Martin Brunner
  • Home
  • About
  • CV
  • Talks & Publications
  • Downloads
  • Contact
  • Security Enthusiast
  • Public Speaker
  • Author
  • Entrepreneur
  • Technology Evangelist
  • Infosec Nerd
  • Inventor
  • Computer Geek
  • Metalhead
  • Outdoor Enthusiast
  • Animal Rights Supporter
  • Friluftsliv-Fan
  • Guitar-Player
  • Wannabe-Viking
  • Part-Time Norwegian
  • Short-Order Cook
  • Rookie Pizzaiolo
  • Single Malt Connoisseur

About

I’m currently Director Cyber Security Adversary Emulation heading the Red Team at Infineon Technologies. I have also been the founder and owner of x90.eu.

 

In the past, I was with secunet and worked with the Fraunhofer Institutes SIT and AISEC. This personal website expresses the opinions of none of those organizations.

As a member of several standardization committees and consortia I have been serving as a security expert to various technical standards and the European Commission.

I (co-)authored various publications and am a frequent public speaker at international automotive and security conferences and events.

I hold a Master’s degree in Practical Computer Science from FernUniversität in Hagen, Germany and a Bachelor’s degree in Computer and Media Security from the University of Applied Sciences in Hagenberg, Austria

I live with Martina, Darwin & Archimedes and spend my time in Munich / Germany, Wörthersee in the Austrian Alps and the Norwegian Fjords.

While on the road in between we reside in Franz-Ferdinand, our Campervan based on Mercedes Marco Polo.

Bio

Brief CV

resume-2445060_1920

I founded my first company – a security-centric e-mail provider and hosting company – in 2005 during my first studies. Since 2006 I have been working as a security engineer, sysadmin, researcher, consultant, pen-tester, technical marketing manager and security architect for various industries and domains including but not limited to IT, Automotive, IoT, ICS, MNOs, Services Providers, Production, SME and Public Agencies.

Holding numerous research, engineering and consulting positions in automotive and security in an international environment and working with people from all over the world gave me the opportunity to learn about security from a variety of perspectives i.e., how security is perceived and handled by different positions, industries, applications, countries and cultures.

Overall, I have more than 15 years of global experience in IT- and automotive security – in designing, building, testing, operating and securing systems and networks.

You can download a copy of my CV here.

Talks & Publications

I (co-)authored numerous papers, articles, patents and other sorts of publications and was honored to give talks on different occasions. Additionally, I contributed to various other technical documents, such as technical standards, whitepapers and guidelines.

A selection of these various activities is summarized below.

 

 

Automotive Security Botnets BSD Early Warning Systems Embedded Security Hardware-based Security Honeypots Linux Malware Network Security Offensive Security Pentesting

2022

Martin Brunner

Automotive Cyber Security at Infineon Talk

Silicon Alps – Spotlight Cyber Security (Virtual), 2022.

BibTeX | Schlagwörter: Automotive Security, Embedded Security, Hardware-based Security | Links:

@conference{Brunner2022,
title = {Automotive Cyber Security at Infineon},
author = {Martin Brunner},
url = {https://www.silicon-alps.at/events/spotlight-cyber-security/},
year = {2022},
date = {2022-04-01},
urldate = {2022-04-08},
booktitle = {Silicon Alps – Spotlight Cyber Security (Virtual)},
keywords = {Automotive Security, Embedded Security, Hardware-based Security},
pubstate = {published},
tppubtype = {conference}
}

Close

Antonio Priore; Tim Van Roermund; Thierry Kouthon; Martin Brunner; Lee Harrison; Jack Ogawa; Andrea Matteucci; Kai Hackbarth

Security Threats, Regulations, Standards and Assurance Methods for Automotive Applications Whitepaper

Global Semiconductor Alliance - Trusted IOT Ecosystem, 2022, (Whitepaper).

BibTeX | Schlagwörter: Automotive Security, Embedded Security, Hardware-based Security | Links:

@misc{Priore2022,
title = {Security Threats, Regulations, Standards and Assurance Methods for Automotive Applications},
author = {Antonio Priore and Tim Van Roermund and Thierry Kouthon and Martin Brunner and Lee Harrison and Jack Ogawa and Andrea Matteucci and Kai Hackbarth},
url = {https://www.gsaglobal.org/security-threats-regulations-standards-assurance-methods-for-automotive-applications/},
year = {2022},
date = {2022-03-01},
urldate = {2022-03-01},
howpublished = {Global Semiconductor Alliance - Trusted IOT Ecosystem},
note = {Whitepaper},
keywords = {Automotive Security, Embedded Security, Hardware-based Security},
pubstate = {published},
tppubtype = {misc}
}

Close

2021

Martin Brunner

Towards standardized automotive security – must-haves for connected vehicles and V2X Talk

Automotive Cybersecurity Webinar Series (Virtual), 2021.

BibTeX | Schlagwörter: Automotive Security | Links:

@conference{Brunner2021,
title = {Towards standardized automotive security – must-haves for connected vehicles and V2X},
author = {Martin Brunner},
url = {https://www.infineon.com/cms/en/product/promopages/automotive-cybersecurity-webinars/},
year = {2021},
date = {2021-06-01},
urldate = {2021-06-01},
booktitle = {Automotive Cybersecurity Webinar Series (Virtual)},
keywords = {Automotive Security},
pubstate = {published},
tppubtype = {conference}
}

Close

Alexander Zeh; Martin Brunner; Marcus Janke

Trusted authentication of automotive microcontroller Patent

US11177953B2, 2021.

BibTeX | Schlagwörter: Automotive Security, Embedded Security, Hardware-based Security | Links:

@patent{Zeh2021,
title = {Trusted authentication of automotive microcontroller},
author = {Alexander Zeh and Martin Brunner and Marcus Janke},
url = {https://patents.google.com/patent/US11177953B2/en},
year = {2021},
date = {2021-01-01},
urldate = {2021-01-01},
number = {US11177953B2},
keywords = {Automotive Security, Embedded Security, Hardware-based Security},
pubstate = {published},
tppubtype = {patent}
}

Close

2020

Martin Brunner; Harry Knechtel

Automotive Key Management – vom TPM zur vernetzten Lösung Talk

Workshop IT Security on Board - Sicherheit in der Produktion, München, 2020.

BibTeX | Schlagwörter: Automotive Security, Embedded Security, Hardware-based Security

@conference{Brunner2020a,
title = {Automotive Key Management – vom TPM zur vernetzten Lösung},
author = {Martin Brunner and Harry Knechtel},
year = {2020},
date = {2020-09-01},
urldate = {2020-09-01},
booktitle = {Workshop IT Security on Board - Sicherheit in der Produktion},
address = {München},
keywords = {Automotive Security, Embedded Security, Hardware-based Security},
pubstate = {published},
tppubtype = {conference}
}

Close

Martin Brunner

Safeguarding electric vehicle charging key to secure e-mobility Article

In: FierceElectronics, 2020.

