• Skip navigation
  • Skip to navigation
  • Skip to the bottom
Simulate organization breadcrumb open Simulate organization breadcrumb close
Friedrich-Alexander-Universität IT Security Infrastructures Lab
  • FAUTo the central FAU website
  1. Friedrich-Alexander-Universität
  2. Technische Fakultät
  3. Department Informatik
Suche öffnen
  • Campo
  • StudOn
  • FAUdir
  • Jobs
  • Map
  • Help
  1. Friedrich-Alexander-Universität
  2. Technische Fakultät
  3. Department Informatik
Friedrich-Alexander-Universität IT Security Infrastructures Lab
Navigation Navigation close
  • Research
    • Forensic Computing Group
    • Human Factors in Security and Privacy Group
    • Multimedia Security
    • Security Education Development Group
    • System Security Group
    • Information Security Group
    • Archive
    • Funded Projects
    • Publications
    Portal Research
  • Lab
    • Staff & Research Groups
    • Alumni
    • Partners
    • FAU i1 Webshop
    Portal Lab
  • Teaching
    • Courses
    • General Information regarding Teaching/Courses
    • Notes on Examinations
    • eTeaching
    • Theses
    • Writing a Thesis at Informatik 1
    Portal Teaching
  • How to reach us
  1. Home
  2. Research
  3. System Security Group

System Security Group

In page navigation: Research
  • Forensic Computing Group
  • Human Factors in Security and Privacy Group
  • Information Security Group
  • Multimedia Security
  • Security Education Development Group
  • System Security Group
    • AppAuth: On App-based Matrix Code Authentication in Online Banking
    • AppTAN (In)Security: (In)Security of App-based TAN Methods in Online Banking
    • AVX Crypto: AVX Instructions to Accelerate Crypto Primitives
    • Bispe: A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory
    • Centroid
    • CPU-bound Encryption (TRESOR, TreVisor, ARMORED)
    • FROST: Forensic Recovery Of Scrambled Telephones
    • How Android’s UI Security is Undermined by Accessibility
    • HyperCrypt: Hypervisor-based Encryption of Kernel and User Space
    • N26
    • Nomorp
    • On the Prevalence and Usage of TEE-based Features on Android
    • One Key to Rule Them All: Recovering the Master Key from RAM to break Android's File-Based Encryption
    • RamCrypt: Kernel-based Address Space Encryption for User-mode Processes
    • ReFuzz — Structure Aware Fuzzing of the Resilient File System (ReFS)
    • RISCoT - Security Analysis of Trusted Execution Environments on RISC-V
    • SED (In)Security: Hardware-based Full Disk Encryption (In)Security
    • SGX-Kernel: Isolating Operating System Components with Intel SGX
    • SGX-Timing: Cache Attacks on Intel SGX
    • SoK: The Evolution of Trusted UI on Mobile
    • Soteria: Offline Software Protection within Low-cost Embedded Devices
    • STARK / MARK: Tamperproof/Mutual Authentication to Resist Keylogging
    • TEEshift: Protecting Code Confidentiality by Selectively Shifting Functions into TEEs
    • VMAttack: Deobfuscating Virtualization-Based Packed Binaries
  • Archive
  • Funded Projects
  • Publications

System Security Group

Tilo Müller

Prof. Dr.-Ing. Tilo Müller

Department of Computer Science
Chair of Computer Science 1 (IT Security Infrastructures)

  • Email: tilo.mueller@cs.fau.de
  • Website: http://www1.informatik.uni-erlangen.de/staff/mueller

System security covers all aspects of IT security in modern information systems, including the application layer, operating system kernel and hardware level. The goal of our research group is to develop and analyze system components that are used to run user applications in a secure environment. The field of system security does not provide any end-user applications by itself but rather acts as an abstract layer of security for many interdisciplinary scenarios.

In the past, our research comprised user mode code, OS kernel patches, hypervisor code, compiler-level and runtime extensions, as well as the hardware design of embedded and IoT devices. A special focus was put on Android devices, disk encryption, reverse engineering and software protection – such as obfuscation – as well as trusted computing.

Besides the development of defense mechanisms, we regularly look at systems from an attacker’s point of view to analyze their security. Above attention in the academic community, some of our offensive research results gained attention in media, particularly our results on disk encryption, smartphone security and two-factor authentication.

For a list of current group members, please visit our staff site. Former group members who graduated with a PhD are:

  • 2013 – Apr. 2017: Dr.-Ing. Mykolai Protsenko
    “Securing the Android App Ecosystem: Obfuscation, Tamperproofing, and Malware Detection”
  • 2014 – Dec. 2017: Dr.-Ing. Johannes Götzfried
    “Trusted Systems in Untrusted Environments: Protecting against Strong Attackers”
  • 2016 – Jul. 2019: Dr.-Ing. Vincent Haupert
    “Sicherheit mobiler Bankgeschäfte zwischen Innovation und Regulierung”
  • 2016 – Jul. 2020: Dr.-Ing. Anatoli Kaylsch
    “Android Application Hardening: Attack Surface Reduction and IP Protection Mechanisms”
  • 2016 – Okt. 2020: Dr.-Ing. Marcel Busch
    “On the Security of ARM TrustZone-based Trusted Execution Environments”
  • 2017 – Jun. 2022: Dr.-Ing. Tobias Groß
    “Forensic Data Extraction from Modern File Systems”

(Last updated on Jul. 2022)

On the following pages, you find an archive of our open-source projects, media files, and pentesting results. Please note that we do not update research projects once they are finished.

Lehrstuhl für Informatik 1
Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU)

Martensstrasse 3
91058 Erlangen
  • Impressum
  • Datenschutz
  • Barrierefreiheit
  • Facebook
  • RSS Feed
  • Twitter
  • Xing
Up