TU Darmstadt / ULB / TUbiblio

Blättern nach Person

Ebene hoch
Exportieren als [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Gruppiere nach: Keine Gruppierung | Typ des Eintrags | Publikationsjahr | Sprache
Anzahl der Einträge: 471.

Koisser, David ; Mitev, Richard ; Chilese, Marco ; Sadeghi, Ahmad-Reza (2024)
Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users.
45th IEEE Symposium on Security and Privacy. San Francisco, USA (19.05.2024 - 23.05.2024)
Konferenzveröffentlichung, Bibliographie

Chilese, Marco ; Mitev, Richard ; Orenbach, Meni ; Thorburn, Robert ; Atamli, Ahmad ; Sadeghi, Ahmad-Reza (2024)
One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices.
45th IEEE Symposium on Security and Privacy. San Francisco, USA (19.05.2024 - 23.05.2024)
Konferenzveröffentlichung, Bibliographie

Rieger, Phillip ; Krauß, Torsten ; Miettinen, Mark ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza (2024)
CrowdGuard: Federated Backdoor Detection in Federated Learning.
Network and Distributed Systems Security (NDSS) Symposium 2024. San Diego, USA (26.02.24-01.03.24)
doi: 10.14722/ndss.2024.23233
Konferenzveröffentlichung, Bibliographie

Fereidooni, Hossein ; Pegoraro, Alessandro ; Rieger, Phillip ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza (2024)
FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning.
Network and Distributed Systems Security (NDSS) Symposium 2024. San Diego, USA (26.02.2024 - 01.03.2024)
Konferenzveröffentlichung, Bibliographie

Pütz, Philipp ; Mitev, Richard ; Sadeghi, Ahmad-Reza (2023)
Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats.
Annual Computer Security Applications Conference (ACSAC 2023). Austin, USA (04.12.2023-08.12.2023)
Konferenzveröffentlichung, Bibliographie

Castillo, Jorge ; Rieger, Phillip ; Fereidooni, Hossein ; Chen, Qian ; Sadeghi, Ahmad-Reza (2023)
FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks.
39th Annual Computer Security Applications Conference (ACSAC'23). Austin, USA (04.12.2023 - 08.12.2023)
doi: 10.1145/3627106.3627194
Konferenzveröffentlichung, Bibliographie

Li, Huimin ; Rieger, Phillip ; Zeitouni, Shaza ; Picek, Stjepan ; Sadeghi, Ahmad-Reza (2023)
FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning.
33rd International Conference on Field-Programmable Logic and Applications. Gothenburg, Sweden (04.09.2023-08.09.2023)
doi: htps://doi.org/10.1109/FPL60245.2023.00046
Konferenzveröffentlichung, Bibliographie

Rieger, Phillip ; Chilese, Marco ; Mohamed, Reham ; Miettinen, Markus ; Fereidooni, Hossein ; Sadeghi, Ahmad-Reza (2023)
ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks.
32nd USENIX Security Symposium. Anaheim, USA (09.08.2023-11.08.2023)
Konferenzveröffentlichung, Bibliographie

Saß, Marvin ; Mitev, Richard ; Sadeghi, Ahmad-Reza (2023)
Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M.
32nd USENIX Security Symposium. Anaheim, USA (09.08.2023-11.08.2023)
Konferenzveröffentlichung, Bibliographie

Kumari, Kavita ; Rieger, Phillip ; Fereidooni, Hossein ; Jadliwala, Murtuza ; Sadeghi, Ahmad-Reza (2023)
BayBFed: Bayesian Backdoor Defense for Federated Learning.
44th IEEE Symposium on Security and Privacy. San Francisco, USA (22.05.2023-25.05.2023)
doi: 10.1109/SP46215.2023.10179362
Konferenzveröffentlichung, Bibliographie

Koisser, David ; Brasser, Ferdinand ; Jauernig, Patrick ; Stapf, Emmanuel ; Wallum, Marcus ; Fischer, Daniel ; Sadeghi, Ahmad-Reza (2023)
Hardware-Based Isolation for Advanced Safety and Security in Spacecraft.
17th International Conference on Space Operations (SpaceOps 2023). Dubai, UAE (06.03.2023-10.03.2023)
Konferenzveröffentlichung, Bibliographie

Jauernig, Patrick ; Jakobovic, Domagoj ; Picek, Stjepan ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza (2023)
DARWIN: Survival of the Fittest Fuzzing Mutators.
Network and Distributed Systems Security (NDSS) Symposium 2023. San Diego, USA (27.02.2023-03.03.2023)
doi: 10.14722/ndss.2023.23159
Konferenzveröffentlichung, Bibliographie

Fereidooni, Hossein ; König, Jan ; Rieger, Phillip ; Chilese, Marco ; Goekbakan, Bora ; Finke, Moritz ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza (2023)
AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms.
Network and Distributed Systems Security (NDSS) Symposium 2023. San Diego, USA (27.02.2023-03.03.2023)
doi: 10.14722/ndss.2023.23194
Konferenzveröffentlichung, Bibliographie

Sendner, Christoph ; Chen, Huili ; Fereidooni, Hossein ; Petzi, Lukas ; König, Jan ; Stang, Jasper ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2023)
Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning.
Network and Distributed Systems Security (NDSS) Symposium 2023. San Diego, USA (27.02.2023-03.03.2023)
doi: 10.14722/ndss.2023.23263
Konferenzveröffentlichung, Bibliographie

Frassetto, Tommaso ; Jauernig, Patrick ; Koisser, David ; Kretzler, David ; Schlosser, Benjamin ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2023)
POSE: Practical Off-chain Smart Contract Execution.
Network and Distributed System Security Symposium 2023. San Diego, USA (27.02.2023-03.03.2023)
Konferenzveröffentlichung, Bibliographie

Chen, Chen ; Kande, Rahul ; Mahmoody, Pouya ; Sadeghi, Ahmad-Reza ; Rajendran, JV (2022)
Trusting the trust anchor: towards detecting cross-layer vulnerabilities with hardware fuzzing.
59th ACM/IEEE Design Automation Conference. San Francisco, USA (10.07.2022-14.07.2022)
doi: 10.1145/3489517.3530638
Konferenzveröffentlichung, Bibliographie

Wang, Jianqiang ; Mahmoody, Pouya ; Brasser, Ferdinand ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Yu, Donghui ; Pan, Dahan ; Zhang, Yuanyuan (2022)
VirTEE: a full backward-compatible TEE with native live migration and secure I/O.
59th ACM/IEEE Design Automation Conference. San Francisco, USA (10.07.2022-14.07.2022)
doi: 10.1145/3489517.3530436
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Mitev, Richard ; Saß, Marvin (2022)
Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M.
25th Black Hat USA. Las Vegas, USA (06.08.2022-11.08.2022)
Konferenzveröffentlichung, Bibliographie

Wang, Kai ; Mitev, Richard ; Yan, Chen ; Ji, Xiaoyu ; Sadeghi, Ahmad-Reza ; Xu, Wenyuan
Hrsg.: USENIX Association (2022)
GhostTouch: Targeted Attacks on Touchscreens without Physical Touch.
31st USENIX Security Symposium (USENIX Security 22). Boston, USA (10.08.2022-12.08.2022)
Konferenzveröffentlichung, Bibliographie

Jiang, Yan ; Ji, Xiaoyu ; Wang, Kai ; Yan, Chen ; Mitev, Richard ; Sadeghi, Ahmad-Reza ; Xu, Wenyuan (2022)
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens.
43rd IEEE Symposium on Security and Privacy. San Francisco, USA (23.05.2022-26.05.2022)
doi: 10.1109/SP46214.2022.9833740
Konferenzveröffentlichung, Bibliographie

Dessouky, Ghada ; Gruler, Alexander ; Mahmoody, Pouya ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2022)
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures.
Network and Distributed Systems Security (NDSS) Symposium 2022. San Diego, USA (24.04.2022-28.04.2022)
Konferenzveröffentlichung, Bibliographie

Rieger, Phillip ; Nguyen, Thien Duc ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2022)
DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection.
Network and Distributed Systems Security (NDSS) Symposium 2022. San Diego, USA (24.04.2022-28.04.2022)
doi: 10.14722/ndss.2022.23156
Konferenzveröffentlichung, Bibliographie

Nguyen, Thien Duc ; Rieger, Phillip ; Chen, Huili ; Yalame, Mohammad Hossein ; Möllering, Helen ; Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Zeitouni, Shaza ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2022)
FLAME: Taming Backdoors in Federated Learning.
31st USENIX Security Symposium (USENIX Security 22). Boston, USA (10.08.2022-12.08.2022)
Konferenzveröffentlichung, Bibliographie

Fereidooni, Hossein ; Dmitrienko, Alexandra ; Rieger, Phillip ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Madlener, Felix (2022)
FedCRI: Federated Mobile Cyber-Risk Intelligence.
Network and Distributed Systems Security (NDSS) Symposium 2022. San Diego, USA (24.04.2022-28.04.2022)
doi: 10.14722/ndss.2022.23153
Konferenzveröffentlichung, Bibliographie

