{"id":1,"date":"2022-02-12T09:13:35","date_gmt":"2022-02-12T08:13:35","guid":{"rendered":"https:\/\/wordpress.selhorst.net\/?p=1"},"modified":"2025-03-02T17:51:30","modified_gmt":"2025-03-02T16:51:30","slug":"hallo-welt","status":"publish","type":"post","link":"https:\/\/www.selhorst.net\/?p=1","title":{"rendered":"Marcel Selhorst (Dipl.-Ing.)"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"303\" src=\"https:\/\/www.selhorst.net\/wp-content\/uploads\/2022\/02\/MarcelSelhorst.png\" alt=\"\" class=\"wp-image-10\" srcset=\"https:\/\/www.selhorst.net\/wp-content\/uploads\/2022\/02\/MarcelSelhorst.png 400w, https:\/\/www.selhorst.net\/wp-content\/uploads\/2022\/02\/MarcelSelhorst-300x227.png 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h1 class=\"wp-block-heading has-large-font-size\" id=\"welcome\" style=\"text-transform:capitalize\"><strong>Welcome!<\/strong><\/h1>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>My name is Marcel Selhorst and I am a Principal Security Engineer focusing on Product-, Information- and Cyber-Security, such as Security Architectures, Trusted Computing, Trusted Execution Environments and Cryptography.<\/p>\n<\/blockquote>\n\n\n\n<p>Please find my contact details&nbsp;<a href=\"https:\/\/www.selhorst.net\/#contact\">below<\/a>.<\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\" id=\"content\"><strong>Content<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#publications\">Publications<\/a><\/li>\n\n\n\n<li><a href=\"#patents\">Patents<\/a><\/li>\n\n\n\n<li><a href=\"#development\">Former Development Projects<\/a><\/li>\n\n\n\n<li><a href=\"#lectures\">Lectures<\/a><\/li>\n\n\n\n<li><a href=\"#awards\">Awards and Interviews<\/a><\/li>\n\n\n\n<li><a href=\"#activities\">Other Activities and Hobbies<\/a><\/li>\n\n\n\n<li><a href=\"#pgpkey\">PGP Public Key<\/a><\/li>\n\n\n\n<li><a href=\"#contact\">Contact Information \/ Imprint \/ Legal<\/a><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\" id=\"publications\"><strong>Publications<\/strong><\/h2>\n\n\n\n<p>2014<\/p>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li>Gregor Buehler, Enrico Entschew, Marcel Selhorst:<br><strong>Security versus Usability \u2014 user-friendly qualified electronic signatures based on German ID cards.<\/strong><br>Accepted for:&nbsp;<em>Information Security Solutions Europe (ISSE) 2014,<\/em>&nbsp;October 2014.<\/li>\n<\/ul>\n\n\n\n<p>2013<\/p>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li>Carsten Schwarz, Marcel Selhorst:<br><strong>Cloud-based provisioning of qualified certificates for the German ID card.<\/strong><br>Accepted for:&nbsp;<em>Open Identity Summit 2013,<\/em>&nbsp;September 2013.<\/li>\n<\/ul>\n\n\n\n<p>2011<\/p>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li>Dennis Gessner, Marcel Selhorst, Christian Stueble:<br><strong>Realising a trustworthy sensor node with the idea of virtualisation.<\/strong><br>Accepted for:&nbsp;<em>6<sup>th<\/sup>&nbsp;Future Security Conference,<\/em>&nbsp;September 2011.<\/li>\n\n\n\n<li><strong>Specification of a dependable and secure OS system.<\/strong><br><em>Deliverable D02.7 for the WSAN4CIP-project,<\/em>&nbsp;August 2011.<\/li>\n\n\n\n<li><strong>Implementation of a dependable and secure OS system.<\/strong><br><em>Deliverable D02.8 for the WSAN4CIP-project,<\/em>&nbsp;August 2011.<\/li>\n\n\n\n<li>Marcel Selhorst, Christian Stueble, Florian Feldmann, Utz Gnaida:<br><strong>MoTrust.Embedded &#8211; Eine vertrauensw\u00fcrdige Sicherheitsplattform f\u00fcr Smartphones<\/strong>.<br>Accepted for:&nbsp;<em>12. Deutscher IT-Sicherheitskongress,<\/em>&nbsp;May 2011.<\/li>\n\n\n\n<li>Christoph Goericke, Norbert Schirmer, Marcel Selhorst, Christian Stueble:<br><strong>Browser in the Box (BITB) &#8211; Eine virtuelle Surfumgebung f\u00fcr Beh\u00f6rden, Unternehmen und Privatanwender<\/strong>.