BibTeX | Schlagwörter: Automotive Security, Embedded Security, Hardware-based Security | Links:

@article{Brunner2020,
title = {Safeguarding electric vehicle charging key to secure e-mobility},
author = {Martin Brunner},
url = {https://www.fierceelectronics.com/electronics/safeguarding-electric-vehicle-charging-key-to-secure-e-mobility},
year = {2020},
date = {2020-06-01},
urldate = {2020-06-01},
journal = {FierceElectronics},
keywords = {Automotive Security, Embedded Security, Hardware-based Security},
pubstate = {published},
tppubtype = {article}
}

Close

Karsten Schmidt; Felix Friedrich; Martin Brunner

Motor vehicle having a data network which is divided into multiple separate domains and method for operating the data network Patent

EP3496975B1, 2020.

BibTeX | Schlagwörter: Automotive Security, Network Security | Links:

@patent{Schmidt2020,
title = {Motor vehicle having a data network which is divided into multiple separate domains and method for operating the data network},
author = {Karsten Schmidt and Felix Friedrich and Martin Brunner},
url = {https://patents.google.com/patent/EP3496975B1/en},
year = {2020},
date = {2020-01-01},
urldate = {2020-01-01},
number = {EP3496975B1},
keywords = {Automotive Security, Network Security},
pubstate = {published},
tppubtype = {patent}
}

Close

2019

Martin Brunner

Trusted Platform Modules provide security for e-mobility Article

In: eeNews Embedded, 2019.

BibTeX | Schlagwörter: Automotive Security, Embedded Security, Hardware-based Security

@article{Brunner2019d,
title = {Trusted Platform Modules provide security for e-mobility},
author = {Martin Brunner},
year = {2019},
date = {2019-11-01},
urldate = {2019-11-01},
journal = {eeNews Embedded},
keywords = {Automotive Security, Embedded Security, Hardware-based Security},
pubstate = {published},
tppubtype = {article}
}

Close

Martin Brunner; Michael Machold; Björn Steurich

Future requirements for automotive hardware security Whitepaper

Online, 2019, (Whitepaper).

BibTeX | Schlagwörter: Automotive Security, Embedded Security, Hardware-based Security | Links:

@misc{Brunner2019g,
title = {Future requirements for automotive hardware security},
author = {Martin Brunner and Michael Machold and Björn Steurich},
url = {https://www.infineon.com/cms/en/product/gated-document/future-requirements-for-automotive-hardware-security-5546d4626df6ee62016e3709e03b03b1/},
year = {2019},
date = {2019-11-01},
urldate = {2019-11-01},
howpublished = {Online},
note = {Whitepaper},
keywords = {Automotive Security, Embedded Security, Hardware-based Security},
pubstate = {published},
tppubtype = {misc}
}

Close

Karel Heurtefeux; Martin Brunner; Bjoern Steurich

Sicherheit entscheidet sich im Gateway Article

In: HANSER automotive, vol. 18, no. 10/2019, pp. 18–21, 2019.

BibTeX | Schlagwörter: Automotive Security, Embedded Security, Hardware-based Security

@article{Heurtefeux2019,
title = {Sicherheit entscheidet sich im Gateway},
author = {Karel Heurtefeux and Martin Brunner and Bjoern Steurich},
year = {2019},
date = {2019-10-01},
urldate = {2019-10-01},
journal = {HANSER automotive},
volume = {18},
number = {10/2019},
pages = {18--21},
keywords = {Automotive Security, Embedded Security, Hardware-based Security},
pubstate = {published},
tppubtype = {article}
}

Close

Martin Brunner; Hans Adlkofer

Hardware matters: how one chip can impact the security of a connected vehicle Conference PaperPeer-reviewed

In: GmbH, VDI Wissensforum (Ed.): 19th International Congress ELIV 2019, pp. 455–468, VDI Verlag GmbH, Bonn, 2019.

BibTeX | Schlagwörter: Automotive Security, Embedded Security, Hardware-based Security

@inproceedings{Brunner2019e,
title = {Hardware matters: how one chip can impact the security of a connected vehicle},
author = {Martin Brunner and Hans Adlkofer},
editor = {VDI Wissensforum GmbH},
year = {2019},
date = {2019-10-01},
urldate = {2019-10-01},
booktitle = {19th International Congress ELIV 2019},
volume = {VDI-Berichte Nr. 2357},
number = {ISBN 978-3-18-092357-4},
pages = {455--468},
publisher = {VDI Verlag GmbH},
address = {Bonn},
keywords = {Automotive Security, Embedded Security, Hardware-based Security},
pubstate = {published},
tppubtype = {inproceedings}
}

Close

Martin Brunner; Michael Machold; Björn Steurich

Post EVITA Semiconductor Security Quo Vadis? Conference PaperPeer-reviewed

In: GmbH, VDI Wissensforum (Ed.): VDI-Fachtagung Automotive Security 2019 - Security, Datenschutz und die Neue Mobilität, pp. 51–70, VDI Verlag GmbH, Berlin, 2019.

BibTeX | Schlagwörter: Automotive Security, Embedded Security, Hardware-based Security

@inproceedings{Brunner2019f,
title = {Post EVITA Semiconductor Security Quo Vadis?},
author = {Martin Brunner and Michael Machold and Björn Steurich},
editor = {VDI Wissensforum GmbH},
year = {2019},
date = {2019-10-01},
urldate = {2019-10-01},
booktitle = {VDI-Fachtagung Automotive Security 2019 - Security, Datenschutz und die Neue Mobilität},
volume = {VDI-Berichte Nr. 2386},
number = {ISBN 978-3-18-092358-1},
pages = {51--70},
publisher = {VDI Verlag GmbH},
address = {Berlin},
keywords = {Automotive Security, Embedded Security, Hardware-based Security},
pubstate = {published},
tppubtype = {inproceedings}
}

Close

Martin Brunner

Paper Presentation: Hardware matters: how one chip can impact the security of a connected vehicle Talk

19th International Congress ELIV 2019, Bonn, 2019.

BibTeX | Schlagwörter: Automotive Security, Embedded Security, Hardware-based Security

@conference{Brunner2019h,
title = {Paper Presentation: Hardware matters: how one chip can impact the security of a connected vehicle},
author = {Martin Brunner},
year = {2019},
date = {2019-10-01},
urldate = {2019-10-01},
booktitle = {19th International Congress ELIV 2019},
address = {Bonn},
keywords = {Automotive Security, Embedded Security, Hardware-based Security},
pubstate = {published},
tppubtype = {conference}
}

Close

마틴 브루너 (Martin Brunner)

Cover Story (Korean): TPM을 활용한 e-모빌리티 보안 향상 Article

In: 전자기술 (Electronic Engineering), 2019.

