Tilo Müller

Prof. Dr.-Ing. Tilo Müller

Department of Computer Science
Chair of Computer Science 1 (IT Security Infrastructures)

I am head of the System Security Group at FAU.

Starting October 1st 2021, I am a professor at Hof University of Applied Sciences.

 

Short Bio

I studied computer science at the RWTH Aachen University and the Helsinki University of Technology (TKK). In June 2010, I received my diploma with distinction. From 2010 to 2013, I worked on my PhD thesis about the security of full disk encryption at FAU Erlangen-Nürnberg. After receiving my doctoral degree, I started working at FAU as the head of the Systems Security Group, affiliated to the chair of IT Security Infrastructures. My research interests are located in the area between IT security and systems programming. Currently my field of work includes, but is not limited to, Trusted Execution Environments (TEEs), Mobile Security, Embedded and IoT Devices, Reverse Engineering and Program Analysis.

 

List of Publications

For an overview of my most cited work, please have a look to Google Scholar.

2023

  • Röckl, Jonas ; Wagenhäuser, Adam ; Müller Tilo: Veto – Prohibit Outdated Edge System Software from Booting. In 9th International Conference on Information Systems Security and Privacy (ICISSP), February 22 – Februar 24, 2023, Lisbon, Portugal

2022

  • Jung, Benedikt ; Eichler, Christian ; Röckl, Jonas ; Schlenk, Ralph ; Hönig, Timo ; Müller, Tilo: Trusted Monitor – TEE-Based System Monitoring (Best Paper Award). In: Brazilian Computer Society (Hrsg.) : Proceedings of the XII Brazilian Symposium on Computing Systems Engineering (SBESC 2022). November 21 – 24 2022, Fortaleza, Brazil.
  • Dreissig, Felix ; Röckl, Jonas ; Müller, Tilo: Compiler-Aided Development of Trusted Enclaves with Rust. In: ACM (Hrsg.) : Proceedings of the 17th International Conference on Availability, Reliability and Security (ARES 2022). August 23 – August 26 2022, University of Vienna, Austria.
  • Joschua Schilling ; Tilo Müller: VANDALIR — Vulnerability Analyses based on Datalog and LLVM-IR. In: 19th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2022), Cagliari, Italy (June 29th – July 1st, 2022).
  • Tobias Groß ; Tobias Schleier ; Tilo Müller: ReFuzz — Structure Aware Fuzzing of Microsoft’s Resilient File System (ReFS). In: 17th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2022), Nagasaki, Japan (May 30th – June 3rd, 2022).
  • Aurélien Thierry ; Tilo Müller: A Systematic Approach to Understanding MACB Timestamps on Unix-like Systems. In: Digital Forensics Research Conference (DFRWS) EU 2021 (Virtual Conference, 28.3. – 31.3.2022).

2021

  • Groß, Tobias ; Busch, Marcel ; Müller, Tilo: One Key to Rule Them All: Recovering the Master Key from RAM to break Android’s File-Based Encryption (Best Paper Award). In: Digital Forensics Research Conference (DFRWS) EU 2021 (Virtual Conference, 29.3. – 1.4.2021).
  • Faust, Fabian ; Thierry, Aurelien ; Müller, Tilo ; Freiling, Felix: Selective Imaging of File System Data on Live Systems (Extended Abstract). In: Digital Forensics Research Conference (DFRWS) EU 2021 (Virtual Conference, 29.3. – 1.4.2021).
  • Röckl, Jonas ; Protsenko, Mykolai ; Huber, Monika ; Müller, Tilo ; Freiling, Felix: Advanced System Resiliency Based on Virtualization Techniques for IoT Devices. In: Annual Computer Security Applications Conference (ACSAC) 2021 (Virtual Conference, 6.12. – 10.12.2021).