<br>Accepted for:&nbsp;<em>12. Deutscher IT-Sicherheitskongress,<\/em>&nbsp;May 2011.<\/li>\n\n\n\n<li><strong>Specification of secure code update protocol.<\/strong><br><em>Deliverable D02.3 for the WSAN4CIP-project,<\/em>&nbsp;April 2011.<\/li>\n\n\n\n<li><strong>Report on system integration.<\/strong><br><em>Deliverable D05.1 for the WSAN4CIP-project,<\/em>&nbsp;April 2011.<\/li>\n<\/ul>\n\n\n\n<p>2010<\/p>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li>Marcel Selhorst, Christian Stueble, Florian Feldmann, Utz Gnaida:<br><strong>Towards A Trusted Mobile Desktop.<\/strong><br>Accepted for the&nbsp;<em>Trust 2010 &#8211; 3rd International Conference on Trust and Trustworthy Computing,<\/em>&nbsp;June 2010.<\/li>\n\n\n\n<li>Sabine Kaess, Marcel Selhorst:<br><strong>Embedded Security Layer.<\/strong><br><em>Deliverable D03.7 for the TECOM-project,<\/em>&nbsp;June 2010.<\/li>\n<\/ul>\n\n\n\n<p>2009<\/p>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li>Christian Forler, Sabine Kaess, Marcel Selhorst, Christian Stueble:<br><strong>Security Services for Trusted Embedded Computing.<\/strong><br><em>Deliverable D03.6 for the TECOM-project,<\/em>&nbsp;November 2009.<\/li>\n\n\n\n<li>Christian Forler, Sabine Kaess, Marcel Selhorst, Christian Stueble:<br><strong>Embedded Security Management Framework.<\/strong><br><em>Deliverable D03.2 for the TECOM-project,<\/em>&nbsp;October 2009.<\/li>\n\n\n\n<li>Christoph Goericke, Ulrich Kuehn, Marcel Selhorst, Christian Stueble:<br><strong>Keyrona &#8211; Extending the key management of existing encryption software with hardware support&nbsp;<\/strong>, September 2009.<\/li>\n\n\n\n<li>Marcel Selhorst:<br><strong>Secure Storage Mechanisms For The Turaya Security Software Layer.<\/strong><br><em>Diploma thesis for acquiring the degree&nbsp;<\/em><strong>Dipl.-Ing. for IT-Security<\/strong>, April 2009.<\/li>\n<\/ul>\n\n\n\n<p>2008<\/p>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li>Marcel Selhorst, Christian Stueble, Felix Teerkorn:<br><strong>TSS Study: Introduction and Analysis of the Open Source TCG Software Stack TrouSerS and Tools in its Environment.<\/strong><br>The study is written on behalf of the&nbsp;<em>German Federal Office for Information Security (BSI).<\/em><\/li>\n\n\n\n<li>Marcel Selhorst, Christian Stueble, Felix Teerkorn:<br><strong>TSS-Studie: Einfuehrung und Analyse des quelloffenen TCG Software Stack TrouSerS und Werkzeuge in dessen Umfeld.<\/strong><br>Eine Studie im Auftrag des&nbsp;<em>Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI).<\/em><\/li>\n<\/ul>\n\n\n\n<p>2007<\/p>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li>Marcel Selhorst, Christian Stueble, Ulrich Kuehn:<br><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/dl.acm.org\/authorize?932594\" target=\"_blank\">Realizing property-based attestation and sealing with commonly available hard- and software<\/a><\/strong><br>Accepted for&nbsp;<em>The Second ACM Workshop on Scalable Trusted Computing (STC&#8217;07),<\/em>&nbsp;November 2007.<\/li>\n\n\n\n<li>Marcel Selhorst:<br><strong>Design and Implementation of a Compliance Test Suite for Trusted Platform Modules.<\/strong><br>Student Research Project<br><em>Summer Semester 2007.<\/em><\/li>\n\n\n\n<li>EMSCB &#8211; Milestone No. I:<br><strong>Turaya.Crypt &#8211; Secure Linux Hard-Disk Encryption.<br>Design Specification&nbsp;<\/strong>, May 2007.<\/li>\n<\/ul>\n\n\n\n<p>2006<\/p>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li>Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stueble, Christian Wachsmann and Marcel Winandy:<br><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/dl.acm.org\/authorize?845145\" target=\"_blank\">TCG inside?: a note on TPM specification compliance<\/a><\/strong><br>Accepted for&nbsp;<em>The First ACM Workshop on Scalable Trusted Computing (STC&#8217;06),<\/em>&nbsp;November 2006.