• Deutsch
    • English
 
  • Publish
  • About KOBRA  
    • About us
    • Policy
    • License
    • FAQ
    • Contact
  • 🇬🇧
    • Deutsch
    • English
  • Login
View Item 
  •   KOBRA
  • Fachbereiche
  • FB 16 Elektrotechnik / Informatik
  • Kasseler Informatikschriften (KIS)
  • View Item
  •   KOBRA
  • Fachbereiche
  • FB 16 Elektrotechnik / Informatik
  • Kasseler Informatikschriften (KIS)
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.


Diese Webseite benutzt Cookies.
COOKIE POLICY DER UNI. Close


Thumbnail🇬🇧
View/Open
  Technicalreport2008_1.pdf (1.644Mb)
View/Open
Date
2008-04-14
Author
Opfer, StephanTriller, StefanScheuermann, StephanAmma, TillBlumenstein, MichaelGlogic, Ilhan
Editor
Weise, ThomasBaer, Philipp A.
Subject
004  Data processing and computer science 
URI
urn:nbn:de:hebis:34-2008041421155
Metadata
Show full item record
Technischer Report

1st Kassel Student Workshop on Security in Distributed Systems

(KaSWoSDS '08)

Abstract
  • 🇬🇧
With this document, we provide a compilation of in-depth discussions on some of the most current security issues in distributed systems. The six contributions have been collected and presented at the 1st Kassel Student Workshop on Security in Distributed Systems (KaSWoSDS’08). We are pleased to present a collection of papers not only shedding light on the theoretical aspects of their topics, but also being accompanied with elaborate practical examples. In Chapter 1, Stephan Opfer discusses Viruses, one of the oldest threats to system security. For years there has been an arms race between virus producers and anti-virus software providers, with no end in sight. Stefan Triller demonstrates how malicious code can be injected in a target process using a buffer overflow in Chapter 2. Websites usually store their data and user information in data bases. Like buffer overflows, the possibilities of performing SQL injection attacks targeting such data bases are left open by unwary programmers. Stephan Scheuermann gives us a deeper insight into the mechanisms behind such attacks in Chapter 3. Cross-site scripting (XSS) is a method to insert malicious code into websites viewed by other users. Michael Blumenstein explains this issue in Chapter 4. Code can be injected in other websites via XSS attacks in order to spy out data of internet users, spoofing subsumes all methods that directly involve taking on a false identity. In Chapter 5, Till Amma shows us different ways how this can be done and how it is prevented. Last but not least, cryptographic methods are used to encode confidential data in a way that even if it got in the wrong hands, the culprits cannot decode it. Over the centuries, many different ciphers have been developed, applied, and finally broken. Ilhan Glogic sketches this history in Chapter 6.
Collections
Kasseler Informatikschriften (KIS)  (FB 16 Elektrotechnik / Informatik)

DSpace software copyright © 2002-2015  DuraSpace
KOBRA copyright © 2006-2018  UB Kassel
Contact Us | Send Feedback | Impressum / Datenschutz
Theme by 
Atmire NV
 

 

Browse

All of KOBRACommunities & CollectionsBy Issue Date Authors Titles Keyword (DDC)Keyword (GND)Publication type Language Open access This CollectionBy Issue Date Authors Titles Keyword (DDC)Keyword (GND)Publication type Language Open access

    DSpace software copyright © 2002-2015  DuraSpace
    KOBRA copyright © 2006-2018  UB Kassel
    Contact Us | Send Feedback | Impressum / Datenschutz
    Theme by 
    Atmire NV