Felix Freiling

Prof. Dr.-Ing. Felix Freiling

Chairholder

Department of Computer Science
Chair of Computer Science 1 (IT Security Infrastructures)

Room: Room 12.159
Martensstr. 3
91058 Erlangen

Office hours

Each week Th, 16:00 - 17:00, Room 12.159, während der Vorlesungszeit - Termin vorher mit dem Sekretariat Tel. +49 9131 85-69900 vereinbaren

 

I am a professor of computer science at Friedrich-Alexander-Universität Erlangen-Nürnberg. In my prior life my research focus for a long time was on fault-tolerant distributed algorithms. Today I focus on computer security and forensic computing. Since I work in the area of applied computer security I am constantly trying to cover my traces: From 2002 to 2010 I worked at five different universities under two different names.

I don’t have any account in social media, so any account with my name is probably somebody else’s.

For my publications, see the page on Publications of the lab, my entry at DBLP, or other sources. For a selection of funded projects of the lab, see the page on Funded Projects of the lab.

I support The Cost of Knowledge and currently refrain from reviewing and editorial services to Elsevier.

My ORCID is 0000-0002-8279-8401.

Announcements

My Sprechstunde during winter semester 2024/25 is Thursdays 16:00 and 17:00. Please indicate in advance to Christine Stief if you plan to come.

Official Short Biography

Felix Freiling is full professor of Computer Science at Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU) in Germany. His main research focus is on forensic computing, meaning the application of methods from computer science to answer questions of the legal system. He has published numerous papers on the methodological foundations of the field, including acquisition processes of digital evidence, tool support for analysis of digital evidence, and technical aspects of legal admissability. He is one of the founders of the first German professional Bachelors and Masters degree programmes focussing on digital forensics and has trained several generations of expert witnesses therein. He is also the spokesperson of the Research Training Group “Cybercrime and Forensic Computing” funded by Deutsche Forschungsgemeinschaft.

Felix Freiling’s Email Policy

On December 18, 2008 the number of unanswered messages in my email inbox surpassed 1000. I surrender! On christmas day 2008 I decided to change my email handling policy: In the future, I will treat emails more like I treat telephone calls. I will fix a time interval d and after d time I will completely remove all unanswered email from my inbox that is older than d. This means I will most probably not respond anymore to emails that have not been answered in d time. Currently d is one year, but it may be adjusted. I apologize for any inconvenience this may cause, but I am now convinced that I cannot continue to treat email the same as I treat postal mail. If you need a definitive response from me within a certain time, it is probably more reliable to send a letter by postal mail.

Update in April 2009: d is now 6 months.

Update in July 2009: d is now 2 months.

Update in December 2010: d is now 3 weeks.

Update in January 2012: d is now 1 week

Update in December 2013: d is now 4 days.

Update in December 2014: d is now 2 days.

Update in September 2017: d is now 3 days.

Update in February 2023: d is now 2 days.

Update: Andreas Butz of LMU has a similar email policy.

Exams

Students planning an oral examination have the chance to visit such an exam as an observer (Hospitation) beforehand under the condition that they do not disturb the exam and the examined student agrees.

Internship and Employment Opportunities

My lab infrequently offers internships and short or long term employment to interested and well-qualified candidates. I however only reply to normal postal mail or (sometimes) to email which has been sent individually to me. In case you wish to communicate via email and are looking for an internship, please include the code word “ref: nightingale” in the subject of your mail to prove that you prepared an individual email.

