Skip to main content

Showing 1–3 of 3 results for author: Kahlhofer, M

.
  1. arXiv:2405.12852  [pdf, ps, other

    cs.CR cs.DC cs.NI cs.SE

    Application Layer Cyber Deception without Developer Interaction

    Authors: Mario Kahlhofer, Stefan Rass

    Abstract: Cyber deception techniques that are tightly intertwined with applications pose significant technical challenges in production systems. Security measures are usually the responsibility of a system operator, but they are typically limited to accessing built software artifacts, not their source code. This limitation makes it particularly challenging to deploy cyber deception techniques at application… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

    Comments: to be published in the 3rd Workshop on Active Defense and Deception (ADnD 2024)

  2. arXiv:2310.12702  [pdf, other

    cs.SE cs.DC cs.PF

    Benchmarking Function Hook Latency in Cloud-Native Environments

    Authors: Mario Kahlhofer, Patrick Kern, Sören Henning, Stefan Rass

    Abstract: Researchers and engineers are increasingly adopting cloud-native technologies for application development and performance evaluation. While this has improved the reproducibility of benchmarks in the cloud, the complexity of cloud-native environments makes it difficult to run benchmarks reliably. Cloud-native applications are often instrumented or altered at runtime, by dynamically patching or hook… ▽ More

    Submitted 19 October, 2023; originally announced October 2023.

    Comments: to be published in the 14th Symposium on Software Performance (SSP 2023), source code available at https://github.com/dynatrace-research/function-hook-latency-benchmarking

  3. Towards Reconstructing Multi-Step Cyber Attacks in Modern Cloud Environments with Tripwires

    Authors: Mario Kahlhofer, Michael Hölzl, Andreas Berger

    Abstract: Rapidly-changing cloud environments that consist of heavily interconnected components are difficult to secure. Existing solutions often try to correlate many weak indicators to identify and reconstruct multi-step cyber attacks. The lack of a true, causal link between most of these indicators still leaves administrators with a lot of false-positives to browse through. We argue that cyber deception… ▽ More

    Submitted 25 September, 2020; originally announced September 2020.

    Comments: To be published in European Interdisciplinary Cybersecurity Conference (EICC 2020)