Navigation

Prof. Dr.-Ing. Felix Freiling

Felix Freiling
  • Job title: Chairholder
  • Organization: Department of Computer Science
  • Working group: Chair of Computer Science 1 (IT Security Infrastructures)
  • Phone number: +49 9131 85 69901
  • Fax number: +49 9131 85 69919
  • Email: felix.freiling@cs.fau.de
  • Website:
  • Address:
    Martensstr. 3
    91058 Erlangen
    Room 12.159
  • Office hours: Weekly Tue, 17:00 - 18:00, Room 12.159, während des Semesters - Termin vorher mit dem Sekretariat Tel. +49 9131 856900 vereinbaren

 

I am a professor of computer science at Friedrich-Alexander-Universität Erlangen-Nürnberg. In my prior life my research focus for a long time was on fault-tolerant distributed algorithms. Today I focus on computer security and forensic computing. Since I work in the area of applied computer security I am constantly trying to cover my traces: From 2002 to 2010 I worked at five different universities under two different names.

I don’t have any account in social media, so any account with my name is probably somebody else’s.

I support The Cost of Knowledge and currently refrain from reviewing and edtorial services to Elsevier, Springer and Kluwer.

Announcements

My Sprechstunde during winter semester 2018/2019 is Tuesdays between 17:00 and 18:00. Please indicate in advance to Christine Stief if you plan to come.

Felix Freiling’s Email Policy

On December 18, 2008 the number of unanswered messages in my email inbox surpassed 1000. I surrender! On christmas day 2008 I decided to change my email handling policy: In the future, I will treat emails more like I treat telephone calls. I will fix a time interval d and after d time I will completely remove all unanswered email from my inbox that is older than d. This means I will most probably not respond anymore to emails that have not been answered in d time. Currently d is one year, but it may be adjusted. I apologize for any inconvenience this may cause, but I am now convinced that I cannot continue to treat email the same as I treat postal mail. If you need a definitive response from me within a certain time, it is probably more reliable to send a letter by postal mail.

Update in April 2009: d is now 6 months.

Update in July 2009: d is now 2 months.

Update in December 2010: d is now 3 weeks.

Update in January 2012: d is now 1 week

Update in December 2013: d is now 4 days.

Update in December 2014: d is now 2 days.

Update in September 2017: d is now 3 days.

Exams

Students planning an oral examination have the chance to visit such an exam as an observer (Hospitation) beforehand under the condition that they do not disturb the exam and the examined student agrees.

Internship and Employment Opportunities

My lab infrequently offers internships and short or long term employment to interested and well-qualified candidates. I however only reply to normal postal mail or (sometimes) to email which has been sent individually to me. In case you wish to communicate via email and are looking for an internship, please include the code word “ref: nightingale” in the subject of your mail to prove that you prepared an individual email.

