Felix Freiling


1 2 3


Prof. Dr.-Ing. Felix Freiling

Room 12.159
Martensstr. 3
91058 Erlangen

Tel. +49 9131 85 69901   |   Fax +49 9131 85 69919

felix.freiling ( at ) cs.fau.de



 

I am a professor of computer science at Friedrich-Alexander-Universität Erlangen-Nürnberg. My general research interests are in the area of dependable systems and understanding the intricate relationship between safety and security. My specific research focus for a long time was on fault-tolerant distributed algorithms. Today I focus on computer security and forensic computing. Since I work in the area of applied computer security I am constantly trying to cover my traces: From 2002 to 2010 I worked at five different universities under two different names.

I don't have any account in social media, so any account with my name is probably somebody else's.

I support The Cost of Knowledge and currently refrain from reviewing and edtorial services to Elsevier, Springer and Kluwer.

Announcements

My Sprechstunde during summer semester 2018 is Tuesdays between 17:00 and 18:00. Please indicate in advance to Christine Stief if you plan to come.

Felix Freiling's Email Policy

On December 18, 2008 the number of unanswered messages in my email inbox surpassed 1000. I surrender! On christmas day 2008 I decided to change my email handling policy: In the future, I will treat emails more like I treat telephone calls. I will fix a time interval d and after d time I will completely remove all unanswered email from my inbox that is older than d. This means I will most probably not respond anymore to emails that have not been answered in d time. Currently d is one year, but it may be adjusted. I apologize for any inconvenience this may cause, but I am now convinced that I cannot continue to treat email the same as I treat postal mail. If you need a definitive response from me within a certain time, it is probably more reliable to send a letter by postal mail.

Update in April 2009: d is now 6 months.

Update in July 2009: d is now 2 months.

Update in December 2010: d is now 3 weeks.

Update in January 2012: d is now 1 week

Update in December 2013: d is now 4 days.

Update in December 2014: d is now 2 days.

Update in September 2017: d is now 3 days.

Exams

Students planning an oral examination have the chance to visit such an exam as an observer (Hospitation) beforehand under the condition that they do not disturb the exam and the examined student agrees.

Internship and Employment Opportunities

My lab infrequently offers internships and short or long term employment to interested and well-qualified candidates. I however only reply to normal postal mail or (sometimes) to email which has been sent individually to me. In case you wish to communicate via email and are looking for an internship, please include the code word "ref: nightingale" in the subject of your mail to prove that you prepared an individual email.

Professional activities

Academic Administration/Politics/Honorary Positions

  • 2004-2008: Vorstandsmitglied im GI Beirat der Universitätsprofessoren (GIBU)
  • 2006: Member of the expert commission to evaluate the online voting system for the DFG
  • Sommersemester 2006: Direktor des Instituts für Informatik der Universität Mannheim
  • May 2007-September 2009: Direktor des Instituts für Informatik der Universität Mannheim
  • October 2007: Advisor of the German constitutional court (Bundesverfassungsgericht) in the public hearing on "Online Durchsuchungen"
  • Sommersemester 2008: Prodekan der Fakultät für Mathematik und Informatik der Universität Mannheim
  • Herbstsemester 2008-November 2010: Dekan der Fakultät für Mathematik und Informatik der Universität Mannheim
  • June 2009: Advisor of the German constitutional court (Bundesverfassungsgericht) in the case on "Vorratsdatenspeicherung"
  • May 2011-April 2016: Mitglied des Senats- und Bewilligungsausschusses für die Graduiertenkollegs der DFG
  • since July 2011: Mitglied der Masterzulassungskommission der Technischen Fakultät der FAU
  • since October 2011: Mitglied der Studienkommission des Department Informatik der FAU
  • since July 2012: Vertreter der FAU im Fakultätentag Informatik
  • since November 2012: Mitglied im wissenschaftlichen Beirat der Firma RedTeam Pentesting GmbH, Aachen
  • 2013/2014: Vorsitzender der Jury des 5. Deutschen IT-Sicherheitspreises der Horst Görtz-Stiftung
  • since May 2014: member of the Steering Committee of the International Conference on IT Security Incident Management & IT Forensics (IMF)
  • since September 2014: Mitglied im Aufsichtsrat der Cryptotec AG, Köln
  • October 2014-October 2015: Studiendekan 3 der Technischen Fakultät der FAU
  • since 2015: Mitglied des Nominierungsausschusses für den Dissertationspreis der Gesellschaft für Informatik e.V.
  • July 2015: Advisor of the German constitutional court (Bundesverfassungsgericht) in the case on "BKAG"
  • since October 2015: gewähltes Mitglied im Fakultätsrat der Technischen Fakultät der FAU
  • 2015/2016: Vorsitzender der Jury des 6. Deutschen IT-Sicherheitspreises der Horst Görtz-Stiftung
  • since April 2016: gewähltes Mitglied des Fachkollegiums Informatik der DFG
  • since August 2017: Mitglied im Steuerkreis im BayWISS Verbundkollegs Digitalisierung (BWD} als Vertreter der FAU
  • since November 2017: Sprecher der kollegialen Leitung des Department Informatik der Technischen Fakultät der FAU
  • 2017/2018: Vorsitzender der Jury des 7. Deutschen IT-Sicherheitspreises der Horst Görtz-Stiftung
  • since 1/2018: Mitglied im Vorstand des Fakultätentags Informatik

