Tracing Vendors: A Middlebox-Centric Study of Network Interference

news

ACCESS-FL: Agile Communication and Computation for Efficient Secure Aggregation in Stable Networks for FLaaS

bio

Before joining the University of Münster as full professor, I was an Associate Professor at the University of Twente in the Netherlands. Before that, I was a Lecturer and Senior Lecturer at the University of Sydney in Australia. Until 2016, I was a Researcher at NICTA (later Data61), also in Sydney, where I worked on network security and was part of the Security Business Team. I hold a PhD from Technical University of Munich. I did both my post-grad and under-grad studies at Eberhard Karls University, Tuebingen, one of Germany’s classic universities.

Web Crawl refusals: insights from Common Crawl

Teaching

For the current list of course offerings, please see my website at the University of Münster.

In general, I teach a selection from the following in the winter term:

In the summer term, I usually teach a selection from the following:

Is a Name Enough? A First Look into Detecting Clouds Using DNS Pointer Records

Advising

Prospective PhD students

I generally hire only at the University of Münster, but every now and then I may have an opening in Twente as well. PhD positions at the University of Münster and at the University of Twente are generally fully funded and part of a research project. I advertise these positions publicly, but you can also write me an email to find out if there are any vacancies at the moment.

LanDscAPe: Exploring LDAP Weaknesses and Data Leaks at Internet Scale

SecuriTea

I run SecuriTea, a reading and discussion group for students and staff interested in all aspects of computer security. I bring tea, coffee & biscuits, and participants bring a mug and a passion for security. The goal is to grow the security community at USYD.

There is no fixed topic; we follow our interests, the setting is semi-formal. We often choose a paper to talk about for every meeting, but we then often broaden the scope. We also chat about recent events. Recurrent topics include, but are certainly not limited to, blockchain and measuring security with Internet scans and passive traffic monitoring.