Dr. Martin Henze

Dr. Martin Henze

WARNING: This information is likely out-of-date and will not be updated!

Last updated on 2020-08-19

I left RWTH Aachen University and joined Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE. I am still closely cooperating with COMSYS. The information below will not be updated, please find current contact information on my personal website.

I worked as researcher and head of security and privacy at the Chair of Communication and Distributed Systems at RWTH Aachen University. After having finished my Diploma studies (equiv. M.Sc.) of Computer Science at RWTH Aachen University in 2011, I interned at the Interdisciplinary Centre for Security, Reliability and Trust (SnT) at the University of Luxembourg where I worked on website fingerprinting in anonymization networks. In early 2012 I returned to RWTH Aachen University.

My research focuses on security and privacy in large-scale communication systems and especially the cloud. I worked within the TRINICS project to create transparency on the usage of cloud services and within the SSICLOPS project on the privacy-aware handling of data in the cloud. Previously, I worked on security and privacy challenges of outsourcing sensor data to the cloud in the context of the SensorCloud and IPACS projects. In my spare time I am volunteering as chairman of the alumni club of the students representation for Mathematics, Physics and Computer Science at RWTH Aachen University (VAMPIR e.V.). In 2011, I received the award of the Computer Science Department at RWTH Aachen University for outstanding achievements as students representative within the Computer Science Department and RWTH Aachen University.

Professional Service

Technical Program Committee Member
CLaw (2018), FiCloud (2015), IEEE Symposium on Security and Privacy (Student PC, 2017)

Reviewer for Conferences
HICSS (2019), IEEE LCN (2012), IEEE CloudCom (2015), PETS (2018)

Reviewer for Journals
Business & Information Systems Engineering (2018), Computer Communications (2019), Future Generation Computer Systems (2015), IEEE Internet Computing (2015), IEEE Internet of Things Journal (2017), IEEE Software (2017), IEEE Transactions on Parallel and Distributed Systems (2017), Journal of Supercomputing (2016), Pervasive and Mobile Computing (2018)

Reviewer for Book ChaptersSecurity and Privacy in Cyber-Physical Systems: Foundations and Applications (Wiley, 2017), Trusted Cloud Computing (Springer, 2014)

The publication list below will not be updated anymore, please consult my full publication list as well as Google Scholar and DBLP.

