TUM Logo

Thomas Kittel

Dr. Thomas Kittel

Alumni

E-Mail:

Teaching

  • Winter semester 2017/18
  • Summer semester 2017
  • Winter semester 2016/17
    • Assistance for lecture Grundlagen Betriebssysteme und Systemsoftware
    • Lab course Rootkit Programming
    • Lab course Web Application Security
  • Summer semester 2016
    • Exercises for lecture Secure mobile Systems
    • Assistance for lecture Ausgewählte Themen aus dem Bereich IT-Sicherheit
    • Lab course Rootkit Programming
    • Lab course Web Application Security
  • Winter semester 2015/16
    • Exercises for lecture IT Security
    • Lab course Rootkit Programming
  • Summer semester 2015
    • Exercises for lecture Secure mobile Systems
  • Winter semester 2014/15
    • Exercises for lecture IT Security
    • Exercises for lecture Computer Science 1 for Engineers
    • Lab course Rootkit Programming
  • Summer semester 2014
    • Exercises for lecture Secure mobile Systems
  • Winter semester 2013/14
    • Exercises for lecture IT Security
  • Summer semester 2013
    • Exercises for lecture Secure mobile Systems
    • Bachelor seminar Common Security Flaws
  • Winter semester 2012/13
    • Exercises for lecture IT Security

CTF-Team

Logo I am one of the core members of our chair's Capture the Flag team (H4x0rPsch0rr). We regularly participate in international CTF competitions like iCTF, rwthCTF, PlaidCTF, EBCTF...

PGP Fingerprint

B002 0B58 0C20 CA6B 443B 81BC CC08 A876 EBBD 25B4

Publications

2018   PwIN: Pwning Intel piN -- Why DBI is Unsuitable for Security

23rd European Symposium on Research in Computer Security (ESORICS)

  Smashing the Stack Protector for Fun and Profit

IFIP Information Security Conference & Privacy Conference (IFIP SEC)

2017   Dynamic Loader Oriented Programming on Linux

1st Reversing and Offensive-oriented Trends Symposium 2017 (ROOTS)

  Combating Control Flow Linearization

32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)

2015   Counteracting Data-Only Malware with Code Pointer Examination

18th International Symposium on Research in Attacks, Intrusions and Defenses

  CloudIDEA: A Malware Defense Architecture for Cloud Data Centers

5th International Symposium on Cloud Computing, Trusted Computing and Secure Virtual Infrastructures - Cloud and Trusted Computing (C&TC 2015)

  Virtual Machine Introspection with Xen on ARM

2nd Workshop on Security in highly connected IT systems (SHCIS)

  Blind Format String Attacks

Proceedings of the 10th International Conference on Security and Privacy in Communication Networks (SecureComm 2014)

2014   Code Validation for Modern OS Kernels

Workshop on Malware Memory Forensics (MMF)

  Pitfalls of virtual machine introspection on modern hardware

1st Workshop on Malware Memory Forensics (MMF)

  Multi-tiered Security Architecture for ARM via the Virtualization and Security Extensions

1st Workshop on Security in highly connected IT systems

  Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data

Proceedings of the 23rd USENIX Security Symposium

  Persistent Data-only Malware: Function Hooks without Code

Proceedings of the 21th Annual Network & Distributed System Security Symposium (NDSS)

2013   Security Issues of Multi-Core Architectures—The Automotive Case

it-Information Technology

2012   Driving Automotive Middleware Towards a Secure IP-based Future

10th conference for Embedded Security in Cars (Escar'12)