In fall 2017, Chris joined the Westphalian University as a professor of computer and network security. He is interested in systems security, and in particular malware analysis techniques in the context of targeted attacks, as well as the broader field of threat intelligence analysis.
With years of experience as a technical threat intelligence analyst with CrowdStrike, Chris has dealt with advanced nation-state targeted attacks.
Professor of Computer Security, 2017
Senior Threat Intelligence Analyst
PhD in Computer Security, 2013
In spring 2018, I will be teaching the following courses:
If you are looking for a bachelor or master thesis, check the following topics or get in touch with me if you have something security-related in mind:
The following is a subset of my publications. See here for a list of all publications.
The following blog was written while working for CrowdStrike. It deals with the developments and the propagation of exploits surrounding CVE-2014-1761, a code execution vulnerability in Microsoft Word that was also leveraged in targeted attacks. The post shows how the events unfolded and shows which actors used exploits for the vulnerability at which point in time.
Read the full blog at https://www.crowdstrike.com/blog/cve-2014-1761-alley-compromise/.
The following is a random subset of malware sample metadata of samples targeting Internet-of-Things devices. These samples and the infection sessions have recently been intercepted by our IoT collection honeypots. Consider these indicators as suspicious.
If you are looking for research collaboration on the topic of IoT malware or if you are interested in samples, please get in touch with me.