Collin Mulliner
Dr.-Ing. (equiv Ph.D.) (Technische Universität Berlin, Germany)
M.Sc. CS (University of California Santa Barbara, USA)
B.Sc. CS (FH-Darmstadt, University of Applied Sciences, Germany)
I'm a engineer and security researcher.
My research interest is mostly systems security, for details see here.
I used to be active in the trifinite.group a loose group of Bluetooth security researchers. I played a couple of years non-continuous on the UCSB CTF team shellphish (first in 2006, last time likely '13 or '14).
My personal weblog www.mulliner.org/blog,
Google Scholar profile, and my projects on GitHub.
Upcoming events
Contact
Index
Research Interests
Software and systems security
Embedded systems and consumer electronics security
Operating systems security
Offensive security (otherwise you can't do proper defense!)
Automated vulnerability analysis
Network security
Mobile and smartphone security
General product security for software/hardware products that end-up in the customer's hands
Projects
-- OS and Software Security
The BINtegrity Project: Practical and Efficient Exploit Mitigation for Embedded Devices
GUI In-Security
Breaking Payloads with Runtime Code Stripping and Image Freezing
-- Protocols
SMS (Short Message Service) Security Research
Bluetooth Security
Near Field Communication (NFC) Security
-- Mobile Platforms
Android Security
iPhone Security
Symbian OS Exploitation and Shellcode Development
Windows Mobile
-- Mobile operator networks
Smartphone and Mobile Phone Honeypots
M2M security (probing mobile networks for M2M devices)
Mobile Phone TAC database (public database for research)
-- Privacy
GPRS HTTP Header Privacy
TOR DNS
TTDNSD Proxy for full DNS over TOR, now maintained by the tor project
Previous Research Labs
Publications
Peer Reviewed Papers
Conference Workshop
Conference
- USBlock: Blocking USB-based Keypress Injection Attacks Sebastian Neuner, Artemios G. Voyiatzis, Spiros Fotopoulos, Collin Mulliner and Edgar R. Weippl In the Proceedings of the 32nd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy Bergamo, Italy July 2018 PDF, BibTeX entry
- Trellis: Privilege Separation for Multi-User Applications Made Easy Andrea Mambretti, Kaan Onarlioglu, Collin Mulliner, William Robertson, Engin Kirda, Stefano Zanero In the Proceedings of the 19th International Symposium on Research in Attacks, Intrusions and Defenses (RAID) Evry, France September 2016 PDF, BibTeX entry, Source(acceptance rate 22/84=26%)
- Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices Matthias Neugschwandtner, Collin Mulliner, William Robertson, Engin Kirda In the Proceedings of the 9th International Conference on Trust & Trustworthy Computing (TRUST) Vienna, Austria August 2016 PDF, BibTeX entry, Slides, Project Page(acceptance rate x/y=z%)
- UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware Amin Kharaz, Sajjad Arshad, Collin Mulliner, William Robertson, Engin Kirda In the Proceedings of the 25th USENIX Security Symposium Austin, TX August 2016 PDF, BibTeX entry(acceptance rate 72/463=15.5%)
- CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes Patrick Carter, Collin Mulliner, Martina, Lindorfer, William Robertson, Engin Kirda In the Proceedings of the 20th Financial Cryptography and Data Security (FC) Barbados February 2016 PDF, BibTeX entry, Slides(acceptance rate 36/139/=25.9%)
- BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications Ahmet Talha Ozcan, Can Gemicioglu, Kaan Onarlioglu, Michael Weissbacher, Collin Mulliner, William Robertson, Engin Kirda In the Proceedings of the 19th Financial Cryptography and Data Security (FC) Isla Verde, Puerto Rico January 2015 PDF, BibTeX entry, Slides(acceptance rate 33/102=33%)
