TUM Logo

Fabian Franzen

Fabian Franzen

Wimi

Address:

Technische Universität München
Chair for IT Security (I20)
Boltzmannstraße 3
85748 Garching (near Munich)
Germany


Phone: +49 (0)89 289-17384
Fax: +49 (0)89 289-18579
E-Mail:
Room: 01.08.055

Teaching

  • Summer Semester 2019
    • Practical Course: Rootkit Programming
    • Seminar: Reverse Engineering
    • Exercises for Lecture: Secure Mobile Systems (SMS)
  • Winter Semester 2018/2019
    • Practical Course: Honeynet & Malware Forensics
    • Practical Course: Rootkit Programming
    • Exercises for Lecture: IT-Security
  • Summer Semester 2018
    • Exercises for Lecture: Secure Mobile Systems (SMS)
    • Assistance for Seminar: Reverse Engineering

PGP Key

Fingerprint: 3FDE 8396 8B30 2707 0DE7  6CFF 3749 CEC2 ACC6 E196

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=wVJl
-----END PGP PUBLIC KEY BLOCK-----

 

Publications

2022 Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots
2021 Method Confusion Attack on Bluetooth Pairing
2020 FridgeLock: Preventing Data Theft on Suspended Linux with Usable Memory Encryption
2018 Hardware-accelerated Data Acquisition and Authentication for High-speed Video Streams on Future Heterogeneous Automotive Processing Platforms
Kernel-Assisted Debugging of Linux Applications