<\/li>\n<\/ul>\n\n\n\n<p>2005<\/p>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li>Michael Scheibel, Marcel Selhorst, Oskar Senft, Christian Stueble, Marcel Winandy and Marko Wolf:<br><strong>Design and Implementation of a Device Encryption Architecture for High Security Requirements.<\/strong><br><em>EMSCB Technical Report,<\/em>&nbsp;November 2005.<\/li>\n\n\n\n<li>Ahmad-Reza Sadeghi, Marcel Selhorst, Oskar Senft, Christian Stueble and Marcel Winandy:<br><strong>New Aspects on Trusted Computing &#8211; New and Advanced Possibilities to Improve Security and Privacy.<\/strong><br><em>Datenschutz und Datensicherheit (DuD),<\/em>&nbsp;September 2005.<\/li>\n\n\n\n<li>Ammar Alkassar, Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stueble:<br><strong>Towards Secure Computing Platforms with Open-Source and Trusted Computing.<\/strong><br>Accepted for&nbsp;<em>9th German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI),<\/em>&nbsp;May 2005.<\/li>\n<\/ul>\n\n\n\n<p>2004<\/p>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li>Oliver Altmeyer, Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stueble:<br><strong>Enhancing Security of Computing Platforms with TC-Technology.<\/strong><br><em>In Sachar Paulus, Norbert Pohlmann, Helmut Reimer (ed.): Information Security Solutions Europe (ISSE 2004), Vieweg Verlag, pp. 346-361.,<\/em>&nbsp;2004.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\" id=\"patents\"><strong>Patents<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Pranav Agrawal, Gur Prasad Srivastava, Priyanka Dosi, Gaurav Singhal, Luca Fiore, Dhruv Goel, Vinay Vishakanta Murthy, Marcel Selhorst, Joona Kannisto:<br><strong>Anti-Replay feature for System-On-A-Chip (SoC) Power Down and Memory Self-Refresh.<\/strong><br><em>Application 18\/960,655, filed November 26th, 2024.<\/em><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Joona Kannisto, Marcel Selhorst:<br><strong>Rollback-Secure accountable revocation of features.<\/strong><br><em>Application 18\/939,259, filed November 6th, 2024.<\/em><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Christoper Wade, Marcel Selhorst:<br><strong>Fuse-Based Seed as an input for a Pseudo-Random Number Generator<\/strong>.<br><em>Application 18\/303,361, filed April 19th, 2023.<\/em><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Joona Kannisto, Marcel Selhorst, Victor van der Veen, Akash Verma:<br><strong>Defense Against Row Hammer Attacks<\/strong>.<br><em>Application 17\/842,606, filed June 16th, 2022<\/em>,<br><em>Application PCT\/US2023\/067501, filed May 25th, 2023.<\/em><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Alex Dent, Joona Kannisto, Marcel Selhorst, Akash Verma:<br><strong>Method for Circumventing Processor Error Induced Vulnerability.<\/strong><br><em>India Patent Application 202141053859, filed November 23rd, 2021<\/em>,<br><em>Application PCT\/US2022\/039248, filed August, 3rd, 2022.<\/em><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ference Brose, Gregor Buehler, Enrico Entschew, Jan-Philipp Feldmann, Philipp Krause, Marcel Selhorst:<br><strong>Verfahren und Vorrichtung zum personalisierten elektronischen Signieren eines Dokuments und Computerprogrammprodukt.<\/strong><br><em>German and European Patent Application DEA10 2015 109 607, filed June 15th, 2016.<\/em>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ulrich Matejek, Marcel Selhorst:<br><strong>Attributsnetzwerkidentit\u00e4t zur Bereitstellung von personenbezogenen Attributen f\u00fcr die Erstellung von digitalen Attributszertifikaten.<\/strong><br><em>German and European Patent Application DE10 2013 101 834, filed February 2nd, 2013.