I'm interested in everything related to the intersection of programming languages and security.
I received my doctoral degree from Technische Universität Darmstadt in 2016 while working in Mira Mezini's Software Technology Group on problems in the field of static analysis and security. In this time, I received the Software Campus grant for my research project PEAKS.The Software Campus initiative is a program for the development of Germany’s future senior IT executives.
Before this I worked for 5 years for a-tune software AG in Darmstadt as their Chief Architect. My team and I built enterprise software for highly-regulated environments based on a practical product line approach.
I studied at Technische Universität Darmstadt and received a Diploma (eq. to Master degree) in 2006.
Registration chair for ICSE 2020
Program committee member of the Entwicklertag Frankfurt 2019
Organizing Co-Chair for SOAP 2018
Artifact Evaluation Co-Chair for ISSTA 2018
Program committee member for BenchWorks 2018
External Review Committee Member for PLDI 2018
Local arrangements chair for ESEC/FSE 2017
Artifact Evaluation committee member of the SPLASH 2017 OOPSLA Artifacts Track
Competition committee member of the ESEC/FSE 2017 Student Research Competition
Program committee member of the ECOOP 2017 Doctorial Symposium
Program committee member of the Entwicklertag Frankfurt 2014-2018
Organizer of the Language-Based Security Reading Group at the Software Technology Group at TU Darmstadt
Coordinator for the Advisory Board of Study Affairs of CASED
Delphi helps to create benchmark program sets for the evaluation of program analyses.
Platform for the Efficient Analysis and Secure Composition of Software Components
OPAL is an OPen, extensible Analysis Library for Java bytecode which is written in Scala. It supports various analyses and has support for abstract interpretation and bytecode manipulation/instrumentation.
PhASAR is a flexible framework to analyze LLVM IR bitcode enabling complex data-flow analysis for programs written in C/C++.
Soot is currently rewritten from scratch allowing it to be adapted to modern software engineering techniques and preparing it for the future of program analysis.
Collecting illustrating examples for past exploits of Java and the JCL
Inside-out data-flow analysis for integrity and confidentiality problems
Download and check S/MIME certificate
Heinz Nixdorf Institut