Julian Kirsch
M. Sc Julian Kirsch
Alumni
E-Mail: | Julian Kirsch |
Homepage
Teaching
- Summer 2019
- Seminar Reverse Engineering
- Practical course Binary Exploitation
- Practical course Advanced Binary Exploitation
- Winter semester 2018 / 2019
- Practical course Honeynets & Malware Forensics
- Practical course Binary Exploitation
- Summer 2018
- Seminar Reverse Engineering
- Practical course Binary Exploitation
- Winter semester 2017 / 2018
- Practical course Binary Exploitation
- Summer 2017
- Seminar Reverse Engineering
- Practical course Binary Exploitation
- Winter semester 2016 / 2017
- Seminar Reverse Engineering
- Practical course Advanced Techniques in Binary Exploitation
- Practical course Binary Exploitation
- Summer semester 2016
- Seminar Reverse Engineering
- Practical course Binary Exploitation
- Winter semester 2015 / 2016
- Seminar Reverse Engineering
- Practical course Web Application Security
- Practical course Advanced Techniques in Binary Exploitation
- Practical course Binary Exploitation
- Practical course Rootkit Programming
- Summer semester 2015
- Practical course Binary Exploitation
- Practical course Advanced Techniques in Binary Exploitation
- Seminar Reverse-Code-Engineering
- Winter semester 2014 / 2015
- Exercises for lecture Computer Science 1 for Engineers
- Winter semester 2013 / 2014
- Winter semester 2012 / 2013
PGP Key
Fingerprint:
F949 CFBD 140A 6DD0 71E9 0B8C DC24 396B 6D45 1038
Publications
2022 | Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots
Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses |
|
2018 | Kernel-Assisted Debugging of Linux Applications
2nd Reversing and Offensive-oriented Trends Symposium 2018 (ROOTS) |
|
PwIN: Pwning Intel piN -- Why DBI is Unsuitable for Security
23rd European Symposium on Research in Computer Security (ESORICS) |
||
Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection
IFIP International Conference on ICT Systems Security and Privacy Protection (IFIP SEC) |
||
Smashing the Stack Protector for Fun and Profit
IFIP Information Security Conference & Privacy Conference (IFIP SEC) |
||
2017 | Enhancing Control Flow Graph Based Binary Function Identification
1st Reversing and Offensive-oriented Trends Symposium 2017 (ROOTS) |
|
Dynamic Loader Oriented Programming on Linux
1st Reversing and Offensive-oriented Trends Symposium 2017 (ROOTS) |
||
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage
14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) |
||
Combating Control Flow Linearization
32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC) |
||
2016 | A Study of the Rich Header and Respective Malware Triage
Hacktivity |
|
Autocorrelation-Based Detection of Infinite Loops at Runtime
IEEE Int. Conf. Dependable, Autonomic and Secure Computing |
||
2015 | Counteracting Data-Only Malware with Code Pointer Examination
18th International Symposium on Research in Attacks, Intrusions and Defenses |