2020

  • Müller, Nico ; Müller, Tilo ; Freiling, Felix: Urheberrecht vs. Sicherheitsanalyse: Zivilrechtliche Aspekte der Sicherheitsforschung. In: Gesellschaft für Informatik (GI) (Hrsg.) : GI SICHERHEIT 2020 (Sicherheit – Schutz und Zuverlässigkeit, Göttingen, 17.3. – 20.3.2020).
  • Busch, Marcel ; Westphal, Johannes ; Müller, Tilo: Unearthing the TrustedCore: A Critical Review on Huawei’s Trusted Execution Environment (Best Paper Award). In: Proceedings of the 14th USENIX Workshop on Offensive Technologies (WOOT) co-located with the 29th USENIX Security Symposium (USENIX Security 2020). August 11, 2020.
  • Kalysch, Anatoli ; Deutel, Mark ; Müller, Tilo: Template-based Android Inter Process Communication Fuzzing. In: ACM (Hrsg.) : Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES 2020). August 25 – August 28 2020, University College Dublin, Ireland.
  • Kalysch, Anatoli ; Schilling, Joschua ; Müller, Tilo: On the Evolution of Security Issues in Android App Versions. In: Gadyatskaya, Olga ; Losiouk, Eleonora ; Portokalidis, Georgios (Hrsg.) : ACNS SecMT2020 Workshop, Rome, Italy (19.10. – 22.10.2020).

2019

  • Groß, Tobias ; Ahmadova, Matanat ; Müller, Tilo: Analyzing Android’s File-Based Encryption. In: ACM (Hrsg.) : Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019) (International Workshop on Security of Mobile Applications (IWSMA 2019), Canterbury, United Kingdom, 26.08.2019).
  • Prechtel, David ; Groß, Tobias ; Müller, Tilo: Evaluating Spread of ‘Gasless Send’ in Ethereum Smart Contracts (Best Paper Award). In: IEEE (Hrsg.) : 10th IFIP International Conference on New Technologies, Mobility & Security (NTMS 2019) (2nd International Workshop on Blockchains and Smart Contracts (BSC 2019), Canary Islands – Spain, 24.06.2019). 2019.
  • Bove, Davide ; Müller, Tilo: Investigating Characteristics of Attacks on Public Cloud Systems. In: IEEE (Hrsg.) : 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2019, Paris, June 21-23, 2019).

