Sebastian Gerling
Dr.-Ing. | Staff


  • Building E9 1, Room 1.01
  • +49 681 302 57373
  • +49 681 302 71 942
  • gerling(aeht)cispa.saarland
  • Personal Webpage

Curriculum Vitae

I started studying computer science in October 2004 and finished my Bachelor studies in September 2007 with a thesis on "LAN Crypt Gateway and Secure Browser Access" at the Information Security and Cryptography Chair. Afterwards, I did my Master studies in computer science and finished them with a thesis on "Acoustic Side-Channel Attacks on Printers" at the same chair in April 2009. From July 2009 to December 2014 I was member of the International Max Planck Research School for Computer Science and the Saarbrücken Graduate School of Computer Science to pursue my PhD under the supervision of Prof. Michael Backes. I successfully defended my thesis titled "Plugging in Trust and Privacy - Three Systems to Improve Widely Used Ecosystems" in December 2014. Since July 2012, I have been the Administrative Manager of CISPA.
Since Juli 2012 Administrative Manager of the Center for IT-Security, Privacy and Accountability (CISPA)
Juli 2009 - Dec. 2014 PhD Student in the Information Security and Cryptography Group at Saarland University
Jan 2008 - June 2009 Part-time employee in the Information Services and Technology Group, Max Planck Institute for Software Systems
2007 - 2009 Master of Science in Computer Science Department of Computer Science , Saarland University
2004 - 2007 Bachelor of Science in Computer Science Department of Computer Science , Saarland University

Awards

  • 2009 – PhD Scholarship of the International Max Planck Research School for Computuer Science;
    Admission into the IMPRS-CS including funding for the PhD
  • 2010 – Förderpreis im Rahmen des GDD-Wissenschaftspreises 2010;
    Auszeichnung für Nachwuchsforscher im Rahmen des jährlichen GDD-Wissenschaftspreises

Projects

Android Security

Android has become the most popular operating system for mobile devices, which makes it a prominent target for malicious software. Its security concept based on app isolation and access control however is unsatisfactory. This projects researches program analyses that ameliorate this situation. For example our system AppGuard enforces security policies at runtime without requiring root permissions.

Android Access Control

Enabling generic, multi-layered, and extensible access control on Android.

Publications

2016

R-Droid: Leveraging Android App Analysis with Static Slice Optimization

2014

Scippa: System-Centric IPC Provenance on Android

Android Security Framework: Extensible Multi-Layered Access Control on Android

WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP

X-pire 2.0 - A User-Controlled Expiration Date and Copy Protection Mechanism.

2013

AppGuard – Fine-grained Policy Enforcement for Untrusted Android Applications

Advances in Mobile Security

AppGuard - Enforcing User Requirements on Android Apps

Callee-site Rewriting of Sealed System Libraries

Wie realistisch ist ein "Recht auf Vergessenwerden"?

Idea: Callee-Site Rewriting of Sealed System Libraries

2011

A Local Cross-Site Scripting Attack against Android Phones

X-pire! - A digital expiration date for images in social networks

2009

Acoustic Side-Channel Attacks on Printers

2007

LAN Crypt Gateway and Secure Browser Access