TY - CHAP A1 - Atkinson, Colin A1 - Gerbig, Ralph A1 - Barth, Florian A1 - Freiling, Felix A1 - Schinzel, Sebastian A1 - Hadasch, Frank A1 - Maedche, Alexander A1 - Müller, Benjamin T1 - Reducing the Incidence of Unintended, Human-Caused Information Flows in Enterprise Systems T2 - Enterprise Distributed Object Computing Conference Workshops (EDOCW), 2012 IEEE 16th International Y1 - 2012 U6 - http://dx.doi.org/10.1109/EDOCW.2012.12 SP - 11 EP - 18 ET - 3M4SE 2012 ER - TY - CHAP A1 - Bauer, Johannes A1 - Schinzel, Sebastian A1 - Felix, C. A1 - Freiling, Andreas T1 - Information leakage behind the curtain: Abusing anti-EMI features for covert communication T2 - Hardware Oriented Security and Trust (HOST), 2016 IEEE International Symposium on Y1 - 2016 U6 - http://dx.doi.org/10.1109/HST.2016.7495570 SP - 130 EP - 134 ER - TY - JOUR A1 - Brinkmann, Marcus A1 - Dresen, Christian A1 - Merget, Robert A1 - Poddebniak, Damian A1 - Müller, Jens A1 - Somorovsky, Juraj A1 - Schwenk, Jörg A1 - Schinzel, Sebastian T1 - ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication JF - 30th USENIX Security Symposium Y1 - 2021 UR - https://www.usenix.org/conference/usenixsecurity21/presentation/brinkmann ER - TY - CHAP A1 - Dresen, Christian A1 - Ising, Fabian A1 - Poddebniak, Damian A1 - Kappert, Tobias A1 - Holz, Thorsten A1 - Schinzel, Sebastian ED - Zhou, Jianying T1 - CORSICA: Cross-Origin Web Service Identification T2 - The 15th ACM ASIA Conference on Computer and Communications Security N2 - Vulnerabilities in private networks are difficult to detect for attackers outside of the network. While there are known methods for port scanning internal hosts that work by luring unwitting internal users to an external web page that hosts malicious JavaScript code, no such method for detailed and precise service identification is known. The reason is that the Same Origin Policy (SOP) prevents access to HTTP responses of other origins by default. We perform a structured analysis of loopholes in the SOP that can be used to identify web applications across network boundaries. For this, we analyze HTML5, CSS, and JavaScript features of standard-compliant web browsers that may leak sensitive information about cross-origin content. The results reveal several novel techniques, including leaking JavaScript function names or styles of cross-origin requests that are available in all common browsers. We implement and test these techniques in a tool called CORSICA. It can successfully identify 31 of 42 (74%) of web services running on different IoT devices as well as the version numbers of the four most widely used content management systems WordPress, Drupal, Joomla, and TYPO3. CORSICA can also determine the patch level on average down to three versions (WordPress), six versions (Drupal), two versions (Joomla), and four versions (TYPO3) with only ten requests on average. Furthermore, CORSICA is able to identify 48 WordPress plugins containing 65 vulnerabilities. Finally, we analyze mitigation strategies and show that the proposed but not yet implemented strategies Cross-Origin Resource Policy (CORP)} and Sec-Metadata would prevent our identification techniques. Y1 - 2020 UR - https://asiaccs2020.cs.nthu.edu.tw/program/ ER - TY - CHAP A1 - Ebinger, Peter A1 - Schinzel, Sebastian A1 - Schmuckler, Martin T1 - Security mechanisms of a legal peer-to-peer file sharing system T2 - IADIS International Conference Applied Computing Y1 - 2008 ER - TY - CHAP A1 - Gierling, Markus A1 - Dresen, Christian A1 - Eich, Hans A1 - Mittman, Karin A1 - Schinzel, Sebastian A1 - Haverkamp, Uwe T1 - Analysis and consequences of an imaging process concerning the cyber security of a networked computer tomography scanner T2 - STRAHLENTHERAPIE UND ONKOLOGIE KW - Cyber Security KW - networked computer tomography scanner Y1 - 2018 SP - 185 EP - 186 ER - TY - JOUR A1 - Gierling, Markus A1 - Saatjohann, Christoph A1 - Dresen, Christian A1 - Köbe, Julia A1 - Rath, Benjamin A1 - Eckardt, Lars A1 - Schinzel, Sebastian T1 - Reviewing Cyber Security Research of Implantable Medical Rhythm Devices regarding Patients’ Risk JF - 86. Jahrestagung und Herztage 2020 der DGK N2 - Introduction: The recent publication of several critical cyber security issues in cardiac implantable devices and the resulting press coverage upsets affected users and their trust in medical device producers. Reviewing the published security vulnerabilities regarding networked medical devices, it raises the question, if the reporting media, the responsible security researchers, and the producers handle security vulnerabilities appropriately. Are the media reports of security vulnerabilities in medical devices meaningful in a way that patients can assess their respective risk for an attack via the security vulnerability? The collaboration between IT-security experts and clinicians aims at reviewing published security vulnerabilities of rhythm devices, and evaluate overall patients risks. Methodology: We performed a literature review on security vulnerabilities in implantable medical devices with a focus on cardiac devices. We analyzed (Fig. 1) the (1) requirements for an attacker and the (2) technical feasibility and clustered them in three different scenarios: The first scenario requires that the attacker physically approaches a victim with a programming device. The second scenario requires proximity to the victim, e.g., within a few meters. The third and strongest attacker scenario is a remote attack that doesn’t require any physical proximity to the victim. We then compare the attacker scenarios and (3) the overall patients’ risks with the press coverage (overhyped, adequate, underhyped). (4) The