Prof. Dr.-Ing. Thomas Hupperich

Prof. Dr.-Ing. Thomas Hupperich

Leonardo Campus 3, Raum 328
48149 Münster

T: +49 251 83-38230
F: +49 251 83-38259

s: https://scholar.google.de/citations?user=p5c2P1MAAAAJ

Sprechzeiten

PGP Fingerabdruck: A10E0CAC5560AD7B7D3908963EC072717C4752D9

Akademisches Profil

Externe Profile

  • Forschungsschwerpunkte

    • Sicherheit von Nutzer*innensystemen
    • Privatheit von Daten
    • Datensicherheit
    • Systemsicherheit
    • Maschinelles Lernen für IT-Sicherheit
    • Sicherheit von KI-Systemen
    • Authentifizierung
    • User & Device Tracking
    • Ubiquitäre Sicherheit
  • Vita

    Akademische Ausbildung

    Doktor-Ingenieur (IT-Sicherheit)
    Master of Science (IT-Sicherheit)
    Dipl.-Wirt.-Inf. (FH)

    Rufe

    wwu muenster, IT-Security (W1) – angenommen
    Cyber Securityangenommen
  • Lehre

    Vorlesung
    Seminar

    Vorlesung
    Seminare
    Sonstige Lehrveranstaltung

    Vorlesung
    Seminare
    Sonstige Lehrveranstaltung

    Vorlesung
    Seminare

    Vorlesung
    Seminare
    Sonstige Lehrveranstaltung
  • Projekte

    • FOR 5393: Die digitale Mittelstadt der Zukunft - Teilprojekt: Vertrauensmanagement in der Digitalen Mittelstadt ()
      Teilprojekt in DFG-Verbund koordiniert an der Universität Münster: DFG - Forschungsgruppe | Förderkennzeichen: DI 2760/1-1
    • Standortübergreifendes Graduiertenkolleg: „North Rhine-Westphalian Experts on Research in Digitalization“ (NERD) - Tandempromotion: "MedMax: Preparing Hospital Environments for Future Cyber lncidents" ()
      participations in other joint project: MKW - Förderlinie „Digitale Sicherheit“ - Standortübergreifendes Graduiertenkolleg | Förderkennzeichen: 005-2201-0014
    • FOR 5393: Die digitale Mittelstadt der Zukunft - Teilprojekt: IT-Sicherheit: Security Orchestration, Automation and Response als Sicherheitsstrategie der mittelstädtischen Digitalisierung ()
      Teilprojekt in DFG-Verbund koordiniert an der Universität Münster: DFG - Forschungsgruppe | Förderkennzeichen: HU 3005/2-1
    • FOR 5393: Die digitale Mittelstadt der Zukunft ()
      DFG-Hauptprojekt koordiniert an der Universität Münster: DFG - Forschungsgruppe
    • IIP – Intelligenter lntermodaler Pendlerverkehr ()
      participations in bmbf-joint project: Bundesministerium für Bildung und Forschung | Förderkennzeichen: 16KISA121
  • Publikationen

