TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 445.

Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Möllering, Helen ; Nguyen, Thien Duc ; Rieger, Phillip ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Yalame, Mohammad Hossein ; Zeitouni, Shaza (2021):
SAFELearn: Secure Aggregation for private FEderated Learning.
4th Deep Learning and Security Workshop (DLS'21), virtual Conference, 27.05.2021, [Conference or Workshop Item]

Nguyen, Thien Duc ; Rieger, Phillip ; Yalame, Mohammad Hossein ; Möllering, Helen ; Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2021):
FLGUARD: Secure and Private Federated Learning.
In: arXiv-Computer Science, In: Crytography and Security, (Preprint), [Article]

Bahmani, Raad ; Brasser, Ferdinand ; Dessouky, Ghada ; Jauernig, Patrick ; Klimmek, Matthias ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2021):
CURE: A Security Architecture with CUstomizable and Resilient Enclaves.
30th USENIX Security Symposium (USENIX Security'21), Vancouver, Canada, 11.-13.08., [Conference or Workshop Item]

Chen, Yanjiao ; Bai, Yijie ; Wang, Kaibo ; Mitev, Richard ; Xu, Wenyuan ; Sadeghi, Ahmad-Reza (2021):
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants.
ACM Conference on Computer and Communications Security (CCS), virtual Conference, 15.-19.11.2021, [Conference or Workshop Item]

Zeitouni, Shaza ; Dessouky, Ghada ; Sadeghi, Ahmad-Reza (2021):
SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities.
6th IEEE European Symposium on Security and Privacy (Euro S&P 2021), virtual Conference, 06.-10.09.2021, [Conference or Workshop Item]

Zeitouni, Shaza ; Vliegen, Jo ; Frassetto, Tommaso ; Koch, Dirk ; Sadeghi, Ahmad-Reza ; Mentens, Nele (2021):
Trusted Configuration in Cloud FPGAs.
29th IEEE International Symposium on Field-Programmable Custom Computing Machines, virtual Conference, 09.-12.05.2021, [Conference or Workshop Item]

Baumgärtner, Lars ; Dmitrienko, Alexandra ; Freisleben, Bernd ; Gruler, Alexander ; Höchst, Jonas ; Kühlberg, Joshua ; Mezini, Mira ; Mitev, Richard ; Miettinen, Markus ; Muhamedagic, Anel ; Nguyen, Thien Duc ; Penning, Alvar ; Pustelnik, Frederik ; Roos, Filipp ; Sadeghi, Ahmad-Reza ; Schwarz, Michael ; Uhl, Christian (2020):
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps.
In: Proceedings : 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 458-467,
IEEE, TrustCom 2020, virtual Conference, 29.12.2020-01.01.2021, ISBN 978-0-7381-4380-4,
[Conference or Workshop Item]

Nguyen, Thien Duc ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2020):
Long Live Randomization: On Privacy-Preserving Contact Tracing in Pandemic.
In: MTD'20: Proceedings of the 7th ACM Workshop on Moving Target Defense,
ACM, CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, virtual Conference, 09.-13.11.2020, ISBN 978-1-4503-8085-0,
DOI: 10.1145/3411496.3421229,
[Conference or Workshop Item]

Buchmann, Johannes ; Dessouky, Ghada ; Frassetto, Tommaso ; Kiss, Ágnes ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Traverso, Giulia ; Zeitouni, Shaza (2020):
SAFE: A Secure and Efficient Long-Term Distributed Storage System.
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20), Taipei, Taiwan, June 1-5, 2020, [Conference or Workshop Item]

Neureither, Jens ; Dmitrienko, Alexandra ; Koisser, David ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2020):
LegIoT: Ledgered Trust Management Platform for IoT.
In: Lecture Notes in Computer Science, 12308, In: Computer Security - ESORICS 2020, pp. 377-396,
Springer, 25th European Symposium on Research in Computer Security, virtual Conference, 14.-18.09.2020, ISBN 978-3-030-58950-9,
DOI: 10.1007/978-3-030-58951-6_19,
[Conference or Workshop Item]

Cammarota, Rosario ; Schunter, Matthias ; Rajan, Anand ; Boemer, Fabian ; Kiss, Ágnes ; Treiber, Amos ; Weinert, Christian ; Schneider, Thomas ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza ; Demmler, Daniel ; Chen, Huili ; Hussain, Siam Umar ; Riazi, M. Sadegh ; Koushanfar, Farinaz ; Gupta, Saransh ; Rosing, Simunic (2020):
Trustworthy AI Inference Systems: An Industry Research View.
In: arXiv/Computer Science/Cryptography and Security, Version 1, [Report]

Dessouky, Ghada ; Frassetto, Tommaso ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza (2020):
With Great Complexity Comes Great Vulnerability: Challenges of Secure Processor Design.
In: IEEE Security & Privacy, IEEE, ISSN 1540-7993,
DOI: 10.1109/MSEC.2020.2994978,
[Article]

Dessouky, Ghada ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
Enclave Computing on RISC-V: A Brighter Future for Security?
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020, Boston, USA, 5.-7. April, 2020, [Conference or Workshop Item]

Bayerl, Sebastian P. ; Frassetto, Tommaso ; Jauernig, Patrick ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Weinert, Christian (2020):
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20), Grenoble, France, 09. – 13. March 2020, [Conference or Workshop Item]

Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
Trusted Execution Environments: Properties, Applications, and Challenges.
In: IEEE Security & Privacy, 18 (2), pp. 56-60. IEEE, e-ISSN 1558-4046,
DOI: 10.1109/MSEC.2019.2947124,
[Article]

Adepu, Sridhar ; Brasser, Ferdinand ; Garcia, Luis ; Rodler, Michael ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Zonouz, Saman A. (2020):
Control Behavior Integrity for Distributed Cyber-Physical Systems.
In: 2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS), pp. 1-15,
k. A., ACM/IEEE, 11th International Conference on Cyber-Physical Systems (ICCPS), Sydney, Australia, 22.-24. April, 2020, ISBN 978-1-7281-5501-2,
DOI: 10.1109/ICCPS48487.2020.00011,
[Conference or Workshop Item]

Dessouky, Ghada ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2020):
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.
In: USENIX Security,
k.A., USENIX Association, 29th USENIX Security Syposium, Boston, MA, USA, 12.-14.08.2020, [Conference or Workshop Item]

Dessouky, Ghada ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
INVITED: AI Utopia or Dystopia - On Securing AI Platforms.
DAC'20-Design Automation Conference 2020, virtual Conference, 20.-24.07., [Conference or Workshop Item]

Mitev, Richard ; Pazii, Anna ; Miettinen, Markus ; Enck, William ; Sadeghi, Ahmad-Reza (2020):
LeakyPick: IoT Audio Spy Detector.
In: ICPS Proceedings, In: ACSAC '20: Annual Computer Security Applications Conference, pp. 694-705,
ACM, 36th Annual Computer Security Applications Conference, virtual Conference, 07.-11.12.2020, ISBN 978-1-4503-8858-0,
DOI: 10.1145/3427228.3427277,
[Conference or Workshop Item]

Zeitouni, Shaza ; Stapf, Emmanuel ; Fereidooni, Hossein ; Sadeghi, Ahmad-Reza (2020):
On the Security of Strong Memristor-based Physically Unclonable Functions.
Design Automation Conference 2020, virtual Conference, 19.-22.07., [Conference or Workshop Item]

Acar, Abbas ; Fereidooni, Hossein ; Abera, Tigist ; Sikder, Amit Kumsr ; Miettinen, Markus ; Aksu, Hidayet ; Conti, Mauro ; Sadeghi, Ahmad-Reza (2020):
Peek-a-Boo: I see your smart home activities, even encrypted!
pp. 207-218, WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, July 08.-10., 2020, [Conference or Workshop Item]

Nguyen, Thien Duc ; Rieger, Phillip ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2020):
Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System.
Workshop on Decentralized IoT Systems and Security (DISS) @ NDSS Symposium 2020, San Diego, USA, 23.-26.02. 2020, [Conference or Workshop Item]

Kenjar, Zijo ; Frassetto, Tommaso ; Gens, David ; Franz, Michael ; Sadeghi, Ahmad-Reza (2020):
V0LTpwn: Attacking x86 Processor Integrity from Software.
29th USENIX Security Symposium, Boston, USA, August 12–14, 2020, [Conference or Workshop Item]

Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza (2019):
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization.
ACSAC - 35th Annual Computer Security Applications Conference, San Juan, Puerto Rico, December 9-13, [Conference or Workshop Item]

Dessouky, Ghada ; Zeitouni, Shaza ; Ibrahim, Ahmad ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2019):
CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems.
New York, IEEE, 2019 International Conference On Computer Aided Design (ICCAD), The Westin Westminster Westminster, CO, 4.-7. November 2019, [Conference or Workshop Item]

Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Conference or Workshop Item]

Ghaeini, Hamid Reza ; Chan, Matthew ; Bahmani, Raad ; Brasser, Ferdinand ; Garcia, Luis ; Zhou, Jianying ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole ; Zonouz, Saman A. (2019):
PAtt: Physics-based Attestation of Control Systems.
Beijing, 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Beijing, 23. - 25.09.2019, [Conference or Workshop Item]

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostáková, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Conference or Workshop Item]

Paverd, Andrew ; Völp, Marcus ; Brasser, Ferdinand ; Schunter, Matthias ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Esteves-Verissimo, Paulo ; Steininger, Andreas ; Holz, Thorsten (2019):
Sustainable Security & Safety: Challenges and Opportunities.
Stuttgart, 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS), Stuttgart, 09.07.2019, DOI: 10.4230/OASIcs.CERTS.2019.4,
[Conference or Workshop Item]

Bock, Carsten ; Brasser, Ferdinand ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2019):
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
Auckland, ACM Asia Conference on Computer and Communications Security (AsiaCCS), Auckland, 07. - 12.07.2019, DOI: 10.1145/3321705.3329827,
[Conference or Workshop Item]

Mitev, Richard ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2019):
Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants.
ACM, ASIACCS 2019, Auckland, New Zealand, Juli 2019, DOI: 10.1145/3321705.3329842,
[Conference or Workshop Item]

Songhori, Ebrahim ; Riazi, M. Sadegh ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2019):
ARM2GC: Succinct Garbled Processor for Secure Computation.
Las Vegas, USA, Design Automation Conference (DAC), 2019 56th ACM/EDAC/IEEE, Las Vegas, USA, June, 2.-6., [Conference or Workshop Item]

Marchal, Samuel ; Miettinen, Markus ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Asokan, N. (2019):
AuDI: Towards autonomous IoT device-type identification using periodic communications.
In: IEEE Journal on Selected Areas in Communications, IEEE, ISSN 0733-8716,
[Article]