BibTeX | Schlagwörter: Automotive Security, Embedded Security, Hardware-based Security

@article{MartinBrunner2019,
title = {Cover Story (Korean): TPM을 활용한 e-모빌리티 보안 향상},
author = {마틴 브루너 (Martin Brunner)},
year = {2019},
date = {2019-07-01},
urldate = {2019-07-01},
journal = {전자기술 (Electronic Engineering)},
keywords = {Automotive Security, Embedded Security, Hardware-based Security},
pubstate = {published},
tppubtype = {article}
}

Close

Martin Brunner

Introducing hardware-assisted security solutions based on HSM and TPM Talk

Embedded Multi-Core Conference, Munich, 2019.

BibTeX | Schlagwörter: Automotive Security, Embedded Security, Hardware-based Security

@conference{Brunner2019a,
title = {Introducing hardware-assisted security solutions based on HSM and TPM},
author = {Martin Brunner},
year = {2019},
date = {2019-05-01},
urldate = {2019-05-01},
booktitle = {Embedded Multi-Core Conference},
address = {Munich},
keywords = {Automotive Security, Embedded Security, Hardware-based Security},
pubstate = {published},
tppubtype = {conference}
}

Close

Martin Brunner

Security als Teil der Architektur- Trusted Platform Module bietet Sicherheit für das Laden von EVs Article

In: all-electronics, 2019.

BibTeX | Schlagwörter: Automotive Security, Embedded Security, Hardware-based Security | Links:

@article{Brunner2019b,
title = {Security als Teil der Architektur- Trusted Platform Module bietet Sicherheit für das Laden von EVs},
author = {Martin Brunner},
url = {https://www.all-electronics.de/automotive-transportation/trusted-platform-module-bietet-sicherheit-fuer-das-laden-von-evs-118.html},
year = {2019},
date = {2019-05-01},
urldate = {2019-05-01},
journal = {all-electronics},
keywords = {Automotive Security, Embedded Security, Hardware-based Security},
pubstate = {published},
tppubtype = {article}
}

Close

Martin Brunner

Trusted Platform Module - Sicherheit für das Laden von EVs Article

In: emobility tec, vol. 02/2019, pp. 40–43, 2019, ISSN: 2193-892X.

BibTeX | Schlagwörter: Automotive Security, Embedded Security, Hardware-based Security

@article{Brunner2019c,
title = {Trusted Platform Module - Sicherheit für das Laden von EVs},
author = {Martin Brunner},
issn = {2193-892X},
year = {2019},
date = {2019-05-01},
urldate = {2019-05-01},
journal = {emobility tec},
volume = {02/2019},
pages = {40--43},
keywords = {Automotive Security, Embedded Security, Hardware-based Security},
pubstate = {published},
tppubtype = {article}
}

Close

Martin Brunner

From hardware security towards trusted mobility: A semiconductor view on the security of connected vehicles Talk

Vehicle Electronics & Connected Services 2019, Gothenburg, Sweden, 2019.

BibTeX | Schlagwörter: Automotive Security, Embedded Security, Hardware-based Security | Links:

@conference{Brunner2019,
title = {From hardware security towards trusted mobility: A semiconductor view on the security of connected vehicles},
author = {Martin Brunner},
url = {https://insightevents.se/vehicle-electronics-connected-services/},
year = {2019},
date = {2019-04-01},
urldate = {2019-04-01},
booktitle = {Vehicle Electronics & Connected Services 2019},
address = {Gothenburg, Sweden},
keywords = {Automotive Security, Embedded Security, Hardware-based Security},
pubstate = {published},
tppubtype = {conference}
}

Close

Sergei Bauer; Martin Brunner; Peter Schartner

Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys Conference PaperPeer-reviewed

In: 2019 Third IEEE International Conference on Robotic Computing (IRC), pp. 425-426, IEEE, Naples, Italy, 2019.

BibTeX | Schlagwörter: Automotive Security, Hardware-based Security | Links:

@inproceedings{8675576,
title = {Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys},
author = {Sergei Bauer and Martin Brunner and Peter Schartner},
doi = {10.1109/IRC.2019.00082},
year = {2019},
date = {2019-01-01},
urldate = {2019-01-01},
booktitle = {2019 Third IEEE International Conference on Robotic Computing (IRC)},
pages = {425-426},
publisher = {IEEE},
address = {Naples, Italy},
keywords = {Automotive Security, Hardware-based Security},
pubstate = {published},
tppubtype = {inproceedings}
}

Close

2018

Martin Brunner

Secure connectivity: Need for trust anchors in a connected car Talk

Talk at Automotive Forum, electronica 2018, Munich, 2018.

BibTeX | Schlagwörter: Automotive Security, Embedded Security, Hardware-based Security

@conference{Brunner2018a,
title = {Secure connectivity: Need for trust anchors in a connected car},
author = {Martin Brunner},
year = {2018},
date = {2018-11-01},
urldate = {2018-11-01},
booktitle = {Talk at Automotive Forum, electronica 2018},
address = {Munich},
keywords = {Automotive Security, Embedded Security, Hardware-based Security},
pubstate = {published},
tppubtype = {conference}
}

Close

Martin Brunner

Easy to integrate semiconductor solutions for trusted mobility Talk

Talk at Cyber Security Forum, electronica 2018, Munich, 2018.

BibTeX | Schlagwörter: Automotive Security, Embedded Security, Hardware-based Security

@conference{Brunner2018b,
title = {Easy to integrate semiconductor solutions for trusted mobility},
author = {Martin Brunner},
year = {2018},
date = {2018-11-01},
urldate = {2018-11-01},
booktitle = {Talk at Cyber Security Forum, electronica 2018},
address = {Munich},
keywords = {Automotive Security, Embedded Security, Hardware-based Security},
pubstate = {published},
tppubtype = {conference}
}

Close

Martin Brunner

Paper Presentation: Leveraging Hardware Security to Secure Connected Vehicles Talk

SAE WCX World Congress Experience, COBO CENTER - Detroit, MI, USA, 2018.