Surminski, Sebastian ; Niesler, Christian ; Brasser, Ferdinand ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2021)
RealSWATT: Remote Software-Based Attestation for Embedded Devices under Realtime Constraints.
2021 ACM SIGSAC Conference on Computer and Communications Security. virtual Conference (15.11.2021-19.11.2021)
doi: 10.1145/3460120.3484788
Konferenzveröffentlichung, Bibliographie

Dessouky, Ghada ; Mahmoody, Pouya ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel ; Zeitouni, Shaza ; Isakov, Mihailo ; Kinsy, Michel ; Mark, Miguel (2021)
Distributed Memory Guard: Enabling Secure Enclave Computing in NoC-based Architectures.
58th Design Automation Conference. San Francisco, USA (05.12.2021-09.12.2021)
doi: 10.1109/DAC18074.2021.9586222
Konferenzveröffentlichung, Bibliographie

Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Möllering, Helen ; Nguyen, Thien Duc ; Rieger, Phillip ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Yalame, Mohammad Hossein ; Zeitouni, Shaza (2021)
SAFELearn: Secure Aggregation for private FEderated Learning.
4th Deep Learning and Security Workshop (DLS'21). virtual Conference (27.05.2021-27.05.2021)
Konferenzveröffentlichung, Bibliographie

Nguyen, Thien Duc ; Rieger, Phillip ; Yalame, Mohammad Hossein ; Möllering, Helen ; Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2021)
FLGUARD: Secure and Private Federated Learning.
Report, Bibliographie

Bahmani, Raad ; Brasser, Ferdinand ; Dessouky, Ghada ; Jauernig, Patrick ; Klimmek, Matthias ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2021)
CURE: A Security Architecture with CUstomizable and Resilient Enclaves.
30th USENIX Security Symposium (USENIX Security'21). Vancouver, Canada (11.08.2021-13.08.2021)
Konferenzveröffentlichung, Bibliographie

Chen, Yanjiao ; Bai, Yijie ; Wang, Kaibo ; Mitev, Richard ; Xu, Wenyuan ; Sadeghi, Ahmad-Reza (2021)
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants.
ACM Conference on Computer and Communications Security (CCS). virtual Conference (15.11.2021-19.11.2021)
Konferenzveröffentlichung, Bibliographie

Zeitouni, Shaza ; Dessouky, Ghada ; Sadeghi, Ahmad-Reza (2021)
SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities.
6th IEEE European Symposium on Security and Privacy (Euro S&P 2021). virtual Conference (06.09.2021-10.09.2021)
Konferenzveröffentlichung, Bibliographie

Zeitouni, Shaza ; Vliegen, Jo ; Frassetto, Tommaso ; Koch, Dirk ; Sadeghi, Ahmad-Reza ; Mentens, Nele (2021)
Trusted Configuration in Cloud FPGAs.
29th IEEE International Symposium on Field-Programmable Custom Computing Machines. virtual Conference (09.05.2021-12.05.2021)
Konferenzveröffentlichung, Bibliographie

Baumgärtner, Lars ; Dmitrienko, Alexandra ; Freisleben, Bernd ; Gruler, Alexander ; Höchst, Jonas ; Kühlberg, Joshua ; Mezini, Mira ; Mitev, Richard ; Miettinen, Markus ; Muhamedagic, Anel ; Nguyen, Thien Duc ; Penning, Alvar ; Pustelnik, Frederik ; Roos, Filipp ; Sadeghi, Ahmad-Reza ; Schwarz, Michael ; Uhl, Christian (2020)
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps.
TrustCom 2020. virtual Conference (29.12.2020-01.01.2021)
Konferenzveröffentlichung, Bibliographie

Nguyen, Thien Duc ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2020)
Long Live Randomization: On Privacy-Preserving Contact Tracing in Pandemic.
CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. virtual Conference (09.11.2020-13.11.2020)
doi: 10.1145/3411496.3421229
Konferenzveröffentlichung, Bibliographie

Buchmann, Johannes ; Dessouky, Ghada ; Frassetto, Tommaso ; Kiss, Ágnes ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Traverso, Giulia ; Zeitouni, Shaza (2020)
SAFE: A Secure and Efficient Long-Term Distributed Storage System.
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20). Taipei, Taiwan (01.06.2020-05.06.2020)
Konferenzveröffentlichung, Bibliographie

Neureither, Jens ; Dmitrienko, Alexandra ; Koisser, David ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2020)
LegIoT: Ledgered Trust Management Platform for IoT.
25th European Symposium on Research in Computer Security. virtual Conference (14.09.2020-18.09.2020)
doi: 10.1007/978-3-030-58951-6_19
Konferenzveröffentlichung, Bibliographie

Cammarota, Rosario ; Schunter, Matthias ; Rajan, Anand ; Boemer, Fabian ; Kiss, Ágnes ; Treiber, Amos ; Weinert, Christian ; Schneider, Thomas ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza ; Demmler, Daniel ; Chen, Huili ; Hussain, Siam Umar ; Riazi, M. Sadegh ; Koushanfar, Farinaz ; Gupta, Saransh ; Rosing, Tajan Simunic ; Chaudhuri, Kamalika ; Nejatollahi, Hamid ; Dutt, Nikil ; Imani, Mohsen ; Laine, Kim ; Dubey, Anuj ; Aysu, Aydin ; Sadat Hosseini, Fateme ; Yang, Chengmo ; Wallace, Eric ; Norton, Pamela (2020)
Trustworthy AI Inference Systems: An Industry Research View.
doi: 10.48550/arXiv.2008.04449
Report, Bibliographie

Dessouky, Ghada ; Frassetto, Tommaso ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza (2020)
With Great Complexity Comes Great Vulnerability: Challenges of Secure Processor Design.
In: IEEE Security & Privacy
doi: 10.1109/MSEC.2020.2994978
Artikel, Bibliographie

Dessouky, Ghada ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020)
Enclave Computing on RISC-V: A Brighter Future for Security?
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020. Boston, USA (05.04.2020-07.04.2020)
Konferenzveröffentlichung, Bibliographie

Bayerl, Sebastian P. ; Frassetto, Tommaso ; Jauernig, Patrick ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Weinert, Christian (2020)
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20). Grenoble, France (09.03.2020-13.03.2020)
Konferenzveröffentlichung, Bibliographie

Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020)
Trusted Execution Environments: Properties, Applications, and Challenges.
In: IEEE Security & Privacy, 18 (2)
doi: 10.1109/MSEC.2019.2947124
Artikel, Bibliographie

Adepu, Sridhar ; Brasser, Ferdinand ; Garcia, Luis ; Rodler, Michael ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Zonouz, Saman A. (2020)
Control Behavior Integrity for Distributed Cyber-Physical Systems.
11th International Conference on Cyber-Physical Systems (ICCPS). Sydney, Australia (22.04.2020-24.04.2020)
doi: 10.1109/ICCPS48487.2020.00011
Konferenzveröffentlichung, Bibliographie

Dessouky, Ghada ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2020)
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.
29th USENIX Security Syposium. Boston, MA, USA (12.08.2020-14.08.2020)
Konferenzveröffentlichung, Bibliographie

Dessouky, Ghada ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020)
INVITED: AI Utopia or Dystopia - On Securing AI Platforms.
DAC'20-Design Automation Conference 2020. virtual Conference (20.07.2020-24.07.2020)
Konferenzveröffentlichung, Bibliographie

Mitev, Richard ; Pazii, Anna ; Miettinen, Markus ; Enck, William ; Sadeghi, Ahmad-Reza (2020)
LeakyPick: IoT Audio Spy Detector.
36th Annual Computer Security Applications Conference. virtual Conference (07.12.2020-11.12.2020)
doi: 10.1145/3427228.3427277
Konferenzveröffentlichung, Bibliographie

Zeitouni, Shaza ; Stapf, Emmanuel ; Fereidooni, Hossein ; Sadeghi, Ahmad-Reza (2020)
On the Security of Strong Memristor-based Physically Unclonable Functions.
Design Automation Conference 2020. virtual Conference (19.07.2020-24.07.2020)
Konferenzveröffentlichung, Bibliographie

Acar, Abbas ; Fereidooni, Hossein ; Abera, Tigist ; Sikder, Amit Kumsr ; Miettinen, Markus ; Aksu, Hidayet ; Conti, Mauro ; Sadeghi, Ahmad-Reza (2020)
Peek-a-Boo: I see your smart home activities, even encrypted!
WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. virtual Conference (08.07.2020-10.07.2020)
Konferenzveröffentlichung, Bibliographie

Nguyen, Thien Duc ; Rieger, Phillip ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2020)
Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System.
Workshop on Decentralized IoT Systems and Security (DISS) @ NDSS Symposium 2020. San Diego, USA (23.02.2020-26.02.2020)
Konferenzveröffentlichung, Bibliographie

