Janek Schoffit, M.Sc.

Janek Schoffit, M.Sc.
Janek Schoffit, M.Sc.
wiss. Angestellter
Institute für Verteilte Systeme
Institut für Verteilte Systeme
Universität Ulm
Albert-Einstein-Allee 11
89081 Ulm
baden württemberg
Deutschland

You are welcome to visit my office. For reliable meetings, please arrange an appointment via mail.

Janek Schoffit

Janek Schoffit holds a Bachelor degree in Media Informatics (2023) and a Master degree in Computer Science (2024) from University of Tübingen. He is currently employed as a research assistant at the Institute of Distributed Systems.

 

Teaching

Open Theses and Projects

“End-to-End Zero-Trust Network Access Policies,” Bachelor or Master's thesis, J. Schoffit (Supervisor), F. Kargl (Examiner), Inst. of Distr. Sys., Ulm Univ., – Open.
This topic addresses the challenges of securing modern network environments through Zero Trust Network Access. Even when strong perimeter defenses are in place, the lack of true end-to-end network traffic separation still leaves systems vulnerable to lateral movement. I am interested in developing architectures that enforce strict network isolation and verification. This may also include exploring unified policy frameworks to seamlessly synchronize security rules across both the core network infrastructure and the client endpoints. If you wish to explore this topic further, I invite you to contact me and we can then further discuss the specific focus of the thesis.

Publications

2025

Schoffit, J., Pietzschmann, L., Prechtel, P., Eisermann, D., Wendzel, S., Kargl, F. and International Conference on Networked Systems (Ilmenau, 01.-04.09-2025) 2025. Enhancing client security in zero trust architectures: a device-agent policy enforcement point for compartmentalized network management. Proceedings of the International Conference on Networked Systems 2025 (NetSys 2025): Technische Universität Ilmenau, 1 – 4 September 2025. (Aug. 2025), 29–32.
Zero Trust Architectures have recently attracted a lot of interest in the network community. However, access control is often not extending into client devices. In this paper, we propose an extension of Zero Trust Policy Enforcement Points that integrates a device agent to expand the zero trust security model to client devices. We have developed a generalized framework that integrates with multiple compartmentalization technologies, ensuring the isolation of processes and enforcement of network policies while maintaining application and user authentication. This approach minimizes the attack surface of malicious processes, as our Zero Trust Device Agent manages compartment lifecycles based on their behaviour within the network and integrates into the global access control framework, thereby improving the overall security of zero trust architectures.