Christian Wressnegger
banner
chwress.bsky.social
Christian Wressnegger
@chwress.bsky.social
Professor in Computer Security at Karlsruhe Institute of Technology (KIT)

https://intellisec.de/chris
Reposted by Christian Wressnegger
Welcome to BIFOLD. The computer scientist Prof. Dr. Christian Wressnegger from Karlsruhe Institute of Technology strengthens BIFOLD’s expertise at the intersection of AI, data management, and IT security.

www.bifold.berlin/news-events/...

@chwress.bsky.social @tuberlin.bsky.social @kit.edu
November 10, 2025 at 1:19 PM
Looking forward to have @gianlucastringhini.com over at @kit.edu for our beloved distinguished lecture series 🤗 🥳
On Wednesday, November 5th, as part of our KASTEL Distinguished Lecture Series Prof. Gianluca Stringhini, PhD from Boston University will talk about ‘Improving the Moderation of False Information and Influence Campaigns on Social Media’.
Everybody is welcome and stay around for the Q&A afterwards.
October 29, 2025 at 9:08 PM
You prefer to organize your workshop in Europe? We've got you covered! We extended the call for workshops at EuroS&P 2026 to give you a few more days to make the move 😎 See you in Lisbon 🇵🇹

🌐 https://eurosp2026.ieee-security.org/cfw.html
⏱️ Deadline: Oct 2̶4̶t̶h̶ 30th AoE
📍Lisbon, PT
October 20, 2025 at 8:27 PM
Reposted by Christian Wressnegger
You are an Early Career Researcher in #cybersec? Here is an opportunity: The AEC chairs of @USENIXSecurity '26 are looking for (self)nominations for the Artifact Evaluation Committee. Deadline: October 17th, 2025, so sign up soon!
@chwress.bsky.social, @kumarde.bsky.social, @aurore-fass.bsky.social
October 10, 2025 at 10:16 AM
Reposted by Christian Wressnegger
We are alarmed by reports that Germany is on the verge of a catastrophic about-face, reversing its longstanding and principled opposition to the EU’s Chat Control proposal which, if passed, could spell the end of the right to privacy in Europe. signal.org/blog/pdfs/ge...
signal.org
October 3, 2025 at 4:14 PM
The call for workshops at EuroS&P 2026 is officially open!
EuroS&P is the premier, European forum for security & privacy research. The main conference is accompanied by a series of workshops. Be part of it! 😎

🌐 https://eurosp2026.ieee-security.org/cfw.html
⏱️ Deadline: Oct 24th AoE
📍Lisbon, PT
October 2, 2025 at 6:34 PM
Reposted by Christian Wressnegger
We are expanding our social media presence! Find us on LinkedIn, Instagram @kitcybersec and Mastodon @kitcybersec@social.kit.edu. Stay tuned for regular updates on events and information on #CyberSec at #KITKarlsruhe. While you are here, have you checked out our website cybersec.kcist.kit.edu yet?
KIT - KIT Graduate School Cyber Security - CyberSec - Home
cybersec.kcist.kit.edu
October 1, 2025 at 12:08 PM
Reposted by Christian Wressnegger
Congratulations to USENIX Security 2025 AE:
🏆 Distinguished Artifact Awards
🏆 Distinguished Reviewer Awards
⭐ Noteworthy Reviewer Recognition
🥷 Ninja Reviewer Recognition
secartifacts.github.io/usenixsec202...

And thank you all for your help!

CC @pvadrevu.bsky.social Tiago Heinrich
September 12, 2025 at 1:12 PM
LLM-powered code assistants might suggest vulnerable code to specific user groups. Old news? Well, in contrast to prior attacks of this kind, our "Generalized Adversarial Code Suggestions" (AsiaCCS 2025) impose no restrictions on the vulnerabilities.

