Bib.Kaishakunin.com
open-menu closeme
Home
Books
Links icon
Kaishakunin.com - My main website Cryptomancer.de - Cryptography stuff Mastodon CodeBerg
About
codeberg mastodon rss
  • Why Anti-virus Software Fails

    calendar Jul 19, 2015 · 2 min read · antivir antivirus fail evasion  ·
    Share on: twitter facebook linkedin copy

    Why Anti-virus Software Fails Daniel Sauder published in Magdeburger Journal zur Sicherheitsforschung (2015, #10, p. 540-546) Info Based on my work about antivirus evasion techniques, I started using antivirus evasion techniques for testing the effectivity of antivirus engines. I researched the internal functionality …


    Read More
  • Trusting Your Cloud Provider Protecting Private Virtual Machines

    calendar Jun 17, 2015 · 2 min read · cloud virtual-machine trust virtualisation  ·
    Share on: twitter facebook linkedin copy

    Trusting Your Cloud Provider Protecting Private Virtual Machines Armin Simma published in Magdeburger Journal zur Sicherheitsforschung (2015, #9, p. 530-539) Info This article proposes an integrated solution that allows cloud customers to increase their trust into the cloud provider including cloud insiders (e.g. …


    Read More
  • IPv6 Security Attacks and Countermeasures in a Nutshell

    calendar Mar 30, 2015 · 3 min read · IPv6 insecurities  ·
    Share on: twitter facebook linkedin copy

    IPv6 Security Attacks and Countermeasures in a Nutshell Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and Edgar Weippl published in Magdeburger Journal zur Sicherheitsforschung (2015, #9, p. 514-529) Info The history of computers is full of underestimation: 640 kilobyte, 2-digit …


    Read More
  • Java’s SSLSocket How Bad APIs Compromise Security

    calendar Mar 20, 2015 · 2 min read · java api security ssl sslsocket  ·
    Share on: twitter facebook linkedin copy

    Java’s SSLSocket How Bad APIs Compromise Security Georg Lukas published in Magdeburger Journal zur Sicherheitsforschung (2015, #9, p. 506-513) Info Internet security is hard. TLS is almost impossible. Implementing TLS correctly in Java is »Nightmare!«. This paper will show how a badly designed security API introduced …


    Read More
  • An innovative and comprehensive framework for Social Driven Vulnerability Assessment

    calendar Dec 16, 2014 · 3 min read · human-vulnerabilities human-factors social-engineering security-awareness  ·
    Share on: twitter facebook linkedin copy

    An innovative and comprehensive framework for Social Driven Vulnerability Assessment Enrico Frumento and Roberto Puricelli published in Magdeburger Journal zur Sicherheitsforschung (2014, #8, p. 493-505) Info Nowadays security attacks greatly rely on the human vulnerabilities, hence is fundamental to include the human …


    Read More
  • Social Authentication Vulnerabilities, Mitigations, and Redesign

    calendar Nov 13, 2014 · 2 min read · 2fa two-factor-authentication  ·
    Share on: twitter facebook linkedin copy

    Social Authentication Vulnerabilities, Mitigations, and Redesign Marco Lancini published in Magdeburger Journal zur Sicherheitsforschung (2014, #8, p. 476-492) Info High-value services have introduced two-factor authentication to prevent adversaries from compromising accounts using stolen credentials. Facebook has …


    Read More
  • Sexy Defense Maximizing the home-field advantage

    calendar Jun 24, 2014 · 2 min read · offensive-security defensive-security  ·
    Share on: twitter facebook linkedin copy

    Sexy Defense Maximizing the home-field advantage Iftach Amit published in Magdeburger Journal zur Sicherheitsforschung (2014, #8, p. 468-475) Info Offensive security is easy, I know. But the goal of offensive security at the end of the day is to make us better defenders. And that’s hard. Usually after the …


    Read More
  • Hacking Medical Devices

    calendar Jun 22, 2014 · 2 min read · sicherheit hacking medical-devices  ·
    Share on: twitter facebook linkedin copy

    Hacking Medical Devices Florian Grunow published in Magdeburger Journal zur Sicherheitsforschung (2014, #7, p. 453-455) Info In the last few years we have seen an increase of high tech medical devices, including all flavors of communication capabilities. The need of hospitals and patients to transfer data from devices …


    Read More
  • Rezension zu Schluss mit Cybermobbing! Das Trainings- und Präventionsprogramm »Surf-Fair«. von Stephanie Pieschl und Torsten Porsch

    calendar Dec 29, 2013 · 1 min read · rezension mobbing cybermobbing psychologie  ·
    Share on: twitter facebook linkedin copy