<\/em>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ulrich Kuehn, Marcel Selhorst, Christian Stueble:<br><strong>Vorrichtung und Methode zur Erkennung von Manipulationen an Computersystemen.<\/strong><br><em>German Patent Application DE10 2007 052 545, filed October 31st, 2007.<\/em><br>&nbsp;<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\" id=\"development\"><strong>Development Projects<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Trusted Platform Module (TPM) Linux Device Drivers:<\/strong><br><em>Infineon TPM SLD 9630 TT 1.1 (LPC)<\/em>&nbsp;and&nbsp;<em>Infineon TPM SLB 9635 TT 1.2 (LPC)<\/em>.<\/li>\n\n\n\n<li><strong>Linux Kernel Maintainer:<\/strong><br>Former Maintainer of the Linux Kernel TPM Device Drivers.<\/li>\n\n\n\n<li><strong>TPM Compliance Tests:<\/strong><br>Development of a&nbsp;<strong>TPM Specification Compliance Test Suite<\/strong>.<\/li>\n\n\n\n<li><strong>Trusted GRUB:<\/strong><br>Development, maintenance and support of the&nbsp;<strong>Trusted GRUB Project<\/strong>. <\/li>\n\n\n\n<li><strong>European Multilaterally Secure Computing Base:<\/strong><br>Development of a trustworthy computing platform. <\/li>\n\n\n\n<li><strong>PERSEUS:<\/strong><br>Research and development within the&nbsp;<strong>PERSEUS Project<\/strong>.<\/li>\n\n\n\n<li><strong>Keyrona:<\/strong><br>Development of a unified key management solution for hard disk and file encryption systems called&nbsp;<strong>Keyrona<\/strong>.<\/li>\n\n\n\n<li><strong>Browser in the Box:<\/strong><br>Development of an open source secure virtual surf environment for authorities, industry and private users called&nbsp;<strong>BitBox<\/strong>.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\" id=\"lectures\"><strong>Lectures<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>09\/2007: TPM Laboratory at&nbsp;<em>2nd European Trusted Infrastructure Summer School, Ruhr-University Bochum<\/em><br><strong><em>&nbsp; i)&nbsp;<\/em>Accessing the TPM: functions, commands and structures<br><em>&nbsp; ii)&nbsp;<\/em>TPM Open Source Software: Availablity and Usage<br><em>&nbsp;iii)&nbsp;<\/em>The Chain of Trust<\/strong>.<br>&nbsp;<\/li>\n\n\n\n<li>09\/2006:&nbsp;<strong>The Chain of Trust<\/strong>, lectured at&nbsp;<em>The First European Summer School on Trusted Infrastructure Technologies, University of Oxford, UK.<\/em><br>&nbsp;<\/li>\n\n\n\n<li>2005 &#8211; 2006:&nbsp;<strong>eHealth: Datensicherheit im Gesundheitswesen<\/strong>, lectured for&nbsp;<em>International School of IT Security.<\/em><br>&nbsp;<\/li>\n\n\n\n<li>2003:&nbsp;<strong>Sicherheit von File- und eMailservern unter Linux<\/strong>, lectured for&nbsp;<em>Siemens Business Services GmbH.<\/em><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\" id=\"awards\"><strong>Awards and Interviews<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Beruf: IT-Sicherheitsexperte<\/strong>, Technology Review, Ausgabe Oktober 2012<\/li>\n\n\n\n<li><strong>Sicherheitsl\u00fccken in mobilen Betriebssystemen &#8211; Der gl\u00e4serne Handynutzer<\/strong>, WDR.de vom 10.05.2011<\/li>\n\n\n\n<li><strong>Knack und Hack &#8211; In Bochum lernen Studenten, Sicherheitssysteme auszuhebeln<\/strong>, Uni-Spiegel, Seite 3 in Heft 2\/2006<\/li>\n\n\n\n<li><strong>Sicherheit in der Informationstechnik<\/strong>, Borakel &#8211; Beratungstool f\u00fcr Studieninteressenten, 2005<\/li>\n\n\n\n<li><strong>Computer-Sicherheit ist relativ &#8211; Hacken als Studienfach<\/strong>, 3sat nano, 2003<\/li>\n\n\n\n<li><strong>Ausgezeichneter Hacker-Angriff<\/strong>, Pressestelle der Ruhr-Universit\u00e4t, 2002<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\" id=\"activities\"><strong>Activities and Hobbies<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Trusted