TU Darmstadt / ULB / TUbiblio

Einträge mit Organisationseinheit "20 Fachbereich Informatik > Systemsicherheit"

Ebene hoch
Gruppiere nach: Autor(en) | Datum | Typ des Eintrags | Sprache | Keine Gruppierung
Springe zu: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | V | W | Z
Anzahl der Einträge auf dieser Ebene: 480.

A

Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean :
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
In: 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017).
[Konferenz- oder Workshop-Beitrag], (2017)

Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean :
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017)
[Konferenz- oder Workshop-Beitrag], (2017)

Abera, Tigist ; Asokan, Nadarajah ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS).
[Konferenz- oder Workshop-Beitrag], (2016)

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias :
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016.
[Konferenz- oder Workshop-Beitrag], (2016)

Abera, Tigist ; Asokan, Nadarajah ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza :
Things, Trouble, Trust: On Building Trust in IoT Systems.
In: 53rd Design Automation Conference (DAC).
[Konferenz- oder Workshop-Beitrag], (2016)

Abera, Tigist ; Asokan, Nadarajah ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza :
Things, Trouble, Trust: On Building Trust in IoT Systems.
53rd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2016)

Asokan, Nadarajah ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian :
SEDA: Scalable Embedded Device Attestation.
In: 22nd ACM Conference on Computer and Communications Security (CCS).
[Konferenz- oder Workshop-Beitrag], (2015)

Asokan, Nadarajah ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian :
SEDA - Technical Report.
Technische Universität Darmstadt
[Monograph], (2015)

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean :
HAFIX: Hardware-Assisted Flow Integrity Extension.
In: 52nd Design Automation Conference (DAC).
[Konferenz- oder Workshop-Beitrag], (2015)

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean :
HAFIX: Hardware-Assisted Flow Integrity Extension (Best Paper Award).
In: 52nd Design Automation Conference (DAC).
[Konferenz- oder Workshop-Beitrag], (2015)

Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
Kutylowski, Miroslaw ; Vaidya, Jaideep (eds.) :

Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014. Lecture Notes in Computer Science, 8712. Springer International Publishing , pp. 76-93. ISBN 978-3-319-11202-2
[Buchkapitel], (2014)

Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
Kutylowski, Miroslaw ; Vaidya, Jaideep (eds.) :

Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014. Lecture Notes in Computer Science, 8712. Springer International Publishing , pp. 76-93. ISBN 978-3-319-11202-2
[Buchkapitel], (2014)

Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8) pp. 1189-1206.
[Artikel], (2014)

Asokan, Nadarajah ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza:
Mobile Platform Security.
Synthesis Lectures on Information Security, Privacy, and Trust, 4 (3). Morgan & Claypool
[Buch], (2013)

Asokan, Nadarajah ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza:
Mobile Platform Security.
Synthesis Lectures on Information Security, Privacy, and Trust, 4 (3). Morgan & Claypool
[Buch], (2013)

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
A Security Framework for Analysis and Design of Software Attestation.
In: ACM Conference on Computer and Communications Security (CCS). ACM Press
[Konferenz- oder Workshop-Beitrag], (2013)

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
A Security Framework for Analysis and Design of Software Attestation.
ACM Conference on Computer and Communications Security (CCS) ACM Press
[Konferenz- oder Workshop-Beitrag], (2013)

Asokan, Nadarajah ; Dmitrienko, Alexandra ; Nagy, Marcin ; Reshetova, Elena ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stelle, Stanislaus :
CrowdShare: Secure Mobile Resource Sharing.
In: 11th International Conference on Applied Cryptography and Network Security (ACNS'13). In: 11th International Conference on Applied Cryptography and Network Security (ACNS'13) , 7954 Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Aderhold, Markus ; Gebhardt, Alexander ; Mantel, Heiko :
Choosing a Formalism for Secure Coding: FSM vs. LTL.

[Report], (2013)

Ahmad, Junaid Jameel ; Li, Shujun ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
In: Financial Cryptography (FC'12), LNCS. In: LNCS , 7397 . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Armknecht, Frederik ; Maes, Roel ; Sadeghi, Ahmad-Reza ; Standaert, François-Xavier ; Wachsmann, Christian :
A Formal Foundation for the Security Features of Physical Functions.
In: IEEE Symposium on Security and Privacy (SSP). IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2011)

Armknecht, Frederik ; Maes, Roel ; Sadeghi, Ahmad-Reza ; Standaert, François-Xavier ; Wachsmann, Christian :
A Formal Foundation for the Security Features of Physical Functions.
IEEE Symposium on Security and Privacy (SSP) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2011)

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Scafuro, Alessandra ; Visconti, Ivan ; Wachsmann, Christian :
Impossibility Results for RFID Privacy Notions.
In: Transactions on Computational Science IX. In: LNCS , 6480 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Scafuro, Alessandra ; Visconti, Ivan ; Wachsmann, Christian :
Impossibility Results for RFID Privacy Notions.
In: LNCS , 6480 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Almeida, JoséBacelar ; Bangerter, Endre ; Barbosa, Manuel ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
In: 15th European Symposium on Research in Computer Security (ESORICS'10). In: LNCS , 6345 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
On RFID Privacy with Mutual Authentication and Tag Corruption.
In: International Conference on Applied Cryptography and Network Security (ACNS). In: LNCS , 6123 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Armknecht, Frederik ; Chen, Liqun ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
Anonymous Authentication for RFID Systems.
In: Workshop on RFID Security (RFIDSec). In: LNCS , 6370 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Alsouri, Sami ; Dagdelen, Özgür ; Katzenbeisser, Stefan
Acquisti, A. ; Sadeghi, Ahmad-Reza (eds.) :

Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation.
In: 3rd International Conference on Trust and Trustworthy Computing (TRUST 2010). In: TRUST 2010
[Konferenz- oder Workshop-Beitrag], (2010)

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
On RFID Privacy with Mutual Authentication and Tag Corruption.
In: LNCS , 6123 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Armknecht, Frederik ; Chen, Liqun ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
Anonymous Authentication for RFID Systems.
In: LNCS , 6370 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Armknecht, Frederik ; Furukawa, Jun ; Kurosawa, Kaoru :
A Universally Composable roup Key Exchange Protocol with Minimum Communication Effort.
Sixth Conference on Security and Cryptography for Networks (SCN 2008)
[Konferenz- oder Workshop-Beitrag], (2008)

Armknecht, Frederik ; Escalante, Alberto ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza :
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008. In: Lecture Notes in Computer Science , 4991 . Springer
[Konferenz- oder Workshop-Beitrag], (2008)

B

Biondo, Andrea ; Conti, Mauro ; Davi, Lucas ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza :
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
In: 27th USENIX Security Symposium.
[Konferenz- oder Workshop-Beitrag], (2018)

Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Müller, Urs ; Sadeghi, Ahmad-Reza :
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
TU Darmstadt, ETH Zurich
[Monograph], (2017)

Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Müller, Urs ; Sadeghi, Ahmad-Reza :
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.

[Report], (2017)

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
CAn´t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: 26th USENIX Security Symposium. In: USENIX Security '17 .
[Konferenz- oder Workshop-Beitrag], (2017)

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza :
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: 11th USENIX Workshop on Offensive Technologies. In: WOOT .
[Konferenz- oder Workshop-Beitrag], (2017)

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza :
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT .
[Konferenz- oder Workshop-Beitrag], (2017)

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17 .
[Konferenz- oder Workshop-Beitrag], (2017)

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Regulating ARM TrustZone Devices in Restricted Spaces.
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys).
[Konferenz- oder Workshop-Beitrag], (2016)

Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Leakage-Resilient Layout Randomization for Mobile Devices.
In: 23rd Annual Network & Distributed System Security Symposium (NDSS).
[Konferenz- oder Workshop-Beitrag], (2016)

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: Proceedings of the 53nd Annual Design Automation Conference. In: DAC '16 . ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: DAC '16 . ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
TyTAN: Tiny Trust Anchor for Tiny Devices.
In: 52nd Design Automation Conference (DAC) 2015.
[Konferenz- oder Workshop-Beitrag], (2015)

Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza :
XiOS: Extended Application Sandboxing on iOS.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015).
[Konferenz- oder Workshop-Beitrag], (2015)

Busold, Christoph ; Heuser, Stephan ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah :
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
In: Financial Cryptography and Data Security.
[Konferenz- oder Workshop-Beitrag], (2015)

Busold, Christoph ; Dmitrienko, Alexandra ; Wachsmann, Christian :
Key2Share for Authentication Services.
SmartCard Workshop
[Konferenz- oder Workshop-Beitrag], (2014)

Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael:
Personal Information Dashboard: Putting the Individual Back in Control.
Iso Press Amsterdam , pp. 139-164. ISBN 978-1-61499-294-3 (print) | 978-1-61499-295-0 (online)
[Buch], (2013)

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza :
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
In: 22nd USENIX Security Symposium (USENIX Security '13). USENIX
[Konferenz- oder Workshop-Beitrag], (2013)

Bodden, Eric ; Tanter, Éric ; Inostroza, Milton :
Joint Point Interfaces for Safe and Flexible Decoupling of Aspects.
In: Software Engineering Top Journals, Rank 5, ACM Transactions on Softw
[Artikel], (2013)

Bleikertz Sören and, Sven and Ideler ; Sadeghi, Ahmad-Reza :
Client-controlled Cryptography-as-a-Service in the Cloud.
In: 11th International Conference on Applied Cryptography and Network Security (ACNS 2013).
[Konferenz- oder Workshop-Beitrag], (2013)

Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
Client-controlled Cryptography-as-a-Service in the Cloud.
11th International Conference on Applied Cryptography and Network Security (ACNS 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Buchmann, Johannes ; Demirel, Denise ; van de Graaf, Jeroen
Sadeghi, Ahmad-Reza (ed.) :

Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
In: Financial Cryptography and Data Security: 17th International Conference, 2013. In: LNCS (7859). Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza :
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy. In: CODASPY '13 . ACM Press
[Konferenz- oder Workshop-Beitrag], (2013)

Baecher, Paul ; Brzuska, Christina ; Mittelbach, Arno :
Reset Indifferentiability and its Consequences.
In: Lecture Notes in Computer Science . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza :
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
Center for Advanced Security Research Darmstadt
[Monograph], (2012)

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza :
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
Center for Advanced Security Research Darmstadt
[Monograph], (2012)

Bessani, Alysson ; Abbadi, Imad M. ; Bugiel, Sven ; Cesena, Emanuele ; Deng, Mina ; Gröne, Michael ; Marnau, Ninja ; Nürnberger, Stefan ; Pasin, Marcelo ; Schirmer, Norbert:
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
Cambridge Scholars Publishing , pp. 160-186.
[Buch], (2012)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava :
Towards Taming Privilege-Escalation Attacks on Android.
In: 19th Annual Network & Distributed System Security Symposium (NDSS).
[Konferenz- oder Workshop-Beitrag], (2012)

