- Cloud Data Security Solutions
- Information and Cyber Security
- Advanced Malware Detection Techniques
- Cryptography and Data Security
- Quantum Information and Cryptography
- Network Security and Intrusion Detection
- Quantum Computing Algorithms and Architecture
- Distributed systems and fault tolerance
- Quantum Mechanics and Applications
- Security and Verification in Computing
- Caching and Content Delivery
- Cloud Computing and Resource Management
- Advanced Data Storage Technologies
- Sociology and Education Studies
- Advanced Steganography and Watermarking Techniques
- Digital and Cyber Forensics
- Arts, Culture, and Music Studies
- Privacy-Preserving Technologies in Data
- Molecular Communication and Nanonetworks
- Business Process Modeling and Analysis
- Chaos-based Image/Signal Encryption
- Scientific Computing and Data Management
- Simulation Techniques and Applications
- Software System Performance and Reliability
- Natural Language Processing Techniques
TU Wien
2023
Austrian Institute of Technology
2009-2018
In this paper, we present the quantum key distribution (QKD) network designed and implemented by European project SEcure COmmunication based on Quantum Cryptography (SECOQC) (2004–2008), unifying efforts of 41 research industrial organizations. The paper summarizes SECOQC approach to QKD networks with a focus trusted repeater paradigm. It discusses architecture functionality prototype, which has been put into operation in Vienna 2008 publicly demonstrated framework conference held from...
The field of software security testing, more specifically penetration is an activity that requires high levels expertise and involves many manual testing analysis steps. This paper explores the potential usage large-language models, such as GPT3.5, to augment testers with AI sparring partners. We explore feasibility supplementing models for two distinct use cases: high-level task planning assignments low-level vulnerability hunting within a vulnerable virtual machine. For latter, we...
Cloud based collaboration gives rise to many new applications and business opportunities in both the private domain. However, building such systems a secure robust manner is challenging task. In this paper, we present architecture for cloud data sharing called ARCHISTAR. It builds upon distributed storage system thus avoids any single point of trust or failure. Besides providing confidentiality data, our focus on availability particular robustness against active attacks failures. Our...
We explore the feasibility and effectiveness of using LLM-driven autonomous systems for Assumed Breach penetration testing in enterprise networks. introduce a novel prototype that, driven by Large Language Models (LLMs), can compromise accounts within real-life Active Directory testbed. Our research provides comprehensive evaluation prototype's capabilities, highlights both strengths limitations while executing attack. The uses realistic simulation environment (Game Directory, GOAD) to...
We present a prototypic Quantum Key Distribution (QKD) back-bone network, formed by seven QKD-Link devices that connect five subsidiaries of SIEMENS Austria. This highly integrated trusted-repeater type QKD network allows integration heterogeneous technologies.
Achieving cloud security is not a trivial problem and developing enforcing good controls fundamental requirement if this to succeed. The very nature of computing can add additional layers for an already complex area. We discuss why such issue, consider what desirable characteristics should be aimed propose novel means effectively efficiently achieving these goals through the use unikernel based systems. main thrust paper key issues which need addressed, noting those might covered by our...
Cloud computing has been a great enabler for both the Internet of Things and Big Data. However, as with all new developments, development technology is usually much faster than consideration for, of, solutions security privacy. In previous paper, we proposed that unikernel solution could be used to improve privacy in cloud scenario. this outline how might apply approach Things, which can demonstrate an improvement over existing approaches.
Offensive security-tests are a common way to pro-actively discover potential vulnerabilities. They performed by specialists, often called penetration-testers or white-hat hackers. The chronic lack of available hackers prevents sufficient security test coverage software. Research into automation tries alleviate this problem improving the efficiency testing. To achieve this, researchers and tool builders need solid understanding how work, their assumptions, pain points. In paper, we present...
Penetration testing, an essential component of software security allows organizations to proactively identify and remediate vulnerabilities in their systems, thus bolstering defense mechanisms against potential cyberattacks. One recent advancement the realm penetration testing is utilization Language Models (LLMs). We explore intersection LLMs gain insight into capabilities challenges context privilege escalation. create automated Linux privilege-escalation benchmark utilizing local virtual...
ACKNOWLEDGEMENTS This work was in part funded by the European Commission through grant agreement no 644962 (PRISMACLOUD).
Cloud-Storage has become part of the standard toolkit for enterprise-grade computing. While being cost- and energy-efficient, cloud storage's availability data confidentiality can be problematic. A common approach mitigating those issues are cloud-of-cloud solutions. Another challenge is integration such a solution into existing legacy systems. This paper introduces Archistar Backup Proxy which allows multi-cloud storage enterprise computing landscapes by overloading industry-standard Amazon...
In quantum communication experiments using entangled photon pairs far-distant measurement results are correlated on the sub-nanosecond level. For best performances timing of coincidence window and its width critical. contrast to lab experiments, where accurate could be adjusted easily by e.g. matched cable length, in distributed a common clock more than time is requested means stable synchronization channels or atom clocks synchronized GPS. Synchronization distant far from trivial. Efficient...