Batina, Lejla ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019):
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
In: Proceedings of the 56th Annual Design Automation Conference 2019,
k.A., ACM, Design Automation Conference 2019, Las Vegas, NV, USA, June 02 - 06, 2019, [Conference or Workshop Item]

Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2019):
HardFails: Insights into Software-Exploitable Hardware Bugs.
28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Conference or Workshop Item]

OConnor, TJ ; Mohamed, Reham ; Miettinen, Markus ; Enck, William ; Reaves, Bradley ; Sadeghi, Ahmad-Reza (2019):
HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices.
Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Miami, FL, USA, [Conference or Workshop Item]

Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Fereidooni, Hossein ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019):
DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
In: The 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019),
[Conference or Workshop Item]

Marchal, Samuel ; Miettinen, Markus ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Asokan, N. (2019):
AUDI: Towards Autonomous IoT Device-Type Identification.
In: IEEE Journal on Selected Areas in Communications (JSAC) on Artificial Intelligence and Machine Learning for Networking and Communications, [Article]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019):
HEALED: HEaling & Attestation for Low-end Embedded Devices.
23rd International Conference Financial Cryptography and Data Security (FC 2019), 2019, [Conference or Workshop Item]

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostakova, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
Cryptology ePrint Archive, Report 2019/154, [Report]

Aschermann, Cornelius ; Frassetto, Tommaso ; Holz, Thorsten ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Teuchert, Daniel (2019):
Nautilus: Fishing for Deep Bugs with Grammars.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Brasser, Ferdinand ; Gens, David ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019):
SANCTUARY: ARMing TrustZone with User-space Enclaves.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Weiser, Samuel ; Werner, Mario ; Brasser, Ferdinand ; Malenko, Maja ; Mangard, Stefan ; Sadeghi, Ahmad-Reza (2019):
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Abera, Tigist ; Bahmani, Raad ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2019):
DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous System.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Mohamed, Reham ; O'Connor, Terrance ; Miettinen, Markus ; Enck, William ; Sadeghi, Ahmad-Reza
Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang (Corporate Creators) (2019):
HONEYSCOPE: IoT Device Protection with Deceptive Network Views,.
In: Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings, [Book Section]

Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019):
HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.
ACM/IEEE, Design Automation Conference (DAC), 2019, [Conference or Workshop Item]

Oliveira Nunes, Ivan de ; Dessouky, Ghada ; Ibrahim, Ahmad ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019):
Towards Systematic Design of Collective Remote Attestation Protocols.
IEEE, The 39th International Conference on Distributed Computing Systems (ICDCS) 2019, Dallas, TX, USA, 7-10 July 2019, ISBN 978-1-7281-2520-6,
DOI: 10.1109/ICDCS.2019.00120,
[Conference or Workshop Item]

Miettinen, Markus ; Sadeghi, Ahmad-Reza (2018):
Internet of things or threats?: on building trust in IoT (keynote). 1:1-1:9.
In: CODES '18 Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis,
Piscataway, NJ, USA, IEEE Press Piscataway, NJ, USA, CODES+ISSS 2018, part of ESWEEK 2018, Torino, Italy, September 30 - October 5, 2018, [Conference or Workshop Item]

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian (2018):
VoiceGuard: Secure and Private Speech Processing.
In: Interspeech 2018, pp. 1303-1307,
International Speech Communication Association (ISCA), DOI: 10.21437/Interspeech.2018-2032,
[Conference or Workshop Item]

Frassetto, Tommaso ; Jauernig, Patrick ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2018):
IMIX: In-Process Memory Isolation EXtension.
In: Proceedings of the 27th USENIX Security Symposium, pp. 83-97,
27th USENIX Security Symposium - Technical Sessions Track 2, Baltimore, MD, USA, 15.-17.08.2018, ISBN 978-1-939133-04-5,
[Conference or Workshop Item]

Carpent, Xavier ; Eldefrawy, Karim ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018):
Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices.
ACM, Design Automation Conference, San Francisco, USA, 2018, June 24-29, [Conference or Workshop Item]

Dessouky, Ghada ; Abera, Tigist ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza (2018):
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution.
37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18), 2018, [Conference or Workshop Item]

Asokan, N. ; Nyman, Thomas ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018):
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems - Special Issue ESWEEK 2018, CASES 2018, CODES + ISSS 2018 and EMSOFT 2018, [Article]

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2018):
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
23rd European Symposium on Research in Computer Security (ESORICS 2018), Barcelona, Spain, 2018, [Conference or Workshop Item]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018):
US-AID: Unattended Scalable Attestation of IoT Devices.
37th IEEE International Symposium on Reliable Distributed Systems (SRDS 2018), 2018, [Conference or Workshop Item]

Schaad, Andreas ; Grohmann, Bjoern ; Winzenried, Oliver ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2018):
Towards a Cloud-based System for Software Protection and Licensing.
In: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2, pp. 698-702,
k.A., SciTePress, Secrypt 2018, Porto, Portugal, 26.-28.07.2018, ISBN 978-989-758-319-3,
DOI: 10.5220/0006899506980702,
[Conference or Workshop Item]

Zeitouni, Shaza ; Gens, David ; Sadeghi, Ahmad-Reza (2018):
It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs.
In: Design Automation Conference (DAC) 2018,
[Conference or Workshop Item]

Miettinen, Markus ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2018):
Revisiting Context-Based Pairing in IoT.
In: Proceedings of the 55th Design Automation Conference (DAC), pp. 32:1-32:6,
ACM, 55th Design Automation Conference (DAC), San Francisco, CA, USA, 24.-29.06. 2018, [Conference or Workshop Item]

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza (2018):
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: AsiaCCS, In: 13th ASIA Conference on Information, Computer and Communications Security,
[Conference or Workshop Item]

Biondo, Andrea ; Conti, Mauro ; Davi, Lucas ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2018):
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
27th USENIX Security Symposium, [Conference or Workshop Item]

Ghaeini, Hamid Reza ; Antonioli, Daniele ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole (2018):
State-Aware Anomaly Detection for Industrial Control Systems.
In: The 33rd ACM/SIGAPP Symposium On Applied Computing (SAC),
Pau, France, DOI: 10.1145/3167132.3167305,
[Conference or Workshop Item]

Gens, David ; Schmitt, Simon ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2018):
K-Miner: Uncovering Memory Corruption in Linux.
In: 25th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Brasser, Ferdinand ; Davi, Lucas ; Dhavlle, Abhijitt ; Frassetto, Tommaso ; Dinakarrao, Sai Manoj Pudukotai ; Rafatirad, Setareh ; Sadeghi, Ahmad-Reza ; Sasan, Avesta ; Sayadi, Hossein ; Zeitouni, Shaza ; Homayoun, Houman (2018):
Advances and Throwbacks in Hardware-assisted Security: Special Session.
In: CASES '18, pp. 15:1-15:10, Piscataway, NJ, USA, IEEE Press, Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems, Piscataway, NJ, USA, ISBN 978-1-5386-5564-1,
[Conference or Workshop Item]

Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Dang, Minh Hoang ; Asokan, N. ; Sadeghi, Ahmad-Reza (2018):
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
In: CoRR, abs/1804.07474, [Article]

Mohan, Sibin ; Asplund, Mikael ; Bloom, Gedare ; Sadeghi, Ahmad-Reza ; Ibrahim, Ahmad ; Salajageh, Negin ; Griffioen, Paul ; Sinopoli, Bruno (2018):
The Future of IoT Security: Special Session.
In: EMSOFT '18, pp. 16:1-16:7, Piscataway, NJ, USA, IEEE Press, International Conference on Embedded Software (EMSOFT 2018), 2018, Piscataway, NJ, USA, ISBN 978-1-5386-5564-1,
[Conference or Workshop Item]

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep (2018):
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
In: IEEE Internet Computing, p. 1. ISSN 1089-7801,
DOI: 10.1109/MIC.2018.182130646,
[Article]

Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2018):
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs.
In: Cryptography and Security, abs/1812.00197, [Article]

Zeitouni, Shaza ; Dessouky, Ghada ; Arias, Orlando ; Sullivan, Dean ; Ibrahim, Ahmad ; Jin, Yier ; Sadeghi, Ahmad-Reza (2017):
ATRIUM: Runtime Attestation Resilient Under Memory Attacks.
In: 2017 International Conference On Computer Aided Design (ICCAD'17),
Irvine, California, US, [Conference or Workshop Item]

Frassetto, Tommaso ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
JITGuard: Hardening Just-in-time Compilers with SGX.
In: 24th ACM Conference on Computer and Communications Security (CCS),
Dallas, TX, USA, ISBN 978-1-4503-4946-8/17/10,
DOI: 10.1145/3133956.3134037,
[Conference or Workshop Item]

Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro (2017):
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
In: Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID),
Atlanta, Georgia, USA, [Conference or Workshop Item]

Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Müller, Urs ; Sadeghi, Ahmad-Reza (2017):
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
[Report]

Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2017):
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
In: 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017),
[Conference or Workshop Item]

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17, In: 26th USENIX Security Symposium,
[Conference or Workshop Item]

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza (2017):
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT, In: 11th USENIX Workshop on Offensive Technologies,
[Conference or Workshop Item]

Fereidooni, Hossein ; Frassetto, Tommaso ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Conti, Mauro (2017):
Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
In: The Second IEEE International Workshop on Safe, Energy-Aware, & Reliable Connected Health (CHASE-SEARCH),
Philadelphia, Pennsylvania, USA, [Conference or Workshop Item]

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza (2017):
HardIDX: Practical and Secure Index with SGX.
In: Conference on Data and Applications Security and Privacy (DBSec),
[Conference or Workshop Item]

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick (2017):
Phonion: Practical Protection of Metadata in Telephony Networks.
In: Proceedings on Privacy Enhancing Technologies (PoPETs),
[Conference or Workshop Item]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza (2017):
SeED: Secure Non-Interactive Attestation for Embedded Devices.
In: 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017),
Boston, USA, [Conference or Workshop Item]

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Frassetto, Tommaso ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu (2017):
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017),
IEEE, Atlanta, GA, USA, DOI: 10.1109/ICDCS.2017.284,
[Conference or Workshop Item]

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu (2017):
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT.
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017),
DOI: 10.1109/ICDCS.2017.283,
[Conference or Workshop Item]

Dessouky, Ghada ; Zeitouni, Shaza ; Nyman, Thomas ; Paverd, Andrew ; Davi, Lucas ; Koeberl, Patrick ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017):
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
54th Design Automation Conference (DAC'17), [Conference or Workshop Item]

Portela, Bernardo ; Barbosa, Manuel ; Scerri, Guillaume ; Warinschi, Bogdan ; Bahmani, Raad ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2017):
Secure Multiparty Computation from SGX.
In: Financial Cryptography and Data Security,
[Conference or Workshop Item]

