RISC JKU
  • @inproceedings{RISC5261,
    author = {Wolfgang Schreiner and David Cerna and Temur Kutsia and Michael Krieger and Bashar Ahmad and Helmut Otto and Martin Rummerstorfer and Thomas Gössl},
    title = {{Practical Event Monitoring in the LogicGuard Framework}},
    booktitle = {{embedded world Conference 2016, February 23-25 2016, Nürnberg, Germany}},
    language = {english},
    abstract = {We describe further progress on the previously introduced LogicGuard specification language and execution framework. This framework generates from a high-level logic specification of a desired property of a stream of events an executable program that observes the stream in real time for violations of the property. While previous presentations were based on an early and incomplete prototype, we are now able to report on some practical applications of the operational framework in the context of network security. As a startup example, we present the “Rogue DHCP” scenario where a device illicitly poses as a DHCP server in order to feed newly connected devices with wrong connectivity information; the monitor detects this attack by looking for duplicate offers to the same DHCP client, of which one is from the attacker. Our main scenario is “Dynamic DNS (DDNS) Cache Poisoining” where an attacker poses as a DDNS client and feeds the DDNS server with wrong DNS update information; the monitor detects this attack by learning about the frequency of legitimate DDNS updates and reporting updates that occur significantly earlier than expected.},
    pages = {--},
    publisher = {Design & Elektronik},
    address = {Haar, Germany},
    isbn_issn = {ISBN 978-3-645-50159-0},
    year = {2016},
    month = {February},
    editor = {Matthias Sturm et al.},
    refereed = {no},
    keywords = {formal methods, runtime verification, event processing},
    length = {7}
    }