Jannik Hartung is a PhD candidate since December 2020. He is interested in low-level system security, binary exploitation, and code analysis.
He likes CTF security competitions, regularly participating with different groups. Lastly qualifying for the DEFCON CTF finals.
Room IZ 246
@janhartu:matrix.tu-bs.de
jannik.hartung [at] tu-braunschweig.de
0531/391-2273
Extract: A PHP Foot-Gun Case Study
Jannik Hartung, Simon Koch, and Martin Johns
19th USENIX WOOT Conference on Offensive Technologies (WOOT'25), 2025 [PDF] [BIB]
Year | Degree | Title |
---|---|---|
2025 | Bachelor | Exploring and Fuzzing the Starlink User Terminal Firmware |
2025 | Master | Evaluation of Fuzzing Techniques for Automotive ECUs Using Communication Matrices |
2024 | Master | Prevalence of countermeasures against memory corruption in common applications |
2024 | Master | MITM-gestützte Analyse der Netzwerksicherheit in Fahrzeugen |
2022 | Master | Blind Heap Exploitation of Debloated Applications |
2021 | Master | Computerunterstützte Aufarbeitung von Schwachstellen im Ausführungskontext |
Year | Conference |
---|---|
2025 | USENIX Security |
2024 | Euro S&P, NDSS |
2023 | IEEE S&P, ACSAC, CODASPY, ARES |
2022 | IEEE S&P, Euro S&P, TheWebConf, SAC |
2021 | ARES, ACSAC |
Year | Semester | Name |
---|---|---|
2025 | SS | Seclab, Seminar, SEP |
2024 | WS | Hacklab, Seminar |
2024 | SS | Seclab, SEP |
2023 | WS | Hacklab, Seminar, Teamproject |
2023 | SS | Seclab, Seminar |
2022 | WS | Hacklab, Seminar |
2022 | SS | Programming 1, Seminar |
2021 | WS | Hacklab, Seminar |
2021 | SS | Programming 1, Seminar |