Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Benjamin Taubmann is active.

Publication


Featured researches published by Benjamin Taubmann.


trust, security and privacy in computing and communications | 2016

CloudPhylactor: Harnessing Mandatory Access Control for Virtual Machine Introspection in Cloud Data Centers

Benjamin Taubmann; Noëlle Rakotondravony; Hans P. Reiser

Virtual machine introspection is a valuable approach for malware analysis and forensic evidence collection on virtual machines. However, there are no feasible solutions how it can be used in production systems of cloud providers. In this paper, we present the CloudPhylactor architecture. It harnesses the mandatory access control of Xen to grant dedicated monitoring virtual machines the rights to access the main memory of other virtual machines in order to run introspection operations. This allows customers to create monitoring virtual machines that have access to perform VMI-based operations on their production virtual machines. With our prototype implementation, we show that our approach does not introduce performance drawbacks and gives cloud customers full control to do introspection on their virtual machines. We also show that the impact of successful attacks to the monitoring framework is reduced.


Proceedings of the Confederated International Conferences on On the Move to Meaningful Internet Systems: OTM 2015 Conferences - Volume 9415 | 2015

CloudIDEA: A Malware Defense Architecture for Cloud Data Centers

Andreas Fischer; Thomas Kittel; Bojan Kolosnjaji; Tamas K. Lengyel; Waseem Mandarawi; Hermann de Meer; Tilo Müller; Mykola Protsenko; Hans P. Reiser; Benjamin Taubmann; Eva Weishäupl

Due to the proliferation of cloud computing, cloud-based systems are becoming an increasingly attractive target for malware. In an Infrastructure-as-a-Service IaaS cloud, malware located in a customers virtual machine VM affects not only this customer, but may also attack the cloud infrastructure and other co-hosted customers directly. This paper presents CloudIDEA, an architecture that provides a security service for malware defens in cloud environments. It combines lightweight intrusion monitoring with on-demand isolation, evidence collection, and in-depth analysis of VMs on dedicated analysis hosts. A dynamic decision engine makes on-demand decisions on how to handle suspicious events considering cost-efficiency and quality-of-service constraints.


availability, reliability and security | 2015

A Lightweight Framework for Cold Boot Based Forensics on Mobile Devices

Benjamin Taubmann; Manuel Huber; Sascha Wessel; Lukas Heim; Hans P. Reiser; Georg Sigl

Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the degree of security these devices can provide against digital forensics is of particular interest. A common method to access arbitrary data in main memory is the cold boot attack. The cold boot attack exploits theremanence effect that causes data in DRAM modules not to lose the content immediately in case of a power cut-off. This makes it possible to restart a device and extract the data in main memory. In this paper, we present a novel framework for cold boot based data acquisition with a minimal bare metal application on a mobile device. In contrast to other cold boot approaches, our forensics tool overwrites only a minimal amount of data in main memory. This tool requires no more than five kilobytes of constant data in the kernel code section. We hence sustain all of the data relevant for the analysis of the previously running system. This makes it possible to analyze the memory with data acquisition tools. For this purpose, we extend the memory forensics tool Volatility in order to request parts of the main memory dynamically from our bare metal application. We show the feasibility of our approach by comparing it to a traditional memory dump based analysis using the Samsung Galaxy S4 mobile device.


Digital Investigation | 2018

DroidKex: Fast extraction of ephemeral TLS keys from the memory of Android apps

Benjamin Taubmann; Omar Alabduljaleel; Hans P. Reiser

Abstract Fast extraction of ephemeral data from the memory of a running process without affecting the performance of the analyzed program is a problem when the location and data structure layout of the information is not known. In this paper, we introduce DroidKex, an approach for partially reconstructing the semantics of data structures in order to minimize the overhead required for extracting information from the memory of applications. We demonstrate the practicability of our approach by applying it to 86Android applications in order to extract the cryptographic key material of TLS connections.


ieee international conference on cloud computing technology and science | 2017

Classifying malware attacks in IaaS cloud environments

Noëlle Rakotondravony; Benjamin Taubmann; Waseem Mandarawi; Eva Weishäupl; Peng Xu; Bojan Kolosnjaji; Mykolai Protsenko; Hermann de Meer; Hans P. Reiser