Publications

GeCos Replacing Experts: Generalizable and Comprehensible Industrial Intrusion Detection. Proceedings of the 34th USENIX Security Symposium (USENIX Sec), Aug 13 - Aug 15, 2025, Seattle, WA, USA. August 2025.
CAIBA: Multicast Source Authentication for CAN Through Reactive Bit Flipping. Proceedings of the 2025 IEEE 10th European Symposium on Security and Privacy (EuroS&P), Venice, Italy. June 2025.
Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication. 19th ACM ASIA Conference on Computer and Communications Security (ACM AsiaCCS ‘24), Jul 1 - Jul 5, 2024, Singapore, Singapore. July 2024.
Unconsidered Installations: Discovering IoT Deployments in the IPv6 Internet. Proceedings of the 2024 IEEE/IFIP Network Operations and Management Symposium (NOMS ‘24), May 6 - May 10, 2024, Seoul, Korea. May 2024.
Illicit Blockchain Content – Its Different Shapes, Consequences, and Remedies. Blockchains – A Handbook on Fundamentals, vol. 105. March 2024.
When and How to Aggregate Message Authentication Codes on Lossy Channels?. 22nd International Conference on Applied Cryptography and Network Security (ACNS ‘24), Mar 5 - Mar 9, 2024, Abu Dhabi, UAE. March 2024.
Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols. 48th IEEE Conference on Local Computer Networks (LCN), Oct 1 - Oct 5, 2023, Daytona Beach, Florida, US. October 2023.
METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks. Proceedings of the 9th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems (CyberICPS ‘23), Sep 28 - Sep 28, 2023, The Hague, The Netherlands. September 2023.
One IDS is not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection. Proceedings of the 28th European Symposium on Research in Computer Security (ESORICS ‘23), vol. 14345, Sep 25 - Sep 29, 2023, The Hague, The Netherlands. September 2023.
Designing Secure and Privacy-Preserving Information Systems for Industry Benchmarking. Proceedings of the 35th International Conference on Advanced Information Systems Engineering (CAiSE ‘23), vol. 13901, Jun 12 - Jun 16, 2023, Zaragoza, Spain. June 2023.
Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead. Internet of Production: Fundamentals. February 2023.
CUMUL & Co: High-Impact Artifacts for Website Fingerprinting Research. Cybersecurity Artifacts Competition and Impact Award at 38th Annual Computer Security Applications Conference (ACSAC ‘22), Dec 5 - Dec 9, 2022, Austin, TX, USA. December 2022.
Poster: Ensemble Learning for Industrial Intrusion Detection. 38th Annual Computer Security Applications Conference (ACSAC ‘22), Dec 5 - Dec 9, 2022, Austin, TX, USA. December 2022.
Poster: INSIDE - Enhancing Network Intrusion Detection in Power Grids with Automated Facility Monitoring. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Nov 8 - Nov 8, 2022, Los Angeles, CA, USA. November 2022.
IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems. Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2022), Limassol, Cyprus. October 2022.
Can Industrial Intrusion Detection Be SIMPLE?. Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS ‘22), vol. 978-3-031-17143-7, Sep 26 - Sep 30, 2022, Copenhagen, Denmark. September 2022.
Complying with Data Handling Requirements in Cloud Storage Systems. IEEE Transactions on Cloud Computing, vol. 10, no. 3. September 2022.
PowerDuck: A GOOSE Data Set of Cyberattacks in Substations. ACM, Aug 8 - Aug 8, 2022, Moscow, Russia. August 2022.
A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection. Proceedings of the 8th ACM Cyber-Physical System Security Workshop (CPSS ‘22), May 30 - May 30, 2022, Nagasaki Japan. Event co-located with the 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS '22). May 2022.
BP-MAC: Fast Authentication for Short Messages. Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ‘22), San Antonio, Texas, USA. May 2022.
Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things. Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (ASIACCS ‘22), May 30 - Jun 3, 2022, Nagasaki, Japan. May 2022.
Scalable and Privacy-Focused Company-Centric Supply Chain Management. Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC ‘22), May 2 - May 5, 2022, Shanghai, China. May 2022.
Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes. Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ‘22), San Antonio, Texas, USA. May 2022.
Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use. Proceedings of the Workshop on Learning from Authoritative Security Experiment Results (LASER ‘20), Dec 8 - Dec 8, 2020, Austin, TX, USA. Event co-located with the 36th Annual Computer Security Applications Conference (ACSAC '20). December 2021.
CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively. IEEE Transactions on Network and Service Management, vol. 18, no. 3. September 2021.
Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems. Proceedings of the 1st ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS ‘21), Apr 28 - Apr 28, 2021, Virtual Event, USA. Event co-located with the 11th ACM Conference on Data and Application Security and Privacy (CODASPY '21). April 2021.
Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking. Proceedings of the 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC ‘20), Dec 15 - Dec 15, 2020, Virtual Event. December 2020.
Poster: Cybersecurity Research and Training for Power Distribution Grids -- A Blueprint. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS ’20), Nov 9 - Nov 13, 2020, Virtual Event, USA. November 2020.
Poster: Facilitating Protocol-independent Industrial Intrusion Detection Systems. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS ’20), Nov 9 - Nov 13, 2020, Virtual Event, USA. November 2020.
Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments. Proceedings of the Internet Measurement Conference (IMC ‘20), Oct 27 - Oct 29, 2020, Pittsburgh, PA, USA. October 2020.
Challenges and Opportunities in Securing the Industrial Internet of Things. IEEE Transactions on Industrial Informatics, vol. 17, no. 5. September 2020.
How to Securely Prune Bitcoin’s Blockchain. Proceedings of the 19th IFIP Networking 2020 Conference (NETWORKING ‘20), Jun 22 - Jun 26, 2020, Paris, France. June 2020.
Private Multi-Hop Accountability for Supply Chains. Proceedings of the 1st Workshop on Blockchain for IoT and Cyber-Physical Systems (BIoTCPS ‘20), Jun 7 - Jun 7, 2020, Dublin, Ireland. Event co-located with the 2020 IEEE International Conference on Communications (ICC '20). June 2020.
Assessing the Security of OPC UA Deployments. Proceedings of the 1st ITG Workshop on IT Security (ITSec ‘20), Apr 2 - Apr 3, 2020, Tübingen, Germany. April 2020.
Dataflow Challenges in an Internet of Production: A Security & Privacy Perspective. Proceedings of the 5th ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC ‘19), Nov 11 - Nov 11, 2019, London, United Kingdom. Event co-located with the 26th ACM SIGSAC Conference on Computer and Communications Security (CCS '19). November 2019.
Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing. Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP ‘19), Oct 8 - Oct 10, 2019, Chicago, IL, USA. October 2019.
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments. Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP ‘19), Oct 8 - Oct 10, 2019, Chicago, IL, USA. October 2019.
The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads. IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), Oct 14 - Oct 17, 2019, Osnabrück, Germany. October 2019.
Hi Doppelgänger: Towards Detecting Manipulation in News Comments. Proceedings of the 4th Workshop on Computational Methods in Online Misbehavior (CyberSafety ‘19), May 13 - May 13, 2019, San Francisco, CA, USA. Event co-located with the 28th World Wide Web Conference (WWW '19). May 2019.
Towards an Infrastructure Enabling the Internet of Production. Proceedings of the 2nd IEEE International Conference on Industrial Cyber-Physical Systems (ICPS ‘19), May 6 - May 9, 2019, Taipei, Taiwan. May 2019.
A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems. Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS), USA. January 2019.
Secure Low Latency Communication for Constrained Industrial IoT Scenarios. 43rd IEEE Conference on Local Computer Networks (LCN), Oct 1 - Oct 4, 2018, Chicago, IL, United States. October 2018.
Towards In-Network Security for Smart Homes. Proceedings of the 2nd International Workshop on Security and Forensics of IoT (IoT-SECFOR), Hamburg, Germany. August 2018.
Thwarting Unwanted Blockchain Content Insertion. Proceedings of the First IEEE Workshop on Blockchain Technologies and Applications (BTA), Apr 17 - Apr 20, 2018, Orlando, Florida, USA. April 2018.
Secure and anonymous decentralized Bitcoin mixing. Future Generation Computer Systems, vol. 80. March 2018.
A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin. Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Curaçao. February 2018.
CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps. Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous ‘17), Nov 7 - Nov 10, 2017, Melbourne, VIC, Australia. November 2017.
Network Security and Privacy for Cyber-Physical Systems. Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications. November 2017.
Privacy-preserving Comparison of Cloud Exposure Induced by Mobile Apps. Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous), Melbourne, Australia. November 2017.
Analysis of Fingerprinting Techniques for Tor Hidden Services. Proceedings of the 16th Workshop on Privacy in the Electronic Society (WPES), Dallas, TX, United States. October 2017.