BibTeX | Schlagwörter: Automotive Security, Embedded Security, Hardware-based Security

@conference{Brunner2018,
title = {Paper Presentation: Leveraging Hardware Security to Secure Connected Vehicles},
author = {Martin Brunner},
year = {2018},
date = {2018-04-01},
urldate = {2018-04-01},
booktitle = {SAE WCX World Congress Experience},
address = {COBO CENTER - Detroit, MI, USA},
keywords = {Automotive Security, Embedded Security, Hardware-based Security},
pubstate = {published},
tppubtype = {conference}
}

Close

Christopher Corbett; Martin Brunner; Karsten Schmidt; Rolf Schneider; Udo Dannebaum

Leveraging Hardware Security to Secure Connected Vehicles Conference PaperPeer-reviewed

In: SAE WCX World Congress Experience, Technical Paper 2018-01-0012, SAE International SAE International in United States, 2018.

BibTeX | Schlagwörter: Automotive Security, Embedded Security, Hardware-based Security | Links:

@inproceedings{Corbett2018,
title = {Leveraging Hardware Security to Secure Connected Vehicles},
author = {Christopher Corbett and Martin Brunner and Karsten Schmidt and Rolf Schneider and Udo Dannebaum},
url = {https://doi.org/10.4271/2018-01-0012},
doi = {10.4271/2018-01-0012},
year = {2018},
date = {2018-04-01},
urldate = {2018-04-01},
booktitle = {SAE WCX World Congress Experience, Technical Paper 2018-01-0012},
number = {ISSN: 0148-7191},
publisher = {SAE International in United States},
organization = {SAE International},
keywords = {Automotive Security, Embedded Security, Hardware-based Security},
pubstate = {published},
tppubtype = {inproceedings}
}

Close

Panelist Cyber Security Forum Panel

electronica 2018, 2018.

BibTeX | Schlagwörter: Automotive Security, Embedded Security, Hardware-based Security

@conference{Panelist2018,
title = {Panelist Cyber Security Forum},
year = {2018},
date = {2018-01-01},
urldate = {2018-01-01},
booktitle = {electronica 2018},
keywords = {Automotive Security, Embedded Security, Hardware-based Security},
pubstate = {published},
tppubtype = {conference}
}

Close

Karsten Schmidt; Felix Friedrich; Martin Brunner

Kraftfahrzeug mit einem in mehrere getrennte Domänen eingeteilten Datennetzwerk sowie Verfahren zum Betreiben des Datennetzwerks Patent

DE102017203185B4, 2018.

BibTeX | Schlagwörter: Automotive Security, Network Security | Links:

@patent{Schmidt2018,
title = {Kraftfahrzeug mit einem in mehrere getrennte Domänen eingeteilten Datennetzwerk sowie Verfahren zum Betreiben des Datennetzwerks},
author = {Karsten Schmidt and Felix Friedrich and Martin Brunner},
url = {https://register.dpma.de/DPMAregister/pat/PatSchrifteneinsicht?docId=DE102017203185B4},
year = {2018},
date = {2018-01-01},
urldate = {2018-01-01},
number = {DE102017203185B4},
keywords = {Automotive Security, Network Security},
pubstate = {published},
tppubtype = {patent}
}

Close

2017

Martin Brunner

Trusted Platform Module - Automotive-Anwendungen und Abgrenzung zu HSM Talk

2. Vector Cyber Security Symposium, Stuttgart, Germany, 2017.

BibTeX | Schlagwörter: Automotive Security, Embedded Security, Hardware-based Security

@conference{Brunner2017,
title = {Trusted Platform Module - Automotive-Anwendungen und Abgrenzung zu HSM},
author = {Martin Brunner},
year = {2017},
date = {2017-10-01},
urldate = {2017-10-01},
booktitle = {2. Vector Cyber Security Symposium},
address = {Stuttgart, Germany},
keywords = {Automotive Security, Embedded Security, Hardware-based Security},
pubstate = {published},
tppubtype = {conference}
}

Close

2016

Martin Brunner

Automotive Ethernet – der nächste Schritt Talk

Workshop IT Security on Board - New Technologies, München, 2016.

BibTeX | Schlagwörter: Automotive Security, Network Security

@conference{Brunner2016b,
title = {Automotive Ethernet – der nächste Schritt},
author = {Martin Brunner},
year = {2016},
date = {2016-11-01},
urldate = {2016-11-01},
booktitle = {Workshop IT Security on Board - New Technologies},
address = {München},
keywords = {Automotive Security, Network Security},
pubstate = {published},
tppubtype = {conference}
}

Close

Martin Brunner

Towards Secure Ethernet-based Vehicle Networks Talk

Automotive Ethernet Congress 2016, Munich, 2016.

BibTeX | Schlagwörter: Automotive Security, Network Security

@conference{Brunner2016,
title = {Towards Secure Ethernet-based Vehicle Networks},
author = {Martin Brunner},
year = {2016},
date = {2016-02-01},
urldate = {2016-02-01},
booktitle = {Automotive Ethernet Congress 2016},
address = {Munich},
keywords = {Automotive Security, Network Security},
pubstate = {published},
tppubtype = {conference}
}

Close

Martin Brunner

IT-Sicherheit in Ethernet-basierten Fahrzeugnetzwerken: Offene Netze schützen Article

In: Elektronik automotive, vol. 05.2016, 2016, ISSN: 1614-0125.

BibTeX | Schlagwörter: Automotive Security, Network Security, Offensive Security, Pentesting

@article{Brunner2016a,
title = {IT-Sicherheit in Ethernet-basierten Fahrzeugnetzwerken: Offene Netze schützen},
author = {Martin Brunner},
issn = {1614-0125},
year = {2016},
date = {2016-01-01},
urldate = {2016-01-01},
journal = {Elektronik automotive},
volume = {05.2016},
keywords = {Automotive Security, Network Security, Offensive Security, Pentesting},
pubstate = {published},
tppubtype = {article}
}

Close

2015

Martin Brunner

Neues aus dem Pentest-Lab Talk

Workshop IT Security on Board - Hack me if you CAN, München, 2015.

BibTeX | Schlagwörter: Automotive Security, Offensive Security, Pentesting

@conference{Brunner2015,
title = {Neues aus dem Pentest-Lab},
author = {Martin Brunner},
year = {2015},
date = {2015-11-01},
urldate = {2015-11-01},
booktitle = {Workshop IT Security on Board - Hack me if you CAN},
address = {München},
keywords = {Automotive Security, Offensive Security, Pentesting},
pubstate = {published},
tppubtype = {conference}
}

Close

Martin Brunner

Kontrollierte Angriffe mittels Penetration Testing: Hack Me If You Can. Article

In: Elektronik automotive, vol. 10.2015, pp. 44–48, 2015, ISSN: 1614-0125.