Professional activities

  • Symposium on Reliable Distributed Systems (SRDS 2002), Osaka, Japan, PC Member
  • International Conference on Parallel and Distributed Systems (ICPADS 2002), Taiwan, PC Member
  • Workshop on Resource Sharing in Massively Distributed Systems (RESH 2002), PC Member
  • DISC 2004: The 18th Annual Conference on Distributed Computing, PC member
  • Euro-Par 2005, Vice Chair of Topic 8: Distributed Systems and Algorithms
  • 2nd Workshop on Sensor Networks at INFORMATIK 2005, PC member
  • Sicherheit in komplexen, vernetzten Umgebungen, PC member
  • Seventh International Symposium on Self Stabilizing Systems (SSS 2005), PC member
  • First International Workshop on Distributed Algorithms and Applications for Wireless and Mobile Systems (DAAWMS 2005), PC member
  • Workshop on Dependability and Fault Tolerance at ARCS 2006, PC member
  • First International Conference on Availability, Reliability and Security (ARES 2006), PC member
  • Sicherheit – Schutz und Zuverlässigkeit (Sicherheit 2006), member of organizing committee and PC member
  • 8th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2006), Dallas, PC Member
  • 25th IEEE International Symposium on Reliable Distributed Systems (SRDS 2006), PC Member
  • Sixth European Dependable Computing Conference (EDCC-6), Student Forum PC member
  • 1st International Workshop on Advances in Sensor Networks, PC member
  • Workshop Verlässlichkeit und Fehlertoleranz im Rahmen der ARCS 2007, Zürich, Schweiz, March 12, 2007, PC Member
  • Testing of Software – From Research to Practice Workshop at Software Engineering 2007, PC Member
  • Workshop on Foundations of Fault-Tolerant Distributed Computing (FOFDC 2007), PC member
  • Fourth GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2007), PC member
  • The First International Workshop on Spoofing, Digital Forensics and Open Source Tools (SDFOST 2007), PC member
  • International Conference on Distributed Computing Systems (ICDCS 2007), Dependability and Fault-Tolerance Area, PC member
  • International Conference on Distributed Event-Based Systems (DEBS 2007), PC member
  • 9th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2007), PC member
  • First International Workshop on Reliability, Availability, and Security (WRAS 2007), PC member
  • Sicherheit – Schutz und Zuverlässigkeit (Sicherheit 2008), member of organizing committee and PC member
  • 2nd Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS 2008), PC member
  • 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems, PC member
  • 12th Internationnal Conference On Principles Of DIstributed Systems (OPODIS 2008), PC member.
  • iNetSec 2009. Open Research Problems in Network Security Workshop, PC member.
  • 5th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2009), PC member.
  • Digitale Multimedia-Forensik: Techniken und Anwendungsgebiete, Workshop at INFORMATIK 2009, PC member.
  • IMF 2009 – 5th International Conference on IT Security Incident Management & IT Forensics, PC member.
  • The 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2009), Fault-tolerance in distributed systems track and stabilization track, PC member.
  • Sixth European Conference on Computer Network Defense (EC2ND 2010), Berlin, PC member.
  • Sicherheit, Schutz und Zuverlässigkeit (SICHERHEIT 2010), Berlin, PC Chair.
  • The First International Workshop on Dynamic Aspects in Dependability Models for Fault-Tolerant Systems (DYADEM-FTS 2010), Valencia, Spain, PC member.
  • 3rd ACM International Workshop on Reliability, Availability, and Security (WRAS 2010), Zurich, Switzerland, PC member
  • 7th Workshop on Dependability and Fault Tolerance at ARCS 2011, Como, Italy, 2011, PC member
  • International Workshop on Security Issues for Future Internet Social Networks and Devices: connecting Digital World with Social & Real Life (FISN 2011), Crete, Greece, PC member
  • 2nd International Workshop on Logical Aspects of Fault-Tolerance (LAFT 2011), Toronto, Canada, PC member
  • 6th International Conference on IT Incident Management and IT Forensics (IMF 2011), Stuttgart, Germany, PC member
  • 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, PC member
  • 3rd International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2011), Dublin, Ireland, PC member
  • 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2011), Genoble, France, Security Track, PC member
  • The Seventh European Conference on Computer Network Defense (EC2ND) 2011, Gothenburg, Sweden, PC member
  • Sicherheit – Schutz und Zuverlässigkeit (SICHERHEIT 2012), Darmstadt, Germany, PC member and member of organizing committee
  • The Eigth European Conference on Computer Network Defense (EC2ND) 2012, Bristol, UK, PC member
  • The 26th International Symposium on Distributed Computing (DISC 2012), Salvador, Brazil, PC member
  • The 4th International ICST Conference on Security and Privacy in Mobile Information and Communication Szstems (MobiSec 2012), Frankfurt, Germany, PC member
  • The 14th International Symposium on Stabilization, Safety and Security of Distributed Systems (SSS 2012), Toronto, Cloud Computing Track, PC member, and Safety and Security track, Track Chair
  • The 2nd International Workshop on Trustworthy Embedded Devices (TrustED 2012), San Franscisco, PC member
  • The 2012 ADFSL Conference on Digital Forensics, Security and Law, Richmond, VA, USA, PC member
  • First  International  Baltic Conference on Network Security  & Forensics  (NeSeFo  2012), Tartu, Estonia, PC member
  • 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2012), Heraklion, Greece, PC member
  • The 15th Information Security Conference (ISC 2012), Passau, Germany, PC Co-Chair
  • The 7th International Conference on IT Incident Management and IT Forensics (IMF 2013), Nürnberg, Germany, General Chair and PC member
  • The International Conference on Privacy and Security in Mobile Systems (PRISMS) 2013, Atlantic City, USA, PC member
  • Risikokommunikation im Kontext von IT-Sicherheit (RiskKom), Workshop at INFORMATIK 2013, Koblenz, PC member
  • D.A.CH Security 2013, Nürnberg, Germany, PC member
  • First International Workshop on Emerging Cyberthreats and Countermeasures (ECTCM), Workshop at ARES 2013, Regensburg, Germany, PC member
  • The 5th International Conference on Digital Forensics and Cybercrime (ICDF2C 2013), Moskow, PC member
  • Sicherheit: Schutz und Zuverlässigkeit (SICHERHEIT 2014), Vienna, Austria, PC member
  • The 8th International Conference on IT Security Incident Management & IT Forensics (IMF 2014), Münster, Germany, PC co-chair
  • Digital Forensics Research Conference EU (DFRWS EU 2014), Amsterdam, Netherlands, PC member
  • The 16th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2014), Paderborn, Germany, PC member
  • 12th International Conference on Wirtschaftsinformatik 2015 (WI 2015), Track “Datenschutz und Sicherheit”, Münster, Germany, PC member
  • Digital Forensics Research Conference EU (DFRWS EU 2015), Dublin, Ireland, PC co-chair
  • 30th IFIP TC-11 SEC 2015 International Information Security and Privacy Conference, Hamburg, Germany, PC member
  • Studierendenkonferenz Informatik 2015 (SKILL 2015), Cottbus, Germany, PC member
  • 12th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2015), Milano, Italy, PC member
  • 20th European Symposium on Research in Computer Security (ESORICS 2015), Vienna, Austria, PC member
  • IFIP WG 11.4 Workshop – iNetSec 2015 – Open Research Problems in Network Security, Zurich, Switzerland, PC member
  • Digital Forensics Research Conference (Europe) 2016 (DFRWS EU), Lausanne, Switzerland, PC member
  • Multikonferenz Wirtschaftsinformatik 2016 (MKWI 2016), Ilmenau, Germany, PC member
  • Sicherheit: Schutz und Zuverlässigkeit (SICHERHEIT 2016), Bonn, Germany, PC member
  • Digital Forensic Research Conference (Europe) 2017 (DFRWS EU 2017) and 10th International Conference on IT Security Incident Management & IT Forensics (IMF 2017), Lake Constance, Germany, Conference Chair and PC member
  • Sicherheit und Zuverlässigkeit für automobile Informationstechnik (Automotive 2017), Stuttgart, Germany, PC member
  • 2nd International Workshop on Online Safety, Trust and Fraud Prevention (ONST17), Aberdeen, UK, PC member
  • International Symposium on Cyber Security, Cryptography and Machine Learning (CSCML 2017), Be’er Sheva, Israel, PC member
  • Digital Forensic Research Conference (Europe) 2018 (DFRWS EU 2018), Florence, Italy, PC member
  • Sicherheit: Schutz und Zuverlässigkeit (SICHERHEIT 2018) und SICHERHEIT 2018 Doktorandenforum, Konstanz, Germany, PC member
  • 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), forensics and analytics track, New York, USA, PC member
  • OSFC 2018: Open Source Firmware Conference, Erlangen, Germany, Conference Chair
  • 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (SEC 2018), Poznań, Poland, PC member
  • 11th International Conference on IT Security Incident Management & IT Forensics (IMF 2018), Hamburg, Germany, PC member
  • Studierendenkonferenz Informatik (SKILL 2018), Berlin, Germany, PC member
  • IEEE TrustCom 2019 (The 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications), Privacy Track, Rotura, New Zealand, PC member
  • Digital Forensic Research Conference (Europe) 2019 (DFRWS EU 2019), Oslo, Norway, PC member
  • SICHERHEIT 2020 (Sicherheit – Schutz und Zuverlässigkeit 2020), Göttingen, Germany, PC member
  • Digital Forensic Research Conference (Europe) 2020 (DFRWS EU 2020), cyberspace, PC member
  • Systematic Approaches to Digital Forensic Engineering 2020 (SADFE 2020), City University of New York, USA, PC member
  • DFRWS APAC 2020, Sydney, Australia, PC member
  • Systematic Approaches to Digital Forensic Engineering 2021 (SADFE 2021), cyberspace, PC member
  • Digital Forensics Research Conference (Europe) 2021 (DFRWS EU 2021), cyberspace, PC member
  • Digital Forensics Research Conference (Europe) 2022 (DFRWS EU 2022), Oxford, UK, Conference Co-Chair and PC member
  • 6th International Symposium on Cyber Security Cryptology and Machine Learning (CSCML 2022), Be’er Sheva, Israel, PC member
  • Sicherheit, Schutz und Zuverlässigkeit (GI Sicherheit 2022), Karlsruhe, Germany, PC member
  • GI Sicherheit 2022 Doktorandenforum, Karlsruhe, Germany, PC member
  • DFRWS APAC 2022, Adelaide, Australia, PC member
  • Digital Forensics Research Conference (Europe) 2023 (DFRWS EU 2023), Bonn, Germany, PC member
  • DFRWS APAC 2023, Singapore and Hong Kong, PC member
  • Sicherheit, Schutz und Zuverlässigkeit (GI Sicherheit 2024), Worms, Germany, PC member
  • GI Sicherheit 2024 Promovierendenforum, Worms, Germany, Co-Chair
  • Digital Forensics Research Conference (Europe) 2024 (DFRWS EU 2024), Zaragoza, Spain, PC member
  • 13th International Conference on IT Incient Management & IT Forensics (IMF 2024), Saarbrücken, Germanz, PC member
  • Digital Forensics Research Conference (Asia/Pacific) 2024 (DFRWS APAC 2024), Brisbane, Australia, PC member
  • Digital Forensics Research Conference (Europe) 2025 (DFRWS EU 2025), Brno, Czech Republic, Conference Co-Chair and PC member