In the last few years, research has been motivated to provide a categorization and classification of security concerns accompanying the growing adaptation of Infrastructure as a Service (IaaS) clouds. Studies have been motivated by the risks, threats and vulnerabilities imposed by the components within the environment and have provided general classifications of related attacks, as well as the respective detection and mitigation mechanisms. Virtual Machine Introspection (VMI) has been proven to be an effective tool for malware detection and analysis in virtualized environments. In this paper, we classify attacks in IaaS cloud that can be investigated using VMI-based mechanisms. This infers a special focus on attacks that directly involve Virtual Machines (VMs) deployed in an IaaS cloud. Our classification methodology takes into consideration the source, target, and direction of the attacks. As each actor in a cloud environment can be both source and target of attacks, the classification provides any cloud actor the necessary knowledge of the different attacks by which it can threaten or be threatened, and consequently deploy adapted VMI-based monitoring architectures. To highlight the relevance of attacks, we provide a statistical analysis of the reported vulnerabilities exploited by the classified attacks and their financial impact on actual business processes.


Proceedings of the 4th Workshop on Security in Highly Connected IT Systems | 2017

Architecture for Resource-Aware VMI-based Cloud Malware Analysis

Benjamin Taubmann; Bojan Kolosnjaji

Virtual machine introspection (VMI) is a technology with many possible applications, such as malware analysis and intrusion detection. However, this technique is resource intensive, as inspecting program behavior includes recording of a high number of events caused by the analyzed binary and related processes. In this paper we present an architecture that leverages cloud resources for virtual machine-based malware analysis in order to train a classifier for detecting cloud-specific malware. This architecture is designed while having in mind the resource consumption when applying the VMI-based technology in production systems, in particular the overhead of tracing a large set of system calls. In order to minimize the data acquisition overhead, we use a data-driven approach from the area of resource-aware machine learning. This approach enables us to optimize the trade-off between malware detection performance and the overhead of our VMI-based tracing system.


Proceedings of the 4th Workshop on Security in Highly Connected IT Systems | 2017

Virtual Machine Introspection Based SSH Honeypot

Stewart Sentanoe; Benjamin Taubmann; Hans P. Reiser

A honeypot provides information about the new attack and exploitation methods and allows analyzing the adversarys activities during or after exploitation. One way of an adversary to communicate with a server is via secure shell (SSH). SSH provides secure login, file transfer, X11 forwarding, and TCP/IP connections over untrusted networks. SSH is a preferred target for attacks, as it is frequently used with password-based authentication, and weak passwords are easily exploited using brute-force attacks. In this paper, we introduce a Virtual Machine Introspection based SSH honeypot. We discuss the design of the system and how to extract valuable information such as the credential used by the attacker and the entered commands. Our experiments show that the system is able to detect the adversarys activities during and after exploitation, and it has advantages compared to currently used SSH honeypot approaches.


availability, reliability and security | 2016

Geographic Localization of an Anonymous Social Network Message Data Set

Alexander Böhm; Benjamin Taubmann; Hans P. Reiser

Nowadays, privacy and anonymity are becoming more and more important for users of social networks. Thus, it is of particular interest for user of an anonymous, location-based social network if the network is able to provided the anonymity that it appears to provide. In this work, we present an approach to obtain the geographic location of users of the popular Jodel social network. We are able to reconstruct the exact location from which a message was sent with an accuracy of 10 meters, using only 20 requests sent from virtual clients at different locations to the social network service.


Digital Investigation | 2016

TLSkex: Harnessing virtual machine introspection for decrypting TLS communication

Benjamin Taubmann; Christoph Frädrich; Dominik Dusold; Hans P. Reiser


Eurasip Journal on Information Security | 2016

A flexible framework for mobile device forensics based on cold boot attacks

Manuel Huber; Benjamin Taubmann; Sascha Wessel; Hans P. Reiser; Georg Sigl

Collaboration


Dive into the Benjamin Taubmann's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Eva Weishäupl

University of Regensburg

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mykola Protsenko

University of Erlangen-Nuremberg

View shared research outputs
Researchain Logo
Decentralizing Knowledge