University of Passau
Department of Informatics and Mathematics
IT-SEC 
   University of Passau  >  FIM  >  IT-SEC  >  Members > Daniel Schreckling      SiteMapSitemap  Seitenende

Dipl.-Inform., M.Sc. Daniel Schreckling

Daniel Schreckling

Contact Details

email schreckling
PGP/GnuPGP-Public-Key
(Fingerprint: 6629 7511 1DBA 8F59 03EE 7C32 9A47 5365 9FF5 93F1)

Phone: +49-851-509-3216
Fax: +49-851-509-3212

Office Address 

Universität Passau
Innstrasse 43
94032 Passau, Germany
Room: 135a (ITZ)

Research Interest

  • Data Flow Control in
    • Internet/Web of Things
    • Pervasive-
    • Autonomous-
    • Adaptive Systems
  • Applied Software Security on Mobile Devices (Android Security)
  • Further Interests
    • Interacting ASMs
    • Security in Artificial Chemistries
    • Category Theory for Security
    • Coalgebras

Projects

  • Current Projects
    • I am currently in charge of TP9 in FORSEC


Publications

  • Parra R. J. D., Schreckling, D. and Posegga,Joachim. Addressing Data-Centric Security Requirements for IoT-Based Systems. In 2016 International Workshop on Secure Internet of Things (SIoT), pages 1-10, September, 2016. doi...  pdf...  bibtex ...
  • D. Schreckling, J. D. P. Rodriguez and J. Posegga. Data centric Security for IoT. In Proc. of 2nd EAI International Conference on IoT as a Service, Springer, October, 2015.  To appear soon bibtex ...
  • C. L. Nehaniv, J. Rhodes, A. Egri-Nagy, P. Dini, E. R. Morris, G. Horváth, F. Karimi, D. Schreckling and M. J. Schilstra. Symmetry structure in discrete models of biochemical systems: natural subsystems and the weak control hierarchy in a new model of computation driven by interactions. In Philosophical Transactions of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, 373 (2046), 2015. doi...  bibtex ...
  • Parra R. J. D., Schreckling, D. and Posegga, J. Identity Management in Platforms Offering IoT as a Service. In Internet of Things. User-Centric IoT, pages 281-288, Springer International Publishing, 2015. doi...  paper...  bibtex ...
  • G. Baldini, T. Peirce, M. Botterman, M. C. Talacchini, A. Pereira, M. Handte, D. Rotondi, H. C. Pöhls, O. Vermesan, A. Baddii, B. Copigneaux, Schreckling, D., L. Vigano, G. Steri, S. Piccione, P. Vlacheas, V. Stavroulaki, D. Kelaidonis, R. Neisse, E. Tragos, P. Smadja, C. Hennebert, M. Serrano, S. Severi, G. Abreu, P. T. Kirstein, S. Varakliotis and A. Skarmeta. Internet of Things -- Governance, Privacy and Security Issues. IERC, 2015. bibtex ...
  • B. Mandler, F. Antonelli, R. Kleinfeld, C. Pedrinaci, D. Carrera, A. Gugliotta, D. Schreckling, I. Carreras, D. Raggett, M. Pous, C. V. Villares and V. Trifa. COMPOSE - A journey from the Internet of Things to the Internet of Services. In Workshop: Cloud Computing Project and Initiatives - CCPI'13, March 26th, 2013, 2013. bibtex ...
  • D. Schreckling, S. Huber, F. Höhne and J. Posegga. URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security. In Proc. of the 7th Workshop in Information Security Theory and Practice (WISTP 2013), Springer-Verlag, 2013.  (to appear) bibtex ...
  • P. Dini, C. L. Nehaniv, A. Egri-Nagy, M. J. Schilstra, D. Schreckling, J. Posegga, G. Horvath and A. J. Munro. Biological and Mathematical Basis of Interaction Computing. In International Journal of Unconventional Computing, 8 (4): 283-287, 2012. paper...  bibtex ...
  • D. Schreckling, J. Posegga, J. Köstler and M. Schaff. Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android. In Proceedings of the 6th Workshop in Information Security Theory and Practice, WISTP'12, Springer Verlag, June, 2012.  To appear. bibtex ...
  • D. Schreckling, J. Posegga and D. Hausknecht. Constroid: Data-Centric Access Control for Android. In Proceedings of the 27th Symposium on Applied Computing (SAC): Computer Security Track, 2012.  To appear. bibtex ...