    • Schmidt, Lukas; Kortmann, Sebastian; Hupperich, Thomas. . ‘Improving Trace Synthesis by Utilizing Computer Vision for User Action Emulation.’ In Proceedings of the Digital Forensics Research Conference USA (DFRWS USA) 2023. doi: 10.1016/j.fsidi.2023.301557.
    • Schmidt, Lukas; Hosseini, Henry; Hupperich, Thomas. . ‘Assessing the Security and Privacy of Baby Monitor Apps.’ Journal of Cybersecurity and Privacy 3, Nr. 3. doi: https://doi.org/10.3390/jcp3030016.
    • Arora, Siddhant; Hosseini, Henry; Utz, Christine; Bannihatti Kumar, Vinayshekhar: Dhellemmes, Tristan; Ravichander, Abhilasha; Story, Peter; Mangat, Jasmine; Chen, Rex; Degeling, Martin; Norton, Tom; Hupperich, Thomas; Wilson, Shomir; Sadeh, Norman. . ‘A Tale of Two Regulatory Regimes: Creation and Analysis of a Bilingual Privacy Policy Corpus.’ In Proceedings of the 13th Conference on Language Resources and Evaluation, edited by European Language Resources Association (ELRA), 5460–5472. France: European Language Resources Association. doi: https://aclanthology.org/2022.lrec-1.585.
    • Hosseini, Henry; Rengstorf, Julian; Hupperich, Thomas. . ‘Automated Search for Leaked Private Keys on the Internet: Has Your Private Key Been Pwned?In Proceedings of the 17th International Conference on Software Technologies, edited by SciTePress, 649–656. Lisbon, Portugal: SciTePress. doi: 10.5220/0011308000003266.
    • Gunkel, Tamara; Hupperich, Thomas. . ‘Discovering Vulnerabilities and Patches for Open Source Security.’ In Proceedings of the 17th International Conference on Software Technologies, edited by SciTePress. Lisbon, Portugal: SciTePress.
    • Rashidibajgan, Samaneh; Hupperich, Thomas. . ‘Improving the Performance of Opportunistic Networks in Real World Applications Using Machine Learning Techniques.’ Journal of Sensor and Actuator Networks 11 (4): 61–90. doi: 10.3390/jsan11040061.
    • Kluss, Benedikt; Rashidibajgan, Samaneh; Hupperich, Thomas. . ‘Blossom: Cluster-Based Routing for Preserving Privacy in Opportunistic Networks.’ Journal of Sensor and Actuator Networks 11, Nr. 4: 75. doi: 10.3390/jsan11040075.
    • Hosseini, Henry; Degeling, Martin; Utz, Christine; Hupperich, Thomas. . ‘Unifying Privacy Policy Detection.’ In Proceedings on Privacy Enhancing Technologies, edited by Johnson, Aaron; Kerschbaum, Florian, 480–499. Online: De Gruyter. doi: 10.2478/popets-2021-0081.
    • Rashidibajgan S, Hupperich T, Doss R, Förster A. . ‘Secure and privacy preserving structure in Opportunistic Networks.’ Computers and Security 103.
    • Becker, Jörg; Distel, Bettina; Grundmann, Matthias; Hupperich, Thomas; Kersting, Norbert; Löschel, Andreas; Parreira do Amaral, Marcelo; Scholta, Hendrik. . Challenges and Potentials of Digitalisation for Small and Mid-sized Towns: Proposition of a Transdisciplinary Research Agenda Working Papers, Nr. 36. Münster: European Research Center for Information Systems, .
    • Hupperich T, Dassel K. . ‘On the Usefulness of User Nudging and Strength Indication concerning Unlock Pattern Security.’ Contributed to the IEEE International Conference On Trust, Security And Privacy In Computing And Communications, Guangzhou.
    • Rashidibajgan S, Hupperich T, Doss R, Pan L. . ‘Opportunistic Tracking in Cyber-Physical Systems.’ Contributed to the IEEE International Conference On Trust, Security And Privacy In Computing And Communications, Guangzhou.
    • Rashidibajgan S, Hupperich T. . ‘A Secure and Reliable Structure in Opportunistic Networks.’ Journal of Information System Security 2020.
