TU Darmstadt / ULB / TUbiblio

Einträge mit Organisationseinheit "20 Fachbereich Informatik > Systemsicherheit"

Exportieren als [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Springe zu: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | W | Z
Es werden nur Einträge angezeigt, bei denen keine untergeordnete Organisationseinheit ausgewählt wurde. Anzahl: 550.

A

Acar, Abbas ; Fereidooni, Hossein ; Abera, Tigist ; Sikder, Amit Kumsr ; Miettinen, Markus ; Aksu, Hidayet ; Conti, Mauro ; Sadeghi, Ahmad-Reza (2020)
Peek-a-Boo: I see your smart home activities, even encrypted!
WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. virtual Conference (July 08.-10., 2020)
Konferenzveröffentlichung, Bibliographie

Adepu, Sridhar ; Brasser, Ferdinand ; Garcia, Luis ; Rodler, Michael ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Zonouz, Saman A. (2020)
Control Behavior Integrity for Distributed Cyber-Physical Systems.
11th International Conference on Cyber-Physical Systems (ICCPS). Sydney, Australia (22.-24. April, 2020)
doi: 10.1109/ICCPS48487.2020.00011
Konferenzveröffentlichung, Bibliographie

Aschermann, Cornelius ; Frassetto, Tommaso ; Holz, Thorsten ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Teuchert, Daniel (2019)
Nautilus: Fishing for Deep Bugs with Grammars.
Konferenzveröffentlichung, Bibliographie

Abera, Tigist ; Bahmani, Raad ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2019)
DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous System.
Konferenzveröffentlichung, Bibliographie

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2018)
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
23rd European Symposium on Research in Computer Security (ESORICS 2018). Barcelona, Spain (2018)
Konferenzveröffentlichung, Bibliographie

Asokan, N. ; Nyman, Thomas ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018)
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems - Special Issue ESWEEK 2018, CASES 2018, CODES + ISSS 2018 and EMSOFT 2018
Artikel, Bibliographie

Asokan, N. ; Nguyen, Thien Duc ; Tarkoma, Sasu ; Toivonen, Juhani ; Truong, Hien Thi Thu (2018)
Proximity Verification Based on Acoustic Room Impulse Response.
In: CoRR, abs/1803.07211
Artikel, Bibliographie

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep (2018)
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
In: IEEE Internet Computing
doi: 10.1109/MIC.2018.182130646
Artikel, Bibliographie

Asokan, N. ; Miettinen, Markus (2018)
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead.
In: Computer Communications
doi: 10.1016/j.comcom.2018.07.030
Artikel, Bibliographie

Antonioli, Daniele ; Ghaeini, Hamid Reza ; Adepu, Sridhar ; Ochoa, Martin ; Tippenhauer, Nils Ole (2017)
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3.
Dallas, Texas, USA
doi: 10.1145/3140241.3140253
Konferenzveröffentlichung, Bibliographie

Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2017)
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
Konferenzveröffentlichung, Bibliographie

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016)
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
Konferenzveröffentlichung, Bibliographie

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2016)
POSTER: Toward a Secure and Scalable Attestation.
Konferenzveröffentlichung, Bibliographie

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza (2016)
Things, Trouble, Trust: On Building Trust in IoT Systems.
Konferenzveröffentlichung, Bibliographie

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015)
SEDA: Scalable Embedded Device Attestation.
Konferenzveröffentlichung, Bibliographie

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015)
SEDA - Technical Report.
Report, Bibliographie

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015)
HAFIX: Hardware-Assisted Flow Integrity Extension.
Konferenzveröffentlichung, Bibliographie

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep (2015)
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices.
In: CoRR, abs/1511.02119
Artikel, Bibliographie

Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
Hrsg.: Kutylowski, Miroslaw ; Vaidya, Jaideep (2014)
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014
doi: 10.1007/978-3-319-11203-9_5
Buchkapitel, Bibliographie

Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2014)
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8)
Artikel, Bibliographie

Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza (2013)
Mobile Platform Security.
doi: 10.2200/S00555ED1V01Y201312SPT009
Buch, Bibliographie

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2013)
A Security Framework for Analysis and Design of Software Attestation.
Konferenzveröffentlichung, Bibliographie

Aderhold, Markus ; Gebhardt, Alexander ; Mantel, Heiko (2013)
Choosing a Formalism for Secure Coding: FSM vs. LTL.
Report, Bibliographie

Alkassar, Ammar ; Heuser, Stephan ; Stüble, Christian (2013)
Vertrauenswürdige Smartphones: Technologien und Lösungen.
Konferenzveröffentlichung, Bibliographie

Ahmed, Sarah ; Kaiser, Maximilian ; Kreutzer, Michael (2013)
IT-Sicherheitstrends kleiner und mittelständischer Unternehmen.
Report, Bibliographie

Alkassar, Ammar ; Schulz, Steffen ; Stüble, Christian (2012)
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), 2012 (3)
doi: 10.1007/s11623-012-0060-3
Artikel, Bibliographie

Armknecht, Frederik ; Maes, Roel ; Sadeghi, Ahmad-Reza ; Standaert, François-Xavier ; Wachsmann, Christian (2011)
A Formal Foundation for the Security Features of Physical Functions.
Konferenzveröffentlichung, Bibliographie

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Scafuro, Alessandra ; Visconti, Ivan ; Wachsmann, Christian (2010)
Impossibility Results for RFID Privacy Notions.
Konferenzveröffentlichung, Bibliographie

Armknecht, Frederik ; Ghosal, Dipak ; Katzenbeisser, Stefan ; Liu, Yali ; Sadeghi, Ahmad-Reza ; Schulz, Steffen (2010)
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Konferenzveröffentlichung, Bibliographie

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010)
On RFID Privacy with Mutual Authentication and Tag Corruption.
Konferenzveröffentlichung, Bibliographie

Armknecht, Frederik ; Chen, Liqun ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2010)
Anonymous Authentication for RFID Systems.
Konferenzveröffentlichung, Bibliographie

Armknecht, Frederik ; Furukawa, Jun ; Kurosawa, Kaoru (2008)
A Universally Composable roup Key Exchange Protocol with Minimum Communication Effort.
Konferenzveröffentlichung, Bibliographie

Armknecht, Frederik ; Mirzadeh, Shahab ; Tafazolli, Rahim ; Pallares, Jordi Jaen ; Afifi, Hossam (2008)
CPFP: An efficient key management scheme for large scale personal networks.
Konferenzveröffentlichung, Bibliographie

Armknecht, Frederik ; Westhoff, Dirk ; Girao, Joao ; Hessler, Alban (2008)
A life-time optimized end-to-end encryption scheme for sensor networks allowing in-networking processing.
In: Computer Communications Journal, 31 (4)
Artikel, Bibliographie

Asokan, N. ; Gasmi, Yacine ; Sadeghi, Ahmad-Reza ; Stewin, Patrick ; Unger, Martin (2007)
Beyond Secure Channels.
ACM Workshop on Scalable Trusted Computing (ACMSTC 2007).
Konferenzveröffentlichung, Bibliographie

Adelsbach, Andre ; Huber, Ulrich ; Sadeghi, Ahmad-Reza (2007)
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
Transactions on Data Hiding and Multimedia Security II.
Konferenzveröffentlichung, Bibliographie

Adelsbach, Andre ; Rohe, Markus ; Sadeghi, Ahmad-Reza (2006)
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
Transactions on Data Hiding and Multimedia Security.
Konferenzveröffentlichung, Bibliographie

Adelsbach, Andre ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza (2006)
A Computational Model for Watermark Robustness.
Information Hiding Workshop.
Konferenzveröffentlichung, Bibliographie

Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Scheibel, Michael ; Stüble, Christian ; Winandy, Marcel (2006)
Security Architecture for Device Encryption and VPN.
Information Security Solution Europe (ISSE06).
Konferenzveröffentlichung, Bibliographie

Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian (2005)
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI).
Konferenzveröffentlichung, Bibliographie

Altmeyer, Oliver ; Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian
Hrsg.: Paulus, Sachar ; Pohlmann, Norbert ; Reimer, Helmut (2004)
Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004)
Buchkapitel, Bibliographie

Alkassar, Ammar ; Stüble, Christian (2003)
A Security Framework for Integrated Networks.
Boston, USA
Konferenzveröffentlichung, Bibliographie

Adelsbach, Andre ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza (2003)
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, 9 (3)
Artikel, Bibliographie

Adelsbach, Andre ; Stüble, Christian ; Creese, Sadie ; Pfitzmann, Birgit ; Ryan, Peter Y. A. ; Simmonds, William ; Steinbrecher, Sandra ; Steiner, Michael ; Waidner, Michael
Hrsg.: Adelsbach, Andre ; Steiner, Michael (2002)
Cryptographic Semantics For The Algebraic Models : MAF­TIA De­li­ver­a­ble D.
Report, Bibliographie

Alkassar, Ammar ; Stüble, Christian (2002)
Towards Secure IFF: Preventing Mafia Fraud Attacks.
Konferenzveröffentlichung, Bibliographie

Adelsbach, Andre ; Sadeghi, Ahmad-Reza (2001)
Zero-Knowledge Watermark Detection and Proof of Ownership.
Information Hiding: Fourth International Workshop.
Konferenzveröffentlichung, Bibliographie

Adelsbach, Andre ; Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza (2000)
Proving ownership of digital content.
3rd International Workshop on Information Hiding, IH 1999.
Konferenzveröffentlichung, Bibliographie

Adelsbach, Andre (2000)
Anonymous fingerprinting with direct non-repudiation.
Kyoto, Japan
Konferenzveröffentlichung, Bibliographie

B

Bahmani, Raad ; Brasser, Ferdinand ; Dessouky, Ghada ; Jauernig, Patrick ; Klimmek, Matthias ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2021)
CURE: A Security Architecture with CUstomizable and Resilient Enclaves.
30th USENIX Security Symposium (USENIX Security'21). Vancouver, Canada (11.-13.08.)
Konferenzveröffentlichung, Bibliographie

Baumgärtner, Lars ; Dmitrienko, Alexandra ; Freisleben, Bernd ; Gruler, Alexander ; Höchst, Jonas ; Kühlberg, Joshua ; Mezini, Mira ; Mitev, Richard ; Miettinen, Markus ; Muhamedagic, Anel ; Nguyen, Thien Duc ; Penning, Alvar ; Pustelnik, Frederik ; Roos, Filipp ; Sadeghi, Ahmad-Reza ; Schwarz, Michael ; Uhl, Christian (2020)
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps.
TrustCom 2020. virtual Conference (29.12.2020-01.01.2021)
Konferenzveröffentlichung, Bibliographie

Buchmann, Johannes ; Dessouky, Ghada ; Frassetto, Tommaso ; Kiss, Ágnes ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Traverso, Giulia ; Zeitouni, Shaza (2020)
SAFE: A Secure and Efficient Long-Term Distributed Storage System.
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20). Taipei, Taiwan (June 1-5, 2020)
Konferenzveröffentlichung, Bibliographie

Bayerl, Sebastian P. ; Frassetto, Tommaso ; Jauernig, Patrick ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Weinert, Christian (2020)
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20). Grenoble, France (09. – 13. March 2020)
Konferenzveröffentlichung, Bibliographie

Brasser, Franz Ferdinand Peter (2020)
Enclave Computing Paradigm: Hardware-assisted Security Architectures & Applications.
Technische Universität Darmstadt
doi: 10.25534/tuprints-00011912
Dissertation, Erstveröffentlichung

Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza (2019)
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization.
ACSAC - 35th Annual Computer Security Applications Conference. San Juan, Puerto Rico (December 9-13)
Konferenzveröffentlichung, Bibliographie

Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019)
Privacy-preserving speech processing via STPC and TEEs (Poster).
2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop. London (15. November 2019)
Konferenzveröffentlichung, Bibliographie

Bock, Carsten ; Brasser, Ferdinand ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2019)
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
ACM Asia Conference on Computer and Communications Security (AsiaCCS). Auckland (07. - 12.07.2019)
doi: 10.1145/3321705.3329827
Konferenzveröffentlichung, Bibliographie

Batina, Lejla ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019)
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
Design Automation Conference 2019. Las Vegas, NV, USA (June 02 - 06, 2019)
Konferenzveröffentlichung, Bibliographie

Brasser, Ferdinand ; Gens, David ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019)
SANCTUARY: ARMing TrustZone with User-space Enclaves.
Konferenzveröffentlichung, Bibliographie

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian (2018)
VoiceGuard: Secure and Private Speech Processing.
doi: 10.21437/Interspeech.2018-2032
Konferenzveröffentlichung, Bibliographie