Distributed Configuration, Authorization and Management in the Cloud-based Internet of Things. Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), Aug 1 - Aug 4, 2017, Sydney, Australia. August 2017.
BLOOM: BLoom filter based Oblivious Outsourced Matchings. BMC Medical Genomics, vol. 10, no. Suppl 2, Nov 11 - Nov 11, 2016, Chicago, IL, USA. July 2017.
Veiled in Clouds? Assessing the Prevalence of Cloud Computing in the Email Landscape. Proceedings of the 2017 Network Traffic Measurement and Analysis Conference (TMA 2017), Jun 21 - Jun 23, 2017, Dublin, Ireland. June 2017.
Practical Data Compliance for Cloud Storage. Proceedings of the 2017 IEEE International Conference on Cloud Engineering (IC2E 2017), Apr 4 - Apr 7, 2017, Vancouver, BC. April 2017.
Privacy-Preserving HMM Forward Computation. Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY 2017), Scottsdale, AZ, United States. March 2017.
TraceMixer: Privacy-Preserving Crowd-Sensing sans Trusted Third Party. Proceedings of the 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Feb 21 - Feb 24, 2017, Jackson, WY, USA. February 2017.
Towards Transparent Information on Individual Cloud Service Usage. Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Dec 12 - Dec 15, 2016, Luxembourg, Luxembourg. December 2016.
CPPL: Compact Privacy Policy Language. Proceedings of the 15th Workshop on Privacy in the Electronic Society (WPES), Vienna, Austria. October 2016.
POSTER: Fingerprinting Tor Hidden Services. Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria. October 2016.
POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store. Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria. October 2016.
Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds. Proceedings of the Second International Workshop on Legal and Technical Issues in Cloud Computing and Cloud-Supported Internet of Things (CLaw 2016), Apr 4 - Apr 8, 2016, Berlin, Germany. April 2016.
A Comprehensive Approach to Privacy in the Cloud-based Internet of Things. Future Generation Computer Systems, vol. 56. March 2016.
Website Fingerprinting at Internet Scale. Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS ‘16), Feb 21 - Feb 24, 2016, San Diego, CA, USA. February 2016.
Bandwidth-optimized Secure Two-Party Computation of Minima. 14th International Conference on Cryptology and Network Security (CANS 2015), vol. 9476. December 2015.
Comparison-based Privacy: Nudging Privacy in Social Media (Position Paper). The 10th DPM International Workshop on Data Privacy Management, vol. 9481. September 2015.
Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks. 2015 International Workshop on Privacy Engineering (IWPE'15), May 21 - May 22, 2015, San Jose, CA. May 2015.
CoinParty: Secure Multi-Party Mixing of Bitcoins. The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA. March 2015.
SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators. Trusted Cloud Computing. December 2014.
SCSlib: Transparently Accessing Protected Sensor Data in the Cloud. The 6th International Symposium on Applications of Ad hoc and Sensor Networks (AASNET'14), vol. 37, Halifax, NS, Canada. September 2014.
User-driven Privacy Enforcement for Cloud-based Services in the Internet of Things. 2014 International Conference on Future Internet of Things and Cloud (FiCloud 2014), Aug 27 - Aug 29, 2014, Barcelona, Spain. August 2014.
Piccett: Protocol-Independent Classification of Corrupted Error-Tolerant Traffic. Proceedings of the 18th IEEE Symposium on Computers and Communications (ISCC), Jun 23 - Jun 26, 2014, Funchal, Madeira, Portugal. June 2014.
Graph-based Redundancy Removal Approach for Multiple Cross-Layer Interactions. Proceedings of the 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS), Jan 6 - Jan 10, 2014, Bangalore, India. January 2014.
Maintaining User Control While Storing and Processing Sensor Data in the Cloud. International Journal of Grid and High Performance Computing (IJGHPC), vol. 5, no. 4. December 2013.
Towards Data Handling Requirements-aware Cloud Computing (Poster Abstract). Proceedings of the 2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Dec 2 - Dec 5, 2013, Bristol, UK. December 2013.
Slimfit - A HIP DEX Compression Layer for the IP-based Internet of Things. Wireless and Mobile Computing, Networking and Communications (WiMob), Oct 7 - Oct 9, 2013, Lyon, France. October 2013.
The Cloud Needs Cross-Layer Data Handling Annotations (Position Paper). Proceedings of the 4th International Workshop on Data Usage Management (DUMA 2013), May 23 - May 24, 2013, San Francisco, CA. May 2013.
6LoWPAN Fragmentation Attacks and Mitigation Mechanisms. Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ‘13), Budapest, Hungary. April 2013.
A Cloud Design for User-controlled Storage and Processing of Sensor Data. Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), Dec 3 - Dec 6, 2012, Taipei, Taiwan. December 2012.