Research Interests

Dependable distributed systems (theory and practice)

Reviewed PhD and Habilitation Theses

If my name is given as 1st reviewer, I usually also was the student's advisor. In other cases the advisor if explicitly credited.  (in Germany

  • Matthias Meixner: HADES - Eine hochverfügbare Main-Memory Datenbank für eventbasierte Systeme. (PhD thesis, 2nd reviewer, 1st reviewer: Prof. Alejandro Buchmann). Defended December 17, 2004, TU Darmstadt.
  • Martin Hutle: Failure Detection in Sparse Networks. (PhD thesis, 2nd reviewer, 1st reviewer: Prof. Ulrich Schmid). Defended October 4, 2005, TU Wien.
  • Erik-Oliver Blaß: Sicherer, aggregierender Datentransport in drahtlosen Sensornetzen. (PhD thesis, 2nd reviewer, 1st reviewer: Prof. Dr. Martina Zitterbart). Defended April 20, 2007, University of Karlsruhe.
  • Dr. Guido Schryen: An analysis of anti-spam measures and the conceptual design of a technological and organizational infrastructure framework for tackling spam e-mails. Habilitation thesis, RWTH Aachen, 2007.
  • Lucia Draque Penso: Distributed Protocols Robust Against Malicious Attacks. (PhD defense committee member with Prof. Maurice Herlihy and Prof. Anna Lysyanskaya). Defended January 30, 2008. Brown University, Providence, RI, USA.
  • Mohammad Torabi Dashti: Keeping Fairness Alive. (PhD defense committee member, advisor was Prof. Wan Fokkink). Defended Februrary 27, 2008. Vrije Universiteit Amsterdam.
  • Wei Zhou: Access Control Model and Policies for Collaborative Environments. (PhD thesis, external reviewer, first reviewer: Prof. Christoph Meinel.) Defended April 27, 2009, Hasso Plattner Institute (HPI), Potsdam.
  • Ionannis Krontiris: Intrusion Prevention and Detection in Wireless Sensor Networks. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Tassos Dimitriou, AIT, Greece). Defended November 13, 2008. University of Mannheim.
  • Zinaida Benenson: Access Control in Wireless Sensor Networks. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Adrian Perrig, CMU). Defended Dec. 19, 2008. University of Mannheim.
  • Oliver Steffen Weiß: A model to quantitavely assess the security of organizations. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Dr. K. Meyer-Wegener, Univ. Erlangen). Defended Feb 20, 2009. Univ. Erlangen.
  • Thorsten Holz: Tracking and Mitigation of Malicious Remote Control Networks. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Christopher Kruegel, UCSB). Defended April 30, 2009. University of Mannheim.
  •  Frank Werner: Applied Formal Methods in Wireless Sensor Networks. (2nd reviewer, 1st reviewer Prof. Dr. P. H. Schmitt, Univ. of Karlsruhe). Defended July 22, 2009. Univ. of Karlsruhe.
  • Timo Warns: Structural Failure Models for Fault-Tolerant Distributed Computing. (PhD thesis, 3rd reviewer, 1st and 2nd reviewers Prof. Dr. Oliver Theel, University of Oldenburg, Prof. Dr. Willi Hasselbring, University of Kiel). Defended Sept, 28, 2009. University of Oldenburg.
  • Michael Becher: Security of Smartphones at the Dawn of Their Ubiquitousness. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Dr. Ulrike Meyer, RWTH Aachen). Defended October 9, 2009. University of Mannheim.
  • Martin Mink: Vergleich von Lehransätzen für die Ausbildung in IT-Sicherheit. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Dr. Simone Fischer-Hübner, Karlstad University, Sweden). Defended Dec 11, 2009. University of Mannheim.
  • Moritz Martens: Properties of Interaction Systems. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Dr. Mila Majster-Cederbaum, University of Mannheim). Defended Dec 18, 2009. University of Mannheim.
  • Roberto Cortinas: Failure Detectors and Communication Efficiency in the Crash and General Omission Failure Models. (Member of PhD defense committee, advisors: Prof. Alberto Laufente, Prof. Iratxe Soraluze, University of the Basque Country, San Sebastian, Spain) Defended April 4, 2011. University of the Basque Country, San Sebastian, Spain.
  • Jan Gerrit Göbel: Large-Scale Detection and Measurement of Malicious Content. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Christopher Krügel, UCSB) Defended April 27, 2011. University of Mannheim.
  • Michael Müter: Embedded Security Concepts for In-Verhicle Systems. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Frank Kargl, University of Twente) Defended May 27, 2011. University of Mannheim.