  • D. Schreckling and J. Posegga. Adaptive Security Architectures for Global Sensing Applications. In Electronic Communications of the EASST, 37, 2011. paper...  bibtex ...
  • J. Posegga and D. Schreckling. Next Generation Mobile Application Security: Android and Beyond. In IT-Sicherheit zwischen Regulierung und Innovation: Tagungsband zur zweiten EICT-Konferenz IT-Sicherheit, Vieweg+Teubner Verlag, February, 2011. bibtex ...
  • D. Schreckling and T. Marktscheffel. An Artificial Immune System Approach for Artificial Chemistries Based on Set Rewriting. In Proceedings of 9th Annual Conference in Artificial Immune Systems (ICARIS), Edinburgh, UK, July 26-29, pages 250-263, Springer, July, 2010.  Best paper award. doi...  bibtex ...
  • E. Altman, P. Dini, D. Miorandi and D. Schreckling, Ed. Paradigms for Biologically-Inspired Autonomic Networks and Services -- The BIONETS Project eBook. BIONETS Consortium, March, 2010. pdf...  bibtex ...
  • P. Dini and D. Schreckling. On Abstract Algebra and Logic: Towards their Application to Cell Biology and Security. In Paradigms for Biologically-Inspired Autonomic Networks and Services, pages 67-104, BIONETS Consortium, March, 2010. bibtex ...
  • P. Dini, D. Schreckling and G. Horváth. Algebraic and Categorical Framework for Interaction Computing and Symbiotic Security. In Paradigms for Biologically-Inspired Autonomic Networks and Services, pages 105-176, BIONETS Consortium, March, 2010. bibtex ...
  • P. Dini and D. Schreckling. A Research Framework for Interaction Computing. In Digital Ecosystems, Third International Conference, OPAALS 2010, Springer, March, 2010. bibtex ...
  • I. Carreras, L. Bassbouss, D. Linner, H. Pfeffer, V. Simon, E. Varga, D. Schreckling, J. Huusko and H. Rivas. BIONETS: Self Evolving Services in Opportunistic Networking Environments. In Proceedings of the 4th International Conference on Bio-Inspired Models of Network, Information and Computing Systems (BIONETICS 2009), ICST, December, 2009. bibtex ...
  • D. Schreckling and P. Dini. Distributed online evolution: An algebraic problem?. In IEEE Congress on Evolutionary Computation (CEC2009), pages 1430-1439, IEEE, May, 2009. bibtex ...
  • T. Meyer, D. Schreckling, C. Tschudin and L. Yamamoto. Robustness to Code and Data Deletion in Autocatalytic Quines. In Transactions on Computational Systems Biology X, pages 20-40, Springer, 2008. doi...  bibtex ...
  • P. Dini and D. Schreckling. Notes on Abstract Algebra and Logic: Towards their Application to Cell Biology and Security. In Proceedings of 2nd International Conference on Digital Ecosystems and Technologies, IEEE-DEST 2008, pages 83-90, February, 2008. doi...  bibtex ...
  • M. Johns and D. Schreckling. Automatisierter Code-Audit - Sicherheitsanalyse von Source Code in Theorie und Praxis. In Datenschutz und Datensicherheit - DuD, 31 (12): 888-893, December, 2007. doi...  bibtex ...
  • D. Bliefernicht and D. Schreckling. Highly Adaptive Cryptographic Suites for Autonomic WSNs. In Proceedings of 2nd International Conference on Bio-Inspired Models of Network, Information, and Computing Systems, BIONETICS'07, pages 287-294, December, 2007. doi...  bibtex ...
  • L. Yamamoto, D. Schreckling and T. Meyer. Self-replicating and self-modifying programs in fraglets. In Proceedings of 2nd International Conference on Bio-Inspired Models of Network, Information, and Computing Systems, BIONETICS'07, pages 159-167, December, 2007. doi...  bibtex ...
  • P. Dini and D. Schreckling. More Notes on Abstract Algebra and Logic: Towards their Application to Cell Biology and Security. In OPAALS Workshop, November, 2007. bibtex ...
  • D. Schreckling and M. Johns. CISAT: Integration von sicherheitszentrierter statischer Analyse in den Enwicklungsprozess. In 14. DFN-CERT Workshop Sicherheit in vernetzten Systemen, February, 2007. pdf...  bibtex ...

