“Andreas Happe shared his open source journey for the book maintaine.rs, blending deep technical expertise with a passion for security. From leading the OWASP Top 10 Proactive Controls and the upcoming OT Top 10, to building projects like hackingBuddyGPT and cochise, Andreas is helping shape the future of secure development. Grateful for his contribution to the book and to the open source security community.”
Services
Activity
-
🚨 Agentic Browsers don’t just read the web. They reason, decide, and take action with full user authority. That’s exactly what turns a harmless…
🚨 Agentic Browsers don’t just read the web. They reason, decide, and take action with full user authority. That’s exactly what turns a harmless…
Liked by Andreas Happe
-
Looking for a 3-year funded #PhD #position in Germany in the area of #Ai, #security and #forensics? Continue reading... - you have a master's in…
Looking for a 3-year funded #PhD #position in Germany in the area of #Ai, #security and #forensics? Continue reading... - you have a master's in…
Liked by Andreas Happe
Experience & Education
Licenses & Certifications
Publications
-
Getting pwn'd by AI: Penetration Testing with Large Language Models
ESEC/FSE ’23, December 3–9, 2023, San Francisco, CA, USA
The field of software security testing, more specifically penetration testing, requires high levels of expertise and involves many manual testing and analysis steps. This paper explores the potential use of
large-language models, such as GPT3.5, to augment penetration testers with AI sparring partners. We explore two distinct use cases: high-level task planning for security testing assignments and low-
level vulnerability hunting within a vulnerable virtual machine.
For the latter,…The field of software security testing, more specifically penetration testing, requires high levels of expertise and involves many manual testing and analysis steps. This paper explores the potential use of
large-language models, such as GPT3.5, to augment penetration testers with AI sparring partners. We explore two distinct use cases: high-level task planning for security testing assignments and low-
level vulnerability hunting within a vulnerable virtual machine.
For the latter, we implemented a closed-feedback loop between LLM-generated low-level actions with a vulnerable virtual machine (connected through SSH) and allowed the LLM to analyze the machine state for vulnerabilities and suggest concrete attack vectors which were automatically executed within the virtual machine. We discuss promising initial results, detail avenues for improvement,
and close deliberating on the ethics of AI sparring partners.Other authorsSee publication -
Understanding Hackers' Work: An Empirical Study of Offensive Security Practitioners
ESEC/FSE ’23, December 3–9, 2023, San Francisco, CA, USA
Offensive security-tests are commonly employed to pro-actively discover potential vulnerabilities. They are performed by specialists, also known as penetration-testers or white-hat hackers. The chronic
lack of available white-hat hackers prevents sufficient security test coverage of software. Research into automation tries to alleviate this problem by improving the efficiency of security testing. To achieve
this, researchers and tool builders need a solid understanding of how hackers…Offensive security-tests are commonly employed to pro-actively discover potential vulnerabilities. They are performed by specialists, also known as penetration-testers or white-hat hackers. The chronic
lack of available white-hat hackers prevents sufficient security test coverage of software. Research into automation tries to alleviate this problem by improving the efficiency of security testing. To achieve
this, researchers and tool builders need a solid understanding of how hackers work, their assumptions, and pain points.
In this paper, we present a first data-driven exploratory qualitative study of twelve security professionals, their work and problems occurring therein. We perform a thematic analysis to gain insights into the execution of security assignments, hackers’ thought processes and encountered challenges. This analysis allows us to conclude with recommendations for researchers and tool builders, to increase the efficiency of their automation and identify novel areas
for research.Other authorsSee publication -
Enhancing Cloud Security and Privacy: Time for a New Approach?
The Sixth International Conference on Innovative Computing Technology (INTECH 2016)
Achieving cloud security is not a trivial problem and developing and enforcing good cloud security controls is a fundamental requirement if this is to succeed. The very nature of cloud computing can add additional problem layers for cloud security to an already complex problem area. We discuss why this is such an issue, consider what desirable characteristics should be aimed for and propose a novel means of effectively and efficiently achieving these goals through the use of unikernel based…
Achieving cloud security is not a trivial problem and developing and enforcing good cloud security controls is a fundamental requirement if this is to succeed. The very nature of cloud computing can add additional problem layers for cloud security to an already complex problem area. We discuss why this is such an issue, consider what desirable characteristics should be aimed for and propose a novel means of effectively and efficiently achieving these goals through the use of unikernel based systems. The main thrust of this paper is to discuss the key issues which need to be addressed, noting which of those might be covered by our proposed approach. We discuss how our proposed approach may help better address the key security issues we have identified.
Other authors -
PBFT and Secret-Sharing in Storage Settings
Twenty-fourth International Workshop on Security Protocols, At Brno, Czech Republic
Recent publications combine secret-sharing with byzantine fault-tolerant distribution schemes into safe and secure storage systems. To our knowledge current publications describe chosen algorithms and implementations but do not highlight areas of conflict between secret-sharing and BFT algorithms in a systematic fashing. This paper presents different concrete problem areas and suggests possible solutions.