Advised Theses

Evaluating the Impact of Attacks against Substation Communication on Power Grids
Master's Thesis, RWTH Aachen University, March 2022
Advisors: Lennart Bader (FKIE), Martin Henze (FKIE), Dennis van der Velde (IAEW)
Examiners: Klaus Wehrle, Andreas Ulbig (IAEW)
Improving Privacy-Preserving Company Benchmarking with Modern FHE Schemes
Bachelor's Thesis, RWTH Aachen University, December 2021
Advisors: Jan Pennekamp, Niklas Rodemann (WZL), Martin Henze (FKIE)
Examiners: Klaus Wehrle, Günther Schuh (WZL)
Retrofitting Integrity Protection into Industrial Legacy Protocols by Embedding Message Authentication Codes
Bachelor's Thesis, RWTH Aachen University, October 2021
Examiners: Klaus Wehrle, Ulrike Meyer (IT-Sec)
An Internet-Wide Study on TLS Usage in Industrial Control Systems
Master's Thesis, RWTH Aachen University, July 2021
Examiners: Klaus Wehrle, Ulrike Meyer (IT-Sec)
Finalist at CAST Förderpreis IT-Sicherheit 2021
On the Generalizability of Process-Based Industrial Intrusion Detection Systems
Bachelor's Thesis, RWTH Aachen University, April 2021
Examiners: Klaus Wehrle, Ulrike Meyer (IT-Sec)
Evaluating the Impact of Attacks against SCADA-based Communication in Power Grids
Master's Thesis, RWTH Aachen University, November 2020
Advisors: Martin Henze (FKIE), Lennart Bader (FKIE)
Examiners: Klaus Wehrle, Ulrike Meyer (IT-Sec)
Web-Based Privacy-Preserving Comparison of KPIs
Bachelor's Thesis, RWTH Aachen University, November 2020
Examiners: Klaus Wehrle, Elmar Padilla (H-BRS)
Privacy-Preserving Company Benchmarking
Bachelor's Thesis, RWTH Aachen University, September 2020
Advisors: Jan Pennekamp, Martin Henze (FKIE), Patrick Sapel (IKV)
Examiners: Klaus Wehrle, Christian Hopmann (IKV)
An Empirical Analysis of Tip Selection Anomalies in the IOTA Tangle
Master's Thesis, RWTH Aachen University, June 2019
Advisors: Martin Henze, Roman Matzutt, Philipp Niemietz (WZL)
Examiners: Klaus Wehrle, Thomas Bergs (WZL)
Application Layer Traffic Splitting for Mitigating Website Fingerprinting in Tor
Bachelor's Thesis, RWTH Aachen University, October 2017
Advisors: Martin Henze, Andriy Panchenko (uni.lu), Asya Mitseva (uni.lu)
Examiners: Klaus Wehrle, Thomas Engel (uni.lu)
FOLKS Award for the best Bachelor's thesis in 2018
Behavioural Nudging through Privacy-Preserving Comparisons
Master's Thesis, RWTH Aachen University, December 2016
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
Large Scale Analysis of the Cloud Usage of Smartphone Applications
Bachelor's Thesis, RWTH Aachen University, September 2016
Advisor: Martin Henze
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
Secure Random Walks in DHTs
Master's Thesis, RWTH Aachen University, April 2016
Advisors: Andriy Panchenko (uni.lu), Martin Henze
Examiners: Klaus Wehrle, Thomas Engel (uni.lu)
FOLKS Award (1st place) for the best Master's thesis in 2016
Pitchfork: Design and Implementation and Evaluation of Traffic Splitting to thwart Traffic Analysis in Tor
Master's Thesis, RWTH Aachen University, March 2016
Advisors: Martin Henze, Andriy Panchenko (uni.lu)
Examiners: Klaus Wehrle, Thomas Engel (uni.lu)
A Space and Processing Efficient Cloud Privacy Policy Language
Master's Thesis, RWTH Aachen University, February 2016
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
Fingerprinting Tor Hidden Services
Master's Thesis, RWTH Aachen University, November 2015
Advisors: Martin Henze, Andriy Panchenko (uni.lu)
Examiners: Klaus Wehrle, Thomas Engel (uni.lu)
Practical Limits of Website Fingerprinting Attacks
Master's Thesis, RWTH Aachen University, September 2015
Advisors: Martin Henze, Andriy Panchenko (uni.lu)
Examiners: Klaus Wehrle, Thomas Engel (uni.lu)
Distributed Storage for Secure Peer-to-Peer Clouds
Bachelor's Thesis, RWTH Aachen University, August 2015
Advisor: Martin Henze