Boneh, Dan ; Dagdelen, Özgür ; Fischlin, Marc ; Lehmann, Anja ; Schaffner, Christian ; Zhandry, Mark :
Random Oracles in a Quantum World.
17th International Conference on Theory and Application of Cryptology and Information Security
[Konferenz- oder Workshop-Beitrag], (2011)

Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Twin Clouds: Secure Cloud Computing with Low Latency.
In: Communications and Multimedia Security Conference (CMS'11). In: LNCS , 7025 . Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Bugiel, Sven ; Nürnberger Stefan and, Thomas ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
AmazonIA: When Elasticity Snaps Back.
In: 18th ACM Conference on Computer and Communications Security (CCS'11). ACM
[Konferenz- oder Workshop-Beitrag], (2011)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava :
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
In: 18th ACM Conference on Computer and Communications Security (CCS'11). ACM
[Konferenz- oder Workshop-Beitrag], (2011)

Bugiel, Sven ; Davi, Lucas ; Schulz, Steffen
Sadeghi, Ahmad-Reza ; Zhang, Xinwen (eds.) :

Scalable Trust Establishment with Software Reputation.
In: Workshop on Scalable Trusted Computing (STC). ACM Press
[Konferenz- oder Workshop-Beitrag], (2011)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava :
Practical and Lightweight Domain Isolation on Android.
In: Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM). ACM Press
[Konferenz- oder Workshop-Beitrag], (2011)

Barni, Mauro ; Failla, Pierluigi ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Privacy-Preserving ECG Classification with Branching Programs and Neural Networks.
In: IEEE Transactions on Information Forensics and Security (TIFS), 6, Nr. 2
[Artikel], (2011)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza :
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.
Technische Universität Darmstadt
[Monograph], (2011)

Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Twin Clouds: An Architecture for Secure Cloud Computing (Extended Abstract).
In: Workshop on Cryptography and Security in Clouds (CSC'11).
[Konferenz- oder Workshop-Beitrag], (2011)

Bugiel, Sven ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
TruWalletM: Secure Web Authentication on Mobile Platforms.
In: Proceedings of INTRUST 2010 The Second International Conference on Trusted Systems.
[Konferenz- oder Workshop-Beitrag], (2010)

Bugiel, Sven ; Ekberg, Jan-Erik :
Implementing an Application-Specific Credential Platform Using Late-Launched Mobile Trusted Module.
5th Annual Workshop on Scalable Trusted Computing (STC 2010)
[Konferenz- oder Workshop-Beitrag], (2010)

Bangerter, Endre ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
YAZKC: Yet Another Zero-Knowledge Compiler.

[Anderes], (2010)

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Paus, Annika ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Efficient Privacy-Preserving Classification of ECG Signals.
In: 1st IEEE International Workshop on Information Forensics and Security (IEEE WIFS'09). IEEE
[Konferenz- oder Workshop-Beitrag], (2009)

Bangerter, Endre ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Tsay, Joe-Kai :
On the design and implementation of efficient zero-knowledge proofs of knowledge.
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09).
[Konferenz- oder Workshop-Beitrag], (2009)

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification.
In: 1st International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09).
[Konferenz- oder Workshop-Beitrag], (2009)

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Secure evaluation of private linear branching programs with medical applications.
In: 14th European Symposium on Research in Computer Security (ESORICS'09). In: LNCS , 5789 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Bangerter, Endre ; Barzan, Stefania ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Tsay, Joe-Kai :
Bringing zero-knowledge proofs of knowledge to practice.
In: 17th International Workshop on Security Protocols (SPW'09). In: LNCS , 7028 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Bangerter, Endre ; Briner, Thomas ; Henecka, Wilko ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Automatic Generation of Sigma-Protocols.
In: 6th European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09). In: LNCS , 6391 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Bangerter, Endre ; Camenisch, Jan ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Automatic Generation of Sound Zero-Knowledge Protocols.

[Anderes], (2009)

C

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza :
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In: The annual Privacy Enhancing Technologies Symposium (PETS).
[Konferenz- oder Workshop-Beitrag], (2016)

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
In: 53rd Design Automation Conference (DAC).
[Konferenz- oder Workshop-Beitrag], (2016)

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
53rd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2016)

Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza :
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS).
[Konferenz- oder Workshop-Beitrag], (2015)

Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael :
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS).
[Konferenz- oder Workshop-Beitrag], (2015)

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael :
Return to Where? You Can't Exploit What You Can't Find.
In: Blackhat USA.
[Konferenz- oder Workshop-Beitrag], (2015)

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael :
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
In: 36th IEEE Symposium on Security and Privacy (Oakland).
[Konferenz- oder Workshop-Beitrag], (2015)

Catuogno, Luigi ; Löhr, Hans ; Winandy, Marcel ; Sadeghi, Ahmad-Reza :
A trusted versioning file system for passive mobile storage devices.
In: J. Network and Computer Applications.
[Konferenz- oder Workshop-Beitrag], (2014)

Chen, Liqun ; Dietrich, Kurt ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Winter, Johannes :
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
In: Information Security Conference (ISC). In: LNCS , 6531 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Checkoway, Stephen ; Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Shacham, Hovav ; Winandy, Marcel :
Return-Oriented Programming without Returns.
In: Proceedings of the 17th ACM conference on Computer and communications security. In: CCS '10 . ACM
[Konferenz- oder Workshop-Beitrag], (2010)

Chen, Liqun ; Dietrich, Kurt ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Winter, Johannes :
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
In: LNCS , 6531 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Catuogno, Luigi ; Löhr Hans and M, Mark and Sadeghi ; Winandy, Marcel :
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5 pp. 289-298.
[Artikel], (2010)

Catuogno, Luigi ; Löhr Hans and M, Mark and Sadeghi ; Winandy, Marcel :
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 34 (5) pp. 289-294.
[Artikel], (2010)

Catuogno, Luigi ; Dmitrienko, Alexandra ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramunno, Gianluca ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Schunter, Matthias ; Winandy, Marcel ; Zhan, Jing :
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
In: International Conference on Trusted Systems (INTRUST). Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Transparent Mobile Storage Protection in Trusted Virtual Domains.
In: 23rd Large Installation System Administration Conference (LISA '09).
[Konferenz- oder Workshop-Beitrag], (2009)

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Transparent Mobile Storage Protection in Trusted Virtual Domains.
In: USENIX LISA 2009. USENIX
[Konferenz- oder Workshop-Beitrag], (2009)

Chen, Liqun ; Escalante, Alberto ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza :
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
In: Financial Cryptography and Data Security, 11th International Conference, FC 2007. In: Lecture Notes in Computer Science , 4886 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2008)

Chen, Liqun ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza :
Property-Based Attestation without a Trusted Third Party.
In: Information Security, 11th International Conference, ISC 2008. In: Lecture Notes in Computer Science , 5222 . Springer
[Konferenz- oder Workshop-Beitrag], (2008)

D

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza :
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: 13th ASIA Conference on Information, Computer and Communications Security. In: AsiaCCS .
[Konferenz- oder Workshop-Beitrag], (2018)

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza :
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: AsiaCCS .
[Konferenz- oder Workshop-Beitrag], (2018)

Dessouky, Ghada ; Zeitouni, Shaza ; Nyman, Thomas ; Paverd, Andrew ; Davi, Lucas ; Koeberl, Patrick ; Asokan, N. ; Sadeghi, Ahmad-Reza :
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
In: 54th Design Automation Conference (DAC'17).
[Konferenz- oder Workshop-Beitrag], (2017)

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
In: 24th Annual Network & Distributed System Security Symposium (NDSS).
[Konferenz- oder Workshop-Beitrag], (2017)

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael :
Pushing the communication barrier in secure computation using lookup tables.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17). The Internet society
[Konferenz- oder Workshop-Beitrag], (2017)

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2017)

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael :
Pushing the communication barrier in secure computation using lookup tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17) The Internet society
[Konferenz- oder Workshop-Beitrag], (2017)

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza :
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
In: 23rd ACM Conference on Computer and Communications Security (CCS).
[Konferenz- oder Workshop-Beitrag], (2016)

Davi, Lucas ; Sadeghi, Ahmad-Reza:
Building Secure Defenses Against Code-Reuse Attacks.
Springer International Publishing ISBN 978-3-319-25544-6 ISSN 2191-5768
[Buch], (2015)

Davi, Lucas ; Sadeghi, Ahmad-Reza:
Building Secure Defenses Against Code-Reuse Attacks.
Springer International Publishing ISBN 978-3-319-25544-6
[Buch], (2015)

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza :
Automated Synthesis of Optimized Circuits for Secure Computation.
In: 22nd ACM Conference on Computer and Communications Security (CCS'15).
[Konferenz- oder Workshop-Beitrag], (2015)

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza :
Automated Synthesis of Optimized Circuits for Secure Computation.
22nd ACM Conference on Computer and Communications Security (CCS'15)
[Konferenz- oder Workshop-Beitrag], (2015)

Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian :
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
In: 22nd Annual Network & Distributed System Security Symposium (NDSS).
[Konferenz- oder Workshop-Beitrag], (2015)

Dmitrienko, Alexandra ; Heuser, Stephan ; Nguyen, Thien Duc ; da Silva Ramos, Marcos ; Rein, Andre ; Sadeghi, Ahmad-Reza :
Market-driven Code Provisioning to Mobile Secure Hardware.
In: Financial Cryptography and Data Security.
[Konferenz- oder Workshop-Beitrag], (2015)

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian :
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
In: 23rd USENIX Security Symposium.
[Konferenz- oder Workshop-Beitrag], (2014)

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza :
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
In: BlackHat USA.
[Konferenz- oder Workshop-Beitrag], (2014)

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian :
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
23rd USENIX Security Symposium
[Konferenz- oder Workshop-Beitrag], (2014)

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza :
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
BlackHat USA
[Konferenz- oder Workshop-Beitrag], (2014)

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza :
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4)
[Artikel], (2014)

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza :
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4)
[Artikel], (2014)

Davi, Lucas ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza :
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
In: 51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing.
[Konferenz- oder Workshop-Beitrag], (2014)

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian :
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Technische Universität Darmstadt
[Monograph], (2014)

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza :
On the (In)Security of Mobile Two-Factor Authentication.
In: Financial Cryptography and Data Security (FC'14). Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Dmitrienko, Alexandra ; Noack, David ; Sadeghi, Ahmad-Reza ; Yung, Moti :
POSTER: On Offline Payments with Bitcoin.
In: FC'2014: Financial Cryptography and Data Security Conference.
[Konferenz- oder Workshop-Beitrag], (2014)

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013).
[Konferenz- oder Workshop-Beitrag], (2013)

do Carmo, Rodrigo ; Hollick, Matthias :
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks.
In: Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
[Artikel], (2013)

Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso :
The Fiat-Shamir Transformation in a Quantum World.
In: arXiv:1306.0315, 2013
[Artikel], (2013)

Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
In: BlackHat Abu Dhabi.
[Konferenz- oder Workshop-Beitrag], (2012)

do Carmo, R. ; Werner, M. ; Hollick, Matthias :
Signs of a Bad Neighborhood: A Lightweight Metric for Anomaly Detection in Mobile Ad Hoc Networks.
Proceedings of the 8th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (ACM Q2SWinet)
[Konferenz- oder Workshop-Beitrag], (2012)

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012).
[Konferenz- oder Workshop-Beitrag], (2012)

Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Tamrakar, Sandeep ; Wachsmann, Christian :
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
In: International Conference on Trust & Trustworthy Computing (TRUST). In: Lecture Notes in Computer Science (LNCS) , 7344 . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Djatmiko, Mentari ; Boreli, Roksana ; Seneviratne, Aruna ; Ries, Sebastian :
Resources-aware trusted node selection for content distribution in mobile ad hoc networks.
In: Wireless Networks, Springer US, 18 pp. 1-14.
[Artikel], (2012)

Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid :
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
In: Conference on Digital Automation and Test Europe (DATE).
[Konferenz- oder Workshop-Beitrag], (2012)

Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid :
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
Conference on Digital Automation and Test Europe (DATE)
[Konferenz- oder Workshop-Beitrag], (2012)

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
In: 19th Annual Network & Distributed System Security Symposium (NDSS).
[Konferenz- oder Workshop-Beitrag], (2012)

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
POSTER: Control-Flow Integrity for Smartphones.
In: 18th ACM Conference on Computer and Communications Security (CCS'11). ACM
[Konferenz- oder Workshop-Beitrag], (2011)

Davi, Lucas ; Dmitrienko, Alexandra ; Kowalski, Christoph ; Winandy, Marcel :
Trusted Virtual Domains on OKL4: Secure Information Sharing on Smartphones.
Proceedings of the 6th ACM Workshop on Scalable Trusted Computing (STC) ACM Press
[Konferenz- oder Workshop-Beitrag], (2011)

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
In: 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011).
[Konferenz- oder Workshop-Beitrag], (2011)

Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
A Security Architecture for Accessing Health Records on Mobile Phones.
In: HEALTHINF'2011: Proceedings of the 4th International Conference on Health Informatics.
[Konferenz- oder Workshop-Beitrag], (2011)

Dmitrienko, Alexandra ; Hadzic, Zecir ; Lhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Securing the Access to Electronic Health Records on Mobile Phones.
In: Biomedical Engineering Systems and Technologies.
[Konferenz- oder Workshop-Beitrag], (2011)

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED).
[Buchkapitel], (2011)

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED). Leuven, Belgium
[Buchkapitel], (2011)

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Privilege Escalation Attacks on Android.
In: ISC 2010: Proceedings of the 13th Information Security Conference.
[Konferenz- oder Workshop-Beitrag], (2010)

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Return-Oriented Programming without Returns on ARM.
Horst Görtz Institute for IT Security, Ruhr-University Bochum
[Monograph], (2010)

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
Horst Görtz Institut für Sicherheit
[Monograph], (2010)

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
In: Proceedings of the 2009 ACM workshop on Scalable trusted computing. In: STC '09 . ACM
[Konferenz- oder Workshop-Beitrag], (2009)

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
In: STC '09 . ACM
[Konferenz- oder Workshop-Beitrag], (2009)

E

Ekberg, Jan-Erik ; Bugiel, Sven :
Trust in a Small Package: Minimized MRTM Software Implementation for Mobile Secure Environments.
4th Annual Workshop on Scalable Trusted Computing (STC2009)
[Konferenz- oder Workshop-Beitrag], (2009)

F

Frassetto, Tommaso ; Jauernig, Patrick ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
IMIX: In-Process Memory Isolation EXtension.
In: 27th USENIX Security Symposium.
[Konferenz- oder Workshop-Beitrag], (2018)

Frassetto, Tommaso ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
JITGuard: Hardening Just-in-time Compilers with SGX.
In: 24th ACM Conference on Computer and Communications Security (CCS).
[Konferenz- oder Workshop-Beitrag], (2017)

Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro :
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
In: Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
[Konferenz- oder Workshop-Beitrag], (2017)

Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro :
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
[Konferenz- oder Workshop-Beitrag], (2017)

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza :
HardIDX: Practical and Secure Index with SGX.
In: Conference on Data and Applications Security and Privacy (DBSec).
[Konferenz- oder Workshop-Beitrag], (2017)

Fereidooni, Hossein ; Frassetto, Tommaso ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Conti, Mauro :
Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
The Second IEEE International Workshop on Safe, Energy-Aware, & Reliable Connected Health (CHASE-SEARCH)
[Konferenz- oder Workshop-Beitrag], (2017)

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza :
HardIDX: Practical and Secure Index with SGX.
Conference on Data and Applications Security and Privacy (DBSec)
[Konferenz- oder Workshop-Beitrag], (2017)

Fernando, Ruchith ; Ranchal, Rohit ; An, Byungchan ; Othmane, Lotfi Ben ; Bhargava, Bharat :
Consumer oriented privacy preserving access control for electronic health records in the cloud.
IEEE cloud
[Konferenz- oder Workshop-Beitrag], (2016)

Fleischhacker, N. ; Günther, F. ; Kiefer, F. ; Poettering, B. :
Pseudorandom Signatures.
In: >8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 7-10 May, Hangzhou, China
[Artikel], (2013)

Filyanov, Atanas ; McCune, Jonathan ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
In: 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2011).
[Konferenz- oder Workshop-Beitrag], (2011)

Filyanov, Atanas ; McCune, Jonathan ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2011)
[Konferenz- oder Workshop-Beitrag], (2011)

Fischlin, Marc ; Pinkas, Benny ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Visconti, Ivan :
Secure Set Intersection with Untrusted Hardware Tokens.
In: 11th Cryptographers' Track at the RSA Conference (CT-RSA'11). In: LNCS , 6558 . Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
A Pattern for Secure Graphical User Interface Systems.
In: 3rd International Workshop on Secure systems methodologies using patterns (SPattern'09), Proceedings of the 20th International Workshop on Database and Expert Systems Applications. IEEE
[Konferenz- oder Workshop-Beitrag], (2009)

G

Ghaeini, Hamid Reza ; Antonioli, Daniele ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole :
State-Aware Anomaly Detection for Industrial Control Systems.
In: The 33rd ACM/SIGAPP Symposium On Applied Computing (SAC).
[Konferenz- oder Workshop-Beitrag], (2018)

Ghaeini, Hamid Reza ; Antonioli, Daniele ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole :
State-Aware Anomaly Detection for Industrial Control Systems.
The 33rd ACM/SIGAPP Symposium On Applied Computing (SAC)
[Konferenz- oder Workshop-Beitrag], (2018)

Gens, David ; Schmitt, Simon ; Davi, Lucas ; Sadeghi, Ahmad-Reza :
K-Miner: Uncovering Memory Corruption in Linux.
In: 25th Annual Network & Distributed System Security Symposium (NDSS).
[Konferenz- oder Workshop-Beitrag], (2018)

Gens, David ; Schmitt, Simon ; Davi, Lucas ; Sadeghi, Ahmad-Reza :
K-Miner: Uncovering Memory Corruption in Linux.
25th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2018)

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. :
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
In: 24th Annual Network & Distributed System Security Symposium (NDSS).
[Konferenz- oder Workshop-Beitrag], (2017)

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. :
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2017)

Gay, Richard ; Mantel, Heiko ; Sudbrock, Henning :
An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels.
2nd International Workshop on Quantitative Aspects in Security Assurance
[Konferenz- oder Workshop-Beitrag], (2013)

Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
Prouff, Emmanuel ; Schaumont, Patrick (eds.) :

On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
In: LNCS (7428). Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Gajek, Sebastian ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
In: 4th ACM Workshop on Scalable Trusted Computing.
[Konferenz- oder Workshop-Beitrag], (2009)

Gasmi, Yacine ; Hessmann, Christian ; Pittenauer, Martin ; Winandy, Marcel :
Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis.
In: LNI , 1 (133).
[Konferenz- oder Workshop-Beitrag], (2008)

Gajek, Sebastian ; Manulis, Mark ; Pereira, Olivier ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg :
Universally Composable Security Analysis of TLS.
In: Proceedings of the 2nd International Conference on Provable Security (ProvSec 2008). In: Lecture Notes in Computer Science , 5324 . Springer
[Konferenz- oder Workshop-Beitrag], (2008)

Gajek, Sebastian ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg :
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS'08). ACM Press
[Konferenz- oder Workshop-Beitrag], (2008)

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing.
In: Second International Conference on Availability, Reliability and Security (ARES 2007).
[Konferenz- oder Workshop-Beitrag], (2007)

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Compartmented Security for Browsers.
Horst Görtz In­sti­tu­te for IT Se­cu­ri­ty
[Monograph], (2007)

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
In: Workshop on Information and System Security (WISSEC'06).
[Konferenz- oder Workshop-Beitrag], (2006)

H

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick :
Phonion: Practical Protection of Metadata in Telephony Networks.
In: Proceedings on Privacy Enhancing Technologies (PoPETs).
[Konferenz- oder Workshop-Beitrag], (2017)

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza :
Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
TU Darmstadt
[Monograph], (2016)

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza :
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
In: Financial Crypto 2016.
[Konferenz- oder Workshop-Beitrag], (2016)

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza :
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
Financial Crypto 2016
[Konferenz- oder Workshop-Beitrag], (2016)

Heuser, Stephan :
Towards Modular and Flexible Access Control on Smart Mobile Devices.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5663]
Technische Universität Darmstadt , Darmstadt
[Dissertation], (2016)

Huang, Jialin ; Vaudenay, Serge ; Lai, Xuejia ; Nyberg, Kaisa :
Capacity and Data Complexity in Multidimensional Linear Attack.
CRYPTO
[Konferenz- oder Workshop-Beitrag], (2015)

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza :
ASM: A Programmable Interface for Extending Android Security.
In: 23rd USENIX Security Symposium.
[Konferenz- oder Workshop-Beitrag], (2014)

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza :
ASM: A Programmable Interface for Extending Android Security.
Intel CRI-SC at TU Darmstadt, North Carolina State University, CASED / TU Darmstadt
[Monograph], (2014)

Henecka, Wilko ; Kögl, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo :
TASTY: Tool for Automating Secure Two-partY computations.
In: 17th ACM Conference on Computer and Communications Security (CCS'10). ACM
[Konferenz- oder Workshop-Beitrag], (2010)

Hätönen, Kimmo ; Klemettinen, Mika ; Miettinen, Markus
Boulicaut, Jean-François ; Raedt, Luc De ; Mannila, Heikki (eds.) :

Constraint-Based Mining and Inductive Databases.
In: Constraint-Based Mining and Inductive Databases. LNCS, 3848. Springer , pp. 196-215. ISBN 978-3-540-31331-1
[Buchkapitel], (2006)

