TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 38.

Brasser, Ferdinand and Capkun, Srdjan and Dmitrienko, Alexandra and Frassetto, Tommaso and Kostiainen, Kari and Sadeghi, Ahmad-Reza (2019):
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization.
In: ACSAC - 35th Annual Computer Security Applications Conference, San Juan, Puerto Rico, December 9-13, [Conference or Workshop Item]

Brasser, Ferdinand and Capkun, Srdjan and Dmitrienko, Alexandra and Frassetto, Tommaso and Kostiainen, Kari and Müller, Urs and Sadeghi, Ahmad-Reza (2017):
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
[Report]

Brasser, Ferdinand and Müller, Urs and Dmitrienko, Alexandra and Kostiainen, Kari and Capkun, Srdjan and Sadeghi, Ahmad-Reza (2017):
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: 11th USENIX Workshop on Offensive Technologies, In: WOOT, [Conference or Workshop Item]

Heuser, Stephan and Reaves, Bradley and Pendyala, Praveen Kumar and Carter, Henry and Dmitrienko, Alexandra and Kiyavash, Negar and Enck, William and Sadeghi, Ahmad-Reza and Traynor, Patrick (2017):
Phonion: Practical Protection of Metadata in Telephony Networks.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), [Conference or Workshop Item]

Dmitrienko, Alexandra (2015):
Security and privacy aspects of mobile platforms and applications security.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4611],
[Ph.D. Thesis]

Dmitrienko, Alexandra and Heuser, Stephan and Nguyen, Thien Duc and da Silva Ramos, Marcos and Rein, Andre and Sadeghi, Ahmad-Reza (2015):
Market-driven Code Provisioning to Mobile Secure Hardware.
In: Financial Cryptography and Data Security, [Conference or Workshop Item]

Dmitrienko, Alexandra and Liebchen, Christopher and Rossow, Christian and Sadeghi, Ahmad-Reza (2014):
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18, (4), [Article]

Dmitrienko, Alexandra and Liebchen, Christopher and Rossow, Christian and Sadeghi, Ahmad-Reza (2014):
On the (In)Security of Mobile Two-Factor Authentication.
In: Financial Cryptography and Data Security (FC'14), Springer, [Conference or Workshop Item]

Dmitrienko, Alexandra and Noack, David and Sadeghi, Ahmad-Reza and Yung, Moti (2014):
POSTER: On Offline Payments with Bitcoin.
In: FC'2014: Financial Cryptography and Data Security Conference, [Conference or Workshop Item]

Busold, Christoph and Dmitrienko, Alexandra and Wachsmann, Christian (2014):
Key2Share for Authentication Services.
In: SmartCard Workshop, [Conference or Workshop Item]

Nagy, Marcin and Cristofaro, Emiliano De and Dmitrienko, Alexandra and Asokan, N. and Sadeghi, Ahmad-Reza (2013):
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
In: Annual Computer Security Applications Conference (ACSAC 2013), New Orleans, Loouisiana, USA, [Conference or Workshop Item]

Asokan, N. and Davi, Lucas and Dmitrienko, Alexandra and Heuser, Stephan and Kostiainen, Kari and Reshetova, Elena and Sadeghi, Ahmad-Reza (2013):
Mobile Platform Security.
Morgan & Claypool, In: Synthesis Lectures on Information Security, Privacy, and Trust, 4, DOI: 10.2200/S00555ED1V01Y201312SPT009,
[Book]

Snow, Kevin and Davi, Lucas and Dmitrienko, Alexandra and Liebchen, Christopher and Monrose, Fabian and Sadeghi, Ahmad-Reza (2013):
Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same.
In: BlackHat USA, [Conference or Workshop Item]

Asokan, N. and Dmitrienko, Alexandra and Nagy, Marcin and Reshetova, Elena and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stelle, Stanislaus (2013):
CrowdShare: Secure Mobile Resource Sharing.
Springer, In: 11. International Conference on Applied Cryptography and Network Security (ACNS'13), ISSN 0302-9743,
DOI: 10.1007/978-3-642-38980-1_27,
[Online-Edition: https://encrypto.de/papers/ADNRSSS13.pdf],
[Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2013):
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), [Conference or Workshop Item]

Snow, Kevin and Davi, Lucas and Dmitrienko, Alexandra and Liebchen, Christopher and Monrose, Fabian and Sadeghi, Ahmad-Reza (2013):
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (Best Student Paper Award).
In: 34th IEEE Symposium on Security and Privacy (Oakland 2013), [Conference or Workshop Item]