Talks

  • D. Schreckling. Securing the Web of Things - A COMPOSE Perspective. Talk at the Web of Things Working Group, W3C, Munic, Germany, 2015. pdf... 
  • D. Schreckling. Smartphone Security: Today and Tomorrow. Talk at the CREATE-NET, Seminar, Trento, Italy, 2012. paper... 
  • D. Schreckling. Sicherheitsaspekte bei der Nutzung mobiler Applikationen in Breitbandnetzen. Talk at the Bayerischer IT-Sicherheitscluster, MoBi-Initiative, Regensburg, Germany, 2011.
  • D. Schreckling. Security in Autonomic Systems: Mission Impossible?. Talk at the SAC-Fire Workshop 2008, Turin, Italy, 2008.
  • D. Schreckling. Security in BIONETS. Talk at the European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS), Hamburg, Germany, 2006.
  • D. Schreckling. Securing BIONETS: 'How can Security Infrastructures Match Autonomically Evolving Networks and Services?'. Talk at the DISTTRUST Workshop, Barcelona, Spain, 2006.
  • D. Schreckling and H. C. Pöhls. Data Driven and Data Centric Security. Talk at the 3rd CREATE-NET Workshop, Cavalese, Italy, 2006.
  • D. Schreckling and J. Seedorf. Secure and Decentralized Session Establishment. Talk at the 3rd CREATE-NET Workshop, Cavalese, Italy, 2006.

Professional Activities


Supervised Theses 

  • Offered
    • We offer various thesis in the field of software security in autonomic systems (contact us if you are interested)!
  • Ongoing
    • Master thesis: POLITE: Fine-Grained Tracking and Enforcement in JavaScript and Native Code (by D. Nachtmann)
  • Finished
    • Master thesis: Security oriented, fundionality preserving worklow rewriting using the example of Node-RED (by J. Rückert)
    • Bachelor thesis: Optimierung des Policy Frameworks des Javascrip-Interpreters JSFlow (by R. Strohmeier)
    • Master thesis: Dynamic taint analysis of Native Code on Android Using Taintdroid as a Case Study (by T. Marktscheffel)
    • Master thesis: Variability-aware Data-flow Analysis for Smartphone Applications (by D. Hausknecht)
    • Bachelor thesis: Design and implementation of a Trust and Reputation System for Cloud Foundry's cloud Service (by D. Nachtmann)
    • Bachelor thesis: Privacy Aware Android Bytecode Rewriting using Extended Abstract Reachability Trees (by B. Bermeitinger)
    • Bachelor thesis: Integration of Authorized Bytecode Modications in Android(by C. Hillmann)
    • Master thesis: Model Checking of Android Applications to derive strongest preconditions for secure data flows (by S. Rasthofer)
    • Master thesis: Proof carrying Android applications to validate data-centric user policies(by R. Wimmer)
    • Master thesis: Cross device usage control for confidential data in Android (by S. Kremer)
    • Master thesis: Android Byte Code Rewriting for Security Policy Enforcement (by S. Huber)
    • Bachelor thesis: Efficient Administration of Fine-Grained Data Security Policies in Android (by D. Helmbrecht)
    • Bachelor thesis: An Artificial Immune System as a Security Model for Fraglets (by T. Marktscheffel)
    • Bachelor thesis: Data-centric context-aware access control in Android (by D. Hausknecht)
    • Bachelor thesis: Is it possible to evolve and evaluate Cryptographic Primitieves with Cartesian Genetic Programming (by M. Jackstadt)
    • Bachelor thesis: Anonymisierung von Einträgen bei Kalenderapplikationen -- Exemplarische Implementierung für Google Calendar (by A. Bangerl)
    • Diploma thesis: Highly Adaptive Cryptographic Suites for Autonomic Ad-Hoc Networks (by D. Bliefernicht) [pdf]
    • Diploma thesis: Security Policy Tags for Automated Information Flow Analysis (by S. Knab) [pdf]
    • Diploma thesis: Automatic Correlation, Rating and Analyzing of Heterogenous Network and Incident Data (by T. Holst)
    • Bachelor thesis: Grid (In-) Security and its impact on CERTs (by A. Liu)  [pdf]
    • Diploma thesis: Using Compiler Intermediate Representations for security-related Static Analysis (by T. Mende)  [pdf]
    • Bachelor thesis: Automatische Verfolgung und Archivierung von Sicherheitsupdates eines freien Unix-Derivates (by S. Schirmer)
    • Diploma thesis: Entwurf und Realisierung der Zugriffskontrolle in Workflows auf Geschäftsprozessebene (by Y. Reznichenko) [pdf]

