet service provider level, an improved overlay network-based protection and a concept for privacy protection in the emerging 5G mobile network. A crucial success factor will be the… ▽ More

    Submitted 20 November, 2017; originally announced November 2017.

    Comments: 8 pages

  16. Evaluating the Security of a DNS Query Obfuscation Scheme for Private Web Surfing

    Authors: Dominik Herrmann, Max Maaß, Hannes Federrath

    Abstract: The Domain Name System (DNS) does not provide query privacy. Query obfuscation schemes have been proposed to overcome this limitation, but, so far, they have not been evaluated in a realistic setting. In this paper we evaluate the security of a random set range query scheme in a real-world web surfing scenario. We demonstrate that the scheme does not sufficiently obfuscate characteristic query pat… ▽ More

    Submitted 21 March, 2016; originally announced March 2016.

    Comments: ICT Systems Security and Privacy Protection. Springer Berlin Heidelberg, 2014. 205-219

  17. arXiv:1211.4704  [pdf, other

    cs.CR

    IPv6 Prefix Alteration: An Opportunity to Improve Online Privacy

    Authors: Dominik Herrmann, Christine Arndt, Hannes Federrath

    Abstract: This paper is focused on privacy issues related to the prefix part of IPv6 addresses. Long-lived prefixes may introduce additional tracking opportunities for communication partners and third parties. We outline a number of prefix alteration schemes that may be deployed to maintain the unlinkability of users' activities. While none of the schemes will solve all privacy problems on the Internet on t… ▽ More

    Submitted 20 November, 2012; originally announced November 2012.

    Comments: This paper was peer-reviewed and presented at the 1st Workshop on Privacy and Data Protection Technology (PDPT 2012), co-located with the Amsterdam Privacy Conference (APC 2012), October 9, 2012