  • Tobias Limmer: Efficient Network Monitoring for Attack Detection. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Falko Dressler, University of Innsbruck, Austria) Defended June 20, 2011. University of Erlangen.
  • Philipp Trinius: Musterbasiertes Filtern von Schadprogrammen und Spam. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Guido Schryen, University of Regensburg) Defended October 21, 2011. University of Mannheim.
  • Sebastian Schinzel: Unintentional and hidden information leaks in networked software applications. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Jörg Schwenk, Ruhr-University Bochum) Defended April 23, 2012. University of Erlangen.
  • Amir Alsbih: Technische Sicherheitsaspekte bei Kabelnetzbetreibern. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Christian Schindelhauer, University of Freiburg) Defended May 8, 2012. University of Freiburg.
  • Juliane Blechinger: Ein Metadatenrepositorium zum Datenqualitätsmonitoring im Concurrent Engineering. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Richard Lenz, University of Erlangen) Defended July 6, 2012. University of Erlangen.
  • Zhang Fu: Multifaceted Defense Against Distributed Denial of Service Attacks: Prevention, Detection, Mitigation. (PhD thesis, faculty opponent, advisors Marina Papatriantafilou and Philippas Tsigas, Chalmers University of Technology) Defended September 19, 2012. Chalmers University of Technology, Sweden.
  • Andreas Dewald: Formalisierung digitaler Spuren und ihre Einbettung in die forensische Informatik. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Guido Schryen, University of Regensburg) Defended  November 12, 2012. University of Erlangen.
  • Michael Spreitzenbarth: Dissecting the Droid: Forensic Analysis of Android and its Malicious Applications. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Michael Meier, University of Bonn) Defended March 11, 2013. University of Erlangen.
  • Christian Jörn Dietrich: Identification and Recognition of Remote-Controlled Malware. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Christopher Krügel, UCSB) Defended March 28, 2013. University of Mannheim.
  • Joshua Isaac James: Automated Human Inference in Digital Forensic Investigations Using Hypothesis Reduction. (PhD thesis, external examiner, advisor Dr. Pavel Gladyshev, University College Dublin) Defended April 26, 2013. University College Dublin, Ireland.
  • Ralf Hund: Analysis and Retrofitting of Security Properties for Proprietary Software Systems. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Thorsten Holz, Ruhr-Universiy Bochum) Defended April 29, 2013. Ruhr-University Bochum.
  • Carsten Willems: Instrumenting Existing System Componente for Dynamic Analysis of Malicious Software. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Thorsten Holz, Ruhr-University Bochum) Defended April 29, 2013. Ruhr-University Bochum.
  • Christian Gorecki: Dilution - A novel Approach in Preserving Privacy. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Thorsten Strufe, TU Darmstadt) Defended April 30, 2013. University of Mannheim.
  • Steffen Wendzel: Novel Approaches for Network Covert Storage Channels. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Jörg Keller, FernUniversität Hagen) Defended May 7, 2013. FernUniversität Hagen.
  • Johannes Barnickel: Authentication and Identity Privacy in the Wireless Domain. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Ulrike Meyer, RWTH Aachen) Defended June 4, 2013. RWTH Aachen.
  • Tilo Müller: On the security of full disk encryption. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Wolfgang Schröder-Prekschat, FAU) Defended June 5, 2013. FAU
  • Marek Jawurek: Privacy in Smart Grids. (PhD thesis, 1st rewiewer, 2nd reviewer Prof. Günter Müller, University of Freiburg, advisor: Florian Kerschbaum) Defended July 17, 2013. FAU
  • Markus Engelberth: Social Malcode - Benutzerabhängige Schadprogramme. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Thorsten Holz, Ruhr-University Bochum) Defended September 11, 2013. University of Mannheim.
  • Raul Schmidlin Fajardo Silva: Contract Testing for Reliable Embedded Systems. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Reinhard Männer, Universität Heidelberg) Defended November 18, 2013. University of Heidelberg.