Other authors -
The SECOQC quantum key distribution network in Vienna
New Journal of Physics
In this paper, we present the quantum key distribution (QKD) network designed and implemented by the European project SEcure COmmunication based on Quantum Cryptography (SECOQC) (2004–2008), unifying the efforts of 41 research and industrial organizations. The paper summarizes the SECOQC approach to QKD networks with a focus on the trusted repeater paradigm. It discusses the architecture and functionality of the SECOQC trusted repeater prototype, which has been put into operation in Vienna in…
In this paper, we present the quantum key distribution (QKD) network designed and implemented by the European project SEcure COmmunication based on Quantum Cryptography (SECOQC) (2004–2008), unifying the efforts of 41 research and industrial organizations. The paper summarizes the SECOQC approach to QKD networks with a focus on the trusted repeater paradigm. It discusses the architecture and functionality of the SECOQC trusted repeater prototype, which has been put into operation in Vienna in 2008 and publicly demonstrated in the framework of a SECOQC QKD conference held from October 8 to 10, 2008.
Other authorsSee publication -
ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing
IEEE CloudCom 2015
Cloud based collaboration give rise to many new applications and business opportunities in both domains, business and private. However building such systems in a secure and robust manner is a challenging tasks. We present a new architecture and prototype implementation for secure data sharing called ARCHISTAR, which is based on distributed storage technology and avoids any single point of trust or failure. It protects user data for confidentiality, integrity and availability – even from cloud…
Cloud based collaboration give rise to many new applications and business opportunities in both domains, business and private. However building such systems in a secure and robust manner is a challenging tasks. We present a new architecture and prototype implementation for secure data sharing called ARCHISTAR, which is based on distributed storage technology and avoids any single point of trust or failure. It protects user data for confidentiality, integrity and availability – even from cloud providers – and resist active attacks or failures in a resilient way.
Other authors -
Exchanging Database Writes with modern Cryptography
The First International Conference on Advances in Cyber-Technologies and Cyber-Systems CYBER2016, At Italy
Modern cryptography provides for new ways of solving old problems. This paper details how HMACs or AEAD can be employed as an alternative to a traditional server-side temporal session store. This cryptography-based approach reduces the server-side need for state. When applied to database-based user-management systems it removes all database alteration statements needed for confirmed user sign-up and greatly removes database alteration statements for typical ``forgot password'' use-cases. As…
Modern cryptography provides for new ways of solving old problems. This paper details how HMACs or AEAD can be employed as an alternative to a traditional server-side temporal session store. This cryptography-based approach reduces the server-side need for state. When applied to database-based user-management systems it removes all database alteration statements needed for confirmed user sign-up and greatly removes database alteration statements for typical ``forgot password'' use-cases. As there is no temporary data stored within the server database system, there is no possibility of creating orphaned or abandoned data records. However, this new approach is not generic and can only be applied if implemented use-cases fulfill requirements. This requirements and implications are also detailed within this paper. All examples are based upon common ``user sign-up''- and ``password forgotten/reset''-functionalities.
Other authors -
New release of an open source QKD software: design and implementation of new algorithms, modularization and integration with IPSec
-
Quantum Key Distribution (QKD) involves in a first step a physical exchange of quantum signals between a pair of devices, which can be carried out in numerous different ways. Whatever the realization of this ”physical layer” of QKD is, it outputs a pair of strongly correlated bit strings. The latter have then to be distilled by a fundamentally universal classical, post-processing protocol to yield Information Theoretically Secure (ITS)
keys. Post-processing communication requires…Quantum Key Distribution (QKD) involves in a first step a physical exchange of quantum signals between a pair of devices, which can be carried out in numerous different ways. Whatever the realization of this ”physical layer” of QKD is, it outputs a pair of strongly correlated bit strings. The latter have then to be distilled by a fundamentally universal classical, post-processing protocol to yield Information Theoretically Secure (ITS)
