Vulnerability Discovery
Recent Courses
Summer 2025
- Lecture
- Lecture
- Seminar
Winter 2024/2025
- Lecture
- Seminar
Publications
Peer-Reviewed
Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols
Proceedings of the 27th International Symposium on Recent Advances in Intrusion Detection (RAID),
Are You Sure You Want To Do Coordinated Vulnerability Disclosure?
Proceedings of the 9th International Workshop on Traffic Measurements for Cybersecurity (WTMC),
IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis
Proceedings of the 30th ACM SIGSAC Conference on Computer and Communications Security (CCS),
Out of Sight, Out of Mind: Detecting Orphaned Web Pages at Internet-Scale
Proceedings of the 28th ACM SIGSAC Conference on Computer and Communications Security (CCS),
Cyber Grand Shellphish
Phrack (Volume 15, Issue 70),
Authors listed alphabetically.
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates
Proceedings of the 2018 Applied Networking Research Workshop (ANRW),
Extended abstract. Co-located with IETF 102.
Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones
Proceedings of the 39th IEEE Symposium on Security & Privacy (S&P),
Mechanical Phish: Resilient Autonomous Hacking
IEEE Security & Privacy,
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates
Proceedings of the 25th Network and Distributed System Security Symposium (NDSS),