Univ.-Prof. Dr. Stefan Brunthaler

Univ.-Prof. Dr. Stefan Brunthaler
INF 6 Institut für Systemsicherheit

Univ.-Prof. Dr. Stefan Brunthaler

Short bio and research interests

In February 2011, I received a Dr. techn. degree in computer science from the Vienna University of Technology under the supervision of Prof. Jens Knoop. For the following couple of years I was a postdoctoral scholar at the University of California, Irvine, working with Prof. Michael Franz. After a brief stint with SBA Research in Vienna, I joined Paderborn University's computer science department.

My research focuses on software systems: I build new systems that solve challenging and important problems in the intersection of computer security and programming language implementation. Specifically, I have been working in language-based security, focusing on automated software diversity and information-flow tracking for JavaScript.

I also have extensive experience in implementing and optimizing dynamic programming languages — in particular Python: my most recent advances lead to performance improvements of up to more than five-fold when compared to standard Python. Recently, I have been making inroads towards verifying semantic preservation of my interpreter optimizations using Coq.

At the moment, I am working tirelessly to build a new research group and am looking for qualified and motivated students. Send me an email if all of the following hold true:

  • getting a PhD sounds interesting
  • you have read a couple of my papers and are excited by this type of work
  • you speak German (funded positions typically come with a light teaching load)


In case you are looking for Master's thesis topic, please stop by my office. (I have several topics that I am not advertising publicly.)


You may find a more current list of publications on either DBLP, ACM portal, or Google Scholar.

Copyright notice

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.


Refereed Journals and Conferences