- VirtualSwindle: An Automated Attack Against In-App Billing on Android Collin Mulliner, William Robertson, Engin Kirda In the Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS) Kyoto, Japan June 2014 PDF, BibTeX entry, Slides, Demo Video(acceptance rate 52/260=20%)
- Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces Collin Mulliner, William Robertson, Engin Kirda In the Proceedings of the 35th IEEE Symposium on Security and Privacy (Oakland) San Jose, CA, USA May 2014 PDF, BibTeX entry, Slides(acceptance rate 44/324=13.6%)
- PatchDroid: Scalable Third-Party Security Patches for Android Devices Collin Mulliner, Jon Oberheide, William Robertson, Engin Kirda In the Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC) New Orleans, Louisiana, USA December 2013 PDF, BibTeX entry, Slides, Project Page, Demo Video, Overview Video(acceptance rate 34/171=19.8%)
- SMS-based One-Time Passwords: Attacks and Defense (short paper) Collin Mulliner, Ravishankar Borgaonkar, Patrick Stewin, Jean-Pierre Seifert In the Proceedings of the 10th Conference on Detection of Intrusions and Malware & Vulnerability
Assessment (DIMVA 2013) Berlin, Germany July 2013 PDF, BibTeX entry, Slides, Demo Video(acceptance rate 12/38=31.5%)
- PrivExec: Private Execution as an Operating System Service Kaan Onarlioglu, Collin Mulliner, William Robertson, Engin Kirda In the Proceedings of the 34th IEEE Symposium on Security and Privacy (Oakland) San Francisco, CA, USA May 2013 PDF, BibTeX entry, Project Page, Demo Video(acceptance rate 38/315=12%)
- Taming Mr Hayes: Mitigating Signaling Based Attacks on Smartphones Collin Mulliner, Steffen Liebergeld, Matthias Lange, and Jean-Pierre Seifert
In the Proceedings of the IEEE/IFIP 41st International Conference on Dependable Systems Networks (DSN)
Boston, MA, USA 25-28 June 2012 PDF, BibTeX entry, Slides (DSN/DCCS acceptance rate 27/156 = 17.3%)
*William C. Carter Award*
- SMS of Death: from analyzing to attacking mobile phones on a large scale Collin Mulliner, Nico Golde, and Jean-Pierre Seifert
In the Proceedings of the 20th USENIX Security Symposium
San Francisco, CA, USA 10-12 August 2011 PDF, BibTeX entry, Slides, Demo Video (acceptance rate 35/204=17.2%)
- Rise of the iBots: 0wning a telco network Collin Mulliner and Jean-Pierre Seifert
In the Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software (Malware)
Nancy, France 19-20 October, 2010 PDF, BibTeX entry, Slides
- Privacy Leaks in Mobile Phone Internet Access Collin Mulliner
In the Proceedings of the 14th International Conference on Intelligence in Next Generation Networks (ICIN)
Berlin, Germany 11-14 October, 2010 PDF, BibTeX entry, Slides *Best Paper*
- Vulnerability Analysis of MMS User Agents Collin Mulliner and Giovanni Vigna
Proceedings of the Annual Computer Security Applications Conference (ACSAC)
Miami, Florida December 2006 PDF, BibTeX entry (acceptance rate 32/135=27%)
- Using Labeling to Prevent Cross-Service Attacks Against Smart Phones
Collin Mulliner, Giovanni Vigna, David Dagon, and Wenke Lee Proceedings of the
Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA) Berlin, Germany July 2006 PDF, BibTeX entry, Slides (27% acceptance rate)
Workshop
- Nomadic Honeypots: A Novel Concept for Smartphone Honeypots
Steffen Liebergeld, Matthias Lange, Collin Mulliner
In the Proceedings of the Workshop on Mobile Security Technologies (MoST) San Francisco, CA May 2013 PDF, BibTeX entry, Slides(acceptance rate 11/22=50%)
- Read It Twice! A mass-storage-based TOCTTOU attack Collin Mulliner and Benjamin Michele In the Proceedings of the 6th USENIX Workshop on Offensive Technologies (WOOT) Bellevue, WA, USA August 2012 PDF, BibTeX entry, Slides(acceptance rate 12/30=40%)
