Research
Recent Peer-Reviewed Publications
Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols
Proceedings of the 27th International Symposium on Recent Advances in Intrusion Detection (RAID),
Are You Sure You Want To Do Coordinated Vulnerability Disclosure?
Proceedings of the 9th International Workshop on Traffic Measurements for Cybersecurity (WTMC),
IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis
Proceedings of the 30th ACM SIGSAC Conference on Computer and Communications Security (CCS),
Pushing Boundaries: An Empirical View on the Digital Sovereignty of Six Governments in the Midst of Geopolitical Tensions
Government Information Quarterly (GIQ) (Volume 40, Issue 4),
Whiteboxgrind – Automated Analysis of Whitebox Cryptography
Proceedings of the 12th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE),
Current Projects
Investigating the Impact of DNS Centralization and Regional Discrepancies on the Security, Stability, Performance, and Resilience of DNS-dependent Applications
Supported by the ICANN Grant Program.Jun 2025–May 2027Analyzing and Understanding the Increasing (Real) Centralization of the Internet
Supported by the Internet Society Foundation.Dec 2023–Nov 2025Testing and Explaining the Limits of Machine Learning for Automated Vulnerability Discovery
Joint project with Prof. Dr. Konrad Rieck (TU Berlin) and Dr. Marcel Böhme (MPI Security & Privacy). Supported by the DFG Excellence Cluster CASA.Oct 2023–Oct 2026A Bayesian Framework for Automated Vulnerability Discovery
Supported by the DFG Excellence Cluster CASA.Sep 2022–Mar 2026IoTIO: Analyzing and Understanding the Internet of Insecure Things
Joint project with Prof. Dr. Martina Lindorfer (TU Wien). Supported by the Vienna Science and Technology Fund (WWTF).Jun 2020–Nov 2025