🌐 https://intellisec.de/research/adv-code

(1/3)
August 27, 2025 at 12:55 AM
Reposted by Christian Wressnegger
Yikes. Turns out you can send a plaintext radio signal to cause any train in the USA to do an emergency break. The original 'security' was just a checksum, no encryption or authentication. Reporting this took them 12 years (!) because the vendor dismissed it initially www.cisa.gov/news-events/...
End-of-Train and Head-of-Train Remote Linking Protocol | CISA
www.cisa.gov
July 12, 2025 at 12:14 PM
Reposted by Christian Wressnegger
Haven't seen this on Bluesky yet: S&P 2027 will take place in Montreal, Canada!
May 14, 2025 at 6:45 AM
Reposted by Christian Wressnegger
LLMs hallucinating nonexistent software packages with plausible names leads to a new malware vulnerability: "slopsquatting."
LLMs can't stop making up software dependencies and sabotaging everything
: Hallucinated package names fuel 'slopsquatting'
www.theregister.com
April 12, 2025 at 10:31 PM
Reposted by Christian Wressnegger
I will be giving a talk at the MPI-IS @maxplanckcampus.bsky.social in Tübingen next week (March 12 @ 11am). The talk will cover my group's overall approach to trust in ML, with a focus on our work on unlearning and how to obtain verifiable guarantees of trust.

Details: is.mpg.de/events/speci...
March 5, 2025 at 3:40 PM
Reposted by Christian Wressnegger
Next week Tuesday, March 11th 2025, we are going to have another Security & Privacy Lunch 🍔 We meet at 12:00 at Oxford Pub https://www.oxfordpub.de/

Everybody is welcome. See you there! 🤗
Oxford Pub | Bier & Burger
Oxford Pub | The Finest Selection of Beer
www.oxfordpub.de
March 4, 2025 at 1:33 PM
Wow, this is massive! What started out as a Master's thesis @kit.edu @kastel-labs.bsky.social ended up with a distinguished paper award at #NDSS2025 🥳🎉

🗞️ intellisec.de/pubs/2025-nd...

Congrats Liam and Julian 💪🥟, and thank you @gannimo.bsky.social and @tregua.bsky.social for the collaboration!
intellisec.de
February 27, 2025 at 7:52 AM
I'm happy to share that our paper "Learning the Backdoor to Remove the Backdoor" got accepted at #AAAI2025 as oral presentation (top 5%). Great job @qzhao903.bsky.social 💪 @kastel-labs.bsky.social @kit.edu (1/5)

🗞️ https://intellisec.de/pubs/2025-aaai.pdf
💻️ https://intellisec.de/research/harvey
February 21, 2025 at 2:01 PM
Reposted by Christian Wressnegger
hyperfine: a command-line benchmarking Tool, written in Rust - Very useful to bench and compare performance of tools - Project by David Peter https://github.com/sharkdp/hyperfine
February 4, 2025 at 8:10 PM
Reposted by Christian Wressnegger
I got Linux running in a PDF file using a RISC-V emulator.

PDFs support Javascript, so Emscripten is used to compile the TinyEMU emulator to asm.js, which runs in the PDF. It boots in about 30 seconds and emulates a riscv32 buildroot system.

linux.doompdf.dev/linux.pdf
github.com/ading2210/li...
January 31, 2025 at 8:02 PM
Reposted by Christian Wressnegger
The additional "ess" is a typo, though, and the bsky account unrelated 🫠 However, fun fact: ESS is the acronym of the underlying Helmholtz topic of our beloved KASTEL Security Research Labs -> @kastel-labs.bsky.social 😎
January 27, 2025 at 7:32 PM
Reposted by Christian Wressnegger
December 18, 2024 at 2:52 PM
Reposted by Christian Wressnegger
Is your GPU trustworthy? 🤔

Today, Julian presents our work on implanting machine learning backdoors in hardware at @acsacconf.bsky.social. Our backdoors reside within a hardware ML accelerator, manipulating models on-the-fly and invisible from outside.

mlsec.org/docs/2024-ac...

1/3
December 13, 2024 at 11:16 AM
Later this week, we present Makrut at @acsacconf.bsky.social 2024. Achyut found a way to conduct explanation-aware backdoors against popular black-box XAI techniques. (1/3)

💻️ xaisec.org/makrut
🗞️ intellisec.de/pubs/2024-ac...
December 13, 2024 at 2:36 AM
Reposted by Christian Wressnegger
Alas
November 15, 2024 at 1:14 AM
Reposted by Christian Wressnegger
The second #ACSAC2024 #PreviewPaper today is by Hegde et al. who present MAKRUT, a model manipulation attack against the popular explanation method LIME, undermining the trustworthiness of black box #XAI: www.openconf.org/acs...
#ML #AI #cybersecurity
November 28, 2024 at 3:00 PM