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed (2017):
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. (2017):
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael (2017):
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17),
Internet Society, DOI: 10.14722/ndss.2017.23097,
[Conference or Workshop Item]

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2017):
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (1), pp. 62-78. De Gruyter Open, DOI: 10.1515/popets-2017-0005,
[Article]

Sullivan, Dean ; Arias, Orlando ; Gens, David ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier (2017):
Execution Integrity with In-Place Encryption.
In: CoRR, abs/1703.02698, [Article]

Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017):
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.
In: Cryptography and Security, abs/1705.10295, [Article]

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
CATT: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
In: Cryptography and Security, [Article]

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
In: Black Hat Europe,
[Conference or Workshop Item]

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Ibrahim, Ahmad ; Conti, Mauro ; Neven, Gregory (2016):
SANA: Secure and Scalable Aggregate Network Attestation.
In: 23rd ACM Conference on Computer and Communications Security (CCS) 2016,
CCS 2016, [Conference or Workshop Item]

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza (2016):
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
In: 23rd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza (2016):
DARPA: Device Attestation Resilient to Physical Attacks.
In: ACM WiSEC 2016,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Dessouky, Ghada (2016):
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
In: ACM WiSec 2016,
[Conference or Workshop Item]

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2016):
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016,
[Conference or Workshop Item]

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza (2016):
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In: The annual Privacy Enhancing Technologies Symposium (PETS),
[Conference or Workshop Item]

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2016):
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
In: 53. Annual Design Automation Conference (DAC'16), pp. 73:1-73:6,
ACM, DOI: 10.1145/2897937.2898027,
[Conference or Workshop Item]

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Regulating ARM TrustZone Devices in Restricted Spaces.
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys),
[Conference or Workshop Item]

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
In: 53rd Design Automation Conference (DAC),
[Conference or Workshop Item]

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael (2016):
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
In: USENIX Annual Technical Conference (ATC),
[Conference or Workshop Item]

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza (2016):
Things, Trouble, Trust: On Building Trust in IoT Systems.
In: 53rd Design Automation Conference (DAC),
[Conference or Workshop Item]

McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh (2016):
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, 104 (5), pp. 1039-1057. DOI: 10.1109/JPROC.2015.2512235,
[Article]

Zeitouni, Shaza ; Oren, Yossef ; Wachsmann, Christian ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2016):
Remanence Decay Side-Channel: The PUF Case.
In: IEEE Transactions on Information Forensics and Security, 99, DOI: TIFS.2015.2512534,
[Article]

Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Leakage-Resilient Layout Randomization for Mobile Devices.
In: 23rd Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016):
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
In: Financial Crypto 2016,
[Conference or Workshop Item]

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016):
Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
[Report]

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
In: 53rd Design Automation Conference (DAC),
[Conference or Workshop Item]

Miettinen, Markus ; Huang, Jialin ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2016):
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
In: Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16),
Darmstadt, Germany, [Conference or Workshop Item]

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: DAC '16, In: Proceedings of the 53nd Annual Design Automation Conference,
ACM, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Armknecht, Frederik (2016):
Towards a Unified Security Model for Physically Unclonable Functions.
In: CT-RSA - Cryptographers' Track at the RSA Conference,
[Conference or Workshop Item]

Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael (2015):
Automated Software Diversity.
In: Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool, DOI: 10.2200/S00686ED1V01Y201512SPT014,
[Book]

Davi, Lucas ; Sadeghi, Ahmad-Reza (2015):
Building Secure Defenses Against Code-Reuse Attacks.
Cham, Springer International Publishing, ISBN 978-3-319-25544-6,
DOI: 10.1007/978-3-319-25546-0,
[Book]

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2015):
Automated Synthesis of Optimized Circuits for Secure Computation.
In: 22. ACM Conference on Computer and Communications Security (CCS'15), pp. 1504-1517,
ACM, DOI: 10.1145/2810103.2813678,
[Conference or Workshop Item]

Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael (2015):
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza (2015):
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015):
SEDA: Scalable Embedded Device Attestation.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015):
Return to Where? You Can't Exploit What You Can't Find.
In: Blackhat USA,
[Conference or Workshop Item]

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015):
SEDA - Technical Report.
[Report]

Songhori, Ebrahim ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2015):
Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis.
In: 52nd Design Automation Conference (DAC),
[Conference or Workshop Item]

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension.
In: 52nd Design Automation Conference (DAC),
[Conference or Workshop Item]

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension (Best Paper Award).
In: 52nd Design Automation Conference (DAC),
[Conference or Workshop Item]

Nagy, Marcin ; Bui, Thanh Phong ; Cristofaro, Emiliano De ; Asokan, N. ; Ott, Jörg ; Sadeghi, Ahmad-Reza (2015):
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
In: ACM WiSEC 2015,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Waidner, Michael (2015):
Security and Privacy Challenges in Industrial Internet of Things.
In: 52nd Design Automation Conference (DAC) Research,
[Conference or Workshop Item]

Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2015):
TyTAN: Tiny Trust Anchor for Tiny Devices.
In: 52nd Design Automation Conference (DAC) 2015,
[Conference or Workshop Item]

Schuster, Felix ; Tendyck, Thomas ; Liebchen, Christopher ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten (2015):
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
In: 36th IEEE Symposium on Security and Privacy (Oakland),
[Conference or Workshop Item]

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015):
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
In: 36th IEEE Symposium on Security and Privacy (Oakland),
[Conference or Workshop Item]

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2015):
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
In: 36. IEEE Symposium on Security and Privacy (IEEE S&P'15), pp. 411-428,
IEEE, DOI: 10.1109/SP.2015.32,
[Conference or Workshop Item]

Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza (2015):
XiOS: Extended Application Sandboxing on iOS.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015),
[Conference or Workshop Item]

Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian (2015):
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
In: 22nd Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Dmitrienko, Alexandra ; Heuser, Stephan ; Nguyen, Thien Duc ; Ramos, Marcos da Silva ; Rein, Andre ; Sadeghi, Ahmad-Reza (2015):
Market-driven Code Provisioning to Mobile Secure Hardware.
In: Financial Cryptography and Data Security,
[Conference or Workshop Item]

Busold, Christoph ; Heuser, Stephan ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah (2015):
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
In: Financial Cryptography and Data Security,
[Conference or Workshop Item]

Miettinen, Markus ; Asokan, N. ; Koushanfar, Farinaz ; Nguyen, Thien Duc ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Sobhani, Majid ; Yellapantula, Sudha (2015):
I know where you are: Proofs of Presence resilient to malicious provers.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015),
[Conference or Workshop Item]

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep (2015):
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices.
In: CoRR, abs/1511.02119, [Article]

Sadeghi, Ahmad-Reza ; Davi, Lucas ; Larsen, Per (2015):
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? - Keynote -.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015),
[Conference or Workshop Item]

Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2014):
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions.
In: Synthesis Lectures on Information Security, Privacy, and Trust, 12, San Rafael, Morgan & Claypool Publishers, ISBN 9781627055093,
DOI: 10.2200/S00622ED1V01Y201412SPT012,
[Book]

Miettinen, Markus ; Asokan, N. ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Sobhani, Majid (2014):
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
In: Proc. ACM Conference on Computer and Communications Security,
ACM, DOI: 10.1145/2660267.2660334,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Brasser, Ferdinand (2014):
Swap and Play: Live Updating Hypervisors and Its Application to Xen.
In: CCSW 2014: The ACM Cloud Computing Security Workshop Proceedings,
DOI: http://dl.acm.org/citation.cfm?doid=2664168.2664173,
[Conference or Workshop Item]

Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
Kutylowski, Miroslaw ; Vaidya, Jaideep (eds.) (2014):
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Lecture Notes in Computer Science, 8712, In: Computer Security - ESORICS 2014, pp. 76-93, Springer International Publishing, ISBN 978-3-319-11202-2,
DOI: 10.1007/978-3-319-11203-9_5,
[Book Section]

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
In: 23rd USENIX Security Symposium,
[Conference or Workshop Item]

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza (2014):
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
In: BlackHat USA,
[Conference or Workshop Item]

Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2014):
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8), pp. 1189-1206. [Article]

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
In: 23rd USENIX Security Symposium,
[Conference or Workshop Item]

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014):
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4), [Article]

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. (2014):
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014),
Kyoto, Japan, DOI: 10.1145/2590296.2590337,
[Conference or Workshop Item]

Davi, Lucas ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2014):
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
In: 51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing,
[Conference or Workshop Item]

Kong, Joonho ; Koushanfar, Farinaz ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2014):
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
In: Design Automation Conference (DAC) 2014, pp. 1-6,
ACM Press, [Conference or Workshop Item]

Mustafa, Hossen ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Xu, Wenyuan (2014):
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
In: 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),
[Conference or Workshop Item]

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
[Report]

Koeberl, Patrick ; Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Varadharajan, Vijay (2014):
TrustLite: A Security Architecture for Tiny Embedded Devices.
In: European Conference on Computer Systems (EuroSys),
ACM, Amsterdam, Netherlands, DOI: 10.1145/2592798.2592824,
[Conference or Workshop Item]

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
(TUD-CS-2014-0063), [Report]

Senftleben, Marius ; Bucicoiu, Mihai ; Tews, Erik ; Armknecht, Frederik ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza (2014):
MoP-2-MoP - Mobile private microblogging.
In: Financial Cryptography and Data Security (FC'14),
Springer, [Conference or Workshop Item]

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014):
On the (In)Security of Mobile Two-Factor Authentication.
In: Financial Cryptography and Data Security (FC'14),
Springer, [Conference or Workshop Item]

Dmitrienko, Alexandra ; Noack, David ; Sadeghi, Ahmad-Reza ; Yung, Moti (2014):
POSTER: On Offline Payments with Bitcoin.
In: FC'2014: Financial Cryptography and Data Security Conference,
[Conference or Workshop Item]

Schulz, Steffen ; Varadharajan, Vijay ; Sadeghi, Ahmad-Reza (2014):
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: IEEE Transactions on Information Forensis and Security, 9 (2), pp. 221-232. IEEE, ISSN 1556-6021,
[Article]

Catuogno, Luigi ; Löhr, Hans ; Winandy, Marcel ; Sadeghi, Ahmad-Reza (2014):
A trusted versioning file system for passive mobile storage devices.
38, In: J. Network and Computer Applications, pp. 65-75,
[Conference or Workshop Item]

Nagy, Marcin ; Cristofaro, Emiliano De ; Dmitrienko, Alexandra ; Asokan, N. ; Sadeghi, Ahmad-Reza (2013):
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
In: Annual Computer Security Applications Conference (ACSAC 2013),
New Orleans, Loouisiana, USA, [Conference or Workshop Item]

Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza (2013):
Mobile Platform Security.
In: Synthesis Lectures on Information Security, Privacy, and Trust, 9, San Rafael, Morgan & Claypool, ISBN 9781627050975,
DOI: 10.2200/S00555ED1V01Y201312SPT009,
[Book]

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2013):
A Security Framework for Analysis and Design of Software Attestation.
In: ACM Conference on Computer and Communications Security (CCS), pp. 1-12,
ACM Press, [Conference or Workshop Item]

Stancill, Blaine ; Snow, Kevin ; Otterness, Nathan ; Monrose, Fabian ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2013):
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
In: 16th Research in Attacks, Intrusions and Defenses (RAID) Symposium,
[Conference or Workshop Item]

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. (2013):
ConXsense – Context Sensing for Adaptive Usable Access Control.
[Report]

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2013):
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
In: 22nd USENIX Security Symposium (USENIX Security '13),
USENIX, [Conference or Workshop Item]

Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza (2013):
Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same.
In: BlackHat USA,
[Conference or Workshop Item]

Oren, Yossef ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2013):
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
In: Lecture Notes on Computer Science (LNCS), 8068, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 107-125,
Springer, [Conference or Workshop Item]

Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013):
Client-controlled Cryptography-as-a-Service in the Cloud.
In: 11th International Conference on Applied Cryptography and Network Security (ACNS 2013),
[Conference or Workshop Item]

Asokan, N. ; Dmitrienko, Alexandra ; Nagy, Marcin ; Reshetova, Elena ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stelle, Stanislaus (2013):
CrowdShare: Secure Mobile Resource Sharing.
pp. 432-440, Springer, 11. International Conference on Applied Cryptography and Network Security (ACNS'13), ISSN 0302-9743,
DOI: 10.1007/978-3-642-38980-1_27,
[Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013):
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013),
[Conference or Workshop Item]

Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza (2013):
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (Best Student Paper Award).
In: 34th IEEE Symposium on Security and Privacy (Oakland 2013),
[Conference or Workshop Item]

Buchmann, Johannes ; Demirel, Denise ; Graaf, Jeroen van de
Sadeghi, Ahmad-Reza (ed.) (2013):
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
In: LNCS, In: Financial Cryptography and Data Security: 17th International Conference, 2013, pp. 197-204,
Springer, ISBN 978-3-642-39883-4,
[Conference or Workshop Item]

Kocabas, Unal ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2013):
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
In: Conference on Digital Automation and Test Europe (DATE),
Interactive Presentation, [Conference or Workshop Item]

Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2013):
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: CODASPY '13, In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 233-242,
ACM Press, San Antonio, Texas, USA, ISBN 978-1-4503-1890-7,
DOI: 10.1145/2435349.2435382,
[Conference or Workshop Item]

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2013):
A Systematic Approach to Practically Efficient General Two-Party Secure Function Evaluation Protocols and their Modular Design.
In: Journal of Computer Security (JCS), 21 (2), pp. 283-315. IOS Press, DOI: 10.3233/JCS-130464,
[Article]

Werthmann, Tim ; Hund, Ralf ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten (2013):
PSiOS: Bring Your Own Privacy & Security to iOS Devices (Distinguished Paper Award).
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013),
[Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2012):
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
In: BlackHat Abu Dhabi,
[Conference or Workshop Item]

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012):
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
(TUD-CS-2012-0231), [Report]

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012):
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
(TUD-CS-2012-0226), [Report]

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Rožic, Vladimir ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012):
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
In: Lecture Notes in Computer Science (LNCS), 7428, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 283-301,
Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay (2012):
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version).
[Report]

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012):
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Kocabaş, Ünal ; Katzenbeisser, Stefan (2012):
Converse PUF-Based Authentication.
In: International Conference on Trust & Trustworthy Computing (TRUST),
Springer, [Conference or Workshop Item]

Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Tamrakar, Sandeep ; Wachsmann, Christian (2012):
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
In: Lecture Notes in Computer Science (LNCS), 7344, In: International Conference on Trust & Trustworthy Computing (TRUST), pp. 219-238,
Springer, [Conference or Workshop Item]

Seudié, Hervé ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza (2012):
EDA for Secure and Dependable Cybercars: Challenges and Opportunities.
In: ACM/IEEE Design Automation Conference (DAC),
[Conference or Workshop Item]

Wachsmann, Christian ; Sadeghi, Ahmad-Reza ; Schulz, Steffen (2012):
Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions.
In: Secure Smart Embedded Devices, Platforms and Applications, pp. 429-449, Springer, [Book Section]

Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Zhdanova, Maria ; Xu, Wenyuan ; Mustafa, Hossen ; Varadharajan, Vijay (2012):
Tetherway: A Framework for Tethering Camouflage.
In: Conference on Security and Privacy in Wireless and Mobile Networks (WiSec),
ACM Press, Tuscon, Arizona, ISBN 978-1-4503-1265-3,
[Conference or Workshop Item]

Jiang, Xuxian ; Grace, Michael ; Sadeghi, Ahmad-Reza ; Zhou, Wu (2012):
Unsafe Exposure Analysis of Mobile In-App Advertisements.
In: to appear at WiSec,
ACM, [Conference or Workshop Item]

Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid (2012):
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
In: Conference on Digital Automation and Test Europe (DATE),
[Conference or Workshop Item]

Ahmad, Junaid Jameel ; Li, Shujun ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2012):
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
In: 16. International Conference on Financial Cryptography and Data Security (FC'12), pp. 299-313,
Springer, DOI: 10.1007/978-3-642-32946-3_22,
[Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012):
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
In: 19th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Herrewege, Anthony van ; Katzenbeisser, Stefan ; Maes, Roel ; Peeters, Roel ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012):
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
In: Lecture Notes in Computer Science (LNCS), 7397, In: Financial Cryptography (FC) 2012, pp. 374-389,
Springer, [Conference or Workshop Item]

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2012):
Towards Taming Privilege-Escalation Attacks on Android.
In: 19th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay
Foresti, Sara ; Yung, Moti ; Martinelli, Fabio (eds.) (2012):
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: Lecture Notes in Computer Science, In: European Symposium on Research in Computer Science (ESORICS), pp. 253-270, Berlin, Heidelberg, Springer Verlag, ISBN 978-3-642-33166-4,
[Book Section]

Bugiel, Sven ; Pöppelmann, Thomas ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011):
AmazonIA: When Elasticity Snaps Back.
In: 18. ACM Conference on Computer and Communications Security (CCS'11), pp. 389-400,
ACM, DOI: 10.1145/2046707.2046753,
[Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011):
POSTER: Control-Flow Integrity for Smartphones.
In: 18th ACM Conference on Computer and Communications Security (CCS'11),
ACM, [Conference or Workshop Item]

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2011):
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
In: 18th ACM Conference on Computer and Communications Security (CCS'11),
ACM, [Conference or Workshop Item]

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2011):
Practical and Lightweight Domain Isolation on Android.
In: Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM),
ACM Press, [Conference or Workshop Item]

Bugiel, Sven ; Davi, Lucas ; Schulz, Steffen
Sadeghi, Ahmad-Reza ; Zhang, Xinwen (eds.) (2011):
Scalable Trust Establishment with Software Reputation.
In: Workshop on Scalable Trusted Computing (STC),
ACM Press, Chicago, Illinois, USA, [Conference or Workshop Item]

Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011):
Twin Clouds: Secure Cloud Computing with Low Latency.
In: 12. Communications and Multimedia Security Conference (CMS'11), pp. 32-44,
Springer, DOI: 10.1007/978-3-642-24712-5_3,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2011):
Lightweight Remote Attestation Using Physical Functions.
In: ACM Conference on Wireless Network Security (WiSec), pp. 109-114,
ACM Press, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2011):
Lightweight Remote Attestation using Physical Functions (Extended Version).
(TR-2011-06-01, Technical ), [Report]

Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2011):
Location Privacy in RFID Systemen.
In: Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (2), pp. 70-75. [Article]

Barni, Mauro ; Failla, Pierluigi ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011):
Privacy-Preserving ECG Classification with Branching Programs and Neural Networks.
In: IEEE Transactions on Information Forensics and Security (TIFS), 6 (2), pp. 452-468. DOI: 10.1109/TIFS.2011.2108650,
[Article]

Filyanov, Atanas ; McCune, Jonathan ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011):
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
In: 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2011),
Hong Kong, [Conference or Workshop Item]

Armknecht, Frederik ; Maes, Roel ; Sadeghi, Ahmad-Reza ; Standaert, François-Xavier ; Wachsmann, Christian (2011):
A Formal Foundation for the Security Features of Physical Functions.
In: IEEE Symposium on Security and Privacy (SSP), pp. 397-412,
IEEE Computer Society, [Conference or Workshop Item]

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza (2011):
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.
(TR-2011-04), [Report]

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011):
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
In: 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011),
[Conference or Workshop Item]

Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011):
Twin Clouds: An Architecture for Secure Cloud Computing (Extended Abstract).
In: Workshop on Cryptography and Security in Clouds (WCSC'11),
[Conference or Workshop Item]

Fischlin, Marc ; Pinkas, Benny ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Visconti, Ivan (2011):
Secure Set Intersection with Untrusted Hardware Tokens.
In: 11th Cryptographers' Track at the RSA Conference (CT-RSA'11), pp. 1-16,
Springer, DOI: 10.1007/978-3-642-19074-2_1,
[Conference or Workshop Item]

Li, Shujun ; Sadeghi, Ahmad-Reza ; Heisrath, Soeren ; Schmitz, Roland ; Ahmad, Junaid Jameel (2011):
hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers.
In: 15th International Conference on Financial Cryptography and Data Security (FC),
St. Lucia, [Conference or Workshop Item]

Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011):
A Security Architecture for Accessing Health Records on Mobile Phones.
In: HEALTHINF'2011: Proceedings of the 4th International Conference on Health Informatics,
Rome, Italy, [Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011):
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED), [Book Section]

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Leest, Vincent van der ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Schröder, Heike ; Wachsmann, Christian (2011):
Recyclable PUFs: Logically Reconfigurable PUFs.
In: Lecture Notes in Computer Science (LNCS), 6917, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 374-389,
Springer, [Conference or Workshop Item]

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Leest, Vincent van der ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Wachsmann, Christian (2011):
Recyclable PUFs: logically reconfigurable PUFs.
In: Journal of Cryptographic Engineering, 1 (3), pp. 177-186. [Article]

Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011):
Securing the Access to Electronic Health Records on Mobile Phones.
In: Biomedical Engineering Systems and Technologies,
[Conference or Workshop Item]

Dmitrienko, Alexandra ; Gessner, Dennis ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Stüble, Christian ; Ullmann, Markus (2011):
Trusted embedded System Operating System (TeSOS) - Study and Design.
[Other]

