Courses at Ruhr University Bochum, Germany
(Nov 2020 - now)

  • 2021-now: Master seminar on Privacy and Security in Mobile Operating Systems
  • Oct 2022: Master seminar on Current Topics in Device Firmware Security

Supervision:

Master

  • Ömer Kumru (on-going), A Semi-Automatic Analysis of Voice Assistant Apps and Gadgets for GDPR-Compliance
  • Henrik Adolphs (on-going, internship at GData), Deep Hashing for efficient Malware Clustering based on static Features
  • Christoph Schulze (2023, internship at GData), Detecting malware in Office and PDF files with the use of ML
  • Marius Benthin (2022, internship at GData), Attribution of Malware Binaries to APT Actors using an Ensemble Classifier
  • Torben Vier (2022), Reverse Pluton: Firmware Analysis of Microsoft’s Pluton Security Processor
  • Philipp Mackensen (2022), Security Assessment of the Amazon Ring Doorbell
  • Dimitri Mankowski (2022, internship at GData), System and Application Behaviour Graph based Malware Detection with Neural Networks
  • Ivan Dokuchaev (2022), Android malware families and their impact on ML-based malware classifiers
  • Timo Gatta (2022, Materna SE), Restricted Evasion Attack on Machine Learning based Malware Classifiers
  • Hasan Al Khuder (2022), Privacy Analysis of Third-Party Monetization Libraries in Android Apps
  • Phillip Kemkes (2022, internship at GData), Malware Classification in Heterogeneous Graph Databases using Graph Neural Networks

Bachelor

  • Patrick Poser (on-going), Privacy in the Internet of Things for Children
  • Patrick Simuttis (2023), Extending an AV Evasion tool with attacks on ML-based windows malware detection
  • Polina Kan (2022), Analysis of the Update Cycles of Smartphone Baseband Modem Firmware>
  • Pierre Tilhaus (2022), Security analysis of IoT devices with focus on the Sidewalk protocol implementation
  • Yasser Hekal (2022), Hey Alexa, Can I Manage My Own Privacy?: An Evaluation of How Improving Privacy Choice through Design Could Support Privacy Self- Management of Alexa Users
  • Maximilian Fröhling (2022, internship at GData), Passive TLS inspection using eBPF
  • Micha Eyl (2022), WireGuardKeyStore vs. WireGuardHSM: A Comparison of Android’s Key Storage Solutions
  • Philipp Giersfeld (2022, internship at F-Secure), Creating a malware knowledge graph from dynamic analysis reports
  • Ilja Rozhko (2022), Static Analysis of TLS (Mis-)Configuration in iOS Apps
  • Sandy Hong (2022), Educators‘ and Students‘ Privacy & Security Concerns for Distance Education

Courses at Radboud University, The Netherlands
(Oct 2015 - Dec 2017, Nov 18 - Oct 2020)

Supervision:

Master

  • Stephanie Silvius (2020), Radboud University (internship at Northwave), Spam trap threat intelligence
  • Martin Rosso (2019), Radboud University (internship at TUe), Experimental SOC operation effectiveness evaluation
  • Roland Middelweerd (2019), Radboud University (internship at Northwave), Analysis of credential leakage and hacker modus operandi
  • Dion van Dam (2019), Radboud University (internship at Deloitte), Fuzzing the Signal Protocol: Inferring state machines from the Signal implementation
  • Rik Dolfing (2019), Radboud University (internship at TUe), Identifying malicious encrypted traffic using TCP connection metadata in a multilayered system
  • Lars Deelen (2019), Radboud University (internship at KPMG), Detection of Cryptominers in the Wild [pdf]
  • Martijn Terpstra (2017), Radboud University, Attribute-based credentials on smartwatches [pdf]

Bachelor

  • Egidius Mysliwietz (2020), Radboud University, Identifying rootkit stealth strategies
  • Jeroen Wiejnbergh (2019), Radboud University (internship at NLnet Labs)
  • Justin Hende, (2019), Radboud University, MineChecker: A tool for detecting click-based browser cryptomining
  • Hendrik Willing (2019), Radboud University, Effectiveness of common defense mechanisms against adversarial inputs for DNN based Android malware datasets [pdf]
  • Hendrik Werner (2019), Radboud University , The state of entropy generation in practice [pdf]
  • Ward Theunisse (2017), Radboud University, Breaking the chain: Security analysis of a pilot system for detainee monitoring in the Dutch Custodial Institutions Agency [pdf]
  • Jordy Gennissen (2017), Radboud University (internship at Royal Holloway, University of London), Gamut: Sifting through Images to Detect Malicious Android Apps [pdf]
  • Stijn Meijer (2016), Radboud University, Secure Location Verification for ADS-B [pdf]
  • Bas Visser (2015), Radboud University, Additional Source of Entropy as a Service in the Android user-space [pdf]
  • Maarten Derks (2015), Radboud University, Fair Privacy: Improving Usability of Android Permission System [pdf]

Courses at Utrecht University, The Netherlands
(Feb 2018 - Dec 18s)

Supervision:

Master

  • Amr Ahmed (2018), Utrecht University (internship at Accenture), DevSecOps Framework: Accelerating Security in Software Production
  • Jarno Bredenoord (2018), Utrecht University (internship at Ernst & Young), Privacy and Security in the Internet of Things
  • Alexander van Loon (2018), Utrecht University (internship at 3WebApps), Value creation in the e-commerce ecosystem through blockchain
  • Oka Arntzen (2018), Utrecht University (internship at Rabobank), Reference framework for cyber-attack patterns in financial institutions”

Bachelor

  • Mick Koomen (2018), co-supervised at Radboud University, Using power analysis to differentiate between malicious repackaged apps and clean apps
  • Paul van Grol (2018), Utrecht University, Comparison of Multi-signature schemes for performance improvement of OmniLedger

Courses taught at Deakin University, Australia
(2010 - 2015)

  • Patterns in Space, 1st year Bachelor of IT, Teaching Assistant
  • Fundamentals of Information Technology, 1st year Bachelor of IT, Teaching Assistant
  • Discrete Mathematics, 1st year Bachelor of IT, Teaching Assistant
  • Introduction to Statistics and Data Analysis, 1st year Bachelor of IT, Teaching Assistant
  • Introduction to Cryptography, 2nd year Bachelor of IT, Teaching Assistant
  • Public Key Cryptography, 3rd year Bachelor of IT, Teaching Assistant
  • Computer Crime and Digital Forensics, 2nd year Bachelor of IT, co-Lecturer
  • Cloud Computing Technologies, Master in IT, Teaching Assistant