    Rezension zu Schluss mit Cybermobbing! Das Trainings- und Präventionsprogramm »Surf-Fair«. von Stephanie Pieschl und Torsten Porsch Jens Holze published in Magdeburger Journal zur Sicherheitsforschung (2013, #6, p. 406-408) Info Eine Rezension zu Schluss mit Cybermobbing! Downloads Download: …


    Read More
  • Design and Implementation of an IPv6 Plugin for the Snort Intrusion Detection System

    calendar Dec 26, 2013 · 2 min read · snort ids IPv6 intrusion-detection  ·
    Share on: twitter facebook linkedin copy

    Design and Implementation of an IPv6 Plugin for the Snort Intrusion Detection System Martin Schütte published in Magdeburger Journal zur Sicherheitsforschung (2013, #6, p. 409-452) Info This work describes the implementation and use of a preprocessor module for the popular open source Intrusion Detection System Snort …


    Read More
    • ««
    • «
    • 2
    • 3
    • 4
    • 5
    • 6
    • »
    • »»

Stefan Schumacher photo

Stefan Schumacher

Hacker, Psychologe, Sicherheitsarchitekt, ehem. Sicherheitsforscher, ehem. Herausgeber eines Open-Access-Journals zur Sicherheitsforschung, ehem. NetBSD-Entwickler, ehem. Scientific Advisor, ehem. Dozent in der polBil, mehrere GnuPG-Schlüssel in Strongset, ab und zu noch mal Konferenz-Speaker
Read More

Recent Posts

  • Informationssicherheit in Versorgungsunternehmen umsetzen Einige praktische Erfahrungen