Sadeghi, Ahmad-Reza ; Li, Shujun ; Shah, Syed Amier Haider ; Khan, Muhammad Asad Usman ; Khayam, Syed Ali ; Schmitz, Roland (2010):
Breaking e-Banking CAPTCHAs.
In: 26th Annual Computer Security Applications Conference (ACSAC 2010),
[Conference or Workshop Item]

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Scafuro, Alessandra ; Visconti, Ivan ; Wachsmann, Christian (2010):
Impossibility Results for RFID Privacy Notions.
In: LNCS, 6480, In: Transactions on Computational Science IX, pp. 39-63,
Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Preneel, Bart ; Pfitzmann, Andreas ; Moran, Tal ; Maier-Rabler, Ursula ; Kutylowski, Miroslaw ; Klonowski, Marek ; Guerses, Seda ; Danezis, George ; Borisov, Nikita ; Baer, Walter (2010):
Machiavelli Confronts 21st Century Digital Technology: Democracy in a Network Society.
[Conference or Workshop Item]

Bugiel, Sven ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
TruWalletM: Secure Web Authentication on Mobile Platforms.
In: Proceedings of INTRUST 2010 The Second International Conference on Trusted Systems,
[Conference or Workshop Item]

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
Securing the E-Health Cloud.
In: 1st ACM International Health Informatics Symposium (IHI 2010),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Naccache, David (2010):
Towards Hardware-Intrinsic Security.
In: Information Security and Cryptography, [Conference or Workshop Item]

Chen, Liqun ; Dietrich, Kurt ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Winter, Johannes (2010):
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
In: LNCS, 6531, In: Information Security Conference (ISC), pp. 84-98,
Springer, [Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
Privilege Escalation Attacks on Android.
In: ISC 2010: Proceedings of the 13th Information Security Conference,
Boca Raton, Florida, USA, [Conference or Workshop Item]

Checkoway, Stephen ; Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Shacham, Hovav ; Winandy, Marcel (2010):
Return-Oriented Programming without Returns.
In: CCS '10, In: Proceedings of the 17th ACM conference on Computer and communications security, pp. 559--572,
ACM, Chicago, Illinois, USA, ISBN 978-1-4503-0245-6,
DOI: http://doi.acm.org/10.1145/1866307.1866370,
[Conference or Workshop Item]

Henecka, Wilko ; Kögl, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo (2010):
TASTY: Tool for Automating Secure Two-partY computations.
In: Proceedings of the 17. ACM Conference on Computer and Communications Security (CCS'10), pp. 451-462,
Chicago, Illinois, ACM, CCS'10, October 04-08 2010, ISBN 978-1-4503-0245-6,
DOI: 10.1145/1866307.1866358,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Mukherjee, Biswanath ; Ghosal, Dipak ; Liu, Yali (2010):
Video Streaming Forensic - Content Identification with Traffic Snooping.
In: 13th Information Security Conference (ISC 2010),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010):
Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten.
In: LNI, P-174, In: Workshop Innovative und sichere Informationstechnologie für das Gesundheitswesen von morgen (perspeGKtive'10), pp. 11-25,
Bonner Köllen Verlag, [Conference or Workshop Item]

Almeida, José Bacelar ; Bangerter, Endre ; Barbosa, Manuel ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010):
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
In: 15. European Symposium on Research in Computer Security (ESORICS'10), pp. 151-167,
Springer, DOI: 10.1007/978-3-642-15497-3_10,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010):
Enhancing RFID Security and Privacy by Physically Unclonable Functions.
In: Information Security and Cryptography, In: Towards Hardware-Intrinsic Security: Foundations and Practice, pp. 281-307, Springer, [Book Section]

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010):
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
In: 12. International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10), pp. 383-397,
Springer, DOI: 10.1007/978-3-642-15031-9_26,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2010):
Trusted Computing.
In: Handbook of Financial Cryptography and Security, pp. 221-256,
CRC Press, [Conference or Workshop Item]

Bangerter, Endre ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010):
YACZK: Yet Another Compiler for Zero-Knowledge (Poster Abstract).
19th USENIX Security Symposium : Security'10 ; Poster Session, Santa Clara, CA, USA, August 14–16, 2019, [Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
Return-Oriented Programming without Returns on ARM.
(HGI-TR-2010-002), [Report]

Armknecht, Frederik ; Chen, Liqun ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2010):
Anonymous Authentication for RFID Systems.
In: LNCS, 6370, In: Workshop on RFID Security (RFIDSec), pp. 158-175,
Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Cesena, Emanuele ; Ramunno, Gianluca ; Vernizzi, Davide (2010):
Anonymous Authentication with TLS and DAA.
In: TRUST2010,
[Conference or Workshop Item]

Alsouri, Sami ; Dagdelen, Özgür ; Katzenbeisser, Stefan
Acquisti, A. ; Sadeghi, Ahmad-Reza (eds.) (2010):
Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation.
In: 3rd International Conference on Trust and Trustworthy Computing (TRUST 2010), pp. 63-77,
[Conference or Workshop Item]

Kostiainen, Kari ; Dmitrienko, Alexandra ; Ekberg, Jan-Erik ; Sadeghi, Ahmad-Reza ; Asokan, N. (2010):
Key Attestation from Trusted Execution Environments.
In: TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, p. 30,
Berlin, [Conference or Workshop Item]

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010):
On RFID Privacy with Mutual Authentication and Tag Corruption.
In: LNCS, 6123, In: International Conference on Applied Cryptography and Network Security (ACNS), pp. 493-510,
Springer, [Conference or Workshop Item]

Armknecht, Frederik ; Ghosal, Dipak ; Katzenbeisser, Stefan ; Liu, Yali ; Sadeghi, Ahmad-Reza ; Schulz, Steffen (2010):
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
In: Information Hiding Conference (IH),
Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Winandy, Marcel (2010):
Token-Based Cloud Computing - Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
In: 3. International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud, pp. 417-429,
Springer, DOI: 10.1007/978-3-642-13869-0_30,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Li, Shujun ; Khayam, Syed Ali ; Schmitz, Roland (2010):
Breaking a Virtual Password System Based on Randomized Linear Generation Functions.
In: IEEE ICC 2010 - Communication and Information System Security Symposium ('ICC'10 CISS'),
[Conference or Workshop Item]

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5, pp. 289-298. [Article]

Manulis, Mark ; Sadeghi, Ahmad-Reza (2010):
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.
In: Int. J. of Wireless and Mobile Computing (IJWMC), 4 (1), pp. 17-30. [Article]

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010):
PUF-Enhanced RFID Security and Privacy.
In: Workshop on Secure Component and System Identification (SECSI),
[Conference or Workshop Item]

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
(HGI-TR-2010-001), [Report]

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 34 (5), pp. 289-294. [Article]

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
Patterns for Secure Boot and Secure Storage in Computer Systems.
In: 4th International Workshop on Secure systems methodologies using patterns (SPattern 2010),,
[Conference or Workshop Item]

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010):
Embedded SFE: Offloading Server and Network using Hardware Tokens.
In: 14. International Conference on Financial Cryptography and Data Security (FC'10), pp. 207-221,
Springer, DOI: 10.1007/978-3-642-14577-3_17,
[Conference or Workshop Item]

Schulz, Steffen ; Sadeghi, Ahmad-Reza (2010):
Extending IPsec for Efficient Remote Attestation.
LNCS, In: Financial Cryptography and Data Security (FC),
Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Cabuk, Serdar ; Dalton, Chris ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramasamy, Hari Govind ; Ramunno, Gianluca ; Schunter, Matthias (2010):
Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers.
In: Journal of Computer Security, 18 (1), pp. 89-121. [Article]

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010):
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens.
In: Information Security and Cryptography, In: Towards Hardware Intrinsic Security: Foundation and Practice, pp. 367-386, Springer-Verlag Berlin Heidelberg, DOI: 10.1007/978-3-642-14452-3_17,
[Book Section]

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009):
Anonymizer-Enabled Security and Privacy for RFID.
In: LNCS, 5888, In: International Conference on Cryptology and Network Security (CANS), pp. 134-153,
Springer, [Conference or Workshop Item]

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Paus, Annika ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009):
Efficient Privacy-Preserving Classification of ECG Signals.
In: 1. IEEE International Workshop on Information Forensics and Security (IEEE WIFS'09), pp. 91-95,
London, IEEE, DOI: 10.1109/WIFS.2009.5386475,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo (2009):
Efficient Privacy-Preserving Face Recognition.
In: 12. International Conference on Information Security and Cryptology (ICISC'09), pp. 229-244,
Springer, DOI: 10.1007/978-3-642-14423-3_16,
[Conference or Workshop Item]

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan (2009):
Hide and Seek in Time - Robust Covert Timing Channels.
In: ESORICS, pp. 120-135,
[Conference or Workshop Item]

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009):
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
In: 8. International Conference on Cryptology And Network Security (CANS'09), pp. 1-20,
Springer, DOI: 10.1007/978-3-642-10433-6_1,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Maes, Roel ; Sunar, Berk ; Tuyls, Pim (2009):
Memory Leakage-Resilient Encryption based on Physically Unclonable Functions.
In: ASIACRYPT'09,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Li, Shujun ; Asghar, Hassan Jameel ; Pieprzyk, Josef ; Schmitz, Roland ; Wang, Huaxiong (2009):
On the Security of PAS (Predicate-based Authentication Service).
In: Annual Computer Security Applications Conference (ACSAC’09), 2009.,
[Conference or Workshop Item]

Catuogno, Luigi ; Dmitrienko, Alexandra ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramunno, Gianluca ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Schunter, Matthias ; Winandy, Marcel ; Zhan, Jing (2009):
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
In: International Conference on Trusted Systems (INTRUST),
Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009):
Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics (Poster).
Bochum, Section Days of Ruhr-University Bochum Research School, Bochum, 6. November 2009, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Zhan, Jing ; Korthaus, René (2009):
A Practical Property-based Bootstrap Architecture.
In: ACMSTC'09,
[Conference or Workshop Item]

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
Transparent Mobile Storage Protection in Trusted Virtual Domains.
In: USENIX LISA 2009,
USENIX, [Conference or Workshop Item]

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
Transparent Mobile Storage Protection in Trusted Virtual Domains.
In: 23rd Large Installation System Administration Conference (LISA '09), pp. 159-172,
[Conference or Workshop Item]

Gajek, Sebastian ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
In: 4th ACM Workshop on Scalable Trusted Computing,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Vishik, Claire ; Verbauwhede, Ingrid (2009):
Future of Assurance: Ensuring that a System is Trustworthy.
In: ISSE'09,
[Conference or Workshop Item]

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009):
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09),
[Conference or Workshop Item]

Bangerter, Endre ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Tsay, Joe-Kai (2009):
On the Design and Implementation of Efficient Zero-Knowledge Proofs of Knowledge.
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09), pp. 125-144,
[Conference or Workshop Item]