Academic Administration/Politics/Honorary Positions

  • 2004-2008: Vorstandsmitglied im GI Beirat der Universitätsprofessoren (GIBU)
  • 2006: Member of the expert commission to evaluate the online voting system for the DFG
  • Sommersemester 2006: Direktor des Instituts für Informatik der Universität Mannheim
  • May 2007-September 2009: Direktor des Instituts für Informatik der Universität Mannheim
  • October 2007: Advisor of the German constitutional court (Bundesverfassungsgericht) in the public hearing on “Online Durchsuchungen”
  • Sommersemester 2008: Prodekan der Fakultät für Mathematik und Informatik der Universität Mannheim
  • Herbstsemester 2008-November 2010: Dekan der Fakultät für Mathematik und Informatik der Universität Mannheim
  • 2008-2018: Organisator des Workshops “Forensik und Internetkriminalität” des Darmstadtädter CAST-Vereins (gemeinsam mit Harald Baier).
  • June 2009: Advisor of the German constitutional court (Bundesverfassungsgericht) in the case on “Vorratsdatenspeicherung”
  • May 2011-April 2016: Mitglied des Senats- und Bewilligungsausschusses für die Graduiertenkollegs der DFG
  • since July 2011: Mitglied der Masterzulassungskommission der Technischen Fakultät der FAU, seit Oktober 2013 Kommissionsvorsitzender
  • since October 2011: Mitglied der Studienkommission des Department Informatik der FAU
  • since July 2012: Vertreter der FAU im Fakultätentag Informatik
  • since November 2012: Mitglied im wissenschaftlichen Beirat der Firma RedTeam Pentesting GmbH, Aachen
  • 2013/2014: Vorsitzender der Jury des 5. Deutschen IT-Sicherheitspreises der Horst Görtz-Stiftung
  • since May 2014: member of the Steering Committee of the International Conference on IT Security Incident Management & IT Forensics (IMF)
  • September 2014-June 2020: Mitglied im Aufsichtsrat der Cryptotec AG, Köln
  • October 2014-October 2015: Studiendekan 3 der Technischen Fakultät der FAU
  • since 2015: Mitglied des Nominierungsausschusses für den Dissertationspreis der Gesellschaft für Informatik e.V.
  • July 2015: Advisor of the German constitutional court (Bundesverfassungsgericht) in the case on “BKAG”
  • October 2015-September 2019, and since October 2021: gewähltes Mitglied im Fakultätsrat der Technischen Fakultät der FAU
  • 2015/2016: Vorsitzender der Jury des 6. Deutschen IT-Sicherheitspreises der Horst Görtz-Stiftung
  • since April 2016: gewähltes Mitglied des Fachkollegiums Informatik der DFG, von Oktober 2020 bis Juni 2023 dessen stellvertretender Sprecher
  • since August 2017: Mitglied im Steuerkreis im BayWISS Verbundkollegs Digitalisierung (BWD) als Vertreter der FAU
  • November 2017-September 2019: Sprecher der kollegialen Leitung des Department Informatik der Technischen Fakultät der FAU
  • 2017/2018: Vorsitzender der Jury des 7. Deutschen IT-Sicherheitspreises der Horst Görtz-Stiftung
  • since 1/2018: Mitglied im Vorstand des Fakultätentags Informatik
  • seit Juli 2018: Mitglied im Direktorium des Bavarian Research Institute for Digital Transformation an der Bayerischen Akademie der Wissenschaften.
  • March 2019- July 2022: member of the Scientific Advisory Board of the Research Field “Information” at Karlsruhe Institute of Technology (KIT).
  • since 9/2019: member of the Advisory Board of National Research Center for Applied Cybersecurity (ATHENE, formerly CRISP).
  • 9/2021-7/2026: Mitglied im Expert:innenbeirat der Nachwuchsforschungsgruppe “DiSoJu – Digitale Souveränität Jugendlicher” von Dr. Jane Müller, FAU.

