Avatar

Jens Hiller

Researcher and PhD Student in Network Security

RWTH Aachen University

COMSYS

netray.io

Biography

I am researcher for network security at the Chair of Communication and Distributed Systems (COMSYS) at RWTH Aachen University. I am interested in security and privacy in communication systems especially focusing on today’s prominent security protocols and the Internet of Things.

For summer 2018 and 2019, I joined Vern Paxson’s Networking & Security Group at ICSI (International Computer Science Institute, Berkeley, California, USA) as Short Term Graduate Student Researcher. This position focuses on analysis of the Internet Public Key Infrastructure under supervision of Dr. Johanna Amann.

Interests

  • Security & Privacy
  • Computer Networks
  • Internet of Things

Education

  • M.Sc. in Computer Science, 2014

    RWTH Aachen University

  • B.Sc. in Computer Science, 2012

    RWTH Aachen University

Publications

(2019). POSTER: Traffic Splitting to Counter Website Fingerprinting. Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS ‘19), November 11-15, 2019, London, United Kingdom.

PDF DOI

(2019). Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments. In Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP ‘19), October 7-10, 2019, Chicago, IL, USA (Acceptance Rate: 14% for full papers, 19% overall).

PDF DOI

(2019). Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing. In Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP ‘19) - Poster Session, October 7-10, 2019, Chicago, IL, USA.

PDF DOI

(2019). Privacy-Preserving Remote Knowledge System. In Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP ‘19) - Poster Session, October 7-10, 2019, Chicago, IL, USA.

PDF DOI

(2019). The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads. LCN Symposium on Emerging Topics in Networking, Osnabrück, Germany.

PDF

(2019). Regaining Insight and Control on SMGW-based Secure Communication in Smart Grids. 2019 AEIT International Annual Conference.

PDF DOI

(2018). Secure Low Latency Communication for Constrained Industrial IoT Scenarios. 43rd IEEE Conference on Local Computer Networks (LCN), Chicago, USA.

PDF

(2018). Application-Agnostic Offloading of Datagram Processing. Proceedings of the 2018 30th International Teletraffic Congress (ITC 30), Vienna, Austria.

PDF DOI

(2018). A First Look at Certification Authority Authorization (CAA). ACM SIGCOMM Computer Communications Review (CCR), 48:10-23.

PDF DOI

(2018). Giving Customers Control over Their Data: Integrating a Policy Language into the Cloud. Proceedings of the 2018 IEEE International Conference on Cloud Engineering (IC2E 2018), Orlando, Florida, USA, page 241-249.

PDF DOI

(2018). Thwarting Unwanted Blockchain Content Insertion. Proceedings of the First IEEE Workshop on Blockchain Technologies and Applications (BTA), co-located with the IEEE International Conference on Cloud Engineering 2018 (IC2E 2018), page 364-370.

PDF DOI

(2018). A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin. Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Curacao.

PDF

(2018). SPLIT: Smart Protocol Loading for the IoT. Proceedings of the 15th European Conference on Wireless Sensor Networks (EWSN 2018), Madrid, Spain.

PDF

(2017). Network Security and Privacy for Cyber-Physical Systems. In Song, Houbing and Fink, Glenn A. and Jeschke, Sabina, editor, Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications.

DOI

(2017). BLOOM: BLoom filter based Oblivious Outsourced Matchings. BMC Medical Genomics, 10(Suppl 2):29-42.

PDF DOI

(2017). Practical Data Compliance for Cloud Storage. Proceedings of the 2017 IEEE International Conference on Cloud Engineering (IC2E 2017), Vancouver, BC, Canada, page 252-258.

PDF DOI

(2016). Towards Transparent Information on Individual Cloud Service Usage. Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, Luxembourg, page 366-370.

PDF DOI

(2016). CPPL: Compact Privacy Policy Language. Proceedings of the 15th Workshop on Privacy in the Electronic Society (WPES), co-located with the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, page 99-110.

PDF DOI

(2016). Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds. Proceedings of the Second International Workshop on Legal and Technical Issues in Cloud Computing and Cloud-Supported Internet of Things (CLaw 2016), co-located with the 2016 IEEE International Conference on Cloud Engineering (IC2E 2016), Berlin, Germany, page 130-135.

PDF DOI

(2015). Bandwidth-optimized Secure Two-Party Computation of Minima. 14th International Conference on Cryptology and Network Security (CANS 2015), Marrakesh, Morocco Volume 9476of Lecture Notes in Computer Science, page 197-213.

PDF DOI

(2014). PriverCloud - A Peer-to-Peer Cloud for Secure Service Operation. Master Thesis, Communication and Distributed Systems, RWTH Aachen University.

(2013). Slimfit - A HIP DEX Compression Layer for the IP-based Internet of Things. Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on, page 259-266.

PDF DOI

(2013). Tailoring End-to-End IP Security Protocols to the Internet of Things. In Proceedings of the 21st IEEE International Conference on Network Protocols (ICNP 2013), Göttingen, Germany, page 1-10.

PDF DOI

(2013). 6LoWPAN Fragmentation Attacks and Mitigation Mechanisms". Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ‘13).

PDF DOI

(2013). End-to-End Security for Internet-Connected Smart Objects. Praxis der Informationsverarbeitung und Kommunikation, 36(1):23-29.

DOI

(2012). Implementation of the HIP Diet EXchange and Optimizations for Smart Object Networks. Bachelor Thesis, Communication and Distributed Systems, RWTH Aachen University
Awarded with the KuVS Bachelor Thesis Award (2012).

Awards

KuVS Bachelor Thesis Award (2012)

Yearly award of the GI/ITG professional group for communication and distributed systems for outstanding theses. https://www.kuvs.de/awards/

Contact