TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 37.

Brasser, Ferdinand and Capkun, Srdjan and Dmitrienko, Alexandra and Frassetto, Tommaso and Kostiainen, Kari and Müller, Urs and Sadeghi, Ahmad-Reza :
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.

[Report] , (2017)

Brasser, Ferdinand and Müller, Urs and Dmitrienko, Alexandra and Kostiainen, Kari and Capkun, Srdjan and Sadeghi, Ahmad-Reza :
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT .
[Conference or Workshop Item] , (2017)

Heuser, Stephan and Reaves, Bradley and Pendyala, Praveen Kumar and Carter, Henry and Dmitrienko, Alexandra and Kiyavash, Negar and Enck, William and Sadeghi, Ahmad-Reza and Traynor, Patrick :
Phonion: Practical Protection of Metadata in Telephony Networks.
Proceedings on Privacy Enhancing Technologies (PoPETs)
[Conference or Workshop Item] , (2017)

Dmitrienko, Alexandra :
Security and privacy aspects of mobile platforms and applications security.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4611]
TU Darmstadt
[Ph.D. Thesis], (2015)

Dmitrienko, Alexandra and Heuser, Stephan and Nguyen, Thien Duc and da Silva Ramos, Marcos and Rein, Andre and Sadeghi, Ahmad-Reza :
Market-driven Code Provisioning to Mobile Secure Hardware.
Financial Cryptography and Data Security
[Conference or Workshop Item] , (2015)

Dmitrienko, Alexandra and Liebchen, Christopher and Rossow, Christian and Sadeghi, Ahmad-Reza :
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4)
[Article] , (2014)

Dmitrienko, Alexandra and Liebchen, Christopher and Rossow, Christian and Sadeghi, Ahmad-Reza :
On the (In)Security of Mobile Two-Factor Authentication.
Financial Cryptography and Data Security (FC'14) Springer
[Conference or Workshop Item] , (2014)

Dmitrienko, Alexandra and Noack, David and Sadeghi, Ahmad-Reza and Yung, Moti :
POSTER: On Offline Payments with Bitcoin.
FC'2014: Financial Cryptography and Data Security Conference
[Conference or Workshop Item] , (2014)

Busold, Christoph and Dmitrienko, Alexandra and Wachsmann, Christian :
Key2Share for Authentication Services.
SmartCard Workshop
[Conference or Workshop Item] , (2014)

Nagy, Marcin and Cristofaro, Emiliano De and Dmitrienko, Alexandra and Asokan, N. and Sadeghi, Ahmad-Reza :
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
Annual Computer Security Applications Conference (ACSAC 2013)
[Conference or Workshop Item] , (2013)

Asokan, N. and Davi, Lucas and Dmitrienko, Alexandra and Heuser, Stephan and Kostiainen, Kari and Reshetova, Elena and Sadeghi, Ahmad-Reza:
Mobile Platform Security.
Synthesis Lectures on Information Security, Privacy, and Trust, 4 (3). Morgan & Claypool
[Book] , (2013)

Snow, Kevin and Davi, Lucas and Dmitrienko, Alexandra and Liebchen, Christopher and Monrose, Fabian and Sadeghi, Ahmad-Reza :
Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same.
BlackHat USA
[Conference or Workshop Item] , (2013)

Asokan, N. and Dmitrienko, Alexandra and Nagy, Marcin and Reshetova, Elena and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stelle, Stanislaus :
CrowdShare: Secure Mobile Resource Sharing.
11. International Conference on Applied Cryptography and Network Security (ACNS'13) Springer
[Conference or Workshop Item] , (2013)

Davi, Lucas and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza :
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)
[Conference or Workshop Item] , (2013)

Snow, Kevin and Davi, Lucas and Dmitrienko, Alexandra and Liebchen, Christopher and Monrose, Fabian and Sadeghi, Ahmad-Reza :
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (Best Student Paper Award).
34th IEEE Symposium on Security and Privacy (Oakland 2013)
[Conference or Workshop Item] , (2013)

Busold, Christoph and Dmitrienko, Alexandra and Seudié, Hervé and Taha, Ahmed and Sobhani, Majid and Wachsmann, Christian and Sadeghi, Ahmad-Reza :
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: CODASPY '13 . ACM Press
[Conference or Workshop Item] , (2013)

