Dipl.-Inform. Daniel Plohmann

Wissenschaftlicher Mitarbeiter bei Fraunhofer FKIE

Kontakt
Telefon: +49 228 50212-600
Fax: +49 228 73-4571
E-Mail: plohmann@REMOVETHISPART.cs.uni-bonn.de
Öffentlicher Schlüssel: 0x41D41A44
   
Adresse
  Institut für Informatik 4
Friedrich-Ebert-Allee 144
53113 Bonn
Germany
Raum: Zanderstr. 5, 2.24
 

Research Interests

  • Reverse Engineering
  • Malware Analysis
  • Advanced simulation methods and techniques 

Publications

Teaching


Lectures, Labs, and Seminars

  • WS 2015

    • Seminar: Seminar Selected Topics in Malware Analysis and Computer/Network Security
    • Lab: Malware Analysis

  • SS 2015

    • Project Group: "Malware Bootcamp"

  • SS 2014

    • Lab: Malware Analysis

  • SS 2012

    • Exercises to "Network Security" (lecture by Prof. Dr. Peter Martini, Dr. Jens Tölle and Wolfgang Moll)
    • Project Group: "Malware Bootcamp"
    • Seminar: Seminar Selected Topics in Malware Analysis and Computer/Network Security
    • Lab: Communication and Communicating Devices

  • WS 2011/12

    • Project Group: "Malware Bootcamp"
    • Seminar: Seminar Selected Topics in Malware Analysis and Computer/Network Security

  • SS 2011

    • Guest lecture with topic: "Malware Analysis and Reverse Engineering" as part of "Systemnahe Informatik" (lecture by Prof. Dr. Peter Martini)
    • Exercises to "Network Security" (lecture by Prof. Dr. Peter Martini, Dr. Jens Tölle and Wolfgang Moll)
    • Project Group: "Malware Bootcamp"

  • WS 2010/11
    • Project Group: "Malware Bootcamp"

  • SS 2010

    • Exercises to "Systemnahe Informatik" (lecture by Prof. Dr. Peter Martini)
    • Exercises to "Network Security" (lecture by Prof. Dr. Peter Martini, Dr. Jens Tölle and Wolfgang Moll)
    • Project Group: "Malware Bootcamp"

Supervised Work

  • Flow-based Network Intrusion Detection". Herzog, Marco; Seminar Report, 2015.
  • Malware Classification". Jenke, Thorsten; Seminar Report, 2015.
  • "Domain Generation Algorithm Recognition". Fischer, Sören; Lab Report, 2015.
  • "Ein rekursiver Disassembler". Heiler, Lorenz; Lab Report, 2015.
  • "Deobfuscation of Andromeda API Calls". Frieß, Jens; Lab Report, 2015.
  • "Dumping Malware for Fun and Profit". Bilstein, Felix; Lab Report, 2015.
  • "The many Faces of Malware - Clustering Icons from Malware". Buhl, Lennart; Lab Report, 2014.
  • "Semantic Exploration of Binaries". Guevara, Laura; Master Thesis, 2014.
  • "Clustering von Citadel Packer". Jenke, Thorsten; Bachelor Thesis, 2014.
  • "Asynchronous Tracking of Peer-to-Peer Botnets". Dammann, Julian; Diploma Thesis, 2012.
  • "Code Protection in Android". Schulz, Patrick; Lab Report, 2012.
  • "What the Fuzz?! Fuzzing - Automated software vulnerability discovery". Koch, Jonathan; Seminar Report, 2011.
  • "Heuristiken in Unpacking-Frameworks". Schulz, Patrick; Bachelor Thesis, 2011.