Professional activities

Academic Administration/Politics/Honorary Positions

  • 2004-2008: Vorstandsmitglied im GI Beirat der Universitätsprofessoren (GIBU)
  • 2006: Member of the expert commission to evaluate the online voting system for the DFG
  • Sommersemester 2006: Direktor des Instituts für Informatik der Universität Mannheim
  • May 2007-September 2009: Direktor des Instituts für Informatik der Universität Mannheim
  • October 2007: Advisor of the German constitutional court (Bundesverfassungsgericht) in the public hearing on “Online Durchsuchungen”
  • Sommersemester 2008: Prodekan der Fakultät für Mathematik und Informatik der Universität Mannheim
  • Herbstsemester 2008-November 2010: Dekan der Fakultät für Mathematik und Informatik der Universität Mannheim
  • June 2009: Advisor of the German constitutional court (Bundesverfassungsgericht) in the case on “Vorratsdatenspeicherung”
  • May 2011-April 2016: Mitglied des Senats- und Bewilligungsausschusses für die Graduiertenkollegs der DFG
  • since July 2011: Mitglied der Masterzulassungskommission der Technischen Fakultät der FAU
  • since October 2011: Mitglied der Studienkommission des Department Informatik der FAU
  • since July 2012: Vertreter der FAU im Fakultätentag Informatik
  • since November 2012: Mitglied im wissenschaftlichen Beirat der Firma RedTeam Pentesting GmbH, Aachen
  • 2013/2014: Vorsitzender der Jury des 5. Deutschen IT-Sicherheitspreises der Horst Görtz-Stiftung
  • since May 2014: member of the Steering Committee of the International Conference on IT Security Incident Management & IT Forensics (IMF)
  • since September 2014: Mitglied im Aufsichtsrat der Cryptotec AG, Köln
  • October 2014-October 2015: Studiendekan 3 der Technischen Fakultät der FAU
  • since 2015: Mitglied des Nominierungsausschusses für den Dissertationspreis der Gesellschaft für Informatik e.V.
  • July 2015: Advisor of the German constitutional court (Bundesverfassungsgericht) in the case on “BKAG”
  • since October 2015: gewähltes Mitglied im Fakultätsrat der Technischen Fakultät der FAU
  • 2015/2016: Vorsitzender der Jury des 6. Deutschen IT-Sicherheitspreises der Horst Görtz-Stiftung
  • since April 2016: gewähltes Mitglied des Fachkollegiums Informatik der DFG
  • since August 2017: Mitglied im Steuerkreis im BayWISS Verbundkollegs Digitalisierung (BWD} als Vertreter der FAU
  • since November 2017: Sprecher der kollegialen Leitung des Department Informatik der Technischen Fakultät der FAU
  • 2017/2018: Vorsitzender der Jury des 7. Deutschen IT-Sicherheitspreises der Horst Görtz-Stiftung
  • since 1/2018: Mitglied im Vorstand des Fakultätentags Informatik

Research Interests

applied computer security, software security, forensic computing, cybercrime

Reviewed PhD and Habilitation Theses

If my name is given as 1st reviewer, I usually also was the student’s advisor. In other cases the advisor if explicitly credited.  (in Germany

