
The project goal is the development of a generic honeypot framework that automatically generates tailored honeypots for the (Industrial) Internet of Things. Combining real world device information with virtualization technology, the honeypots are attracting attacks for a wide variety of hardware and software architectures and beyond convince an adversary that she actually breached a real device instead of decoy.

Christian Kudera
Researcher
My research interests include Internet of Things security, embedded systems security, embedded systems virtualization, honeypots and cyber threat intelligence.
Publications
Automatic Creation of Low-Interaction Honeypots forStateless Network Protocols.
Felix Kehrer
(2022).
Bachelor Thesis.
Firmware Re-Hosting: An Evaluation and Verification of FirmAE.
Sebastian Dietz
(2022).
Bachelor Thesis.
Firmware Sample Analysis - Distinguish between Compressed Encrypted and Plain Binary Files.
Kevin Gufler
(2020).
Bachelor Thesis.
Contactless Side Channel Based Disassembly - A Time Shift Resilient Machine Learning Approach.
Tobias Kovats
(2020).
Bachelor Thesis.
AVRS: Emulating AVR Microcontrollers for Reverse Engineering and Security Testing.
Michael Pucher,
Christian Kudera,
Georg Merzdovnik
(2020).
Proceedings of the 15th International Conference on Availability, Reliability and Security.
Human-assisted information extraction through Bluetooth Low Energy on Android.
Gabor Szivos
(2019).
Master Thesis.
From Hack to Elaborate Technique—A Survey on Binary Rewriting.
Matthias Wenzl,
Georg Merzdovnik,
Johanna Ullrich,
Edgar Weippl
(2019).
ACM Computing Surveys (CSUR).