This was never intended for commercial use 

At eQ-3/ELV, we developed equipment for smart homes, e.g. to control light and heating. The products were designed for home use with respect to pricing, quality, and features. Earlier this year I visited an engineering company in the Lake Constance region. Engineers had been assigned to provisional laboratories until more office space would become available […]

Regional IT security challenges 

Integrated in our bachelor study programmes is a period where students are sent out into the world to apply what they have learned so far, experience a real workplace, and come back with new skills and renewed motivation for the remainder of their studies. Professors visit the students to ensure they are doing well and […]

Opting out of full-body scanning 

I was travelling lately. At CGN airport, they had installed new full-body security scanners. A small sign indicated that the scanners were supposed to cause no damage to passengers‘ health and that their use was optional. However, the setup of checkpoint led people to believe that use was not optional. Equipment had been placed so […]

Tower of Hanoi for information systems students 

I teach Introduction to Programming to students in our „WIN“ information systems bachelor study programme. When introducing the principle of recursion, it seems to be inevitable to talk about the Tower of Hanoi. A number of disks has to be moved from one of three rods to another. Because you can only move one disk […]

COINS@SWITS Västerås 2015 

Like in the past two years, I attended the SWITS seminar with a COINS delegation this year. SWITS is the Swedish IT Security Network for Ph.D. Students, in many ways a network of Ph.D. students and faculty like COINS. Samson Gejibo, Bikash Agrawal, Vivek Agrawal, and Seraj Fayyad joined from COINS. SWITS organised its annual […]

Two papers accepted at ISCC-SFCS and COMPSAC-SIMICE 2015 

Yi-Ching Liao and I co-authored papers that were accepted for presentation this summer. The first paper, „Events and Causal Factors Charting of Kernel Traces for Root Cause analysis“, will be presented at the ISCC-SFCS 2015, the Third International Workshop on Security and Forensics in Communication Systems, co-located with the Twentieth IEEE Symposium on Computers and […]

Privacy Points presented at ICSE/TELERISE 2015 

The team project on Privacy Points that I supervised in our MSI master programme in computer science resulted in a publication that was accepted for presentation at the TELERISE workshop co-located with the ICSE International Conference on Software Engineering. Presentations at the meeting focused on the intersection of technical and legal aspects of security and […]

HTWG Software Security class participates in 10KStudents initiative 

The goal of the 10KStudents challenge is to improve cyber security by teaching 10,000 university students the basic concepts of software vulnerabilities and secure programming. It has its roots in the (now completed) SysSec Network of Excellence of which I was an associate member. The challenge will teach students that security is inherent to all […]

CTF team of HTWG participates in iCTF2014-2015 

The yearly iCTF competition of the University of California Santa Barbara (UCSB) counts as one of the toughest in the field of applied IT security. Some even call it an unofficial CTF world championship. The team assembled at HTWG Konstanz finished best among the Universities of Applied Sciences in Baden-Württemberg earlier this month. Goal of […]

Informatik 2020 

In February, professors, lab managers, administrative employees, and students at the HTWG computer science department brainstormed and collected what we like, dislike and want to avoid to become as a department. The exercise yielded more than 250 items, ranging from great freedom in teaching and research to scarce office space and little international appeal. We […]