Ben Swierzy, M.Sc.

Wissenschaftlicher Mitarbeiter

Kontakt
Telefon: +49 228 73-54218
Fax: +49 228 73-54254
E-Mail: swierzy@REMOVETHISPART.cs.uni-bonn.de
PGP public key: 0xFF117FB4
   
Besucheradresse: Institut für Informatik 4
Friedrich-Hirzebruch-Allee 8
D-53115 Bonn
Germany
Postanschrift: Friedrich-Hirzebruch-Allee 5
Raum: 1.015
 

Forschungsinteressen

  • Versionserkennung
  • TLS
  • Netzwerkarchitekturen und -protokolle
  • Reverse Engineering
  • Low-Level betriebssystemnahe und hardwarenahe Themen

Veröffentlichungen

Ben Swierzy, Timo Pohl, Marc Ohm, Michael Meier
Exploring the Susceptibility to Fraud of Monetary Incentive Mechanisms for Strengthening FOSS Projects (ARES 2025)

Ben Swierzy
Version Detection: Pinpointing Software's Core Characteristics (SPRING 2025)

Maximilian Leiwig, Ben Swierzy, Christian Bungartz, Michael Meier
Analyzing the Potency of Pretrained Transformer Models for Automated Program Repair (SEAA 2024)

Ben Swierzy, Felix Boes, Timo Pohl, Christian Bungartz, Michael Meier
SoK: Automated Software Testing for TLS Libraries (ARES 2024)

B. Swierzy, M. Hoffmann, F. Boes, F. Betke, L. Hein, M. Shevchishin, J. Sohn, M. Meier
TEEM: A CPU Emulator for Teaching Transient Execution Attacks (GI Sicherheit 2024)

Daniel Vogel, Markus Krämer, Ben Swierzy, Daniel Meyer, Michael Meier
On the feasibility of detecting non-cooperative Wi-Fi devices via a single Wi-Fi-Router (IPIN-WiP 2023)

Ben Swierzy, Markus Krämer, Daniel Vogel, Daniel Meyer, Michael Meier
Analyzing the Feasibility of Privacy-Respecting Automated Tracking of Devices Fleeing a Burglary (WiMob 2023)

Lehre

2024

  • Evaluating DevSecOps tools on the example of Flavius (Lab)
  • IT Security: Version Detection (VL)
  • IT Security: Applied Binary Exploitation (VL)
  • Ressourcenschonende Pipeline für Internet-Scans (PG)
  • Design und Leistungsanalyse eines FPGA-basierten SDR-Empfängers für digitale Modulationsverfahren (BA)
  • Automatic Generation and Configuration of TLS clients (Lab)
  • Verschleierung von getunnelten TLS-Handshakes zur Zensurumgehung (BA)

 

2023

  • Analyzing the Efficiency of Internet Censorship Measures (BA)
  • IT Security: Applied Binary Exploitation (VL)
  • IT Security: Domain-specific Automated Software Testing (VL)
  • Analyzing the Potency of PLP models for Automated Code Repair  (BA)
  • Emulation von verteilten Systemen (PG)
  • RISC-V Support for the Side Channel CPU Emulator (Lab)

2022

  • IT Security: Web Security (VL)
  • Security Analysis of a Smart Home Surveillance Camera (Lab)
  • Implementierung von symbolischer Ausführung für PHP 8.3 (PG)
  • Funktionsweise und Verbreitung von TLS 1.3 (BA)
  • Secure Distributed Sensor Networks for Device Location Tracking (MA)
  • Physical Layer Key Exchange mit mehreren Antennen brechen (PG)