Davi, Lucas and Dmitrienko, Alexandra and Liebchen, Christopher and Sadeghi, Ahmad-Reza :
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
BlackHat Abu Dhabi
[Conference or Workshop Item] , (2012)

Davi, Lucas and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza :
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012)
[Conference or Workshop Item] , (2012)

Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Tamrakar, Sandeep and Wachsmann, Christian :
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
In: Lecture Notes in Computer Science (LNCS) , 7344 . Springer
[Conference or Workshop Item] , (2012)

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza :
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
19th Annual Network & Distributed System Security Symposium (NDSS)
[Conference or Workshop Item] , (2012)

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza and Shastry, Bhargava :
Towards Taming Privilege-Escalation Attacks on Android.
19th Annual Network & Distributed System Security Symposium (NDSS)
[Conference or Workshop Item] , (2012)

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza :
POSTER: Control-Flow Integrity for Smartphones.
18th ACM Conference on Computer and Communications Security (CCS'11) ACM
[Conference or Workshop Item] , (2011)

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza and Shastry, Bhargava :
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
18th ACM Conference on Computer and Communications Security (CCS'11) ACM
[Conference or Workshop Item] , (2011)

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Heuser, Stephan and Sadeghi, Ahmad-Reza and Shastry, Bhargava :
Practical and Lightweight Domain Isolation on Android.
Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM) ACM Press
[Conference or Workshop Item] , (2011)

Davi, Lucas and Dmitrienko, Alexandra and Kowalski, Christoph and Winandy, Marcel :
Trusted Virtual Domains on OKL4: Secure Information Sharing on Smartphones.
Proceedings of the 6th ACM Workshop on Scalable Trusted Computing (STC) ACM Press
[Conference or Workshop Item] , (2011)

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza :
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.

[Report] , (2011)

Dmitrienko, Alexandra and Hadzic, Zecir and Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel :
A Security Architecture for Accessing Health Records on Mobile Phones.
HEALTHINF'2011: Proceedings of the 4th International Conference on Health Informatics
[Conference or Workshop Item] , (2011)

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza :
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED). Leuven, Belgium
[Book Section] , (2011)

Dmitrienko, Alexandra and Hadzic, Zecir and Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel :
Securing the Access to Electronic Health Records on Mobile Phones.
Biomedical Engineering Systems and Technologies
[Conference or Workshop Item] , (2011)

Dmitrienko, Alexandra and Gessner, Dennis and Sadeghi, Ahmad-Reza and Schulz, Steffen and Stüble, Christian and Ullmann, Markus :
Trusted embedded System Operating System (TeSOS) - Study and Design.

[Other] , (2011) (Unpublished)

Bugiel, Sven and Dmitrienko, Alexandra and Kostiainen, Kari and Sadeghi, Ahmad-Reza and Winandy, Marcel :
TruWalletM: Secure Web Authentication on Mobile Platforms.
Proceedings of INTRUST 2010 The Second International Conference on Trusted Systems
[Conference or Workshop Item] , (2010)

Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Winandy, Marcel :
Privilege Escalation Attacks on Android.
ISC 2010: Proceedings of the 13th Information Security Conference
[Conference or Workshop Item] , (2010)

Checkoway, Stephen and Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Shacham, Hovav and Winandy, Marcel :
Return-Oriented Programming without Returns.
In: CCS '10 . ACM
[Conference or Workshop Item] , (2010)

Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Winandy, Marcel :
Return-Oriented Programming without Returns on ARM.

[Report] , (2010)

Kostiainen, Kari and Dmitrienko, Alexandra and Ekberg, Jan-Erik and Sadeghi, Ahmad-Reza and Asokan, N. :
Key Attestation from Trusted Execution Environments.
TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing
[Conference or Workshop Item] , (2010)

Catuogno, Luigi and Dmitrienko, Alexandra and Eriksson, Konrad and Kuhlmann, Dirk and Ramunno, Gianluca and Sadeghi, Ahmad-Reza and Schulz, Steffen and Schunter, Matthias and Winandy, Marcel and Zhan, Jing :
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
International Conference on Trusted Systems (INTRUST) Springer
[Conference or Workshop Item] , (2009)

Dmitrienko, Alexandra :
Zigbee-to-tcp/ip gateway: New opportunities for ZigBee-based sensor networks.
6th International Workshop on Ambient Intelligence and Embedded Systems
[Conference or Workshop Item] , (2007)

This list was generated on Sat Apr 20 02:22:40 2019 CEST.