BibTeX | Schlagwörter: Automotive Security, Offensive Security, Pentesting

@article{Brunner2015a,
title = {Kontrollierte Angriffe mittels Penetration Testing: Hack Me If You Can.},
author = {Martin Brunner},
issn = {1614-0125},
year = {2015},
date = {2015-10-01},
urldate = {2015-10-01},
journal = {Elektronik automotive},
volume = {10.2015},
pages = {44--48},
keywords = {Automotive Security, Offensive Security, Pentesting},
pubstate = {published},
tppubtype = {article}
}

Close

Martin Brunner

Angriff auf die Autos von morgen Article

In: secuview - The secunet Customer Magazine, 2015.

BibTeX | Schlagwörter: Automotive Security, Offensive Security, Pentesting

@article{Brunner2015b,
title = {Angriff auf die Autos von morgen},
author = {Martin Brunner},
year = {2015},
date = {2015-01-01},
urldate = {2015-01-01},
journal = {secuview - The secunet Customer Magazine},
keywords = {Automotive Security, Offensive Security, Pentesting},
pubstate = {published},
tppubtype = {article}
}

Close

2014

Martin Brunner

Industrie 4.0 - Security für Legacy Systeme Talk

Workshop IT Security on Board - Sicherheitsbaukasten Automotive, München, 2014.

BibTeX | Schlagwörter: Linux, Network Security, Offensive Security

@conference{Brunner2014,
title = {Industrie 4.0 - Security für Legacy Systeme},
author = {Martin Brunner},
year = {2014},
date = {2014-11-01},
urldate = {2014-11-01},
booktitle = {Workshop IT Security on Board - Sicherheitsbaukasten Automotive},
address = {München},
keywords = {Linux, Network Security, Offensive Security},
pubstate = {published},
tppubtype = {conference}
}

Close

2013

Martin Brunner

Angriffsvektoren und Schutzmaßnahmen am Beispiel App-gesteuerter Fahrzeugfunktionen Talk

Workshop IT Security on Board - Fremd gesteuert und trotzdem sicher, München, 2013.

BibTeX | Schlagwörter: Automotive Security, Network Security, Offensive Security, Pentesting

@conference{Brunner2013,
title = {Angriffsvektoren und Schutzmaßnahmen am Beispiel App-gesteuerter Fahrzeugfunktionen},
author = {Martin Brunner},
year = {2013},
date = {2013-10-01},
urldate = {2013-10-01},
booktitle = {Workshop IT Security on Board - Fremd gesteuert und trotzdem sicher},
address = {München},
keywords = {Automotive Security, Network Security, Offensive Security, Pentesting},
pubstate = {published},
tppubtype = {conference}
}

Close

Christian Martin Fuchs; Martin Brunner

Towards Next Generation Malware Collection and Analysis Journal ArticlePeer-reviewedArticle

In: International Journal On Advances in Security, vol. 6, no. 1 & 2, pp. 32–48, 2013, ISSN: 1942-2636.

BibTeX | Schlagwörter: Botnets, Honeypots, Malware | Links:

@article{Fuchs2013,
title = {Towards Next Generation Malware Collection and Analysis},
author = {Christian Martin Fuchs and Martin Brunner},
url = {https://www.iariajournals.org/security/sec_v6_n12_2013_paged.pdf},
issn = {1942-2636},
year = {2013},
date = {2013-01-01},
urldate = {2013-01-01},
journal = {International Journal On Advances in Security},
volume = {6},
number = {1 & 2},
pages = {32--48},
keywords = {Botnets, Honeypots, Malware},
pubstate = {published},
tppubtype = {article}
}

Close

Martin Brunner; Christian M. Fuchs; Sascha Todt

Integrated honeypot based malware collection and analysis Book ChapterPeer-reviewed

In: Zeilinger, Markus; Schoo, Peter; Hermann, Eckehard (Ed.): Advances in IT Early Warning, pp. 67–77, Fraunhofer Verlag Stuttgart, Stuttgart, 2013, ISBN: 9783839604748.

BibTeX | Schlagwörter: Early Warning Systems | Links:

@inbook{zeilinger2013a,
title = {Integrated honeypot based malware collection and analysis},
author = {Martin Brunner and Christian M. Fuchs and Sascha Todt},
editor = {Markus Zeilinger and Peter Schoo and Eckehard Hermann},
url = {http://publica.fraunhofer.de/documents/N-256707.html},
isbn = {9783839604748},
year = {2013},
date = {2013-01-01},
urldate = {2013-01-01},
booktitle = {Advances in IT Early Warning},
pages = {67--77},
publisher = {Fraunhofer Verlag Stuttgart},
address = {Stuttgart},
organization = {Fraunhofer-Einrichtung für Angewandte und Integrierte Sicherheit -AISEC-, Garching},
keywords = {Early Warning Systems},
pubstate = {published},
tppubtype = {inbook}
}

Close

2012

Martin Brunner; Christian M. Fuchs; Sascha Todt

AWESOME - Automated Web Emulation for Secure Operation of a Malware-Analysis Environment Conference PaperPeer-reviewedBEST PAPER AWARD

In: Proceedings of the Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2012), pp. 68-71, International Academy, Research, and Industry Association (IARIA) XPS, Rome, Italy, 2012, (BEST PAPER AWARD).

BibTeX | Schlagwörter: Botnets, Honeypots, Malware | Links:

@inproceedings{Securware2012,
title = {AWESOME - Automated Web Emulation for Secure Operation of a Malware-Analysis Environment},
author = {Martin Brunner and Christian M. Fuchs and Sascha Todt},
url = {http://www.thinkmind.org/index.php?view=article&articleid=securware_2012_3_20_30016},
year = {2012},
date = {2012-08-01},
urldate = {2012-08-01},
booktitle = {Proceedings of the Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2012)},
volume = {6},
number = {ISBN: 978-1-61208-209-7},
pages = {68-71},
publisher = {XPS},
address = {Rome, Italy},
organization = {International Academy, Research, and Industry Association (IARIA)},
series = {International Conference on Emerging Security Information, Systems and Technologies},
note = {BEST PAPER AWARD},
keywords = {Botnets, Honeypots, Malware},
pubstate = {published},
tppubtype = {inproceedings}
}

Close

Martin Brunner

Automated Web Emulation for Secure Operation of a Malware-Analysis Environment Talk

PhD seminar at Institute for Security in Information Technology, TUM Department of Electrical and Computer Engineering - Technical University of Munich, 2012.

BibTeX | Schlagwörter: Botnets, Honeypots, Malware

@conference{Brunner2012,
title = {Automated Web Emulation for Secure Operation of a Malware-Analysis Environment},
author = {Martin Brunner},
year = {2012},
date = {2012-05-01},
urldate = {2012-05-01},
booktitle = {PhD seminar at Institute for Security in Information Technology},
address = {TUM Department of Electrical and Computer Engineering - Technical University of Munich},
keywords = {Botnets, Honeypots, Malware},
pubstate = {published},
tppubtype = {conference}
}

Close

Martin Brunner

Paper Presentation: AWESOME - Automated Web Emulation for Secure Operation of a Malware-Analysis Environment Talk

Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2012),, Rome, Italy, 2012.

