Ruhr University » SecHuman

PhD Candidates

In a inter- and transdisziplinary context, 13 PhD's have the possibility to conduct research in the NRW financed Fortschrittskolleg SecHuman "Security for people in cyberspace". The following students currently conduct their PhD studies:

Benedikt Auerbach: Post-Snowden Cryptography

As revealed during the Snowden revelations, the NSA managed to include backdoors in widespread cryptographic protocols by using its influence on cryptographic standardization processes. This enabled the surveillance of communication believed to be securely encrypted. Using methods from provable security, the research project aims to investigate the question, whether it is possible to construct cryptographic protocols, which provably do not admit the inclusion of backdoors. A first goal is the development of an appropriate security model describing the setting. Afterwards the construction of cryptographic protocols, whose security in this model can be based on commonly used cryptographic assumptions by security reductions, will be approached.

  • Affiliation: Faculty of Mathematics, Foundations of Crypotography
  • Email: Benedikt.Auerbach [at]
  • Website

Benedikt Bönninghoff: Machine-learning based authorship analysis

Today, many people are using social media platforms to communicate with each other. High damage potentially originates from using a false identity for criminal purposes. Forensic linguistics is the discipline of analyzing the authorship of documents as well as the author's biographical background. We further can combine linguistic features with machine learning tools to automate this process. However, the forensic authorship analysis for social media is a challenging task since the messages are relatively short and linguistic disguise or imitation strategies may be applied to hide the own authorship. Hence, the aim of this research project is to combine linguistic knowledge with machine-learning techniques for forensic authorship analysis on social media platforms and investigate the degree of reliability of the classification results in data sets of inherent high variability.

  • Affiliation: Institute of Communication Accoustics, Cognitive Signal Processing
  • Email: Benedikt.Boenninghoff [at]
  • Website

Florian Farke: Digital Forgetting in the Context of Data Protection and Privacy

Due to the progress of digitization in many areas of life, there is a trend to collect and process more and more data and make it available via the Internet. In addition to knowledge or historical records, gathering personal data of private individuals becomes more prevalent. Much of this data is ephemeral, gets invalid over time, or the affected person would like to withdraw them. However, due to the distributed and decentralized structure of the Internet, it often remains long-term available. This might harm people’s reputation or impede coping negative life experience. To thwart this issue, the idea of digital forgetting is to take some aspects of the human ability to forget and apply them to the Internet. This dissertation investigates technical implementation, data protection regulations, usability, and the influence on privacy of digital forgetting.

  • Affiliation: Department of Electrical Engeneering and Information Technology, Mobile Security
  • Email: Florian.Farke [at]
  • Website

Marc Fyrbiak: Hardware Reverse Engineering

In the course of globalization, integrated circuits are now planned, implemented and manufactured with different suppliers at different locations. This increases the risk of violations of expensive intellectual property and insertion of hardware Trojans. A necessary prerequisite for these attacks is sufficient understanding of a hardware design which can be obtained by reverse engineering. Reverse engineering is also necessary in other scenarios, e.g., to detect hardware Trojans. In this research the reverse engineering of hardware designs is to be examined, both from technical side and the human factor. In particular, automation of different tasks during reverse engineering should be considered. Additionally, the technical possibilities should be created in order to examine the human factor.

  • Affiliation: Department of Electrical Engeneering and Information Technology, Embedded Security
  • Email: Marc.Fyrbiak [at]
  • Website

Alexander Helm

  • Affiliation: Faculty of Mathematics, Cryptology and IT-Security
  • Email: Alexander.Helm [at]
  • Website

Steffen Hessler: Analysis of linguistic techniques for stylization, imitation and disguise with the help of intelligent algorithms

People are communicating via different internet platforms without having secured metadata of their communication partners. With the use of specific language, people are disguising their true identities. My research target is to develop methods to research and detect those linguistic imitation strategies. Just like the stylization in comedy and cabaret programs, imitation uses atypically and over stylized linguistic features, which do not cover linguistic registers of those imitated people. Developing machine-learning based algorithms should help to automatize the process of the systematization of linguistic techniques for imitation and disguise in order to concentrate my linguistic analysis on doubtful cases.