2018

  • Freiling, Felix ; Groß, Tobias ; Latzo, Tobias ; Müller, Tilo ; Palutke, Ralph: Advances in Forensic Data Acquisition. In: Design and Test 35 (2018), Nr. 5
  • Maene, Pieter ; Götzfried, Johannes ; Müller, Tilo ; de Clercq, Ruan ; Freiling, Felix ; Verbauwhede, Ingrid: Atlas: Application Confidentiality in Compromised Embedded Systems. In: IEEE Transactions on Dependable and Secure Computing (2018).
  • Haupert, Vincent ; Maier, Dominik ; Schneider, Nicolas ; Krisch, Julian ; Müller, Tilo: Honey, I Shrunk Your App Security: The State of Android App Hardening. In: Giuffrida, Cristiano ; Bardin, Sébastien ; Blanc, Gregory (Hrsg.) : Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2018, Paris, 28. – 29.06.2018). Cham, Switzerland : Springer International Publishing, 2018
  • Kalysch, Anatoli ; Bove, Davide ; Müller, Tilo: How Android’s UI Security is Undermined by Accessibility. In: ACM International Conference Proceedings Series (ICPS) (Hrsg.) : Proceedings of the 2nd Reversing and Offensive-oriented Trends Symposium (ROOTS, Vienna, Austria, 29.11. – 30.11.2018). New York, NY, USA : ACM, 2018, S. 3:1-10.
  • Afonso, Vitor ; Kalysch, Anatoli ; Müller, Tilo ; Oliveira, Daniela ; Gregio, Andre ; Geus, Paulo: Lumus: Dynamically Uncovering Evasive Android Applications. In: Chen, Liqun ; Manulis, Mark (Hrsg.) : Information Security – 21th International Conference (ISC 2018, London, UK, 09.09. – 12.09.2018). London, UK : Springer, 2018, S. 123-133.
  • Haupert, Vincent ; Müller, Tilo: On App-based Matrix Code Authentication in Online Banking. In: Furnell, Steven ; Mori, Paolo ; Camp, Olivier (Hrsg.) : Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP 2018, Funchal, Madeira, Portugal, 22.01. – 24.01.2017).
  • Übler, David ; Götzfried, Johannes ; Müller, Tilo: Secure Remote Computation using Intel SGX. In: Langweg, Hanno ; Meier, Michael (Hrsg.) : Sicherheit 2018 (Sicherheit, Schutz und Zuverlässigkeit, Konstanz, 25.04 – 27.04.2018). Bd. 9, 1. Aufl. Bonn : Köllen Druck+Verlag GmbH, 2018, S. 195-205. (Konferenzband der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) Bd. LNI).
  • Kalysch, Anatoli ; Milisterfer, Oskar ; Protsenko, Mykolai ; Müller, Tilo: Tackling Android’s Native Library Malware with Robust, Efficient and Accurate Similarity Measures. In: SBA Research (Hrsg.) : ARES 2018: International Conference on Availability, Reliability and Security (International Conference on Availability, Reliability and Security Proceedings 2018, Hamburg, Germany, 27.08. – 30.08.2018). Hamburg : ACM, 2018, S. 133-143.
  • Titouan Lazard ; Götzfried, Johannes ; Müller, Tilo ; Gianni Santinelli ; Vincent Lefebvre: TEEshift: Protecting Code Confidentiality by Selectively Shifting Functions into TEEs (Best Paper Award). In: ACM (Hrsg.) : 3rd Workshop on System Software for Trusted Execution (SysTEX’18, Toronto, ON, Canada, 15.10.2018).
  • Lefebvre, Vincent ; Santinelli, Gianni ; Müller, Tilo ; Götzfried, Johannes: Universal Trusted Execution Environments for Securing SDN/NFV Operations. In: SBA Research (Hrsg.) : ARES 2018: International Conference on Availability, Reliability and Security (International Conference on Availability, Reliability and Security Proceedings 2018, Hamburg, Germany, 27.08. – 30.08.2018).

2017

  • Busch, Marcel ; Protsenko, Mykolai ; Müller, Tilo: A Cloud-Based Compilation and Hardening Platform for Android Apps. In: SBA Research (Hrsg.) : 12th International Conference on Availability, Reliability and Security (ARES’17, Reggio Calabria, Italy, 29.08. – 01.09.2017).
  • Baumann, Richard ; Protsenko, Mykolai ; Müller, Tilo: Anti-ProGuard: Towards Automated Deobfuscation of Android Apps. In: ACM ICPS ; co-located with DISCOTEC (Hrsg.) : 4th Workshop on Security in highly connected IT systems (SHCIS ’17, Neuchâtel, Switzerland, 19-22 June 2017).
  • Götzfried, Johannes ; Eckert, Moritz ; Schinzel, Sebastian ; Müller, Tilo: Cache Attacks on Intel SGX. In: ACM (Hrsg.) : Proceedings of the Tenth European Workshop on System Security (EuroSec’17, Belgrade, Serbia, 12.02.2017).
  • Maene, Pieter ; Götzfried, Johannes ; de Clercq, Ruan ; Müller, Tilo ; Freiling, Felix ; Verbauwhede, Ingrid: Hardware-Based Trusted Computing Architectures for Isolation and Attestation. In: IEEE Transactions on Computers 67 (2017), Nr. 3, S. 361-374.
  • Haupert, Vincent ; Maier, Dominilk ; Müller, Tilo: Paying the Price for Disruption: How a FinTech Allowed Account Takeover. In: ACM International Conference Proceedings Series (ICPS) (Hrsg.) : Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium (ROOTS, Vienna, Austria, 16.11 – 17.11.2017).
  • Groß, Tobias ; Müller, Tilo: Protecting JavaScript Apps from Code Analysis. In: ACM ICPS ; co-located with DISCOTEC (Hrsg.) : 4th Workshop on Security in highly connected IT systems (SHCIS ’17, Neuchâtel, Switzerland, 19-22 June 2017).
  • Haupert, Vincent ; Müller, Tilo: Rest In Protection: A Kernel-Level Approach to Mitigate RIP Tampering. In: Mori, Paolo ; Furnell, Steven ; Camp, Olivier (Hrsg.) : Proceedings of the 3rd International Conference on Information Systems Security and Privacy (ICISSP 2017, Porto, Portugal, 19.02. – 21.02.2017).
  • Noorman, Job ; Van Bulck, Jo ; Mühlberg, Jan Tobias ; Piessens, Frank ; Maene, Pieter ; Preneel, Bart ; Verbauwhede, Ingrid ; Götzfried, Johannes ; Müller, Tilo ; Freiling, Felix:
    Sancus 2.0: A Low-Cost Security Architecture for IoT Devices. In: ACM Transactions on Privacy and Security 20 (2017), Nr. 3, S. 7:1-7:33.
  • Kalysch, Anatoli ; Götzfried, Johannes ; Müller, Tilo: VMAttack: Deobfuscating Virtualization-Based Packed Binaries. In: SBA Research (Hrsg.) : 12th International Conference on Availability, Reliability and Security (ARES’17, Reggio Calabria, Italy, 29.08. – 01.09.2017).

2016

  • Dresel, Lukas ; Protsenko, Mykolai ; Müller, Tilo: ARTIST: The Android Runtime Instrumentation Toolkit. In: SBA Research (Hrsg.) : 11th International Conference on Availability, Reliability and Security (ARES’16 Salzburg, Austria 31.08. – 02.09.2016).
  • Haupert, Vincent ; Müller, Tilo: Auf dem Weg verTAN: Über die Sicherheit App-basierter TAN-Verfahren. In: Gesellschaft für Informatik (GI) (Hrsg.) : GI SICHERHEIT 2016 (Sicherheit – Schutz und Zuverlässigkeit Bonn 05.4. – 07.4.2016).
  • Hahn, Sebastian ; Protsenko, Mykolai ; Müller, Tilo: Comparative Evaluation of Machine Learning-based Malware Detection on Android. In: Gesellschaft für Informatik (GI) (Hrsg.) : GI SICHERHEIT 2016 (Sicherheit – Schutz und Zuverlässigkeit, Bonn, 05.4. – 07.4.2016).
  • Müller, Tilo: Das Smartphone als sichere Besitzkomponente in der Zwei-Faktor-Authentifizierung?Vortrag: Datenschutz und Datensicherheit (DuD 2016), COMPUTAS, Berlin, 13.06.2016
  • Würstlein, Alexander ; Gernoth, Michael ; Götzfried, Johannes ; Müller, Tilo: Exzess: Hardware-based RAM Encryption against Physical Memory Disclosure. In: Springer (Hrsg.) : Architecture of Computing Systems (ARCS’16 Nuremberg, Germany 04.04. – 07.04.2016).
  • Götzfried, Johannes ; Dörr, Nico ; Palutke, Ralph ; Müller, Tilo: HyperCrypt: Hypervisor-based Encryption of Kernel and User Space. In: SBA Research (Hrsg.) : 11th International Conference on Availability, Reliability and Security (ARES’16 Salzburg, Austria 31.08. – 02.09.2016).
  • Richter, Lars ; Götzfried, Johannes ; Müller, Tilo: Isolating Operating System Components with Intel SGX. In: ACM (Hrsg.) : 1st Workshop on System Software for Trusted Execution (SysTEX’16 Trento, Italy 12.12. – 16.12.2016).
  • Drescher, Gabor ; Erhardt, Christoph ; Freiling, Felix ; Götzfried, Johannes ; Lohmann, Daniel ; Maene, Pieter ; Müller, Tilo ; Verbauwhede, Ingrid ; Weichslgartner, Andreas ; Wildermann, Stefan:
    Providing security on demand using invasive computing. In: it – Information Technology 58 (2016), Nr. 6
  • Götzfried, Johannes ; Müller, Tilo ; Drescher, Gabor ; Nürnberger, Stefan ; Backes, Michael : RamCrypt: Kernel-based Address Space Encryption for User-mode Processes. In: ACM SIGSAC (Hrsg.) : 11th ACM Asia Conference on Computer and Communications Security (ASIACCS’16 Xi’an, China 30.05. – 3.06.16).

2015

  • Seitzer, Maximilian ; Gruhn, Michael ; Müller, Tilo: A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory. In: SBA Research (Ed.): 20th European Symposium on Research in Computer Security (ESORICS’15 Vienna, Austria 21.09. – 25.09.2015).
  • Maier, Dominik ; Protsenko, Mykola ; Müller, Tilo: A Game of Droid and Mouse: The Threat of Split-Personality Malware on Android. In: Weippl, Edgar (Ed.): Computers and Security (COSE). Bd. 52, 1. Aufl. Amsterdam: Elsevier, 2015, p. 1-38.
  • Busch, Marcel ; Protsenko, Mykola ; Müller, Tilo: Automated Malware Analysis for Android: A Comparative Evaluation. In: SBA Research ; co-located with ESORICS 2015 (Ed.): 2nd Workshop on Security in highly connected IT systems (SHCIS ’15 Vienna, Austria 21.09. – 25.09.2015).
  • Fischer, Andreas ; Kittel, Thomas ; Kolosnjaji, Bojan ; Lengyel, Tamas K. ; Mandarawi, Waseem ; Meer, Hermann ; Müller, Tilo ; Protsenko, Mykolai ; Reiser, Hans P. ; Taubmann, Benjamin ; Weishäupl, Eva: CloudIDEA: A Malware Defense Architecture for Cloud Data Centers. In: Debruyne, Christophe ; Panetto, Hervé ; Meersman, Robert ; Dillon, Tharam ; Weichhart, Georg ; An, Yuan ; Ardagna, Agostino Claudio (Hrsg.) : On the Move to Meaningful Internet Systems: OTM 2015 Conferences: Confederated International Conferences: CoopIS, ODBASE, and CTC 2015, Rhodes, Greece, October 26-30, 2015. Proceedings. Cham : Springer International Publishing, 2015, S. 594-611.
  • Protsenko, Mykola ; Kreuter, Sebastien ; Müller, Tilo: Dynamic Self-Protection and Tamperproofing for Android Apps using Native Code. In: SBA Research (Ed.): 10th International Conference on Availability, Reliability and Security (ARES’15 Toulouse, France 24.08. – 28.08.2015).
  • Naumann, Jennifer ; Protsenko, Mykola ; Müller, Tilo: Google Verify Apps: The Illusion of Security? In: SBA Research ; co-located with ESORICS 2015 (Ed.): 2nd Workshop on Security in highly connected IT systems (SHCIS ’15 Vienna, Austria 21.09. – 25.09.2015).
  • Götzfried, Johannes ; Hampel, Johannes ; Müller, Tilo: Physically Secure Code and Data Storage in Autonomously Booting Systems (Short Paper). In: SBA Research (Ed.): 10th International Conference on Availability, Reliability and Security (ARES’15 Toulouse, France 24.08. – 28.08.2015).
  • Protsenko, Mykola ; Müller, Tilo: Protecting Android Apps against Reverse Engineering by the Use of the Native Code. In: DEXA Society (Ed.): 12th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’15 Valencia, Spain 01.09-02.09.2014).
  • Anikeev, Maxim ; Freiling, Felix ; Götzfried, Johannes ; Müller, Tilo: Secure garbage collection: Preventing malicious data harvesting from deallocated Java objects inside the Dalvik VM. In: Journal of Information Security and Applications. Amsterdam : Elsevier, 2015, S. 81-86.
  • Kugler, Christopher ; Müller, Tilo: Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits. In: European Alliance for Innovation (EAI) ; Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (ICST) (Ed.): Endorsed Transactions on Security and Safety. Open Access: EAI ICST, 2015
  • Götzfried, Johannes ; Müller, Tilo ; de Clercq, Ruan ; Maene, Pieter ; Freiling, Felix ; Verbauwhede, Ingrid: Soteria: Offline Software Protection within Low-cost Embedded Devices. In: ACM (Hrsg.) : Proceedings of the 31th Annual Computer Security Applications Conference (ACSAC’15 Los Angeles, California, USA 07.12. – 11.12.2015).

2014

  • Müller, Tilo ; Freiling, Felix: A Systematic Assessment of the Security of Full Disk Encryption. In: Transactions on Dependable and Secure Computing (TDSC). Bd. PP, 99. Aufl. Washington: IEEE, 2014.
  • Götzfried, Johannes ; Müller, Tilo: Analysing Android’s Full Disk Encryption Feature. In: You, Ilsun ; Innovative Information Science & Technology Research Group (ISYOU) (Ed.): Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. Bd. 5, 1. Aufl. Korea: JoWUA, 2014.
  • Protsenko, Mykola ; Müller, Tilo: Android Malware Detection based on Software Complexity Metrics. In: DEXA Society (Ed.): 11th International Conference on Trust, Privacy & Security in Digital Business (TrustBus’14 Munich, Germany 01.09-05.09.2014).
  • Maier, Dominik ; Müller, Tilo ; Protsenko, Mykola: Divide-and-Conquer: Why Android Malware cannot be stopped. In: SBA Research (Ed.): 9th International Conference on Availability, Reliability and Security (ARES’14 Fribourg, Switzerland 08.09.-12.09.2014).
  • Zhuang, Yan ; Protsenko, Mykola ; Müller, Tilo ; Freiling, Felix: Measuring the Strength of Source Code Obfuscation Revisited. In: DEXA Society (Ed.): 1st Workshop on Security in highly connected IT systems (SHCIS ’14 Munich, Germany 01.09.-05.09.2014).
  • Götzfried, Johannes ; Müller, Tilo: Mutual Authentication and Trust Bootstrapping towards Secure Disk Encryption. In: Transactions on Information and System Security (TISSEC). Bd. 17, 2. Aufl. New York: ACM, 2014.
  • Hilgers, Christian ; Macht, Holger ; Müller, Tilo ; Spreitzenbarth, Michael: Post-Mortem Memory Analysis of Cold-Booted Android Devices. In: German Informatics Society (GI) ; SIDAR (Ed.): Proceedings of the 8th International Conference on IT Security Incident Management and IT Forensics (IMF 2014 Münster 12.5. – 14.5.).
  • Kugler, Christopher ; Müller, Tilo: SCADS: Separated Control- and Data-Stacks (Best Student Paper Award). In: ICST (The Institute for Computer Sciences, Social Informatics and Telecommunications Engineering) (Ed.): 10th International Conference on Security and Privacy in Communication Networks (SecureComm ’14 Beijing, China 24.9.-26.9.2014).
  • Sibinger, Christoph ; Müller, Tilo: Verwendung von Festplattenvollverschlüsselung im privaten und geschäftlichen Umfeld. In: Gesellschaft für Informatik (GI) (Orga.): GI SICHERHEIT 2014 (Sicherheit – Schutz und Zuverlässigkeit Wien 19.3. – 21.3.2014).

2013

  • Götzfried, Johannes ; Müller, Tilo: ARMORED: CPU-bound Encryption for Android-driven ARM Devices. In: IEEE Computer Society (Ed.): Proceedings of the 8th International Conference on Availability, Reliability and Security (ARES 2013 Regensburg 02.09.2013).
  • Götzfried, Johannes ; Müller, Tilo: Fast Software Encryption with SIMD (How to speed up symmetric block ciphers with the AVX/AVX2 instruction set). In: ACM (Ed.): Proceedings of the Third European Workshop on System Security (EUROSEC 2013 Prag 14.4.2013).
  • Müller, Tilo ; Spreitzenbarth, Michael: FROST – Forensic Recovery of Scrambled Telephones. In: Safavi-Naini, Rei ; Locasto, Michael (Orga.): International Conference on Applied Cryptography and Network Security (ACNS 2013 Banff, Alberta, Canada 25-28.6.2013).
  • Gruhn, Michael ; Müller, Tilo: On the Practicability of Cold Boot Attacks. In: IEEE Conference Publications (Ed.): Eighth International Conference on Availability, Reliability and Security (ARES), 2013 (ARES 2013 Regensburg 02.09.2013).
  • Müller, Tilo: On the Security of Full Disk Encryption (dt. Zur Sicherheit von Festplattenvollverschlüsselungen). Erlangen, FAU Erlangen-Nürnberg, Disseration, 2013. – 138 pages.
  • Protsenko, Mykola ; Müller, Tilo: PANDORA Applies Non-Deterministic Obfuscation Randomly to Android. In: Osorio, Fernando C. (Orga.): 8th International Conference on Malicious and Unwanted Software (Malware 2013 (“The Americas”) Fajardo, Puerto Rico, USA 22-24.10.2013).
  • Garmany, Behrad ; Müller, Tilo: PRIME: Private RSA Infrastructure for Memory-less Encryption (Outstanding Paper Award). In: ACM (Ed.): Applied Computer Security Associates (ACSA) (Orga.): Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC 2013 New Orleans, Louisiana, USA 9-13.12.2013).
  • Müller, Tilo ; Spath, Hans ; Mäckl, Richard ; Freiling, Felix: STARK Tamperproof Authentication to Resist Keylogging. In: International Financial Cryptography Association (Ed.): Proceedings of FC2013 (Financial Cryptography and Data Security 2013 Okinawa, Japan 1-5.4.2013).
  • Spreitzenbarth, Michael ; Müller, Tilo: Tools and Processes for Forensic Analyses of Smartphones and Mobile Applications. Talk: 7th International Conference on IT Security Incident Management and IT Forensics (IMF 2013), German Informatics Society (GI), Nuremberg, 14.03.2013

2012

  • Müller, Tilo ; Latzo, Tobias ; Freiling, Felix: (Un)Sicherheit Hardware-basierter Festplattenverschlüsselung. Talk: 29th Chaos Communication Congress (29c3): Not my department, Chaos Computer Club (CCC), Hamburg, 28.12.2012
  • Müller, Tilo ; Latzo, Tobias ; Freiling, Felix: Self-Encrypting Disks pose Self-Decrypting Risks: How to break Hardware-based Full Disk Encryption. Erlangen: Friedrich-Alexander-Universität Erlangen-Nürnberg. 2012. – Technical Report. 10 pages
  • Müller, Tilo ; Taubmann, Benjamin ; Freiling, Felix: TreVisor — OS-Independent Software-Based Full Disk Encryption Secure Against Main Memory Attacks. In: Zhou, Jianying (Orga.): International Conference on Applied Cryptography and Network Security (ACNS 2012 Singapur 26-29.6.2012).

2011

  • Benenson, Zinaida ; Dewald, Andreas ; Eßer, Hans-Georg ; Freiling, Felix ; Müller, Tilo ; Moch, Christian ; Vömel, Stefan ; Schinzel, Sebastian ; Spreitzenbarth, Michael ; Stock, Ben ; Stüttgen, Johannes: Exploring the Landscape of Cybercrime. In: Markatos, Evangelos ; Zanero, Stefano (Ed.): Proceedings of the First SysSec Workshop (SysSec 2011 Amsterdam 6.7.2011). Amsterdam: Free University, 2011, p. 69-72.
  • Müller, Tilo ; Freiling, Felix ; Dewald, Andreas: TRESOR Runs Encryption Securely Outside RAM. In: USENIX Association (Ed.): Proceedings of the 20th USENIX Security Symposium (20th USENIX Security Symposium San Francisco, CA 10-12.8.2011).
  • Müller, Tilo: TRESOR: Festplatten sicher verschlüsseln. Talk: 28th Chaos Communication Congress (28c3): Behind Enemy Lines, FAU Erlangen-Nürnberg, Berlin, 29.12.2011

