TUM Logo

Thomas Kittel

Dr. Thomas Kittel

Alumni

E-Mail:

Teaching

  • Winter semester 2017/18
  • Summer semester 2017
  • Winter semester 2016/17
    • Assistance for lecture Grundlagen Betriebssysteme und Systemsoftware
    • Lab course Rootkit Programming
    • Lab course Web Application Security
  • Summer semester 2016
    • Exercises for lecture Secure mobile Systems
    • Assistance for lecture Ausgewählte Themen aus dem Bereich IT-Sicherheit
    • Lab course Rootkit Programming
    • Lab course Web Application Security
  • Winter semester 2015/16
    • Exercises for lecture IT Security
    • Lab course Rootkit Programming
  • Summer semester 2015
    • Exercises for lecture Secure mobile Systems
  • Winter semester 2014/15
    • Exercises for lecture IT Security
    • Exercises for lecture Computer Science 1 for Engineers
    • Lab course Rootkit Programming
  • Summer semester 2014
    • Exercises for lecture Secure mobile Systems
  • Winter semester 2013/14
    • Exercises for lecture IT Security
  • Summer semester 2013
    • Exercises for lecture Secure mobile Systems
    • Bachelor seminar Common Security Flaws
  • Winter semester 2012/13
    • Exercises for lecture IT Security

CTF-Team

Logo I am one of the core members of our chair's Capture the Flag team (H4x0rPsch0rr). We regularly participate in international CTF competitions like iCTF, rwthCTF, PlaidCTF, EBCTF...

PGP Fingerprint

B002 0B58 0C20 CA6B 443B 81BC CC08 A876 EBBD 25B4

Publications

2018 PwIN: Pwning Intel piN -- Why DBI is Unsuitable for Security
Smashing the Stack Protector for Fun and Profit
2017 Dynamic Loader Oriented Programming on Linux
Combating Control Flow Linearization
2015 Counteracting Data-Only Malware with Code Pointer Examination
CloudIDEA: A Malware Defense Architecture for Cloud Data Centers
Virtual Machine Introspection with Xen on ARM
Blind Format String Attacks
2014 Code Validation for Modern OS Kernels
Pitfalls of virtual machine introspection on modern hardware
Multi-tiered Security Architecture for ARM via the Virtualization and Security Extensions
Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data
Persistent Data-only Malware: Function Hooks without Code
2013 Security Issues of Multi-Core Architectures—The Automotive Case
2012 Driving Automotive Middleware Towards a Secure IP-based Future