  • Affiliation: Insitute of Germanistics, German Linguistics, Ruhr-Universität Bochum
  • Email: Steffen.Hessler [at]
  • Website

Laura Kocksch: What data tell about us

Laura approaches the topic of sensor technologies and data from an anthropological perspective. In the two technology fields, smarthome and self-tracking, she traces sensor data with ethnographic methods. She looks at practices of collecting, concentrating, enriching, selecting and securing this data. Data and its mass storing and correlating with other data (“Big Data”) in this perspective is not a solely technical fact, but rather is made, disassembled and reassembled and thus produces a specific knowledge about humans and their interaction with technologies (thus a close cooperation with technologists is needed). Laura is interested in questions and problems that practitioners believe can be answered through Big Data, as well as the hopes and metaphors that relate to Big Data and the ontological status of futures that it predicts.

  • Affiliation: Social Science, Cultural Psychology and Anthropology of Knowledge, Ruhr-Universität Bochum
  • Email: Laura.Kocksch [at]
  • Website

Stephan Koloßa: The Right to Privacy in the Digital Age”

The legal concept of “privacy” is not a phenomenon of the most recent years. A right to privacy has been established already more than sixty years ago, in international law foremost in the European Charter on Human Rights (ECHR) and the International Covenant on Civil and Political Rights (ICCPR). However, the latest technology used by governmental as well as private entities and even single individuals in times of “Big Data” and the “Internet of Things” raise more questions regarding the current scope of the legal protection of privacy than ever. The PhD analyzes the existing legal frameworks and scrutinizes the right to privacy in the digital age under international law.

  • Affiliation: Faculty of Law, Institute for International Law of Peace and Armed Conflict, Ruhr-Universität Bochum
  • Email: Stephan.Kolossa [at]
  • Website

Jan Rensinghoff: The right to be forgotten

The right to be forgotten under European law and its legal implementation At the very latest since the Snowden leaks, which exposed the power of data collection to the public, people are more and more aware of the potential dangers that may arise from it. Along with the technical progress in many aspects of everyday life, comes also a high potential risk of misuse of personal data. The new ‘EU General Data Protection Regulation’ tries to protect EU citizens from an uncontrolled and limitless dissemination of personal data by implementing a right to deletion of personal data. This newly introduced ‘right to be forgotten’ (art. 17 I EU GDPR) now faces several challenges in terms of balancing of the multiple interests that people may have. Not only the complainant is affected by the decision of a deletion but also potentially the public, online-search-engines, journalists and publicists. The PhD project tries to analyze this difficult decision making process and searches, along with his IT-partner, for a way to maybe partially automate this process.

  • Affiliation: Jornalism, Media Law, Technical University Dortmund
  • Email: Jan.Rensinghoff [at]
  • Website

Mary Shnayien: „In through the back door…“ Discourse on Security and Privacy in the post-Snowden Era

The Snowden revelations as well as recent cybercrime incidents like WannaCry mark a shift in the media coverage of privacy, surveillance and security. Today, privacy and security can be conceptualized as polar oppositions, in between which the back door is situated – a system with a back door is neither safe nor does it grant privacy in the sense of an enclosed space for solitude. In my dissertation I do a discourse analysis deeply rooted in media and gender studies of different media texts concerned with privacy and security, while mainly focusing on forms of knowledge production and discoursive making of privacy, security and possible modes of critique.

  • Affiliation: Spaces of Anthropological Knowledge, Media and Anthropological Knowledge, Ruhr-Universität Bochum
  • Email:
  • Website

Christine Utz

  • Affiliation: Department of Electrical Engeneering and Information Technology, Systems Security
  • Email: Christine.Utz [at]
  • Website

Carina Wiesen: Problem Solving and Learning in IT Security: Exploration of Human Factors in Hardware Reverse Engineering

Despite intensive technical research on hardware reverse engineering, it is still an opaque and poorly understood process. Even though several automated techniques and best-practices for a human analyst have been described, there is barely any research on the non-automated sensemaking by human analysts involved in hardware reverse engineering. The goal of this research is to describe hardware reverse engineering as a problem form a psychological learning perspective, whereas problem solving strategies, domain specific knowledge, cognitive and non-cognitive factors will be included as well.

  • Affiliation: Institute of Education, Educational Psychology Research Group, Ruhr-Universität Bochum
  • Email: Carina.Wiesen [at]
  • Website