Busold, Christoph and Dmitrienko, Alexandra and Seudié, Hervé and Taha, Ahmed and Sobhani, Majid and Wachsmann, Christian and Sadeghi, Ahmad-Reza (2013):
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, ACM Press, San Antonio, Texas, USA, In: CODASPY '13, ISBN 978-1-4503-1890-7,
DOI: 10.1145/2435349.2435382,
[Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2012):
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
In: BlackHat Abu Dhabi, [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2012):
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012), [Conference or Workshop Item]

Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Tamrakar, Sandeep and Wachsmann, Christian (2012):
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
In: International Conference on Trust & Trustworthy Computing (TRUST), Springer, In: Lecture Notes in Computer Science (LNCS), 7344, [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2012):
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
In: 19th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza and Shastry, Bhargava (2012):
Towards Taming Privilege-Escalation Attacks on Android.
In: 19th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2011):
POSTER: Control-Flow Integrity for Smartphones.
In: 18th ACM Conference on Computer and Communications Security (CCS'11), ACM, [Conference or Workshop Item]

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza and Shastry, Bhargava (2011):
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
In: 18th ACM Conference on Computer and Communications Security (CCS'11), ACM, [Conference or Workshop Item]

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Heuser, Stephan and Sadeghi, Ahmad-Reza and Shastry, Bhargava (2011):
Practical and Lightweight Domain Isolation on Android.
In: Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM), ACM Press, [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Kowalski, Christoph and Winandy, Marcel (2011):
Trusted Virtual Domains on OKL4: Secure Information Sharing on Smartphones.
In: Proceedings of the 6th ACM Workshop on Scalable Trusted Computing (STC), ACM Press, [Conference or Workshop Item]

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza (2011):
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.
(TR-2011-04), [Report]

Dmitrienko, Alexandra and Hadzic, Zecir and Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
A Security Architecture for Accessing Health Records on Mobile Phones.
In: HEALTHINF'2011: Proceedings of the 4th International Conference on Health Informatics, Rome, Italy, [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2011):
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED), [Book Section]

Dmitrienko, Alexandra and Hadzic, Zecir and Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
Securing the Access to Electronic Health Records on Mobile Phones.
In: Biomedical Engineering Systems and Technologies, [Conference or Workshop Item]

Dmitrienko, Alexandra and Gessner, Dennis and Sadeghi, Ahmad-Reza and Schulz, Steffen and Stüble, Christian and Ullmann, Markus (2011):
Trusted embedded System Operating System (TeSOS) - Study and Design.
[Other]

Bugiel, Sven and Dmitrienko, Alexandra and Kostiainen, Kari and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
TruWalletM: Secure Web Authentication on Mobile Platforms.
In: Proceedings of INTRUST 2010 The Second International Conference on Trusted Systems, [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Privilege Escalation Attacks on Android.
In: ISC 2010: Proceedings of the 13th Information Security Conference, Boca Raton, Florida, USA, [Conference or Workshop Item]

Checkoway, Stephen and Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Shacham, Hovav and Winandy, Marcel (2010):
Return-Oriented Programming without Returns.
In: Proceedings of the 17th ACM conference on Computer and communications security, ACM, Chicago, Illinois, USA, In: CCS '10, ISBN 978-1-4503-0245-6,
DOI: http://doi.acm.org/10.1145/1866307.1866370,
[Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Return-Oriented Programming without Returns on ARM.
(HGI-TR-2010-002), [Report]

Kostiainen, Kari and Dmitrienko, Alexandra and Ekberg, Jan-Erik and Sadeghi, Ahmad-Reza and Asokan, N. (2010):
Key Attestation from Trusted Execution Environments.
In: TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, Berlin, [Conference or Workshop Item]

Catuogno, Luigi and Dmitrienko, Alexandra and Eriksson, Konrad and Kuhlmann, Dirk and Ramunno, Gianluca and Sadeghi, Ahmad-Reza and Schulz, Steffen and Schunter, Matthias and Winandy, Marcel and Zhan, Jing (2009):
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
In: International Conference on Trusted Systems (INTRUST), Springer, [Conference or Workshop Item]

Dmitrienko, Alexandra (2007):
Zigbee-to-tcp/ip gateway: New opportunities for ZigBee-based sensor networks.
In: 6th International Workshop on Ambient Intelligence and Embedded Systems, [Conference or Workshop Item]

This list was generated on Sat Oct 12 02:02:18 2019 CEST.