Bangerter, Endre ; Briner, Thomas ; Henecka, Wilko ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009):
Automatic Generation of Sigma-Protocols.
In: 6. European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09), pp. 67-82,
Springer, DOI: 10.1007/978-3-642-16441-5_5,
[Conference or Workshop Item]

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009):
Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification.
In: 1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09),
[Conference or Workshop Item]

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
In: STC '09, In: Proceedings of the 2009 ACM workshop on Scalable trusted computing, pp. 49--54,
ACM, Chicago, Illinois, USA, ISBN 978-1-60558-788-2,
DOI: http://doi.acm.org/10.1145/1655108.1655117,
[Conference or Workshop Item]

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan (2009):
Hide and Seek in Time - Robust Covert Timing Channels.
In: LNCS, In: European Symposium on Research in Computer Security (ESORICS), pp. 120-135,
Springer, ISBN 978-3-642-04443-4,
[Conference or Workshop Item]

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009):
How to Combine Homomorphic Encryption and Garbled Circuits - Improved Circuits and Computing the Minimum Distance Efficiently.
In: 1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09),
[Conference or Workshop Item]

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009):
Secure Evaluation of Private Linear Branching Programs with Medical Applications.
In: 14. European Symposium on Research in Computer Security (ESORICS'09), pp. 424-439,
Springer, DOI: 10.1007/978-3-642-04444-1_26,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009):
Location Privacy in RFID Applications.
In: LNCS, 5599, In: Privacy in Location-Based Applications: Research Issues and Emerging Trends, pp. 127-150,
Springer, [Conference or Workshop Item]

Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
A Pattern for Secure Graphical User Interface Systems.
In: 3rd International Workshop on Secure systems methodologies using patterns (SPattern'09), Proceedings of the 20th International Workshop on Database and Expert Systems Applications, pp. 186-190,
IEEE, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009):
Enhancing RFID Security and Privacy by Physically Unclonable Functions (Extended Abstract).
In: Dagstuhl Seminar Proceedings, In: Foundations for Forgery-Resilient Cryptographic Hardware, pp. 10-11,
Schloss Dagstuhl, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Kursawe, Klaus ; Schellekens, Dries ; Skoric, Boris ; Tuyls, Pim (2009):
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage.
In: 2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009):
Efficient RFID Security and Privacy with Anonymizers.
In: Workshop on RFID Security (RFIDSec),
[Conference or Workshop Item]

Paus, Annika ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009):
Practical Secure Evaluation of Semi-Private Functions.
In: 7. International Conference on Applied Cryptography and Network Security (ACNS'09), pp. 89-106,
Springer, DOI: 10.1007/978-3-642-01957-9_6,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
Einsatz von Sicherheitskernen und Trusted Computing.
In: D-A-CH Security,
[Conference or Workshop Item]

Bangerter, Endre ; Camenisch, Jan ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009):
Automatic Generation of Sound Zero-Knowledge Protocols.
In: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques : Poster session,
28th Advances in Cryptology - EUROCRYPT 2009, Cologne, Germany, April 26-30, 2009, [Conference or Workshop Item]

Bangerter, Endre ; Barzan, Stefania ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Tsay, Joe-Kai (2009):
Bringing Zero-Knowledge Proofs of Knowledge to Practice.
In: 17. International Workshop on Security Protocols (SPW'09),
Springer, DOI: 10.1007/978-3-642-36213-2_9,
[Conference or Workshop Item]

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Weber, Marion ; Winandy, Marcel (2009):
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
In: LNCS, 5471, In: Proceedings of the 2nd International Conference on Trusted Computing, pp. 45-62,
Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Tuyls, Pim ; Maes, Roel ; Sunar, Berk (2009):
Physically Unclonable Pseudorandom Functions.
In: Poster session of Advances in Cryptology - EUROCRYPT,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schulz, Steffen (2009):
Secure VPNs for Trusted Computing Environments.
In: International Conference on Trusted Computing (TRUST),
Springer, Oxford, UK, [Conference or Workshop Item]

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Vishik, Claire ; Winandy, Marcel (2009):
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
In: LNCS, 5451, In: 5th Information Security Practice and Experience Conference (ISPEC'09), pp. 396-407,
Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Bangerter, Endre ; Barbosa, Manuel ; Bernstein, Daniel ; Damgard, Ivan ; Page, Dan ; Pagter, Jakob ; Sovio, Sampo (2009):
Using Compilers to Enhance Cryptographic Product Development.
In: Information Security Solutions Europe (ISSE),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schneider, Thomas (2008):
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.
In: 11. International Conference on Information Security and Cryptology (ICISC'08), pp. 336-353,
Springer, DOI: 10.1007/978-3-642-00730-9_21,
[Conference or Workshop Item]

Rupp, Andy ; Leander, Gregor ; Bangerter, Endre ; Dent, Alexander ; Sadeghi, Ahmad-Reza (2008):
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
In: Advances in Cryptology - ASIACRYPT 2008,
[Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark ; Pereira, Olivier (2008):
Universally Composable Security Analysis of TLS.
In: Second Conference on Provable Security (ProvSec),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Gasmi, Yacine ; Ramunno, Gianluca ; Vernizzi, Davide ; Stewin, Patrick ; Unger, Martin (2008):
An Efficient Implementation of Trusted Channels Based on OpenSSL.
In: ACMSTC 2008,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Husseiki, Rani ; Gasmi, Yacine ; Stewin, Patrick ; Unger, Martin (2008):
Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains.
In: 3rd ACM Workshop on Scalable Trusted Computing,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008):
Improved Security Notions and Protocols for Non-Transferable Identification.
In: 13th European Symposium on Research in Computer Security (ESORICS),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2008):
User Privacy in Transport Systems Based on RFID E-Tickets.
In: International Workshop on Privacy in Location-Based Applications (PiLBA),
Malaga, Spain, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Bangerter, Endre ; Djackov, Maksim (2008):
A Demonstrative Ad-hoc Attestation System.
In: Information Security Conference 2008 (ISC'08),
Taipei, Taiwan, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark (2008):
Property-Based Attestation without a Trusted Third Party.
In: Information Security Conference (ISC'08),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2008):
Property-Based TPM Virtualization.
In: LNCS, In: Information Security, 11th International Conference (ISC 2008), pp. 1-16,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Shokrollahi, Jamshid ; Bösch, Christoph ; Guajardo, Jorge ; Tuyls, Pim (2008):
Efficient Helper Data Key Extractor on FPGAs.
In: Workshop on Cryptographic Hardware and Embedded Systems 2008 (CHES 2008),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Gröbert, Felix ; Birk, Dominik (2008):
A Forensic Framework for Tracing Phishers.
In: LNCS, Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008):
Resettable and Non-Transferable Chip Authentication for E-Passports.
In: RFIDSec 2008,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Löhr, Hans ; Manulis, Mark ; Escalante, Alberto (2008):
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
In: 4th Information Security Practice and Experience Conference (ISPEC 2008),
Sydney, Australia, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, André ; Wolf, Marko ; Asokan, N. (2008):
Securing Peer-to-Peer Distributions for Mobile Devices.
4th Information Security Practice and Experience Conference (ISPEC 2008), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Osterhues, André ; Wolf, Marko ; Asokan, Nadarajah (2008):
Securing Peer-to-Peer Distributions for Mobile Devices.
In: 4th Information Security Practice and Experience Conference (ISPEC 2008),
Sydney, Australia, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008):
Identification Protocols Revisited - Episode I: E-Passports.
e-crypt workshop on Secure Component and System Identification (SECSI), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008):
Identification Protocols Revisited - Episode I: E-Passports.
In: e-crypt workshop on Secure Component and System Identification (SECSI),
[Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2008):
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), [Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2008):
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: ACM Symposium on Information, Computer and Communications Security (ASIACCS'08),
[Conference or Workshop Item]

Chen, Liqun ; Escalante, Alberto ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza (2008):
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
In: Lecture Notes in Computer Science, 4886, In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, pp. 29--44,
Springer-Verlag, [Conference or Workshop Item]

Chen, Liqun ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza (2008):
Property-Based Attestation without a Trusted Third Party.
In: Lecture Notes in Computer Science, 5222, In: Information Security, 11th International Conference, ISC 2008, pp. 31--46,
Springer, [Conference or Workshop Item]

Gajek, Sebastian ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2008):
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), pp. 300--311,
ACM Press, [Conference or Workshop Item]

Armknecht, Frederik ; Escalante, Alberto ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza (2008):
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
In: Lecture Notes in Computer Science, 4991, In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, pp. 29--44,
Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza (2008):
Trusted Computing—State of the Art and Challenges.
In: LNCS, In: SOFSEM 2008,
Springer, [Conference or Workshop Item]

Gajek, Sebastian ; Manulis, Mark ; Pereira, Olivier ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2008):
Universally Composable Security Analysis of TLS.
In: Lecture Notes in Computer Science, 5324, In: Proceedings of the 2nd International Conference on Provable Security (ProvSec 2008), pp. 313--327,
Springer, [Conference or Workshop Item]

Asokan, N. ; Gasmi, Yacine ; Sadeghi, Ahmad-Reza ; Stewin, Patrick ; Unger, Martin (2007):
Beyond Secure Channels.
pp. 30-40, ACM Press, ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Gasmi, Yacine ; Stewin, Patrick ; Unger, Martin ; Asokan, Nadarajah (2007):
Beyond Secure Channels.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), pp. 30-40,
ACM Press, Alexandria, Virginia, USA, [Conference or Workshop Item]

Eisenbarth, Thomas ; Güneysu, Tim ; Paar, Christof ; Sadeghi, Ahmad-Reza ; Schellekens, Dries ; Wolf, Marko (2007):
Reconfigurable Trusted Computing in Hardware.
pp. 15-25, ACM Press, ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), [Conference or Workshop Item]

Paar, Christof ; Sadeghi, Ahmad-Reza ; Güneysu, Tim ; Eisenbarth, Thomas ; Schellekens, Dries ; Wolf, Marko (2007):
Reconfigurable Trusted Computing in Hardware.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), pp. 15-25,
ACM Press, Alexandria, Virginia, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Wolf, Christopher ; Stüble, Christian ; Asokan, N. ; Ekberg, Jan-Erik (2007):
Enabling Fairer Digital Rights Management with Trusted Computing.
In: LNCS, 4779, In: 10th International Conference on Information Security (ISC 2007), pp. 53-70,
Springer Verlag, Valparaíso, Chile, [Conference or Workshop Item]