  • Stefan Vömel: Forensic Acquisition and Analysis of Volatile Data in Memory. (PhD thesis, 1st reviewer, 2nd reviewer Dr. Pavel Gladyshev, University College Dublin) Defended December 18, 2013. FAU.
  • Christopher Meyer: 20 Years of SSL/TLS Research - An Analysis of the Internet's Security Foundation. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Jörg Schwenk, Ruhr-Universität Bochum) Defended February 7, 2014, Ruhr-Universität Bochum.
  • Tobias Distler: Resource-efficient Fault and Intrusion Tolerance. (PhD thesis, 3rd reviewer, 1st reviewer: Prof. Wolfgang Schröder-Preikschat, 2nd reviewer: Prof. Rüdiger Kapitza, TU Braunschweig) Defended June 24, 2014. FAU.
  • Frank Breitinger: On the utility of bytewise approximate matching in computer science with a special focus on digital forensics investigations. (PhD thesis, 3rd reviewer, 1st reviewer: Prof. Stefan Katzenbeisser, TU Darmstadt, 2nd reviewer: Prof. Harald Baier, Hochschule Darmstadt) Defended June 30, 2014. TU Darmstadt.
  • Johannes Hoffmann: From Mobile to Security - Towards Secure Smartphones. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Thorsten Holz, Ruhr-Universität Bochum) Defended August 28, 2014. Ruhr-Universität Bochum.
  • Tobias Hoppe: Prävention, Detektion und Reaktion gegen drei Ausprägungsformen automotiver Malware. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Jana Dittmann, Otto von Guericke Universität Magdeburg) Defended December 10, 2014. Otto von Guericke Universität Magdeburg.
  • Christian Moch: Automatisierte Erstellung von Übungsaufgaben in der digitalen Forensik. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Jana Dittmann, Otto-von-Guericke University Magdeburg) Defended January 30, 2015. FAU
  • Hans-Georg Eßer: Design, Implementation and Evaluation of the ULIX Teaching Operating System. (PhD thesis, 1st reviewer, 2nd reviewer PD Daniel Lohmann, FAU) Defended March 23, 2015. FAU
  • Nadina Hintz: Der Einfluss des menschlichen Verhaltens auf die IT-Sicherheit und den Datenschutz. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Simone Fischer-Hübner, Karlstad University, Sweden, advisor: Zinaida Benenson) Defended April 1, 2015. FAU
  • Johannes Stüttgen: On the Viability of Memory Forensics in Compromised Environments. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Michael Meier, University of Bonn) Defended May 28,2015. FAU
  • Matthäus Wander: The Impact of DNSSEC on the Internet Landscape. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Torben Weis, Universität Duisburg-Essen) Defended June 19, 2015. University of Duisburg-Essen
  • Michael Riecker: Lightweight Intrusion Detection in Wireless Sensor Networks. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Matthias Hollick, TU Darmstadt) Defended June 22, 2015. TU Darmstadt
  • Benjamin Stock: Untangling the Web of Client-Side Cross-Site Scripting. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Michael Backes, Saarland University) Defended August 31, 2015. FAU
  • Matthias Stefan Meitner: Quantitative Bewertung der Softwarezuverlässigkeit unter Berücksichtigung der Komponenteninteraktionen. (PhD thesis, 2nd reviewer, 1st reviewer: Prof. Francesca Saglietti, FAU) Defended September 17, 2015. FAU
  • Andreas Kurtz: Dynamic Analysis and Privacy Implications of Apple iOS Apps. (PhD thesis, 1st reviewer, 2nd reviewer: Prof. Hannes Federrath, Universität Hamburg) Defended March 14, 2016. FAU
  • Johannes Formann: Kryptographische Insel zur Realisierung von Angreifertoleranz in redundanten Systemen. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Klaus Echtle, Universität Duisburg-Essen) Defended April 22, 2016. Universität Duisburg-Essen
  • Tobias Wüchner: Behavior-based Malware Detection with Quantitative Data Flow Analysis. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Alexander Pretschner, TU München) Defended July 5, 2016. TU München
  • Carlo Schäfer: Mail Infrastructure Traffic Analyzer - Erkennung kompromittierter E-Mail-Accounts. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Eberhard Zehendner, FSU Jena) Defended October 12, 2016. FSU Jena
  • Dr. Ingmar Baumgart: Dezentrale Systeme zum Schutz der Privatsphäre. Habilitation thesis, Karlsruher Institut für Technologie (KIT), 2016.