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
Load Balancing for Data Handling-aware Distributed Databases
Bachelor's Thesis, RWTH Aachen University, June 2015
Advisor: Martin Henze
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
Making Individual Cloud Usage of Smartphone Users Transparent
Bachelor's Thesis, RWTH Aachen University, June 2015
Advisor: Martin Henze
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
Young Consumer Researcher Award of NRW for the best Bachelor's thesis in 2016
Data Annotation Handling in a Highly Scalable Distributed Database System
Master's Thesis, RWTH Aachen University, October 2014
Advisor: Martin Henze
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
PriverCloud - A Peer-to-Peer Cloud for Secure Service Operation
Master's Thesis, RWTH Aachen University, September 2014
Advisor: Martin Henze
Examiners: Klaus Wehrle, Ulrike Meyer (IT-Sec)
Analyzing Cloud Usage by Observing Network Traffic
Bachelor's Thesis, RWTH Aachen University, September 2014
Advisor: Martin Henze
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
Ericsson-Preis at Tag der Informatik 2014
Evaluating Website Fingerprinting Attacks in Real-World Settings
Bachelor's Thesis, RWTH Aachen University, August 2014
Advisors: Martin Henze, Andriy Panchenko (uni.lu)
Examiners: Klaus Wehrle, Thomas Engel (uni.lu)
Distributed Authorization Management for Secure Sensor Data in the Cloud
Bachelor's Thesis, RWTH Aachen University, March 2014
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
Univention Graduate Award (2nd place) for the best thesis in 2016
Flexible Configuration and Service Abstraction for Encrypted Sensor Data in the Cloud
Bachelor's Thesis, RWTH Aachen University, March 2014
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
Rohde & Schwarz-Preis at Informatik Sommerfest 2014
Access Control for Sensor Data in the Cloud
Bachelor's Thesis, RWTH Aachen University, February 2014
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
Thwarting Traffic Analysis in Onion Routing
Master's Thesis, RWTH Aachen University, February 2014
Advisors: Martin Henze, Andriy Panchenko (uni.lu)
Examiners: Klaus Wehrle, Thomas Engel (uni.lu)
Efficient Signature Schemes for Sensor Data in the Cloud
Master's Thesis, RWTH Aachen University, November 2013
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
Machine-readable Data Handling Annotations for the Cloud
Bachelor's Thesis, RWTH Aachen University, October 2013
Advisor: Martin Henze
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
Realizing Data Handling Annotation Support in the Cloud Stack with Customized Data Distribution
Bachelor's Thesis, RWTH Aachen University, September 2013
Advisor: Martin Henze
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
DARAS - A Distributed Accountable Resource Allocation System for Peer-to-Peer Networks
Master's Thesis, RWTH Aachen University, September 2013
Examiners: Klaus Wehrle, Walter Unger (i1)
Network-based Localization of Wi-Fi Devices
Bachelor's Thesis, RWTH Aachen University, July 2013
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
Privacy-aware Operations on Encrypted Sensor Data in the Cloud
Bachelor's Thesis, RWTH Aachen University, March 2013
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
User-controlled Utilization of Sensor Data for Cloud Computing
Bachelor's Thesis, RWTH Aachen University, March 2013
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
MINT-Award Computer Science (3rd place) for the best thesis in 2013
Real-Time Feedback on the Privacy Leakage of Web Usage
Diploma Thesis, RWTH Aachen University, February 2013
Advisor: Martin Henze
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)
Analyzing the Privacy Leakage of Web Usage
Bachelor's Thesis, RWTH Aachen University, April 2012
Examiners: Klaus Wehrle, Bernhard Rumpe (i3)