Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ben Stock is active.

Publication


Featured researches published by Ben Stock.


electronic commerce | 2009

Walowdac - Analysis of a Peer-to-Peer Botnet

Ben Stock; Jan Göbel; Markus Engelberth; Felix C. Freiling; Thorsten Holz

A botnet is a network of compromised machines under the control of an attacker. Botnets are the driving force behind several misuses on the Internet, for example spam mails or automated identity theft. In this paper, we study the most prevalent peer-to-peer botnet in 2009: Waledac. We present our in ltration of the Waledac botnet, which can be seen as the successor of the Storm Worm botnet. To achieve this we implemented a clone of the Waledac bot named Walowdac. It implements the communication features of Waledac but does not cause any harm, i.e., no spam emails are sent and no other commands are executed. With the help of this tool we observed a minimum daily population of 55,000 Waledac bots and a total of roughly 390,000 infected machines throughout the world. Furthermore, we gathered internal information about the success rates of spam campaigns and newly introduced features like the theft of cre- dentials from victim machines.


computer and communications security | 2013

25 million flows later: large-scale detection of DOM-based XSS

Sebastian Lekies; Ben Stock; Martin Johns

In recent years, the Web witnessed a move towards sophis- ticated client-side functionality. This shift caused a signifi- cant increase in complexity of deployed JavaScript code and thus, a proportional growth in potential client-side vulnera- bilities, with DOM-based Cross-site Scripting being a high impact representative of such security issues. In this paper, we present a fully automated system to detect and validate DOM-based XSS vulnerabilities, consisting of a taint-aware JavaScript engine and corresponding DOM implementation as well as a context-sensitive exploit generation approach. Using these components, we conducted a large-scale analysis of the Alexa top 5000. In this study, we identified 6167 unique vulnerabilities distributed over 480 domains, show- ing that 9,6% of the examined sites carry at least one DOM- based XSS problem.


recent advances in intrusion detection | 2016

On the Feasibility of TTL-Based Filtering for DRDoS Mitigation

Michael Backes; Thorsten Holz; Christian Rossow; Teemu Rytilahti; Milivoj Simeonovski; Ben Stock

A major disturbance for network providers in recent years have been Distributed Reflective Denial-of-Service (DRDoS) attacks. In such an attack, the adversary spoofs the IP address of a victim and sends a flood of tiny packets to vulnerable services. The services then respond to spoofed the IP, flooding the victim with large replies. Led by the idea that an attacker cannot fabricate the number of hops a packet travels between amplifier and victim, Hop Count Filtering (HCF) mechanisms that analyze the Time-to-Live (TTL) of incoming packets have been proposed as a solution.


ieee european symposium on security and privacy | 2017

Efficient and Flexible Discovery of PHP Application Vulnerabilities

Michael Backes; Konrad Rieck; Malte Skoruppa; Ben Stock; Fabian Yamaguchi

The Web today is a growing universe of pages and applications teeming with interactive content. The security of such applications is of the utmost importance, as exploits can have a devastating impact on personal and economic levels. The number one programming language in Web applications is PHP, powering more than 80% of the top ten million websites. Yet it was not designed with security in mind and, today, bears a patchwork of fixes and inconsistently designed functions with often unexpected and hardly predictable behavior that typically yield a large attack surface. Consequently, it is prone to different types of vulnerabilities, such as SQL Injection or Cross-Site Scripting. In this paper, we present an interprocedural analysis technique for PHP applications based on code property graphs that scales well to large amounts of code and is highly adaptable in its nature. We implement our prototype using the latest features of PHP 7, leverage an efficient graph database to store code property graphs for PHP, and subsequently identify different types of Web application vulnerabilities by means of programmable graph traversals. We show the efficacy and the scalability of our approach by reporting on an analysis of 1,854 popular open-source projects, comprising almost 80 million lines of code.


computer and communications security | 2016

POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications

Ben Stock; Giancarlo Pellegrino; Christian Rossow; Martin Johns; Michael Backes

The Internet is an ever-growing ecosystem with diverse software and hardware applications deployed in numerous countries around the globe. This heterogenous structure, however, is reduced to a homogenous means of addressing servers, i.e., their IP address. Due to this, analyzing different Internet services for vulnerabilities at scale is easy, leading to many researcher focusing on large-scale detection of many types of flaws. On the other hand, the persons responsible for the administration of said services are as heterogenous as the Internet architecture itself: be it in spoken languages or knowledge of technical details of the services. The notification of vulnerable services has long been treated as a side note in research. Recently, the community has focussed more not only the detection of flaws, but also on the notification of affected parties. These works, however, only analyze a small segment of the problem space. Hence, in this paper, we investigate the issues encountered by the previous works and provide a number of future directions for research, ultimately aiming to allow for an easier means of notifying affected parties about vulnerabilities at scale.


international conference on detection of intrusions and malware, and vulnerability assessment | 2018

JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript

Aurore Fass; Robert P. Krawczyk; Michael Backes; Ben Stock

JavaScript is a browser scripting language initially created to enhance the interactivity of web sites and to improve their user-friendliness. However, as it offloads the work to the user’s browser, it can be used to engage in malicious activities such as Crypto Mining, Drive-by Download attacks, or redirections to web sites hosting malicious software. Given the prevalence of such nefarious scripts, the anti-virus industry has increased the focus on their detection. The attackers, in turn, make increasing use of obfuscation techniques, so as to hinder analysis and the creation of corresponding signatures. Yet these malicious samples share syntactic similarities at an abstract level, which enables to bypass obfuscation and detect even unknown malware variants.


Datenschutz Und Datensicherheit - Dud | 2016

Client-Side XSS in Theorie und Praxis

Ben Stock; Martin Johns

ZusammenfassungAuch wenn sie eigentlich seit über zehn Jahren [1] bekannt ist, wird die Verwundbarkeitsklasse des Client-Side Cross-site Scriptings noch immer wie das Stiefkind der Familie der Injektionsverwundbarkeiten behandelt. Stets im Schatten der großen Geschwister stehend, wie SQL-Injection oder serverseitigem XSS, wird sie gern übersehen und hat in der Vergangenheit nur wenig Aufmerksamkeit bekommen. In diesem Beitrag gehen wir dem Thema auf den Grund und untersuchen nicht nur, wie häufig derartige Unsicherheiten in echten Web-Seiten zu finden sind, sondern auch, worin die Ursache für die darunter liegende Verwundbarkeit liegt und wie sie auf einfache Weise verhindert werden kann.


2011 First SysSec Workshop | 2011

Exploring the Landscape of Cybercrime

Zinainda Benenson; Andreas Dewald; Hans-Georg Eßer; Felix C. Freiling; Tilo Müller; Christian Moch; Stefan Vömel; Sebastian Schinzel; Michael Spreitzenbarth; Ben Stock; Johannes Stüttgen

This document gives an overview over current research within the security group at Friedrich-Alexander-University Erlangen-Nuremberg, Germany, and attempts to describe the future research roadmap of the group. This roadmap is structured around the landscape of cyber crime with its three main groups of actors (attackers, users and investigators) and their main activities and deficits: attack and evasion for attackers, awareness and education for victims, evidence extraction and analysis for investigators.


usenix security symposium | 2016

Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification

Ben Stock; Giancarlo Pellegrino; Christian Rossow; Martin Johns; Michael Backes


usenix security symposium | 2017

How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security.

Ben Stock; Martin Johns; Marius Steffens; Michael Backes

Collaboration


Dive into the Ben Stock's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Felix C. Freiling

University of Erlangen-Nuremberg

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jan Göbel

University of Mannheim

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge