
Sven Matti Schulze
Chair of Computer Science 1 (IT Security Infrastructures)
Research associates
Address
Room: 12.134, Floor: 12
Contact
About Me
I am a PhD candidate in Michael’s information security group. My interests cover many aspects of the research on systems and their security, with a focus on Confidential Computing, Trusted Execution Environments, and Virtualization.
Furthermore, I am a member of FAU’s Security Operations Center (SOC), where I am primarily responsible for vulnerability management at our university.
From October 2025 to February 2026, I also interned in NVIDIA’s Networking Architecture Security Research team.
- Hacker Project [WiSe 25/26], with Davide Bove, Maximilian Eichhorn, Ella Savchenko, Jonas Röckl, Julian Funk, and Julian Geus
- Angewandte Informationssicherheit [SoSe25] Guest Lecture on Vulnerability Management
- Web Security Übung [SoSe 25], with Julian Geus
- Hacker Project [WiSe 24/25], with Christian Lindenmeier, Maximilian Eichhorn, Ella Savchenko, Jonas Röckl, and Julian Geus
- Angewandte Informationssicherheit [SoSe24] Guest Lecture on Vulnerability Management
- Web Security Übung [SoSe 24], with Julian Geus
- Hacker Project [WiSe 23/24], with Christian Lindenmeier, Davide Bove, Ralph Palutke, Jonas Röckl, and Julian Geus
- Angewandte Informationssicherheit [SoSe23] Guest Lecture on Vulnerability Management
- Web Security Übung [SoSe 23], with Julian Geus
- , Bergmann P., & Freiling F.:
TrustLeech: Privileged System Analysis using Nested Virtualization
To appear in: ACSAC ’25: Proceedings of the 41th Annual Computer Security Applications Conference (ACSAC) - , , Funk J., Bernsdorf, N., :
Safeguarding Data from Deprecated System Software: A Resilient Boot Architecture for Edge Devices Leveraging TEEs
In: Lenzini, G., Mori, P., Furnell, S. (eds) Information Systems Security and Privacy. ICISSP ICISSP 2023 2024.
Communications in Computer and Information Science, vol 2459. Springer, Cham.
DOI: 10.1007/978-3-031-89518-0_4 - , Funk J., , :
SH3ARS: Privilege Reduction for ARMv8.0-A Secure Monitors
28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Gold Coast, Australia, 2025
In: 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
DOI:10.1109/RAID67961.2025.00035 - Schulze M., , & Freiling F.:
IlluminaTEE: Effective Man-At-The-End Attacks from within ARM TrustZone
Checkmate@CCS 2024 (Salt Lake City, UT, USA, October 14 – October 18, 2024)
In: Proceedings of the 2024 Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks
DOI: 10.1145/3689934.3690838 - , , , :
SyncEmu: Enabling Dynamic Analysis of Stateful Trusted Applications
9th IEEE European Symposium on Security and Privacy Workshops – EUROS&PW 2024 (Vienna, 8. July 2024 – 12. July 2024)
In: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 2024
DOI: 10.1109/EuroSPW61312.2024.00024 - , , , :
Conditional Network Availability: Enhancing Connectivity Guarantees for TEE-Based Services
9th IEEE European Symposium on Security and Privacy Workshops – EUROS&PW 2024 (Vienna, 8. July 2024 – 12. July 2024)
In: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 2024
DOI: 10.1109/EuroSPW61312.2024.00030 - , , :
BarriCCAde: Isolating Closed-Source Drivers with ARM CCA
9th IEEE European Symposium on Security and Privacy Workshops – EUROS&PW 2024 (Vienna, 8. July 2024 – 12. July 2024)
In: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 2024
DOI: 10.1109/EuroSPW61312.2024.00033 - Latzo T., Schulze M., & Freiling F.:
Leveraging Intel DCI for Memory Forensics.
Digital Forensics Research Conference USA (DFRWS US) 2021 (Virtual, 12. July 2021 – 15. July 2021)
In: Proceedings of the Digital Forensics Research Conference USA (DFRWS US) 2021
Open Access: https://dfrws.org/wp-content/uploads/2021/05/2021_USA_paper-leveraging_intel_dci_for_memory_forensics.pdf
If you are enrolled in the Computer Science program at FAU, I can supervise your thesis directly. You can find a list of open theses at our lab in StudOn. Note that not all available open thesis options may be publicly advertised. You can always write a kind email with some information about yourself to matti.schulze@fau.de, and we’ll discuss available options.
Additionally, if you are interested in my topics, you may also want to consider thesis options from my colleagues, Jonas Röckl and Julian Funk.
- Towards Fuzzing ARM-based Co-Processor Firmware:
Co-Supervised by Christian Lindenmeier - Binary Memory Sanitizer:
Co-Supervised by Joschua Schiling - Entering new Realms: Virtual Machine Introspection in Arm CCA-Protected Environments:
Co-Supervised by Jonas Röckl - Emulating the Unknown: Unraveling AMD’s Secure Processor:
Co-Supervised by Christian Lindenmeier - Towards a Driver-Agnostic Peripheral Filter for Arm CCA:
Co-Supervised by Christian Lindenmeier - TrustLeech: Stealthy Runtime System Virtualization through the ARM TrustZone:
Co-Supervised by Jonas Röckl - Towards Software-Based Hardening Techniques for EL3 on Armv8.0-A Systems:
Co-Supervised by Jonas Röckl - Software-Enabled Confidential Computing on Constrained Devices:
Co-Supervised by Jonas Röckl
The following public key can be used to encrypt confidential emails that are sent to me.
More information on PGP is available here. Information in German is available here.
Fingerprint: 393E E836 AF82 BA34 23F1 86F2 0563 DFF3 5BC4 6520
-----BEGIN PGP PUBLIC KEY BLOCK-----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=4DPi
-----END PGP PUBLIC KEY BLOCK-----