2010

  • Müller, Tilo ; Dewald, Andreas ; Freiling, Felix: AESSE: A Cold-boot Resistant Implementation of AES. In: ACM (Ed.): Proceedings of the Third European Workshop on System Security (EUROSEC 2010 Paris 13.8.2010). 2010, p. 42-47.
  • Müller, Tilo: Cold-Boot Resistant Implementation of AES in the Linux Kernel. Aachen, Rheinisch-Westfälische Technische Hochschule, Dipl-Arb., 2010 (Otto Spaniol, Felix Freiling und Andreas Dewald). – 110 pages.

 

Academic Activities

Program Chair

  • ARES 2021: 16th International Conference on Availability, Reliability and Security, TU Wien, Vienna, Austria, August 17 – 20, 2021 (in cooperation with Prof. Dr.-Ing. Delphine Reinhardt)
  • DAPRO 2014: Workshop on Data Protection in Mobile and Pervasive Computing in parallel to the SecureComm Conference 2014, Beijing, China (in cooperation with Prof. Jingqiang Lin)

Committee Member

  • 9th DFRWS Digital Forensics Research Conference in Europe (DFRWS EU 2022)
  • 6th IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob 2021)
  • 8th DFRWS Digital Forensics Research Conference in Europe (DFRWS EU 2021)
  • 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020)
  • 4th Workshop on System Software for Trusted Execution (SysTEX 2019), co-located with SOSP’19
  • 5th IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob 2019)
  • 2nd ACM Computer Science in Cars Symposium (CSCS2018) – Future Challenges in AI & Security for Autonomous Vehicles
  • 4th Workshop on Security in Highly Connected IT Systems (SHCIS 2017), co-located with DisCoTec’17
  • 4th DFRWS Digital Forensics Research Conference in Europe (DFRWS EU 2017)
  • 1st Workshop on System Software for Trusted Execution (SysTEX 2016), co-located with ACM/USENIX Middleware’16
  • 2nd Workshop on Security in Highly Connected IT Systems (SHCIS 2015), co-located with ESORICS’15
  • Communications and Information Systems Security (CISS) in the IEEE Intern. Conference on Communications (ICC 2014)

Reviewer

  • Springer Wireless Networks (WINE) 2020: The Journal of Mobile Communication, Computation and Information
  • 7th DFRWS Digital Forensics Research Conference in Europe (DFRWS EU 2020)
  • Wiley Engineering Reports (EngReports) 2019: Open-Access Journal on Engineering and Computer Science
  • ACM Transactions on Privacy and Security (TOPS) 2018: Journal on Information and System Security and Privacy
  • 33rd IFIP Information Security Conference & Privacy Conference (IFIP SEC 2018)
  • IEEE Security & Privacy SPSI 2018: Special Issue on Security and Privacy Research in Brazil
  • Springer International Journal of Information Security (IJIS 2018)
  • 32nd IFIP Information Security Conference & Privacy Conference (IFIP SEC 2017)
  • 22nd European Symposium on Research in Computer Security (ESORICS 2017)
  • 31st IFIP Information Security Conference & Privacy Conference (IFIP SEC 2016)
  • 21st European Symposium on Research in Computer Security (ESORICS 2016)
  • 12th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2015)
  • 2nd DFRWS Digital Forensics Research Conference in Europe (DFRWS EU 2015)
  • 30th IFIP Information Security Conference & Privacy Conference (IFIP SEC 2015)
  • 20th European Symposium on Research in Computer Security (ESORICS 2015)
  • The International Conference on Privacy and Security in Mobile Systems (PRISMS 2013)
  • 7th International Conference on IT Incident Management and IT Forensics (IMF 2013)
  • 9th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2012)
  • 8th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2011)
  • 6th European Conference on Computer Network Defense (EC2ND 2010)
  • CAST e.V. Förderpreis IT-Sicherheit 2011