Christian Kudera

Christian Kudera

General Information

I'm a master student at the Secure Systems Lav Vienna / Automation Systems Group at the University of Technology in Vienna and member of the Hardware Security Lab.

Currently I'm working on my master thesis for my individual master "Hardware and Software Security" in the area of Fault Injection Attacks.

I wrote my bachelor's thesis about monitoring malicious behaviour of linux binaries and shared libraries and developed a framework which was used in the Andrubis Project.

Professional Activities

Since fall 2012, I'm working as security consultant for the IT security company SEC Consult.

Project Experience

Media

  • June 2016: "Facebook zwingt zum App-Download", "Help – Das Konsumentenmagazin" [Link] [PDF] [MP3]
  • June 2016: "Darknet - Hat das dunkle Netz auch positive Seiten?", "UniCut – Okto" [Link] [VIDEO]

Publications

Markus Kammerstetter, Markus Muellner, Daniel Burian, Christian Kudera and Wolfgang Kastner
Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering
Conference on Cryptographic Hardware and Embedded Systems 2016 (CHES 2016), August 17-19, 2016, Santa Barbara, CA, USA
[to appear]
Johannes Goellner, Lucie Langer und Matthias Tischlinger (Hrsg.); Christian Kudera, Markus Kammerstetter, Florian Skopik, Matthias Tischlinger, Berthold Haberler et al. (Autoren)
Buch: Smart Grid Security Guidance - (SG)²: Sicherheitsmaßnahmen für Stromnetzbetreiber in Österreich
Schriftenreihe der Landesverteidigungsakademie (Mai, 2016), ISBN 978-3-902944-98-6
[Link]

Notable Achievements

  • Together with the WoY team, we managed to take the 3rd place in the iCTF competition 2014/15
  • Together with the WoY team, we managed to take the 2nd place in the iCTF competition 2012/13
  • Together with the WoY team, we managed to take the 1st place in the iCTF competition 2011

Advisories

  • Multiple critical vulnerabilites in Schrack MICROCONTROL emergency light system [Link]
  • Design Issue / Password Disclosure in All WAGO-I/O-SYSTEMs which provide a CODESYS V2.3 WebVisu [Link]
  • Privilege escalation vulnerability in MICROSENS Profi Line Modular Industrial Switch Web Manager (MS652119PM) [Link]

Contact

I can be reached under ckudera (åṱ) seclab (ḑọt) tuwien (ḑọt) ac (ḑọt) at


Last Modified: Sat Jun 11 12:09:37 CEST 2016


International Secure Systems Lab www.iseclab.org