BibTeX | Schlagwörter: Botnets, Honeypots, Malware

@conference{Brunner2012a,
title = {Paper Presentation: AWESOME - Automated Web Emulation for Secure Operation of a Malware-Analysis Environment},
author = {Martin Brunner},
year = {2012},
date = {2012-01-01},
urldate = {2012-01-01},
booktitle = {Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2012),},
address = {Rome, Italy},
keywords = {Botnets, Honeypots, Malware},
pubstate = {published},
tppubtype = {conference}
}

Close

Martin Brunner

Integrated Honeypot Based Malware Collection and Analysis Works for Qualification

Fern Universität in Hagen, Faculty for Mathematics and Computer Science, 2012, (part-time via sideline additional postgraduate studies).

BibTeX | Schlagwörter: Botnets, Honeypots, Malware | Links:

@mastersthesis{Brunner2012b,
title = {Integrated Honeypot Based Malware Collection and Analysis},
author = {Martin Brunner},
url = {http://publica.fraunhofer.de/documents/N-213871.html},
year = {2012},
date = {2012-01-01},
urldate = {2012-01-01},
address = {Faculty for Mathematics and Computer Science},
school = {Fern Universität in Hagen},
note = {part-time via sideline additional postgraduate studies},
keywords = {Botnets, Honeypots, Malware},
pubstate = {published},
tppubtype = {mastersthesis}
}

Close

2011

Martin Brunner

Integrated Honeypot Based Malware Collection and Analysis Talk

Third International Workshop on Early Warning Systems in IT, Vienna, 2011.

BibTeX | Schlagwörter: Botnets, Honeypots, Malware

@conference{Brunner2011,
title = {Integrated Honeypot Based Malware Collection and Analysis},
author = {Martin Brunner},
year = {2011},
date = {2011-11-01},
urldate = {2011-11-01},
booktitle = {Third International Workshop on Early Warning Systems in IT},
address = {Vienna},
keywords = {Botnets, Honeypots, Malware},
pubstate = {published},
tppubtype = {conference}
}

Close

Krista Grothoff; Martin Brunner; Hans Hofinger; Christopher Roblee; Claudia Eckert

Problems in Web-Based OpenSource Information Processingfor IT Early Warning Conference PaperPeer-reviewed

In: Web Intelligence for Information Security Workshop 2011, Lawrence Livermore National Lab.(LLNL) Lawrence Livermore National Lab.(LLNL), Lawrence Livermore National Lab.(LLNL), Livermore, CA (United States), 2011.

BibTeX | Schlagwörter: Early Warning Systems | Links:

@inproceedings{grothoff2011problems,
title = {Problems in Web-Based OpenSource Information Processingfor IT Early Warning},
author = {Krista Grothoff and Martin Brunner and Hans Hofinger and Christopher Roblee and Claudia Eckert},
url = {https://www.osti.gov/servlets/purl/1117942/},
year = {2011},
date = {2011-04-01},
urldate = {2011-04-01},
booktitle = {Web Intelligence for Information Security Workshop 2011},
volume = {No. LLNL-CONF-480340},
publisher = {Lawrence Livermore National Lab.(LLNL)},
address = {Lawrence Livermore National Lab.(LLNL), Livermore, CA (United States)},
organization = {Lawrence Livermore National Lab.(LLNL)},
keywords = {Early Warning Systems},
pubstate = {published},
tppubtype = {inproceedings}
}

Close

Martin Brunner; Peter Schoo; Hans Hofinger; Christopher Roblee; Sascha Todt

Forschungsansätze zur Effizienzsteigerung heutiger IT-Frühwarnsysteme Journal ArticlePeer-reviewedArticle

In: Datenschutz und Datensicherheit - DuD, vol. 35, iss. 4, pp. 253-257, 2011, ISSN: 1614-0702, (10.1007/s11623-011-0062-6).

Abstract | BibTeX | Schlagwörter: Early Warning Systems | Links:

@article{springerlink:10.1007/s11623-011-0062-6,
title = {Forschungsansätze zur Effizienzsteigerung heutiger IT-Frühwarnsysteme},
author = {Martin Brunner and Peter Schoo and Hans Hofinger and Christopher Roblee and Sascha Todt},
url = {http://dx.doi.org/10.1007/s11623-011-0062-6},
doi = {http://dx.doi.org/10.1007/s11623-011-0062-6},
issn = {1614-0702},
year = {2011},
date = {2011-01-01},
urldate = {2011-01-01},
journal = {Datenschutz und Datensicherheit - DuD},
volume = {35},
issue = {4},
pages = {253-257},
publisher = {SpringerLink},
abstract = {Anstrengungen zur Verbesserung der Sicherheit von vernetzten Systemen
konzentrieren sich auf das Schließen von Sicherheitslücken und die
Identifikation auftretender Schadsoftware (Malware). Malware-Autoren
begegnen diesen Bemühungen mit der Entwicklung neuer oder abgewandelter
Angriffsformen. Um diesbezüglich mithalten und zeitnah reagieren
zu können, ist es notwendig, diese Fortschritte mit Hilfe von IT-Frühwarnsystemen
zu erkennen und zu verfolgen, neue Wirkweisen zu verstehen und die
bestehenden Schutzsysteme um geeignete Gegenmaßnahmen zu erg↭zen.},
note = {10.1007/s11623-011-0062-6},
keywords = {Early Warning Systems},
pubstate = {published},
tppubtype = {article}
}

Close

Anstrengungen zur Verbesserung der Sicherheit von vernetzten Systemen
konzentrieren sich auf das Schließen von Sicherheitslücken und die
Identifikation auftretender Schadsoftware (Malware). Malware-Autoren
begegnen diesen Bemühungen mit der Entwicklung neuer oder abgewandelter
Angriffsformen. Um diesbezüglich mithalten und zeitnah reagieren
zu können, ist es notwendig, diese Fortschritte mit Hilfe von IT-Frühwarnsystemen
zu erkennen und zu verfolgen, neue Wirkweisen zu verstehen und die
bestehenden Schutzsysteme um geeignete Gegenmaßnahmen zu erg↭zen.

Close

2010

Martin Brunner; Hans Hofinger; Christoph Krauß; Christopher Roblee; Peter Schoo; Sascha Todt

Infiltrating critical infrastructures with next-generation attacks: W32.Stuxnet as a showcase threat Whitepaper

2010, ISSN: urn:nbn:de:0011-n-1513303.