Celik, Mehmet ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza ; Skoric, Boris (2007):
Combining Tardos Fingerprinting Codes and Fingercasting.
In: LNCS, 4567, pp. 294-310, Springer Verlag, 9th International Workshop on Information Hiding (IH 2007), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Katzenbeisser, Stefan ; Skoric, Boris ; Celik, Mehmet (2007):
Combining Tardos Fingerprinting Codes and Fingercasting.
In: LNCS, 4567, In: 9th International Workshop on Information Hiding (IH 2007), pp. 294-310,
Springer Verlag, Saint Malo, France, [Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2007):
Browser Models for Usable Authentication Protocols.
In: IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07),
Oakland, USA, [Conference or Workshop Item]

Gajek, Sebastian ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2007):
Browser-based Authentication Protocols for Naive Users.
Western European Workshop on Research in Cryptology (WEWoRC 2007), [Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2007):
Browser-based Authentication Protocols for Naive Users.
In: Western European Workshop on Research in Cryptology (WEWoRC 2007),
Bochum, Germany, [Conference or Workshop Item]

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2007):
Compartmented Security for Browsers.
(HGI-TR-2007-001), [Report]

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2007):
Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing.
In: Second International Conference on Availability, Reliability and Security (ARES 2007), pp. 120-127,
Vienna, Austria, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Löhr, Hans ; Ramasamy, Hari Govind ; Schulz, Stefan ; Schunter, Matthias (2007):
Enhancing Grid Security Using Trusted Virtualization.
In: LNCS, 4610, In: 4th International Conference on Autonomic and Trusted Computing (ATC 2007), pp. 372-384,
Springer Verlag, Hong Kong, China, [Conference or Workshop Item]

Adelsbach, Andre ; Huber, Ulrich ; Sadeghi, Ahmad-Reza (2007):
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
In: LNCS, 4499, pp. 1-34, Springer Verlag, Transactions on Data Hiding and Multimedia Security II, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2007):
Fingercasting—Joint Fingerprinting and Decryption of Broadcast Messages.
In: LNCS, 4499, In: Transactions on Data Hiding and Multimedia Security II, pp. 1-34,
Springer Verlag, [Conference or Workshop Item]

Birk, Dominik ; Gajek, Sebastian ; Gröbert, Felix ; Sadeghi, Ahmad-Reza (2007):
Phishing Phishers - Observing and Tracing Organized Cybercrime.
p. 3, IEEE Computer Society, Second International Conference on Internet Monitoring and Protection (ICIMP 2007), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Gröbert, Felix ; Birk, Dominik (2007):
Phishing Phishers - Observing and Tracing Organized Cybercrime.
In: Second International Conference on Internet Monitoring and Protection (ICIMP 2007), p. 3,
IEEE Computer Society, Silicon Valley, California, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark ; Escalante, Alberto (2007):
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
In: LNCS, 4886, In: 11th International Conference on Financial Cryptography and Data Security (FC 2007), pp. 29-44,
Springer Verlag, Scarborough, Trinidad and Tobago, [Conference or Workshop Item]

Manulis, Mark
Paar, Christof ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (eds.) (2007):
Provably Secure Group Key Exchange.
In: IT Security, 5, Europäischer Universitätsverlag, ISBN 978-3-89966-275-7,
[Book]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Winandy, Marcel (2007):
Trusted User-Aware Web Authentication.
In: Workshop on Trustworthy User Interfaces for Passwords and Personal Information (TIPPI'07),,
Stanford, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian ; Wachsmann, Christian ; Winandy, Marcel (2006):
TCG Inside? - A Note on TPM Specification Compliance.
pp. 47-56, ACM Press, ACM Workshop on Scalable Trusted Computing (ACMSTC), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Selhorst, Marcel ; Stüble, Christian ; Winandy, Marcel (2006):
TCG Inside? - A Note on TPM Specification Compliance.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC), pp. 47-56,
ACM Press, Alexandria, Virginia (USA), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2006):
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
In: LNCS, 4058, In: 11th Australasian Conference on Information Security and Privacy (ACISP 2006),
Springer Verlag, Melbourne, Australia, [Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Manulis, Mark (2006):
Linkable Democratic Group Signatures.
In: 2nd Information Security Practice and Experience Conference (ISPEC 2006),
Hangzhou, China, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006):
Property-based Taming Lying Mobile Node.
In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006),
Vienna, Austria, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006):
Property-based Taming Lying Mobile Nodes.
In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006),
Vienna, Austria, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Gajek, Sebastian (2006):
Client Authentication in Federations Using a Security Mode.
In: Toward a More Secure Web - W3C Workshop on Usability and Transparency of Web Authentication.,
[Conference or Workshop Item]

Adelsbach, Andre ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza (2006):
A Computational Model for Watermark Robustness.
Information Hiding Workshop, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzebeisser, Stefan (2006):
A Computational Model for Watermark Robustness.
In: Information Hiding Workshop,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Scheibel, Michael (2006):
Design and Implementation of a Secure Linux Device Encryption Architecture.
In: LinuxTag,
[Conference or Workshop Item]

Carluccio, Dario ; Lemke-Rust, Kerstin ; Paar, Christof ; Sadeghi, Ahmad-Reza (2006):
E-Passport: The Global Traceability or How to Feel Like an UPS Package.
Workshop on RFID Security 2006, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Paar, Christof ; Carluccio, Dario ; Lemke-Rust, Kerstin (2006):
E-Passport: The Global Traceability or How to Feel Like an UPS Package.
In: Workshop on RFID Security 2006,
Graz, Austria, [Conference or Workshop Item]

Adelsbach, Andre ; Rohe, Markus ; Sadeghi, Ahmad-Reza (2006):
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
Transactions on Data Hiding and Multimedia Security, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2006):
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
In: Transactions on Data Hiding and Multimedia Security,
[Conference or Workshop Item]

Volkamer, Melanie ; Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Schulz, Stefan (2006):
Enabling the Application of Open Systems like PCs for Online Voting.
In: Frontiers in Electronic Elections -- FEE '06, url{http://fee.iavoss.org/2006/papers/fee-2006-iavoss-Enabling_the_applicat ion_of_open_systems_like-PCs_for_Online_Voting.pdf},
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2006):
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
[Report]

Huber, Ulrich ; Sadeghi, Ahmad-Reza (2006):
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
In: LNCS, 4173, Springer, 9th Information Security Conference (ISC 2006), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Huber, Ulrich (2006):
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
[Report]

Sadeghi, Ahmad-Reza ; Huber, Ulrich (2006):
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
In: LNCS, 4173, In: 9th Information Security Conference (ISC 2006),
Springer, Samos, Greece, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006):
Key Agreement for Heterogeneous Ad-Hoc Groups.
In: International Journal of Wireless and Mobile Computing (IJWMC),
[Conference or Workshop Item]

Manulis, Mark ; Sadeghi, Ahmad-Reza (2006):
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006):
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
In: Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing),
[Conference or Workshop Item]

Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2006):
Linkable Democratic Group Signatures.
In: Lecture Notes in Computer Science, 3903, In: Proceedings of the 2nd Information Security Practice and Experience Conference (ISPEC 2006), pp. 187--201,
Springer-Verlag, ISBN 3-540-33052-6,
[Conference or Workshop Item]

Lemke, Kerstin ; Paar, Christof ; Sadeghi, Ahmad-Reza (2006):
Physical Security Bounds Against Tampering.
International Conference on Applied Cryptography and Network Security (ACNS 2006), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Paar, Christof ; Lemke, Kerstin (2006):
Physical Security Bounds Against Tampering.
In: International Conference on Applied Cryptography and Network Security (ACNS 2006),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Wolf, Marko ; Scheibel, Michael (2006):
Play it once again, Sam - Enforcing Stateful Licenses on Open Platforms.
In: The Second Workshop on Advances in Trusted Computing (WATC '06 Fall),
[Conference or Workshop Item]

Manulis, Mark ; Sadeghi, Ahmad-Reza (2006):
Property-Based Taming of Lying Mobile Nodes.
In: Proceedings of 20th International Conference on Advanced Information Networking and Applications (AINA 2006) Volume 2 IEEE International Workshop on Trusted and Autonomic Computing Systems (TACS 2006), pp. 476--480,
IEEE Computer Society, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Löhr, Hans ; Chen, Liquen ; Landfermann, Rainer ; Rohe, Markus (2006):
A Protocol for Property-Based Attestation.
In: First ACM Workshop on Scalable Trusted Computing (STC'06),
[Conference or Workshop Item]

Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Scheibel, Michael ; Stüble, Christian ; Winandy, Marcel (2006):
Security Architecture for Device Encryption and VPN.
Information Security Solution Europe (ISSE06), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Alkassar, Ammar ; Scheibel, Michael (2006):
Security Architecture for Device Encryption and VPN.
In: Information Security Solution Europe (ISSE06),
[Conference or Workshop Item]

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2006):
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
Workshop on Information and System Security (WISSEC'06), [Conference or Workshop Item]

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2006):
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
In: Workshop on Information and System Security (WISSEC'06),
Antwerpen, Belgium, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005):
Property-Based Broadcast Encryption for Multi-level Security Policies.
In: LNCS, 3935, Springer Verlag, 8th International Conference on Information Security and Cryptology (ICISC 2005), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005):
Property-Based Broadcast Encryption for Multi-level Security Policies.
In: LNCS, 3935, In: 8th International Conference on Information Security and Cryptology (ICISC 2005),
Springer Verlag, Seoul, Korea, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich (2005):
Embedding Trust into Cars—Secure Software Delivery and Installation.
In: Third Workshop on Embedded Security in Cars (escar 2005),
Cologne, Germany, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005):
Towards Multilateral Secure Digital Rights Distribution Infrastructures.
In: ACM DRM Workshop'05,
Alexandria, Virginia, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005):
Multilaterally Secure Computing Platforms - in your office, car and at home.
1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005):
Multilaterally Secure Computing Platforms – in your office, car and at home.
In: 1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society,
Tokyo, Japan, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Selhorst, Marcel ; Senft, Oska (2005):
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9, [Article]

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Selhorst, Marcel ; Senft, Oska (2005):
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9, [Article]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005):
Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme.
In: 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security,
Salzburg, Austria, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Ulrich ; Kursawe, Klaus ; Lucks, Stefan (2005):
Secure Data Management in Trusted Computing.
In: LNCS, 3659, pp. 324-338, Springer Verlag, Workshop on Cryptographic Hardware and Embedded Systems (CHES), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Kühn, Ulrich ; Kursawe, Klaus ; Lucks, Stefan (2005):
Secure Data Management in Trusted Computing.
In: LNCS, 3659, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 324-338,
Springer Verlag, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Rupp, Andy ; Bangerter, Endre (2005):
Simplified Hardness Proofs in the Generic Group Model.
In: Western European Workshop on Research in Cryptology (WEWoRC 2005),
Leuven, Belgium, [Conference or Workshop Item]

