Patrick Stewin
Imprint/Impressum

I am a PhD student/research assistant at the chair for Security in Telecommunications at the Technische Universität Berlin / Telekom Innovation Laboratories. I am also a Software Campus participant. My advisor is Prof. Dr. Jean-Pierre Seifert. For further information regarding teaching, completed master/diploma students, etc. see my webpage at the chair for Security in Telecommunications.

Index:

[Contact Information][Research Interests][Scholarships/Fellowships][Current Projects][Previous Projects][Previous Research Institutes][Publications][Presentations][Professional Activities][In the Media][Other Work]

Contact Information

Office:TEL 17_08
Address:Ernst-Reuter-Platz 7, 10587, Berlin, Germany
Email:patrickx AT sec.t-labs.tu-berlin.de
PGP key:3B49F826
Phone:+49 30 8353 58474
Fax:+49 30 8353 58409
Secretary's office:TEL 11
Map:Security in Telecommunications
^Top

Research Interests

  • System Security
  • Runtime Monitoring/Attestation
  • Trusted Computing
  • Secure Operating Systems, Microkernel Security
  • Virtualization
  • Open Source Software
^Top

Scholarships/Fellowships

^Top

Current Projects

^Top

Previous Projects

^Top

Previous Research Institutes

^Top

Publications

Peer Reviewed Papers:
^Top
Peer Reviewed Extended Abstracts:
^Top
Technical Reports:
  • Evaluating "Ring -3" Rootkits
    Patrick Stewin
    Proceedings of the Sixth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING). GI FG SIDAR, p.7., Bochum, Germany, March 21-22, 2011
    [BibTeX][PDF]
     
  • Learning from Rootkits
    Patrick Stewin
    Proceedings of the Fifth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING). GI FG SIDAR, p.12., Bonn, Germany, July 7, 2010
    [BibTeX][PDF]
     
^Top
Public Project Reports:
  • Final Report of OpenTC Workpackage 5 - Chapter 9: An Efficient Implementation of Trusted Channels based on OpenSSL
    F. Armknecht, Y. Gasmi, A. Sadeghi, P. Stewin, M. Unger, G. Ramunno, D. Vernizzi
    Open Trusted Computing Report, IST-027635/D05.6/V01 Final, Information Society Technologies, 2009
    [PDF]
     
  • Design and Concept of a Trusted Virtual Datacenter
    T. Hong, E. John, D. Murray, S. Cabuk, D. Plaquin, B. Jansen, H. V. Ramasamy, M. Schunter, Y. Gasmi, A.-R. Sadeghi, P. Stewin, M. Unger, G. Ramunno, D. Vernizzi
    Open Trusted Computing Report, IST-027635/D05.5/FINAL, Information Society Technologies, 2008
    [PDF]
     
  • Design of the Cross-Domain Security Services - Chapter 5: Trusted Channels with Remote Integrity Verification
    A.-R. Sadeghi, M. Unger, Y. Gasmi, P. Stewin, G. Ramunno, D. Vernizzi
    Open Trusted Computing Report, D05.4, Information Society Technologies, 2008
    [PDF]
     
  • Proof of Concept of the Security Services - Chapter 3: L4 Security Services
    A.-R. Sadeghi, M. Wolf, C. Stüble, M. Scheibel, R. Landfermann, H. Löhr,S. Schulz, P. Stewin, M. Unger
    Open Trusted Computing Report, IST-027635/D05.2/Final, Information Society Technologies, 2007
    [PDF]
     
  • Related/previous work landscape - Deliverable 1b (short version)
    Y. Gasmi and P.Stewin
    OpenTC project, Bochum/Berlin, 2006
    [PDF]
     
^Top
Edited Volumes:
  • Konrad Rieck, Patrick Stewin, Jean-Pierre Seifert (eds.)
    Proceedings of the Conference on Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013, Revised Selected Papers. Lecture Notes in Computer Science 7697, Springer 2013, ISBN 978-3-642-39234-4
     
  • Patrick Stewin and Collin Mulliner (eds.)
    Proceedings of the 7th GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), Technical Report SR-2012-01, ISSN 2190-846X, Berlin, Germany, July 5-6, 2012 [PDF]
     
^Top
Book Contributions:
^Top

Presentations

Talks:
  • Persistent, Stealthy, Remote-controlled Dedicated Hardware Malware
    30c3, Hamburg, Germany, December 27-30, 2013
    [PDF] [30c3 conference recording]
     
  • A Primitive for Revealing Stealthy Peripheral-based Attacks on the Computing Platform's Main Memory
    16th International Symposium on Research in Attacks, Intrusions and Defenses, Rodney Bay, Saint Lucia, October 23-25, 2013
    [PDF]
     
  • Persistent, Stealthy, Remote-controlled Dedicated Hardware Malware
    44CON, London, UK, September 12-13, 2013
    [PDF] [video 1] [video 2] [video 3]
     
  • Understanding DMA Malware
    9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Heraklion, Crete, Greece, July 26-27, 2012
    [PDF]
     
  • Introduction to Malicious Software executed on Dedicated Hardware
    Talk at Cloud and Security Lab - Hewlett Packard Laboratories Bristol, Bristol, UK, July 28, 2011
     
  • Evaluating "Ring -3" Rootkits
    6th GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), Bochum, Germany, March 21-22, 2011
    [PDF]
     
  • Learning from Rootkits 5th GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), Bonn, Germany, July 7, 2010
    [PDF]
     
  • Invisible Agency Managed Trojan
    T-Labs internal Workshop, Berlin, Germany, December 14, 2009
     
  • Virtualization Technologies as Security Means in Safety-critical Applications
    T-Labs internal Scientific Workshop, Berlin, Germany, July 21, 2009
     
  • Beyond Secure Channels
    HGI Colloquium, Ruhr-University Bochum, IC 4 /161, Bochum, Germany, November 29, 2007
    [abstract]
     
  • Beyond Secure Channels
    ACM Workshop on Scalable Trusted Computing, Hilton Alexandria Mark Center, Alexandria, Virginia, USA, November 2, 2007
    [PDF]
     
^Top
Posters:
  • Towards Detecting DMA Malware
    Poster Session at the 18th ACM Conference on Computer and Communications Security, Chicago, Illinois, USA, October 19, 2011
    [PDF]
     
  • "In God We Trust All Others We Monitor"
    Poster/Demo Session at the 17th ACM Conference on Computer and Communications Security, Chicago, Illinois, USA, October 5, 2010
    [PDF]
     
  • Virtualization Technologies as Security Means in Safety-critical Applications
    T-Labs internal Scientific Advisory Board, Berlin, Germany, October 23, 2009
     
^Top
Demos:
  • iAMT based Keystroke Logger
    Demo at AG Rechnersicherheit, Berlin, Germany, November 9, 2010
     
  • "In God We Trust All Others We Monitor"
    Poster/Demo Session at the 17th ACM Conference on Computer and Communications Security, Chicago, Illinois, USA, October 5, 2010
     
  • Virtualization Technologies as Security Means in Safety-critical Applications
    T-Labs internal Scientific Advisory Board, Berlin, Germany, October 23, 2009
     
^Top

Professional Activities

Organizing Committee:
^Top
Program Committee:
^Top
Conference Reviewer:
^Top

In the Media

2013:
^Top

Other Work

Miscellaneous Articles:
^Top

Disclaimer: This is my personal website. The opinions expressed here represent my own and not those of my employer.