Thomas Kittel
Dr. Thomas Kittel
Alumni
E-Mail: | Thomas Kittel |
Teaching
- Winter semester 2017/18
- Assistance for lecture Grundlagen Betriebssysteme und Systemsoftware
- Exercises for lecture IT Security
- Lab course Web Application Security
- Summer semester 2017
- Exercises for lecture Secure mobile Systems
- Assistance for lecture Ausgewählte Themen aus dem Bereich IT-Sicherheit
- Lab course Rootkit Programming
- Lab course Web Application Security
- Winter semester 2016/17
- Assistance for lecture Grundlagen Betriebssysteme und Systemsoftware
- Lab course Rootkit Programming
- Lab course Web Application Security
- Summer semester 2016
- Exercises for lecture Secure mobile Systems
- Assistance for lecture Ausgewählte Themen aus dem Bereich IT-Sicherheit
- Lab course Rootkit Programming
- Lab course Web Application Security
- Winter semester 2015/16
- Exercises for lecture IT Security
- Lab course Rootkit Programming
- Summer semester 2015
- Exercises for lecture Secure mobile Systems
- Winter semester 2014/15
- Exercises for lecture IT Security
- Exercises for lecture Computer Science 1 for Engineers
- Lab course Rootkit Programming
- Summer semester 2014
- Exercises for lecture Secure mobile Systems
- Winter semester 2013/14
- Exercises for lecture IT Security
- Summer semester 2013
- Exercises for lecture Secure mobile Systems
- Bachelor seminar Common Security Flaws
- Winter semester 2012/13
- Exercises for lecture IT Security
CTF-Team
![]() |
I am one of the core members of our chair's Capture the Flag team (H4x0rPsch0rr). We regularly participate in international CTF competitions like iCTF, rwthCTF, PlaidCTF, EBCTF... |
PGP Fingerprint
B002 0B58 0C20 CA6B 443B 81BC CC08 A876 EBBD 25B4
Publications
2018 | PwIN: Pwning Intel piN -- Why DBI is Unsuitable for Security
23rd European Symposium on Research in Computer Security (ESORICS) |
|
Smashing the Stack Protector for Fun and Profit
IFIP Information Security Conference & Privacy Conference (IFIP SEC) |
||
2017 | Dynamic Loader Oriented Programming on Linux
1st Reversing and Offensive-oriented Trends Symposium 2017 (ROOTS) |
|
Combating Control Flow Linearization
32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC) |
||
2015 | Counteracting Data-Only Malware with Code Pointer Examination
18th International Symposium on Research in Attacks, Intrusions and Defenses |
|
CloudIDEA: A Malware Defense Architecture for Cloud Data Centers
5th International Symposium on Cloud Computing, Trusted Computing and Secure Virtual Infrastructures - Cloud and Trusted Computing (C&TC 2015) |
||
Virtual Machine Introspection with Xen on ARM
2nd Workshop on Security in highly connected IT systems (SHCIS) |
||
Blind Format String Attacks
Proceedings of the 10th International Conference on Security and Privacy in Communication Networks (SecureComm 2014) |
||
2014 | Code Validation for Modern OS Kernels
Workshop on Malware Memory Forensics (MMF) |
|
Pitfalls of virtual machine introspection on modern hardware
1st Workshop on Malware Memory Forensics (MMF) |
||
Multi-tiered Security Architecture for ARM via the Virtualization and Security Extensions
1st Workshop on Security in highly connected IT systems |
||
Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data
Proceedings of the 23rd USENIX Security Symposium |
||
Persistent Data-only Malware: Function Hooks without Code
Proceedings of the 21th Annual Network & Distributed System Security Symposium (NDSS) |
||
2013 | Security Issues of Multi-Core Architectures—The Automotive Case
it-Information Technology |
|
2012 | Driving Automotive Middleware Towards a Secure IP-based Future
10th conference for Embedded Security in Cars (Escar'12) |