Speaker: Julian Kirsch
Julian Kirsch is a PhD student working in the field of computer security at Technische Universität München in Munich, Bavaria, Germany where he also obtained his MS degree in computer science in 2014. His research focuses on reverse engineering, virtual machine introspection, binary exploitation and malware analysis. In his leisure time he participates in capture-the-flag competitions for the H4x0rPsch0rr team. He also is the maintainer of TCP Stealth, an RFC draft and implementation of an improved version of port knocking which operates directly in the Linux/FreeBSD kernel.
Events in this conference
Towards Transparent Dynamic Binary Instrumentation using Virtual Machine Introspection |