Computing<\/li>\n\n\n\n<li>Linux and Open Source Software<\/li>\n\n\n\n<li>Traveling &#8211; Photo Blog: <a href=\"https:\/\/www.nix-wie-raus.com\" target=\"_blank\" rel=\"noreferrer noopener\">nix-wie-raus.com<\/a><\/li>\n\n\n\n<li>Snooker<\/li>\n\n\n\n<li>Dancing<\/li>\n\n\n\n<li>Music &#8211; playing Guitar and Drums<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\" id=\"pgpkey\"><strong>PGP Public Key<\/strong><\/h2>\n\n\n\n<p><strong>PGP Key ID:<\/strong>&nbsp;0x37D83E99&nbsp;(updated 2020)<\/p>\n\n\n\n<p><strong>PGP Fingerprint: <\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code has-small-font-size\" style=\"border-style:none;border-width:0px\"><code>2456 9426 CA70 EDF0 AFFC \n6A4A A61C 120D 37D8 3E99<\/code><\/pre>\n\n\n\n<p><strong>PGP Public Key:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code has-small-font-size\" style=\"border-style:none;border-width:0px\"><code>-----BEGIN PGP PUBLIC KEY BLOCK-----\n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\ndCaurPLiV18=\n=qBwQ\n-----END PGP PUBLIC KEY BLOCK-----<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\" id=\"contact\"><strong>Contact<\/strong><\/h2>\n\n\n\n<p><strong>Personal Contact (in terms of \u00a7 5 Tele Media Act):<\/strong><br>Forstallee 51<br>D-15738 Zeuthen<br>E-Mail: marcel [at] selhorst.net<\/p>\n\n\n\n<p><strong>Business Contact:<\/strong><br>Please visit my <a rel=\"noreferrer noopener\" href=\"https:\/\/www.xing.com\/profile\/Marcel_Selhorst\" target=\"_blank\">Xing-Profile<\/a> or (non-public) <a href=\"https:\/\/www.linkedin.com\/in\/marcel-selhorst-641a0528b\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn-Profile<\/a>.<\/p>\n\n\n\n<p><strong>Cookies, Privacy Policy &amp; Disclaimer:<\/strong><br>This is a private homepage which only uses only the absolute necessary technical cookies &#8211; no tracking whatsoever. However, according to the EU General Data Protection Regulation, I have added a&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.selhorst.net\/?page_id=60\" data-type=\"page\" data-id=\"60\" target=\"_blank\">privacy policy page<\/a>.<br>Also, this website contains links to external websites of third parties, over whose content I have no influence. Therefore, I cannot accept any liability for any third-party content.<\/p>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome! My name is Marcel Selhorst and I am a Principal Security Engineer focusing on Product-, Information- and Cyber-Security, such as Security Architectures, Trusted Computing, Trusted Execution Environments and Cryptography. Please find my contact details&nbsp;below. Content Publications 2014 2013 2011 2010 2009 2008 2007 2006 2005 2004 Patents Development Projects Lectures Awards and Interviews Activities [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1","post","type-post","status-publish","format-standard","hentry","category-allgemein"],"_links":{"self":[{"href":"https:\/\/www.selhorst.net\/index.php?rest_route=\/wp\/v2\/posts\/1","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.selhorst.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.selhorst.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.selhorst.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.selhorst.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1"}],"version-history":[{"count":63,"href":"https:\/\/www.selhorst.net\/index.php?rest_route=\/wp\/v2\/posts\/1\/revisions"}],"predecessor-version":[{"id":107,"href":"https:\/\/www.selhorst.net\/index.php?rest_route=\/wp\/v2\/posts\/1\/revisions\/107"}],"wp:attachment":[{"href":"https:\/\/www.selhorst.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.selhorst.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.selhorst.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}