keys. Post-processing communication requires communication channel authentication, itself using key material. Key management in well defined crypto contexts is therefore a must for ITS post processing operation. Moreover real world QKD systems need to be seamlessly integrated in standard communication and to inter-operate with higher level applications providing communication security.Other authorsSee publication
Languages
-
German
Native or bilingual proficiency
-
English
Full professional proficiency
Recommendations received
1 person has recommended Andreas
Join now to viewMore activity by Andreas
-
LLM Safety and Security workshop at ELLIS UnConference'25 is just a few days away! Co-organized with Aideen Fay, Sahar Abdelnabi, Mario Fritz and 🤖…
LLM Safety and Security workshop at ELLIS UnConference'25 is just a few days away! Co-organized with Aideen Fay, Sahar Abdelnabi, Mario Fritz and 🤖…
Liked by Andreas Happe
-
The best part is, you never have to read the documentation (aka cookbook) either 🙂
The best part is, you never have to read the documentation (aka cookbook) either 🙂
Liked by Andreas Happe
-
📣 We are expanding our AI Safety and Alignment group at ELLIS Institute Tübingen and Max Planck Institute for Intelligent Systems! We have: - a…
📣 We are expanding our AI Safety and Alignment group at ELLIS Institute Tübingen and Max Planck Institute for Intelligent Systems! We have: - a…
Liked by Andreas Happe
-
Got locked up in a German castle for a week to discuss AI security with leading researchers. Prompt injections won't be solved. Guardrails will keep…
Got locked up in a German castle for a week to discuss AI security with leading researchers. Prompt injections won't be solved. Guardrails will keep…
Liked by Andreas Happe
-
Attending re:Invent next week? Join my colleagues Deepali Tandale, Jan Thewes, Robert Hanuschke and me for our CodeTalk on how to augment your…
Attending re:Invent next week? Join my colleagues Deepali Tandale, Jan Thewes, Robert Hanuschke and me for our CodeTalk on how to augment your…
Liked by Andreas Happe
-
𝗧𝗵𝗲 𝗛𝗶𝗱𝗱𝗲𝗻 𝗥𝗶𝘀𝗸 𝗼𝗳 𝗔𝗜 𝗔𝗴𝗲𝗻𝘁𝘀: 𝗪𝗵𝗲𝗻 “𝗦𝗺𝗮𝗿𝘁” 𝗕𝗲𝗰𝗼𝗺𝗲𝘀 𝗮 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗟𝗲𝗮𝗸 AI agents are becoming the…
𝗧𝗵𝗲 𝗛𝗶𝗱𝗱𝗲𝗻 𝗥𝗶𝘀𝗸 𝗼𝗳 𝗔𝗜 𝗔𝗴𝗲𝗻𝘁𝘀: 𝗪𝗵𝗲𝗻 “𝗦𝗺𝗮𝗿𝘁” 𝗕𝗲𝗰𝗼𝗺𝗲𝘀 𝗮 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗟𝗲𝗮𝗸 AI agents are becoming the…
Liked by Andreas Happe
-
Dla mnie prawdziwe. Więc chyba pora się zdiagnozować.
Dla mnie prawdziwe. Więc chyba pora się zdiagnozować.
Liked by Andreas Happe
-
Research shows adding fun facts like “cats sleep most of their lives” to an LLM input can multiply error rates 2-5x. So it turns out cat trivia can…
Research shows adding fun facts like “cats sleep most of their lives” to an LLM input can multiply error rates 2-5x. So it turns out cat trivia can…
Liked by Andreas Happe
-
10 years of AWS User Group Vienna Herzlichen Dank to everyone on site!
10 years of AWS User Group Vienna Herzlichen Dank to everyone on site!
Liked by Andreas Happe
-
(In German) Wertes Team und Kolleg:innen, werte Kunden, geschätzte Cybersecurity-Community, Partner und Mitbewerber, Nach 20 Jahren und 2 Monaten…
(In German) Wertes Team und Kolleg:innen, werte Kunden, geschätzte Cybersecurity-Community, Partner und Mitbewerber, Nach 20 Jahren und 2 Monaten…
Liked by Andreas Happe
-
Oh hell yes! Bring em all back! 50+% of tech was female. Men just got jealous instead of inspired to coexist equally. I said that badly, but you…
Oh hell yes! Bring em all back! 50+% of tech was female. Men just got jealous instead of inspired to coexist equally. I said that badly, but you…
Liked by Andreas Happe
-
There have been lots of interesting LLM releases last week. My favorite was actually the Olmo 3 release. Olmo models are always a highlight since…
There have been lots of interesting LLM releases last week. My favorite was actually the Olmo 3 release. Olmo models are always a highlight since…
Liked by Andreas Happe
-
I like that OpenAI reminds us about this waste. I'm personally not exactly "honored for passing 1 trillion tokens". And btw, we have already burned…
I like that OpenAI reminds us about this waste. I'm personally not exactly "honored for passing 1 trillion tokens". And btw, we have already burned…
Liked by Andreas Happe
-
You can now run Unsloth AI GGUFs locally via Docker! 🐋 Run LLMs on Mac or Windows with one line of code or no code at all! We collabed with Docker,…
You can now run Unsloth AI GGUFs locally via Docker! 🐋 Run LLMs on Mac or Windows with one line of code or no code at all! We collabed with Docker,…
Liked by Andreas Happe
-
Had a lot of fun yesterday at UNSW Software Development Society (DevSoc) 's annual TechSpire student conference! This year's theme was all about…
Had a lot of fun yesterday at UNSW Software Development Society (DevSoc) 's annual TechSpire student conference! This year's theme was all about…
Liked by Andreas Happe
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content