Kenjar, Zijo ; Frassetto, Tommaso ; Gens, David ; Franz, Michael ; Sadeghi, Ahmad-Reza (2020)
V0LTpwn: Attacking x86 Processor Integrity from Software.
29th USENIX Security Symposium. Boston, USA (12.08.2020-14.08.2020)
Konferenzveröffentlichung, Bibliographie

Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza (2019)
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization.
ACSAC - 35th Annual Computer Security Applications Conference. San Juan, Puerto Rico (09.12.2019-13.12.2019)
Konferenzveröffentlichung, Bibliographie

Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019)
Privacy-preserving speech processing via STPC and TEEs.
2nd Privacy Preserving Machine Learning (PPML) - CCS 2019 Workshop. London, United Kingdom (15.11.2019-15.11.2019)
Konferenzveröffentlichung, Bibliographie

Dessouky, Ghada ; Zeitouni, Shaza ; Ibrahim, Ahmad ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2019)
CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems.
2019 International Conference On Computer Aided Design (ICCAD). The Westin Westminster Westminster, CO (04.11.2019-07.11.2019)
Konferenzveröffentlichung, Bibliographie

Ghaeini, Hamid Reza ; Chan, Matthew ; Bahmani, Raad ; Brasser, Ferdinand ; Garcia, Luis ; Zhou, Jianying ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole ; Zonouz, Saman A. (2019)
PAtt: Physics-based Attestation of Control Systems.
22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID). Beijing (23.09.2019-25.09.2019)
Konferenzveröffentlichung, Bibliographie

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostáková, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019)
FastKitten: Practical Smart Contracts on Bitcoin.
28th USENIX Security Symposium. Santa Clara, CA, USA (14.08.2019-16.08.2019)
Konferenzveröffentlichung, Bibliographie

Paverd, Andrew ; Völp, Marcus ; Brasser, Ferdinand ; Schunter, Matthias ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Esteves-Verissimo, Paulo ; Steininger, Andreas ; Holz, Thorsten (2019)
Sustainable Security & Safety: Challenges and Opportunities.
4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS). Stuttgart (09.07.2019-09.07.2019)
doi: 10.4230/OASIcs.CERTS.2019.4
Konferenzveröffentlichung, Bibliographie

Bock, Carsten ; Brasser, Ferdinand ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2019)
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
ACM Asia Conference on Computer and Communications Security (AsiaCCS). Auckland (07.07.2019-12.07.2019)
doi: 10.1145/3321705.3329827
Konferenzveröffentlichung, Bibliographie

Mitev, Richard ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2019)
Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants.
ASIACCS 2019. Auckland, New Zealand (09.07.2019-11.07.2019)
doi: 10.1145/3321705.3329842
Konferenzveröffentlichung, Erstveröffentlichung

Songhori, Ebrahim ; Riazi, M. Sadegh ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2019)
ARM2GC: Succinct Garbled Processor for Secure Computation.
Design Automation Conference (DAC), 2019 56th ACM/EDAC/IEEE. Las Vegas, USA (02.06.2019-06.06.2019)
Konferenzveröffentlichung, Bibliographie

Marchal, Samuel ; Miettinen, Markus ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Asokan, N. (2019)
AuDI: Towards autonomous IoT device-type identification using periodic communications.
In: IEEE Journal on Selected Areas in Communications
Artikel, Bibliographie

Batina, Lejla ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019)
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
Design Automation Conference 2019. Las Vegas, NV, USA (02.06.2019-06.06.2019)
Konferenzveröffentlichung, Bibliographie

Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2019)
HardFails: Insights into Software-Exploitable Hardware Bugs.
28th USENIX Security Symposium. Santa Clara, CA, USA (14.08.2019-16.08.2019)
Konferenzveröffentlichung, Bibliographie

O'Connor, T. J. ; Mohamed, Reham ; Miettinen, Markus ; Enck, William ; Reaves, Bradley ; Sadeghi, Ahmad-Reza (2019)
HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices.
Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). Miami, FL, USA
Konferenzveröffentlichung, Bibliographie

Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Fereidooni, Hossein ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019)
DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
Konferenzveröffentlichung, Bibliographie

Marchal, Samuel ; Miettinen, Markus ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Asokan, N. (2019)
AUDI: Towards Autonomous IoT Device-Type Identification.
In: IEEE Journal on Selected Areas in Communications (JSAC) on Artificial Intelligence and Machine Learning for Networking and Communications
Artikel, Bibliographie

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019)
HEALED: HEaling & Attestation for Low-end Embedded Devices.
23rd International Conference Financial Cryptography and Data Security (FC 2019), 2019.
Konferenzveröffentlichung, Bibliographie

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostakova, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019)
FastKitten: Practical Smart Contracts on Bitcoin.
Report, Bibliographie

Aschermann, Cornelius ; Frassetto, Tommaso ; Holz, Thorsten ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Teuchert, Daniel (2019)
Nautilus: Fishing for Deep Bugs with Grammars.
Konferenzveröffentlichung, Bibliographie

Brasser, Ferdinand ; Gens, David ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019)
SANCTUARY: ARMing TrustZone with User-space Enclaves.
Konferenzveröffentlichung, Bibliographie

Weiser, Samuel ; Werner, Mario ; Brasser, Ferdinand ; Malenko, Maja ; Mangard, Stefan ; Sadeghi, Ahmad-Reza (2019)
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V.
Konferenzveröffentlichung, Bibliographie

Abera, Tigist ; Bahmani, Raad ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2019)
DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous System.
Konferenzveröffentlichung, Bibliographie

Mohamed, Reham ; O'Connor, Terrance ; Miettinen, Markus ; Enck, William ; Sadeghi, Ahmad-Reza
Hrsg.: Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang (2019)
HONEYSCOPE: IoT Device Protection with Deceptive Network Views,.
In: Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings
Buchkapitel, Bibliographie

Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019)
HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.
Design Automation Conference (DAC). Las Vegas, USA (03.06.2019-05.06.2019)
Konferenzveröffentlichung, Bibliographie

Oliveira Nunes, Ivan de ; Dessouky, Ghada ; Ibrahim, Ahmad ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019)
Towards Systematic Design of Collective Remote Attestation Protocols.
The 39th International Conference on Distributed Computing Systems (ICDCS) 2019. Dallas, TX, USA (07.07.2019-10.07.2019)
doi: 10.1109/ICDCS.2019.00120
Konferenzveröffentlichung, Bibliographie

Miettinen, Markus ; Sadeghi, Ahmad-Reza (2018)
Internet of things or threats?: on building trust in IoT (keynote). 1:1-1:9.
CODES+ISSS 2018, part of ESWEEK 2018. Torino, Italy (30.09.2018-05.10.2018)
Konferenzveröffentlichung, Bibliographie

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian (2018)
VoiceGuard: Secure and Private Speech Processing.
Interspeech 2018. HYDERABAD (02.09.2018-06.09.2018)
doi: 10.21437/Interspeech.2018-2032
Konferenzveröffentlichung, Bibliographie

Frassetto, Tommaso ; Jauernig, Patrick ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2018)
IMIX: In-Process Memory Isolation EXtension.
27th USENIX Security Symposium - Technical Sessions Track 2. Baltimore, MD, USA (15.08.2018-17.08.2018)
Konferenzveröffentlichung, Bibliographie

Carpent, Xavier ; Eldefrawy, Karim ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018)
Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices.
Design Automation Conference. San Francisco, USA (24.06.2018-29.06.2018)
Konferenzveröffentlichung, Bibliographie

Dessouky, Ghada ; Abera, Tigist ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza (2018)
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution.
37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18). San Diego, CA, USA (05.11.2018-08.11.2018)
Konferenzveröffentlichung, Bibliographie

Asokan, N. ; Nyman, Thomas ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018)
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems - Special Issue ESWEEK 2018, CASES 2018, CODES + ISSS 2018 and EMSOFT 2018
Artikel, Bibliographie

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2018)
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
23rd European Symposium on Research in Computer Security (ESORICS 2018). Barcelona, Spain (03.09.2018-07.09.2018)
Konferenzveröffentlichung, Bibliographie

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018)
US-AID: Unattended Scalable Attestation of IoT Devices.
37th IEEE International Symposium on Reliable Distributed Systems (SRDS 2018). Salvador, Brazil (02.10.2018-05.10.2018)
Konferenzveröffentlichung, Bibliographie

Schaad, Andreas ; Grohmann, Bjoern ; Winzenried, Oliver ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2018)
Towards a Cloud-based System for Software Protection and Licensing.
Secrypt 2018. Porto, Portugal (26.07.2018-28.07.2018)
doi: 10.5220/0006899506980702
Konferenzveröffentlichung, Bibliographie

Zeitouni, Shaza ; Gens, David ; Sadeghi, Ahmad-Reza (2018)
It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs.
Konferenzveröffentlichung, Bibliographie