I

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza :
SeED: Secure Non-Interactive Attestation for Embedded Devices.
In: 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017).
[Konferenz- oder Workshop-Beitrag], (2017)

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza :
SeED: Secure Non-Interactive Attestation for Embedded Devices.
10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017)
[Konferenz- oder Workshop-Beitrag], (2017)

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza :
DARPA: Device Attestation Resilient to Physical Attacks.
In: ACM WiSEC 2016.
[Konferenz- oder Workshop-Beitrag], (2016)

J

Jauernig, Patrick Thomas :
SMOV: Lighweight In-Process Memory Isolation.
TU Darmstadt
[Masterarbeit], (2017)

Jiang, Xuxian ; Grace, Michael ; Sadeghi, Ahmad-Reza ; Zhou, Wu :
Unsafe Exposure Analysis of Mobile In-App Advertisements.
In: to appear at WiSec. ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Jiang, Xuxian ; Grace, Michael ; Sadeghi, Ahmad-Reza ; Zhou, Wu :
Unsafe Exposure Analysis of Mobile In-App Advertisements.
to appear at WiSec ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas
Sadeghi, Ahmad-Reza ; Naccache, David (eds.) :

Efficient Secure Two-Party Computation with Untrusted Hardware Tokens.
In: Towards Hardware Intrinsic Security: Foundation and Practice. Information Security and Cryptography. Springer Berlin Heidelberg , pp. 367-386. ISBN 978-3-642-14452-3
[Buchkapitel], (2010)

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Embedded SFE: Offloading server and network using hardware tokens.
In: 14th International Conference on Financial Cryptography and Data Security (FC'10). In: LNCS , 6052 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
In: 12th International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10). In: LNCS , 6225 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

K

Kong, Joonho ; Koushanfar, Farinaz ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
In: Design Automation Conference (DAC) 2014. ACM Press
[Konferenz- oder Workshop-Beitrag], (2014)

Kong, Joonho ; Koushanfar, Farinaz ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
Design Automation Conference (DAC) 2014 ACM Press
[Konferenz- oder Workshop-Beitrag], (2014)

Koeberl, Patrick ; Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Varadharajan, Vijay :
TrustLite: A Security Architecture for Tiny Embedded Devices.
In: European Conference on Computer Systems (EuroSys). ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Kocabas, Unal ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza :
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
In: Conference on Digital Automation and Test Europe (DATE). Interactive Presentation
[Konferenz- oder Workshop-Beitrag], (2013)

Kocabas, Unal ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza :
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
Conference on Digital Automation and Test Europe (DATE) Interactive Presentation
[Konferenz- oder Workshop-Beitrag], (2013)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design.
In: Journal of Computer Security, 21 (2) pp. 283-315.
[Artikel], (2013)

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Rožic, Vladimir ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian :
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES). In: Lecture Notes in Computer Science (LNCS) , 7428 . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Rožic, Vladimir ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian :
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
In: Lecture Notes in Computer Science (LNCS) , 7428 . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Kocabaş, Ünal ; Schulz, Steffen :
POSTER: Practical Embedded Remote Attestation Using Physically Unclonable Functions.
ACM Conference on Computer and Communications Security (CCS) ACM Press
[Konferenz- oder Workshop-Beitrag], (2011)

Kneževic, M. ; Kobayashi, K. ; Ikegami, J. ; Matsuo, S. ; Satoh, A. ; Kocabas, U. ; Fan, J. ; Katashita, T. ; Sugawara, T. ; Sakiyama, K. ; Verbauwhede, I. ; Ohta, K. ; Homma, N. ; Aoki, T. :
Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates.
In: IEEE Transactions on VLSI journal
[Artikel], (2011)

Katzenbeisser, Stefan ; Kocabaş Ünal and v, Vincent and Sadeghi ; Wachsmann, Christian :
Recyclable PUFs: Logically Reconfigurable PUFs.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES). In: Lecture Notes in Computer Science (LNCS) , 6917 . Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Katzenbeisser, Stefan ; Kocabaş, Ünal ; van der Leest, Vincent ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Wachsmann, Christian :
Recyclable PUFs: logically reconfigurable PUFs.
In: Journal of Cryptographic Engineering, 1 (3) pp. 177-186.
[Artikel], (2011)

Katzenbeisser, Stefan ; Kocabaş, Ünal ; van der Leest, Vincent ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Schröder, Heike ; Wachsmann, Christian :
Recyclable PUFs: Logically Reconfigurable PUFs.
In: Lecture Notes in Computer Science (LNCS) , 6917 . Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Katzenbeisser, Stefan ; Kocabaş, Ünal ; van der Leest, Vincent ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Wachsmann, Christian :
Recyclable PUFs: logically reconfigurable PUFs.
In: Journal of Cryptographic Engineering, 1 (3) pp. 177-186.
[Artikel], (2011)

Kostiainen, Kari ; Dmitrienko, Alexandra ; Ekberg, Jan-Erik ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah :
Key Attestation from Trusted Execution Environments.
In: TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing.
[Konferenz- oder Workshop-Beitrag], (2010)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Modular Design of Efficient Secure Function Evaluation Protocols.

[Anderes], (2010)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Modular Design of Efficient Secure Function Evaluation Protocols.

[Anderes], (2010)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design.

[Konferenz- oder Workshop-Beitrag], (2010)

Kobayashi, K. ; Ikegami, J. ; Kneževic, M. ; Guo, X. ; Matsuo, S. ; Huang, S. ; Nazhandali, L. ; Kocabas, U. ; Fan, J. ; Satoh, A. ; Verbauwhede, I. ; Sakiyama, K. ; Ohta, K. :
Prototyping Platform for Performance Evaluation of SHA-3 Candidates.
IEEE International Workshop on Hardware-Oriented Security and Trust - HOST 2010, pp. 60-63
[Konferenz- oder Workshop-Beitrag], (2010)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design.

[Konferenz- oder Workshop-Beitrag], (2010)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Improved garbled circuit building blocks and applications to auctions and computing minima.
In: 8th International Conference on Cryptology And Network Security (CANS'09). In: LNCS , 5888 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Improved garbled circuit building blocks and applications to auctions and computing minima.
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09).
[Konferenz- oder Workshop-Beitrag], (2009)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
How to Combine Homomorphic Encryption and Garbled Circuits - Improved Circuits and Computing the Minimum Distance Efficiently.
In: 1st International Workshop on Signal Processing in the Encrypted Domain (SPEED'09).
[Konferenz- oder Workshop-Beitrag], (2009)

L

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael :
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
In: USENIX Annual Technical Conference (ATC).
[Konferenz- oder Workshop-Beitrag], (2016)

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael :
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
USENIX Annual Technical Conference (ATC)
[Konferenz- oder Workshop-Beitrag], (2016)

Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael:
Automated Software Diversity.
Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool
[Buch], (2015)

Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael:
Automated Software Diversity.
Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool
[Buch], (2015)

Li, Shujun ; Sadeghi, Ahmad-Reza ; Heisrath, Soeren ; Schmitz, Roland ; Ahmad, Junaid Jameel :
hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers.
In: 15th International Conference on Financial Cryptography and Data Security (FC).
[Konferenz- oder Workshop-Beitrag], (2011)

Li, Shujun ; Sadeghi, Ahmad-Reza ; Heisrath, Soeren ; Schmitz, Roland ; Ahmad, Junaid Jameel :
hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers.
15th International Conference on Financial Cryptography and Data Security (FC)
[Konferenz- oder Workshop-Beitrag], (2011)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Securing the E-Health Cloud.
In: 1st ACM International Health Informatics Symposium (IHI 2010).
[Konferenz- oder Workshop-Beitrag], (2010)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Securing the E-Health Cloud.
1st ACM International Health Informatics Symposium (IHI 2010)
[Konferenz- oder Workshop-Beitrag], (2010)

Löhr, Hans ; Pöppelmann, Thomas ; Rave, Johannes ; Steegmanns, Martin ; Winandy, Marcel :
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments.
5th Annual Workshop on Scalable Trusted Computing (STC 2010)
[Konferenz- oder Workshop-Beitrag], (2010)

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan :
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
In: Information Hiding Conference (IH). Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Liu, Y. ; Ghosal, D. ; Armknecht, F. ; Sadeghi, A. ; Schulz, S. ; Katzenbeisser, S. :
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
In: Information Hiding (IH 2010). Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan :
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Information Hiding Conference (IH) Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Patterns for Secure Boot and Secure Storage in Computer Systems.
In: 4th International Workshop on Secure systems methodologies using patterns (SPattern 2010),.
[Konferenz- oder Workshop-Beitrag], (2010)

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan :
Hide and Seek in Time - Robust Covert Timing Channels.
In: ESORICS.
[Konferenz- oder Workshop-Beitrag], (2009)

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan :
Hide and Seek in Time - Robust Covert Timing Channels.
In: European Symposium on Research in Computer Security (ESORICS). In: LNCS (5789). Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Vishik, Claire ; Winandy, Marcel :
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
In: 5th Information Security Practice and Experience Conference (ISPEC'09). In: LNCS , 5451 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

M

Miettinen, Markus ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza :
Revisiting Context-Based Pairing in IoT.
In: Proceedings of the 55th Design Automation Conference (DAC). ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu :
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT.
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017).
[Konferenz- oder Workshop-Beitrag], (2017)

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Frassetto, Tommaso ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu :
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017). IEEE
[Konferenz- oder Workshop-Beitrag], (2017)

McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh :
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, PP (99)
[Artikel], (2016)

McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh :
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, PP (99)
[Artikel], (2016)

Miettinen, Markus ; Huang, Jialin ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza :
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
In: Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16).
[Konferenz- oder Workshop-Beitrag], (2016)

Miettinen, Markus ; Asokan, Nadarajah ; Koushanfar, Farinaz ; Nguyen, Thien Duc ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Sobhani, Majid ; Yellapantula, Sudha :
I know where you are: Proofs of Presence resilient to malicious provers.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015).
[Konferenz- oder Workshop-Beitrag], (2015)

Miettinen, Markus ; Asokan, Nadarajah ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Sobhani, Majid :
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
In: Proc. ACM Conference on Computer and Communications Security. ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah :
ConXsense - Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014).
[Konferenz- oder Workshop-Beitrag], (2014)

Mustafa, Hossen ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Xu, Wenyuan :
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
In: 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[Konferenz- oder Workshop-Beitrag], (2014)

Mustafa, Hossen ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Xu, Wenyuan :
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
[Konferenz- oder Workshop-Beitrag], (2014)

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah :
ConXsense - Context Sensing for Adaptive Usable Access Control.
In: Techreport
[Artikel], (2013)

Mittelbach, Arno :
Cryptophia’s Short Combiner for Collision-Resistant Hash Functions (best student paper).
In: Lecture Notes in Computer Science . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Mittelbach, Arno :
Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output.
In: Lecture Notes in Computer Science . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Manulis, Mark ; Sadeghi, Ahmad-Reza :
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.
In: Int. J. of Wireless and Mobile Computing (IJWMC), 4 (1) pp. 17-30.
[Artikel], (2010)

Manulis, Mark:
Provably Secure Group Key Exchange.
IT Security, 5. Europäischer Universitätsverlag ISBN 978-3-89966-275-7
[Buch], (2007)

Manulis, Mark ; Sadeghi, Ahmad-Reza :
Property-Based Taming of Lying Mobile Nodes.
In: Proceedings of 20th International Conference on Advanced Information Networking and Applications (AINA 2006) Volume 2 IEEE International Workshop on Trusted and Autonomic Computing Systems (TACS 2006). IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2006)

Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg :
Linkable Democratic Group Signatures.
In: Proceedings of the 2nd Information Security Practice and Experience Conference (ISPEC 2006). In: Lecture Notes in Computer Science , 3903 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2006)

N

Nagy, Marcin ; Bui, Thanh ; Cristofaro, Emiliano De ; Asokan, Nadarajah ; Ott, Jorg ; Sadeghi, Ahmad-Reza :
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
In: ACM WiSEC 2015.
[Konferenz- oder Workshop-Beitrag], (2015)

Nagy, Marcin ; Bui, Thanh ; Cristofaro, Emiliano De ; Asokan, Nadarajah ; Ott, Jorg ; Sadeghi, Ahmad-Reza :
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
ACM WiSEC 2015
[Konferenz- oder Workshop-Beitrag], (2015)

Noisternig, M. ; Hollick, Matthias :
Efficient Solutions for the Authenticated Fragmentation Problem in Delay- and Disruption-Tolerant Networks.
Proc. 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM'14)
[Konferenz- oder Workshop-Beitrag], (2014)

Nagy, Marcin ; Cristofaro, Emiliano De ; Dmitrienko, Alexandra ; Asokan, Nadarajah ; Sadeghi, Ahmad-Reza :
Do I know you? - Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
In: Annual Computer Security Applications Conference (ACSAC 2013).
[Konferenz- oder Workshop-Beitrag], (2013)

Nagy, Marcin ; Cristofaro, Emiliano De ; Dmitrienko, Alexandra ; Asokan, Nadarajah ; Sadeghi, Ahmad-Reza :
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
Annual Computer Security Applications Conference (ACSAC 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Nürnberger, Stefan ; Steinebach, Martin ; Zmudzinski, Sascha :
Re-synchronizing audio watermarking after nonlinear time stretching.
Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII
[Konferenz- oder Workshop-Beitrag], (2011)

Nürnberger, Stefan ; Feller, Thomas ; Huss, Sorin :
RAY - A Secure Microkernel Architecture.
IEEE Privacy Security and Trust 2010 (PST2010)
[Konferenz- oder Workshop-Beitrag], (2010)

O

Oren, Yossef ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES). In: Lecture Notes on Computer Science (LNCS) , 8068 . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Oren, Yossef ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
In: Lecture Notes on Computer Science (LNCS) , 8068 . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Octeau, Damien ; McDaniel, Patrick ; Jha, Somesh ; Bartel, Alexandre ; Bodden, Eric ; Klein, J. ; Le Traon, Yves :
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
In: USENIX Security Symposium 2013.
[Artikel], (2012)

P

Portela, Bernardo ; Barbosa, Manuel ; Scerri, Guillaume ; Warinschi, Bogdan ; Bahmani, Raad ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza :
Secure Multiparty Computation from SGX.
In: Financial Cryptography and Data Security.
[Konferenz- oder Workshop-Beitrag], (2017)

Portela, Bernardo ; Barbosa, Manuel ; Scerri, Guillaume ; Warinschi, Bogdan ; Bahmani, Raad ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza :
Secure Multiparty Computation from SGX.
Financial Cryptography and Data Security
[Konferenz- oder Workshop-Beitrag], (2017)

Peter, Andreas ; Tews, Erik ; Katzenbeisser, Stefan :
Efficiently Outsourcing Multiparty Computation under Multiple Keys.
In: >IACR Cryptology ePrint Archive, Report 2013/013
[Artikel], (2013)

Paus, Annika ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Practical Secure Evaluation of Semi-Private Functions.
In: 7th International Conference on Applied Cryptography and Network Security (ACNS'09). In: LNCS , 5536 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Paar, Christof ; Sadeghi, Ahmad-Reza ; Güneysu, Tim ; Eisenbarth, Thomas ; Schellekens, Dries ; Wolf, Marko :
Reconfigurable Trusted Computing in Hardware.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007). ACM Press
[Konferenz- oder Workshop-Beitrag], (2007)

R

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs)
[Artikel], (2017)

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs)
[Artikel], (2017)

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed :
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
In: 24th Annual Network & Distributed System Security Symposium (NDSS).
[Konferenz- oder Workshop-Beitrag], (2017)

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed :
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2017)

Rupp, Andy ; Leander, Gregor ; Bangerter, Endre ; Dent, Alexander ; Sadeghi, Ahmad-Reza :
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
In: Advances in Cryptology - ASIACRYPT 2008.
[Konferenz- oder Workshop-Beitrag], (2008)

Rupp, Andy ; Leander, Gregor ; Bangerter, Endre ; Dent, Alexander ; Sadeghi, Ahmad-Reza :
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
Advances in Cryptology - ASIACRYPT 2008
[Konferenz- oder Workshop-Beitrag], (2008)

S

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
In: Black Hat Europe.
[Konferenz- oder Workshop-Beitrag], (2016)

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
Black Hat Europe
[Konferenz- oder Workshop-Beitrag], (2016)

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Ibrahim, Ahmad ; Conti, Mauro ; Neven, Gregory :
SANA: Secure and Scalable Aggregate Network Attestation.
In: 23rd ACM Conference on Computer and Communications Security (CCS) 2016. CCS 2016
[Konferenz- oder Workshop-Beitrag], (2016)

Sadeghi, Ahmad-Reza ; Dessouky, Ghada :
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
In: ACM WiSec 2016.
[Konferenz- oder Workshop-Beitrag], (2016)

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz :
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
In: 53rd Design Automation Conference (DAC'16).
[Konferenz- oder Workshop-Beitrag], (2016)

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
In: 53rd Design Automation Conference (DAC).
[Konferenz- oder Workshop-Beitrag], (2016)

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz :
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
53rd Design Automation Conference (DAC'16)
[Konferenz- oder Workshop-Beitrag], (2016)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik :
Towards a Unified Security Model for Physically Unclonable Functions.
In: CT-RSA - Cryptographers' Track at the RSA Conference.
[Konferenz- oder Workshop-Beitrag], (2016)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik :
Towards a Unified Security Model for Physically Unclonable Functions.
CT-RSA - Cryptographers' Track at the RSA Conference
[Konferenz- oder Workshop-Beitrag], (2016)

Songhori, Ebrahim ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz :
Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis.
In: 52nd Design Automation Conference (DAC).
[Konferenz- oder Workshop-Beitrag], (2015)

Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Waidner, Michael :
Security and Privacy Challenges in Industrial Internet of Things.
In: 52nd Design Automation Conference (DAC) Research.
[Konferenz- oder Workshop-Beitrag], (2015)

Songhori, Ebrahim ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz :
Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis.
52nd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2015)

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
In: 36th IEEE Symposium on Security and Privacy (Oakland).
[Konferenz- oder Workshop-Beitrag], (2015)

Schuster, Felix ; Tendyck, Thomas ; Liebchen, Christopher ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten :
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
In: 36th IEEE Symposium on Security and Privacy (Oakland).
[Konferenz- oder Workshop-Beitrag], (2015)

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
36th IEEE Symposium on Security and Privacy (Oakland)
[Konferenz- oder Workshop-Beitrag], (2015)

Sadeghi, Ahmad-Reza ; Davi, Lucas ; Larsen, Per :
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? - Keynote -.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015).
[Konferenz- oder Workshop-Beitrag], (2015)

Sadeghi, Ahmad-Reza ; Brasser, Ferdinand :
Swap and Play: Live Updating Hypervisors and Its Application to Xen.
In: CCSW 2014: The ACM Cloud Computing Security Workshop Proceedings.
[Konferenz- oder Workshop-Beitrag], (2014)

Senftleben, Marius ; Bucicoiu, Mihai ; Tews, Erik ; Armknecht, Frederik ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza :
MoP-2-MoP - Mobile private microblogging.
In: Financial Cryptography and Data Security (FC'14). Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Schulz, Steffen ; Varadharajan, Vijay ; Sadeghi, Ahmad-Reza :
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: IEEE Transactions on Information Forensics and Security.
[Konferenz- oder Workshop-Beitrag], (2014)

Stancill, Blaine ; Snow, Kevin ; Otterness, Nathan ; Monrose, Fabian ; Davi, Lucas ; Sadeghi, Ahmad-Reza :
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
In: 16th Research in Attacks, Intrusions and Defenses (RAID) Symposium.
[Konferenz- oder Workshop-Beitrag], (2013)

Stancill, Blaine ; Snow, Kevin ; Otterness, Nathan ; Monrose, Fabian ; Davi, Lucas ; Sadeghi, Ahmad-Reza :
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
16th Research in Attacks, Intrusions and Defenses (RAID) Symposium
[Konferenz- oder Workshop-Beitrag], (2013)

Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza :
Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same.
In: BlackHat USA.
[Konferenz- oder Workshop-Beitrag], (2013)

Simo-Fhom, Hervais :
Internet Privacy. Taking opportunities, assessing risks, building trust.
In: >Springer Vieweg; 2013
[Artikel], (2013)

Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza :
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (Best Student Paper Award).
In: 34th IEEE Symposium on Security and Privacy (Oakland 2013).
[Konferenz- oder Workshop-Beitrag], (2013)

Sepehrdad, Pouyan ; Susil, Petr ; Vaudenay, Serge ; Vuagnoux, Martin :
Smashing WEP in a Passive Attack.
20th International Workshop on Fast Software Encryption (FSE)
[Konferenz- oder Workshop-Beitrag], (2013)

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay :
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version).
TU Darmstadt
[Monograph], (2012)

Sadeghi, Ahmad-Reza ; Kocabaş, Ünal ; Katzenbeisser, Stefan :
Converse PUF-Based Authentication.
In: International Conference on Trust & Trustworthy Computing (TRUST). Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Sadeghi, Ahmad-Reza ; Kocabaş, Ünal ; Katzenbeisser, Stefan :
Converse PUF-Based Authentication.
International Conference on Trust & Trustworthy Computing (TRUST) Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Seudié, Hervé ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza :
EDA for Secure and Dependable Cybercars: Challenges and Opportunities.
In: ACM/IEEE Design Automation Conference (DAC).
[Konferenz- oder Workshop-Beitrag], (2012)

Seudié, Hervé ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza :
EDA for Secure and Dependable Cybercars: Challenges and Opportunities.
ACM/IEEE Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2012)

Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Zhdanova, Maria ; Xu, Wenyuan ; Mustafa, Hossen ; Varadharajan, Vijay :
Tetherway: A Framework for Tethering Camouflage.
In: Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). ACM Press
[Konferenz- oder Workshop-Beitrag], (2012)

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay
Foresti, Sara ; Yung, Moti (eds.) :

The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: European Symposium on Research in Computer Science (ESORICS). In: LNCS . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2012)

Schreiner, Steffen ; Grigoras, Costin ; Litmaath, Maarten ; Betev, Latchezar ; Buchmann, Johannes :
Certified Grid Job Submission in the ALICE Grid Services.
In: Open Access Journal of Physics: Conference Series (JPCS), International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2012
[Artikel], (2012)

Schneider, Michael ; Göttert, Norman
Preneel, Bart ; Takagi, Tsuyoshi (eds.) :

Random Sampling for Short Lattice Vectors on Graphics Cards.
In: LNCS (6917). Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Shirazi, Fatemeh ; Neumann, Stephan ; Ciolacu, Ines ; Volkamer, Melanie :
Robust Electronic Voting: Introducing robustness in Civitas.
International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011
[Konferenz- oder Workshop-Beitrag], (2011)

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
Lightweight Remote Attestation Using Physical Functions.
In: ACM Conference on Wireless Network Security (WiSec). ACM Press
[Konferenz- oder Workshop-Beitrag], (2011)

Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
Location Privacy in RFID Systemen.
In: Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (2) pp. 70-75.
[Artikel], (2011)

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
Lightweight Remote Attestation using Physical Functions (Extended Version).
Technische Universität Darmstadt (CASED)
[Monograph], (2011)

Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
Location Privacy in RFID Systemen.
In: Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (2) pp. 70-75.
[Artikel], (2011)

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Dmitrienko, Alexandra ; Stüble, Christian ; Gessner, Dennis ; Ullmann, Markus :
Trusted embedded System Operating System (TeSOS) - Study and Design.

[Anderes], (2011) ((Noch) nicht publiziert)

Sadeghi, Ahmad-Reza ; Preneel, Bart ; Pfitzmann, Andreas ; Moran, Tal ; Maier-Rabler, Ursula ; Kutylowski, Miroslaw ; Klonowski, Marek ; Guerses, Seda ; Danezis, George ; Borisov, Nikita ; Baer, Walter :
Machiavelli Confronts 21st Century Digital Technology: Democracy in a Network Society.

[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Li, Shujun ; Shah, Syed Amier Haider ; Khan, Muhammad Asad Usman ; Khayam, Syed Ali ; Schmitz, Roland :
Breaking e-Banking CAPTCHAs.
In: 26th Annual Computer Security Applications Conference (ACSAC 2010).
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Preneel, Bart ; Pfitzmann, Andreas ; Moran, Tal ; Maier-Rabler, Ursula ; Kutylowski, Miroslaw ; Klonowski, Marek ; Guerses, Seda ; Danezis, George ; Borisov, Nikita ; Baer, Walter :
Machiavelli Confronts 21st Century Digital Technology: Democracy in a Network Society.

[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Li, Shujun ; Shah, Syed Amier Haider ; Khan, Muhammad Asad Usman ; Khayam, Syed Ali ; Schmitz, Roland :
Breaking e-Banking CAPTCHAs.
26th Annual Computer Security Applications Conference (ACSAC 2010)
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Naccache, David :
Towards Hardware-Intrinsic Security.
In: Information Security and Cryptography .
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Naccache, David :
Towards Hardware-Intrinsic Security.
In: Information Security and Cryptography .
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Mukherjee, Biswanath ; Ghosal, Dipak ; Liu, Yali :
Video Streaming Forensic - Content Identification with Traffic Snooping.
In: 13th Information Security Conference (ISC 2010).
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Mukherjee, Biswanath ; Ghosal, Dipak ; Liu, Yali :
Video Streaming Forensic - Content Identification with Traffic Snooping.
13th Information Security Conference (ISC 2010)
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
Enhancing RFID Security and Privacy by Physically Unclonable Functions.
In: Keine Angabe Information Security and Cryptography. Springer , pp. 281-307.
[Buchkapitel], (2010)

Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten.
In: Workshop Innovative und sichere Informationstechnologie für das Gesundheitswesen von morgen (perspeGKtive'10). In: LNI , P-174 .
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
Enhancing RFID Security and Privacy by Physically Unclonable Functions.
In: Towards Hardware-Intrinsic Security: Foundations and Practice. Information Security and Cryptography. Springer , pp. 281-307.
[Buchkapitel], (2010)

Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
Trusted Computing.
In: Handbook of Financial Cryptography and Security. CRC Press
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
Trusted Computing.
Handbook of Financial Cryptography and Security CRC Press
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Cesena, Emanuele ; Ramunno, Gianluca ; Vernizzi, Davide :
Anonymous Authentication with TLS and DAA.
In: TRUST2010.
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Winandy, Marcel :
Token-Based Cloud Computing — Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
In: 3rd International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud. In: LNCS , 6101 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Cesena, Emanuele ; Ramunno, Gianluca ; Vernizzi, Davide :
Anonymous Authentication with TLS and DAA.
TRUST2010
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Li, Shujun ; Khayam, Syed Ali ; Schmitz, Roland :
Breaking a Virtual Password System Based on Randomized Linear Generation Functions.
In: IEEE ICC 2010 - Communication and Information System Security Symposium ('ICC'10 CISS').
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Li, Shujun ; Khayam, Syed Ali ; Schmitz, Roland :
Breaking a Virtual Password System Based on Randomized Linear Generation Functions.
IEEE ICC 2010 - Communication and Information System Security Symposium ('ICC'10 CISS')
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
PUF-Enhanced RFID Security and Privacy.
In: Workshop on Secure Component and System Identification (SECSI).
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
PUF-Enhanced RFID Security and Privacy.
Workshop on Secure Component and System Identification (SECSI)
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Cabuk, Serdar ; Dalton, Chris ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramasamy, Hari Govind ; Ramunnok, Gianluca ; Schunter, Matthias :
Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers.
In: Journal of Computer Security, 18 (1) pp. 89-121.
[Artikel], (2010)

Schulz, Steffen ; Sadeghi, Ahmad-Reza :
Extending IPsec for Efficient Remote Attestation.
In: Financial Cryptography and Data Security (FC). Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Cabuk, Serdar ; Dalton, Chris ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramasamy, Hari Govind ; Ramunnok, Gianluca ; Schunter, Matthias :
Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers.
In: Journal of Computer Security, 18 (1) pp. 89-121.
[Artikel], (2010)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Maes, Roel ; Sunar, Berk ; Tuyls, Pim :
Memory Leakage-Resilient Encryption based on Physically Unclonable Functions.
In: ASIACRYPT'09.
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Li, Shujun ; Asghar, Hassan Jameel ; Pieprzyk, Josef ; Schmitz, Roland ; Wang, Huaxiong :
On the Security of PAS (Predicate-based Authentication Service).
In: Annual Computer Security Applications Conference (ACSAC�09), 2009..
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
Anonymizer-Enabled Security and Privacy for RFID.
In: International Conference on Cryptology and Network Security (CANS). In: LNCS , 5888 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo :
Efficient Privacy-Preserving Face Recognition.
In: 12th International Conference on Information Security and Cryptology (ICISC'09). In: LNCS , 5984 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Maes, Roel ; Sunar, Berk ; Tuyls, Pim :
Memory Leakage-Resilient Encryption based on Physically Unclonable Functions.
ASIACRYPT'09
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Li, Shujun ; Asghar, Hassan Jameel ; Pieprzyk, Josef ; Schmitz, Roland ; Wang, Huaxiong :
On the Security of PAS (Predicate-based Authentication Service).
Annual Computer Security Applications Conference (ACSAC’09), 2009.
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
Anonymizer-Enabled Security and Privacy for RFID.
In: LNCS , 5888 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Stüble Christian, Jing and Korthaus :
A Practical Property-based Bootstrap Architecture.
In: ACMSTC'09.
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Zhan, Jing ; Korthaus, René :
A Practical Property-based Bootstrap Architecture.
ACMSTC'09
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Vishik, Claire ; Verbauwhede, Ingrid :
Future of Assurance: Ensuring that a System is Trustworthy.
In: ISSE'09.
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Vishik, Claire ; Verbauwhede, Ingrid :
Future of Assurance: Ensuring that a System is Trustworthy.
ISSE'09
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
Location Privacy in RFID Applications.
In: Privacy in Location-Based Applications: Research Issues and Emerging Trends. In: LNCS , 5599 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
Location Privacy in RFID Applications.
In: LNCS , 5599 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Kursawe, Klaus ; Schellekens, Dries ; Skoric, Boris ; Tuyls, Pim :
Reconfigurable Physical Unclonable Functions — Enabling Technology for Tamper-Resistant Storage.
In: 2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST).
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
Enhancing RFID Security and Privacy by Physically Unclonable Functions (Extended Abstract).
In: Foundations for Forgery-Resilient Cryptographic Hardware. In: Dagstuhl Seminar Proceedings (09282). Schloss Dagstuhl
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Kursawe, Klaus ; Schellekens, Dries ; Skoric, Boris ; Tuyls, Pim :
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage.
2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
Enhancing RFID Security and Privacy by Physically Unclonable Functions (Extended Abstract).
In: Dagstuhl Seminar Proceedings (09282). Schloss Dagstuhl
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
Efficient RFID Security and Privacy with Anonymizers.
In: Workshop on RFID Security (RFIDSec).
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
Efficient RFID Security and Privacy with Anonymizers.
Workshop on RFID Security (RFIDSec)
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Einsatz von Sicherheitskernen und Trusted Computing.
In: D-A-CH Security.
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Tuyls, Pim ; Maes, Roel ; Sunar, Berk :
Physically Unclonable Pseudorandom Functions.
In: Poster session of Advances in Cryptology - EUROCRYPT.
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Schulz, Steffen :
Secure VPNs for Trusted Computing Environments.
In: International Conference on Trusted Computing (TRUST). Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Tuyls, Pim ; Maes, Roel ; Sunar, Berk :
Physically Unclonable Pseudorandom Functions.
Poster session of Advances in Cryptology - EUROCRYPT
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Bangerter, Endre ; Barbosa, Manuel ; Bernstein, Daniel ; Damgård, Ivan ; Page, Dan ; Pagter, Jakob ; Sovio, Sampo :
Using Compilers to Enhance Cryptographic Product Development.
In: Information Security Solutions Europe (ISSE).
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Bangerter, Endre ; Barbosa, Manuel ; Bernstein, Daniel ; Damgård, Ivan ; Page, Dan ; Pagter, Jakob ; Sovio, Sampo :
Using Compilers to Enhance Cryptographic Product Development.
Information Security Solutions Europe (ISSE)
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics.

[Anderes], (2009)

Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics.

[Anderes], (2009)

Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.
In: 11th International Conference on Information Security and Cryptology (ICISC'08). In: LNCS , 5461 . Springer
[Konferenz- oder Workshop-Beitrag], (2008)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark ; Pereira, Olivier :
Universally Composable Security Analysis of TLS.
In: Second Conference on Provable Security (ProvSec).
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan :
Improved Security Notions and Protocols for Non-Transferable Identification.
In: 13th European Symposium on Research in Computer Security (ESORICS).
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Gasmi, Yacine ; Ramunno, Gianluca ; Vernizzi, Davide ; Stewin, Patrick ; Unger, Martin :
An Efficient Implementation of Trusted Channels Based on OpenSSL.
In: ACMSTC 2008.
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
User Privacy in Transport Systems Based on RFID E-Tickets.
In: International Workshop on Privacy in Location-Based Applications (PiLBA).
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Husseiki, Rani ; Gasmi, Yacine ; Stewin, Patrick ; Unger, Martin :
Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains.
In: 3rd ACM Workshop on Scalable Trusted Computing.
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan :
Improved Security Notions and Protocols for Non-Transferable Identification.
13th European Symposium on Research in Computer Security (ESORICS)
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Gasmi, Yacine ; Ramunno, Gianluca ; Vernizzi, Davide ; Stewin, Patrick ; Unger, Martin :
An Efficient Implementation of Trusted Channels Based on OpenSSL.
ACMSTC 2008
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Bangerter, Endre ; Djackov, Maksim :
A Demonstrative Ad-hoc Attestation System.
In: Information Security Conference 2008 (ISC'08).
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark :
Property-Based Attestation without a Trusted Third Party.
In: Information Security Conference (ISC'08).
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Property-Based TPM Virtualization.
In: Information Security, 11th International Conference (ISC 2008). In: LNCS (5222).
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Bangerter, Endre ; Djackov, Maksim :
A Demonstrative Ad-hoc Attestation System.
Information Security Conference 2008 (ISC'08)
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Shokrollahi, Jamshid ; Bösch, Christoph ; Guajardo, Jorge ; Tuyls, Pim :
Efficient Helper Data Key Extractor on FPGAs.
In: Workshop on Cryptographic Hardware and Embedded Systems 2008 (CHES 2008).
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Gröbert, Felix ; Birk, Dominik :
A Forensic Framework for Tracing Phishers.
In: LNCS (6102). Springer
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan :
Resettable and Non-Transferable Chip Authentication for E-Passports.
In: RFIDSec 2008.
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Stüble Christian, André ; Wolf, Marko ; Asokan, Nadarajah :
Securing Peer-to-Peer Distributions for Mobile Devices.
In: 4th Information Security Practice and Experience Conference (ISPEC 2008).
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Löhr, Hans ; Manulis, Mark ; Escalante, Alberto :
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
In: 4th Information Security Practice and Experience Conference (ISPEC 2008).
[Konferenz- oder Workshop-Beitrag], (2008)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark :
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: ACM Symposium on Information, Computer and Communications Security (ASIACCS'08).
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan :
Identification Protocols Revisited - Episode I: E-Passports.
In: e-crypt workshop on Secure Component and System Identification (SECSI).
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza :
Trusted Computing - State of the Art and Challenges.
In: SOFSEM 2008. In: LNCS (4910). Springer
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Gasmi, Yacine ; Stewin, Patrick ; Unger, Martin ; Asokan, Nadarajah :
Beyond Secure Channels.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007). ACM Press
[Konferenz- oder Workshop-Beitrag], (2007)

Sadeghi, Ahmad-Reza ; Wolf, Christopher ; Stüble, Christian ; Asokan, Nadarajah ; Ekberg, Jan-Erik :
Enabling Fairer Digital Rights Management with Trusted Computing.
In: 10th International Conference on Information Security (ISC 2007). In: LNCS , 4779 . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2007)

Sadeghi, Ahmad-Reza ; Katzenbeisser, Stefan ; Skoric, Boris ; Celik, Mehmet :
Combining Tardos Fingerprinting Codes and Fingercasting.
In: 9th International Workshop on Information Hiding (IH 2007). In: LNCS , 4567 . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2007)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark :
Browser Models for Usable Authentication Protocols.
In: IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07).
[Konferenz- oder Workshop-Beitrag], (2007)

Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Gröbert, Felix ; Birk, Dominik :
Phishing Phishers - Observing and Tracing Organized Cybercrime.
In: Second International Conference on Internet Monitoring and Protection (ICIMP 2007). IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2007)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich :
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
In: Transactions on Data Hiding and Multimedia Security II. In: LNCS , 4499 . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2007)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark :
Browser-based Authentication Protocols for Naive Users.
In: Western European Workshop on Research in Cryptology (WEWoRC 2007).
[Konferenz- oder Workshop-Beitrag], (2007)

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark ; Escalante, Alberto :
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
In: 11th International Conference on Financial Cryptography and Data Security (FC 2007). In: LNCS , 4886 . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2007)

Sadeghi, Ahmad-Reza ; Stüble Christian, Hans ; Ramasamy, Hari Govind ; Schulz, Stefan ; Schunter, Matthias :
Enhancing Grid Security Using Trusted Virtualization.
In: 4th International Conference on Autonomic and Trusted Computing (ATC 2007). In: LNCS , 4610 . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2007)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Winandy, Marcel :
Trusted User-Aware Web Authentication.
In: Workshop on Trustworthy User Interfaces for Passwords and Personal Information (TIPPI'07),.
[Konferenz- oder Workshop-Beitrag], (2007)

Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Selhorst, Marcel ; Stüble, Christian ; Winandy, Marcel :
TCG Inside? - A Note on TPM Specification Compliance.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC). ACM Press
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich :
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
In: 11th Australasian Conference on Information Security and Privacy (ACISP 2006). In: LNCS , 4058 . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Manulis, Mark :
Property-based Taming Lying Mobile Nodes.
In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006).
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Manulis, Mark :
Property-based Taming Lying Mobile Node.
In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006).
[Konferenz- oder Workshop-Beitrag], (2006)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Manulis, Mark :
Linkable Democratic Group Signatures.
In: 2nd Information Security Practice and Experience Conference (ISPEC 2006).
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Wolf, Marko ; Scheibel, Michael :
Play it once again, Sam - Enforcing Stateful Licenses on Open Platforms.
In: The Second Workshop on Advances in Trusted Computing (WATC '06 Fall).
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Manulis, Mark :
Key Agreement for Heterogeneous Ad-Hoc Groups.
In: International Journal of Wireless and Mobile Computing (IJWMC).
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Manulis, Mark :
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
In: Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing).
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Paar, Christof ; Lemke, Kerstin :
Physical Security Bounds Against Tampering.
In: International Conference on Applied Cryptography and Network Security (ACNS 2006).
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Paar, Christof ; Carluccio, Dario ; Lemke-Rust, Kerstin :
E-Passport: The Global Traceability or How to Feel Like an UPS Package.
In: Workshop on RFID Security 2006.
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus :
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
In: Transactions on Data Hiding and Multimedia Security.
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich :
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.

[Monograph], (2006)

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Scheibel, Michael :
Design and Implementation of a Secure Linux Device Encryption Architecture.
In: LinuxTag.
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzebeisser, Stefan :
A Computational Model for Watermark Robustness.
In: Information Hiding Workshop.
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Huber, Ulrich :
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
Horst Görtz Institut
[Monograph], (2006)

Sadeghi, Ahmad-Reza ; Huber, Ulrich :
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
In: 9th Information Security Conference (ISC 2006). In: LNCS , 4173 . Springer
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Gajek, Sebastian :
Client Authentication in Federations Using a Security Mode.
In: Toward a More Secure Web - W3C Workshop on Usability and Transparency of Web Authentication..
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Alkassar, Ammar ; Scheibel, Michael :
Security Architecture for Device Encryption and VPN.
In: Information Security Solution Europe (ISSE06).
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Stüble Christian, Hans ; Chen, Liquen ; Landfermann, Rainer ; Rohe, Markus :
A Protocol for Property-Based Attestation.
In: First ACM Workshop on Scalable Trusted Computing (STC'06).
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich :
Property-Based Broadcast Encryption for Multi-level Security Policies.
In: 8th International Conference on Information Security and Cryptology (ICISC 2005). In: LNCS , 3935 . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus :
Towards Multilateral Secure Digital Rights Distribution Infrastructures.
In: ACM DRM Workshop'05.
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich :
Embedding Trust into Cars - Secure Software Delivery and Installation.
In: Third Workshop on Embedded Security in Cars (escar 2005).
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Multilaterally Secure Computing Platforms - in your office, car and at home.
In: 1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society.
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Selhorst, Marcel ; Senft, Oska :
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9
[Artikel], (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus :
Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme.
In: 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security.
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Stüble Christian, Ulrich ; Kursawe, Klaus ; Lucks, Stefan :
Secure Data Management in Trusted Computing.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES). In: LNCS , 3659 . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Rupp, Andy ; Bangerter, Endre :
Simplified Hardness Proofs in the Generic Group Model.
In: Western European Workshop on Research in Cryptology (WEWoRC 2005).
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Rohe, Markus ; Camenisch, Jan :
Sokrates - A Compiler Framework for Zero-Knowledge Protocols.
In: Western European Workshop on Research in Cryptology (WEWoRC 2005).
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Alkassar, Ammar ; Stüble, Christian ; Selhorst, Marcel :
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
In: 9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI).
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Towards Multilateral Security On DRM Platforms.
In: First Information Security Practice and Experience Conference (ISPEC 2005).
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich :
Secure Software Delivery and Installation in Embedded Systems.
In: First Information Security Practice and Experience Conference (ISPEC 2005).
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus :
Security Engineering for Zero-knowledge Watermark Detection.
In: Special Session on Media Security (WIAMIS 2005).
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Towards multilaterally secure computing platforms - with open source and trusted computing.
In: Information Security Technical Report, 10 (2) pp. 83-95.
[Artikel], (2005)

Sadeghi, Ahmad-Reza :
Trusted Computing: Whom do we trust? Building Open Multilateral Secure Platforms Based On Trusted Computing.
In: DRM Conference.
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich :
Secure Software Delivery and Installation in Embedded Systems.