    • Bortolameotti Riccardo, van Ede Thijs, Continella Andrea, Hupperich Thomas, Everts Maarten, Rafati Reza, Jonker Willem, Hartel Pieter, Peter Andreas. . ‘HeadPrint: Detecting Anomalous Communications through Header-based Application Fingerprinting.’ Contributed to the ACM Symposium on Applied Computing, Brno, Czech Republic.
    • Hupperich T, Tatang D, Wilkop N, Holz T. . ‘An Empirical Study on Online Price Differentiation.’ Contributed to the ACM Con­fe­rence on Data and Ap­p­li­ca­ti­ons Se­cu­ri­ty and Pri­va­cy (CO­DAS­PY 2018), Tempe, Arizona, USA.
    • Hupperich T. . On the feasibility and impact of digital fingerprinting for system recognition Dissertationsschrift, Ruhr-Universität Bochum, Germany.
    • Krombholz K, Hupperich T, Holz T. . ‘May the Force Be with You: The Future of Force-Sensitive Authentication.’ IEEE Internet Computing 21, Nr. 3: 64–69. doi: 10.1109/MIC.2017.78.
    • Hupperich T, Tatang D, Wilkop N, Holz T. . ‘An Empirical Study on Price Differentiation Based on System Fingerprints.’ arXiv preprint arXiv:1712.03031 2017.
    • Hupperich Thomas, Hosseini Henry, Holz T. . ‘Leveraging Sensor Fingerprinting for Mobile Device Authentication.’ In DIMVA 2016: Proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, edited by Caballero, Juan; Zurutuza, Urko; Rodríguez, Ricardo J., 377–396. Spain: Springer. doi: 10.1007/978-3-319-40667-1_19.
    • Hupperich T, Krombholz K, Holz T. . ‘Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness.’ Contributed to the 9th In­ter­na­tio­nal Con­fe­rence on Trust & Trust­wor­thy Com­pu­ting (TRUST), Vienna, Austria. doi: 10.1007/978-3-319-45572-3_3.
    • Krombholz K, Hupperich T, Holz T. . ‘Use the force: Evaluating force-sensitive authentication for mobile devices.’ Contributed to the w­elfth Sym­po­si­um on Usa­ble Pri­va­cy and Se­cu­ri­ty (SOUPS 2016), Denver, USA.
    • Hupperich T, Maiorca D, Kührer M, Holz T, Giacinto G. . ‘On the robustness of mobile device fingerprinting: Can mobile users escape modern web-tracking mechanisms? Contributed to the 31th An­nual Com­pu­ter Se­cu­ri­ty Ap­p­li­ca­ti­ons Con­fe­rence (ACSAC), Los Angeles, California, USA.
    • Kührer M, Hupperich T, Bushart J, Rossow C, Holz T. . ‘Going wild: Large-scale classification of open DNS resolvers.’ Contributed to the 15th ACM In­ter­net Me­a­su­re­ment Con­fe­rence (IMC), Tokyo, Japan.
    • Hupperich T. . Mobile Device Fingerprinting.
    • Hupperich T, Maiorca D, Kührer M, Holz T, Giacinto G. . ‘On the Effectiveness of Fingerprinting Mobile Devices Investigating Modern Web-Tracking Mechanisms.’ Horst Görtz In­sti­tut für IT-Si­cher­heit (HGI) 2015.
    • Uellenbeck S, Hupperich T, Wolf C, Holz T. . ‘Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones.’ Contributed to the Fi­nan­ci­al Cryp­to­gra­phy and Data Se­cu­ri­ty, San Juan, Puerto Rico. doi: 10.1007/978-3-662-47854-7_15.
    • Uellenbeck S, Hupperich T, Wolf C, Holz T. . ‘Tactile one-time pad: smartphone authentication resilient against shoulder surfing.’ Tech. rep., Horst Görtz Institute for IT-Security (HGI), HGI-2014–003; 2014.
    • Kührer M, Hupperich T, Rossow C, Holz T. . ‘Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks. Contributed to the 8th USE­NIX Work­shop on Of­fen­si­ve Tech­no­lo­gies (WOOT), San Diego, California, USA.
    • Kührer M, Hupperich T, Rossow C, Holz T. . ‘Exit from Hell? Reducing the Impact of Amplification DDoS Attacks. Contributed to the 23rd USE­NIX Se­cu­ri­ty Sym­po­si­um, San Diego, California, USA.
    • Kührer M, Hupperich T, Rossow C, Holz T. . Amplification DDoS Attacks.
    • Hupperich T, Löhr H, Sadeghi A, Winandy M. . ‘Flexible patient-controlled security for electronic health records.’ Contributed to the ACM SIG­HIT In­ter­na­tio­nal Sym­po­si­um on Health In­for­ma­tics (IHI), Miami, Florida, USA.