Miettinen, Markus ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2018)
Revisiting Context-Based Pairing in IoT.
55th Design Automation Conference (DAC). San Francisco, CA, USA (24.06.2018-29.06.2018)
Konferenzveröffentlichung, Bibliographie

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza (2018)
iOracle: Automated Evaluation of Access Control Policies in iOS.
Konferenzveröffentlichung, Bibliographie

Biondo, Andrea ; Conti, Mauro ; Davi, Lucas ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2018)
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
27th USENIX Security Symposium.
Konferenzveröffentlichung, Bibliographie

Ghaeini, Hamid Reza ; Antonioli, Daniele ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole (2018)
State-Aware Anomaly Detection for Industrial Control Systems.
Pau, France
doi: 10.1145/3167132.3167305
Konferenzveröffentlichung, Bibliographie

Gens, David ; Schmitt, Simon ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2018)
K-Miner: Uncovering Memory Corruption in Linux.
Konferenzveröffentlichung, Bibliographie

Brasser, Ferdinand ; Davi, Lucas ; Dhavlle, Abhijitt ; Frassetto, Tommaso ; Dinakarrao, Sai Manoj Pudukotai ; Rafatirad, Setareh ; Sadeghi, Ahmad-Reza ; Sasan, Avesta ; Sayadi, Hossein ; Zeitouni, Shaza ; Homayoun, Houman (2018)
Advances and Throwbacks in Hardware-assisted Security: Special Session.
Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems. Piscataway, NJ, USA
Konferenzveröffentlichung, Bibliographie

Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Dang, Minh Hoang ; Asokan, N. ; Sadeghi, Ahmad-Reza (2018)
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
In: CoRR, abs/1804.07474
Artikel, Bibliographie

Mohan, Sibin ; Asplund, Mikael ; Bloom, Gedare ; Sadeghi, Ahmad-Reza ; Ibrahim, Ahmad ; Salajageh, Negin ; Griffioen, Paul ; Sinopoli, Bruno (2018)
The Future of IoT Security: Special Session.
International Conference on Embedded Software (EMSOFT 2018), 2018. Piscataway, NJ, USA
Konferenzveröffentlichung, Bibliographie

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep (2018)
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
In: IEEE Internet Computing
doi: 10.1109/MIC.2018.182130646
Artikel, Bibliographie

Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2018)
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs.
In: Cryptography and Security, abs/1812.00197
Artikel, Bibliographie

Zeitouni, Shaza ; Dessouky, Ghada ; Arias, Orlando ; Sullivan, Dean ; Ibrahim, Ahmad ; Jin, Yier ; Sadeghi, Ahmad-Reza (2017)
ATRIUM: Runtime Attestation Resilient Under Memory Attacks.
Irvine, California, US
Konferenzveröffentlichung, Bibliographie

Frassetto, Tommaso ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017)
JITGuard: Hardening Just-in-time Compilers with SGX.
Dallas, TX, USA
doi: 10.1145/3133956.3134037
Konferenzveröffentlichung, Bibliographie

Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Müller, Urs ; Sadeghi, Ahmad-Reza (2017)
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
doi: 10.48550/arXiv.1709.09917
Report, Bibliographie

Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro (2017)
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
Atlanta, Georgia, USA
Konferenzveröffentlichung, Bibliographie

Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2017)
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
Konferenzveröffentlichung, Bibliographie

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017)
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
Konferenzveröffentlichung, Bibliographie

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza (2017)
Software Grand Exposure: SGX Cache Attacks Are Practical.
Konferenzveröffentlichung, Bibliographie

Fereidooni, Hossein ; Frassetto, Tommaso ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Conti, Mauro (2017)
Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
Philadelphia, Pennsylvania, USA
Konferenzveröffentlichung, Bibliographie

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza (2017)
HardIDX: Practical and Secure Index with SGX.
Konferenzveröffentlichung, Bibliographie

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick (2017)
Phonion: Practical Protection of Metadata in Telephony Networks.
Konferenzveröffentlichung, Bibliographie

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza (2017)
SeED: Secure Non-Interactive Attestation for Embedded Devices.
Boston, USA
Konferenzveröffentlichung, Bibliographie

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Frassetto, Tommaso ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu (2017)
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
Atlanta, GA, USA
doi: 10.1109/ICDCS.2017.284
Konferenzveröffentlichung, Bibliographie

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu (2017)
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT.
doi: 10.1109/ICDCS.2017.283
Konferenzveröffentlichung, Bibliographie

Dessouky, Ghada ; Zeitouni, Shaza ; Nyman, Thomas ; Paverd, Andrew ; Davi, Lucas ; Koeberl, Patrick ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017)
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
54th Design Automation Conference (DAC'17).
Konferenzveröffentlichung, Bibliographie

Portela, Bernardo ; Barbosa, Manuel ; Scerri, Guillaume ; Warinschi, Bogdan ; Bahmani, Raad ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2017)
Secure Multiparty Computation from SGX.
Konferenzveröffentlichung, Bibliographie

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed (2017)
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
Konferenzveröffentlichung, Bibliographie

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. (2017)
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017)
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
Konferenzveröffentlichung, Bibliographie

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael (2017)
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17). San Diego, California (26.02.2017-01.03.2017)
doi: 10.14722/ndss.2017.23097
Konferenzveröffentlichung, Bibliographie

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2017)
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (1)
doi: 10.1515/popets-2017-0005
Artikel, Bibliographie

Sullivan, Dean ; Arias, Orlando ; Gens, David ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier (2017)
Execution Integrity with In-Place Encryption.
In: CoRR, abs/1703.02698
Artikel, Bibliographie

Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017)
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.
In: Cryptography and Security, abs/1705.10295
Artikel, Bibliographie

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016)
CATT: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
In: Cryptography and Security
Artikel, Bibliographie

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016)
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
Konferenzveröffentlichung, Bibliographie

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016)
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Ibrahim, Ahmad ; Conti, Mauro ; Neven, Gregory (2016)
SANA: Secure and Scalable Aggregate Network Attestation.
Konferenzveröffentlichung, Bibliographie

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza (2016)
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
Konferenzveröffentlichung, Bibliographie

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza (2016)
DARPA: Device Attestation Resilient to Physical Attacks.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Dessouky, Ghada (2016)
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
Konferenzveröffentlichung, Bibliographie

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2016)
POSTER: Toward a Secure and Scalable Attestation.
Konferenzveröffentlichung, Bibliographie

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza (2016)
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
Konferenzveröffentlichung, Bibliographie

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2016)
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
53. Annual Design Automation Conference (DAC'16). Austin Texas (05.06.2016-09.06.2016)
doi: 10.1145/2897937.2898027
Konferenzveröffentlichung, Bibliographie

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016)
Regulating ARM TrustZone Devices in Restricted Spaces.
Konferenzveröffentlichung, Bibliographie

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016)
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
Konferenzveröffentlichung, Bibliographie

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael (2016)
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
Konferenzveröffentlichung, Bibliographie

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza (2016)
Things, Trouble, Trust: On Building Trust in IoT Systems.
Konferenzveröffentlichung, Bibliographie

McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh (2016)
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, 104 (5)
doi: 10.1109/JPROC.2015.2512235
Artikel, Bibliographie

Zeitouni, Shaza ; Oren, Yossef ; Wachsmann, Christian ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2016)
Remanence Decay Side-Channel: The PUF Case.
In: IEEE Transactions on Information Forensics and Security, 99
doi: 10.1109/TIFS.2015.2512534
Artikel, Bibliographie

Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016)
Leakage-Resilient Layout Randomization for Mobile Devices.
Konferenzveröffentlichung, Bibliographie

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016)
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
Report, Bibliographie

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016)
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
Konferenzveröffentlichung, Bibliographie

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016)
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
Konferenzveröffentlichung, Bibliographie

Miettinen, Markus ; Huang, Jialin ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2016)
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
Darmstadt, Germany
Konferenzveröffentlichung, Bibliographie

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016)
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Armknecht, Frederik (2016)
Towards a Unified Security Model for Physically Unclonable Functions.
Konferenzveröffentlichung, Bibliographie

Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael (2015)
Automated Software Diversity.
doi: 10.2200/S00686ED1V01Y201512SPT014
Buch, Bibliographie

Davi, Lucas ; Sadeghi, Ahmad-Reza (2015)
Building Secure Defenses Against Code-Reuse Attacks.
doi: 10.1007/978-3-319-25546-0
Buch, Bibliographie

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2015)
Automated Synthesis of Optimized Circuits for Secure Computation.
22. ACM Conference on Computer and Communications Security (CCS'15). Denver Colorado USA (12.10.2015-16.10.2015)
doi: 10.1145/2810103.2813678
Konferenzveröffentlichung, Bibliographie

Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael (2015)
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
Konferenzveröffentlichung, Bibliographie

Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza (2015)
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
Konferenzveröffentlichung, Bibliographie

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015)
SEDA: Scalable Embedded Device Attestation.
Konferenzveröffentlichung, Bibliographie

