News
Next Seminar on 24.11.2021
Written on 18.11.2021 23:09 by Stella Wohnig
Dear All,
Welcome to the new seminar page!
The next seminar(s) take place on 24.11. at 14:00. Due to time constraints I couldn't make all RA4 and 5 talks go in a seperate session, so please choose the session you are most interested in.
Session A: (RA4,5)
Lisa Hoffmann - Dañiel Gerhardt - Gunnar Heide
https://cispa-de.zoom.us/j/96786205841?pwd=M3FOQ3dSczRabDNLb3F1czVXVUpvdz09
Meeting-ID: 967 8620 5841
Kenncode: BT!u5=
Session B: (RA 4,5)
Dominik Kempter - Abhilash Gupta - Marc Schuegraf
https://cispa-de.zoom.us/j/99025989421?pwd=cWJIM29LYktsbStxTXlKUStZRi9MUT09
Meeting-ID: 990 2598 9421
Kenncode: 3mZyE$
Session A:
14:00-14:30
Speaker: Lisa Hoffmann
Type of talk: Bachelor Intro
Advisor: Dr. Katharina Krombholz, Carolyn Guthoff (Assistent)
Title: Development and Evaluation of a ​Dark Pattern Reporting Tool
Research: RA5 (Empirical and Behavioural Security)
Abstract:
There are a lot of papers published that deal with the topic of cookie banners and the problems and violations of the GDPR that occur with them.
Most papers give a limited and only temporary insight on this problem since data is collected only during a specific time period and on specific websites.
As mentioned by Fassl et al. [1], the topic is widely researched, but we are still in need of a solution that helps to solve the issue on a large scale in terms of data collection,
which is not restricted to a time frame or number of websites.
For that purpose, I aim to design a Chrome extension that collects violations of the GDPR in a publicly available list, which is updated with the help of end-users of browsers.
[1] Matthias Fassel, Lea Gröber, Katharina Krombholz. 2021. Stop the Consent Theater.
14:30-15:00
Speaker: Dañiel Gerhardt
Type of talk: Bachelor Intro
Advisor: Katharina Krombholz
Title: Mental models of EU Digital COVID Certificate Validation
Research Area: RA5
Abstract: The pandemic caused by COVID-19 has required us to quickly come up with solutions for this new and sudden problem of a rapidly spreading disease around the world. After a relatively short time vaccinations were made available but since it cannot be assumed that everyone has received a vaccine a convenient and accessible method for proving someone’s vaccination status was needed. In the European Union the EU Digital COVID Certificate was introduced in July 2021 to tackle this problem by allowing citizens to carry a digital certificate proving their vaccination status or that they recovered from the disease. This certificate, usually stored and presented as a QR code, can then quickly and easily be validated by staff at public places that require that visitors are either vaccinated or recovered from the disease to be allowed to enter. Recent anecdotal evidence has shown that this validation is often not done correctly and the person responsible for validating the authenticity of a given vaccination certificate often simply looks at a holder’s QR code stored in an app like CovPass or the Corona-Warn-App instead of scanning the QR code with an app like the CovPassCheck-App and cross-checking the identity of the certificate holder with the identity of the person presenting it using a government-issued ID. This incorrect validation might make the digital certificate less secure than a traditional paper vaccine passport as presenting any QR code may arguably be easier than forging a paper vaccine passport. It can also lead to unvaccinated people entering restricted areas where everyone present is under the assumption that everyone else around them is vaccinated or recovered and carries a valid vaccination certificate. The reason why it is so commonplace to incorrectly validate the EU Digital COVID Certificate is unknown so in this study, I will explore the mental models of professional users in regards to the validation process of the EU Digital COVID Certificate to find out.
15:00-15:30
Speaker: Gunnar Heide
Advisor: Lucjan Hanzlik
Title: no info
Research Area: 4
Session B:
14:00-14:30
Speaker: Dominik Kempter
Type of talk: Bachelor Final
Advisor: Dr. Giancarlo Pellegrino
Title: LighDTA - Lightweight Dynamic Taint Flow Analysis for State-Changing Operations
Research Area: RA5: Empirical and Behavioural Security
Abstract:
Many web applications trust data located in persistent storage. The disregard of proper sanitization leads to a variety of second-order vulnerabilities like Stored-XSS.
Dynamic Taint Analysis is one solution to this problem. Pre-defined data sources are tainting input, while security-critical functions can check for taints. The problem with this approach is propagating taints through persistent storage like databases. State-of-the-art propositions are highly dependent on the underlying persistent storage. This requires developers to restructure the database and applications to handle taints.
This bachelor thesis intends to explore the effectiveness of a lightweight approach to connect database input sinks to output sinks. This allows dynamic taint analysis to be performed independent of the underlying database and requires no restructuring of the web application.
We implemented a prototype that matches a database interface's read and write functions based on generated function traces. Those matches allow tracking the data flow within an application through persistent storage. We tested the prototype on six applications and found that our lightweight approach is capable to perform dynamic taint analysis without keeping track of taint markings and runtime checks on taints with proper parsing and data extraction.
14:30-15:00
Speaker: Abhilash Gupta
Type of talk: Masters thesis final presentation
Advisor: Dr. Rahul Gopinath
Supervisor: Prof. Dr. Andreas Zeller
Title: Grammar Fuzzing Command-line utilities in Linux
Research Area: RA4
Abstract:
Command-line (CLI) utilities are popular programs invoked on the command-line interface. Their execution is determined by the configuration options and arguments passed in its invocation. The options activate various code segments and the arguments are its input. It is imperative to utilise both options and arguments while fuzzing to search for failures.
However, options have been always excluded from previous fuzzing CLI utilities experiments. In this thesis, we describe a method to integrate both options and arguments into the fuzzing process via the use of context-free grammars (CFG). Our approach takes a utility and automatically constructs a human-readable CFG capturing the entire syntax of its invocation. Once extracted, the grammar can be saved and reused again for that utility.
This thesis employs this approach to fuzz test 44 CLI utilities in Linux. It evaluates the number of failures found in those utilities. Furthermore, it also evaluates the code coverage achieved by this approach. The results demonstrate that this approach discovers more failures in CLI utilities than the best reported literature. Furthermore, this approach is observed to generally achieve better code coverage than a state-of-the-art feedback driven fuzzer.
15:00-15:30
Speaker: Mark Schuegraf
Type of talk: Master Final
Advisor: Prof. Dr. Andreas Zeller
Title: Fuzzing With Grammar Variants
Research Area: RA4
Abstract:
Fuzzing is the execution of a system under test with unexpected inputs. In generating these inputs, fuzzers may rely on a grammar to model the input language. However, such grammar-based fuzzers are only as good as the grammar they use.
We therefore investigated whether structural changes to grammars affect the performance of grammar-based fuzzers: First, we derived variants of existing grammars using transformations that preserve the modeled input language. Second, we empirically evaluated these grammar variants on real test subjects. In most tested configurations, we saw changes in the fuzzing performance of a fuzzer when using a particular grammar variant.