  • Michael Gruhn: Forensically Sound Data Acquisition in the Age of Anti-Forensic Innocence. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Zeno Geradts, University of Amsterdam) Defended November, 24, 2016. FAU
  • Johannes Bauer: On Inexpensive Methods for Improving Security of Embedded Systems. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Falko Dressler, University of Paderborn) Defended November 25, 2016. FAU
  • Sven Schindler: Honeypot Architectures for IPv6 Networks. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Bettina Schnor, University of Potsdam) Defended November, 28, 2016. University of Potsdam
  • Aleksandar Milenkoski: Evaluation of Intrusion Detection Systems in Virtualized Environments. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Samuel Kounev, University of Würzburg), Defended between November 28 and December 2, 2016. University of Würzburg
  • Stefan Meier: Digitale Forensik in Unternehmen. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Günther Pernul, University of Regensburg) Defended December, 2, 2016. University of Regensburg
  • Yi-Ching Liao: Process Tracking for Forensic Readiness. (PhD thesis, 1st opponent, 2nd opponent Prof. Delphine Reinhardt, University of Bonn, advisor: Prof. Hanno Langweg, HTW Konstanz and NTNU) Defended December, 16, 2016. NTNU in Gjovik, Norway.
  • Mykolai Protsenko: Securing the Android App Ecosystem: Obfuscation, Tamperproofing, and Malware detection. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Claudia Eckert, TU München, advisor: Tilo Müller) Defended April 12, 2017. FAU
  • Marian Kühnel: Detection of Traffic Initiated by Mobile Malware - Targeting Android Devices in 3GPP Networks. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Ulrike Meyer, RWTH Aachen University) Defended May 24, 2017. RWTH Aachen University
  • Thomas Hupperich: On the Feasibility and Impact of Digital Fingerprinting for System Recognition. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Thorsten Holz, Ruhr-Universität Bochum) Defended June 30, 2017. Ruhr-Universität Bochum
  • Vladislav Mladenov: On the Security of Single Sign-On. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Jörg Schwenk, Ruhr-Universität Bochum) Defended June 30, 2017. Ruhr-Universität Bochum
  • Janis Danisevskis: Accelerated Secure GUI for Virtualized Mobile Handsets. (PhD thesis, 3rd reviewer, 1st reviewer Prof. Jean-Pierre Seifert, TU Berlin, 2nd reviewer Prof. Konrad Rieck, TU Braunschweig) Defended August 15, 2017. TU Berlin
  • Yan Zhuang: Methods for Improving the Quality of Software Obfuscation for Android Applications. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Jingqiang Lin, Chinese Academy of Sciences, PR China) Defended September 26, 2017. FAU
  • Xiaobing He: Threat Assessment for Multistage Cyber Attacks in Smart Grid Communication Networks. (PhD thesis, 3rd reviewer, 1st reviewer Prof. Hermann de Meer, University of Passau, 2nd reviewer Prof. Stefan Rass, University of Klagenfurt, Austria) Defended October 2, 2017. University of Passau
  • Sven Kälber: Automatic Forensic Event Reconstruction based (not only) on File System Metadata. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Konrad Rieck, TU Braunschweig) Defended November 10, 2017. FAU
  • Rene Rietz: Optimization of Network Intrusion Detection Processes. (PhD thesis, 3rd reviewer, 1st reviewer Prof. Hartmut König, BTU Cottbus, 2nd reviewer Prof. Falko Dressler, Universität Paderborn) Defended November 17, 2017. BTU Cottbus
  • Fatih Kilic: Security Investigation in Encrypted Environment. (PhD thesis, 2nd reviewer, 1st reviewer Prof. Claudia Eckert, TU München) Defended November 24, 2017. TU München
  • Johannes Götzfried: Trusted Systems in Untrusted Environments: Protecting Against Strong Attackers. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Ingrid Verbauwhede, KU Leuven, Belgium) Defended December 7, 2017. FAU
  • Thomas Schreck: Incident Response: Current State, Emerging Problems, and New Approaches. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Michael Meier, Universität Bonn) Defended December 18, 2017. FAU
  • Konstantin Sack: Selektion in der Digitalen Forensik. (PhD thesis, 1st reviewer, 2nd reviewer Prof. Michael Meier, Universität Bonn) Defended December 18, 2017. FAU
     