Research Interests

applied computer security, software security, forensic computing, cybercrime

Reviewed PhD and Habilitation Theses

If my name is given as 1st reviewer, I usually also was the student’s advisor. In other cases the advisor if explicitly credited.  (in Germany

  • Matthias Meixner: HADES – Eine hochverfügbare Main-Memory Datenbank für eventbasierte Systeme. (PhD thesis, 2nd reviewer, 1st reviewer: Prof. Alejandro Buchmann). Defended December 17, 2004, TU Darmstadt.
  • Martin Hutle: Failure Detection in Sparse Networks. (PhD thesis, 2nd reviewer, 1st reviewer: Prof. Ulrich Schmid). Defended October 4, 2005, TU Wien.
  • Erik-Oliver Blaß: Sicherer, aggregierender Datentransport in drahtlosen Sensornetzen. (PhD thesis, 2nd reviewer, 1st reviewer: Prof. Dr. Martina Zitterbart). Defended April 20, 2007, University of Karlsruhe.
  • Dr. Guido Schryen: An analysis of anti-spam measures and the conceptual design of a technological and organizational infrastructure framework for tackling spam e-mails. Habilitation thesis, RWTH Aachen, 2007.
  • Lucia Draque Penso: Distributed Protocols Robust Against Malicious Attacks. (PhD defense committee member with Prof. Maurice Herlihy and Prof. Anna Lysyanskaya). Defended January 30, 2008. Brown University, Providence, RI, USA.
  • Mohammad Torabi Dashti: Keeping Fairness Alive. (PhD defense committee member, advisor was Prof. Wan Fokkink). Defended Februrary 27, 2008. Vrije Universiteit Amsterdam.
  • Wei Zhou: Access Control Model and Policies for Collaborative Environments. (PhD thesis, external reviewer, first reviewer: Prof. Christoph Meinel.) Defended April 27, 2009, Hasso Plattner Institute (HPI), Potsdam.
  • Ionannis Krontiris: Intrusion Prevention and Detection in Wireless Sensor Networks. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Tassos Dimitriou, AIT, Greece). Defended November 13, 2008. University of Mannheim.
  • Zinaida Benenson: Access Control in Wireless Sensor Networks. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Adrian Perrig, CMU). Defended Dec. 19, 2008. University of Mannheim.
  • Oliver Steffen Weiß: A model to quantitavely assess the security of organizations. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Dr. K. Meyer-Wegener, Univ. Erlangen). Defended Feb 20, 2009. Univ. Erlangen.
  • Thorsten Holz: Tracking and Mitigation of Malicious Remote Control Networks. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Christopher Kruegel, UCSB). Defended April 30, 2009. University of Mannheim.
  •  Frank Werner: Applied Formal Methods in Wireless Sensor Networks. (2nd reviewer, 1st reviewer Prof. Dr. P. H. Schmitt, Univ. of Karlsruhe). Defended July 22, 2009. Univ. of Karlsruhe.
  • Timo Warns: Structural Failure Models for Fault-Tolerant Distributed Computing. (PhD thesis, 3rd reviewer, 1st and 2nd reviewers Prof. Dr. Oliver Theel, University of Oldenburg, Prof. Dr. Willi Hasselbring, University of Kiel). Defended Sept, 28, 2009. University of Oldenburg.
  • Michael Becher: Security of Smartphones at the Dawn of Their Ubiquitousness. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Dr. Ulrike Meyer, RWTH Aachen). Defended October 9, 2009. University of Mannheim.
  • Martin Mink: Vergleich von Lehransätzen für die Ausbildung in IT-Sicherheit. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Dr. Simone Fischer-Hübner, Karlstad University, Sweden). Defended Dec 11, 2009. University of Mannheim.
  • Moritz Martens: Properties of Interaction Systems. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Dr. Mila Majster-Cederbaum, University of Mannheim). Defended Dec 18, 2009. University of Mannheim.
  • Roberto Cortinas: Failure Detectors and Communication Efficiency in the Crash and General Omission Failure Models. (Member of PhD defense committee, advisors: Prof. Alberto Laufente, Prof. Iratxe Soraluze, University of the Basque Country, San Sebastian, Spain) Defended April 4, 2011. University of the Basque Country, San Sebastian, Spain.
  • Jan Gerrit Göbel: Large-Scale Detection and Measurement of Malicious Content. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Christopher Krügel, UCSB) Defended April 27, 2011. University of Mannheim.
  • Michael Müter: Embedded Security Concepts for In-Verhicle Systems. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Frank Kargl, University of Twente) Defended May 27, 2011. University of Mannheim.
  • Tobias Limmer: Efficient Network Monitoring for Attack Detection. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Falko Dressler, University of Innsbruck, Austria) Defended June 20, 2011. University of Erlangen.
  • Philipp Trinius: Musterbasiertes Filtern von Schadprogrammen und Spam. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Guido Schryen, University of Regensburg) Defended October 21, 2011. University of Mannheim.
  • Sebastian Schinzel: Unintentional and hidden information leaks in networked software applications. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Jörg Schwenk, Ruhr-University Bochum) Defended April 23, 2012. University of Erlangen.
  • Amir Alsbih: Technische Sicherheitsaspekte bei Kabelnetzbetreibern. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Christian Schindelhauer, University of Freiburg) Defended May 8, 2012. University of Freiburg.
  • Juliane Blechinger: Ein Metadatenrepositorium zum Datenqualitätsmonitoring im Concurrent Engineering. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Richard Lenz, University of Erlangen) Defended July 6, 2012. University of Erlangen.
  • Zhang Fu: Multifaceted Defense Against Distributed Denial of Service Attacks: Prevention, Detection, Mitigation. (PhD thesis, faculty opponent, advisors Marina Papatriantafilou and Philippas Tsigas, Chalmers University of Technology) Defended September 19, 2012. Chalmers University of Technology, Sweden.
  • Andreas Dewald: Formalisierung digitaler Spuren und ihre Einbettung in die forensische Informatik. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Guido Schryen, University of Regensburg) Defended  November 12, 2012. University of Erlangen.
  • Michael Spreitzenbarth: Dissecting the Droid: Forensic Analysis of Android and its Malicious Applications. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Michael Meier, University of Bonn) Defended March 11, 2013. University of Erlangen.
  • Christian Jörn Dietrich: Identification and Recognition of Remote-Controlled Malware. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Christopher Krügel, UCSB) Defended March 28, 2013. University of Mannheim.
  • Joshua Isaac James: Automated Human Inference in Digital Forensic Investigations Using Hypothesis Reduction. (PhD thesis, external examiner, advisor Dr. Pavel Gladyshev, University College Dublin) Defended April 26, 2013. University College Dublin, Ireland.
  • Ralf Hund: Analysis and Retrofitting of Security Properties for Proprietary Software Systems. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Thorsten Holz, Ruhr-Universiy Bochum) Defended April 29, 2013. Ruhr-University Bochum.
  • Carsten Willems: Instrumenting Existing System Componente for Dynamic Analysis of Malicious Software. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Thorsten Holz, Ruhr-University Bochum) Defended April 29, 2013. Ruhr-University Bochum.
