Papers "Do not speak - unless it improves on silence." - Buddha

  • Raffael Marty, "Cloud Application Logging for Forensics", SAC'11 March 21-25, 2011, TaiChung, Taiwan, ACM 978-1-4503-0113-8/11/03.
  • Kara Nance, Raffael Marty, "Visualizing the Insider Threat", HICSS 2011.
  • Challenge 5 of the Forensic Challenge 2010 - Log Mysteries, May 2010.
  • DAVIX gegen Goliath, Jan P. Monsch/Raffael Marty/Christoph Puppe, iX special Herbst 2008 Sicher im Netz
  • Security Visualization - Learning From The New York Times, a video produced for Source Boston 2008.
  • My GCIA paper. This paper shows how I analyzed a dataset given by SANS. I used graphing techinques, GraphViz and other tools, to automatically generate visual images of the dataset. I was a bit too enthousiastic and wrote way too much. The additional chapters are therefore published here.
  • I was one of the co-authors of Design of an Intrusion-Tolerant Intrusion Detection System, a long-term research project funded by the European Union under the Information Society Fifth Framework Programme.
  • NIST 800-41, contributed to the Guidelines on Firewalls, and Firewall Policy.
  • NIST 800-92, contributed to the Guide to Computer Security Log Management
  • Thor: A Tool to Test Intrusion Detection Systems by Variations of Attacks.
  • My second term project I was working on was to improve an anonymity network by adding so called mixes. Read more on the Mixer page.
  • My first term project I wrote at the Institute of Robotics at the ETH. My task was to develop a device driver for a PCMCIA Adapter and on top of that I had to implement the FAT-Filesystem in order to access ATA-compatible drives. Check out the special page to find out more.
  • During a seminar that I attended while studying computer science, I worked together with Robert Hass on the topic: "IP over Everything". It's about the network layers IP works on, with a strong emphasis on the core-network technologies. Further we present a couple of services which use IP and what functionalities these services will demand from IP. In the services chapter I wrote a paragraph about security in the near future and what criterias the IP protocol will have to fullfill. Further there is another interesting chapter about VPNs. The presentation is available online as well.