Prof. Dr. Konrad Rieck
k.rieck (at) tu-bs.de (
+49 151 512-65917
+49 531 391-55120
Technische Universität Braunschweig
Institute of System Security
38106 Braunschweig, Germany
I am a Professor of Computer Science at TU Braunschweig and currently the Dean of Studies of Computer Science. Since 2016 I am leading the Institute of System Security. Before taking this position, I have been working at the University of Göttingen, Technische Universität Berlin, and Fraunhofer Institute FIRST.
My research interests revolve around computer security and machine learning. My group is developing novel methods for detecting computer attacks, analyzing malicious software and discovering vulnerabilities in software. I am also interested in efficient algorithms for analyzing structured data, such as strings, trees, and graphs.
Erdős number is 3 (Müller → Jagota → Erdős) and my Bacon number is ∞. I am a very distant academic relative of Carl Friedrich Gauß (see here), although this doesn't help when solving math problems.
Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning.
Erwin Quiring, David Klein, Daniel Arp, Martin Johns and Konrad Rieck. Proc. of the 29th USENIX Security Symposium, August 2020.
Evaluating Explanation Methods for Deep Learning in Computer Security.
Alexander Warnecke, Daniel Arp, Christian Wressnegger and Konrad Rieck. Proc. of the 5th IEEE European Symposium on Security and Privacy (EuroS&P), to appear September 2020.
On the Security and Applicability of Fragile Camera Fingerprints.
Erwin Quiring, Matthias Kirchner and Konrad Rieck. Proc. of the 24th European Symposium on Research in Computer Security (ESORICS), 450–470, September 2019.
Misleading Authorship Attribution of Source Code using Adversarial Learning.
Erwin Quiring, Alwin Maier and Konrad Rieck. Proc. of the 28th USENIX Security Symposium, August 2019.
False Sense of Security: A Study on the Effectivity of Jailbreak Detection in Banking Apps.
Ansgar Kellner, Micha Horlboge, Konrad Rieck and Christian Wressnegger. Proc. of the 4th IEEE European Symposium on Security and Privacy (EuroS&P), June 2019.
Reading Between The Lines: Content-Agnostic Detection of Spear-Phishing Emails.
Hugo Gascon, Steffen Ullrich, Benjamin Stritter and Konrad Rieck. Proc. of the 21st Symposium on Research in Attacks, Intrusions, and Defenses (RAID), September 2018.
A complete list of my publications is available
LehrLeo: Best Lecture at TU Braunschweig 2019
LehrLeo: Best Practical Course at TU Braunschweig 2019
DLS Outstanding Reviewer Award 2018
German Prize for IT-Security 2016 (2nd Place)
DIMVA Best Paper Award 2016
RAID Outstanding Reviewer Award 2015
Google Faculty Research Award 2014
ACSAC Outstanding Paper Award 2012
CAST/GI Dissertation Award IT-Security 2010
Editorial board of the Journal of Machine Learning Research (
JMLR) Guest editor of the special issue "Vulnerability Analysis" in
Information Technology Guest editor of the special issue "Threat Detection, Analysis and Defense" in
JISA Steering committee of the GI SIG Intrusion Detection and Response (
SIDAR) Steering committee of the Conference on Detection of Intrusions and Malware (
DIMVA) Steering committee of the IEEE Workshop on Deep Learning and Security (
Lernende Systeme: WG 3 IT Security, Privacy, Legal and Ethical Framework Forum InformatikerInnen für Frieden und gesellschaftliche Verantwortung e.V. (
Conference and Workshop Organization
Organizer: Dagstuhl Seminar
Security of Machine Learning PC chair: 2nd IEEE Workshop on Deep Learning and Security (
DLS'19) PC chair: 11th-12th ACM European Workshop on Systems Security (
EUROSEC'18 & 19) PC chair: 10th Conference on Detection of Intrusions and Malware (
DIMVA'13) PC chair: 6th European Conference on Computer Network Defense (
EC2ND'10) Local organizer: GI Graduate Workshop on Reactive Security (
Recent PC Memberships
A complete list of my academic services is available
Here are two plots showing my reviewing activity. As you can see, I am writing a lot of reviews per year. Most of the time, this is fun.
I am also tracking my email activity. Here are two plots showing the number of incoming and outgoing emails over the last two weeks.
Influential Security Papers
I am maintaining a list of
top-cited security papers. The list is automatically created based on citations of papers published at the four tier-1 security conferences.
I am a member of "Verband der krawattenlosen Wissensträger" (VDKW)