Ben Swierzy, M.Sc.
Researcher
|
Research Interests
- Network Architectures and Protocols
- TLS
- Reverse Engineering
- Version Detection
- Low-Level/Hardware oriented topics
Teaching
2024
- Obfuscation of tunneled TLS handshakes for censorship circumvention (BA)
2023
- Analyzing the Efficiency of Internet Censorship Measures (BA)
- IT Security: Applied Binary Exploitation (Lecture)
- IT Security: Domain-specific Automated Software Testing (Lecture)
- Analyzing the Potency of PLP models for Automated Code Repair (BA)
- Emulation of distributed Systems (PG)
- RISC-V Support for the Side Channel CPU Emulator (Lab)
2022
- IT Security: Web Security (Lecture)
- Security Analysis of a Smart Home Surveillance Camera (Lab)
- Implementation of Symbolic Execution for PHP 8.3 (PG)
- Functionality and Utilization of TLS 1.3 (BA)
- Secure Distributed Sensor Networks for Device Location Tracking (MA)
- Breaking Physical Layer Key Exchange with Multiple Antennas (PG)
Publications
B. Swierzy, M. Hoffmann, F. Boes, F. Betke, L. Hein, M. Shevchishin, J. Sohn, M. Meier
TEEM: A CPU Emulator for Teaching Transient Execution Attacks (2024)
Daniel Vogel, Markus Krämer, Ben Swierzy, Daniel Meyer, Michael Meier
On the feasibility of detecting non-cooperative Wi-Fi devices via a single Wi-Fi-Router (2023)
Ben Swierzy, Markus Krämer, Daniel Vogel, Daniel Meyer, Michael Meier
Analyzing the Feasibility of Privacy-Respecting Automated Tracking of Devices Fleeing a Burglary (2023)