*Best Paper*
- Injecting SMS Messages into Smart Phones for Security Analysis Collin Mulliner and Charlie Miller
In the Proceedings of the 3rd USENIX Workshop on Offensive Technologies (WOOT)
Montreal, Canada August 2009 PDF, BibTeX entry, Slides(acceptance rate 9/24=37.5%)
- Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones Collin Mulliner
In the Proceedings of the 1st International Workshop on Sensor Security (IWSS) at ARES 2009
Fukuoka, Japan March 2009 PDF, BibTeX entry, Slides
Journal and Magazine Articles
- On the misuse of graphical user interface elements to implement security controls Collin Mulliner, William Robertson, Engin Kirda
it - Information Technology. ISSN (Online) 2196-7032, ISSN (Print) 1611-2776
- March 2017 Article
- Persoenliche Datenspuren bei der mobilen Internetnutzung Collin Mulliner
Datenschutz und Datensicherheit (DuD) Issue 3/2012, pages 180-184
Germany March 2012 Article
- Risiko Smartphone Daniel Bachfeld, Collin Mulliner
Magazin fuer Computertechnik | c't (Issue 20)
Germany September 2010 1, 2
Books / Chapters
- Android Hacker's Handbook Joshua J. Drake, Zach Lanier, Collin Mulliner, Pau Oliva, Stephen A. Ridley, Georg Wicherski
Wiley
USA April, 2014
ISBN: 111860864XAmazon, Official Chinense translation
- Mobile Phone Security. The Impact of the Modem. Collin Mulliner
SVH Verlag
Germany 2012
ISBN: 978-3-8381-3289-1 Amazon
- Contribution to Chapter 7. Ken Dunham, Seth Fogie, and others
Mobile Malware Attacks and Defense
USA November 2008 Amazon
- Chapter 7. Iomega ZIP-Drive Howto Collin Mulliner
Linux HOWTOs: Die besten Loesungen der Linuxgemeinde. (Marco Budde Hrsg.)
Germany 1999 Amazon
Patents
Tech Reports
- Smartphone Secure Development Guidelines Collin Mulliner, Ioannis Stais, Vincenzo Iozzo
European Union Agency for Network and Information Security (ENISA)
Greece December 2016 PDF
- SMS-based One-Time Passwords: Attacks and Defense (extended version of paper with same title published at DIMVA 2013) Collin Mulliner, Ravishankar Borgaonkar, Patrick Stewin, Jean-Pierre Seifert
Technical Report: 2014-02 ISSN: 1436-9915
Berlin, Germany July 2013 (released September 2014) PDF
- Fake Emulation Environment to Prevent Malware from Executing Collin Mulliner
Volume 1 of Tiny Transactions on Computer Science
Berkeley, CA, USA August 2012 PDF
- Countering SMS Attacks: Filter Recommendations Nico Golde and Collin Mulliner
Technical Report: 2011-09 ISSN: 1436-9915
Berlin, Germany April 2011 PDF
- Smartphone Honeypots Collin Mulliner
In Proceedings of the Sixth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING) Technical Report SR-2011-01, GI FG SIDAR
Bochum, Germany 21-22 March 2011 PDF, Slides
- Smartphone Botnets Collin Mulliner
In Proceedings of the Fifth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING) Technical Report SR-2010-01, GI FG SIDAR
Bonn, Germany 7th July 2010 PDF, Slides
- Blueprinting - Remote Device Identification based on Bluetooth Fingerprinting Techniques Martin Herfurt and Collin Mulliner
21st Chaos Communication Congress (21c3)
Berlin, Germany December 2004 PDF
Posters
- Poster: Towards Detecting DMA Malware Patrick Stewin, Jean-Pierre Seifert, Collin Mulliner 18th ACM Conference on Computer and Communications Security
(CCS) Chicago, IL, USA October 17-21 2011Poster abstract PDF (acceptance rate 41/62=66.1%)
- Poster: HoneyDroid - Creating a Smart Phone Honeypot Collin Mulliner, Steffen Liebergeld, Matthias Lange 32nd IEEE Security and Privacy Oakland, CA, USA May 22-25 2011Poster abstract PDF (acceptance rate 18/34=53%)
Edited Volumes
- Patrick Stewin, Collin Mulliner (Hrsg.)