Biondo, Andrea ; Conti, Mauro ; Davi, Lucas ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2018)
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
27th USENIX Security Symposium.
Konferenzveröffentlichung, Bibliographie

Brasser, Ferdinand ; Davi, Lucas ; Dhavlle, Abhijitt ; Frassetto, Tommaso ; Dinakarrao, Sai Manoj Pudukotai ; Rafatirad, Setareh ; Sadeghi, Ahmad-Reza ; Sasan, Avesta ; Sayadi, Hossein ; Zeitouni, Shaza ; Homayoun, Houman (2018)
Advances and Throwbacks in Hardware-assisted Security: Special Session.
Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems. Piscataway, NJ, USA
Konferenzveröffentlichung, Bibliographie

Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Müller, Urs ; Sadeghi, Ahmad-Reza (2017)
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
doi: 10.48550/arXiv.1709.09917
Report, Bibliographie

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza (2017)
Software Grand Exposure: SGX Cache Attacks Are Practical.
Konferenzveröffentlichung, Bibliographie

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017)
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
Konferenzveröffentlichung, Bibliographie

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016)
CATT: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
In: Cryptography and Security
Artikel, Bibliographie

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016)
Regulating ARM TrustZone Devices in Restricted Spaces.
Konferenzveröffentlichung, Bibliographie

Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016)
Leakage-Resilient Layout Randomization for Mobile Devices.
Konferenzveröffentlichung, Bibliographie

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016)
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
Konferenzveröffentlichung, Bibliographie

Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2015)
TyTAN: Tiny Trust Anchor for Tiny Devices.
Konferenzveröffentlichung, Bibliographie

Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza (2015)
XiOS: Extended Application Sandboxing on iOS.
Konferenzveröffentlichung, Bibliographie

Barekatain, Behrang ; Khezrimotlagh, Dariush ; Aizaini Maarof, Mohd ; Ghaeini, Hamid Reza ; Ariza Quintana, Alfonso ; Trivino Cabrera, Alicia (2015)
Efficient P2P live video streaming over hybrid WMNs using random network coding.
In: Wireless Personal Communications, 80 (4)
doi: 10.1007/s11277-014-2112-5
Artikel, Bibliographie

Busold, Christoph ; Heuser, Stephan ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah (2015)
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
Konferenzveröffentlichung, Bibliographie

Busold, Christoph ; Dmitrienko, Alexandra ; Wachsmann, Christian (2014)
Key2Share for Authentication Services.
Konferenzveröffentlichung, Bibliographie

Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael
Hrsg.: Hildebrandt, Mireille (2013)
Personal Information Dashboard: Putting the Individual Back in Control.
In: Digital Enlightenment Yearbook 2013
doi: 10.3233/978-1-61499-295-0-139
Buchkapitel, Bibliographie

Barekatain, Behrang ; Khezrimotlagh, Dariush ; Aizaini Maarof, Mohd ; Ghaeini, Hamid Reza ; Salleh, Shaharuddin ; Ariza Quintana, Alfonso ; Akbari, Behzad ; Trivino Cabrera, Alicia (2013)
MATIN: A random network coding based framework for high quality peer-to-peer live video streaming.
In: PloS one, 8 (8)
doi: 10.1371/journal.pone.0069844
Artikel, Bibliographie

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2013)
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
Konferenzveröffentlichung, Bibliographie

Bodden, Eric ; Tanter, Éric ; Inostroza, Milton (2013)
Joint Point Interfaces for Safe and Flexible Decoupling of Aspects.
In: ACM Transactions on Software Engineering and Methodology, 23 (1)
Artikel, Bibliographie

Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013)
Client-controlled Cryptography-as-a-Service in the Cloud.
Konferenzveröffentlichung, Bibliographie

Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo (2013)
SPLlift – Statically Analyzing Software Product Lines in Minutes Instead of Years.
Konferenzveröffentlichung, Bibliographie

Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2013)
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
San Antonio, Texas, USA
doi: 10.1145/2435349.2435382
Konferenzveröffentlichung, Bibliographie

Baecher, Paul ; Brzuska, Christina ; Mittelbach, Arno (2013)
Reset Indifferentiability and its Consequences.
Konferenzveröffentlichung, Bibliographie

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012)
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
Report, Bibliographie

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012)
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
Report, Bibliographie

Bessani, Alysson ; Abbadi, Imad M. ; Bugiel, Sven ; Cesena, Emanuele ; Deng, Mina ; Gröne, Michael ; Marnau, Ninja ; Nürnberger, Stefan ; Pasin, Marcelo ; Schirmer, Norbert
Hrsg.: Petcu, Dana ; Vazquez-Poletti, Jose Luis (2012)
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
In: European research activities in cloud computing
Buchkapitel, Bibliographie

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2012)
Towards Taming Privilege-Escalation Attacks on Android.
Konferenzveröffentlichung, Bibliographie

Bodden, Eric ; Thies, Andreas (2012)
RefaFlex: Safer Refactorings for Reflective Java Programs.
Konferenzveröffentlichung, Bibliographie

Boneh, Dan ; Dagdelen, Özgür ; Fischlin, Marc ; Lehmann, Anja ; Schaffner, Christian ; Zhandry, Mark (2011)
Random Oracles in a Quantum World.
Konferenzveröffentlichung, Bibliographie

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2011)
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
Konferenzveröffentlichung, Bibliographie

Bugiel, Sven ; Davi, Lucas ; Schulz, Steffen
Hrsg.: Sadeghi, Ahmad-Reza ; Zhang, Xinwen (2011)
Scalable Trust Establishment with Software Reputation.
Chicago, Illinois, USA
Konferenzveröffentlichung, Bibliographie

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2011)
Practical and Lightweight Domain Isolation on Android.
Konferenzveröffentlichung, Bibliographie

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza (2011)
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.
Report, Bibliographie

Bugiel, Sven ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
TruWalletM: Secure Web Authentication on Mobile Platforms.
Konferenzveröffentlichung, Bibliographie

Bugiel, Sven ; Ekberg, Jan-Erik (2010)
Implementing an Application-Specific Credential Platform Using Late-Launched Mobile Trusted Module.
Konferenzveröffentlichung, Bibliographie

Bangerter, Endre ; Briner, Thomas ; Henecka, Wilko ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Automatic Generation of Sigma-Protocols.
doi: 10.1007/978-3-642-16441-5_5
Konferenzveröffentlichung, Bibliographie

Battestini, Agathe ; Rossow, Christian ; Flanagan, Adrian ; Miettinen, Markus (2007)
Creating Next Generation Applications and Services for Mobile Devices: Challenges and Opportunities.
Athens
doi: 10.1109/PIMRC.2007.4394846
Konferenzveröffentlichung, Bibliographie

Birk, Dominik ; Gajek, Sebastian ; Gröbert, Felix ; Sadeghi, Ahmad-Reza (2007)
Phishing Phishers - Observing and Tracing Organized Cybercrime.
Second International Conference on Internet Monitoring and Protection (ICIMP 2007).
Konferenzveröffentlichung, Bibliographie

C

Cloosters, Tobias ; Surminski, Sebastian ; Sangel, Gerrit ; Davi, Lucas (2022)
Salsa: SGX Attestation for Live Streaming Applications.
2022 IEEE Secure Development Conference. Atlanta, USA (18.-20.10.2022)
doi: 10.1109/SecDev53368.2022.00019
Konferenzveröffentlichung, Bibliographie

Chen, Chen ; Kande, Rahul ; Mahmoody, Pouya ; Sadeghi, Ahmad-Reza ; Rajendran, JV (2022)
Trusting the trust anchor: towards detecting cross-layer vulnerabilities with hardware fuzzing.
59th ACM/IEEE Design Automation Conference. San Francisco, USA (10.-14.07.2022)
doi: 10.1145/3489517.3530638
Konferenzveröffentlichung, Bibliographie

Chen, Yanjiao ; Bai, Yijie ; Wang, Kaibo ; Mitev, Richard ; Xu, Wenyuan ; Sadeghi, Ahmad-Reza (2021)
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants.
ACM Conference on Computer and Communications Security (CCS). virtual Conference (15.-19.11.2021)
Konferenzveröffentlichung, Bibliographie

Cammarota, Rosario ; Schunter, Matthias ; Rajan, Anand ; Boemer, Fabian ; Kiss, Ágnes ; Treiber, Amos ; Weinert, Christian ; Schneider, Thomas ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza ; Demmler, Daniel ; Chen, Huili ; Hussain, Siam Umar ; Riazi, M. Sadegh ; Koushanfar, Farinaz ; Gupta, Saransh ; Rosing, Tajan Simunic ; Chaudhuri, Kamalika ; Nejatollahi, Hamid ; Dutt, Nikil ; Imani, Mohsen ; Laine, Kim ; Dubey, Anuj ; Aysu, Aydin ; Sadat Hosseini, Fateme ; Yang, Chengmo ; Wallace, Eric ; Norton, Pamela (2020)
Trustworthy AI Inference Systems: An Industry Research View.
Report, Bibliographie

Carpent, Xavier ; Eldefrawy, Karim ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018)
Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices.
Design Automation Conference. San Francisco, USA (2018, June 24-29)
Konferenzveröffentlichung, Bibliographie

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza (2016)
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
Konferenzveröffentlichung, Bibliographie

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016)
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
Konferenzveröffentlichung, Bibliographie

Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza (2015)
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
Konferenzveröffentlichung, Bibliographie

Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael (2015)
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
Konferenzveröffentlichung, Bibliographie

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015)
Return to Where? You Can't Exploit What You Can't Find.
Konferenzveröffentlichung, Bibliographie

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015)
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
Konferenzveröffentlichung, Bibliographie

Carmo, Rodrigo do ; Hollick, Matthias (2013)
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks.
In: Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
doi: 10.1145/2463183.2463187
Artikel, Bibliographie

Carmo, R. do ; Werner, M. ; Hollick, Matthias (2012)
Signs of a Bad Neighborhood: A Lightweight Metric for Anomaly Detection in Mobile Ad Hoc Networks.
Konferenzveröffentlichung, Bibliographie

Chen, Liqun ; Dietrich, Kurt ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Winter, Johannes (2010)
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
Konferenzveröffentlichung, Bibliographie

Checkoway, Stephen ; Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Shacham, Hovav ; Winandy, Marcel (2010)
Return-Oriented Programming without Returns.
Chicago, Illinois, USA
doi: 10.1145/1866307.1866370
Konferenzveröffentlichung, Bibliographie

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2010)
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5
Artikel, Bibliographie

Catuogno, Luigi ; Dmitrienko, Alexandra ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramunno, Gianluca ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Schunter, Matthias ; Winandy, Marcel ; Zhan, Jing (2009)
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
Konferenzveröffentlichung, Bibliographie

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
Transparent Mobile Storage Protection in Trusted Virtual Domains.
Konferenzveröffentlichung, Bibliographie

Celik, Mehmet ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza ; Skoric, Boris (2007)
Combining Tardos Fingerprinting Codes and Fingercasting.
9th International Workshop on Information Hiding (IH 2007).
Konferenzveröffentlichung, Bibliographie

Carluccio, Dario ; Lemke-Rust, Kerstin ; Paar, Christof ; Sadeghi, Ahmad-Reza (2006)
E-Passport: The Global Traceability or How to Feel Like an UPS Package.
Workshop on RFID Security 2006.
Konferenzveröffentlichung, Bibliographie

Camenisch, Jan ; Rohe, Markus ; Sadeghi, Ahmad-Reza (2005)
Sokrates - A Compiler Framework for Zero-Knowledge Protocols.
Western European Workshop on Research in Cryptology (WEWoRC 2005).
Konferenzveröffentlichung, Bibliographie

D

Dessouky, Ghada (2023)
Flexible Hardware-based Security-aware Mechanisms and Architectures.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00023042
Dissertation, Erstveröffentlichung, Verlagsversion

Dessouky, Ghada ; Gruler, Alexander ; Mahmoody, Pouya ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2022)
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures.
Network and Distributed Systems Security (NDSS) Symposium 2022. San Diego, USA (24.-28.04.2022)
Konferenzveröffentlichung, Bibliographie

Dessouky, Ghada ; Mahmoody, Pouya ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel ; Zeitouni, Shaza ; Isakov, Mihailo ; Kinsy, Michel ; Mark, Miguel (2021)
Distributed Memory Guard: Enabling Secure Enclave Computing in NoC-based Architectures.
58th Design Automation Conference. San Francisco, USA (05.-09.12.2021)
doi: 10.1109/DAC18074.2021.9586222
Konferenzveröffentlichung, Bibliographie

Dessouky, Ghada ; Frassetto, Tommaso ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza (2020)
With Great Complexity Comes Great Vulnerability: Challenges of Secure Processor Design.
In: IEEE Security & Privacy
doi: 10.1109/MSEC.2020.2994978
Artikel, Bibliographie

Dessouky, Ghada ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020)
Enclave Computing on RISC-V: A Brighter Future for Security?
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020. Boston, USA (5.-7. April, 2020)
Konferenzveröffentlichung, Bibliographie

Dessouky, Ghada ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2020)
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.
29th USENIX Security Syposium. Boston, MA, USA (12.-14.08.2020)
Konferenzveröffentlichung, Bibliographie

Dessouky, Ghada ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020)
INVITED: AI Utopia or Dystopia - On Securing AI Platforms.
DAC'20-Design Automation Conference 2020. virtual Conference (20.-24.07.)
Konferenzveröffentlichung, Bibliographie

Dessouky, Ghada ; Zeitouni, Shaza ; Ibrahim, Ahmad ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2019)
CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems.
2019 International Conference On Computer Aided Design (ICCAD). The Westin Westminster Westminster, CO (4.-7. November 2019)
Konferenzveröffentlichung, Bibliographie

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostáková, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019)
FastKitten: Practical Smart Contracts on Bitcoin.
28th USENIX Security Symposium. Santa Clara, CA, USA (14.-16.08.2019)
Konferenzveröffentlichung, Bibliographie

Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2019)
HardFails: Insights into Software-Exploitable Hardware Bugs.
28th USENIX Security Symposium. Santa Clara, CA, USA (14.-16.08.2019)
Konferenzveröffentlichung, Bibliographie

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostakova, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019)
FastKitten: Practical Smart Contracts on Bitcoin.
Report, Bibliographie

Dessouky, Ghada ; Abera, Tigist ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza (2018)
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution.
37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18). (2018)
Konferenzveröffentlichung, Bibliographie

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza (2018)
iOracle: Automated Evaluation of Access Control Policies in iOS.
Konferenzveröffentlichung, Bibliographie

Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2018)
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs.
In: Cryptography and Security, abs/1812.00197
Artikel, Bibliographie

Dessouky, Ghada ; Zeitouni, Shaza ; Nyman, Thomas ; Paverd, Andrew ; Davi, Lucas ; Koeberl, Patrick ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017)
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
54th Design Automation Conference (DAC'17).
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017)
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
Konferenzveröffentlichung, Bibliographie

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael (2017)
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
doi: 10.14722/ndss.2017.23097
Konferenzveröffentlichung, Bibliographie

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza (2016)
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Sadeghi, Ahmad-Reza (2015)
Building Secure Defenses Against Code-Reuse Attacks.
doi: 10.1007/978-3-319-25546-0
Buch, Bibliographie

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2015)
Automated Synthesis of Optimized Circuits for Secure Computation.
doi: 10.1145/2810103.2813678
Konferenzveröffentlichung, Bibliographie

Do, Trinh Minh Tri ; Dousse, Olivier ; Miettinen, Markus ; Gatica-Perez, Daniel (2015)
A probabilistic kernel method for human mobility prediction with smartphones.
In: Pervasive and Mobile Computing, 20
doi: 10.1016/j.pmcj.2014.09.001
Artikel, Bibliographie

Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian (2015)
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
Konferenzveröffentlichung, Bibliographie

Dmitrienko, Alexandra ; Heuser, Stephan ; Nguyen, Thien Duc ; Ramos, Marcos da Silva ; Rein, Andre ; Sadeghi, Ahmad-Reza (2015)
Market-driven Code Provisioning to Mobile Secure Hardware.
Konferenzveröffentlichung, Bibliographie

Dessouky, Ghada ; Klaiber, Michael J. ; Bailey, Donald G. ; Simon, Svenja (2014)
Adaptive Dynamic On-chip Memory Management for FPGA-based Reconfigurable Architectures.
24th International Conference on Field Programmable Logic and Applications (FPL). München, Deutschland (2014)
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014)
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza (2014)
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
Konferenzveröffentlichung, Bibliographie

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014)
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4)
Artikel, Bibliographie

Davi, Lucas ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2014)
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014)
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Report, Bibliographie

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014)
On the (In)Security of Mobile Two-Factor Authentication.
Konferenzveröffentlichung, Bibliographie

Dmitrienko, Alexandra ; Noack, David ; Sadeghi, Ahmad-Reza ; Yung, Moti (2014)
POSTER: On Offline Payments with Bitcoin.
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013)
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
Konferenzveröffentlichung, Bibliographie

Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso (2013)
The Fiat-Shamir Transformation in a Quantum World.
In: arXiv:1306.0315, 2013
Artikel, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2012)
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012)
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
Konferenzveröffentlichung, Bibliographie

Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Tamrakar, Sandeep ; Wachsmann, Christian (2012)
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
Konferenzveröffentlichung, Bibliographie

Djatmiko, Mentari ; Boreli, Roksana ; Seneviratne, Aruna ; Ries, Sebastian (2012)
Resources-aware trusted node selection for content distribution in mobile ad hoc networks.
In: Wireless Networks, Springer US, 18
doi: 10.1007/s11276-012-0505-5
Artikel, Bibliographie

Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid (2012)
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012)
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Kowalski, Christoph ; Winandy, Marcel (2011)
Trusted Virtual Domains on OKL4: Secure Information Sharing on Smartphones.
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011)
POSTER: Control-Flow Integrity for Smartphones.
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
Konferenzveröffentlichung, Bibliographie

Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
A Security Architecture for Accessing Health Records on Mobile Phones.
Rome, Italy
Konferenzveröffentlichung, Bibliographie

Dmitrienko, Alexandra ; Gessner, Dennis ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Stüble, Christian ; Ullmann, Markus (2011)
Trusted embedded System Operating System (TeSOS) - Study and Design.
Anderes, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011)
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED)
Buchkapitel, Bibliographie

Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
Securing the Access to Electronic Health Records on Mobile Phones.
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
Privilege Escalation Attacks on Android.
Boca Raton, Florida, USA
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
Return-Oriented Programming without Returns on ARM.
Report, Bibliographie

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
Report, Bibliographie

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
Chicago, Illinois, USA
doi: 10.1145/1655108.1655117
Konferenzveröffentlichung, Bibliographie

Dmitrienko, Alexandra (2007)
Zigbee-to-tcp/ip gateway: New opportunities for ZigBee-based sensor networks.
Konferenzveröffentlichung, Bibliographie

E

Egert, Rolf ; Fischlin, Marc ; Gens, David ; Jacob, Sven ; Senker, Matthias ; Tillmans, Jörg (2015)
Privately computing set-union and set-intersection cardinality via bloom filters.
In: Information Security and Privacy (ACISP)
Artikel, Bibliographie

Ekberg, Jan-Erik ; Bugiel, Sven (2009)
Trust in a Small Package: Minimized MRTM Software Implementation for Mobile Secure Environments.
Konferenzveröffentlichung, Bibliographie

Eisenbarth, Thomas ; Güneysu, Tim ; Paar, Christof ; Sadeghi, Ahmad-Reza ; Schellekens, Dries ; Wolf, Marko (2007)
Reconfigurable Trusted Computing in Hardware.
ACM Workshop on Scalable Trusted Computing (ACMSTC 2007).
Konferenzveröffentlichung, Bibliographie

F

Fereidooni, Hossein ; König, Jan ; Rieger, Phillip ; Chilese, Marco ; Goekbakan, Bora ; Finke, Moritz ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza (2023)
AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms.
Network and Distributed Systems Security (NDSS) Symposium 2023. San Diego, USA (27.02.-03.03.2023)
doi: 10.14722/ndss.2023.23194
Konferenzveröffentlichung, Bibliographie

Frassetto, Tommaso ; Jauernig, Patrick ; Koisser, David ; Kretzler, David ; Schlosser, Benjamin ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2023)
POSE: Practical Off-chain Smart Contract Execution.
Network and Distributed System Security Symposium 2023. San Diego, USA (27.02 – 03.03.2023)
Konferenzveröffentlichung, Bibliographie

Fereidooni, Hossein ; Dmitrienko, Alexandra ; Rieger, Phillip ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Madlener, Felix (2022)
FedCRI: Federated Mobile Cyber-Risk Intelligence.
Network and Distributed Systems Security (NDSS) Symposium 2022. San Diego, USA (24.-28.04.2022)
doi: 10.14722/ndss.2022.23153
Konferenzveröffentlichung, Bibliographie

Frassetto, Tommaso (2022)
Raising The Bar: Advancing Mitigations Against Memory-Corruption and Side-Channel Attacks.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00021436
Dissertation, Erstveröffentlichung, Verlagsversion

Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Möllering, Helen ; Nguyen, Thien Duc ; Rieger, Phillip ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Yalame, Mohammad Hossein ; Zeitouni, Shaza (2021)
SAFELearn: Secure Aggregation for private FEderated Learning.
4th Deep Learning and Security Workshop (DLS'21). virtual Conference (27.05.2021)
Konferenzveröffentlichung, Bibliographie

Frassetto, Tommaso ; Jauernig, Patrick ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2018)
IMIX: In-Process Memory Isolation EXtension.
27th USENIX Security Symposium - Technical Sessions Track 2. Baltimore, MD, USA (15.-17.08.2018)
Konferenzveröffentlichung, Bibliographie

Frassetto, Tommaso ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017)
JITGuard: Hardening Just-in-time Compilers with SGX.
Dallas, TX, USA
doi: 10.1145/3133956.3134037
Konferenzveröffentlichung, Bibliographie

Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro (2017)
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
Atlanta, Georgia, USA
Konferenzveröffentlichung, Bibliographie

Fereidooni, Hossein ; Frassetto, Tommaso ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Conti, Mauro (2017)
Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
Philadelphia, Pennsylvania, USA
Konferenzveröffentlichung, Bibliographie

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza (2017)
HardIDX: Practical and Secure Index with SGX.
Konferenzveröffentlichung, Bibliographie

Fernando, Ruchith ; Ranchal, Rohit ; An, Byungchan ; Othmane, Lotfi Ben ; Bhargava, Bharat (2016)
Consumer oriented privacy preserving access control for electronic health records in the cloud.
Konferenzveröffentlichung, Bibliographie

Fleischhacker, N. ; Günther, F. ; Kiefer, F. ; Poettering, B. (2013)
Pseudorandom Signatures.
In: >8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 7-10 May, Hangzhou, China
Artikel, Bibliographie

Filyanov, Atanas ; McCune, Jonathan ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
Hong Kong
Konferenzveröffentlichung, Bibliographie

Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
A Pattern for Secure Graphical User Interface Systems.
Konferenzveröffentlichung, Bibliographie

G

Ghaeini, Hamid Reza ; Chan, Matthew ; Bahmani, Raad ; Brasser, Ferdinand ; Garcia, Luis ; Zhou, Jianying ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole ; Zonouz, Saman A. (2019)
PAtt: Physics-based Attestation of Control Systems.
22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID). Beijing (23. - 25.09.2019)
Konferenzveröffentlichung, Bibliographie

Gens, David (2019)
OS-level Attacks and Defenses: from Software to Hardware-based Exploits.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung

Ghaeini, Hamid Reza ; Antonioli, Daniele ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole (2018)
State-Aware Anomaly Detection for Industrial Control Systems.
Pau, France
doi: 10.1145/3167132.3167305
Konferenzveröffentlichung, Bibliographie

Gens, David ; Schmitt, Simon ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2018)
K-Miner: Uncovering Memory Corruption in Linux.
Konferenzveröffentlichung, Bibliographie

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. (2017)
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
Konferenzveröffentlichung, Bibliographie

Ghaeini, Hamid Reza ; Tippenhauer, Nils Ole (2016)
Hamids: Hierarchical monitoring intrusion detection system for industrial control systems.
Austria
doi: 10.1145/2994487.2994492
Konferenzveröffentlichung, Bibliographie

Ghaeini, Hamid Reza ; Akbari, Behzad ; Barekatain, Behrang ; Trivino Cabrera, Alicia (2015)
Adaptive video protection in large scale peer‐to‐peer video streaming over mobile wireless mesh networks.
In: International Journal of Communication Systems, 29 (18)
doi: 10.1002/dac.3088
Artikel, Bibliographie

Ghaeini, Hamid Reza ; Akbari, Behzad (2014)
Peer-to-Peer Adaptive Forward Error Correction in Live Video Streaming over Wireless Mesh Network.
doi: 10.1007/978-3-319-13174-0_9
Konferenzveröffentlichung, Bibliographie

Gay, Richard ; Mantel, Heiko ; Sudbrock, Henning (2013)
An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels.
Konferenzveröffentlichung, Bibliographie

Gupta, Aditi ; Miettinen, Markus ; Asokan, N. ; Nagy, Marcin (2012)
Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling.
Amsterdam, The Netherlands
doi: 10.1109/SocialCom-PASSAT.2012.60
Konferenzveröffentlichung, Bibliographie

Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
Hrsg.: Prouff, Emmanuel ; Schaumont, Patrick (2012)
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
Leuven, Belgium
Konferenzveröffentlichung, Bibliographie

Gupta, Aditi ; Miettinen, Markus ; Nagy, Marcin ; Asokan, Nadarajah ; Wetzel, Alexandre (2012)
PeerSense: Who is near you?
Lugano, Switzerland
doi: 10.1109/PerComW.2012.6197553
Konferenzveröffentlichung, Bibliographie

Gupta, Aditi ; Miettinen, Markus ; Asokan, N. (2011)
Using context-profiling to aid in access control decisions on mobile devices.
10th Annual IEEE International Conference on Perasive Computing and Communications Workshops. Seattle, USA (21.-25.03.2011)
doi: 10.1109/PERCOMW.2011.5766891
Konferenzveröffentlichung, Bibliographie

Gajek, Sebastian ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
Konferenzveröffentlichung, Bibliographie

Gasmi, Yacine ; Hessmann, Christian ; Pittenauer, Martin ; Winandy, Marcel (2008)
Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis.
Konferenzveröffentlichung, Bibliographie

Gajek, Sebastian ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2007)
Browser-based Authentication Protocols for Naive Users.
Western European Workshop on Research in Cryptology (WEWoRC 2007).
Konferenzveröffentlichung, Bibliographie

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2007)
Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing.
Vienna, Austria
Konferenzveröffentlichung, Bibliographie

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2007)
Compartmented Security for Browsers.
Report, Bibliographie

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2006)
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
Workshop on Information and System Security (WISSEC'06).
Konferenzveröffentlichung, Bibliographie

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2006)
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
Antwerpen, Belgium
Konferenzveröffentlichung, Bibliographie

Greveler, Ulrich ; Adelsbach, Andre ; Löschner, Sven (2005)
Anonymous Data Broadcasting by Misuse of Satellite ISPs.
Berlin, Germany
Konferenzveröffentlichung, Bibliographie

Greveler, Ulrich ; Adelsbach, Andre (2005)
Satellite Communication without Privacy - Attacker's Paradise.
Regensburg, Germany
Konferenzveröffentlichung, Bibliographie

Greveler, Ulrich ; Adelsbach, Andre (2005)
Datenschutzverletzungen bei Internetzugängen via Satellit.
In: Datenschutznachrichten, 1
Artikel, Bibliographie

Greveler, Ulrich ; Adelsbach, Andre (2005)
A Broadcast Encryption Scheme with Free-Riders but Unconditional Security.
Sydney
Konferenzveröffentlichung, Bibliographie

H

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick (2017)
Phonion: Practical Protection of Metadata in Telephony Networks.
Konferenzveröffentlichung, Bibliographie

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016)
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
Report, Bibliographie

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016)
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
Konferenzveröffentlichung, Bibliographie

Heuser, Stephan (2016)
Towards Modular and Flexible Access Control on Smart Mobile Devices.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung

Huang, Jialin ; Vaudenay, Serge ; Lai, Xuejia ; Nyberg, Kaisa (2015)
Capacity and Data Complexity in Multidimensional Linear Attack.
Konferenzveröffentlichung, Bibliographie

Habib, Sheikh Mahbub ; Ries, Sebastian ; Varikkattu, Prabhu ; Mühlhäuser, Max (2014)
Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source.
In: Security and Communication Networks, 7 (11)
doi: 10.1002/sec.748
Artikel, Bibliographie

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014)
ASM: A Programmable Interface for Extending Android Security.
Konferenzveröffentlichung, Bibliographie

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014)
ASM: A Programmable Interface for Extending Android Security.
Report, Bibliographie

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max (2013)
A Framework for Evaluating Trust of Service Providers in Cloud Marketplaces.
Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC'13). Coimbra, Portugal (March 2013)
doi: 10.1145/2480362.2480727
Konferenzveröffentlichung, Bibliographie

Herrewege, Anthony van ; Katzenbeisser, Stefan ; Maes, Roel ; Peeters, Roel ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012)
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
Konferenzveröffentlichung, Bibliographie

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Ries, Sebastian ; Mühlhäuser, Max (2011)
CertainLogic: A Logic for Modeling Trust and Uncertainty (Full version).
Report, Bibliographie

Henecka, Wilko ; Kögl, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo (2010)
TASTY: Tool for Automating Secure Two-partY computations.
CCS'10. (October 04-08 2010)
doi: 10.1145/1866307.1866358
Konferenzveröffentlichung, Bibliographie

Halonen, Perttu ; Miettinen, Markus ; Hätönen, Kimmo
Hrsg.: Iliadis, L. ; Vlahavas, I. ; Bramer, M. (2009)
Computer Log Anomaly Detection Using Frequent Episodes.
In: Artificial Intelligence Applications and Innovations III
doi: 10.1007/978-1-4419-0221-4_49
Buchkapitel, Bibliographie

Huber, Ulrich ; Sadeghi, Ahmad-Reza (2006)
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
9th Information Security Conference (ISC 2006).
Konferenzveröffentlichung, Bibliographie

Hätönen, Kimmo ; Klemettinen, Mika ; Miettinen, Markus
Hrsg.: Boulicaut, Jean-François ; Raedt, Luc De ; Mannila, Heikki (2006)
Constraint-Based Mining and Inductive Databases.
In: Constraint-Based Mining and Inductive Databases
doi: 10.1007/11615576_10
Buchkapitel, Bibliographie

Hätönen, Kimmo ; Halonen, Perttu ; Klemettinen, Mika ; Miettinen, Markus
Hrsg.: Boulicaut, J.-F. ; Dzeroski, S. (2003)
Queryable Lossless Log Database Compression.
Konferenzveröffentlichung, Bibliographie

Hätönen, Kimmo ; Boulicaut, Jean-François ; Klemettinen, Mika ; Miettinen, Markus ; Masson, Cyrille
Hrsg.: Kambayashi, Y. ; Mohania, M. K. ; Wöss, W. (2003)
Comprehensive log compression with frequent patterns.
http://liris.cnrs.fr/~jboulica/dawak03.pdf
Konferenzveröffentlichung, Bibliographie

I

Ibrahim, Ahmad (2019)
Securing Embedded Networks Through Secure Collective Attestation.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019)
HEALED: HEaling & Attestation for Low-end Embedded Devices.
23rd International Conference Financial Cryptography and Data Security (FC 2019), 2019.
Konferenzveröffentlichung, Bibliographie

Ibrahim, Ahmad (2018)
Collective Attestation: for a Stronger Security in Embedded Networks.
IEEE. Salvador, Brazil, Brazil (October, 2.-5.)
doi: 10.1109/SRDS.2018.00039
Konferenzveröffentlichung, Bibliographie

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018)
US-AID: Unattended Scalable Attestation of IoT Devices.
37th IEEE International Symposium on Reliable Distributed Systems (SRDS 2018). (2018)
Konferenzveröffentlichung, Bibliographie

Ibrahim, Ahmad (2018)
Securing Embedded Networks Through Secure Collective Attestation.
Workshop at 16th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2018), 2018. New York, NY, USA
doi: 10.1145/3212711.3212712
Konferenzveröffentlichung, Bibliographie

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza (2017)
SeED: Secure Non-Interactive Attestation for Embedded Devices.
Boston, USA
Konferenzveröffentlichung, Bibliographie

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza (2016)
DARPA: Device Attestation Resilient to Physical Attacks.
Konferenzveröffentlichung, Bibliographie

J

Jauernig, Patrick Thomas (2024)
Beyond Mitigations: Advancing Attack Surface Reduction and Analysis.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00026529
Dissertation, Erstveröffentlichung, Verlagsversion

Jauernig, Patrick ; Jakobovic, Domagoj ; Picek, Stjepan ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza (2023)
DARWIN: Survival of the Fittest Fuzzing Mutators.
Network and Distributed Systems Security (NDSS) Symposium 2023. San Diego, USA (27.02.-03.03.2023)
doi: 10.14722/ndss.2023.23159
Konferenzveröffentlichung, Bibliographie

Jiang, Yan ; Ji, Xiaoyu ; Wang, Kai ; Yan, Chen ; Mitev, Richard ; Sadeghi, Ahmad-Reza ; Xu, Wenyuan (2022)
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens.
43rd IEEE Symposium on Security and Privacy. San Francisco, USA (23.-26.05.2022)
doi: 10.1109/SP46214.2022.9833740
Konferenzveröffentlichung, Bibliographie

Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020)
Trusted Execution Environments: Properties, Applications, and Challenges.
In: IEEE Security & Privacy, 18 (2)
doi: 10.1109/MSEC.2019.2947124
Artikel, Bibliographie

Jauernig, Patrick Thomas (2017)
SMOV: Lighweight In-Process Memory Isolation.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie

Jiang, Xuxian ; Grace, Michael ; Sadeghi, Ahmad-Reza ; Zhou, Wu (2012)
Unsafe Exposure Analysis of Mobile In-App Advertisements.
Konferenzveröffentlichung, Bibliographie

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
doi: 10.1007/978-3-642-15031-9_26
Konferenzveröffentlichung, Bibliographie

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens.
In: Towards Hardware Intrinsic Security: Foundation and Practice
doi: 10.1007/978-3-642-14452-3_17
Buchkapitel, Bibliographie

K

Kumari, Kavita ; Rieger, Phillip ; Fereidooni, Hossein ; Jadliwala, Murtuza ; Sadeghi, Ahmad-Reza (2023)
BayBFed: Bayesian Backdoor Defense for Federated Learning.
44th IEEE Symposium on Security and Privacy. San Francisco, USA (22.-25.05.2023)
doi: 10.1109/SP46215.2023.10179362
Konferenzveröffentlichung, Bibliographie

Kenjar, Zijo ; Frassetto, Tommaso ; Gens, David ; Franz, Michael ; Sadeghi, Ahmad-Reza (2020)
V0LTpwn: Attacking x86 Processor Integrity from Software.
29th USENIX Security Symposium. Boston, USA (August 12–14, 2020)
Konferenzveröffentlichung, Bibliographie

Kong, Joonho ; Koushanfar, Farinaz ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2014)
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
Konferenzveröffentlichung, Bibliographie

Koeberl, Patrick ; Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Varadharajan, Vijay (2014)
TrustLite: A Security Architecture for Tiny Embedded Devices.
Amsterdam, Netherlands
doi: 10.1145/2592798.2592824
Konferenzveröffentlichung, Bibliographie

Kocabas, Unal ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2013)
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
Konferenzveröffentlichung, Bibliographie

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Rožic, Vladimir ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012)
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
Konferenzveröffentlichung, Bibliographie

Kocabaş, Ünal ; Schulz, Steffen (2011)
POSTER: Practical Embedded Remote Attestation Using Physically Unclonable Functions.
Konferenzveröffentlichung, Bibliographie

Kneževic, M. ; Kobayashi, K. ; Ikegami, J. ; Matsuo, S. ; Satoh, A. ; Kocabas, U. ; Fan, J. ; Katashita, T. ; Sugawara, T. ; Sakiyama, K. ; Verbauwhede, I. ; Ohta, K. ; Homma, N. ; Aoki, T. (2011)
Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates.
In: IEEE Transactions on VLSI journal
Artikel, Bibliographie

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Leest, Vincent van der ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Schröder, Heike ; Wachsmann, Christian (2011)
Recyclable PUFs: Logically Reconfigurable PUFs.
Konferenzveröffentlichung, Bibliographie

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Leest, Vincent van der ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Wachsmann, Christian (2011)
Recyclable PUFs: logically reconfigurable PUFs.
In: Journal of Cryptographic Engineering, 1 (3)
Artikel, Bibliographie

Kostiainen, Kari ; Dmitrienko, Alexandra ; Ekberg, Jan-Erik ; Sadeghi, Ahmad-Reza ; Asokan, N. (2010)
Key Attestation from Trusted Execution Environments.
Berlin
Konferenzveröffentlichung, Bibliographie

Kobayashi, K. ; Ikegami, J. ; Kneževic, M. ; Guo, X. ; Matsuo, S. ; Huang, S. ; Nazhandali, L. ; Kocabas, U. ; Fan, J. ; Satoh, A. ; Verbauwhede, I. ; Sakiyama, K. ; Ohta, K. (2010)
Prototyping Platform for Performance Evaluation of SHA-3 Candidates.
Konferenzveröffentlichung, Bibliographie

Kokkinen, Heikki ; Heikkinen, Mikko ; Miettinen, Markus (2009)
Post-Payment Copyright System versus Online Music Shop: Business Model and Privacy.
In: International Journal on Advances in Security, 2 (2-3)
Artikel, Bibliographie

L

Li, Huimin ; Rieger, Phillip ; Zeitouni, Shaza ; Picek, Stjepan ; Sadeghi, Ahmad-Reza (2023)
FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning.
33rd International Conference on Field-Programmable Logic and Applications. Gothenburg, Sweden (04.-08.09.2023)
doi: htps://doi.org/10.1109/FPL60245.2023.00046
Konferenzveröffentlichung, Bibliographie

Liebchen, Christopher (2018)
Advancing Memory-corruption Attacks and Defenses.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung

Lacoste, Marc ; Sousa, Paulo ; Neves, Nuno ; Miettinen, Markus ; Ramos, Fernando M.V. ; Vukolic, Marko ; Charmet, Fabien ; Yaich, Reda ; Oborzynski, Krzysztof ; Vernekar, Gitesh (2016)
User-Centric Security and Dependability in the Cloud of Clouds.
In: IEEE Cloud Computing Special issue on Cloud Security, 3 (5)
Artikel, Bibliographie

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael (2016)
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
Konferenzveröffentlichung, Bibliographie

Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael (2015)
Automated Software Diversity.
doi: 10.2200/S00686ED1V01Y201512SPT014
Buch, Bibliographie

Laurila, Juha ; Gatica-Perez, Daniel ; Aad, Imad ; Blom, Jan ; Bornet, Olivier ; Do, Trinh Minh Tri ; Dousse, Olivier ; Eberle, Julien ; Miettinen, Markus (2013)
From big smartphone data to worldwide research: The Mobile Data Challenge.
In: Pervasive and Mobile Computing, 9
doi: 10.1016/j.pmcj.2013.07.014
Artikel, Bibliographie

Laurila, Juha ; Gatica-Perez, Daniel ; Aad, Imad ; Blom, Jan ; Bornet, Olivier ; Do, Trinh Minh Tri ; Dousse, Olivier ; Eberle, Julien ; Miettinen, Markus (2012)
The Mobile Data Challenge: Big Data for Mobile Computing Research.
Konferenzveröffentlichung, Bibliographie

Li, Shujun ; Sadeghi, Ahmad-Reza ; Heisrath, Soeren ; Schmitz, Roland ; Ahmad, Junaid Jameel (2011)
hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers.
St. Lucia
Konferenzveröffentlichung, Bibliographie

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
Securing the E-Health Cloud.
Konferenzveröffentlichung, Bibliographie

Löhr, Hans ; Pöppelmann, Thomas ; Rave, Johannes ; Steegmanns, Martin ; Winandy, Marcel (2010)
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments.
Konferenzveröffentlichung, Bibliographie

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
Patterns for Secure Boot and Secure Storage in Computer Systems.
Konferenzveröffentlichung, Bibliographie

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan (2009)
Hide and Seek in Time - Robust Covert Timing Channels.
Konferenzveröffentlichung, Bibliographie

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Vishik, Claire ; Winandy, Marcel (2009)
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
Konferenzveröffentlichung, Bibliographie

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Weber, Marion ; Winandy, Marcel (2009)
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
Konferenzveröffentlichung, Bibliographie

Lee, Y. K. ; Batina, L. ; Fan, J. ; Karaklajic, D. ; Kneževic, M. ; Kocabas, U. ; Rožic, V. ; Verbauwhede, I. (2009)
Tiny Public-Key Security Processor.
In: ISSCC09 Student Forum
Artikel, Bibliographie

Lemke, Kerstin ; Paar, Christof ; Sadeghi, Ahmad-Reza (2006)
Physical Security Bounds Against Tampering.
International Conference on Applied Cryptography and Network Security (ACNS 2006).
Konferenzveröffentlichung, Bibliographie

M

Mitev, Richard ; Pazii, Anna ; Miettinen, Markus ; Enck, William ; Sadeghi, Ahmad-Reza (2020)
LeakyPick: IoT Audio Spy Detector.
36th Annual Computer Security Applications Conference. virtual Conference (07.-11.12.2020)
doi: 10.1145/3427228.3427277
Konferenzveröffentlichung, Bibliographie

Marchal, Samuel ; Miettinen, Markus ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Asokan, N. (2019)
AuDI: Towards autonomous IoT device-type identification using periodic communications.
In: IEEE Journal on Selected Areas in Communications
Artikel, Erstveröffentlichung

Marchal, Samuel ; Miettinen, Markus ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Asokan, N. (2019)
AUDI: Towards Autonomous IoT Device-Type Identification.
In: IEEE Journal on Selected Areas in Communications (JSAC) on Artificial Intelligence and Machine Learning for Networking and Communications
Artikel, Bibliographie

Miettinen, Markus (2019)
Context and communication profiling for IoT security and privacy: techniques and applications.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung

Mohamed, Reham ; O'Connor, Terrance ; Miettinen, Markus ; Enck, William ; Sadeghi, Ahmad-Reza
Hrsg.: Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang (2019)
HONEYSCOPE: IoT Device Protection with Deceptive Network Views,.
In: Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings
Buchkapitel, Bibliographie

Miettinen, Markus ; Sadeghi, Ahmad-Reza (2018)
Internet of things or threats?: on building trust in IoT (keynote). 1:1-1:9.
CODES+ISSS 2018, part of ESWEEK 2018. Torino, Italy (September 30 - October 5, 2018)
Konferenzveröffentlichung, Bibliographie

Mitev, Richard (2018)
Lyin’ Alexa - Skill-Based Man-in-the-Middle Attack on Virtual Assistants.
Technische Universität Darmstadt
Masterarbeit, Bibliographie

Miettinen, Markus ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2018)
Revisiting Context-Based Pairing in IoT.
55th Design Automation Conference (DAC). San Francisco, CA, USA (24.-29.06. 2018)
Konferenzveröffentlichung, Bibliographie

Mohan, Sibin ; Asplund, Mikael ; Bloom, Gedare ; Sadeghi, Ahmad-Reza ; Ibrahim, Ahmad ; Salajageh, Negin ; Griffioen, Paul ; Sinopoli, Bruno (2018)
The Future of IoT Security: Special Session.
International Conference on Embedded Software (EMSOFT 2018), 2018. Piscataway, NJ, USA
Konferenzveröffentlichung, Bibliographie

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Frassetto, Tommaso ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu (2017)
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
Atlanta, GA, USA
doi: 10.1109/ICDCS.2017.284
Konferenzveröffentlichung, Bibliographie

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu (2017)
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT.
doi: 10.1109/ICDCS.2017.283
Konferenzveröffentlichung, Bibliographie

Mohan, Vaishnavi ; Othmane, Lotfi Ben (2016)
SecDevOps: Is It a Marketing Buzzword?
Konferenzveröffentlichung, Bibliographie

McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh (2016)
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, 104 (5)
doi: 10.1109/JPROC.2015.2512235
Artikel, Bibliographie

Miettinen, Markus ; Huang, Jialin ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2016)
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
Darmstadt, Germany
Konferenzveröffentlichung, Bibliographie

Miettinen, Markus ; Asokan, N. ; Koushanfar, Farinaz ; Nguyen, Thien Duc ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Sobhani, Majid ; Yellapantula, Sudha (2015)
I know where you are: Proofs of Presence resilient to malicious provers.
Konferenzveröffentlichung, Bibliographie

Miettinen, Markus ; Asokan, N. ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Sobhani, Majid (2014)
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
doi: 10.1145/2660267.2660334
Konferenzveröffentlichung, Bibliographie

Mustafa, Hossen ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Xu, Wenyuan (2014)
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
Konferenzveröffentlichung, Bibliographie

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. (2014)
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
Kyoto, Japan
doi: 10.1145/2590296.2590337
Konferenzveröffentlichung, Bibliographie

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. (2013)
ConXsense – Context Sensing for Adaptive Usable Access Control.
Report, Bibliographie

Mittelbach, Arno (2013)
Cryptophia’s Short Combiner for Collision-Resistant Hash Functions (best student paper).
Konferenzveröffentlichung, Bibliographie

Mittelbach, Arno (2012)
Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output.
Konferenzveröffentlichung, Bibliographie

Miettinen, Markus ; Asokan, N. (2010)
Towards security policy decisions based on context profiling.
Chicago, Illinois, USA
doi: 10.1145/1866423.1866428
Konferenzveröffentlichung, Bibliographie

Miettinen, Markus ; Halonen, Perttu ; Hätönen, Kimmo (2006)
Host-based intrusion detection for advanced mobile devices.
Vienna
doi: 10.1109/AINA.2006.192
Konferenzveröffentlichung, Bibliographie

Manulis, Mark ; Sadeghi, Ahmad-Reza (2006)
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing).
Konferenzveröffentlichung, Bibliographie

N

Nguyen, Thien Duc ; Rieger, Phillip ; Chen, Huili ; Yalame, Mohammad Hossein ; Möllering, Helen ; Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Zeitouni, Shaza ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2022)
FLAME: Taming Backdoors in Federated Learning.
31st USENIX Security Symposium (USENIX Security 22). Boston, USA (10.-12.08.2022)
Konferenzveröffentlichung, Bibliographie

Nguyen, Thien Duc ; Rieger, Phillip ; Yalame, Mohammad Hossein ; Möllering, Helen ; Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2021)
FLGUARD: Secure and Private Federated Learning.
In: Crytography and Security, (Preprint)
Artikel, Bibliographie

Nguyen, Thien Duc ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2020)
Long Live Randomization: On Privacy-Preserving Contact Tracing in Pandemic.
CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. virtual Conference (09.-13.11.2020)
doi: 10.1145/3411496.3421229
Konferenzveröffentlichung, Bibliographie

Neureither, Jens ; Dmitrienko, Alexandra ; Koisser, David ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2020)
LegIoT: Ledgered Trust Management Platform for IoT.
25th European Symposium on Research in Computer Security. virtual Conference (14.-18.09.2020)
doi: 10.1007/978-3-030-58951-6_19
Konferenzveröffentlichung, Bibliographie

Nguyen, Thien Duc ; Rieger, Phillip ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2020)
Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System.
Workshop on Decentralized IoT Systems and Security (DISS) @ NDSS Symposium 2020. San Diego, USA (23.-26.02. 2020)
Konferenzveröffentlichung, Bibliographie

Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Fereidooni, Hossein ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019)
DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
Konferenzveröffentlichung, Bibliographie

Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019)
HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.
Design Automation Conference (DAC). (2019)
Konferenzveröffentlichung, Bibliographie

Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Dang, Minh Hoang ; Asokan, N. ; Sadeghi, Ahmad-Reza (2018)
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
In: CoRR, abs/1804.07474
Artikel, Bibliographie

Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017)
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.
In: Cryptography and Security, abs/1705.10295
Artikel, Bibliographie

Nagy, Marcin ; Bui, Thanh Phong ; Cristofaro, Emiliano De ; Asokan, N. ; Ott, Jörg ; Sadeghi, Ahmad-Reza (2015)
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
Konferenzveröffentlichung, Bibliographie

Noisternig, M. ; Hollick, Matthias (2014)
Efficient Solutions for the Authenticated Fragmentation Problem in Delay- and Disruption-Tolerant Networks.
Montreal, Canada
Konferenzveröffentlichung, Bibliographie

Nagy, Marcin ; Cristofaro, Emiliano De ; Dmitrienko, Alexandra ; Asokan, N. ; Sadeghi, Ahmad-Reza (2013)
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
New Orleans, Loouisiana, USA
Konferenzveröffentlichung, Bibliographie

Nürnberger, Stefan ; Steinebach, Martin ; Zmudzinski, Sascha (2011)
Re-synchronizing audio watermarking after nonlinear time stretching.
Konferenzveröffentlichung, Bibliographie

Nürnberger, Stefan ; Feller, Thomas ; Huss, Sorin (2010)
RAY - A Secure Microkernel Architecture.
Konferenzveröffentlichung, Bibliographie

O

O'Connor, T. J. ; Mohamed, Reham ; Miettinen, Markus ; Enck, William ; Reaves, Bradley ; Sadeghi, Ahmad-Reza (2019)
HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices.
Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). Miami, FL, USA
Konferenzveröffentlichung, Bibliographie

Oliveira Nunes, Ivan de ; Dessouky, Ghada ; Ibrahim, Ahmad ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019)
Towards Systematic Design of Collective Remote Attestation Protocols.
The 39th International Conference on Distributed Computing Systems (ICDCS) 2019. Dallas, TX, USA (7-10 July 2019)
doi: 10.1109/ICDCS.2019.00120
Konferenzveröffentlichung, Bibliographie

Othmane, Lotfi Ben ; Angin, Pelin ; Weffers, Harold ; Bhargava, Bharat (2014)
Extending the Agile Development Approach to Develop Acceptably Secure Software.
In: IEEE Transactions on Dependable and Secure Computing, 11 (6)
Artikel, Bibliographie

Octeau, Damien ; McDaniel, Patrick ; Jha, Somesh ; Bartel, Alexandre ; Bodden, Eric ; Klein, Jacques ; Le Traon, Yves (2013)
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
In: Proceedings of the 22nd USENIX Conference on Security
Buchkapitel, Bibliographie

Oren, Yossef ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2013)
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
Konferenzveröffentlichung, Bibliographie

P

Pütz, Philipp ; Mitev, Richard ; Sadeghi, Ahmad-Reza (2023)
Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats.
Annual Computer Security Applications Conference (ACSAC 2023). Austin, USA (04.-08.12.2023)
Konferenzveröffentlichung, Bibliographie

Paverd, Andrew ; Völp, Marcus ; Brasser, Ferdinand ; Schunter, Matthias ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Esteves-Verissimo, Paulo ; Steininger, Andreas ; Holz, Thorsten (2019)
Sustainable Security & Safety: Challenges and Opportunities.
4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS). Stuttgart (09.07.2019)
doi: 10.4230/OASIcs.CERTS.2019.4
Konferenzveröffentlichung, Bibliographie

Portela, Bernardo ; Barbosa, Manuel ; Scerri, Guillaume ; Warinschi, Bogdan ; Bahmani, Raad ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2017)
Secure Multiparty Computation from SGX.
Konferenzveröffentlichung, Bibliographie

Peter, Andreas ; Tews, Erik ; Katzenbeisser, Stefan (2013)
Efficiently Outsourcing Multiparty Computation under Multiple Keys.
In: Cryptology ePrint Archive, 2013 (13)
Artikel, Bibliographie

Paar, Christof ; Sadeghi, Ahmad-Reza ; Güneysu, Tim ; Eisenbarth, Thomas ; Schellekens, Dries ; Wolf, Marko (2007)
Reconfigurable Trusted Computing in Hardware.
Alexandria, Virginia, USA
Konferenzveröffentlichung, Bibliographie

Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza (2000)
Self-escrowed cash against user black-mailing.
Fourth Conference on Financial Cryptography (FC 2000 Anguilla).
Konferenzveröffentlichung, Bibliographie

R

Rieger, Phillip ; Chilese, Marco ; Mohamed, Reham ; Miettinen, Markus ; Fereidooni, Hossein ; Sadeghi, Ahmad-Reza (2023)
ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks.
32nd USENIX Security Symposium. Anaheim, USA (09.-11.08.2023)
Konferenzveröffentlichung, Bibliographie

Rieger, Phillip ; Nguyen, Thien Duc ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2022)
DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection.
Network and Distributed Systems Security (NDSS) Symposium 2022. San Diego, USA (24.-28.04.2022)
doi: 10.14722/ndss.2022.23156
Konferenzveröffentlichung, Bibliographie

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed (2017)
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
Konferenzveröffentlichung, Bibliographie

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2017)
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (1)
doi: 10.1515/popets-2017-0005
Artikel, Bibliographie

Ries, Sebastian ; Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max (2011)
CertainLogic: A Logic for Modeling Trust and Uncertainty (Short Paper).
Pittsburgh, USA
doi: 10.1007/978-3-642-21599-5_19
Konferenzveröffentlichung, Bibliographie

Rupp, Andy ; Leander, Gregor ; Bangerter, Endre ; Dent, Alexander ; Sadeghi, Ahmad-Reza (2008)
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
Konferenzveröffentlichung, Bibliographie

S

Saß, Marvin ; Mitev, Richard ; Sadeghi, Ahmad-Reza (2023)
Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M.
32nd USENIX Security Symposium. Anaheim, USA (09.08.-11.08.2023)
Konferenzveröffentlichung, Bibliographie

Surminski, Sebastian ; Niesler, Christian ; Linsner, Sebastian ; Davi, Lucas ; Reuter, Christian (2023)
SCAtt-man: Side-Channel-Based Remote Attestation for Embedded Devices that Users Understand.
13th ACM Conference on Data and Application Security and Privacy. Charlotte, United States (24.-26.04.2023)
doi: 10.1145/3577923.3583652
Konferenzveröffentlichung, Bibliographie

Sendner, Christoph ; Chen, Huili ; Fereidooni, Hossein ; Petzi, Lukas ; König, Jan ; Stang, Jasper ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2023)
Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning.
Network and Distributed Systems Security (NDSS) Symposium 2023. San Diego, USA (27.02.-03.03.2023)
doi: 10.14722/ndss.2023.23263
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Mitev, Richard ; Saß, Marvin (2022)
Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M.
25th Black Hat USA. Las Vegas, USA (06.-11.08.2022)
Konferenzveröffentlichung, Bibliographie

Stapf, Emmanuel Simon (2022)
System Architecture Designs for Secure, Flexible and Openly-Accessible Enclave Computing.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00021487
Dissertation, Erstveröffentlichung, Verlagsversion

Surminski, Sebastian ; Niesler, Christian ; Brasser, Ferdinand ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2021)
RealSWATT: Remote Software-Based Attestation for Embedded Devices under Realtime Constraints.
2021 ACM SIGSAC Conference on Computer and Communications Security. virtual Conference (15.-19.11.2021)
doi: 10.1145/3460120.3484788
Konferenzveröffentlichung, Bibliographie

Songhori, Ebrahim ; Riazi, M. Sadegh ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2019)
ARM2GC: Succinct Garbled Processor for Secure Computation.
Design Automation Conference (DAC), 2019 56th ACM/EDAC/IEEE. Las Vegas, USA (June, 2.-6.)
Konferenzveröffentlichung, Bibliographie

Schaad, Andreas ; Grohmann, Bjoern ; Winzenried, Oliver ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2018)
Towards a Cloud-based System for Software Protection and Licensing.
Secrypt 2018. Porto, Portugal (26.-28.07.2018)
doi: 10.5220/0006899506980702
Konferenzveröffentlichung, Bibliographie

Sullivan, Dean ; Arias, Orlando ; Gens, David ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier (2017)
Execution Integrity with In-Place Encryption.
In: CoRR, abs/1703.02698
Artikel, Bibliographie

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016)
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Ibrahim, Ahmad ; Conti, Mauro ; Neven, Gregory (2016)
SANA: Secure and Scalable Aggregate Network Attestation.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Dessouky, Ghada (2016)
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
Konferenzveröffentlichung, Bibliographie

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2016)
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
doi: 10.1145/2897937.2898027
Konferenzveröffentlichung, Bibliographie

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016)
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Armknecht, Frederik (2016)
Towards a Unified Security Model for Physically Unclonable Functions.
Konferenzveröffentlichung, Bibliographie

Songhori, Ebrahim ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2015)
Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Waidner, Michael (2015)
Security and Privacy Challenges in Industrial Internet of Things.
Konferenzveröffentlichung, Bibliographie

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2015)
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
doi: 10.1109/SP.2015.32
Konferenzveröffentlichung, Bibliographie

Schuster, Felix ; Tendyck, Thomas ; Liebchen, Christopher ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten (2015)
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Davi, Lucas ; Larsen, Per (2015)
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? - Keynote -.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Brasser, Ferdinand (2014)
Swap and Play: Live Updating Hypervisors and Its Application to Xen.
doi: 10.1145/2664168.2664173
Konferenzveröffentlichung, Bibliographie

Senftleben, Marius ; Bucicoiu, Mihai ; Tews, Erik ; Armknecht, Frederik ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza (2014)
MoP-2-MoP - Mobile private microblogging.
Konferenzveröffentlichung, Bibliographie

Stancill, Blaine ; Snow, Kevin ; Otterness, Nathan ; Monrose, Fabian ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2013)
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
Konferenzveröffentlichung, Bibliographie

Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza (2013)
Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same.
Konferenzveröffentlichung, Bibliographie

Simo-Fhom, Hervais (2013)
Internet Privacy. Taking opportunities, assessing risks, building trust.
In: >Springer Vieweg; 2013
Artikel, Bibliographie

Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza (2013)
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (Best Student Paper Award).
Konferenzveröffentlichung, Bibliographie

Sepehrdad, Pouyan ; Susil, Petr ; Vaudenay, Serge ; Vuagnoux, Martin (2013)
Smashing WEP in a Passive Attack.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay (2012)
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version).
Report, Bibliographie

Sadeghi, Ahmad-Reza ; Kocabaş, Ünal ; Katzenbeisser, Stefan (2012)
Converse PUF-Based Authentication.
Konferenzveröffentlichung, Bibliographie

Seudié, Hervé ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza (2012)
EDA for Secure and Dependable Cybercars: Challenges and Opportunities.
Konferenzveröffentlichung, Bibliographie

Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Zhdanova, Maria ; Xu, Wenyuan ; Mustafa, Hossen ; Varadharajan, Vijay (2012)
Tetherway: A Framework for Tethering Camouflage.
Tuscon, Arizona
Konferenzveröffentlichung, Bibliographie

Schulz, Steffen ; Brasser, Ferdinand ; Filyanov, Atanas (2012)
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution.
Konferenzveröffentlichung, Bibliographie

Schreiner, Steffen ; Grigoras, Costin ; Litmaath, Maarten ; Betev, Latchezar ; Buchmann, Johannes (2012)
Certified Grid Job Submission in the ALICE Grid Services.
In: Open Access Journal of Physics: Conference Series (JPCS), International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2012
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay
Hrsg.: Foresti, Sara ; Yung, Moti ; Martinelli, Fabio (2012)
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: European Symposium on Research in Computer Science (ESORICS)
Buchkapitel, Bibliographie

Schneider, Michael ; Göttert, Norman
Hrsg.: Preneel, Bart ; Takagi, Tsuyoshi (2011)
Random Sampling for Short Lattice Vectors on Graphics Cards.
Nara, Japan
doi: 10.1007/978-3-642-23951-9_11
Konferenzveröffentlichung, Bibliographie

Shen, Yiyun ; Miettinen, Markus ; Moen, Pirjo ; Kutvonen, Lea (2011)
Privacy Preservation Approach in Service Ecosystems.
Helsinki, Finland
doi: 10.1109/EDOCW.2011.59
Konferenzveröffentlichung, Bibliographie

Shirazi, Fatemeh ; Neumann, Stephan ; Ciolacu, Ines ; Volkamer, Melanie (2011)
Robust Electronic Voting: Introducing robustness in Civitas.
Trento, Italy
doi: 10.1109/REVOTE.2011.6045915
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2011)
Location Privacy in RFID Systemen.
In: Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (2)
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2011)
Lightweight Remote Attestation Using Physical Functions.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2011)
Lightweight Remote Attestation using Physical Functions (Extended Version).
Report, Bibliographie

Sadeghi, Ahmad-Reza ; Preneel, Bart ; Pfitzmann, Andreas ; Moran, Tal ; Maier-Rabler, Ursula ; Kutylowski, Miroslaw ; Klonowski, Marek ; Guerses, Seda ; Danezis, George ; Borisov, Nikita ; Baer, Walter (2010)
Machiavelli Confronts 21st Century Digital Technology: Democracy in a Network Society.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Li, Shujun ; Shah, Syed Amier Haider ; Khan, Muhammad Asad Usman ; Khayam, Syed Ali ; Schmitz, Roland (2010)
Breaking e-Banking CAPTCHAs.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Naccache, David (2010)
Towards Hardware-Intrinsic Security.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Mukherjee, Biswanath ; Ghosal, Dipak ; Liu, Yali (2010)
Video Streaming Forensic - Content Identification with Traffic Snooping.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010)
Enhancing RFID Security and Privacy by Physically Unclonable Functions.
In: Towards Hardware-Intrinsic Security: Foundations and Practice
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2010)
Trusted Computing.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Cesena, Emanuele ; Ramunno, Gianluca ; Vernizzi, Davide (2010)
Anonymous Authentication with TLS and DAA.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Winandy, Marcel (2010)
Token-Based Cloud Computing - Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
doi: 10.1007/978-3-642-13869-0_30
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Li, Shujun ; Khayam, Syed Ali ; Schmitz, Roland (2010)
Breaking a Virtual Password System Based on Randomized Linear Generation Functions.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010)
PUF-Enhanced RFID Security and Privacy.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Cabuk, Serdar ; Dalton, Chris ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramasamy, Hari Govind ; Ramunno, Gianluca ; Schunter, Matthias (2010)
Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers.
In: Journal of Computer Security, 18 (1)
Artikel, Bibliographie

Schulz, Steffen ; Sadeghi, Ahmad-Reza (2010)
Extending IPsec for Efficient Remote Attestation.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Maes, Roel ; Sunar, Berk ; Tuyls, Pim (2009)
Memory Leakage-Resilient Encryption based on Physically Unclonable Functions.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Li, Shujun ; Asghar, Hassan Jameel ; Pieprzyk, Josef ; Schmitz, Roland ; Wang, Huaxiong (2009)
On the Security of PAS (Predicate-based Authentication Service).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009)
Anonymizer-Enabled Security and Privacy for RFID.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Zhan, Jing ; Korthaus, René (2009)
A Practical Property-based Bootstrap Architecture.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics (Poster).
Section Days of Ruhr-University Bochum Research School. Bochum (6. November 2009)
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Vishik, Claire ; Verbauwhede, Ingrid (2009)
Future of Assurance: Ensuring that a System is Trustworthy.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009)
Location Privacy in RFID Applications.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Kursawe, Klaus ; Schellekens, Dries ; Skoric, Boris ; Tuyls, Pim (2009)
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009)
Enhancing RFID Security and Privacy by Physically Unclonable Functions (Extended Abstract).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009)
Efficient RFID Security and Privacy with Anonymizers.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
Einsatz von Sicherheitskernen und Trusted Computing.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Tuyls, Pim ; Maes, Roel ; Sunar, Berk (2009)
Physically Unclonable Pseudorandom Functions.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schulz, Steffen (2009)
Secure VPNs for Trusted Computing Environments.
Oxford, UK
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Bangerter, Endre ; Barbosa, Manuel ; Bernstein, Daniel ; Damgard, Ivan ; Page, Dan ; Pagter, Jakob ; Sovio, Sampo (2009)
Using Compilers to Enhance Cryptographic Product Development.
Konferenzveröffentlichung, Bibliographie

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark ; Pereira, Olivier (2008)
Universally Composable Security Analysis of TLS.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008)
Improved Security Notions and Protocols for Non-Transferable Identification.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Gasmi, Yacine ; Ramunno, Gianluca ; Vernizzi, Davide ; Stewin, Patrick ; Unger, Martin (2008)
An Efficient Implementation of Trusted Channels Based on OpenSSL.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2008)
User Privacy in Transport Systems Based on RFID E-Tickets.
Malaga, Spain
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Husseiki, Rani ; Gasmi, Yacine ; Stewin, Patrick ; Unger, Martin (2008)
Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Bangerter, Endre ; Djackov, Maksim (2008)
A Demonstrative Ad-hoc Attestation System.
Taipei, Taiwan
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark (2008)
Property-Based Attestation without a Trusted Third Party.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2008)
Property-Based TPM Virtualization.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Shokrollahi, Jamshid ; Bösch, Christoph ; Guajardo, Jorge ; Tuyls, Pim (2008)
Efficient Helper Data Key Extractor on FPGAs.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Gröbert, Felix ; Birk, Dominik (2008)
A Forensic Framework for Tracing Phishers.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008)
Resettable and Non-Transferable Chip Authentication for E-Passports.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, André ; Wolf, Marko ; Asokan, N. (2008)
Securing Peer-to-Peer Distributions for Mobile Devices.
4th Information Security Practice and Experience Conference (ISPEC 2008).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Osterhues, André ; Wolf, Marko ; Asokan, Nadarajah (2008)
Securing Peer-to-Peer Distributions for Mobile Devices.
Sydney, Australia
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Löhr, Hans ; Manulis, Mark ; Escalante, Alberto (2008)
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
Sydney, Australia
Konferenzveröffentlichung, Bibliographie

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2008)
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
ACM Symposium on Information, Computer and Communications Security (ASIACCS'08).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008)
Identification Protocols Revisited - Episode I: E-Passports.
e-crypt workshop on Secure Component and System Identification (SECSI).
Konferenzveröffentlichung, Bibliographie

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2008)
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008)
Identification Protocols Revisited - Episode I: E-Passports.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza (2008)
Trusted Computing—State of the Art and Challenges.
Konferenzveröffentlichung, Bibliographie

Seitz, Katja (2008)
Sicheres Padding für RSA.
Johann W. Goethe University Frankfurt
Masterarbeit, Bibliographie

Sadeghi, Ahmad-Reza ; Gasmi, Yacine ; Stewin, Patrick ; Unger, Martin ; Asokan, Nadarajah (2007)
Beyond Secure Channels.
Alexandria, Virginia, USA
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Wolf, Christopher ; Stüble, Christian ; Asokan, N. ; Ekberg, Jan-Erik (2007)
Enabling Fairer Digital Rights Management with Trusted Computing.
Valparaíso, Chile
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Katzenbeisser, Stefan ; Skoric, Boris ; Celik, Mehmet (2007)
Combining Tardos Fingerprinting Codes and Fingercasting.
Saint Malo, France
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Gröbert, Felix ; Birk, Dominik (2007)
Phishing Phishers - Observing and Tracing Organized Cybercrime.
Silicon Valley, California, USA
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2007)
Fingercasting—Joint Fingerprinting and Decryption of Broadcast Messages.
Konferenzveröffentlichung, Bibliographie

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2007)
Browser-based Authentication Protocols for Naive Users.
Bochum, Germany
Konferenzveröffentlichung, Bibliographie

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2007)
Browser Models for Usable Authentication Protocols.
Oakland, USA
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark ; Escalante, Alberto (2007)
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
Scarborough, Trinidad and Tobago
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Löhr, Hans ; Ramasamy, Hari Govind ; Schulz, Stefan ; Schunter, Matthias (2007)
Enhancing Grid Security Using Trusted Virtualization.
Hong Kong, China
Konferenzveröffentlichung, Bibliographie

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Winandy, Marcel (2007)
Trusted User-Aware Web Authentication.
Stanford, USA
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian ; Wachsmann, Christian ; Winandy, Marcel (2006)
TCG Inside? - A Note on TPM Specification Compliance.
ACM Workshop on Scalable Trusted Computing (ACMSTC).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Selhorst, Marcel ; Stüble, Christian ; Winandy, Marcel (2006)
TCG Inside? - A Note on TPM Specification Compliance.
Alexandria, Virginia (USA)
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2006)
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
Melbourne, Australia
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006)
Property-based Taming Lying Mobile Nodes.
Vienna, Austria
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006)
Property-based Taming Lying Mobile Node.
Vienna, Austria
Konferenzveröffentlichung, Bibliographie

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Manulis, Mark (2006)
Linkable Democratic Group Signatures.
Hangzhou, China
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006)
Key Agreement for Heterogeneous Ad-Hoc Groups.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006)
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Paar, Christof ; Lemke, Kerstin (2006)
Physical Security Bounds Against Tampering.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Paar, Christof ; Carluccio, Dario ; Lemke-Rust, Kerstin (2006)
E-Passport: The Global Traceability or How to Feel Like an UPS Package.
Graz, Austria
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2006)
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2006)
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
Report, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzebeisser, Stefan (2006)
A Computational Model for Watermark Robustness.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Huber, Ulrich (2006)
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
Report, Bibliographie

Sadeghi, Ahmad-Reza ; Huber, Ulrich (2006)
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
Samos, Greece
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Alkassar, Ammar ; Scheibel, Michael (2006)
Security Architecture for Device Encryption and VPN.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Wolf, Marko ; Scheibel, Michael (2006)
Play it once again, Sam - Enforcing Stateful Licenses on Open Platforms.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Scheibel, Michael (2006)
Design and Implementation of a Secure Linux Device Encryption Architecture.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Gajek, Sebastian (2006)
Client Authentication in Federations Using a Security Mode.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Löhr, Hans ; Chen, Liquen ; Landfermann, Rainer ; Rohe, Markus (2006)
A Protocol for Property-Based Attestation.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005)
Property-Based Broadcast Encryption for Multi-level Security Policies.
8th International Conference on Information Security and Cryptology (ICISC 2005).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005)
Property-Based Broadcast Encryption for Multi-level Security Policies.
Seoul, Korea
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005)
Towards Multilateral Secure Digital Rights Distribution Infrastructures.
Alexandria, Virginia, USA
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich (2005)
Embedding Trust into Cars—Secure Software Delivery and Installation.
Cologne, Germany
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005)
Multilaterally Secure Computing Platforms - in your office, car and at home.
1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Selhorst, Marcel ; Senft, Oska (2005)
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005)
Multilaterally Secure Computing Platforms – in your office, car and at home.
Tokyo, Japan
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Selhorst, Marcel ; Senft, Oska (2005)
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005)
Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme.
Salzburg, Austria
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Ulrich ; Kursawe, Klaus ; Lucks, Stefan (2005)
Secure Data Management in Trusted Computing.
Workshop on Cryptographic Hardware and Embedded Systems (CHES).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Kühn, Ulrich ; Kursawe, Klaus ; Lucks, Stefan (2005)
Secure Data Management in Trusted Computing.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Rupp, Andy ; Bangerter, Endre (2005)
Simplified Hardness Proofs in the Generic Group Model.
Leuven, Belgium
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Rohe, Markus ; Camenisch, Jan (2005)
Sokrates - A Compiler Framework for Zero-Knowledge Protocols.
Leuven, Belgium
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Alkassar, Ammar ; Stüble, Christian ; Selhorst, Marcel (2005)
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
Konferenzveröffentlichung, Bibliographie

Schwenk, Jörg ; Greveler, Ulrich ; Adelsbach, Andre (2005)
Fair DRM - Ermöglichen von Privatkopien und Schutz digitaler Waren.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005)
Towards Multilateral Security On DRM Platforms.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005)
Security Engineering for Zero-knowledge Watermark Detection.
Montreux, Switzerland
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005)
Secure Software Delivery and Installation in Embedded Systems.
Singapore
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005)
Towards multilaterally secure computing platforms - with open source and trusted computing.
In: Information Security Technical Report, 10 (2)
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005)
Towards multilaterally secure computing platforms - with open source and trusted computing.
In: Information Security Technical Report, 10 (2)
Artikel, Bibliographie

Sadeghi, Ahmad-Reza (2005)
Trusted Computing: Whom do we trust? Building Open Multilateral Secure Platforms Based On Trusted Computing.
DRM Conference.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich (2005)
Property-Based Broadcast Encryption for Multi-level Security Policies.
Buch, Bibliographie

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
Workshop on Secure Web Services (SWS).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin
Hrsg.: Lemke, Kerstin ; Wolf, Marko ; Paar, Christof (2005)
Anti-theft Protection: Electronic Immobilizers.
Embedded Security in Cars: Securing Current and Future Automotive IT Applications..
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Browser Model for Security Analysis of Browser-Based Protocols.
European Symposium for Research in Computer Science (ESORICS).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Browser Model for Security Analysis of Browser-Based Protocols.
Buch, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005)
Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it.
In: ACM Multimedia Systems, 11 (2)
Artikel, Bibliographie

Sadeghi, Ahmad-Reza (2005)
Trusted Computing: Whom do we trust? Building Open Multilateral Secure Platforms Based On Trusted Computing.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005)
Secure Software Delivery and Installation in Embedded Systems.
Report, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich
Hrsg.: Lemke, Kerstin (2005)
Secure Software Delivery and Installation in Embedded Systems.
In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich (2005)
Property-Based Broadcast Encryption for Multi-level Security Policies.
Report, Bibliographie

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
Konferenzveröffentlichung, Bibliographie

Schwenk, Jörg ; Gajek, Sebastian ; Adelsbach, Andre (2005)
Phishing - Die Täuschung des Benutzers zur Preisgabe geheimer Benutzerdaten.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin
Hrsg.: Lemke, Kerstin ; Wolf, Marko ; Paar, Christof (2005)
Anti-theft Protection: Electronic Immobilizers.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Browser Model for Security Analysis of Browser-Based Protocols.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Browser Model for Security Analysis of Browser-Based Protocols.
Report, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005)
Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it.
In: ACM Multimedia Systems
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin (2005)
An Open Approach for Designing Secure Electronic Immobilizers.
Konferenzveröffentlichung, Bibliographie