Camenisch, Jan ; Rohe, Markus ; Sadeghi, Ahmad-Reza (2005):
Sokrates - A Compiler Framework for Zero-Knowledge Protocols.
Western European Workshop on Research in Cryptology (WEWoRC 2005), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Rohe, Markus ; Camenisch, Jan (2005):
Sokrates - A Compiler Framework for Zero-Knowledge Protocols.
In: Western European Workshop on Research in Cryptology (WEWoRC 2005),
Leuven, Belgium, [Conference or Workshop Item]

Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian (2005):
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Alkassar, Ammar ; Stüble, Christian ; Selhorst, Marcel (2005):
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
In: 9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005):
Secure Software Delivery and Installation in Embedded Systems.
In: First Information Security Practice and Experience Conference (ISPEC 2005),
Singapore, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005):
Security Engineering for Zero-knowledge Watermark Detection.
In: Special Session on Media Security (WIAMIS 2005),
Montreux, Switzerland, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005):
Towards Multilateral Security On DRM Platforms.
In: First Information Security Practice and Experience Conference (ISPEC 2005),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005):
Towards multilaterally secure computing platforms - with open source and trusted computing.
In: Information Security Technical Report, 10 (2), pp. 83-95. [Article]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005):
Towards multilaterally secure computing platforms - with open source and trusted computing.
In: Information Security Technical Report, 10 (2), pp. 83-95. [Article]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin
Lemke, Kerstin ; Wolf, Marko ; Paar, Christof (eds.) (2005):
Anti-theft Protection: Electronic Immobilizers.
pp. 51-67, Springer Verlag, Embedded Security in Cars: Securing Current and Future Automotive IT Applications., [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin
Lemke, Kerstin ; Wolf, Marko ; Paar, Christof (eds.) (2005):
Anti-theft Protection: Electronic Immobilizers.
In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications., pp. 51-67,
Springer Verlag, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Browser Model for Security Analysis of Browser-Based Protocols.
European Symposium for Research in Computer Science (ESORICS), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Browser Model for Security Analysis of Browser-Based Protocols.
[Book]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Browser Model for Security Analysis of Browser-Based Protocols.
In: European Symposium for Research in Computer Science (ESORICS),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Browser Model for Security Analysis of Browser-Based Protocols.
(RZ3600), [Report]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005):
Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it.
In: ACM Multimedia Systems, 11 (2), pp. 143-158. [Article]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005):
Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it.
In: ACM Multimedia Systems, [Article]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Bas, Patrick ; Barni, Mauro ; Rosa, Alessia De
Katzenbeisser, Stefan (ed.) (2005):
First Summary Report on Asymmetric Watermarking.
In: ECRYPT, Network of Excellence in Cryptology,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin (2005):
An Open Approach for Designing Secure Electronic Immobilizers.
In: First Information Security Practice and Experience Conference (ISPEC 2005),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Chen, Liqun ; Enzmann, Matthias ; Schneider, Markus ; Steiner, Michael (2005):
A Privacy-Protecting Coupon System.
In: Financial Cryptography,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich (2005):
Property-Based Broadcast Encryption for Multi-level Security Policies.
[Book]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich (2005):
Property-Based Broadcast Encryption for Multi-level Security Policies.
[Report]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
Workshop on Secure Web Services (SWS), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
In: Workshop on Secure Web Services (SWS),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005):
Secure Software Delivery and Installation in Embedded Systems.
[Report]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich
Lemke, Kerstin (ed.) (2005):
Secure Software Delivery and Installation in Embedded Systems.
In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications, pp. 27-49, Springer-Verlag, [Book Section]

Sadeghi, Ahmad-Reza (2005):
Trusted Computing: Whom do we trust? Building Open Multilateral Secure Platforms Based On Trusted Computing.
DRM Conference, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza (2005):
Trusted Computing: Whom do we trust? Building Open Multilateral Secure Platforms Based On Trusted Computing.
In: DRM Conference,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2004):
Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms.
In: 20th Annual Computer Security Applications Conference (ACSAC),
Tucson, Arizona, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Pohlmann, Norbert (2004):
European Multilateral Secure Computing Base - Open Trusted Computing for You and Me.
In: Datenschutz und Datensicherheit (DUD), 9, pp. 548-554. [Article]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2004):
Property-based Attestation for Computing Platforms: Caring about policies, not mechanisms.
In: New Security Paradigm Workshop (NSPW),
White Point Beach Resort, Nova Scotia, Canada, [Conference or Workshop Item]

Altmeyer, Oliver ; Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian
Paulus, Sachar ; Pohlmann, Norbert ; Reimer, Helmut (eds.) (2004):
Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004), pp. 346-361, Vieweg Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Altmeyer, Oliver ; Selhorst, Marcel
Paulus, Sachar ; Pohlmann, Norbert ; Reimer, Helmut (eds.) (2004):
Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004), pp. 346-361, Vieweg Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2004):
Overcoming the Obstacles of Zero-Knowledge Watermark Detection.
pp. pp. 46 - 55, ACM Press, ACM Multimedia and Security Workshop, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2004):
Overcoming the Obstacles of Zero-Knowledge Watermark Detection.
In: ACM Multimedia and Security Workshop, pp. pp. 46 - 55,
ACM Press, Magdeburg, Germany, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Günnewig, Dirk ; Rannenberg, Kai ; Stüble, Christian
Koenig, Christian ; Neu­mann, An­dre­as ; Katz­sch­mann, To­bi­as (eds.) (2004):
Trusted Computing Platforms: Zur technischen und industriepolitischen Situation und Vorgehensweise.
In: Vertrauenswürdige Systemumgebungen Technik, Recht und gesellschaftspolitische Implikationen des "Trusted Computing", Verlag Recht und Wirtschaft, [Book Section]

Sadeghi, Ahmad-Reza ; Alkassar, Ammar (2003):
The Quest for Security in Integrated Networks.
11th International Conference on Telecommunication Systems, Modeling and Analysis, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Alkassar, Ammar (2003):
The Quest for Security in Integrated Networks.
In: 11th International Conference on Telecommunication Systems, Modeling and Analysis,
Monterey, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003):
Taming "Trusted Computing" by Operating System Design.
In: 4th International Workshop on Information Security Applications (WISA'03),
Springer-Verlag, Cheju Island, Korea, [Conference or Workshop Item]

Adelsbach, Andre ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza (2003):
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, 9 (3), pp. 266-278. [Article]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzenbeisser, Stefan (2003):
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, 9 (3), pp. 266-278. [Article]

Sadeghi, Ahmad-Reza ; Alkassar, Ammar ; Stüble, Christian (2003):
Secure Object Identification - or: Solving The Chess Grandmaster Problem.
In: New Security Paradigms Workshop,
Ascona, Switzerland, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre (2003):
Advanced Techniques for Dispute Resolving and Authorship Proofs on Digital Works.
In: Security and Watermarking of Multimedia Contents V,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003):
Bridging the Gap between TCPA/Palladium and Personal Security.
[Report]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Schneider, Markus ; Stüble, Christian (2003):
Die digitale Signatur.
In: Digitale Signaturen in der Praxis, AWV Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Schneider, Markus ; Stüble, Christian (2003):
Die digitale Signatur.
In: Digitale Signaturen in der Praxis, AWV Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Schneider, Markus (2003):
Electronic Payment Systems.
In: LNCS, 2770, In: Digital Rights Management, pp. 113-137, Springer Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Schneider, Markus (2003):
Electronic Payment Systems.
In: LNCS, 2770, In: Digital Rights Management, pp. 113-137, Springer Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003):
Sinn und Unsinn von TCPA und Palladium.
In: c't, 13, [Article]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003):
Sinn und Unsinn von TCPA und Palladium.
In: c't, 13, [Article]

Sadeghi, Ahmad-Reza ; Stüble, Dirk (2003):
Trusted Computing ohne Nebenwirkungen.
9, In: Datenschutz und Datensicherheit (DUD), pp. 556-560, Vieweg Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Günnewig, Dirk (2003):
Trusted Computing ohne Nebenwirkungen.
9, In: Datenschutz und Datensicherheit (DUD), pp. 556-560, Vieweg Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzenbeisser, Stefan (2002):
Cryptography Meets Watermarking: Detecting Watermarks with Minimal- or Zero-Knowledge Disclosure.
1, In: XI European Signal Processing Conference, pp. 446-449,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Steinbrecher, Sandra (2002):
Auctions with Multiple Rounds and Multiple Items.
In: Int. Workshop on Trust and Privacy in Digital Business (DEXA 2002),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian (2002):
Final Report on Verification and Assessment.
[Book]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian (2002):
Final Report on Verification and Assessment.
(MAF­TIA De­li­ver­a­ble D), [Report]

Sadeghi, Ahmad-Reza ; Steiner, Michael (2001):
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference.
In: LNCS, 2045, In: Eurocrypt, pp. 243-260,
Springer-Verlag, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Geraldy, Alexander ; Pfitzmann, Birgit (2001):
Optimized Self-Synchronizing Mode of Operation.
In: 8th International Workshop on Fast Software Encryption,
Yokohama, Japan, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza (2001):
How to Break a Semi-Anonymous Fingerprinting Scheme.
In: LNCS, 2137, pp. 384-394, Springer-Verlag, Information Hiding: Fourth International Workshop, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza (2001):
How to Break a Semi-Anonymous Fingerprinting Scheme.
In: LNCS, 2137, In: Information Hiding: Fourth International Workshop, pp. 384-394,
Springer-Verlag, [Conference or Workshop Item]

Adelsbach, Andre ; Sadeghi, Ahmad-Reza (2001):
Zero-Knowledge Watermark Detection and Proof of Ownership.
In: LNCS, 2137, pp. 273-288, Springer-Verlag, Information Hiding: Fourth International Workshop, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre (2001):
Zero-Knowledge Watermark Detection and Proof of Ownership.
In: LNCS, 2137, In: Information Hiding: Fourth International Workshop, pp. 273-288,
Springer-Verlag, Berlin, Germany, [Conference or Workshop Item]

Adelsbach, Andre ; Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza (2000):
Proving ownership of digital content.
In: LNCS, 1768, pp. 126-141, Springer-Verlag, 3rd International Workshop on Information Hiding, IH 1999, [Conference or Workshop Item]

Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza (2000):
Self-escrowed cash against user black-mailing.
In: LNCS, 1962, Springer-Verlag, Fourth Conference on Financial Cryptography (FC 2000 Anguilla), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (2000):
Self-escrowed cash against user black-mailing.
In: LNCS, 1962, In: Fourth Conference on Financial Cryptography (FC’00),,
Springer-Verlag, Anguilla, British West Indies, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999):
Coin-based anonymous fingerprinting.
In: LNCS, 1599, In: EUROCRYPT ’99, pp. 150-164,
Springer-Verlag, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999):
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99, pp. 35-48, Vieweg Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999):
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99, pp. 35-48, Vieweg Verlag, [Book Section]

This list was generated on Tue Oct 19 01:07:32 2021 CEST.