Courses at Ruhr University Bochum, Germany
(Nov 2020 - now)
- 2021-now: Master seminar on Privacy and Security in Mobile Operating Systems
- Oct 2022: Master seminar on Current Topics in Device Firmware Security
Supervision:
Master
- Ömer Kumru (on-going), A Semi-Automatic Analysis of Voice Assistant Apps and Gadgets for GDPR-Compliance
- Henrik Adolphs (on-going, internship at GData), Deep Hashing for efficient Malware Clustering based on static Features
- Christoph Schulze (2023, internship at GData), Detecting malware in Office and PDF files with the use of ML
- Marius Benthin (2022, internship at GData), Attribution of Malware Binaries to APT Actors using an Ensemble Classifier
- Torben Vier (2022), Reverse Pluton: Firmware Analysis of Microsoft’s Pluton Security Processor
- Philipp Mackensen (2022), Security Assessment of the Amazon Ring Doorbell
- Dimitri Mankowski (2022, internship at GData), System and Application Behaviour Graph based Malware Detection with Neural Networks
- Ivan Dokuchaev (2022), Android malware families and their impact on ML-based malware classifiers
- Timo Gatta (2022, Materna SE), Restricted Evasion Attack on Machine Learning based Malware Classifiers
- Hasan Al Khuder (2022), Privacy Analysis of Third-Party Monetization Libraries in Android Apps
- Phillip Kemkes (2022, internship at GData), Malware Classification in Heterogeneous Graph Databases using Graph Neural Networks
Bachelor
- Patrick Poser (on-going), Privacy in the Internet of Things for Children
- Patrick Simuttis (2023), Extending an AV Evasion tool with attacks on ML-based windows malware detection
- Polina Kan (2022), Analysis of the Update Cycles of Smartphone Baseband Modem Firmware>
- Pierre Tilhaus (2022), Security analysis of IoT devices with focus on the Sidewalk protocol implementation
- Yasser Hekal (2022), Hey Alexa, Can I Manage My Own Privacy?: An Evaluation of How Improving Privacy Choice through Design Could Support Privacy Self- Management of Alexa Users
- Maximilian Fröhling (2022, internship at GData), Passive TLS inspection using eBPF
- Micha Eyl (2022), WireGuardKeyStore vs. WireGuardHSM: A Comparison of Android’s Key Storage Solutions
- Philipp Giersfeld (2022, internship at F-Secure), Creating a malware knowledge graph from dynamic analysis reports
- Ilja Rozhko (2022), Static Analysis of TLS (Mis-)Configuration in iOS Apps
- Sandy Hong (2022), Educators‘ and Students‘ Privacy & Security Concerns for Distance Education
Courses at Radboud University, The Netherlands
(Oct 2015 - Dec 2017, Nov 18 - Oct 2020)
Supervision:
Master
- Stephanie Silvius (2020), Radboud University (internship at Northwave), Spam trap threat intelligence
- Martin Rosso (2019), Radboud University (internship at TUe), Experimental SOC operation effectiveness evaluation
- Roland Middelweerd (2019), Radboud University (internship at Northwave), Analysis of credential leakage and hacker modus operandi
- Dion van Dam (2019), Radboud University (internship at Deloitte), Fuzzing the Signal Protocol: Inferring state machines from the Signal implementation
- Rik Dolfing (2019), Radboud University (internship at TUe), Identifying malicious encrypted traffic using TCP connection metadata in a multilayered system
- Lars Deelen (2019), Radboud University (internship at KPMG), Detection of Cryptominers in the Wild [pdf]
- Martijn Terpstra (2017), Radboud University, Attribute-based credentials on smartwatches [pdf]
Bachelor
- Egidius Mysliwietz (2020), Radboud University, Identifying rootkit stealth strategies
- Jeroen Wiejnbergh (2019), Radboud University (internship at NLnet Labs)
- Justin Hende, (2019), Radboud University, MineChecker: A tool for detecting click-based browser cryptomining
- Hendrik Willing (2019), Radboud University, Effectiveness of common defense mechanisms against adversarial inputs for DNN based Android malware datasets [pdf]
- Hendrik Werner (2019), Radboud University , The state of entropy generation in practice [pdf]
- Ward Theunisse (2017), Radboud University, Breaking the chain: Security analysis of a pilot system for detainee monitoring in the Dutch Custodial Institutions Agency [pdf]
- Jordy Gennissen (2017), Radboud University (internship at Royal Holloway, University of London), Gamut: Sifting through Images to Detect Malicious Android Apps [pdf]
- Stijn Meijer (2016), Radboud University, Secure Location Verification for ADS-B [pdf]
- Bas Visser (2015), Radboud University, Additional Source of Entropy as a Service in the Android user-space [pdf]
- Maarten Derks (2015), Radboud University, Fair Privacy: Improving Usability of Android Permission System [pdf]
Courses at Utrecht University, The Netherlands
(Feb 2018 - Dec 18s)
- 2018 (Co-lecturer): Security (INFOB3SEC)
- 2018 (Project Supervisor): Informatiekunde introductieproject (INFOB1PROJ)
- 2018 (Course Coordinator): Information Security (INFOB3INSE)
Supervision:
Master
- Amr Ahmed (2018), Utrecht University (internship at Accenture), DevSecOps Framework: Accelerating Security in Software Production
- Jarno Bredenoord (2018), Utrecht University (internship at Ernst & Young), Privacy and Security in the Internet of Things
- Alexander van Loon (2018), Utrecht University (internship at 3WebApps), Value creation in the e-commerce ecosystem through blockchain
- Oka Arntzen (2018), Utrecht University (internship at Rabobank), Reference framework for cyber-attack patterns in financial institutions”
Bachelor
- Mick Koomen (2018), co-supervised at Radboud University, Using power analysis to differentiate between malicious repackaged apps and clean apps
- Paul van Grol (2018), Utrecht University, Comparison of Multi-signature schemes for performance improvement of OmniLedger
Courses taught at Deakin University, Australia
(2010 - 2015)
- Patterns in Space, 1st year Bachelor of IT, Teaching Assistant
- Fundamentals of Information Technology, 1st year Bachelor of IT, Teaching Assistant
- Discrete Mathematics, 1st year Bachelor of IT, Teaching Assistant
- Introduction to Statistics and Data Analysis, 1st year Bachelor of IT, Teaching Assistant
- Introduction to Cryptography, 2nd year Bachelor of IT, Teaching Assistant
- Public Key Cryptography, 3rd year Bachelor of IT, Teaching Assistant
- Computer Crime and Digital Forensics, 2nd year Bachelor of IT, co-Lecturer
- Cloud Computing Technologies, Master in IT, Teaching Assistant