M. Sc. Christian A. Gorke (geb. Reuter)

PhD Student / Doctoral Researcher / Wissenschaftlicher Mitarbeiter

Contact / Kontakt

Mail: gorke(at)uni-mannheim.de (PGP-Key)

Phone: 0621-181-2668
Fax: 0621-181-3456

Office: B6, 26, Gebäudeteil B, B2.01
Office hours only by appointment.

Address: Universität Mannheim
Chair of Practical Computer Science IV:
Dependable Systems Engineering
Christian A. Gorke
B6, 26, Gebäudeteil B, B2.01
68131 Mannheim
Germany

Web: christiangorke.de
Twitter: @mordarok

Research Interests / Forschungsinteressen

  • Proofs of Property, especially PoR/PDP
  • Cloud Security
  • Mobile Authentication
  • Sidechannel Atttacks on Mobile Devices
  • Mobile Security
  • IT-Security
  • Homomorphic Encryption
  • Cryptography, Cryptanalysis, and Cryptographic Engineering
  • Applied Cryptography
  • SHA-3, especially Grøstl
  • Web Security

Teaching / Lehre

Courses / Veranstaltungen

Supervised Master Theses / Betreute Masterarbeiten

  • Cloud Standards and Cloud Auditing: How to Ensure Cloud Security (HWS 2017)
  • Investigation of Different Techniques and Use Cases for Cloud Auditing (HWS 2016/FSS 2017)
  • Big Data Security Analytics for Threat Intelligence (HWS 2016/FSS 2017)
  • SMAUG in the Plane: Sensor Enhanced Signatures (HWS 2016/FSS 2017)
  • Inferring Passwords from Motion Data on Mobile Devices (HWS 2016)
  • Touch without Screen: Indirect Recognition of Taps and Wipes on Windows Phone (HWS 2014/FSS 2015)
  • Implementation and Evaluation of a Compact Proof-Of-Retrievability Algorithm (FSS 2014/HWS 2014)

Supervised Bachelor Theses / Betreute Bachelorarbeiten

  • Drucker Tracking: Steganographie und Versteckte Machine Identification Codes (FSS 2018)
    Printer Tracking: Steganography and Hidden Machine Identification Codes
  • Evaluating Security of Messaging Applications and their Underlying Frameworks (FSS 2018)
    Auswerten der Sicherheit von Nachrichtenanwendungen und den unterliegenden Frameworks
  • Crypto Currencies: Theft, Security, and Privacy of Monero and DASH (FSS 2018)
    Kryptowährungen: Diebstahl, Sicherheit und Privatsphäre von Monero und DASH
  • The NSA Surveillance Revelation (FSS 2018)
    Der NSA-Skandal
  • Security Evaluation of Intel SGX and ARM TrustZone in Combination with DRM and Crypto Currencies (FSS 2018)
    Sicherheitsbewertung von Intel SGX und ARM TrustZone in Verbindung mit DRM und Kryptowährungen
  • Analyse des Rowhammer Effekts (FSS 2018)
  • Proofs of Retrievability: State of the Art (HWS 2017)
    Proofs of Retrievability: Stand der Technik
  • Achieving Privacy in Cryptocurrencies Based on Smart Contracts (HWS 2017)
    Privatsphäre in Krypto-Währungen Basierend auf Smart Contracts
  • Countermeasures for Relay-Attacks in Automotive Security (HWS 2017)
    Gegenmaßnahmen für Relay-Angriffe in Automobiler Sicherheit
  • Systemization of Proofs of Location Schemes (HWS 2017)
    Systematisierung von Proofs of Location Verfahren
  • Von L bis O: Veränderungen des Android Sicherheitsmodells (FSS 2017)
    From L to O: Changes in the Android Security Model
  • Comparison of Trusted Computing Techniques (FSS 2017)
    Vergleiche von Trusted Computing Techniken
  • Cross-Browser Fingerprinting Techniques and Their Applications (FSS 2017)
    Cross-Browser Fingerprinting Techniken und Ihre Anwendungen
    Best thesis of the year 2016/2017 / Beste Abschlussarbeit des Jahrgangs 2016/2017
  • Kryptomalware aus dem Darknet (FSS 2017)
    Crypto Malware from the Darknet
  • Differential Privacy in Neural Networks (FSS 2017)
  • Evaluating Windows 10 Privacy (FSS 2017)
  • Experiments for Secure Mobile Authentication Using Gestures (HWS 2016)
  • Warum Krypto-Einschränkungen der 90er Moderne Sicherheit Schwächt (FSS 2016)
    Why 90s Crypto Restrictions Weaken Modern Security
  • Attacking Scammers (FSS 2015)
    Best thesis of the year 2015/2016 / Beste Abschlussarbeit des Jahrgangs 2015/2016
  • Analysis of App-Communication Mechanisms in Windows Phone 8.1 (FSS 2015)
    Best thesis of the year 2014/2015 / Beste Abschlussarbeit des Jahrgangs 2014/2015
  • Motion Sensors in Android Devices (FSS 2015)
    Bewegungssensoren in Android Geräten
  • Software-Based Attestation (FSS 2014)
    Software-basierte Attestierung