Proceedings of the Seventh GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING)
Technical Report SR-2012-01, ISSN 2190-846X
Berlin, Germany July 5-6 2012PDF
Conference Talks and Presentations
2020
- Analyzing Firmware with FwAnalyzer Collin Mulliner Microsoft virtual/remote April 2020project page
2019
- Come Join the CAFSA - Continuous Automated Firmware Security AnalysisCollin Mulliner Black Hat USA Las Vegas, NV August 2019PDF, project page
- Automating Firmware Security with FwAnalyzer Collin Mulliner Qualcomm Product Security Summit San Diego, CA May 2019PDF, project page
2018
- Detecting Reverse Engineering with Canaries Collin Mulliner CanSecWest Vancouver, Canada March 2018PDF, project page
- Detecting Reverse Engineering with Canaries Collin Mulliner Duo Tech Talks Ann Arbor, MI, USA Jan 2018PDF, project page (invited)
2017
- Inside Android's SafetyNet Attestation: Attack and Defense Collin Mulliner 34c3 Leipzig, Germany Dec 2017PDF, project page
- Inside Android's SafetyNet Attestation Collin Mulliner and John Kozyrakis Black Hat Europe 2017 London, UK December 2017 PDF, project page
- Inside Android's SafetyNet Attestation Collin Mulliner and John Kozyrakis GSMA Fraud and Security Architecture Group (FSAG#53) London, UK December 2017
(invited)
- Detecting Reverse Engineering with Canaries Collin Mulliner SinkholeCon 2 @ Security Scorecard NYC, NY Dec 2017PDF, project page (invited)
- Detecting Reverse Engineering with Canaries Collin Mulliner COUNTERMEASURE Ottawa, Canada Nov 2017PDF, project page
- Inside Android's SafetyNet Attestation: Attack and Defense Collin Mulliner ekoparty Buenos Aires, Argentina Sep 2017PDF, project page
- Inside Android's SafetyNet Attestation: What it can and can't do lessons learned from a large scale deployment Collin Mulliner 44con London, UK Sep 2017PDF, project page
- title Collin Mulliner GSMA Device Security Group (DSG#52) San Ramon, CA July 2017
(invited)
2016
- Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces Collin Mulliner KiwiCon X Wellington, New Zealand Nov 17 2016PDF, project page
- Let's get rid of the code bloat (for security) Collin Mulliner Ignite Security @ O'Reilly Security New York City, NY October 2016
- IoT Devices and Cellular Networks Collin Mulliner Dartmouth College Hanover, NH April 2016
(invited)
2015
- Breaking Payloads with Runtime Code Stripping and Image Freezing Collin Mulliner, Matthias Neugeschwandtner Black Hat USA Las Vegas, NV, USA August 6 2015PDF, project page
- You ain't executing this! Exploring Windows Security with Runtime Code Stripping and Process Freezing Collin Mulliner SummerCon NYC, NY, USA July 17 2015PDF, project page
(invited)
- Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces Collin Mulliner Lockdown 2015 @ UW Madison Madison, WI, USA July 14 2015PDF, project page
(invited)
- Practical and Efficient Exploit Mitigation for RISC-based Embedded Devices Matthias Neugschwandter and Collin Mulliner Qualcomm Mobile Security Summit San Diego, Ca, USA April 2015 PDF, project page
- The Security of Things (panel discussion) Collin Mulliner, Sean Lorenz, Katie Moussouris, Jeason Weiss, Paul Roberts (moderator) Connected Things 2015 - MIT Enterprise Forum Cambridge, MA Feb 26th 2015
(invited)
2014
- Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces Collin Mulliner HackPra @ Ruhr-Universitaet Bochum Bochum, Germany November 5 2014PDF, project page
(invited)
- Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces Collin Mulliner Boston Application Security Conference (BASC) Boston, MA, USA October 18 2014PDF, project page
- Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces Collin Mulliner Black Hat USA 2014 Las Vegas, NV, USA August 6 2014PDF, project page
- Securing Hardware and Industrial Devices (panel discussion) Ben Einstein, Collin Mulliner, Willow Brugh, Richard Mark Soley Security of Things Forum Cambridge, MA May 7th 2014
(invited)
- Probing Mobile Operator Networks Collin Mulliner Duo Security Tech Talks Ann Arbor, MI May, 2014PDF, project page
(invited)
- PatchDroid: Scalable Third-Party Security Patches for Android Devices Collin Mulliner Qualcomm Mobile Security Summit San Diego, Ca, USA April 2014 PDF
- PatchDroid: Third Party Security Patches for Android Collin Mulliner TelSecDay @ Troopers 2014 Heidelberg, Germany March 17th, 2014PDF(invited)
- The Real Deal of Android Device Security: the Third Party Collin Mulliner and Jon Oberheide CanSecWest 2014 Vancouver, Canada March 12th, 2014PDF
- Modifying Android Apps at Runtime: results, lessons learned,... Collin Mulliner Kaspersky Security Analyst Summit (SAS) Punta Cana, Dominican Republic February 11th, 2014PDF
(invited)
2013
- Android DDI: Dynamic Dalvik Instrumentation Collin Mulliner 30th Chaos Communcation Congress (30C3) Hamburg, Germany December 29th, 2013PDF
- Android DDI: Dynamic Dalvik Instrumentation of Android Applications and Framework Collin Mulliner Hack in the Box 2013 Kuala Lumpur, Malaysia October 16th, 2013PDF
- Introduction to Dynamic Dalvik Instrumentation Collin Mulliner SummerCon 2013 New York City, U.S.A. June 7th, 2013PDF
- Messing With The Android Runtime (Short Talk) Collin Mulliner SyScan 2013 Singapore April 26th, 2013PDF
- Mobile Security Battle Royale (panel discussion) Zach Lanier, Tiago Assumpcao, Collin Mulliner, Charlie Miller, Dino Dai Zovi RSA Conference San Francisco, Ca, USA Feb. 28. 2013
2012
- Probing Mobile Operator Networks Collin Mulliner CSAW:THREADS @ NY-Poly NYC, USA November 15th, 2012PDF, project page
(invited)
- Dynamic Binary Instrumentation on Android Collin Mulliner RuxCon 2012 Melbourne, Australia October 20-21, 2012PDF
(invited)
- Dynamic Binary Instrumentation on Android Collin Mulliner BreakPoint 2012 Melbourne, Australia October 17-18, 2012PDF
(invited)
- Probing Mobile Operator Networks Collin Mulliner Black Hat USA Las Vegas, NV, USA July 25-26, 2012PDF, project page
- Binary Instrumentation on Android Collin Mulliner SummerCon 2012 New York City, U.S.A. June 8th, 2012PDF
- Probing Mobile Operator Networks Collin Mulliner CanSecWest 2012 Vancouver, Canada March 7-9, 2012PDF, project page
2011
- NFC Phone and Service Security Collin Mulliner Digital Footprint in a Mobile Environment Workshop - at the Joint Research Center of the European Commission Ispra, Italy November 28-19. 2011
(invited)
- Hacking your NFC phone and service: the good news and the bad news Collin Mulliner The 7th Workshop on RFID security and privacy (RFIDsec11) Amherst, MA, USA June 27-28th 2011
(invited)
- Smartphone Malware/Trojans Collin Mulliner LKA NRW Duesseldorf, Germany June 20. 2011
(invited)
- Hacking NFC and NDEF Collin Mulliner NinjaCon / BSides Vienna 2011 Vienna, Austria June 18th 2011PDF, project page
- Random tales of a mobile phone hacker Collin Mulliner HackPra @ Ruhr-Universitaet Bochum Bochum, Germany June 1. 2011
(invited)
- SMS-o-Death: from analyzing to attacking mobile phones on a large scale Nico Golde and Collin Mulliner CanSecWest 2011 Vancouver, Canada March 9-11 2011PDF, project page
- Attacking SMS Collin Mulliner SISCTI 36 Monterrey, Mexico March 3-5 2011
(invited)
