Ben Swierzy, M.Sc.
Wissenschaftlicher Mitarbeiter
|
Forschungsinteressen
- Netzwerkarchitekturen und -protokolle
- TLS
- Reverse Engineering
- Versionserkennung
- Low-Level/hardwarenahe Themen
Lehre
2024
- Verschleierung von getunnelten TLS-Handshakes zur Zensurumgehung (BA)
2023
- Analyzing the Efficiency of Internet Censorship Measures (BA)
- IT Security: Applied Binary Exploitation (VL)
- IT Security: Domain-specific Automated Software Testing (VL)
- Analyzing the Potency of PLP models for Automated Code Repair (BA)
- Emulation von verteilten Systemen (PG)
- RISC-V Support for the Side Channel CPU Emulator (Lab)
2022
- IT Security: Web Security (VL)
- Security Analysis of a Smart Home Surveillance Camera (Lab)
- Implementierung von symbolischer Ausführung für PHP 8.3 (PG)
- Funktionsweise und Verbreitung von TLS 1.3 (BA)
- Secure Distributed Sensor Networks for Device Location Tracking (MA)
- Physical Layer Key Exchange mit mehreren Antennen brechen (PG)
Veröffentlichungen
B. Swierzy, M. Hoffmann, F. Boes, F. Betke, L. Hein, M. Shevchishin, J. Sohn, M. Meier
TEEM: A CPU Emulator for Teaching Transient Execution Attacks (2024)
Daniel Vogel, Markus Krämer, Ben Swierzy, Daniel Meyer, Michael Meier
On the feasibility of detecting non-cooperative Wi-Fi devices via a single Wi-Fi-Router (2023)
Ben Swierzy, Markus Krämer, Daniel Vogel, Daniel Meyer, Michael Meier
Analyzing the Feasibility of Privacy-Respecting Automated Tracking of Devices Fleeing a Burglary (2023)