resulting overall patients’ risk was rated by clinicians (security vulnerability of patients’ data, dangerous programming possible). Results: Out of the three analyzed incidents, we found one to be underhyped, one to be overhyped, and one was appropriate compared to the medial coverage (Fig. 2). The most occurring technical issues were based on the absence of basic security primitives. The patient damage for all of the analyzed incidents was fatal in the worst-case scenario. Further, the patient damage and the overall patient risks are disjunct due to the missing capability of performing large scale attacks. Conclusion: The resulting overall patients’ risks may not adequately reflect the patient damage in the considered cases. Often, the overall patient risk is not as severe as the necessary attacker capabilities are high and it would require strongly motivated attackers to perform the attack. Therefore, most of the reviewed cases are considered with a smaller overall patient risk than implied by press reports. Reviewing the ongoing IT-Security trends regarding implantable medical devices shows an increasing focus on researching in the field of medical device security. Therefore, further findings in the near future are to be expected. To deal with this fact in a responsible way, proper proactive knowledge management is mandatory. We recommend medical staff to critically reflect reports in mass media due to possible sensationalism. Therefore, we propose a joint approach in combining the technical expertise of cyber security experts with clinical aspects of medical experts, to ensure a solid understanding of a newly published vulnerability. The combination of both communities promises to result in better predictions for patients’ risks from security vulnerabilities in implanted cardiac devices. KW - Cyber Security KW - Cardiac Implantable Devices Y1 - 2020 U6 - http://dx.doi.org/10.1007/s00392-020-01621-0 VL - Band 109, Supplement 1, April 2020 SP - 1 EP - 2 ER - TY - CHAP A1 - Mayer, Peter A1 - Poddebniak, Damian A1 - Fischer, Konstantin A1 - Brinkmann, Marcus A1 - Somorovsky, Juraj A1 - Schinzel, Sebastian A1 - Volkamer, Melanie T1 - "I don’t know why I check this...'' - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks T2 - Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022) N2 - OpenPGP is one of the two major standards for end-to-end email security. Several studies showed that serious usability issues exist with tools implementing this standard. However, a widespread assumption is that expert users can handle these tools and detect signature spoofing attacks. We present a user study investigating expert users' strategies to detect signature spoofing attacks in Thunderbird. We observed 25 expert users while they classified eight emails as either having a legitimate signature or not. Studying expert users explicitly gives us an upper bound of attack detection rates of all users dealing with PGP signatures. 52% of participants fell for at least one out of four signature spoofing attacks. Overall, participants did not have an established strategy for evaluating email signature legitimacy. We observed our participants apply 23 different types of checks when inspecting signed emails, but only 8 of these checks tended to be useful in identifying the spoofed or invalid signatures. In performing their checks, participants were frequently startled, confused, or annoyed with the user interface, which they found supported them little. All these results paint a clear picture: Even expert users struggle to verify email signatures, usability issues in email security are not limited to novice users, and developers may need proper guidance on implementing email signature GUIs correctly. Y1 - 2022 UR - https://www.usenix.org/conference/soups2022/presentation/mayer SN - 978-1-939133-30-4 SP - 77 EP - 96 PB - USENIX Association CY - Boston, MA ER - TY - CHAP A1 - Meyer, Christopher A1 - Somorovsky, Juraj A1 - Weiss, Eugen A1 - Schwenk, Jörg A1 - Schinzel, Sebastian A1 - Tews, Erik T1 - Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks. T2 - 23rd USENIX Security Symposium (USENIX Security 14) Y1 - 2014 SN - ISBN 978-1-931971- SP - 733 EP - -748 PB - USENIX Association CY - San Diego, CA ER - TY - CHAP A1 - Müller, Jens A1 - Ising, Fabian A1 - Mla­de­nov, Vla­dis­lav A1 - Mainka, Chris­ti­an A1 - Schinzel, Sebastian A1 - Schwenk, Jörg T1 - Of­fice Do­cu­ment Se­cu­ri­ty and Pri­va­cy T2 - 14th USE­NIX Work­shop on Of­fen­si­ve Tech­no­lo­gies (WOOT 2020) N2 - OOXML and ODF are the de facto standard data formats for word processing, spreadsheets, and presentations. Both are XML-based, feature-rich container formats dating back to the early 2000s. In this work, we present a systematic analysis of the capabilities of malicious office documents. Instead of focusing on implementation bugs, we abuse legitimate features of the OOXML and ODF specifications. We categorize our attacks into five classes: (1) Denial-of-Service attacks affecting the host on which the document is processed. (2) Invasion of privacy attacks that track the usage of the document. (3) Information disclosure attacks exfiltrating personal data out of the victim's computer. (4) Data manipulation on the victim's system. (5) Code execution on the victim's machine. We evaluated the reference implementations – Microsoft Office and LibreOffice – and found both of them to be vulnerable to each tested class of attacks. Finally, we propose mitigation strategies to counter these attacks. KW - Cyber Security KW - Open Document Format KW - docx Y1 - 2020 UR - https://www.usenix.org/conference/woot20/presentation/muller PB - USENIX ER -