[Monograph], (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich
Lemke, Kerstin (ed.) :

Secure Software Delivery and Installation in Embedded Systems.
In: Keine Angabe Springer-Verlag , pp. 27-49.
[Buchkapitel], (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich :
Property-Based Broadcast Encryption for Multi-level Security Policies.
Technische Universität Darmstadt
[Monograph], (2005)

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit :
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
In: Workshop on Secure Web Services (SWS).
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Bas, Patrick ; Barni, Mauro ; Rosa, Alessia De
Katzenbeisser, Stefan (ed.) :

First Summary Report on Asymmetric Watermarking.
In: ECRYPT, Network of Excellence in Cryptology.
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin
Lemke, Kerstin ; Wolf, Marko ; Paar, Christof (eds.) :

Anti-theft Protection: Electronic Immobilizers.
In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications.. Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit :
Browser Model for Security Analysis of Browser-Based Protocols.
In: European Symposium for Research in Computer Science (ESORICS).
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit :
Browser Model for Security Analysis of Browser-Based Protocols.
IBM
[Monograph], (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus :
Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it.
In: ACM Multimedia Systems
[Artikel], (2005)

Sadeghi, Ahmad-Reza ; Chen, Liqun ; Enzmann, Matthias ; Schneider, Markus ; Steiner, Michael :
A Privacy-Protecting Coupon System.
In: Financial Cryptography.
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin :
An Open Approach for Designing Secure Electronic Immobilizers.
In: First Information Security Practice and Experience Conference (ISPEC 2005).
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms.
In: 20th Annual Computer Security Applications Conference (ACSAC).
[Konferenz- oder Workshop-Beitrag], (2004)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Property-based Attestation for Computing Platforms: Caring about policies, not mechanisms.
In: New Security Paradigm Workshop (NSPW).
[Konferenz- oder Workshop-Beitrag], (2004)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Pohlmann, Norbert :
European Multilateral Secure Computing Base - Open Trusted Computing for You and Me.
In: Datenschutz und Datensicherheit (DUD), 9 pp. 548-554.
[Artikel], (2004)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus :
Overcoming the Obstacles of Zero-Knowledge Watermark Detection.
In: ACM Multimedia and Security Workshop. ACM Press
[Konferenz- oder Workshop-Beitrag], (2004)

Sadeghi, Ahmad-Reza ; Günnewig Dirk and R, Kai and Stüble
Koenig, Christian ; Neu­mann, An­dre­as ; Katz­sch­mann, To­bi­as (eds.) :

Trusted Computing Platforms: Zur technischen und industriepolitischen Situation und Vorgehensweise.
In: Vertrauenswürdige Systemumgebungen Technik, Recht und gesellschaftspolitische Implikationen des \"Trusted Computing\". Verlag Recht und Wirtschaft
[Buchkapitel], (2004)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Altmeyer, Oliver ; Selhorst, Marcel
Pau­lus, Sachar ; Pohlmann, Norbert ; Reimer, Helmut (eds.) :

Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004). Vieweg Verlag , pp. 346-361.
[Buchkapitel], (2004)

Sadeghi, Ahmad-Reza ; Alkassar, Ammar :
The Quest for Security in Integrated Networks.
In: 11th International Conference on Telecommunication Systems, Modeling and Analysis.
[Konferenz- oder Workshop-Beitrag], (2003)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzenbeisser, Stefan :
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, 9 (3) pp. 266-278.
[Artikel], (2003)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Taming \"Trusted Computing\" by Operating System Design.
In: 4th International Workshop on Information Security Applications (WISA'03). Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2003)

Sadeghi, Ahmad-Reza ; Alkassar, Ammar ; Stüble, Christian :
Secure Object Identification - or: Solving The Chess Grandmaster Problem.
In: New Security Paradigms Workshop.
[Konferenz- oder Workshop-Beitrag], (2003)

Sadeghi, Ahmad-Reza ; Stüble Christian, Dirk :
Trusted Computing ohne Nebenwirkungen.
In: Datenschutz und Datensicherheit (DUD). Vieweg Verlag , pp. 556-560.
[Buchkapitel], (2003)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Sinn und Unsinn von TCPA und Palladium.
In: c't, 13
[Artikel], (2003)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Schneider, Markus ; Stüble, Christian :
Die digitale Signatur.
In: Digitale Signaturen in der Praxis. AWV Verlag
[Buchkapitel], (2003)

Sadeghi, Ahmad-Reza ; Schneider, Markus :
Electronic Payment Systems.
In: Digital Rights Management. LNCS, 2770. Springer Verlag , pp. 113-137.
[Buchkapitel], (2003)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre :
Advanced Techniques for Dispute Resolving and Authorship Proofs on Digital Works.
In: Security and Watermarking of Multimedia Contents V.
[Konferenz- oder Workshop-Beitrag], (2003)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Bridging the Gap between TCPA/Palladium and Personal Security.
Saar­land Uni­ver­si­ty
[Monograph], (2003)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzenbeisser, Stefan :
Cryptography Meets Watermarking: Detecting Watermarks with Minimal- or Zero-Knowledge Disclosure.
In: XI European Signal Processing Conference. In: XI European Signal Processing Conference , 1
[Konferenz- oder Workshop-Beitrag], (2002)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian :
Final Report on Verification and Assessment.

[Monograph], (2002)

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Steinbrecher, Sandra :
Auctions with Multiple Rounds and Multiple Items.
In: Int. Workshop on Trust and Privacy in Digital Business (DEXA 2002).
[Konferenz- oder Workshop-Beitrag], (2002)

Sadeghi, Ahmad-Reza ; Steiner, Michael :
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference.
In: Eurocrypt. In: LNCS , 2045 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2001)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Geraldy, Alexander ; Pfitzmann, Birgit :
Optimized Self-Synchronizing Mode of Operation.
In: 8th International Workshop on Fast Software Encryption.
[Konferenz- oder Workshop-Beitrag], (2001)

Sadeghi, Ahmad-Reza :
How to Break a Semi-Anonymous Fingerprinting Scheme.
In: Information Hiding: Fourth International Workshop. In: LNCS , 2137 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2001)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre :
Zero-Knowledge Watermark Detection and Proof of Ownership.
In: Information Hiding: Fourth International Workshop. In: LNCS , 2137 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2001)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Pfitzmann, Birgit :
Proving ownership of digital content.
In: 3rd International Workshop, IH �99,. In: LNCS , 1768 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2000)

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit :
Self-escrowed cash against user black-mailing.
In: Fourth Conference on Financial Cryptography (FC�00),. In: LNCS , 1962 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2000)

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit :
Coin-based anonymous fingerprinting.
In: EUROCRYPT �99. In: LNCS , 1599 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (1999)

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit :
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99. Vieweg Verlag , pp. 35-48.
[Buchkapitel], (1999)

T

Tews, Erik ; Weiner, M. ; Massar, M. ; Giese, D. ; Wieser, W. :
Security analysis of a widely deployed locking system.
In:
[Artikel], (2013)

Tews, Erik :
How to enable Live Cloning of Virtual Machines using the Xen Hypervisor.

[Report], (2013)

Thiemert, Stefan ; Nürnberger, Stefan ; Steinebach, Martin ; Zmudzinski, Sascha :
Security of robust audio hashes.
IEEE International Workshop on Information Forensics and Security, WIFS 2009, London, UK
[Konferenz- oder Workshop-Beitrag], (2009)

V

Van Herrewege, Anthony ; Katzenbeisser, Stefan ; Maes, Roel ; Peeters, Roel ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian :
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
In: Financial Cryptography (FC) 2012. In: Lecture Notes in Computer Science (LNCS) , 7397 . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Van Herrewege, Anthony ; Katzenbeisser, Stefan ; Maes, Roel ; Peeters, Roel ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian :
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
In: Lecture Notes in Computer Science (LNCS) , 7397 . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Volkamer, Melanie ; Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Schulz, Stefan :
Enabling the Application of Open Systems like PCs for Online Voting.
In: Frontiers in Electronic Elections — FEE '06, urlhttp://fee.iavoss.org/2006/papers/fee-2006-iavoss-Enablingtheapplicat ionofopensystemslike-PCsforOnlineVoting.pdf.
[Konferenz- oder Workshop-Beitrag], (2006)

W

Wachsmann, Christian ; Sadeghi, Ahmad-Reza:
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions.
Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool Publishers ISBN 9781627055093
[Buch], (2014)

Wachsmann, Christian ; Sadeghi, Ahmad-Reza:
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions.
Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool Publishers ISBN 9781627055093
[Buch], (2014)

Wachsmann, Christian :
Trusted and Privacy-Preserving Embedded Systems.
Technische Universität Darmstadt
[Dissertation]

Werner, M. ; Kaiser, J. ; Hollick, Matthias ; Weingärtner, E. ; Wehrle, K. :
A Blueprint for Switching Between Secure Routing Protocols in Wireless Multihop Networks.
Proceedings of the 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM, D-SPAN Workshop)
[Konferenz- oder Workshop-Beitrag], (2013)

Werthmann, Tim ; Hund, Ralf ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten :
PSiOS: Bring Your Own Privacy & Security to iOS Devices (Distinguished Paper Award).
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013).
[Konferenz- oder Workshop-Beitrag], (2013)

Wachsmann, Christian ; Sadeghi, Ahmad-Reza ; Schulz, Steffen :
Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions.
In: Secure Smart Embedded Devices, Platforms and Applications. Springer , pp. 429-449.
[Buchkapitel], (2012)

Wachsmann, Christian ; Sadeghi, Ahmad-Reza ; Schulz, Steffen :
Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions.
In: Secure Smart Embedded Devices, Platforms and Applications. Springer , pp. 429-449.
[Buchkapitel], (2012)

Z

Zeitouni, Shaza ; Gens, David ; Sadeghi, Ahmad-Reza :
It´s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs.
In: Design Automation Conference (DAC) 2018. In: Design Automation Conference (DAC) 2018
[Konferenz- oder Workshop-Beitrag], (2018)

Zeitouni, Shaza ; Gens, David ; Sadeghi, Ahmad-Reza :
It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs.
In: Design Automation Conference (DAC) 2018
[Konferenz- oder Workshop-Beitrag], (2018)

Zeitouni, Shaza ; Dessouky, Ghada ; Arias, Orlando ; Sullivan, Dean ; Ibrahim, Ahmad ; Jin, Yier ; Sadeghi, Ahmad-Reza :
ATRIUM: Runtime Attestation Resilient Under Memory Attacks.
In: 2017 International Conference On Computer Aided Design (ICCAD'17).
[Konferenz- oder Workshop-Beitrag], (2017)

Zeitouni, Shaza ; Dessouky, Ghada ; Arias, Orlando ; Sullivan, Dean ; Ibrahim, Ahmad ; Jin, Yier ; Sadeghi, Ahmad-Reza :
ATRIUM: Runtime Attestation Resilient Under Memory Attacks.
2017 International Conference On Computer Aided Design (ICCAD'17)
[Konferenz- oder Workshop-Beitrag], (2017)

Zeitouni, Shaza ; Oren, Yossef ; Wachsmann, Christian ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza :
Remanence Decay Side-Channel: The PUF Case.
In: IEEE Transactions on Information Forensics and Security, 99 ISSN 1556-6013
[Artikel], (2016)

Zeitouni, Shaza ; Oren, Yossef ; Wachsmann, Christian ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza :
Remanence Decay Side-Channel: The PUF Case.
In: IEEE Transactions on Information Forensics and Security, 99
[Artikel], (2016)

Diese Liste wurde am Sun May 20 02:30:29 2018 CEST generiert.