  • Christian Gorecki: Dilution – A novel Approach in Preserving Privacy. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Thorsten Strufe, TU Darmstadt) Defended April 30, 2013. University of Mannheim.
  • Steffen Wendzel: Novel Approaches for Network Covert Storage Channels. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Jörg Keller, FernUniversität Hagen) Defended May 7, 2013. FernUniversität Hagen.
  • Johannes Barnickel: Authentication and Identity Privacy in the Wireless Domain. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Ulrike Meyer, RWTH Aachen) Defended June 4, 2013. RWTH Aachen.
  • Tilo Müller: On the security of full disk encryption. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Wolfgang Schröder-Prekschat, FAU) Defended June 5, 2013. FAU
  • Marek Jawurek: Privacy in Smart Grids. (PhD thesis, 1st rewiewer, 2nd reviewer Prof. Günter Müller, University of Freiburg, advisor: Florian Kerschbaum) Defended July 17, 2013. FAU
  • Markus Engelberth: Social Malcode – Benutzerabhängige Schadprogramme. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Thorsten Holz, Ruhr-University Bochum) Defended September 11, 2013. University of Mannheim.
  • Raul Schmidlin Fajardo Silva: Contract Testing for Reliable Embedded Systems. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Reinhard Männer, Universität Heidelberg) Defended November 18, 2013. University of Heidelberg.
  • Stefan Vömel: Forensic Acquisition and Analysis of Volatile Data in Memory. (PhD thesis, 1st reviewer, 2nd reviewer Dr. Pavel Gladyshev, University College Dublin) Defended December 18, 2013. FAU.
  • Christopher Meyer: 20 Years of SSL/TLS Research – An Analysis of the Internet’s Security Foundation. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Jörg Schwenk, Ruhr-Universität Bochum) Defended February 7, 2014, Ruhr-Universität Bochum.
  • Tobias Distler: Resource-efficient Fault and Intrusion Tolerance. (PhD thesis, 3rd reviewer, 1st reviewer: Prof. Wolfgang Schröder-Preikschat, 2nd reviewer: Prof. Rüdiger Kapitza, TU Braunschweig) Defended June 24, 2014. FAU.
  • Frank Breitinger: On the utility of bytewise approximate matching in computer science with a special focus on digital forensics investigations. (PhD thesis, 3rd reviewer, 1st reviewer: Prof. Stefan Katzenbeisser, TU Darmstadt, 2nd reviewer: Prof. Harald Baier, Hochschule Darmstadt) Defended June 30, 2014. TU Darmstadt.
  • Johannes Hoffmann: From Mobile to Security – Towards Secure Smartphones. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Thorsten Holz, Ruhr-Universität Bochum) Defended August 28, 2014. Ruhr-Universität Bochum.
  • Tobias Hoppe: Prävention, Detektion und Reaktion gegen drei Ausprägungsformen automotiver Malware. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Jana Dittmann, Otto von Guericke Universität Magdeburg) Defended December 10, 2014. Otto von Guericke Universität Magdeburg.
  • Christian Moch: Automatisierte Erstellung von Übungsaufgaben in der digitalen Forensik. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Jana Dittmann, Otto-von-Guericke University Magdeburg) Defended January 30, 2015. FAU
  • Hans-Georg Eßer: Design, Implementation and Evaluation of the ULIX Teaching Operating System. (PhD thesis, 1st reviewer, 2nd reviewer PD Daniel Lohmann, FAU) Defended March 23, 2015. FAU
  • Nadina Hintz: Der Einfluss des menschlichen Verhaltens auf die IT-Sicherheit und den Datenschutz. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Simone Fischer-Hübner, Karlstad University, Sweden, advisor: Zinaida Benenson) Defended April 1, 2015. FAU
  • Johannes Stüttgen: On the Viability of Memory Forensics in Compromised Environments. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Michael Meier, University of Bonn) Defended May 28,2015. FAU
  • Matthäus Wander: The Impact of DNSSEC on the Internet Landscape. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Torben Weis, Universität Duisburg-Essen) Defended June 19, 2015. University of Duisburg-Essen
  • Michael Riecker: Lightweight Intrusion Detection in Wireless Sensor Networks. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Matthias Hollick, TU Darmstadt) Defended June 22, 2015. TU Darmstadt
  • Benjamin Stock: Untangling the Web of Client-Side Cross-Site Scripting. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Michael Backes, Saarland University) Defended August 31, 2015. FAU
  • Matthias Stefan Meitner: Quantitative Bewertung der Softwarezuverlässigkeit unter Berücksichtigung der Komponenteninteraktionen. (PhD thesis, 2nd reviewer, 1st reviewer: Prof. Francesca Saglietti, FAU) Defended September 17, 2015. FAU
  • Andreas Kurtz: Dynamic Analysis and Privacy Implications of Apple iOS Apps. (PhD thesis, 1st reviewer, 2nd reviewer: Prof. Hannes Federrath, Universität Hamburg) Defended March 14, 2016. FAU
  • Johannes Formann: Kryptographische Insel zur Realisierung von Angreifertoleranz in redundanten Systemen. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Klaus Echtle, Universität Duisburg-Essen) Defended April 22, 2016. Universität Duisburg-Essen
  • Tobias Wüchner: Behavior-based Malware Detection with Quantitative Data Flow Analysis. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Alexander Pretschner, TU München) Defended July 5, 2016. TU München
  • Carlo Schäfer: Mail Infrastructure Traffic Analyzer – Erkennung kompromittierter E-Mail-Accounts. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Eberhard Zehendner, FSU Jena) Defended October 12, 2016. FSU Jena
  • Dr. Ingmar Baumgart: Dezentrale Systeme zum Schutz der Privatsphäre. Habilitation thesis, Karlsruher Institut für Technologie (KIT), 2016.
  • Michael Gruhn: Forensically Sound Data Acquisition in the Age of Anti-Forensic Innocence. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Zeno Geradts, University of Amsterdam) Defended November, 24, 2016. FAU
  • Johannes Bauer: On Inexpensive Methods for Improving Security of Embedded Systems. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Falko Dressler, University of Paderborn) Defended November 25, 2016. FAU
  • Sven Schindler: Honeypot Architectures for IPv6 Networks. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Bettina Schnor, University of Potsdam) Defended November, 28, 2016. University of Potsdam
  • Aleksandar Milenkoski: Evaluation of Intrusion Detection Systems in Virtualized Environments. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Samuel Kounev, University of Würzburg), Defended between November 28 and December 2, 2016. University of Würzburg
  • Stefan Meier: Digitale Forensik in Unternehmen. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Günther Pernul, University of Regensburg) Defended December, 2, 2016. University of Regensburg
  • Yi-Ching Liao: Process Tracking for Forensic Readiness. (PhD thesis, 1st opponent, 2nd opponent Prof. Delphine Reinhardt, University of Bonn, advisor: Prof. Hanno Langweg, HTW Konstanz and NTNU) Defended December, 16, 2016. NTNU in Gjovik, Norway.
  • Mykolai Protsenko: Securing the Android App Ecosystem: Obfuscation, Tamperproofing, and Malware detection. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Claudia Eckert, TU München, advisor: Tilo Müller) Defended April 12, 2017. FAU
  • Marian Kühnel: Detection of Traffic Initiated by Mobile Malware – Targeting Android Devices in 3GPP Networks. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Ulrike Meyer, RWTH Aachen University) Defended May 24, 2017. RWTH Aachen University
