Research

My work in practical IT security focuses on security and privacy of network communication, cryptographic attacks on applications, and strengthening authentication and authorization systems.

I have authored over 30 peer‑reviewed papers, including many published in top‑tier (A*/A) security venues. I regularly serve on program committees for leading conferences and workshops. My research has been recognized with two Best Paper Awards. I also produce industry‑visible outputs through invited talks and applied security projects.

Security and Privacy in Networked Systems

I analyze, monitor, and improve authentication protocols used in web, mobile, IoT, and industrial systems. This includes protocols such as SAML, OAuth, and OpenID Connect, as well as emerging deployments around FAPI and passkeys.

Current and planned work includes:

  • continuous threat analysis for authentication protocols and web APIs
  • large-scale and automated security/privacy evaluation in the wild
  • adoption analysis of modern protocols (for example FIDO2 and passkeys)
  • extension of analysis methods to IoT authentication settings

Threat Intelligence for Data and Application Security

I study how structured data and office documents (PDF/OOXML/OpenDocument) can be weaponized, and how software fails when processing malicious inputs.

Current and planned work includes:

  • offensive analyses to identify detection blind spots and false negatives
  • security of cryptographically protected document workflows
  • malware-evasion techniques against detection pipelines to harden defenses
  • security and privacy of digital office environments and connected tooling