Categories

MAGDEBURGER JOURNAL ZUR SICHERHEITSFORSCHUNG 70 EDITOR 59 AUTHOR 44 IN PROCEEDINGS 11 BOOKCHAPTER 3

Series

OHNE REIHE 46 INFORMATIONSTECHNOLOGIE UND SICHERHEITSPOLITIK 19 DEEPSEC 2015 14 DEEPSEC 2017 13 DEEPSEC 2019 11

Tags

STEFAN-SCHUMACHER 42 ITSIPOL 19 UPTIMES 14 SICHERHEIT 13 PSYCHOLOGIE 11 SOCIAL-ENGINEERING 10 EDITOR 9 SOZIALPSYCHOLOGIE 8 - 7 KRITIS 7 HUMAN-FACTORS 6 NETBSD 6 BACKUP 5 MALWARE 5 WASSER 5 CYBERWAR 4 OPEN-SOURCE 4 PENETRATION-TESTING 4 2FA 3 CHEMNITZ 3 CRYPTOGRAPHY 3 FFG 3 SECURITY 3
All Tags
-7 2FA3 4G1 5G-MOBILE-NETWORK1 ACTIVE-DOMAIN1 AD1 ADMINISTRATION1 AES2 AIR-GAP1 ANALYSIS1 ANDROID1 ANONYMITÄT1 ANTIVIR1 ANTIVIRUS1 API1 APT2 ATHENS1 AUSBILDUNG1 AUßENPOLITIK1 AUTHENTIFIKATION1 BACKUP5 BACULA2 BEHAVIOURAL-PATTERN1 BETRIEBSSCHUTZ1 BITCOIN1 BITLOCKER1 BLACKENERGY2 BLUETOOTH1 BOTNET1 BYPASS-TECHNIQUES2 CARNA1 CCC1 CHARGING1 CHEMNITZ3 CIPHER1 CIVIL-SOCIETY-ORGANISATION1 CLAUSEWITZ1 CLOUD2 COMPLIANCE1 CONTENT-SECURITY-POLICY1 COSTS1 COUNTERMEASURES1 CRASHOVERRIDE1 CRIMINAL-LAW1 CRITICAL-INFRASTRUCTURE1 CRYPTOGRAPHICATTACK1 CRYPTOGRAPHY3 CSP1 CUDA1 CYBER-SPACE1 CYBERCRIME2 CYBERFRIEDEN1 CYBERKRIEG2 CYBERMOBBING1 CYBERSPACE1 CYBERTERROR1 CYBERWAR4 DATEISYSTEME1 DATENDIEBSTAHL1 DATENSCHUTZ2 DATENSICHERHEIT1 DATENSICHERUNG1 DEEP-LEARNING1 DEEPSEC1 DEFENSIVE-SECURITY1 DIAMETER1 DIN1 DRONES1 DUMP1 EDITOR9 ENCRYPTION2 ESRP1 ETHICAL-HACKING2 EU2 EUROPA2 EUROPEAN-SECURITY-RESEARCH-PROGRAMME1 EVAKUIERUNGSASSISTENT1 EVASION1 EXFILTRATION1 FACHINFORMATIKER2 FAIL1 FAILOVER1 FFG3 FP71 FRIEDENSPOLITIK1 FUNKDIENSTE1 GNUPG1 GOVERNANCE1 GPO1 GPU1 GROUP-POLICY-OBJECTS1 GSM1 HACKER1 HACKING1 HASH1 HEILIGER-STUHL1 HTML1 HUMAN-FACTORS6 HUMAN-VULNERABILITIES1 HVAC1 HYPERVISOR1 ICS1 IDS2 INDUSTRIAL-CONTROL-SYSTEMS1 INDUSTRIE-4.01 INFORMATIONSSICHERHEIT1 INFORMATIONSSICHERHEITSMANAGEMENT1 INSECURITIES1 INTERCONNECTION1 INTERNET1 INTRUSION-DETECTION2 IPV62 IPX1 ISMS1 IT-SICHERHEIT1 IT-SYSTEMELEKTRONIKER1 IT-WEITERBILDUNGSSYSTEM1 ITSIPOL19 JAVA1 JUS-AD-BELLUM1 KERNEL1 KOMPETENZENTWICKLUNG1 KRITIS7 KRYPTOGRAPHIE2 KULTUR1 LAW2 LAWFUL-INTERCEPTION1 LEAKAGE1 LÖSCHEN1 MACHINE-LEARNING1 MAIL1 MALWARE5 MALWARE-ANALYSIS2 MANAGEMENT1 MCAFEE1 MD51 MEDICAL-DEVICES1 METASPLOIT1 MFA1 MICROSOFT1 MJSEDITORIAL1 MOBBING1 NETBSD6 NORM1 OFFENSIVE-SECURITY1 OPEN-SOURCE4 OPERATIONALISIERUNG1 PASSWORDCRACKING1 PENETRATION-TESTING4 PENTEST1 PGP1 PHYSICAL-SEPARATION1 PKGSRC1 POSTGRESQL1 PRIVACY2 PSYCHOLOGIE11 PSYCHOLOGY1 QUALITATIVE-INTERVIEWS1 RADIKALISIERUNG1 RANSOMWARE1 RED-TEAM2 REGULATION1 RESEARCH1 RESTORE1 REZENSION2 RISIKOMANAGEMENT1 RISK-MANAGEMENT1 RISKS1 ROUTER1 SALAFISMUS1 SCADA2 SCHADSOFTWARE2 SECURITY3 SECURITY-ARCHITECTURE1 SECURITY-AWARENESS1 SEGREGATION-OF-DUTY1 SERVER1 SHA-2561 SICHERHEIT13 SICHERHEITSARCHITEKTUR1 SICHERHEITSPOLITIK3 SICHERHEITSSTRATEGIE1 SIGNAL-HACKING-AND-DISRUPTION1 SINGLE-SIGN-ON1 SMIME1 SNORT1 SOCIAL-ENGINEERING10 SOZIALE-KOMPETENZEN1 SOZIALPSYCHOLOGIE8 SS71 SSL2 SSLSOCKET1 SSO1 STALKING1 STEFAN-SCHUMACHER42 STRATEGIE1 SYSTEM-CALL2 SYSTEM-CALLS1 SYSTRACE3 TECHNIKGENESE1 TECHNIKPHILOSOPHIE1 TECHNOLOGIEGENESE1 TERROR1 TIEFENPSYCHOLOGIE1 TOR1 TRINKWASSER1 TRISIS1 TROJANER1 TRUST1 TVET1 TWO-FACTOR-AUTHENTICATION1 ÜBERWACHUNG1 UNSICHERHEIT1 UNSOLVED-CASES1 UPTIMES14 VERDECKTE-KANÄLE1 VERSORGUNGSUNTERNEHMEN1 VIRTUAL-MACHINE1 VIRTUALISATION2 VIRUS1 VODAFONE1 VULNERABILITIES3 WAF1 WAHRNEHMUNG1 WASSER5 WASSERVERSORGUNG1 WEB-APPLICATION1 WEB-APPLICATION-FIREWALL1 WEB-APPLICATION-FIREWALLS2 WHITELISTS1 WIPE1 WURM1 YUBIKEY1 ZIGBEE1 ZWEI-FAKTOR1
[A~Z][0~9]
Copyright © 2008–2025, Stefan Schumacher

Copyright 2008-  COPYRIGHT © 2008–2025, STEFAN SCHUMACHER. All Rights Reserved

to-top