I am a Ph.D. candidate at TU Berlin, Security in Telecommunications (SecT) with Prof. Jean-Pierre Seifert. My research interests mainly lie in Platform Security and Confidential Computing.
In the past, I published research about AMD's Secure Encrypted Virtualization (SEV) at the ACM CCS and presented a jailbreak of Tesla's infotainment system at BlackHat. I am also the maintainer of PSPTool.
Before returning to campus to pursue my Ph.D., I worked for two years as a security consultant at Security Research Labs.
I hold a Master of Science in "IT Systems Engineering" from Hasso Plattner Institute, Potsdam. During my studies, I gained experience as an Embedded Systems Developer and Security Engineer in two IoT startups.
faulTPM - Exposing AMD fTPM's Deepest Secrets
Hans Niklas Jacob, Christian Werling, Robert Buhren, Jean-Pierre Seifert
8th IEEE European Symposium on Security and Privacy (EuroS&P), 2023.
EM-Fault It Yourself: Building a Replicable EMFI Setup for Desktop and Server Hardware
Niclas Kühnapfel, Robert Buhren, Hans Niklas Jacob, Thilo Krachenfels, Christian Werling, Jean-Pierre Seifert
IEEE Physical Assurance and Inspection of Electronics (PAINE), 2022.
Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation
Robert Buhren, Christian Werling, Jean-Pierre Seifert
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2023.
Jailbreaking an Electric Vehicle in 2023 or What It Means to Hotwire Tesla's x86-Based Seat Heater |
Christian Werling, Niclas Kühnapfel, Hans Niklas Jacob and Oleg Drokin
BlackHat USA 2023, Las Vegas
Uncover, Understand, Own - Regaining Control Over Your AMD CPU |
Robert Buhren, Alexander Eichner and Christian Werling
36th Chaos Communication Congress, Leipzig (36C3)
Dissecting the AMD Platform Security Processor |
Christian Werling and Robert Buhren
Chaos Communication Camp 2019
If you are eager to write your Bachelor's or Master's thesis in Embedded Systems Security, Platform Security, or Confidential Computing, don't hesitate to contact me. Down below, you can find previous theses that I supervised.
|2023||Emulation-Based Fuzzing of UEFI Firmware: Exploring the Attack Vector of Removable Media to Compromise Boot Integrity|
|Investigating the Effectiveness of Sandboxing as a Technique for Securing Video Game Console Emulators|
|Subverting Measured Boot by Compromising Static Root of Trust Measurements on x86 Firmware|
|QEMU-PSP: Generalizing a Unicorn-based emulator for the AMD Secure Processor by porting it to QEMU|
|Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation|
|2022||A Practical Analysis of UEFI Threats Against Windows 11|
|FCAT: Design and Implementation of a Firmware Collection and Analysis Tool|