2010
- SMS-o-Death: from analyzing to attacking mobile phones on a large scale Nico Golde and Collin Mulliner 27th Chaos Communication Congress (27c3) Berlin, Germany December 27-30 2010
- Angriff aufs Smartphone Collin Mulliner Cisco-Expo Berlin, Germany December 1-2 2010
(invited)
- Privacy Leaks with Mobile Phone Internet Access Collin Mulliner EPFL Lausanne, Switzerland November 3rd, 2010
(invited)
- Consumer Electronics Security Lab Collin Mulliner CAST Workshop - Embedded Security Darmstadt, Germany August 26th 2010
(invited)
- Vulnerability Analysis of SMS Implementations on Mobile and Smart Phones Collin Mulliner Columbia University New York City, New York, USA August 9th, 2010 project page(invited)
- Vulnerability Analysis of SMS Implementations on Mobile and Smart Phones Collin Mulliner Stanford University Palo Alto, CA, USA August 5th, 2010 project page(invited)
- Vulnerability Analysis of SMS Implementations on Mobile and Smart Phones Collin Mulliner Samsung R&D San Jose, CA, USA August 4th, 2010 project page(invited)
- Random tales from a mobile phone hacker Collin Mulliner CanSecWest 2010 Vancouver, Canada March 24-26th, 2010 PDF
2009
- Fuzzing the Phone in your Phone Collin Mulliner 26th Chaos Communication Congress (26c3) Berlin, Germany December 28th 2009 PDF, project page
- Mobile Botnets Collin Mulliner T-Labs Workshop Berlin, Germany December 14th 2009
- Fuzzing the Phone in your Phone Collin Mulliner Recurity Labs Security Symposium (RSS) Berlin, Germany October 27th 2009 project page (invited)
- Sicherheit von mobile Devices: Risiken von iPhone, Android & Co Collin Mulliner TelekomForum Mobilfunktrends 2010 Bonn, Germany September 2009
(invited)
- Smart Phone Security from the Attacker's Perspective Collin Mulliner 5th Annual Mobile Device Management and Security Forum Berlin, Germany September 2009
(invited)
- Fuzzing the Phone in your Phone Collin Mulliner SEC-T Stockholm, Sweden September 2009 project page (invited)
- Fuzzing the Phone in your Phone Collin Mulliner, Charlie Miller Black Hat USA 2009 Las Vegas, Nevada, USA July 2009 PDF, project page
- Injecting SMS Messages into Smart Phones for
Security Analysis Collin Mulliner T-Labs Scientific Workshop Berlin, Germany July 2009 project page
- Data leaks through mobile phone web access Collin Mulliner PH-Neutral 0x7d9 Berlin, Germany May 2009 project page
- Exploiting Symbian Collin Mulliner Nokia Research Center Helsinki, Finland April 2009 project page(invited)
2008
- Exploiting Symbian Collin Mulliner 25th Chaos Communication Congress (25c3) Berlin, Germany December 2008 PDF, project page
- Attacking NFC Mobile Phones Collin Mulliner 25th Chaos Communication Congress (25c3) Berlin, Germany December 2008 PDF, project page
- Exploiting Symbian Collin Mulliner Black Hat Japan Tokyo, Japan October 9th 2008 PDF, project page
- Data Leaks Through Mobile Phone Web Access Collin Mulliner PET-Convention 2008.2 Darmstadt, Germany September 30th 2008 project page
- Mobile Sicherheit Collin Mulliner Intensivseminar Hacking - Angriffe und Abwehrstrategien (Fraunhofer SIT) Darmstadt, Germany September 18th 2008
- The Home InfoPanel Collin Mulliner MetaRheinMain ChaosDays 111b Darmstadt, Germany September 5-7 2008PDF(not security research related)
- NFC-basierte Handy-Bezahlsysteme Collin Mulliner CAST Workshop - SmartCards und Bezahlsysteme Darmstadt, Germany July 24th 2008
(invited)
- Attacking NFC Mobile Phones Collin Mulliner EuSecWest London, UK May 2008 PDF, project page
2007