Collection of famous citations

"Neuinstallieren skaliert nicht." (Thorsten Holz, June 18, 2008)

"People have said that computing is a fast moving subject and what they mean is that the wheel of re-incarnation goes faster."
 (Roger Needham in a SIGSOFT interview)

"Der Browser ist ein dreckiges Objekt mit vielen unangenehmen Eigenschaften." (Martin Johns, March 8, 2012)

 

My GPG Public Key

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2.0.21-beta20 (MingW32)
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=ahH2
-----END PGP PUBLIC KEY BLOCK-----

Statistics

My Erdös number is at most 3 (the path is via Matthias Kirchner and Pete Winkler). If you work(ed) in fault-tolerant distributed computing and want to know your Erdös number, check your collaboration distance to (for example) Shay Kutten, Shlomo Moran, Nicola Santoro or Gerard Tel; all have Erdös number 2.

As of September 2017, my h-index is at least 41 (using Harzing's PoP application). If I stop working now and citation rates remain the same, my h-index will be over 51 in 10 years, over 59 when I retire, and will reach the maximum of 146 (the number of papers referenced in Google scholar that are cited at least once every two years at time of writing) in about 2000 years.

My most often cited paper is the 2007 IEEE Security & Privacy Magazine article with Willems and Holz on "Toward automated dynamic malware analysis using CWsandbox" (until 2017 around 630 citations).

Images of Felix Freiling

Here are some images of Felix Freiling to upset Google image search. One of the following images shows me. I encourage you to set up a website with a picture of a person and the name "Felix Freiling" associated to it. If you inform me, I will link to such pages from here (to increase the page rank). Here are (somewhat strange) examples (first and second)