• Home
  • Christian Hummert
Christian Hummert

Christian Hummert
Agentur für Innovation in der Cybersicherheit

Doctor of Science

About

27
Publications
6,213
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
135
Citations
Additional affiliations
October 2021 - present
Agentur für Innovation in der Cybersicherheit
Position
  • CSO
October 2018 - September 2021
ZITiS - Central Office for Information Technology in the Security Sector
Position
  • Managing Director
August 2015 - September 2018
Hochschule Mittweida
Position
  • Professor
Education
January 2007 - November 2014
Friedrich Schiller University Jena
Field of study
  • Bioinformatics
October 1999 - November 2005
Ulm University
Field of study
  • Computer Science

Publications

Publications (27)
Article
Full-text available
Cloud services and cloud storage solutions are special challenges in digital forensic investigations. Cloud services allow their users, with relatively little technical knowledge, store, manage and share content with others. At the same time investigators are faced with a wide range of technical, legal and organizational issues. Unfortunately, evid...
Chapter
Full-text available
Property List files (*.plist) are a widely used data storage format used by Apple software. Most of the system properties are stored in plists, but also, many apps store their configuration in plist-files. The data held within Property is regularly of high evidential value for forensic analysts, so understanding the format is essential for the fore...
Book
Full-text available
This open access book summarizes knowledge about several file systems and file formats commonly used in mobile devices. In addition to the fundamental description of the formats, there are hints about the forensic value of possible artefacts, along with an outline of tools that can decode the relevant data. The book is organized into two distinct...
Article
Full-text available
Zusammenfassung Im Jahr 2017 wurde die Zentrale Stelle für Informationstechnik im Sicherheitsbereich (ZITiS) errichtet. Welche Aufgaben erfüllt diese junge Behörde nach drei Jahren und wie stellt sie sich für die Zukunft auf. Ist sie nur eine ,,Hackerbehörde‘‘, als die sie bisweilen bezeichnet wird, oder ist sie ein wichtiger Baustein für die Digit...
Article
Full-text available
Forensic analysis and evidence collection for web browser activity is a recurring problem in digital investigation. It is not unusual for a suspect to cover his traces. Accordingly, the recovery of previously deleted data such as web cookies and browser history are important. Fortunately, many browsers and thousands of apps used the same database s...
Technical Report
Full-text available
A number of standards identified previously provide a background to cover the current needs of the practitioners working in the area of digital forensics. However, some elements of the chain of custody in mobile forensics may be missed by standardisation, underrepresented or not covered adequately. This report outlines the standardisation gaps in m...
Technical Report
Full-text available
The objective of the present document is to analyse the status of current standardisation in mobile forensics and to point towards actions that can increase its effectiveness, ensure inclusion of all relevant stakeholders and their interests and improve the quality of mobile forensics processes and procedures. Further objective of the document is t...
Article
Advertising networks bring companies together that run advertisements on websites or within apps. Targeting capabilities of the advertisers have increased drastically over the last years due to the availability user data and advances in data science: whether users log on to social networks or use a mobile app, they leave their traces everywhere and...
Article
Full-text available
Advertising networks bring companies together that run advertisements on websites or within apps. Targeting capabilities of the advertisers have increased drastically over the last years due to the availability user data and advances in data science: whether users log on to social networks or use a mobile app, they leave their traces everywhere and...
Article
Full-text available
In the recent past, smart speakers and personal assistants like Alexa have been used as evidence in different criminal cases. With more than 6 million Echo devices in 2019 worldwide, there is a good chance for the constantly active devices to record criminal behavior. That is reason enough to take a closer look at the subject. This article discusse...
Conference Paper
How can Android applications be examined for malicious behavior in a quick and easy manner? Is the process of analysis automatable? Can the results be categorized in an easy way? The growing number of mobile malware for Android and their increasingly complex structures and intelligent concealment techniques are bringing investigative agencies to th...
Conference Paper
Information technology (IT) has become an integral part of production and manufacturing networks as well as critical infrastructures in the context of the fourth industrial revolution. Standard IT merges with components of factory automation and process control systems. The increasing digitization and the rise of intelligent networking opens up eno...
Article
As a part of the complement system, factor H regulates phagocytosis and helps differentiate between a body's own and foreign cells. Owing to mimicry efforts, some pathogenic microorganisms such as Candida albicans are able to bind factor H on their cell surfaces and, thus, become similar to host cells. This implies that the decision between self an...