  • Matthias Meixner: HADES – Eine hochverfügbare Main-Memory Datenbank für eventbasierte Systeme. (PhD thesis, 2nd reviewer, 1st reviewer: Prof. Alejandro Buchmann). Defended December 17, 2004, TU Darmstadt.
  • Martin Hutle: Failure Detection in Sparse Networks. (PhD thesis, 2nd reviewer, 1st reviewer: Prof. Ulrich Schmid). Defended October 4, 2005, TU Wien.
  • Erik-Oliver Blaß: Sicherer, aggregierender Datentransport in drahtlosen Sensornetzen. (PhD thesis, 2nd reviewer, 1st reviewer: Prof. Dr. Martina Zitterbart). Defended April 20, 2007, University of Karlsruhe.
  • Dr. Guido Schryen: An analysis of anti-spam measures and the conceptual design of a technological and organizational infrastructure framework for tackling spam e-mails. Habilitation thesis, RWTH Aachen, 2007.
  • Lucia Draque Penso: Distributed Protocols Robust Against Malicious Attacks. (PhD defense committee member with Prof. Maurice Herlihy and Prof. Anna Lysyanskaya). Defended January 30, 2008. Brown University, Providence, RI, USA.
  • Mohammad Torabi Dashti: Keeping Fairness Alive. (PhD defense committee member, advisor was Prof. Wan Fokkink). Defended Februrary 27, 2008. Vrije Universiteit Amsterdam.
  • Wei Zhou: Access Control Model and Policies for Collaborative Environments. (PhD thesis, external reviewer, first reviewer: Prof. Christoph Meinel.) Defended April 27, 2009, Hasso Plattner Institute (HPI), Potsdam.
  • Ionannis Krontiris: Intrusion Prevention and Detection in Wireless Sensor Networks. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Tassos Dimitriou, AIT, Greece). Defended November 13, 2008. University of Mannheim.
  • Zinaida Benenson: Access Control in Wireless Sensor Networks. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Adrian Perrig, CMU). Defended Dec. 19, 2008. University of Mannheim.
  • Oliver Steffen Weiß: A model to quantitavely assess the security of organizations. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Dr. K. Meyer-Wegener, Univ. Erlangen). Defended Feb 20, 2009. Univ. Erlangen.
  • Thorsten Holz: Tracking and Mitigation of Malicious Remote Control Networks. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Christopher Kruegel, UCSB). Defended April 30, 2009. University of Mannheim.
  •  Frank Werner: Applied Formal Methods in Wireless Sensor Networks. (2nd reviewer, 1st reviewer Prof. Dr. P. H. Schmitt, Univ. of Karlsruhe). Defended July 22, 2009. Univ. of Karlsruhe.
  • Timo Warns: Structural Failure Models for Fault-Tolerant Distributed Computing. (PhD thesis, 3rd reviewer, 1st and 2nd reviewers Prof. Dr. Oliver Theel, University of Oldenburg, Prof. Dr. Willi Hasselbring, University of Kiel). Defended Sept, 28, 2009. University of Oldenburg.
  • Michael Becher: Security of Smartphones at the Dawn of Their Ubiquitousness. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Dr. Ulrike Meyer, RWTH Aachen). Defended October 9, 2009. University of Mannheim.
  • Martin Mink: Vergleich von Lehransätzen für die Ausbildung in IT-Sicherheit. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Dr. Simone Fischer-Hübner, Karlstad University, Sweden). Defended Dec 11, 2009. University of Mannheim.
  • Moritz Martens: Properties of Interaction Systems. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Dr. Mila Majster-Cederbaum, University of Mannheim). Defended Dec 18, 2009. University of Mannheim.
  • Roberto Cortinas: Failure Detectors and Communication Efficiency in the Crash and General Omission Failure Models. (Member of PhD defense committee, advisors: Prof. Alberto Laufente, Prof. Iratxe Soraluze, University of the Basque Country, San Sebastian, Spain) Defended April 4, 2011. University of the Basque Country, San Sebastian, Spain.
  • Jan Gerrit Göbel: Large-Scale Detection and Measurement of Malicious Content. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Christopher Krügel, UCSB) Defended April 27, 2011. University of Mannheim.
  • Michael Müter: Embedded Security Concepts for In-Verhicle Systems. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Frank Kargl, University of Twente) Defended May 27, 2011. University of Mannheim.
  • Tobias Limmer: Efficient Network Monitoring for Attack Detection. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Falko Dressler, University of Innsbruck, Austria) Defended June 20, 2011. University of Erlangen.
  • Philipp Trinius: Musterbasiertes Filtern von Schadprogrammen und Spam. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Guido Schryen, University of Regensburg) Defended October 21, 2011. University of Mannheim.
  • Sebastian Schinzel: Unintentional and hidden information leaks in networked software applications. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Jörg Schwenk, Ruhr-University Bochum) Defended April 23, 2012. University of Erlangen.
  • Amir Alsbih: Technische Sicherheitsaspekte bei Kabelnetzbetreibern. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Christian Schindelhauer, University of Freiburg) Defended May 8, 2012. University of Freiburg.
  • Juliane Blechinger: Ein Metadatenrepositorium zum Datenqualitätsmonitoring im Concurrent Engineering. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Richard Lenz, University of Erlangen) Defended July 6, 2012. University of Erlangen.
  • Zhang Fu: Multifaceted Defense Against Distributed Denial of Service Attacks: Prevention, Detection, Mitigation. (PhD thesis, faculty opponent, advisors Marina Papatriantafilou and Philippas Tsigas, Chalmers University of Technology) Defended September 19, 2012. Chalmers University of Technology, Sweden.
  • Andreas Dewald: Formalisierung digitaler Spuren und ihre Einbettung in die forensische Informatik. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Guido Schryen, University of Regensburg) Defended  November 12, 2012. University of Erlangen.