- More Fun with Blue Radio Waves alias: iamabanana MetaRheinMain ChaosDays 110b Darmstadt, Germany September 14-16 2007PDF
- Advanced Attacks Against PocketPC Phones Collin Mulliner SyScan Singapore, Singapore July 2007 PDF, project page(invited)
2006
- Advanced Attacks Against PocketPC Phones Collin Mulliner 23rd Chaos Communication Congress (23c3) Berlin, Germany December 2006 PDF, project page
- Advanced Attacks Against PocketPC Phones Collin Mulliner DEFCON 14 Las Vegas N.V., U.S.A. August 2006 PDF, project page
- Exploiting PocketPC Collin Mulliner Graduate Colloquium Department of Computer Science, California State University Channel Islands, USA March 2006 project page(invited)
2005
- Exploiting PocketPC Collin Mulliner WhatTheHack! The Netherlands July 2005 PDF, project page
2004 and earlier
... one or more public talks (likely on Bluetooth security but no exact memory of it)
Thesis
Ph.D. Thesis
- On the Impact of the Cellular Modem on the Security of Mobile Phones Collin Mulliner Ph.D. Thesis Technische Universität Berlin, Germany December 2011 PDF
Advisor: Jean-Pierre Seifert
Master Thesis
- Security of Smart Phones Collin Mulliner Master's Thesis University of California Santa Barbara, U.S.A. June 2006 PDF
Advisor: Giovanni Vigna
Bachelor Thesis
In the Media (selection)
Professional Activities
Steering Committee:
- USENIX Workshop on Offensive Technologies (WOOT) since 2017.
Program Chair:
- (co-chair) 11th USENIX Workshop on Offensive Technologies (WOOT 2017)
- (co-chair) 9th Conference on Availability, Reliability and Security (ARES 2014)
Program Committee:
- Workshop on Offensive Technologies (WOOT): 2012, 2013, 2014, 2015, 2016, 2018, 2023
- European Workshop on Systems Security (EuroSec): 2018, 2019, 2020, 2021
- ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec): 2019, 2020
- ACM ASIA Conference on Computer and Communications Security (ASIACCS): 2019
- Annual Computer Security Applications Conference (ACSAC): 2017, 2018, 2019
- Workshop on Language-Theoretic Security (LangSec): 2015, 2016, 2017, 2018
- Reversing and Offensive-oriented Trends Symposium (ROOTS): 2017, 2018
- Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA): 2012, 2017
- Workshop on Mobile Security Technologies (MOST): 2016
- Workshop on Information Security Applications (WISA): 2013, 2014
- Workshop on Trustworthy Embedded Devices (TrustED): 2013, 2014
- Workshop on Data Protection in Mobile and Pervasive Computing (DAPRO), 2014
- Conference on Availability, Reliability and Security (ARES): 2013
- Workshop on Sensor Security (IWSS) at ARES: 2009
External Reviewer Conference:
- Innovations in Mobile Privacy and Security (IMPS): 2016
- USENIX Security: 2014
- World Wide Web Conference (WWW): 2014
- ACM Symposium on Information, Computer and Communications Security (ASIACCS): 2014
- IEEE Symposium on Security & Privacy (Oakland): 2013
- Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA): 2013
- Symposium on Hardware-Oriented Security and Trust (HOST): 2013
- Symposium on Recent Advances in Intrusion Detection (RAID): 2010
- Annual Computer Security Applications Conference (ACSAC): 2006
Reviewer Journal:
- ACM Transactions on Privacy and Security: 2017, 2018
- ACM Transactions on information and System Security: 2017
- International Journal of Information Security: 2012
- Communications of the ACM: 2010
Misc:
Students
External Member of Senior Honors Thesis Committee at Dartmouth College (2016)
Supervised 2 visiting Ph.D. Students at Northeastern Unversity (2012-2015)
Supervised 3 Master's Thesis at TU-Berlin (2009-2012)
Contributions
Trivia
updated:
March 2023