  • Thomas Hupperich: On the Feasibility and Impact of Digital Fingerprinting for System Recognition. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Thorsten Holz, Ruhr-Universität Bochum) Defended June 30, 2017. Ruhr-Universität Bochum
  • Vladislav Mladenov: On the Security of Single Sign-On. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Jörg Schwenk, Ruhr-Universität Bochum) Defended June 30, 2017. Ruhr-Universität Bochum
  • Janis Danisevskis: Accelerated Secure GUI for Virtualized Mobile Handsets. (PhD thesis, 3rd reviewer, 1st reviewer Prof. Jean-Pierre Seifert, TU Berlin, 2nd reviewer Prof. Konrad Rieck, TU Braunschweig) Defended August 15, 2017. TU Berlin
  • Yan Zhuang: Methods for Improving the Quality of Software Obfuscation for Android Applications. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Jingqiang Lin, Chinese Academy of Sciences, PR China) Defended September 26, 2017. FAU
  • Xiaobing He: Threat Assessment for Multistage Cyber Attacks in Smart Grid Communication Networks. (PhD thesis, 3rd reviewer, 1st reviewer Prof. Hermann de Meer, University of Passau, 2nd reviewer Prof. Stefan Rass, University of Klagenfurt, Austria) Defended October 2, 2017. University of Passau
  • Sven Kälber: Automatic Forensic Event Reconstruction based (not only) on File System Metadata. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Konrad Rieck, TU Braunschweig) Defended November 10, 2017. FAU
  • Rene Rietz: Optimization of Network Intrusion Detection Processes. (PhD thesis, 3rd reviewer, 1st reviewer Prof. Hartmut König, BTU Cottbus, 2nd reviewer Prof. Falko Dressler, Universität Paderborn) Defended November 17, 2017. BTU Cottbus
  • Fatih Kilic: Security Investigation in Encrypted Environment. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Claudia Eckert, TU München) Defended November 24, 2017. TU München
  • Johannes Götzfried: Trusted Systems in Untrusted Environments: Protecting Against Strong Attackers. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Ingrid Verbauwhede, KU Leuven, Belgium, advisor: Tilo Müller) Defended December 7, 2017. FAU
  • Thomas Schreck: Incident Response: Current State, Emerging Problems, and New Approaches. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Michael Meier, Universität Bonn) Defended December 18, 2017. FAU
  • Konstantin Sack: Selektion in der Digitalen Forensik. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Michael Meier, Universität Bonn) Defended December 18, 2017. FAU
  • Marc Spisländer: Strukturelle Testverfahren zur Verifikation existentieller temporallogischer Formeln in erweiterten endlichen Zustandsautomaten. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Francesca Saglietti, FAU) Defended November 5, 2018. FAU
  • Norman Hänsch: Understanding Expert and End User Behavior in IT Security. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Günther Pernul, Universität Regensburg, advisor: Zinaida Benenson) Defended Feb 11, 2019. FAU
  • Babak Habibnia: Redesigning Digital Forensics as a Computer-Assisted Human Activity: A Computer Aided Diagnostics of Digital Evidence Tampering (CADDET). (PhD thesis, external examiner, advisor Dr. Pavel Gladyshev, University College Dublin) Defended March 1, 2019. University College Dublin, Ireland.
  • Hugo Gascon Polanco: Defending Against Targeted Attacks with Pattern Recognition. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Konrad Rieck, TU Braunschweig) Defended April 2, 2019. TU Braunschweig.
  • Philipp Morgner: Security and Privacy in the Internet of Things: Technical and Economic Perspectives. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Christina Pöpper, NYU, Abu Dhabi, advisor Zinaida Benenson) Defended May 31, 2019. FAU
  • Felix Erlacher: Efficient Intrusion Detection in High-Speed Networks. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Falko Dressler, Universität Paderborn) Defended June 27, 2019. Universität Paderborn
  • Lena Reinfelder: User Interaction with Smartphone Security and Privacy Mechanisms. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Freimut Bodendorf, FAU, advisor Zinaida Benenson) Defended July 2, 2019. FAU
  • Konstantin Böttinger: Fuzzing with Stochastic Feedback Processes. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Claudia Eckert, TU München) Defended July 8, 2019. TU München
  • Vincent Haupert: Sicherheit mobiler Bankgeschäfte zwischen Innovation und Regulierung. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Dominik Herrmann, Universität Bamberg, advisor Tilo Müller) Defended July 22, 2019. FAU
  • Dennis Felsch: Security of Access and Usage of Cloud Infrastructures. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Jörg Schwenk, Ruhr-Universität Bochum) Defended August 27, 2019. Ruhr-Universität Bochum
  • Pieter Maene: Lightweight Roots of Trust for Modern Systems-on-Chip. (PhD thesis, member of the examination committee, advisor Prof. Ingrid Verbauwhede, KU Leuven) Defended privately on August 20, 2019, and publicly October 21, 2019. KU Leuven
  • Andreas Dhein: Absicherung der analytischen Interpretation von Geolokalisierungsdaten in der Mobilfunkforensik. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Rüdiger Grimm, Universität Koblenz-Landau, 3rd reviewer Prof. Utz Rödig, University College Cork) Defended October 25, 2019. Universität Koblenz-Landau.
  • Edita Bajramovic: Secure Logging in operational Instrumentation and Control Systems. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Christoph Ruland, Universität Siegen) Defended November 21, 2019. FAU.
  • Johannes Pohl: Automatic Security testing of the Wireless IoT. (PhD thesis, 1st reviewer, 2nd reviewer Prof. David Oswald, University of Birmingham, 3rd reviewer Prof. Andreas Noack, Hochschule Stralsund, advisor Prof. Andreas Noack, Hochschule Stralsund) Defended May 15, 2020. FAU.
  • Benjamin Taubmann: Improving Digital Forensics and Incident Analysis in Production Environments by Using Virtual Machine Introspection. (PhD thesis, 3rd reviewer without having to write a review, 1st reviewer Professor Hans Reiser, Universität Passau) Defended June 26,2020. Universität Passau.
  • Michael Spranger: Text Mining als Werkzeug im repressiven und präventiven Ermittlungsprozess. (PhD thesis, 3rd reviewer, 1st reviewer Professor Michael Schroeder, TU Dresden, 2nd reviewer Professor Dirk Labudde, Hochschule Mittweida) Defended  July 8, 2020. TU Dresden.
  • Anatoli Kalysch: Android Application Hardening: Attack Surface Reduction and IP Protection Mechanisms. (PhD thesis, 1st reviewer, 2nd reviewer Professor Andre Gregio, Federal University of Parana (UFPR), advisor Dr. Tilo Müller, FAU) Defended July 9, 2020. FAU.
  • Florian Menges: Cyber Threat Intelligence Exchange. (PhD thesis, 2nd reviewer, 1st reviewer Professor Günther Pernul, Universität Regensburg) Defended July 23, 2020. Universität Regensburg.
  • Marcel Busch: On the Security of ARM TrustZone-Based Trusted Execution Environments. (PhD thesis, 1st reviewer, 2nd reviewer Professor Rüdiger Kapitza, TU Braunschweig, advisor Dr. Tilo Müller, FAU) Defended October 8, 2020. FAU.
