- Our paper Computational Soundness for Interactive Primitives has been accepted at ESORICS '15. [2015/06/15]
- Our paper Symbolic Malleable Zero-knowledge Proofs has been accepted at CSF '15. [2015/04/25]
- Our work (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection has received media attention. [2015/03/13]
- I am a member of the program committee of the Security & Privacy track of the 24th International World Wide Web Conference (WWW '15). [2014/10/17]
- Our paper (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection has been accepted at CCS '14. [2014/07/23]
- Privacy and anonymity, with an emphasis on analyzing the anonymity of Tor
- Cryptographic protocol analysis
- Formal verification methods and their computational soundness
Computational Soundness for Interactive Primitives
To appear in Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS '15), Springer, 2015.
Symbolic Malleable Zero-knowledge Proofs
To appear in Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF '15), IEEE, 2015.
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection
In Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS '14), pages 513-524, ACM, 2014.
Media SC Magazine (UK), Scinexx (DE), FKT (DE), ZDNet (DE), Epicentre (DE), ScienceDaily (US), coverage: IDW (DE), ITEspresso (DE), Silicon.de (DE), EurekAltert! (US), innovations-report (DE), Homeland Security News Wire (US)
TUC: Time-sensitive and Modular Analysis of Anonymous Communication
In Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF '14), pages 383-397, IEEE, 2014.
Computational Soundness Results for ProVerif:
Bridging the Gap from Trace Properties to Uniformity
In Proceedings of the 3rd Conference on Principles of Security and Trust (POST'14), pages 42-62, Springer, 2014.
Zero-Communication Seed Establishment for Anti-Jamming Techniques
In Proceedings of the NDSS Workshop on Security of Emerging Networking Technologies (SENT'14), Internet Society, 2014.
Privacy-Preserving Accountable Computation
In Proceedings of the 18th European Symposium on Research in Computer Security
(ESORICS '13), pages 38-56, Springer, 2013.
AnoA: A Framework For Analyzing Anonymous Communication Protocols
In Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF '13), pages 163-178, IEEE, 2013.
Ace: An Efficient Key-Exchange Protocol for Onion Routing
In Proceedings of the 11th Workshop on Privacy in the Electronic Society (WPES'12), pages 55-64, ACM, 2012.
Provably Secure and Practical Onion Routing
In Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF '12), pages 369-385, IEEE, 2012.
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations
In Proceedings of the 30th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS '10), pages 352-363, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2010.
I assisted in the following lectures and seminars:
- Seminar: Current Topics in Information Security & Privacy WS 2013/2014 (supervision of students)
- Lecture: Programming for Engineers SS 2011 (head TA with S. Gerling and R. Reischuk)
- Seminar: Selected Topics in Information Security SS 2011 (supervision of students)
- Lecture: Security WS 2010 (head TA with S.Gerling and F. Eigner)
- Seminar: Current Research in Information Security SS 2009 (supervision of students)
- Lecture: Advanced Cryptography WS 2008/2009 (head TA)
- Lecture: Cryptography SS 2007 (TA)
- Lecture: Cryptography SS 2006 (TA)
- Lecture: Systemarchitektur SS 2006 (TA)
- A list of security reports