Team

Wissenschaftlicher Mitarbeiter
M. Sc. Christian Scholz
- Raum:
- S-GW 306
- Telefon:
- +49 201 18-37336
- E-Mail:
- christian.scholz (at) uni-due.de
- Autorenprofile:
- ORCID
Zur Person:
Christian Scholz ist wissenschaftlicher Mitarbeiter am Lehrstuhl für Systemsicherheit an der Universität Duisburg-Essen.
Lebenslauf:
seit 06/2023
Wissenschaftlicher Mitarbeiter am Lehrstuhl für Systemsicherheit an der Universität Duisburg-Essen
10/2020 - 09/2021
Wissenschaftliche Hilfskraft beim Max-Planck-Institut für Sicherheit und Privatsphäre
10/2019 - 10/2022
Masterstudium IT-Sicherheit/Informationstechnik an der Ruhr-Universität Bochum (Abschluss mit M. Sc.)
07/2019 - 09/2020
Werkstudent bei der emproof GmbH
01/2018 - 09/2018
Studentische Hilfskraft beim Sales Management Department an der Ruhr-Universität Bochum
10/2015 - 09/2019
Bachelorstudium IT-Sicherheit/Informationstechnik an der Ruhr-Universität Bochum (Abschluss mit B. Sc.)
Publikationen:
- Niesler, Christian; Scholz, Christian; Davi, Lucas: MPUsh: Applying Security Hotpatches Instead Of MPU Barriers. In: International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems. 2. Auflage. Springer, Regensburg, Germany, 2026. KurzfassungDetailsBIB Download
We present an MPU-based hotpatching method, MPush, for real-time embedded systems that redirects execution from protected flash regions to RAM-resident patches via HardFault handling. Our demonstration on a syringe pump showed practical viability, with measured overheads of 15 cycles for activation and 136 cycles (46 without optional validations) for redirection. Our results confirm the approach's real-time compatibility. The MPU proves effective for runtime patching in constrained environments; however, system-specific constraints may affect its applicability.
- Niesler, Christian; Scholz, Christian; Hannappel, Nils; Davi, Lucas: Co-Guard: Guarding Safety-Critical Embedded Devices in Emergencies. In: Proc. of 2nd Constructive Approaches for SeCurity Analysis and Design of Embedded systems Conference (CASCADE'26). 2026. DetailsBIB Download
- Giesen, Jens-Rene; Scholz, Christian; Davi, Lucas: Poster: Code HarvETHter: Corpus-Driven Decompilation of Ethereum Smart Contracts. In: Proc. of the 32th ACM SIGSAC Conference on Computer & Communications Security (CCS). ACM, Taipeh, Taiwan, 2025. KurzfassungDetailsBIB Download
This poster introduces HarvETHter, a smart contract decompiler for EVM-based platforms such as Ethereum, Binance, and Polygon. We present the corpus completeness hypothesis, which we investigate through HarvETHter. Relying on our hypothesis, HarvETHter sources knowledge of the Ethereum blockchain and leverages it to decompile smart contracts to Solidity source code.