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015)
Return to Where? You Can't Exploit What You Can't Find.
Konferenzveröffentlichung, Bibliographie

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015)
SEDA - Technical Report.
Report, Bibliographie

Songhori, Ebrahim ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2015)
Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis.
Konferenzveröffentlichung, Bibliographie

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015)
HAFIX: Hardware-Assisted Flow Integrity Extension.
Konferenzveröffentlichung, Bibliographie

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015)
HAFIX: Hardware-Assisted Flow Integrity Extension (Best Paper Award).
DAC '15: The 52nd Annual Design Automation Conference 2015. San Francisco, California (07.06.2015-11.06.2015)
Konferenzveröffentlichung, Bibliographie

Nagy, Marcin ; Bui, Thanh Phong ; Cristofaro, Emiliano De ; Asokan, N. ; Ott, Jörg ; Sadeghi, Ahmad-Reza (2015)
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Waidner, Michael (2015)
Security and Privacy Challenges in Industrial Internet of Things.
Konferenzveröffentlichung, Bibliographie

Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2015)
TyTAN: Tiny Trust Anchor for Tiny Devices.
Konferenzveröffentlichung, Bibliographie

Schuster, Felix ; Tendyck, Thomas ; Liebchen, Christopher ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten (2015)
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
Konferenzveröffentlichung, Bibliographie

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015)
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
Konferenzveröffentlichung, Bibliographie

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2015)
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
36. IEEE Symposium on Security and Privacy (IEEE S&P'15). San Jose, California (18.05.2015-20.05.2015)
doi: 10.1109/SP.2015.32
Konferenzveröffentlichung, Bibliographie

Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza (2015)
XiOS: Extended Application Sandboxing on iOS.
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian (2015)
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
Konferenzveröffentlichung, Bibliographie

Dmitrienko, Alexandra ; Heuser, Stephan ; Nguyen, Thien Duc ; Ramos, Marcos da Silva ; Rein, Andre ; Sadeghi, Ahmad-Reza (2015)
Market-driven Code Provisioning to Mobile Secure Hardware.
Konferenzveröffentlichung, Bibliographie

Busold, Christoph ; Heuser, Stephan ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah (2015)
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
Konferenzveröffentlichung, Bibliographie

Miettinen, Markus ; Asokan, N. ; Koushanfar, Farinaz ; Nguyen, Thien Duc ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Sobhani, Majid ; Yellapantula, Sudha (2015)
I know where you are: Proofs of Presence resilient to malicious provers.
Konferenzveröffentlichung, Bibliographie

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep (2015)
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices.
In: CoRR, abs/1511.02119
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Davi, Lucas ; Larsen, Per (2015)
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? - Keynote -.
Konferenzveröffentlichung, Bibliographie

Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2014)
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions.
doi: 10.2200/S00622ED1V01Y201412SPT012
Buch, Bibliographie

Miettinen, Markus ; Asokan, N. ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Sobhani, Majid (2014)
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
doi: 10.1145/2660267.2660334
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Brasser, Ferdinand (2014)
Swap and Play: Live Updating Hypervisors and Its Application to Xen.
doi: 10.1145/2664168.2664173
Konferenzveröffentlichung, Bibliographie

Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
Hrsg.: Kutylowski, Miroslaw ; Vaidya, Jaideep (2014)
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014
doi: 10.1007/978-3-319-11203-9_5
Buchkapitel, Bibliographie

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014)
ASM: A Programmable Interface for Extending Android Security.
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza (2014)
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
Konferenzveröffentlichung, Bibliographie

Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2014)
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8)
Artikel, Bibliographie

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014)
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Konferenzveröffentlichung, Bibliographie

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014)
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4)
Artikel, Bibliographie

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. (2014)
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
Kyoto, Japan
doi: 10.1145/2590296.2590337
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2014)
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
Konferenzveröffentlichung, Bibliographie

Kong, Joonho ; Koushanfar, Farinaz ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2014)
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
Konferenzveröffentlichung, Bibliographie

Mustafa, Hossen ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Xu, Wenyuan (2014)
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014)
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Report, Bibliographie

Koeberl, Patrick ; Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Varadharajan, Vijay (2014)
TrustLite: A Security Architecture for Tiny Embedded Devices.
Amsterdam, Netherlands
doi: 10.1145/2592798.2592824
Konferenzveröffentlichung, Bibliographie

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014)
ASM: A Programmable Interface for Extending Android Security.
Report, Bibliographie

Senftleben, Marius ; Bucicoiu, Mihai ; Tews, Erik ; Armknecht, Frederik ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza (2014)
MoP-2-MoP - Mobile private microblogging.
Konferenzveröffentlichung, Bibliographie

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014)
On the (In)Security of Mobile Two-Factor Authentication.
Konferenzveröffentlichung, Bibliographie

Dmitrienko, Alexandra ; Noack, David ; Sadeghi, Ahmad-Reza ; Yung, Moti (2014)
POSTER: On Offline Payments with Bitcoin.
Konferenzveröffentlichung, Bibliographie

Schulz, Steffen ; Varadharajan, Vijay ; Sadeghi, Ahmad-Reza (2014)
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: IEEE Transactions on Information Forensis and Security, 9 (2)
Artikel, Bibliographie

Catuogno, Luigi ; Löhr, Hans ; Winandy, Marcel ; Sadeghi, Ahmad-Reza (2014)
A trusted versioning file system for passive mobile storage devices.
Konferenzveröffentlichung, Bibliographie

Nagy, Marcin ; Cristofaro, Emiliano De ; Dmitrienko, Alexandra ; Asokan, N. ; Sadeghi, Ahmad-Reza (2013)
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
New Orleans, Loouisiana, USA
Konferenzveröffentlichung, Bibliographie

Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza (2013)
Mobile Platform Security.
doi: 10.2200/S00555ED1V01Y201312SPT009
Buch, Bibliographie

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2013)
A Security Framework for Analysis and Design of Software Attestation.
Konferenzveröffentlichung, Bibliographie

Stancill, Blaine ; Snow, Kevin ; Otterness, Nathan ; Monrose, Fabian ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2013)
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
Konferenzveröffentlichung, Bibliographie

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. (2013)
ConXsense – Context Sensing for Adaptive Usable Access Control.
Report, Bibliographie

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2013)
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
Konferenzveröffentlichung, Bibliographie

Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza (2013)
Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same.
Konferenzveröffentlichung, Bibliographie

Oren, Yossef ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2013)
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
Konferenzveröffentlichung, Bibliographie

Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013)
Client-controlled Cryptography-as-a-Service in the Cloud.
Konferenzveröffentlichung, Bibliographie

Asokan, N. ; Dmitrienko, Alexandra ; Nagy, Marcin ; Reshetova, Elena ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stelle, Stanislaus (2013)
CrowdShare: Secure Mobile Resource Sharing.
11. International Conference on Applied Cryptography and Network Security (ACNS'13). Banff AB Canada (25.06.2013-28.06.2013)
doi: 10.1007/978-3-642-38980-1_27
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013)
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
Konferenzveröffentlichung, Bibliographie

Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza (2013)
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (Best Student Paper Award).
Konferenzveröffentlichung, Bibliographie

Buchmann, Johannes ; Demirel, Denise ; Graaf, Jeroen van de
Hrsg.: Sadeghi, Ahmad-Reza (2013)
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
Konferenzveröffentlichung, Bibliographie

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2013)
A Systematic Approach to Practically Efficient General Two-Party Secure Function Evaluation Protocols and their Modular Design.
In: Journal of Computer Security (JCS), 21 (2)
doi: 10.3233/JCS-130464
Artikel, Bibliographie

Kocabas, Unal ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2013)
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
Konferenzveröffentlichung, Bibliographie

Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2013)
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
San Antonio, Texas, USA
doi: 10.1145/2435349.2435382
Konferenzveröffentlichung, Bibliographie

Werthmann, Tim ; Hund, Ralf ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten (2013)
PSiOS: Bring Your Own Privacy & Security to iOS Devices (Distinguished Paper Award).
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2012)
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
Konferenzveröffentlichung, Bibliographie

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012)
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
Report, Bibliographie

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012)
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
Report, Bibliographie

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Rožic, Vladimir ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012)
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay (2012)
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version).
Report, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012)
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Kocabaş, Ünal ; Katzenbeisser, Stefan (2012)
Converse PUF-Based Authentication.
Konferenzveröffentlichung, Bibliographie

Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Tamrakar, Sandeep ; Wachsmann, Christian (2012)
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
Konferenzveröffentlichung, Bibliographie

Seudié, Hervé ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza (2012)
EDA for Secure and Dependable Cybercars: Challenges and Opportunities.
Konferenzveröffentlichung, Bibliographie

Wachsmann, Christian ; Sadeghi, Ahmad-Reza ; Schulz, Steffen (2012)
Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions.
In: Secure Smart Embedded Devices, Platforms and Applications
Buchkapitel, Bibliographie

Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Zhdanova, Maria ; Xu, Wenyuan ; Mustafa, Hossen ; Varadharajan, Vijay (2012)
Tetherway: A Framework for Tethering Camouflage.
Tuscon, Arizona
Konferenzveröffentlichung, Bibliographie

Jiang, Xuxian ; Grace, Michael ; Sadeghi, Ahmad-Reza ; Zhou, Wu (2012)
Unsafe Exposure Analysis of Mobile In-App Advertisements.
Konferenzveröffentlichung, Bibliographie

Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid (2012)
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
Konferenzveröffentlichung, Bibliographie

Ahmad, Junaid Jameel ; Li, Shujun ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2012)
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
16. International Conference on Financial Cryptography and Data Security (FC'12). Kralendijk, Bonaire (02.03.2012-02.03.2012)
doi: 10.1007/978-3-642-32946-3_22
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012)
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
Konferenzveröffentlichung, Bibliographie

Herrewege, Anthony van ; Katzenbeisser, Stefan ; Maes, Roel ; Peeters, Roel ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012)
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
Konferenzveröffentlichung, Bibliographie

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2012)
Towards Taming Privilege-Escalation Attacks on Android.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay
Hrsg.: Foresti, Sara ; Yung, Moti ; Martinelli, Fabio (2012)
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: European Symposium on Research in Computer Science (ESORICS)
Buchkapitel, Bibliographie

Bugiel, Sven ; Pöppelmann, Thomas ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
AmazonIA: When Elasticity Snaps Back.
18. ACM Conference on Computer and Communications Security (CCS'11). Chicago Illinois USA (17.10.2011- 21.10.2011)
doi: 10.1145/2046707.2046753
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011)
POSTER: Control-Flow Integrity for Smartphones.
Konferenzveröffentlichung, Bibliographie

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2011)
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
Konferenzveröffentlichung, Bibliographie

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2011)
Practical and Lightweight Domain Isolation on Android.
Konferenzveröffentlichung, Bibliographie

Bugiel, Sven ; Davi, Lucas ; Schulz, Steffen
Hrsg.: Sadeghi, Ahmad-Reza ; Zhang, Xinwen (2011)
Scalable Trust Establishment with Software Reputation.
Chicago, Illinois, USA
Konferenzveröffentlichung, Bibliographie

Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
Twin Clouds: Secure Cloud Computing with Low Latency.
12. Communications and Multimedia Security Conference (CMS'11). Ghent, Belgium (19.10.2011-21.10.2011)
doi: 10.1007/978-3-642-24712-5_3
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2011)
Lightweight Remote Attestation Using Physical Functions.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2011)
Lightweight Remote Attestation using Physical Functions (Extended Version).
Report, Bibliographie

Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2011)
Location Privacy in RFID Systemen.
In: Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (2)
Artikel, Bibliographie

Barni, Mauro ; Failla, Pierluigi ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
Privacy-Preserving ECG Classification with Branching Programs and Neural Networks.
In: IEEE Transactions on Information Forensics and Security (TIFS), 6 (2)
doi: 10.1109/TIFS.2011.2108650
Artikel, Bibliographie

Filyanov, Atanas ; McCune, Jonathan ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
Hong Kong
Konferenzveröffentlichung, Bibliographie

Armknecht, Frederik ; Maes, Roel ; Sadeghi, Ahmad-Reza ; Standaert, François-Xavier ; Wachsmann, Christian (2011)
A Formal Foundation for the Security Features of Physical Functions.
Konferenzveröffentlichung, Bibliographie

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza (2011)
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.
Report, Bibliographie

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
Konferenzveröffentlichung, Bibliographie

Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
Twin Clouds: An Architecture for Secure Cloud Computing.
Workshop on Cryptography and Security in Clouds (WCSC'11). Zurich, Switzerland (15.03.2011 - 16.03.2011)
Konferenzveröffentlichung, Bibliographie

Fischlin, Marc ; Pinkas, Benny ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Visconti, Ivan (2011)
Secure Set Intersection with Untrusted Hardware Tokens.
11th Cryptographers' Track at the RSA Conference (CT-RSA'11). San Francisco, CA, USA (14.02.2011-18.02.2011)
doi: 10.1007/978-3-642-19074-2_1
Konferenzveröffentlichung, Bibliographie

Li, Shujun ; Sadeghi, Ahmad-Reza ; Heisrath, Soeren ; Schmitz, Roland ; Ahmad, Junaid Jameel (2011)
hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers.
St. Lucia
Konferenzveröffentlichung, Bibliographie

Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
A Security Architecture for Accessing Health Records on Mobile Phones.
Rome, Italy
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011)
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED)
Buchkapitel, Bibliographie

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Leest, Vincent van der ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Schröder, Heike ; Wachsmann, Christian (2011)
Recyclable PUFs: Logically Reconfigurable PUFs.
Konferenzveröffentlichung, Bibliographie

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Leest, Vincent van der ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Wachsmann, Christian (2011)
Recyclable PUFs: logically reconfigurable PUFs.
In: Journal of Cryptographic Engineering, 1 (3)
Artikel, Bibliographie

Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
Securing the Access to Electronic Health Records on Mobile Phones.
Konferenzveröffentlichung, Bibliographie

Dmitrienko, Alexandra ; Gessner, Dennis ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Stüble, Christian ; Ullmann, Markus (2011)
Trusted embedded System Operating System (TeSOS) - Study and Design.
Anderes, Bibliographie

Sadeghi, Ahmad-Reza ; Li, Shujun ; Shah, Syed Amier Haider ; Khan, Muhammad Asad Usman ; Khayam, Syed Ali ; Schmitz, Roland (2010)
Breaking e-Banking CAPTCHAs.
Konferenzveröffentlichung, Bibliographie

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Scafuro, Alessandra ; Visconti, Ivan ; Wachsmann, Christian (2010)
Impossibility Results for RFID Privacy Notions.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Preneel, Bart ; Pfitzmann, Andreas ; Moran, Tal ; Maier-Rabler, Ursula ; Kutylowski, Miroslaw ; Klonowski, Marek ; Guerses, Seda ; Danezis, George ; Borisov, Nikita ; Baer, Walter (2010)
Machiavelli Confronts 21st Century Digital Technology: Democracy in a Network Society.
Konferenzveröffentlichung, Bibliographie

Bugiel, Sven ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
TruWalletM: Secure Web Authentication on Mobile Platforms.
Konferenzveröffentlichung, Bibliographie

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
Securing the E-Health Cloud.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Naccache, David (2010)
Towards Hardware-Intrinsic Security.
Konferenzveröffentlichung, Bibliographie

Chen, Liqun ; Dietrich, Kurt ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Winter, Johannes (2010)
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
Privilege Escalation Attacks on Android.
Boca Raton, Florida, USA
Konferenzveröffentlichung, Bibliographie

Checkoway, Stephen ; Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Shacham, Hovav ; Winandy, Marcel (2010)
Return-Oriented Programming without Returns.
Chicago, Illinois, USA
doi: 10.1145/1866307.1866370
Konferenzveröffentlichung, Bibliographie

Henecka, Wilko ; Kögl, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo (2010)
TASTY: Tool for Automating Secure Two-partY computations.
CCS'10. Chicago Illinois USA (04.10.2010-08.10.2010)
doi: 10.1145/1866307.1866358
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Mukherjee, Biswanath ; Ghosal, Dipak ; Liu, Yali (2010)
Video Streaming Forensic - Content Identification with Traffic Snooping.
Konferenzveröffentlichung, Bibliographie

Almeida, José Bacelar ; Bangerter, Endre ; Barbosa, Manuel ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
15th European Symposium on Research in Computer Security (ESORICS'10). Athens, Greece (20.09.2010 - 22.09.2010)
doi: 10.1007/978-3-642-15497-3_10
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten.
Workshop Innovative und sichere Informationstechnologie für das Gesundheitswesen von morgen (perspeGKtive'10). Mannheim (08.09.2010-08.09.2010)
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010)
Enhancing RFID Security and Privacy by Physically Unclonable Functions.
In: Towards Hardware-Intrinsic Security: Foundations and Practice
Buchkapitel, Bibliographie

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
12. International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10). Santa Barbara, USA (17.08.2010-20.08.2010)
doi: 10.1007/978-3-642-15031-9_26
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2010)
Trusted Computing.
Konferenzveröffentlichung, Bibliographie

Bangerter, Endre ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
YACZK: Yet Another Compiler for Zero-Knowledge.
19th USENIX Security Symposium. Washington D.C., USA (14.08.2019-16.08.2019)
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
Return-Oriented Programming without Returns on ARM.
Report, Bibliographie

Armknecht, Frederik ; Chen, Liqun ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2010)
Anonymous Authentication for RFID Systems.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Cesena, Emanuele ; Ramunno, Gianluca ; Vernizzi, Davide (2010)
Anonymous Authentication with TLS and DAA.
Konferenzveröffentlichung, Bibliographie

