{"id":2280,"date":"2025-12-09T14:17:51","date_gmt":"2025-12-09T13:17:51","guid":{"rendered":"https:\/\/www.esi.fau.de\/?p=2280"},"modified":"2026-03-24T15:23:37","modified_gmt":"2026-03-24T14:23:37","slug":"sven-gebhard-wins-1st-prize-in-the-cast-it-security-competition","status":"publish","type":"post","link":"https:\/\/www.esi.fau.de\/en\/2025\/12\/09\/sven-gebhard-wins-1st-prize-in-the-cast-it-security-competition\/","title":{"rendered":"Sven Gebhard Wins 1st Prize in the CAST IT Security Competition"},"content":{"rendered":"<p>Sven Gebhard received the 1st Prize in the <a href=\"https:\/\/cast-forum.de\/foerderpreise\/foerderpreis_historie.html?ts=1765277041272\">CAST IT Security Competition<\/a> for his bachelor\u2019s thesis, \u201cCovert Exfiltration of Cryptographic Keys from Android Devices\u201d, supervised by <a href=\"https:\/\/www.cs1.tf.fau.de\/person\/christian-lindenmeier\/\">Christian Lindenmeier<\/a>, <a href=\"https:\/\/www.cs1.tf.fau.de\/person\/jonas-roeckl\/\">Jonas R\u00f6ckl<\/a>, and <a href=\"https:\/\/www.cs1.tf.fau.de\/person\/felix-freiling\/\">Prof. Dr.-Ing. Felix Freiling<\/a>. In his thesis, he demonstrated how covert communication channels can be used to stealthily retrieve ephemeral cryptographic keys from the Signal Messenger Android app. Based on the thesis, a new category of network covert channel, so-called <em>key-extraction-based covert channels<\/em>, was discovered and published at <a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-79007-2_20\">NordSec\u201924<\/a>.<\/p>\n\n<div class=\"faudir\">\r\n         <div class=\"format-compact\">\r\n        \r\n                <section class=\"format-compact-container\" aria-labelledby=\"section-title-410535162-4240\" itemscope itemtype=\"https:\/\/schema.org\/Person\">\r\n                                            <div class=\"profile-image-section\"> \r\n                            <figure class=\"signature\"><span class=\"text\">FF<\/span><\/figure>                        <\/div>\r\n                                            <header class=\"profile-header\">\r\n                       <h1 id=\"section-title-410535162-4240\"><a itemprop=\"url\" href=\"https:\/\/www.esi.fau.de\/en\/faudir\/prof-dr-ing-felix-freiling\/\"><span class=\"displayname\" itemprop=\"name\"><abbr title=\"Professor Doctor\" itemprop=\"honorificPrefix\">Prof. Dr.-Ing.<\/abbr> <span class=\"namepart\"><span itemprop=\"givenName\">Felix<\/span> <span itemprop=\"familyName\">Freiling<\/span><\/span><\/span><\/a><\/h1><p class=\"organisation_name\"><span class=\"organization\" itemprop=\"name\">Chair of Computer Science 1 (IT Security Infrastructures)<\/span><\/p><p class=\"jobtitle\">Professors<\/p>                \r\n                     <\/header>\r\n                     <div class=\"profile-details\">   \r\n                                         <\/div>\r\n                <\/section>    \r\n                <\/div>\r\n\r\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Sven Gebhard received the 1st Prize in the CAST IT Security Competition for his bachelor\u2019s thesis, \u201cCovert Exfiltration of Cryptographic Keys from Android Devices\u201d, supervised by Christian Lindenmeier, Jonas R\u00f6ckl, and Prof. Dr.-Ing. Felix Freiling. In his thesis, he demonstrated how covert communication channels can be used to stealthily retrieve ephemeral cryptographic keys from the [&hellip;]<\/p>\n","protected":false},"author":911,"featured_media":2972,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_rrze_cache":"enabled","_rrze_multilang_single_locale":"en_US","_rrze_multilang_single_source":"https:\/\/www.esi.fau.de\/?p=2277","footnotes":""},"categories":[8],"tags":[],"class_list":["post-2280","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aktuelles","en-US"],"_links":{"self":[{"href":"https:\/\/www.esi.fau.de\/wp-json\/wp\/v2\/posts\/2280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esi.fau.de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esi.fau.de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esi.fau.de\/wp-json\/wp\/v2\/users\/911"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esi.fau.de\/wp-json\/wp\/v2\/comments?post=2280"}],"version-history":[{"count":3,"href":"https:\/\/www.esi.fau.de\/wp-json\/wp\/v2\/posts\/2280\/revisions"}],"predecessor-version":[{"id":2973,"href":"https:\/\/www.esi.fau.de\/wp-json\/wp\/v2\/posts\/2280\/revisions\/2973"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esi.fau.de\/wp-json\/wp\/v2\/media\/2972"}],"wp:attachment":[{"href":"https:\/\/www.esi.fau.de\/wp-json\/wp\/v2\/media?parent=2280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esi.fau.de\/wp-json\/wp\/v2\/categories?post=2280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esi.fau.de\/wp-json\/wp\/v2\/tags?post=2280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}