Recent Posts

This is not a rethorical question. I was forced to ask myself this because of a Tweet by Amit Serper (@0xAmit), which he posted on 15 …

Introduction A recent blog article introduced me to the idea of double descent. This is the phenomenon by which the fitting error in …

How do we teach proof techniques to students who have not had any exposure to proofs before? There are (at least) two things to …

I have an old, mid-2010 MacBook Pro that is too weak to do serious work now, so I thought I’d give FreeBSD a try. I downloaded an …

I am currently reading the book Statistics Done Wrong: The Woefully Complete Guide by Alex Reinhart (No Starch Press, 2015). It …

It is generally hard to make predictions, especially when they are about the future. I’ll make one, however: the current fad …

On August 19, 2009, the German news magazine Der Spiegel carried in its online version an article about someone who found a stalk of …


Lectures and Theses


  • Lecture FS 2019: MSE: IT-Security (as module owner)
  • Lecture FS 2019: IT-Security (as module owner)
  • Lecture HS 2018: Algorithmen und Datenstrukturen
  • Lecture HS 2018: Software Security 1 (EN)
  • Lecture FS 2018: IT-Security
  • Lecture FS 2018: MSE: IT Security
  • Lecture HS 2017: Algorithmen und Datenstrukturen
  • Lecture HS 2017: Software Security 1 (EN)


  • Bachelor Thesis FS 2019: A Proof-of-Concept Implementation of TLS-PSK
  • Bachelor Thesis FS 2019: Preventing Supply Chain Insecurity by Authentication on Layer 2
  • Bachelor Thesis FS 2019: Design and Implementation of a Replacement for SSH
  • Project Thesis HS 2017: Minimising a Linux Distribution
  • Master Thesis HS 2017: Fuzzing Shim Layer Protocols
  • Master Thesis HS 2017: A Request Broker for Linux using SECCOMP


Recent & Upcoming Talks

Recent Publications