Alsouri, Sami ; Dagdelen, Özgür ; Katzenbeisser, Stefan
Hrsg.: Acquisti, A. ; Sadeghi, Ahmad-Reza (2010)
Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation.
Konferenzveröffentlichung, Bibliographie

Kostiainen, Kari ; Dmitrienko, Alexandra ; Ekberg, Jan-Erik ; Sadeghi, Ahmad-Reza ; Asokan, N. (2010)
Key Attestation from Trusted Execution Environments.
Berlin
Konferenzveröffentlichung, Bibliographie

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010)
On RFID Privacy with Mutual Authentication and Tag Corruption.
Konferenzveröffentlichung, Bibliographie

Armknecht, Frederik ; Ghosal, Dipak ; Katzenbeisser, Stefan ; Liu, Yali ; Sadeghi, Ahmad-Reza ; Schulz, Steffen (2010)
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Winandy, Marcel (2010)
Token-Based Cloud Computing - Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
3. International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud. Berlin (21.06.2010-23.06.2010)
doi: 10.1007/978-3-642-13869-0_30
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Li, Shujun ; Khayam, Syed Ali ; Schmitz, Roland (2010)
Breaking a Virtual Password System Based on Randomized Linear Generation Functions.
Konferenzveröffentlichung, Bibliographie

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2010)
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5
Artikel, Bibliographie

Manulis, Mark ; Sadeghi, Ahmad-Reza (2010)
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.
In: Int. J. of Wireless and Mobile Computing (IJWMC), 4 (1)
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010)
PUF-Enhanced RFID Security and Privacy.
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
Report, Bibliographie

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2010)
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 34 (5)
Artikel, Bibliographie

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
Patterns for Secure Boot and Secure Storage in Computer Systems.
Konferenzveröffentlichung, Bibliographie

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Embedded SFE: Offloading Server and Network using Hardware Tokens.
14. International Conference on Financial Cryptography and Data Security (FC'10). Tenerife, Canary Islands (25.01.2010-28.10.2010)
doi: 10.1007/978-3-642-14577-3_17
Konferenzveröffentlichung, Bibliographie

Schulz, Steffen ; Sadeghi, Ahmad-Reza (2010)
Extending IPsec for Efficient Remote Attestation.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Cabuk, Serdar ; Dalton, Chris ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramasamy, Hari Govind ; Ramunno, Gianluca ; Schunter, Matthias (2010)
Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers.
In: Journal of Computer Security, 18 (1)
Artikel, Bibliographie

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens.
In: Towards Hardware Intrinsic Security: Foundation and Practice
doi: 10.1007/978-3-642-14452-3_17
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009)
Anonymizer-Enabled Security and Privacy for RFID.
Konferenzveröffentlichung, Bibliographie

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Paus, Annika ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Efficient Privacy-Preserving Classification of ECG Signals.
2009 First IEEE International Workshop on Information Forensics and Security (WIFS). London (06.12.2009-09.12.2009)
doi: 10.1109/WIFS.2009.5386475
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo (2009)
Efficient Privacy-Preserving Face Recognition.
12. International Conference on Information Security and Cryptology (ICISC'09). Seoul, Korea (02.12.2009-04.12.2009)
doi: 10.1007/978-3-642-14423-3_16
Konferenzveröffentlichung, Bibliographie

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan (2009)
Hide and Seek in Time - Robust Covert Timing Channels.
Konferenzveröffentlichung, Bibliographie

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
8. International Conference on Cryptology And Network Security (CANS'09). Kanazawa, Japan (12.12.2009-14.12.2009)
doi: 10.1007/978-3-642-10433-6_1
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Maes, Roel ; Sunar, Berk ; Tuyls, Pim (2009)
Memory Leakage-Resilient Encryption based on Physically Unclonable Functions.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Li, Shujun ; Asghar, Hassan Jameel ; Pieprzyk, Josef ; Schmitz, Roland ; Wang, Huaxiong (2009)
On the Security of PAS (Predicate-based Authentication Service).
Konferenzveröffentlichung, Bibliographie

Catuogno, Luigi ; Dmitrienko, Alexandra ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramunno, Gianluca ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Schunter, Matthias ; Winandy, Marcel ; Zhan, Jing (2009)
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics.
3rd Section Days of Ruhr-University Bochum Research School. Bochum, Germany (06.11.2009-06.11.2009)
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Zhan, Jing ; Korthaus, René (2009)
A Practical Property-based Bootstrap Architecture.
Konferenzveröffentlichung, Bibliographie

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
Transparent Mobile Storage Protection in Trusted Virtual Domains.
Konferenzveröffentlichung, Bibliographie

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
Transparent Mobile Storage Protection in Trusted Virtual Domains.
Konferenzveröffentlichung, Bibliographie

Gajek, Sebastian ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Vishik, Claire ; Verbauwhede, Ingrid (2009)
Future of Assurance: Ensuring that a System is Trustworthy.
Konferenzveröffentlichung, Bibliographie

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09)
Buchkapitel, Bibliographie

Bangerter, Endre ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Tsay, Joe-Kai (2009)
On the Design and Implementation of Efficient Zero-Knowledge Proofs of Knowledge.
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09)
Buchkapitel, Bibliographie

Bangerter, Endre ; Briner, Thomas ; Henecka, Wilko ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Automatic Generation of Sigma-Protocols.
In: 6. European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09)
doi: 10.1007/978-3-642-16441-5_5
Buchkapitel, Bibliographie

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification.
In: 1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09)
Buchkapitel, Bibliographie

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
Chicago, Illinois, USA
doi: 10.1145/1655108.1655117
Konferenzveröffentlichung, Bibliographie

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan (2009)
Hide and Seek in Time - Robust Covert Timing Channels.
Konferenzveröffentlichung, Bibliographie

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
How to Combine Homomorphic Encryption and Garbled Circuits - Improved Circuits and Computing the Minimum Distance Efficiently.
In: 1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09)
Buchkapitel, Bibliographie

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Secure Evaluation of Private Linear Branching Programs with Medical Applications.
In: 14. European Symposium on Research in Computer Security (ESORICS'09)
doi: 10.1007/978-3-642-04444-1_26
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009)
Location Privacy in RFID Applications.
Konferenzveröffentlichung, Bibliographie

Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
A Pattern for Secure Graphical User Interface Systems.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009)
Enhancing RFID Security and Privacy by Physically Unclonable Functions (Extended Abstract).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Kursawe, Klaus ; Schellekens, Dries ; Skoric, Boris ; Tuyls, Pim (2009)
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009)
Efficient RFID Security and Privacy with Anonymizers.
Konferenzveröffentlichung, Bibliographie

Paus, Annika ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Practical Secure Evaluation of Semi-Private Functions.
7. International Conference on Applied Cryptography and Network Security (ACNS'09). Paris, France (02.06.2009 - 05.06.2009)
doi: 10.1007/978-3-642-01957-9_6
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
Einsatz von Sicherheitskernen und Trusted Computing.
Konferenzveröffentlichung, Bibliographie

Bangerter, Endre ; Camenisch, Jan ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Automatic Generation of Sound Zero-Knowledge Protocols.
28th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Cologne, Germany (26.04.2009-30.04.2009)
Konferenzveröffentlichung, Bibliographie

Bangerter, Endre ; Barzan, Stefania ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Tsay, Joe-Kai (2009)
Bringing Zero-Knowledge Proofs of Knowledge to Practice.
17. International Workshop on Security Protocols (SPW'09). Cambridge, UK (01.04.2009-03.04.2009)
doi: 10.1007/978-3-642-36213-2_9
Konferenzveröffentlichung, Bibliographie

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Weber, Marion ; Winandy, Marcel (2009)
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Tuyls, Pim ; Maes, Roel ; Sunar, Berk (2009)
Physically Unclonable Pseudorandom Functions.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schulz, Steffen (2009)
Secure VPNs for Trusted Computing Environments.
Oxford, UK
Konferenzveröffentlichung, Bibliographie

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Vishik, Claire ; Winandy, Marcel (2009)
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Bangerter, Endre ; Barbosa, Manuel ; Bernstein, Daniel ; Damgard, Ivan ; Page, Dan ; Pagter, Jakob ; Sovio, Sampo (2009)
Using Compilers to Enhance Cryptographic Product Development.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Thomas (2008)
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.
In: 11. International Conference on Information Security and Cryptology (ICISC'08)
doi: 10.1007/978-3-642-00730-9_21
Buchkapitel, Bibliographie

Rupp, Andy ; Leander, Gregor ; Bangerter, Endre ; Dent, Alexander ; Sadeghi, Ahmad-Reza (2008)
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
Konferenzveröffentlichung, Bibliographie