BibTeX | Schlagwörter: Botnets, Honeypots, Malware | Links:

@misc{Brunner2010d,
title = {Infiltrating critical infrastructures with next-generation attacks: W32.Stuxnet as a showcase threat},
author = {Martin Brunner and Hans Hofinger and Christoph Krauß and Christopher Roblee and Peter Schoo and Sascha Todt},
url = {https://www.sec.in.tum.de/i20/publications/infiltrating-critical-infrastructures-with-next-generation-attacks-w32-stuxnet-as-a-showcase-threat},
issn = {urn:nbn:de:0011-n-1513303},
year = {2010},
date = {2010-12-01},
urldate = {2010-12-01},
journal = {Fraunhofer SIT, Darmstadt},
keywords = {Botnets, Honeypots, Malware},
pubstate = {published},
tppubtype = {misc}
}

Close

Martin Brunner; Michael Epah; Hans Hofinger; Christopher Roblee; Peter Schoo; Sascha Todt

The Fraunhofer SIT MalwareAnalysis Laboratory - Establishing a Secured, Honeynet-based Cyber Threat Analysis and Research Environment Technical Report

Fraunhofer-Institute for Secure Information Technology SIT Fraunhofer SIT Darmstadt, 2010.

BibTeX | Schlagwörter: Botnets, Honeypots, Linux, Malware, Network Security | Links:

@techreport{Brunner2010,
title = {The Fraunhofer SIT MalwareAnalysis Laboratory - Establishing a Secured, Honeynet-based Cyber Threat Analysis and Research Environment},
author = {Martin Brunner and Michael Epah and Hans Hofinger and Christopher Roblee and Peter Schoo and Sascha Todt},
url = {http://publica.fraunhofer.de/documents/N-141410.html},
year = {2010},
date = {2010-09-01},
urldate = {2010-09-01},
address = {Fraunhofer SIT Darmstadt},
institution = {Fraunhofer-Institute for Secure Information Technology SIT},
keywords = {Botnets, Honeypots, Linux, Malware, Network Security},
pubstate = {published},
tppubtype = {techreport}
}

Close

Martin Brunner; Hans Hofinger; Christopher Roblee; Peter Schoo; Sascha Todt

Anonymity and Privacy in Distributed Early Warning Systems Conference PaperPeer-reviewed

In: 5th International Conference on Critical Information Infrastructures Security (CRITIS 2010), pp. 82–93, Springer, Athens, 2010, (ISBN 978-3-642-21693-0).

Abstract | BibTeX | Schlagwörter: Early Warning Systems | Links:

@inproceedings{Brunner2010b,
title = {Anonymity and Privacy in Distributed Early Warning Systems},
author = {Martin Brunner and Hans Hofinger and Christopher Roblee and Peter Schoo and Sascha Todt},
url = {http://publica.fraunhofer.de/documents/N-180256.html},
year = {2010},
date = {2010-09-01},
urldate = {2010-09-01},
booktitle = {5th International Conference on Critical Information Infrastructures Security (CRITIS 2010)},
volume = {6712},
pages = {82--93},
publisher = {Springer},
address = {Athens},
series = {Lecture Notes in Computer Science},
abstract = {As the Internet continues to emerge as a critical information infrastructure, IT early warning systems (IT-EWS) have taken on greater importance in protecting both its endpoints and the infrastructure itself. Although it is generally accepted that open sharing of cyber data and warnings between the independent (but mutually vulnerable) endpoints promotes broader situational awareness, such openness intro duces new privacy challenges. In this paper, we present a high-level model for security information sharing between autonomous operators on the Internet that enables meaningful collaboration while addressing the enduring privacy and infrastructure needs of those individual collaborators. Our concept for a collaborative and decentralised IT-EWS is based on a novel combination of existing techniques, including peer-to-peer networking and Traceable Anonymous Certificates. We concentrate on the security and confidentiality of the data exchange platform rather than of the data itself, a separate area of research.},
note = {ISBN 978-3-642-21693-0},
keywords = {Early Warning Systems},
pubstate = {published},
tppubtype = {inproceedings}
}

Close

As the Internet continues to emerge as a critical information infrastructure, IT early warning systems (IT-EWS) have taken on greater importance in protecting both its endpoints and the infrastructure itself. Although it is generally accepted that open sharing of cyber data and warnings between the independent (but mutually vulnerable) endpoints promotes broader situational awareness, such openness intro duces new privacy challenges. In this paper, we present a high-level model for security information sharing between autonomous operators on the Internet that enables meaningful collaboration while addressing the enduring privacy and infrastructure needs of those individual collaborators. Our concept for a collaborative and decentralised IT-EWS is based on a novel combination of existing techniques, including peer-to-peer networking and Traceable Anonymous Certificates. We concentrate on the security and confidentiality of the data exchange platform rather than of the data itself, a separate area of research.

Close

Sascha Mühlbach; Martin Brunner; Christopher Roblee; Andreas Koch

MalCoBox: Designing a 10 Gb/s Malware Collection Honeypot Using Reconfigurable Technology Conference PaperPeer-reviewed

In: Field Programmable Logic and Applications (FPL), 2010 International Conference on, pp. 592-595, IEEE Computer Society, Milan, Italy, 2010, ISSN: 1946-1488.

BibTeX | Schlagwörter: Botnets, Honeypots, Malware | Links:

@inproceedings{Muehlbach2010,
title = {MalCoBox: Designing a 10 Gb/s Malware Collection Honeypot Using Reconfigurable Technology},
author = {Sascha Mühlbach and Martin Brunner and Christopher Roblee and Andreas Koch},
url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5694317&isnumber=5694025},
doi = {10.1109/FPL.2010.116},
issn = {1946-1488},
year = {2010},
date = {2010-08-01},
urldate = {2010-08-01},
booktitle = {Field Programmable Logic and Applications (FPL), 2010 International Conference on},
journal = {International Conference on Field Programmable Logic and Applications},
pages = {592-595},
publisher = {IEEE Computer Society},
address = {Milan, Italy},
keywords = {Botnets, Honeypots, Malware},
pubstate = {published},
tppubtype = {inproceedings}
}

Close

Martin Brunner

Aktuelle F&E Arbeiten im Fraunhofer SIT Malware Lab Talk

Linz, 2010.

BibTeX | Schlagwörter: Botnets, Honeypots, Malware

@conference{Brunner2010c,
title = {Aktuelle F&E Arbeiten im Fraunhofer SIT Malware Lab},
author = {Martin Brunner},
year = {2010},
date = {2010-01-01},
urldate = {2010-01-01},
address = {Linz},
edition = {2nd Expert Workshop on IT Early Warning Systems},
keywords = {Botnets, Honeypots, Malware},
pubstate = {published},
tppubtype = {conference}
}

Close

Jonas Pfoh; Martin Brunner

Packet Inspection Block Praktikum - Chair of IT Security - Department of Informatics - Technical University of Munich Lecture / Teaching

2010.