  • Michael Spreitzenbarth: Dissecting the Droid: Forensic Analysis of Android and its Malicious Applications. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Michael Meier, University of Bonn) Defended March 11, 2013. University of Erlangen.
  • Christian Jörn Dietrich: Identification and Recognition of Remote-Controlled Malware. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Christopher Krügel, UCSB) Defended March 28, 2013. University of Mannheim.
  • Joshua Isaac James: Automated Human Inference in Digital Forensic Investigations Using Hypothesis Reduction. (PhD thesis, external examiner, advisor Dr. Pavel Gladyshev, University College Dublin) Defended April 26, 2013. University College Dublin, Ireland.
  • Ralf Hund: Analysis and Retrofitting of Security Properties for Proprietary Software Systems. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Thorsten Holz, Ruhr-Universiy Bochum) Defended April 29, 2013. Ruhr-University Bochum.
  • Carsten Willems: Instrumenting Existing System Componente for Dynamic Analysis of Malicious Software. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Thorsten Holz, Ruhr-University Bochum) Defended April 29, 2013. Ruhr-University Bochum.
  • Christian Gorecki: Dilution – A novel Approach in Preserving Privacy. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Thorsten Strufe, TU Darmstadt) Defended April 30, 2013. University of Mannheim.
  • Steffen Wendzel: Novel Approaches for Network Covert Storage Channels. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Jörg Keller, FernUniversität Hagen) Defended May 7, 2013. FernUniversität Hagen.
  • Johannes Barnickel: Authentication and Identity Privacy in the Wireless Domain. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Ulrike Meyer, RWTH Aachen) Defended June 4, 2013. RWTH Aachen.
  • Tilo Müller: On the security of full disk encryption. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Wolfgang Schröder-Prekschat, FAU) Defended June 5, 2013. FAU
  • Marek Jawurek: Privacy in Smart Grids. (PhD thesis, 1st rewiewer, 2nd reviewer Prof. Günter Müller, University of Freiburg, advisor: Florian Kerschbaum) Defended July 17, 2013. FAU
  • Markus Engelberth: Social Malcode – Benutzerabhängige Schadprogramme. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Thorsten Holz, Ruhr-University Bochum) Defended September 11, 2013. University of Mannheim.
  • Raul Schmidlin Fajardo Silva: Contract Testing for Reliable Embedded Systems. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Reinhard Männer, Universität Heidelberg) Defended November 18, 2013. University of Heidelberg.
  • Stefan Vömel: Forensic Acquisition and Analysis of Volatile Data in Memory. (PhD thesis, 1st reviewer, 2nd reviewer Dr. Pavel Gladyshev, University College Dublin) Defended December 18, 2013. FAU.
  • Christopher Meyer: 20 Years of SSL/TLS Research – An Analysis of the Internet’s Security Foundation. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Jörg Schwenk, Ruhr-Universität Bochum) Defended February 7, 2014, Ruhr-Universität Bochum.
  • Tobias Distler: Resource-efficient Fault and Intrusion Tolerance. (PhD thesis, 3rd reviewer, 1st reviewer: Prof. Wolfgang Schröder-Preikschat, 2nd reviewer: Prof. Rüdiger Kapitza, TU Braunschweig) Defended June 24, 2014. FAU.
  • Frank Breitinger: On the utility of bytewise approximate matching in computer science with a special focus on digital forensics investigations. (PhD thesis, 3rd reviewer, 1st reviewer: Prof. Stefan Katzenbeisser, TU Darmstadt, 2nd reviewer: Prof. Harald Baier, Hochschule Darmstadt) Defended June 30, 2014. TU Darmstadt.
  • Johannes Hoffmann: From Mobile to Security – Towards Secure Smartphones. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Thorsten Holz, Ruhr-Universität Bochum) Defended August 28, 2014. Ruhr-Universität Bochum.
  • Tobias Hoppe: Prävention, Detektion und Reaktion gegen drei Ausprägungsformen automotiver Malware. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Jana Dittmann, Otto von Guericke Universität Magdeburg) Defended December 10, 2014. Otto von Guericke Universität Magdeburg.
  • Christian Moch: Automatisierte Erstellung von Übungsaufgaben in der digitalen Forensik. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Jana Dittmann, Otto-von-Guericke University Magdeburg) Defended January 30, 2015. FAU
  • Hans-Georg Eßer: Design, Implementation and Evaluation of the ULIX Teaching Operating System. (PhD thesis, 1st reviewer, 2nd reviewer PD Daniel Lohmann, FAU) Defended March 23, 2015. FAU
  • Nadina Hintz: Der Einfluss des menschlichen Verhaltens auf die IT-Sicherheit und den Datenschutz. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Simone Fischer-Hübner, Karlstad University, Sweden, advisor: Zinaida Benenson) Defended April 1, 2015. FAU
  • Johannes Stüttgen: On the Viability of Memory Forensics in Compromised Environments. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Michael Meier, University of Bonn) Defended May 28,2015. FAU
  • Matthäus Wander: The Impact of DNSSEC on the Internet Landscape. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Torben Weis, Universität Duisburg-Essen) Defended June 19, 2015. University of Duisburg-Essen
  • Michael Riecker: Lightweight Intrusion Detection in Wireless Sensor Networks. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Matthias Hollick, TU Darmstadt) Defended June 22, 2015. TU Darmstadt
  • Benjamin Stock: Untangling the Web of Client-Side Cross-Site Scripting. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Michael Backes, Saarland University) Defended August 31, 2015. FAU