Conference Paper
Android-based devices are the main target for cyber criminals. Especially, there is a broad range of malware for the Android platform. The analysis of the malicious code is an important challenge for the law enforcing agencies and developers of antivirus suites. To make the matters worse anti-forensic technologies are widespread in Android malware....
Chapter
Straftaten aus dem Phänomenbereich Computerkriminalität stellen eine wachsende Herausforderung für unsere Gesellschaft dar. Hierbei spielt bösartige Software eine herausragende Rolle. Dazu gehören insbesondere Phishing-Trojaner, im Bereich Onlinebanking, aber auch digitale Erpressung durch sogenannte Ransomware. Bei der Aufklärung von solchen Straf...
Conference Paper
Full-text available
Microarrays are extensively used for high-throughput gene expression analyses in molecular biology. Microarray analysis is reliable if the probe binds specifically to the intended target transcript. Cross-hybridizations of microarray probes is one of the main systematic errors which is influenced by microarray probe design. Newly released genome an...
Conference Paper
Full-text available
—Microarrays are broadly used for highthroughput gene expression analyses in molecular biology and medicine. Nevertheless, the quality of the technology is still capable for further improvements. One of the main problems is cross-hybridization of the transcripts to non-corresponding probes on the array by unspecific binding. Four different Affymetr...
Article
Gene duplication represents an evolutionary mechanism for expanding metabolic potential. Here we analysed the evolutionary relatedness of isocitrate and methylisocitrate lyases, which are key enzymes of the glyoxylate and methylcitrate cycle respectively. Phylogenetic analyses imply that ancient eukaryotes acquired an isocitrate lyase gene from a p...
Article
The polymorphic fungus Candida albicans can live as an aggressive pathogen that causes a wide variety of diseases in humans. Host resistance against these infections is mediated predominantly by phagocytes, namely neutrophils and macrophages. This report provides two game theoretical models of ingested C. albicans cells in macrophages. Two strategi...
Article
The polymorphic fungus Candida albicans can live as an aggressive pathogen that causes a wide variety of diseases in humans. Host resistance against these infections is mediated predominantly by phagocytes, namely neutrophils and macrophages. This report provides two game theoretical models of ingested C. albicans cells in macrophages. Two strategi...
Conference Paper
Full-text available
Game theory has been applied in many areas of sociological relations. In this paper, a social experiment from the movie: ’Batman - The Dark Knight’ is examined from a game theoretical viewpoint. In this film, the bad Joker installs explosives at two manned ferries. The passengers of each ferry have the possibility to blow up the other one. If one o...
Article
Full-text available
Rheumatoid arthritis (RA) is a chronic inflammatory and destructive joint disease characterized by overexpression of pro-inflammatory/pro-destructive genes and other activating genes (for example, proto-oncogenes) in the synovial membrane (SM). The gene expression in disease is often characterized by significant inter-individual variances via speci...
Poster
The probe design for well established commercial microarrays such as from Affymetrix is often not optimal. This leads to cross-hybridizations. An algorithm to cope this problem has been designed. The sequences of all Affymetrix probes are blasted against RefSeq using blastn. For each probe it is counted how many genes matched in the correct orienta...
Data
'Supplementary Table 1A: Genes affected by intra-group, inter-individual mRNA expression variances (RA compared to NC)', 'Supplementary Table 1B: Genes affected by intra-group, inter-individual mRNA expression variances (OA compared to NC)', 'Supplementary Table 1C: Genes affected by intra-group, inter-individual mRNA expression variances (RA compa...
Conference Paper
Full-text available
Programming languages scarcely support protection requirements, because this usually is considered to be the domain of the operating system. The paper discusses how protection of confidential data can benefit from new programming language concepts, comparing the characteristics of an aspect oriented and a component oriented approach to improve acce...

Network

Cited By

Projects

Projects (2)
Project
A consortium of partners, working in collaboration to create an end-to-end mobile forensic investigation chain, striving to improve digital safety, and security in the EU while respecting fundamental rights. (http://www.formobile-project.eu)
Project
CYBER RISKS, THREATS AND CHALLENGES IN INDUSTRIAL CONTROL NETWORKS AND CRITICAL INFRASTRUCTURE Website (in German): https://3safe.hs-mittweida.de/ Information technology (IT) has become an integral part of production and manufacturing networks as well as critical infrastructures in the context of the fourth industrial revolution. Standard IT unify with components of factory automation and process control systems. The increasing digitization and intelligent networking opens up enormous potential for industry and society. However, new risks arise at the same time because industrial control systems (ICS) are exposed to cyber-threats of conventional IT. In addition, ICS environments are becoming more attractive as targets for cyber criminals. Moreover, cyber-attacks and malware are getting more complex. This requires innovative approaches and appropriate measures in the field of IT security.