Jens Hiller

Jens Hiller

Software Engineer at Google (area: Privacy)

Google Germany (Munich)

RWTH Aachen University (until 2022)

COMSYS (until 2022)

Biography

I am Software Engineer at Google Germany in Munich, where I work in the area of privacy.

Until 2022, I was researcher for network security at the Chair of Communication and Distributed Systems (COMSYS) at RWTH Aachen University. My research evolved around security and privacy in communication systems especially focusing on today’s prominent security protocols and the Internet of Things.

For summer 2018 and 2019, I joined Vern Paxson’s Networking & Security Group at ICSI (International Computer Science Institute, Berkeley, California, USA) as Short Term Graduate Student Researcher. This position focused on analysis of the Internet Public Key Infrastructure under supervision of Dr. Johanna Amann.

Interests

  • Security & Privacy
  • Communication Protocols
  • Computer Networks
  • Internet of Things
  • TLS, Web PKI, Tor

Education

  • PhD (Dr. rer. nat), 2022

    RWTH Aachen University

  • M.Sc. in Computer Science, 2014

    RWTH Aachen University

  • B.Sc. in Computer Science, 2012

    RWTH Aachen University

Publications

(2021). Demo: Traffic Splitting for Tor — A Defense against Fingerprinting Attacks. Proceedings of the 2021 International Conference on Networked Systems (NetSys ‘21).

PDF DOI

(2021). The Road to Accountable and Dependable Manufacturing. Automation, September 2021.

PDF DOI

(2020). The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS ’20).

PDF DOI

(2020). TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS ’20).

DOI

(2020). Tracking the deployment of TLS 1.3 on the Web: A story of experimentation and centralization. ACM SIGCOMM Computer Communications Review (CCR), 50(3):3-15.
★ Selected for the Best of CCR session at ACM SIGCOMM 2021.

PDF DOI

(2020). Complying with Data Handling Requirements in Cloud Storage Systems. IEEE Transactions on Cloud Computing, 2020.

PDF DOI

(2019). POSTER: Traffic Splitting to Counter Website Fingerprinting. Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS ‘19), November 11-15, 2019, London, United Kingdom.

PDF DOI

(2019). Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments. In Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP ‘19), October 7-10, 2019, Chicago, IL, USA (Acceptance Rate: 14% for full papers, 19% overall).

PDF DOI

(2019). Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing. In Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP ‘19) - Poster Session, October 7-10, 2019, Chicago, IL, USA.

PDF DOI

(2019). Privacy-Preserving Remote Knowledge System. In Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP ‘19) - Poster Session, October 7-10, 2019, Chicago, IL, USA.

PDF DOI

(2019). The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads. IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), Osnabrück, Germany.

PDF DOI

(2019). Regaining Insight and Control on SMGW-based Secure Communication in Smart Grids. 2019 AEIT International Annual Conference.

PDF DOI

(2018). Secure Low Latency Communication for Constrained Industrial IoT Scenarios. 43rd IEEE Conference on Local Computer Networks (LCN), Chicago, USA.

PDF DOI

(2018). Application-Agnostic Offloading of Datagram Processing. Proceedings of the 2018 30th International Teletraffic Congress (ITC 30), Vienna, Austria.

PDF DOI

(2018). A First Look at Certification Authority Authorization (CAA). ACM SIGCOMM Computer Communications Review (CCR), 48:10-23.

PDF DOI

(2018). Giving Customers Control over Their Data: Integrating a Policy Language into the Cloud. Proceedings of the 2018 IEEE International Conference on Cloud Engineering (IC2E 2018), Orlando, Florida, USA, page 241-249.

PDF DOI

(2018). Thwarting Unwanted Blockchain Content Insertion. Proceedings of the First IEEE Workshop on Blockchain Technologies and Applications (BTA), co-located with the IEEE International Conference on Cloud Engineering 2018 (IC2E 2018), page 364-370.

PDF DOI

(2018). A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin. Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Curacao.

PDF DOI

(2018). SPLIT: Smart Protocol Loading for the IoT. Proceedings of the 15th European Conference on Wireless Sensor Networks (EWSN 2018), Madrid, Spain.

PDF ACM DL

(2017). Network Security and Privacy for Cyber-Physical Systems. In Song, Houbing and Fink, Glenn A. and Jeschke, Sabina, editor, Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications.

DOI

(2017). BLOOM: BLoom filter based Oblivious Outsourced Matchings. BMC Medical Genomics, 10(Suppl 2):29-42.

PDF DOI

(2017). Practical Data Compliance for Cloud Storage. Proceedings of the 2017 IEEE International Conference on Cloud Engineering (IC2E 2017), Vancouver, BC, Canada, page 252-258.

PDF DOI

(2016). Towards Transparent Information on Individual Cloud Service Usage. Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, Luxembourg, page 366-370.

PDF DOI

(2016). CPPL: Compact Privacy Policy Language. Proceedings of the 15th Workshop on Privacy in the Electronic Society (WPES), co-located with the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, page 99-110.

PDF DOI

(2016). Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds. Proceedings of the Second International Workshop on Legal and Technical Issues in Cloud Computing and Cloud-Supported Internet of Things (CLaw 2016), co-located with the 2016 IEEE International Conference on Cloud Engineering (IC2E 2016), Berlin, Germany, page 130-135.

PDF DOI

(2015). Bandwidth-optimized Secure Two-Party Computation of Minima. 14th International Conference on Cryptology and Network Security (CANS 2015), Marrakesh, Morocco Volume 9476of Lecture Notes in Computer Science, page 197-213.

PDF DOI

(2014). PriverCloud - A Peer-to-Peer Cloud for Secure Service Operation. Master Thesis, Communication and Distributed Systems, RWTH Aachen University.

(2013). Slimfit - A HIP DEX Compression Layer for the IP-based Internet of Things. Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on, page 259-266.

PDF DOI

(2013). Tailoring End-to-End IP Security Protocols to the Internet of Things. In Proceedings of the 21st IEEE International Conference on Network Protocols (ICNP 2013), Göttingen, Germany, page 1-10.

PDF DOI

(2013). 6LoWPAN Fragmentation Attacks and Mitigation Mechanisms. Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ‘13).

PDF DOI

(2013). End-to-End Security for Internet-Connected Smart Objects. Praxis der Informationsverarbeitung und Kommunikation, 36(1):23-29.

DOI

(2012). Implementation of the HIP Diet EXchange and Optimizations for Smart Object Networks. Bachelor Thesis, Communication and Distributed Systems, RWTH Aachen University
Awarded with the KuVS Bachelor Thesis Award (2012).

Academic Service

Reviewer for Conferences

PoPETS TPC
PoPETS (external reviewer) (7 reviews for several issues between 2022 and 2019)

Reviewer for Journals

ACM CCR (2022, 2021), Electronics (2022), Elsevier JNCA (2021), Sensors (2021), IEEE Computer Magazine (2020), PeerJ Computer Science (2019), Computer Networks (2017), Ad Hoc Networks (2015)

Awards

KuVS Bachelor Thesis Award (2012)

Yearly award of the GI/ITG professional group for communication and distributed systems for outstanding theses. https://www.kuvs.de/awards/

Contact