  • Matthias Stefan Meitner: Quantitative Bewertung der Softwarezuverlässigkeit unter Berücksichtigung der Komponenteninteraktionen. (PhD thesis, 2nd reviewer, 1st reviewer: Prof. Francesca Saglietti, FAU) Defended September 17, 2015. FAU
  • Andreas Kurtz: Dynamic Analysis and Privacy Implications of Apple iOS Apps. (PhD thesis, 1st reviewer, 2nd reviewer: Prof. Hannes Federrath, Universität Hamburg) Defended March 14, 2016. FAU
  • Johannes Formann: Kryptographische Insel zur Realisierung von Angreifertoleranz in redundanten Systemen. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Klaus Echtle, Universität Duisburg-Essen) Defended April 22, 2016. Universität Duisburg-Essen
  • Tobias Wüchner: Behavior-based Malware Detection with Quantitative Data Flow Analysis. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Alexander Pretschner, TU München) Defended July 5, 2016. TU München
  • Carlo Schäfer: Mail Infrastructure Traffic Analyzer – Erkennung kompromittierter E-Mail-Accounts. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Eberhard Zehendner, FSU Jena) Defended October 12, 2016. FSU Jena
  • Dr. Ingmar Baumgart: Dezentrale Systeme zum Schutz der Privatsphäre. Habilitation thesis, Karlsruher Institut für Technologie (KIT), 2016.
  • Michael Gruhn: Forensically Sound Data Acquisition in the Age of Anti-Forensic Innocence. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Zeno Geradts, University of Amsterdam) Defended November, 24, 2016. FAU
  • Johannes Bauer: On Inexpensive Methods for Improving Security of Embedded Systems. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Falko Dressler, University of Paderborn) Defended November 25, 2016. FAU
  • Sven Schindler: Honeypot Architectures for IPv6 Networks. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Bettina Schnor, University of Potsdam) Defended November, 28, 2016. University of Potsdam
  • Aleksandar Milenkoski: Evaluation of Intrusion Detection Systems in Virtualized Environments. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Samuel Kounev, University of Würzburg), Defended between November 28 and December 2, 2016. University of Würzburg
  • Stefan Meier: Digitale Forensik in Unternehmen. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Günther Pernul, University of Regensburg) Defended December, 2, 2016. University of Regensburg
  • Yi-Ching Liao: Process Tracking for Forensic Readiness. (PhD thesis, 1st opponent, 2nd opponent Prof. Delphine Reinhardt, University of Bonn, advisor: Prof. Hanno Langweg, HTW Konstanz and NTNU) Defended December, 16, 2016. NTNU in Gjovik, Norway.
  • Mykolai Protsenko: Securing the Android App Ecosystem: Obfuscation, Tamperproofing, and Malware detection. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Claudia Eckert, TU München, advisor: Tilo Müller) Defended April 12, 2017. FAU
  • Marian Kühnel: Detection of Traffic Initiated by Mobile Malware – Targeting Android Devices in 3GPP Networks. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Ulrike Meyer, RWTH Aachen University) Defended May 24, 2017. RWTH Aachen University
  • Thomas Hupperich: On the Feasibility and Impact of Digital Fingerprinting for System Recognition. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Thorsten Holz, Ruhr-Universität Bochum) Defended June 30, 2017. Ruhr-Universität Bochum
  • Vladislav Mladenov: On the Security of Single Sign-On. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Jörg Schwenk, Ruhr-Universität Bochum) Defended June 30, 2017. Ruhr-Universität Bochum
  • Janis Danisevskis: Accelerated Secure GUI for Virtualized Mobile Handsets. (PhD thesis, 3rd reviewer, 1st reviewer Prof. Jean-Pierre Seifert, TU Berlin, 2nd reviewer Prof. Konrad Rieck, TU Braunschweig) Defended August 15, 2017. TU Berlin
  • Yan Zhuang: Methods for Improving the Quality of Software Obfuscation for Android Applications. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Jingqiang Lin, Chinese Academy of Sciences, PR China) Defended September 26, 2017. FAU
  • Xiaobing He: Threat Assessment for Multistage Cyber Attacks in Smart Grid Communication Networks. (PhD thesis, 3rd reviewer, 1st reviewer Prof. Hermann de Meer, University of Passau, 2nd reviewer Prof. Stefan Rass, University of Klagenfurt, Austria) Defended October 2, 2017. University of Passau
  • Sven Kälber: Automatic Forensic Event Reconstruction based (not only) on File System Metadata. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Konrad Rieck, TU Braunschweig) Defended November 10, 2017. FAU
  • Rene Rietz: Optimization of Network Intrusion Detection Processes. (PhD thesis, 3rd reviewer, 1st reviewer Prof. Hartmut König, BTU Cottbus, 2nd reviewer Prof. Falko Dressler, Universität Paderborn) Defended November 17, 2017. BTU Cottbus
  • Fatih Kilic: Security Investigation in Encrypted Environment. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Claudia Eckert, TU München) Defended November 24, 2017. TU München
  • Johannes Götzfried: Trusted Systems in Untrusted Environments: Protecting Against Strong Attackers. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Ingrid Verbauwhede, KU Leuven, Belgium) Defended December 7, 2017. FAU
  • Thomas Schreck: Incident Response: Current State, Emerging Problems, and New Approaches. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Michael Meier, Universität Bonn) Defended December 18, 2017. FAU
  • Konstantin Sack: Selektion in der Digitalen Forensik. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Michael Meier, Universität Bonn) Defended December 18, 2017. FAU
  • Marc Spisländer: Strukturelle Testverfahren zur Verifikation existentieller temporallogischer Formeln in erweiterten endlichen Zustandsautomaten. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Francesca Saglietti, FAU) Defended November 5, 2018. FAU