Spalka, Adrian ; Cremers, Armin ; Winandy, Marcel (2005)
Multilateral Security Considerations for Adaptive Mobile Applications.
Konferenzveröffentlichung, Bibliographie

Schwenk, Jörg ; Gajek, Sebastian ; Adelsbach, Andre (2005)
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Bas, Patrick ; Barni, Mauro ; Rosa, Alessia De
Hrsg.: Katzenbeisser, Stefan (2005)
First Summary Report on Asymmetric Watermarking.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Chen, Liqun ; Enzmann, Matthias ; Schneider, Markus ; Steiner, Michael (2005)
A Privacy-Protecting Coupon System.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian (2004)
Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms.
Tucson, Arizona, USA
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian (2004)
Property-based Attestation for Computing Platforms: Caring about policies, not mechanisms.
White Point Beach Resort, Nova Scotia, Canada
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Pohlmann, Norbert (2004)
European Multilateral Secure Computing Base - Open Trusted Computing for You and Me.
In: Datenschutz und Datensicherheit (DUD), 9
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2004)
Overcoming the Obstacles of Zero-Knowledge Watermark Detection.
ACM Multimedia and Security Workshop.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2004)
Overcoming the Obstacles of Zero-Knowledge Watermark Detection.
Magdeburg, Germany
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Altmeyer, Oliver ; Selhorst, Marcel
Hrsg.: Paulus, Sachar ; Pohlmann, Norbert ; Reimer, Helmut (2004)
Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004)
Buchkapitel, Bibliographie

Schwenk, Jörg ; Adelsbach, Andre (2004)
Key-Assignment Strategies for CPPM.
Magdeburg, Germany
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Günnewig, Dirk ; Rannenberg, Kai ; Stüble, Christian
Hrsg.: Koenig, Christian ; Neu­mann, An­dre­as ; Katz­sch­mann, To­bi­as (2004)
Trusted Computing Platforms: Zur technischen und industriepolitischen Situation und Vorgehensweise.
In: Vertrauenswürdige Systemumgebungen Technik, Recht und gesellschaftspolitische Implikationen des "Trusted Computing"
Buchkapitel, Bibliographie

Stüble, Christian ; Himmelein, Gerald (2003)
Vertrauensfragen - IBMs Antworten auf die TCPA-Fragen des Chaos Computer Club.
In: c't, 15
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Alkassar, Ammar (2003)
The Quest for Security in Integrated Networks.
11th International Conference on Telecommunication Systems, Modeling and Analysis.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Alkassar, Ammar (2003)
The Quest for Security in Integrated Networks.
Monterey, USA
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzenbeisser, Stefan (2003)
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, 9 (3)
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003)
Taming "Trusted Computing" by Operating System Design.
Cheju Island, Korea
Konferenzveröffentlichung, Bibliographie

Stüble, Christian ; Kursawe, Klaus (2003)
Improving End-user Security and Trustworthiness of TCG Platforms.
Frankfurt, Germany
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Alkassar, Ammar ; Stüble, Christian (2003)
Secure Object Identification - or: Solving The Chess Grandmaster Problem.
Ascona, Switzerland
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Dirk (2003)
Trusted Computing ohne Nebenwirkungen.
In: Datenschutz und Datensicherheit (DUD)
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003)
Sinn und Unsinn von TCPA und Palladium.
In: c't, 13
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Schneider, Markus ; Stüble, Christian (2003)
Die digitale Signatur.
In: Digitale Signaturen in der Praxis
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Markus (2003)
Electronic Payment Systems.
In: Digital Rights Management
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Günnewig, Dirk (2003)
Trusted Computing ohne Nebenwirkungen.
In: Datenschutz und Datensicherheit (DUD)
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003)
Sinn und Unsinn von TCPA und Palladium.
In: c't, 13
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Schneider, Markus ; Stüble, Christian (2003)
Die digitale Signatur.
In: Digitale Signaturen in der Praxis
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Markus (2003)
Electronic Payment Systems.
In: Digital Rights Management
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre (2003)
Advanced Techniques for Dispute Resolving and Authorship Proofs on Digital Works.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003)
Bridging the Gap between TCPA/Palladium and Personal Security.
Report, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzenbeisser, Stefan (2002)
Cryptography Meets Watermarking: Detecting Watermarks with Minimal- or Zero-Knowledge Disclosure.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian (2002)
Final Report on Verification and Assessment.
Buch, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian (2002)
Final Report on Verification and Assessment.
Report, Bibliographie

Stüble, Christian ; Lange, Steffen ; Nonnengart, Andreas ; Vogt, Roland (2002)
Common Criteria Protection Profiles - Discretionary Information Flow Control (DiC).
Ottawa, Canada
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Steinbrecher, Sandra (2002)
Auctions with Multiple Rounds and Multiple Items.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Steiner, Michael (2001)
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Geraldy, Alexander ; Pfitzmann, Birgit (2001)
Optimized Self-Synchronizing Mode of Operation.
Yokohama, Japan
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza (2001)
How to Break a Semi-Anonymous Fingerprinting Scheme.
Information Hiding: Fourth International Workshop.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza (2001)
How to Break a Semi-Anonymous Fingerprinting Scheme.
Konferenzveröffentlichung, Bibliographie

Stüble, Christian ; Pfitzmann, Birgit (2001)
PERSEUS: A Quick Open-source Path to Secure Signatures.
Banff, Canada
Konferenzveröffentlichung, Bibliographie

Stüble, Christian ; Pfitzmann, Birgit ; Riordan, James ; Waidner, Michael ; Weber, Arnd (2001)
The PERSEUS System Architecture.
In: Verlässliche Informationssysteme (VIS) '01, DuD Fachbeiträge
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre (2001)
Zero-Knowledge Watermark Detection and Proof of Ownership.
Berlin, Germany
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (2000)
Self-escrowed cash against user black-mailing.
Anguilla, British West Indies
Konferenzveröffentlichung, Bibliographie

Stüble, Christian ; Weber, Arnd (2000)
From Security Instruments to Secure End-User Systems.
In: World Markets Series - Wireless Technology 2000
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999)
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999)
Coin-based anonymous fingerprinting.
Konferenzveröffentlichung, Bibliographie

Stüble, Christian (1999)
Effiziente Implementierung von kryptographischen Datenaustauschformaten am Beispiel OpenPGP und S/MIME v.3.
In: Sicherheitsinfrastrukturen: DuD Fachbeiträge
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999)
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99
Buchkapitel, Bibliographie

T

Truong, Hien Thi Thu ; Toivonen, Juhani ; Nguyen, Thien Duc ; Soriente, Claudio ; Tarkoma, Sasu ; Asokan, N. (2019)
DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification.
IEEE International Conference on Pervasive Computing and Communications (PerCom2019). Kyoto, Japan (March 2019)
Konferenzveröffentlichung, Bibliographie

Tews, Erik ; Weiner, M. ; Massar, M. ; Giese, D. ; Wieser, W. (2013)
Security analysis of a widely deployed locking system.
Konferenzveröffentlichung, Bibliographie

Tews, Erik (2013)
How to enable Live Cloning of Virtual Machines using the Xen Hypervisor.
Report, Bibliographie

Thiemert, Stefan ; Nürnberger, Stefan ; Steinebach, Martin ; Zmudzinski, Sascha (2009)
Security of robust audio hashes.
London, UK
Konferenzveröffentlichung, Bibliographie

W

Wang, Jianqiang ; Mahmoody, Pouya ; Brasser, Ferdinand ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Yu, Donghui ; Pan, Dahan ; Zhang, Yuanyuan (2022)
VirTEE: a full backward-compatible TEE with native live migration and secure I/O.
59th ACM/IEEE Design Automation Conference. San Francisco, USA (10.-14.07.2022)
doi: 10.1145/3489517.3530436
Konferenzveröffentlichung, Bibliographie

Wang, Kai ; Mitev, Richard ; Yan, Chen ; Ji, Xiaoyu ; Sadeghi, Ahmad-Reza ; Xu, Wenyuan
Hrsg.: USENIX Association (2022)
GhostTouch: Targeted Attacks on Touchscreens without Physical Touch.
31st USENIX Security Symposium (USENIX Security 22). Boston, USA (10.-12.08.2022)
Konferenzveröffentlichung, Bibliographie

Weiser, Samuel ; Werner, Mario ; Brasser, Ferdinand ; Malenko, Maja ; Mangard, Stefan ; Sadeghi, Ahmad-Reza (2019)
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V.
Konferenzveröffentlichung, Bibliographie

Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2014)
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions.
doi: 10.2200/S00622ED1V01Y201412SPT012
Buch, Bibliographie

Wachsmann, Christian (2013)
Trusted and Privacy-Preserving Embedded Systems.
Technische Universität Darmstadt
Dissertation, Bibliographie

Werner, M. ; Kaiser, J. ; Hollick, Matthias ; Weingärtner, E. ; Wehrle, K. (2013)
A Blueprint for Switching Between Secure Routing Protocols in Wireless Multihop Networks.
Konferenzveröffentlichung, Bibliographie

Werthmann, Tim ; Hund, Ralf ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten (2013)
PSiOS: Bring Your Own Privacy & Security to iOS Devices (Distinguished Paper Award).
Konferenzveröffentlichung, Bibliographie

Wachsmann, Christian ; Sadeghi, Ahmad-Reza ; Schulz, Steffen (2012)
Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions.
In: Secure Smart Embedded Devices, Platforms and Applications
Buchkapitel, Bibliographie

Wahid, Khan (2011)
An ID-based mutually authenticated edge-to-edge security architecture for bridged provider networks to secure layer-2 communications.
Universitat Pompeu Fabra
Dissertation, Bibliographie

Wahid, Khan (2010)
Rethinking The Link Security Approach to Manage Large Scale Ethernet Network.
Konferenzveröffentlichung, Bibliographie

Wahid, Khan (2010)
Maximizing Ethernet Security by Switch-based Single Secure Domain.
Konferenzveröffentlichung, Bibliographie

Wahid, Khan (2006)
Bluetooth based Login for Windows Servers.
Königliche Technische Hochschule
Masterarbeit, Bibliographie

Z

Zeitouni, Shaza (2022)
Hardware entangled security primitives: attacks and defenses.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00021552
Dissertation, Erstveröffentlichung, Verlagsversion

Zeitouni, Shaza ; Vliegen, Jo ; Frassetto, Tommaso ; Koch, Dirk ; Sadeghi, Ahmad-Reza ; Mentens, Nele (2021)
Trusted Configuration in Cloud FPGAs.
29th IEEE International Symposium on Field-Programmable Custom Computing Machines. virtual Conference (09.-12.05.2021)
Konferenzveröffentlichung, Bibliographie

Zeitouni, Shaza ; Dessouky, Ghada ; Sadeghi, Ahmad-Reza (2021)
SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities.
6th IEEE European Symposium on Security and Privacy (Euro S&P 2021). virtual Conference (06.-10.09.2021)
Konferenzveröffentlichung, Bibliographie

Zeitouni, Shaza ; Stapf, Emmanuel ; Fereidooni, Hossein ; Sadeghi, Ahmad-Reza (2020)
On the Security of Strong Memristor-based Physically Unclonable Functions.
Design Automation Conference 2020. virtual Conference (19.-22.07.)
Konferenzveröffentlichung, Bibliographie

Zaidan, Firas (2019)
Developing a Fuzzing Framework for ARM TrustZone.
Technische Universität Darmstadt
Masterarbeit, Bibliographie

Zeitouni, Shaza ; Gens, David ; Sadeghi, Ahmad-Reza (2018)
It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs.
Konferenzveröffentlichung, Bibliographie

Zeitouni, Shaza ; Dessouky, Ghada ; Arias, Orlando ; Sullivan, Dean ; Ibrahim, Ahmad ; Jin, Yier ; Sadeghi, Ahmad-Reza (2017)
ATRIUM: Runtime Attestation Resilient Under Memory Attacks.
Irvine, California, US
Konferenzveröffentlichung, Bibliographie

Zeitouni, Shaza ; Oren, Yossef ; Wachsmann, Christian ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2016)
Remanence Decay Side-Channel: The PUF Case.
In: IEEE Transactions on Information Forensics and Security, 99
doi: 10.1109/TIFS.2015.2512534
Artikel, Bibliographie

Diese Liste wurde am Sun Mar 17 02:04:58 2024 CET generiert.