Skip to main content

Showing 1–9 of 9 results for author: Banse, C

Searching in archive cs. Search in all archives.
.
  1. A Uniform Representation of Classical and Quantum Source Code for Static Code Analysis

    Authors: Maximilian Kaul, Alexander Küchler, Christian Banse

    Abstract: The emergence of quantum computing raises the question of how to identify (security-relevant) programming errors during development. However, current static code analysis tools fail to model information specific to quantum computing. In this paper, we identify this information and propose to extend classical code analysis tools accordingly. Among such tools, we identify the Code Property Graph to… ▽ More

    Submitted 12 December, 2023; v1 submitted 11 August, 2023; originally announced August 2023.

    Comments: 2023 IEEE International Conference on Quantum Computing and Engineering (QCE)

  2. Poster: Patient Community -- A Test Bed For Privacy Threat Analysis

    Authors: Immanuel Kunz, Angelika Schneider, Christian Banse, Konrad Weiss, Andreas Binder

    Abstract: Research and development of privacy analysis tools currently suffers from a lack of test beds for evaluation and comparison of such tools. In this work, we propose a benchmark application that implements an extensive list of privacy weaknesses based on the LINDDUN methodology. It represents a social network for patients whose architecture has first been described in an example analysis conducted b… ▽ More

    Submitted 4 August, 2023; originally announced August 2023.

    Comments: 3 pages, 1 figure

    Journal ref: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 2022. S. 3383-3385

  3. Representing LLVM-IR in a Code Property Graph

    Authors: Alexander Küchler, Christian Banse

    Abstract: In the past years, a number of static application security testing tools have been proposed which make use of so-called code property graphs, a graph model which keeps rich information about the source code while enabling its user to write language-agnostic analyses. However, they suffer from several shortcomings. They work mostly on source code and exclude the analysis of third-party dependencies… ▽ More

    Submitted 9 December, 2022; v1 submitted 9 November, 2022; originally announced November 2022.

    Journal ref: Information Security (ISC) 2022

  4. arXiv:2206.07323  [pdf, other

    cs.CR

    A Continuous Risk Assessment Methodology for Cloud Infrastructures

    Authors: Immanuel Kunz, Angelika Schneider, Christian Banse

    Abstract: Cloud systems are dynamic environments which make it difficult to keep track of security risks that resources are exposed to. Traditionally, risk assessment is conducted for individual assets to evaluate existing threats; their results, however, are quickly outdated in such a dynamic environment. In this paper, we propose an adaptation of the traditional risk assessment methodology for cloud infra… ▽ More

    Submitted 15 June, 2022; originally announced June 2022.

  5. Cloud Property Graph: Connecting Cloud Security Assessments with Static Code Analysis

    Authors: Christian Banse, Immanuel Kunz, Angelika Schneider, Konrad Weiss

    Abstract: In this paper, we present the Cloud Property Graph (CloudPG), which bridges the gap between static code analysis and runtime security assessment of cloud services. The CloudPG is able to resolve data flows between cloud applications deployed on different resources, and contextualizes the graph with runtime information, such as encryption settings. To provide a vendor- and technology-independent re… ▽ More

    Submitted 14 June, 2022; originally announced June 2022.

  6. arXiv:2203.08424  [pdf, other

    cs.CR

    A Language-Independent Analysis Platform for Source Code

    Authors: Konrad Weiss, Christian Banse

    Abstract: In this paper, we present the CPG analysis platform, which enables the translation of source code into a programming language-independent representation, based on a code property graph. This allows security experts and developers to capture language level semantics for security analyses or identify patterns with respect to code compliance. Through the use of fuzzy parsing, also incomplete or non-c… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

    Comments: 4 pages, 1 figure

  7. Towards Tracking Data Flows in Cloud Architectures

    Authors: Immanuel Kunz, Valentina Casola, Angelika Schneider, Christian Banse, Julian Schütte

    Abstract: As cloud services become central in an increasing number of applications, they process and store more personal and business-critical data. At the same time, privacy and compliance regulations such as GDPR, the EU ePrivacy regulation, PCI, and the upcoming EU Cybersecurity Act raise the bar for secure processing and traceability of critical data. Especially the demand to provide information about e… ▽ More

    Submitted 10 July, 2020; originally announced July 2020.

    Comments: 11 pages, 5 figures, 2020 IEEE 13th International Conference on Cloud Computing (CLOUD)

  8. ZKlaims: Privacy-preserving Attribute-based Credentials using Non-interactive Zero-knowledge Techniques

    Authors: Martin Schanzenbach, Thomas Kilian, Julian Schütte, Christian Banse

    Abstract: In this paper we present ZKlaims: a system that allows users to present attribute-based credentials in a privacy-preserving way. We achieve a zero-knowledge property on the basis of Succinct Non-interactive Arguments of Knowledge (SNARKs). ZKlaims allow users to prove statements on credentials issued by trusted third parties. The credential contents are never revealed to the verifier as part of th… ▽ More

    Submitted 22 July, 2019; originally announced July 2019.

    Comments: 8 pages, published at SECRYPT 2019

    Journal ref: Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT, 325-332, 2019, Prague, Czech Republic

  9. Practical Decentralized Attribute-Based Delegation using Secure Name Systems

    Authors: Martin Schanzenbach, Christian Banse, Julian Schütte

    Abstract: Identity and trust in the modern Internet are centralized around an oligopoly of identity service providers consisting solely of major tech companies. The problem with centralizing trust has become evident in recent discoveries of mass surveillance and censorship programs as well as information leakage through hacking incidents. One approach to decentralizing trust is distributed, attribute-based… ▽ More

    Submitted 16 May, 2018; originally announced May 2018.

    Comments: 8 pages

    Journal ref: TrustCom/BigDataSE 2018: 244-251