Collection of famous citations

“Neuinstallieren skaliert nicht.” (Thorsten Holz, June 18, 2008)

“People have said that computing is a fast moving subject and what they mean is that the wheel of re-incarnation goes faster.”
(Roger Needham in a SIGSOFT interview)

“Der Browser ist ein dreckiges Objekt mit vielen unangenehmen Eigenschaften.” (Martin Johns, March 8, 2012)

 

My GPG Public Key

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=1vZh
-----END PGP PUBLIC KEY BLOCK-----

Statistics

My Erdös number is at most 3 (the path is via Matthias Kirchner and Pete Winkler). If you work(ed) in fault-tolerant distributed computing and want to know your Erdös number, check your collaboration distance to (for example) Shay Kutten, Shlomo Moran, Nicola Santoro or Gerard Tel; all have Erdös number 2.

As of September 2017, my h-index is at least 41 (using Harzing’s PoP application). If I stop working now and citation rates remain the same, my h-index will be over 51 in 10 years, over 59 when I retire, and will reach the maximum of 146 (the number of papers referenced in Google scholar that are cited at least once every two years at time of writing) in about 2000 years.

My most often cited paper is the 2007 IEEE Security & Privacy Magazine article with Willems and Holz on “Toward automated dynamic malware analysis using CWsandbox” (until 2017 around 630 citations).

Images of Felix Freiling

Here are some images of Felix Freiling to upset Google image search. One of the following images shows me. I encourage you to set up a website with a picture of a person and the name “Felix Freiling” associated to it. If you inform me, I will link to such pages from here (to increase the page rank). Here are (somewhat strange) examples (first and second)