TUM Logo

Fabian Franzen

Fabian Franzen

Wimi

Address:

Technische Universität München
Chair for IT Security (I20)
Boltzmannstraße 3
85748 Garching (near Munich)
Germany


Phone: +49 (0)89 289-17384
Fax: +49 (0)89 289-18579
E-Mail:
Room: 01.08.055

Teaching

  • Summer Semester 2019
    • Practical Course: Rootkit Programming
    • Seminar: Reverse Engineering
    • Exercises for Lecture: Secure Mobile Systems (SMS)
  • Winter Semester 2018/2019
    • Practical Course: Honeynet & Malware Forensics
    • Practical Course: Rootkit Programming
    • Exercises for Lecture: IT-Security
  • Summer Semester 2018
    • Exercises for Lecture: Secure Mobile Systems (SMS)
    • Assistance for Seminar: Reverse Engineering

PGP Key

Fingerprint: 3FDE 8396 8B30 2707 0DE7  6CFF 3749 CEC2 ACC6 E196

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=wVJl
-----END PGP PUBLIC KEY BLOCK-----

 

Publications

2022   Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots

Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses

2021   Method Confusion Attack on Bluetooth Pairing

IEEE Symposium on Security and Privacy (Oakland)

2020   FridgeLock: Preventing Data Theft on Suspended Linux with Usable Memory Encryption

Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy

2018   Hardware-accelerated Data Acquisition and Authentication for High-speed Video Streams on Future Heterogeneous Automotive Processing Platforms

Proceedings of the International Conference on Computer-Aided Design

  Kernel-Assisted Debugging of Linux Applications

2nd Reversing and Offensive-oriented Trends Symposium 2018 (ROOTS)