  • Robert Altschaffel: Computer Forensics in Cyber-Physical Systems – Applying Existing Forensic Knowledge and Procedures from Classical IT to Automation and Automotive. (PhD thesis, 2nd reviewer, 1st reviewer Professor Jana Dittmann, Universität Magdeburg, 3rd reviewer Professor Stefan Katzenbeisser, Universität Passau) Defended October 12, 2020. Universität Magdeburg.
  • Patrick Murmann: Information at your Fingertips – Facilitating Usable Transparency via Privacy Notifications. (PhD thesis, examination committee member with Dr. Sebastian Pape, Goethe-Universität Frankfurt and Professor Ingrid Schaumüller-Bichl, FH Oberösterreich, opponent Professor Anna Ståhlbröst, Lund University, advisors Professor Simone Fischer-Hübner, Karlstad University, Professor Delphine Reinhardt, Universität Göttingen) Defended October 28, 2020. Karlstadt University, Sweden.
  • Patrick Mullan: Digital Cues in Multimedia Forensics. (PhD thesis, 1st reviewer, 2nd reviewer Professor Zeno Geradts, University of Amsterdam, 3rd reviewer and advisor Dr. Christian Riess, FAU) Defended November 6, 2020. FAU.
  • Katja Auernhammer: Mask-based Black-box Attacks on Safety-Critical Systems that Use Machine Learning. (PhD thesis, 1st reviewer, 2nd reviewer and advisor Professor Ramin Tavakoli, TH Nürnberg, 3rd reviewer Professor Dominique Schröder, FAU) Defended June 28, 2021. FAU.
  • Tobias Latzo: All your System Memory are belong to us: From Low-Level Memory Acquisition to High-Level Forensic Event Reconstruction. (PhD thesis, 1st reviewer, 2nd reviewer Professor Hans Reiser, Universität Passau) Defended July 9, 2021. FAU.
  • Markus Zoppelt: Software Security Design for Cyber-Physical Systems. (PhD thesis, 3rd reviewer, 1st reviewer Professor Ramin Tavakoli, TH Nürnberg, 2nd reviewer Professor Dominique Schröder, FAU) Defended October 6, 2021, FAU.
  • Lamya Abdullah: Sealed Computation: Enhancing Data Privacy and Trustworthiness of Computing Systems. (PhD thesis, 1st reviewer, 2nd reviewer Professor Claudio Bettini, University of Milan, Italy) Defended November 16, 2021, FAU.
  • Lorenz Liebler: Towards Carving-Based Post-Mortem Memory Forensics and the Applicability of Approximate Matching. (PhD thesis, 2nd reviewer, 1st reviewer Professor Harald Baier, Universität der Bundeswehr München) Defended December 8, 2021, Universität der Bundeswehr München.
  • Ralph Palutke: Countering Anti-Forensics with Virtualization Technology. (PhD thesis, 1st reviewer, 2nd reviewer Professor Michael meier, Universität Bonn) Defended December 22, 2021, FAU.
  • Nikolaos Alexopoulos: New Approaches to Software Security Metrics and Measurement. (PhD thesis, 2nd reviewer, 1st reviewer Professor Max Mühlhäuser, TU Darmstadt) Defended March 22, 2022, TU Darmstadt.
  • Tobias Groß: Forensic Data Extraction from Modern File Systems. (PhD thesis, 1st reviewer, 2nd reviewer Professor Konrad Rieck, TU Braunschweig, advisor: Professor Tilo Müller, FH Hof) Defended June 21, 2022, FAU.
  • Sven Übelacker: Investigations into Social Engineering Evidence for Security Research. (PhD thesis, 2nd reviewer, 1st reviewer Professor Dieter Gollmann, TU Hamburg) Defended June 24, 2022, TU Hamburg.
  • Gaston Pugliese: Browser Fingerprinting: The Stateless Enemy of Online Privacy. (PhD thesis, 1st reviewer, 2nd reviewer Professor Dominik Herrmann, Universität Bamberg, 3rd reviewer and advisor PD Dr. Zinaida Benenson, FAU) Defended December 22, 2022, FAU.
  • Marina Krotofil: Security of Cyber-Physical Systems: Process-Aware Approach. (PhD thesis, 2nd reviewer, 1st reviewer Professor Dieter Gollmann, TU Hamburg) Defended February 10, 2023, TU Hamburg.
  • Janine Schneider: On the Trustworthiness of Digital Evidence and How It Can Be Established. (PhD thesis, 1st reviewer, 2nd reviewer Professor Vassil Roussev, University of New Orleans, USA) Defended March 17, 2023, FAU.
  • Dominic Deuber: Cryptocurrencies within the conflicting tension between law and IT security. (PhD thesis, 2nd reviewer, 1st reviewer Professor Dominique Schröder, FAU, 3rd reviewer Professor Nicolas Christin, CMU) Defended March 31, 2023, FAU.
  • Jens Trautmann: Automation Approaches for the Application of Side-Channel Analysis in Real-World Scenarios. (PhD thesis, 3rd reviewer, 1st reviewer Dr. Stefan Wildermann, FAU, 2nd reviewer Professor Nele Mentens, Leiden University) Defended July 27, 2023, FAU.
  • Viktoria Ronge: Security and Privacy of Cryptocurrency Signatures. (PhD thesis, 2nd reviewer, 1st reviewer Professor Dominique Schröder, FAU) Defended October 23, 2023, FAU.
  • Kevin Klaus Gomez Buquerin: Unveiling Hidden Knowledge: On the Effectiveness in Automotive Digital Forensics. (PhD thesis, 1st reviewer, 2nd reviewer Professor Hans-Joachim Hof, TH Ingolstadt, 3rd reviewer Professor Ikjot Saini, University of Windsor, Canada, advisor: Professor Hans-Joachim Hof, TH Ingolstadt) Defended December 15, 2023, FAU.
  • Philip Sperl: Defending Neural Networks with Activation Analysis. (PhD thesis, 2nd reviewer, 1st reviewer Professor Claudia Eckert, TU München) Defended December 19, 2023, TU München.
  • Asmaa Tellabi: Secure virtualization system for industrial distributed applications. (PhD thesis, 2nd reviewer, 1st reviewer Professor Christoph Ruland, University of Siegen) Defended February 26, 2024, University of Siegen.
  • Davide Bove: Trust In Your Pockets: On the Security of Mobile Devices through Trusted Computing. (PhD thesis, 3rd reviewer, 1st reviewer and advisor Professor Tilo Müller, Hochschule Hof, 2nd reviewer Professor Rüdiger Kapitza, FAU) Defended March 12, 2024, FAU.
  • Jenny Ottmann: Formulating and Applying Quality Criteria in Forensic Live Data Acquisition. (PhD thesis, 1st reviewer, 2nd reviewer and joint advisor Professor Frank Breitinger, University of Lausanne, Switzerland, 3rd reviewer Professor Dominique Schröder, FAU) Defended April 3, 2024, FAU.
  • Jan Gruber: Evidential Relevance and Expressiveness of Digital Traces: An Investigative Perspective. (PhD thesis, 1st reviewer, 2nd reviewer Professor Zeno Geradts, University of Amsterdam) Defended April 4, 2024, FAU.
  • Frank Block: Using Memory Management Structures to Identify and Analyze Malicious and Benign Data. (PhD thesis, 1st reviewer, 2nd reviewer Professor Ricardo Rodriguez, University of Zaragoza, Spain, advisor: Professor Andreas Dewald, ERNW) Defended April 15, 2024, FAU.
  • Paul Georg Wagner: Trustworthy Distributed Usage Control Enforcement in Heterogeneous Trusted Computing Environments. (PhD thesis, 2nd reviewer, 1st reviewer Professor Jürgen Beyerer, KIT) Defended June 10, 2024, KIT.
  • Loui Al Sardy: Evolutionary Constraint-based Testing Approach for Software Vulnerability Detection. (PhD thesis, 1st reviewer, 2nd reviewer Professor Jana Dittmann, University of Magdeburg, advisor Professor Francesca Saglietti, FAU) Defended August 9, 2024, FAU.
  • Vincent van der Meer: Improving foundations of File Recovery. A digital forensics perspective on file fragmentation, timestamps, and JPEG validation. (PhD thesis, member of the Doctorate Commitee with Professor Zeno Geradts, Professor C. J. de Poot and Professor Harm van Beek) Defended September 5, 2024, Open Universiteit, Heerlen, The Netherlands.
  • Thomas Hutzelmann: A Holistic Methodology for Quality Assessment of Intrusion Detection Systems. (PhD thesis, second reviewer, first reviewer Professor Alexander Pretschner, TU München) Defended September 20, 2024, TU München.

