PeterI’m a mobile security and forensics analyst, driven by curiosity and with a security mindset. I have a passion for every aspect the mobile environment has to offer! Get in touch
Detecting Android Root Exploits by Learning from Root Providers
PeterI’m a mobile security and forensics analyst, driven by curiosity and with a security mindset. I have a passion for every aspect the mobile environment has to offer! Get in touch
Threema – Cryptography
PeterI’m a mobile security and forensics analyst, driven by curiosity and with a security mindset. I have a passion for every aspect the mobile environment has to offer! Get in touch
Augmented Unlocking Techniques for Smartphones Using Pre-Touch Information
PeterI’m a mobile security and forensics analyst, driven by curiosity and with a security mindset. I have a passion for every aspect the mobile environment has to offer! Get in touch
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR
PeterI’m a mobile security and forensics analyst, driven by curiosity and with a security mindset. I have a passion for every aspect the mobile environment has to offer! Get in touch
A Survey of the Challenges, Opportunities and Use of Multiple Antennas in Current and Future 5G Small Cell Base Stations
PeterI’m a mobile security and forensics analyst, driven by curiosity and with a security mindset. I have a passion for every aspect the mobile environment has to offer! Get in touch
A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks oniOS and macOS Through Apple Wireless Direct Link
PeterI’m a mobile security and forensics analyst, driven by curiosity and with a security mindset. I have a passion for every aspect the mobile environment has to offer! Get in touch
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd
PeterI’m a mobile security and forensics analyst, driven by curiosity and with a security mindset. I have a passion for every aspect the mobile environment has to offer! Get in touch
Tracking Anonymized Bluetooth Devices
PeterI’m a mobile security and forensics analyst, driven by curiosity and with a security mindset. I have a passion for every aspect the mobile environment has to offer! Get in touch
Automated Deobfuscation of Android Native Binary Code
PeterI’m a mobile security and forensics analyst, driven by curiosity and with a security mindset. I have a passion for every aspect the mobile environment has to offer! Get in touch