Supervised Research Seminars / Betreute Wissenschaftliche Seminararbeiten

  • Zero-knowledge proofs of identity & The knowledge complexity of interactive proof-systems (HWS 2017)
  • Scanning Malware (HWS 2017)
  • Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications (HWS 2017)
  • Turla & WannaCry / SambaCry & Petya / NotPetya (HWS 2017)
  • A Blockchain-based Anonymous Physical Delivery System & Computer Security, Privacy, and DNA Sequencing (HWS 2017)
  • TwinsCoin (HWS 2017)
  • Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors: Rowhammer (HWS 2017)
  • Post-quantum RSA & Shor's Algorithm (HWS 2017)
  • Ethereum, Smart Contracts, Scheme, Everledger & DAO Hack & Ethereum Hack 1 & 2 (HWS 2017)
  • Geolocation of Data in the Cloud & Do You Know Where Your Cloud Files Are? (HWS 2017)
  • Retricoin: Bitcoin based on Compact proofs of retrievability (HWS 2017)
  • Tesla cars: Remote Hacking (FSS 2017)
  • Off-Path TCP Exploits: Global Rate Limit Considered Dangerous & New Methods for Passive Estimation of TCP Round-Trip Times (FSS 2017)
  • Purposely Confusing Machine Learning & Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition & Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples (FSS 2017)
  • Zerocash & Zerocoin (FSS 2017)
  • (Cross-)Browser Fingerprinting via OS and Hardware Level Features (FSS 2017)
  • Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (FSS 2017)
  • Spoofing GPS and Countermeasures (FSS 2017)
  • DDoS Attacks 1 & DDoS Attacks 2 & DDoS Attacks 3 (FSS 2017)
  • Learning to Protect Communications with Adversarial Neural Cryptography (FSS 2017)
  • User-Generated Free-Form Gestures for Authentication: Security and Memorability (FSS 2017)
  • Big Data Analytics for Security Intelligence (HWS 2016)
  • Physical Cryptanalysis of KeeLoq Code Hopping Applications (HWS 2016)
  • Security of BMWs ConnectedDrive (HWS 2016)
  • Lock It and Still Lose It - On the (In)Security of Automotive Remote Keyless Entry Systems (HWS 2016)
  • Front-Door vs. Back-Door, Apple vs. IBM Debate & Encryption & Politics: Escrowed Encryption Standard ("Clipper Chip") & Feinstein-Burr Bill (HWS 2016)
  • Off-Path TCP Exploits: Global Rate Limit Considered Dangerous (HWS 2016)
  • Fingerprints: Online tracking: A 1-million-site measurement and analysis (HWS 2016)
  • Differential Privacy & RAPPOR (HWS 2016)
  • Malware PC: Locky, CTB-Locker, TeslaCrypt 2, trun, CryptoLocker, KeRanger, Surpirse, Petya, Samsa: How they work and why some stopped encrypting & Malware Mobil: SLocker, Xbot, Cyber Police (HWS 2016)
  • POODLE & LogJam (FSS 2016)
  • Blockchain-Based Systems & Zukunft von Bitcoin (FSS 2016)
  • AccelPrint: Beschleunigungssensor als Identifikator (FSS 2016)
  • MoLe: Motion Leaks through Smartwatch Sensors (FSS 2016)
  • Insecurity of Voice Solution VoLTE in LTE Mobile Networks (FSS 2016)
  • MagSpoof (FSS 2016)
  • Crypto & Politics: Front-Door vs. Back-Door (FSS 2016)
  • FREAK (HWS 2015)
  • RC4-Angriff von Shamir et al. (HWS 2015)
  • Simon and Speck ciphers (HWS 2015)
  • Axolotl & TextSecure (HWS 2015)
  • Advantages of Peercoin in respect to Bitcoin (HWS 2015)
  • Stagefright Sicherheitslücke & Android 5 Lockscreen Bypass Vulnerability (HWS 2015)
  • Malware-as-a-Service: Trojan Software Tox & Shellshock Sicherheitslücke (HWS 2015)
  • Return-Oriented Programming, "Exploits Without Code Injection" (HWS 2015)
  • Automotive: Remote Exploitation of an Unaltered Passenger Vehicle & Comprehensive Experimental Analyses of Automotive Attack Surfaces (HWS 2015)
  • Block Ciphers: Algebraic Cryptanalysis and Gröbner Bases (HWS 2015)
  • Heartbleed & Shellshock (HWS 2015)
  • Angriffe auf DECT Systeme (FSS 2015)
  • Honeywords Project (FSS 2015)
  • Locating Mobile Phones with SS7 (FSS 2015)
  • KeySweeper (FSS 2015)
  • Gyrophone (HWS 2014)
  • Windows Phone 8.1 Sicherheits-Modell (HWS 2014)
  • Heartbleed (HWS 2014)

Publications / Publikationen

Patents / Patente

  • Method for Proving Retrievability of Information.
    F. Armknecht, J.-M. Bohli, G. Karame, C. Reuter.
    Publication numbers: WO 2015173434 A1, US 20170126684 A1

Media / Medien

Short CV / Kurzbiografie

  • 2016-02-04: Co-organizing the first workshop of PAL SAaaS "Cloud Security Framework"
  • since 2015-11: Doctoral researcher on the project PAL SAaaS
  • 2015-10-22 - 2015-10-30: Short Term Scientific Mission at the Information Security Group, Royal Holloway, University of London
  • 2013 - 2015: Doctoral researcher on a DAAD project on Fully Homomorphic Encryption
  • since 2013-09: PhD student in the working group Cryptography of the chair Theoretical Computer Science and IT Security at the University of Mannheim, Germany, under supervision of Professor Frederik Armknecht.
  • 2013: Master of Science in mathematics with subsidiary subject computer science at Justus-Liebig-University Gießen, Germany. Qualification: very good.
  • 2011-11 - 2012-04: Research student for Master Thesis at Infineon Technologies AG, Munich, Germany.
  • 2011-02 - 2011-04: Internship at Infineon Technologies AG, Munich, Germany.
  • 2009: Bachelor of Science in mathematics with subsidiary subject computer science at the Justus-Liebig-University Gießen, Germany.