Collection of famous citations

“Neuinstallieren skaliert nicht.” (Thorsten Holz, June 18, 2008)

“People have said that computing is a fast moving subject and what they mean is that the wheel of re-incarnation goes faster.”
(Roger Needham in a SIGSOFT interview)

“Der Browser ist ein dreckiges Objekt mit vielen unangenehmen Eigenschaften.” (Martin Johns, March 8, 2012)

My (old) GPG Key

-----BEGIN PGP PUBLIC KEY BLOCK-----
Comment: User-ID: Felix Freiling <felix.freiling@informatik.uni-erlangen.de>
Comment: a.k.a.: Felix Freiling <felix.freiling@fau.de>
Comment: a.k.a.: Felix Freiling <felix.freiling@cs.fau.de>
Comment: a.k.a.: Felix Freiling <freiling@uni-mannheim.de>
Comment: Created: 14/05/2009 01:12
Comment: Expires: 13/02/2024 22:13
Comment: Type: 1.024-bit DSA
Comment: Usage: Signing, Encryption, Certifying User-IDs, SSH Authentication
Comment: Fingerprint: 4B88ED3A4A47A4F49413F4529E2EC45A37C1FCEE

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=T6rU
-----END PGP PUBLIC KEY BLOCK-----

My GPG Key for Email Encryption

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=8j19
-----END PGP PUBLIC KEY BLOCK-----

Statistics

My Erdös number is at most 3 (the path is via Matthias Kirchner and Pete Winkler). If you work(ed) in fault-tolerant distributed computing and want to know your Erdös number, check your collaboration distance to (for example) Shay Kutten, Shlomo Moran, Nicola Santoro or Gerard Tel; all have Erdös number 2.

As of September 2024, my h-index is at least 52 (using Harzing’s PoP application). My ha-index is 77.

My most often cited paper is the 2007 IEEE Security & Privacy Magazine article with Willems and Holz on “Toward automated dynamic malware analysis using CWsandbox” (until 2024 around 1120 citations).

Images of Felix Freiling

Here are some images of Felix Freiling to upset Google image search. One of the following images shows me. I encourage you to set up a website with a picture of a person and the name “Felix Freiling” associated to it. If you inform me, I will link to such pages from here (to increase the page rank), examples are here (from an interview for Motherboard) and here. Here are further (and somewhat strange) examples (first and second)