Teaching at the University of Passau 

  • Winter term 2013
    • Conference Seminar: IT-Security unleashed
  • Summer term 2013
    • Conference Seminar: Real-Life Security
  • Winter term 2012
    • Conference Seminar: IT-Security unleashed
    • Open study group: Practical Insecurities
  • Summer term 2012
    • Exercises: IT-Security Fundamentals
    • Project: Software Security
    • Open study group: Practical Insecurities
  • Winter term 2011
    • Exercises: IT Security
    • Project: Security Infrastructures
    • Conference Seminar: IT-Security unleashed
    • Open study group: Practical Insecurities
  • Summer term 2011
    • Project: Software Security
    • Conference Seminar: Real Life Security
    • Open study group: Practical Insecurities
  • Winter term 2010
    • Exercises: IT Security
    • Project: Security Infrastructures
    • Open study group: Practical Insecurities
  • Summer term 2010
    • Project: Software Security
    • Seminar: IT Security unleashed
    • Open study group: Practical Insecurities
  • Winter term 2009
    • Open study group: Practical Insecurities
  • Summer term 2009
    • Seminar: IT Security unleashed

Teaching at the University of Hamburg 

  • Winter/Summer term 2008
    • Project: Software Security (18.334)
    • Open study group: Practical Insecurities
  • Summer term 2007
    • Project: Software Security (18.334)
    • Seminar IT-Sicherheit (18.401)
    • Open study group: Practical Insecurities
  • Winter term 2006/2007
    • Project: Software Security (18.334)
    • Open study group: Practical Insecurities
  • Summer term 2006
    • Project: Software Security (18.342)
    • Seminar IT-Sicherheit (18.405)
    • Open study group: Practical Insecurities
  • Winter term 2005/06
    • Project: Software Security (18.342)
    • Proseminar: Grundlagen der IT-Sicherheit (18.052)
    • Open study group: Practical Insecurities
  • Summer term 2005
    • Exercises in Technische Informatik 4 (T4 - 18.008)
    • Open study group: C Insecurities
  • Winter term 2004/05
    • Proseminar: Grundlagen der IT-Sicherheit (18.061)
    • Seminar: Internet-Sicherheit (18.417)
    • Oberseminar: Fortgeschrittene IT-Sicherheit (18.483)
    • Aktuelle Probleme der IT-Sicherheit (18.366)
    • Exercises in Praktische Informatik 1 (P1 - 18.005)

Curriculum Vitae

Valid HTML 4.0 Transitional

Valid CSS!

  Impressum Last modified: 02/03/2017 - 11:40:07 by ds  Seitenanfang