BibTeX | Schlagwörter: Botnets, BSD, Honeypots, Linux, Malware, Offensive Security

@misc{PacketInspection-TUM-SS2010,
title = {Packet Inspection Block Praktikum - Chair of IT Security - Department of Informatics - Technical University of Munich},
author = {Jonas Pfoh and Martin Brunner},
year = {2010},
date = {2010-01-01},
urldate = {2010-01-01},
keywords = {Botnets, BSD, Honeypots, Linux, Malware, Offensive Security},
pubstate = {published},
tppubtype = {misc}
}

Close

2007

Martin Brunner

IT early warning systems – State-of-the-art and promising approaches to increase resilience of critical infrastructures Technical Report

Fraunhofer-Institute for Secure Information Technology - SIT Department Secure Processes and Infrastructures - SPI, Schloss Birlinghoven, 53754 Sankt Augustin, Germany, 2007.

BibTeX | Schlagwörter: Botnets, Early Warning Systems, Honeypots, Malware | Links:

@techreport{Brunner2007,
title = {IT early warning systems – State-of-the-art and promising approaches to increase resilience of critical infrastructures},
author = {Martin Brunner},
url = {http://publica.fraunhofer.de/documents/N-94782.html},
year = {2007},
date = {2007-01-01},
urldate = {2007-01-01},
address = {Department Secure Processes and Infrastructures - SPI, Schloss Birlinghoven, 53754 Sankt Augustin, Germany},
institution = {Fraunhofer-Institute for Secure Information Technology - SIT},
keywords = {Botnets, Early Warning Systems, Honeypots, Malware},
pubstate = {published},
tppubtype = {techreport}
}

Close

2006

Alex Bihlmaier; Martin Brunner; Clemens Pflüger

Hacking Talk

Live Hacking Workshop, Informatik Tag Fraunhofer IZB, Fraunhofer-Institut für Sichere Informationstechnologie Schloss Birlinghoven 53754 Sankt Augustin, 2006.

BibTeX | Schlagwörter: Linux, Malware, Network Security, Offensive Security

@conference{Bihlmaier2006,
title = {Hacking},
author = {Alex Bihlmaier and Martin Brunner and Clemens Pflüger},
year = {2006},
date = {2006-01-01},
urldate = {2006-01-01},
booktitle = {Live Hacking Workshop, Informatik Tag Fraunhofer IZB},
address = {Fraunhofer-Institut für Sichere Informationstechnologie Schloss Birlinghoven 53754 Sankt Augustin},
keywords = {Linux, Malware, Network Security, Offensive Security},
pubstate = {published},
tppubtype = {conference}
}

Close

Martin Brunner

Remote DoS-Angriff auf den TCP/IP-Stack von OpenBSD Works for Qualification

2006, ((available in german only)).

BibTeX | Schlagwörter: BSD, Network Security, Offensive Security, Pentesting

@bachelorsthesis{Brunner2006,
title = {Remote DoS-Angriff auf den TCP/IP-Stack von OpenBSD},
author = {Martin Brunner},
year = {2006},
date = {2006-01-01},
urldate = {2006-01-01},
address = {Bachelor’s degree programme Secure Information Systems},
school = {Upper Austria University of Applied Sciences Hagenberg},
note = {(available in german only)},
keywords = {BSD, Network Security, Offensive Security, Pentesting},
pubstate = {published},
tppubtype = {bachelorsthesis}
}

Close

Martin Brunner

Konzeption und Aufbau eines Honeynet am Fraunhofer-Institut SIT Works for Qualification

2006.

BibTeX | Schlagwörter: Botnets, BSD, Honeypots, Linux, Malware, Network Security

@bachelorsthesis{Brunner2006a,
title = {Konzeption und Aufbau eines Honeynet am Fraunhofer-Institut SIT},
author = {Martin Brunner},
year = {2006},
date = {2006-01-01},
urldate = {2006-01-01},
address = {Bachelor’s degree programme Secure Information Systems},
school = {Upper Austria University of Applied Sciences Hagenberg},
keywords = {Botnets, BSD, Honeypots, Linux, Malware, Network Security},
pubstate = {published},
tppubtype = {bachelorsthesis}
}

Close

Martin Brunner; Stefan Streichsbier

Das Server-Tagebuch Teil 3 - Nice To Have Article

In: Hagenberger Kreis - Magazin zur Förderung der digitalen Sicherheit, 2006.

BibTeX | Schlagwörter: Linux, Network Security

@article{Brunner2006b,
title = {Das Server-Tagebuch Teil 3 - Nice To Have},
author = {Martin Brunner and Stefan Streichsbier},
year = {2006},
date = {2006-01-01},
urldate = {2006-01-01},
journal = {Hagenberger Kreis - Magazin zur Förderung der digitalen Sicherheit},
keywords = {Linux, Network Security},
pubstate = {published},
tppubtype = {article}
}

Close

2005

Martin Brunner; Stefan Streichsbier

Das Server-Tagebuch Teil 1 - Must Have Article

In: Hagenberger Kreis - Magazin zur Förderung der digitalen Sicherheit,, 2005.

BibTeX | Schlagwörter: Linux, Network Security

@article{MartinBrunner2005,
title = {Das Server-Tagebuch Teil 1 - Must Have},
author = {Martin Brunner and Stefan Streichsbier},
year = {2005},
date = {2005-01-01},
urldate = {2005-01-01},
journal = {Hagenberger Kreis - Magazin zur Förderung der digitalen Sicherheit,},
keywords = {Linux, Network Security},
pubstate = {published},
tppubtype = {article}
}

Close

Martin Brunner; Stefan Streichsbier

Das Server-Tagebuch Teil 2 - Services Article

In: Hagenberger Kreis - Magazin zur Förderung der digitalen Sicherheit, 2005.

BibTeX | Schlagwörter: Linux, Network Security

@article{Brunner2005,
title = {Das Server-Tagebuch Teil 2 - Services},
author = {Martin Brunner and Stefan Streichsbier},
year = {2005},
date = {2005-01-01},
urldate = {2005-01-01},
journal = {Hagenberger Kreis - Magazin zur Förderung der digitalen Sicherheit},
keywords = {Linux, Network Security},
pubstate = {published},
tppubtype = {article}
}

Close

Downloads

CV

Download my CV as PDF file

CV
PDF

Press Kit

Download bio as PDF file

Press Kit
PDF

Contact

Get in touch

© Martin Brunner
  • Imprint
  • Privacy Policy
This website does not use any cookies to track you or contain any other hassle (Privacy Policy)
Awesome!
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
immer aktiv
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SPEICHERN & AKZEPTIEREN