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark ; Pereira, Olivier (2008)
Universally Composable Security Analysis of TLS.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Gasmi, Yacine ; Ramunno, Gianluca ; Vernizzi, Davide ; Stewin, Patrick ; Unger, Martin (2008)
An Efficient Implementation of Trusted Channels Based on OpenSSL.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Husseiki, Rani ; Gasmi, Yacine ; Stewin, Patrick ; Unger, Martin (2008)
Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008)
Improved Security Notions and Protocols for Non-Transferable Identification.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2008)
User Privacy in Transport Systems Based on RFID E-Tickets.
Malaga, Spain
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Bangerter, Endre ; Djackov, Maksim (2008)
A Demonstrative Ad-hoc Attestation System.
Taipei, Taiwan
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark (2008)
Property-Based Attestation without a Trusted Third Party.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2008)
Property-Based TPM Virtualization.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Shokrollahi, Jamshid ; Bösch, Christoph ; Guajardo, Jorge ; Tuyls, Pim (2008)
Efficient Helper Data Key Extractor on FPGAs.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Gröbert, Felix ; Birk, Dominik (2008)
A Forensic Framework for Tracing Phishers.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008)
Resettable and Non-Transferable Chip Authentication for E-Passports.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Löhr, Hans ; Manulis, Mark ; Escalante, Alberto (2008)
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
Sydney, Australia
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, André ; Wolf, Marko ; Asokan, N. (2008)
Securing Peer-to-Peer Distributions for Mobile Devices.
4th Information Security Practice and Experience Conference (ISPEC 2008).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Osterhues, André ; Wolf, Marko ; Asokan, Nadarajah (2008)
Securing Peer-to-Peer Distributions for Mobile Devices.
Sydney, Australia
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008)
Identification Protocols Revisited - Episode I: E-Passports.
e-crypt workshop on Secure Component and System Identification (SECSI).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008)
Identification Protocols Revisited - Episode I: E-Passports.
Konferenzveröffentlichung, Bibliographie

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2008)
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
ACM Symposium on Information, Computer and Communications Security (ASIACCS'08).
Konferenzveröffentlichung, Bibliographie

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2008)
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
Konferenzveröffentlichung, Bibliographie

Chen, Liqun ; Escalante, Alberto ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza (2008)
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
Konferenzveröffentlichung, Bibliographie

Chen, Liqun ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza (2008)
Property-Based Attestation without a Trusted Third Party.
Konferenzveröffentlichung, Bibliographie

Gajek, Sebastian ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2008)
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
Konferenzveröffentlichung, Bibliographie

Armknecht, Frederik ; Escalante, Alberto ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza (2008)
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza (2008)
Trusted Computing—State of the Art and Challenges.
Konferenzveröffentlichung, Bibliographie

Gajek, Sebastian ; Manulis, Mark ; Pereira, Olivier ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2008)
Universally Composable Security Analysis of TLS.
Konferenzveröffentlichung, Bibliographie

Asokan, N. ; Gasmi, Yacine ; Sadeghi, Ahmad-Reza ; Stewin, Patrick ; Unger, Martin (2007)
Beyond Secure Channels.
ACM Workshop on Scalable Trusted Computing (ACMSTC 2007).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Gasmi, Yacine ; Stewin, Patrick ; Unger, Martin ; Asokan, Nadarajah (2007)
Beyond Secure Channels.
Alexandria, Virginia, USA
Konferenzveröffentlichung, Bibliographie

Eisenbarth, Thomas ; Güneysu, Tim ; Paar, Christof ; Sadeghi, Ahmad-Reza ; Schellekens, Dries ; Wolf, Marko (2007)
Reconfigurable Trusted Computing in Hardware.
ACM Workshop on Scalable Trusted Computing (ACMSTC 2007).
Konferenzveröffentlichung, Bibliographie

Paar, Christof ; Sadeghi, Ahmad-Reza ; Güneysu, Tim ; Eisenbarth, Thomas ; Schellekens, Dries ; Wolf, Marko (2007)
Reconfigurable Trusted Computing in Hardware.
Alexandria, Virginia, USA
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Wolf, Christopher ; Stüble, Christian ; Asokan, N. ; Ekberg, Jan-Erik (2007)
Enabling Fairer Digital Rights Management with Trusted Computing.
Valparaíso, Chile
Konferenzveröffentlichung, Bibliographie

Celik, Mehmet ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza ; Skoric, Boris (2007)
Combining Tardos Fingerprinting Codes and Fingercasting.
9th International Workshop on Information Hiding (IH 2007).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Katzenbeisser, Stefan ; Skoric, Boris ; Celik, Mehmet (2007)
Combining Tardos Fingerprinting Codes and Fingercasting.
Saint Malo, France
Konferenzveröffentlichung, Bibliographie

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2007)
Browser Models for Usable Authentication Protocols.
Oakland, USA
Konferenzveröffentlichung, Bibliographie

Gajek, Sebastian ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2007)
Browser-based Authentication Protocols for Naive Users.
Western European Workshop on Research in Cryptology (WEWoRC 2007).
Konferenzveröffentlichung, Bibliographie

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2007)
Browser-based Authentication Protocols for Naive Users.
Bochum, Germany
Konferenzveröffentlichung, Bibliographie

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2007)
Compartmented Security for Browsers.
Report, Bibliographie

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2007)
Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing.
Vienna, Austria
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Löhr, Hans ; Ramasamy, Hari Govind ; Schulz, Stefan ; Schunter, Matthias (2007)
Enhancing Grid Security Using Trusted Virtualization.
Hong Kong, China
Konferenzveröffentlichung, Bibliographie

Adelsbach, Andre ; Huber, Ulrich ; Sadeghi, Ahmad-Reza (2007)
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
Transactions on Data Hiding and Multimedia Security II.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2007)
Fingercasting—Joint Fingerprinting and Decryption of Broadcast Messages.
Konferenzveröffentlichung, Bibliographie

Birk, Dominik ; Gajek, Sebastian ; Gröbert, Felix ; Sadeghi, Ahmad-Reza (2007)
Phishing Phishers - Observing and Tracing Organized Cybercrime.
Second International Conference on Internet Monitoring and Protection (ICIMP 2007).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Gröbert, Felix ; Birk, Dominik (2007)
Phishing Phishers - Observing and Tracing Organized Cybercrime.
Silicon Valley, California, USA
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark ; Escalante, Alberto (2007)
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
Scarborough, Trinidad and Tobago
Konferenzveröffentlichung, Bibliographie

Manulis, Mark
Hrsg.: Paar, Christof ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2007)
Provably Secure Group Key Exchange.
Buch, Bibliographie

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Winandy, Marcel (2007)
Trusted User-Aware Web Authentication.
Stanford, USA
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian ; Wachsmann, Christian ; Winandy, Marcel (2006)
TCG Inside? - A Note on TPM Specification Compliance.
ACM Workshop on Scalable Trusted Computing (ACMSTC).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Selhorst, Marcel ; Stüble, Christian ; Winandy, Marcel (2006)
TCG Inside? - A Note on TPM Specification Compliance.
Alexandria, Virginia (USA)
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2006)
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
Melbourne, Australia
Konferenzveröffentlichung, Bibliographie

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Manulis, Mark (2006)
Linkable Democratic Group Signatures.
Hangzhou, China
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006)
Property-based Taming Lying Mobile Node.
Vienna, Austria
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006)
Property-based Taming Lying Mobile Nodes.
Vienna, Austria
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Gajek, Sebastian (2006)
Client Authentication in Federations Using a Security Mode.
Konferenzveröffentlichung, Bibliographie

Adelsbach, Andre ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza (2006)
A Computational Model for Watermark Robustness.
Information Hiding Workshop.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzebeisser, Stefan (2006)
A Computational Model for Watermark Robustness.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Scheibel, Michael (2006)
Design and Implementation of a Secure Linux Device Encryption Architecture.
Konferenzveröffentlichung, Bibliographie

Carluccio, Dario ; Lemke-Rust, Kerstin ; Paar, Christof ; Sadeghi, Ahmad-Reza (2006)
E-Passport: The Global Traceability or How to Feel Like an UPS Package.
Workshop on RFID Security 2006.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Paar, Christof ; Carluccio, Dario ; Lemke-Rust, Kerstin (2006)
E-Passport: The Global Traceability or How to Feel Like an UPS Package.
Graz, Austria
Konferenzveröffentlichung, Bibliographie

Adelsbach, Andre ; Rohe, Markus ; Sadeghi, Ahmad-Reza (2006)
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
Transactions on Data Hiding and Multimedia Security.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2006)
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
Konferenzveröffentlichung, Bibliographie

Volkamer, Melanie ; Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Schulz, Stefan (2006)
Enabling the Application of Open Systems like PCs for Online Voting.
In: Frontiers in Electronic Elections
doi: 10.5445/IR/1000081833
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2006)
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
Report, Bibliographie

Huber, Ulrich ; Sadeghi, Ahmad-Reza (2006)
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
9th Information Security Conference (ISC 2006).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Huber, Ulrich (2006)
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
Report, Bibliographie

Sadeghi, Ahmad-Reza ; Huber, Ulrich (2006)
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
Samos, Greece
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006)
Key Agreement for Heterogeneous Ad-Hoc Groups.
Konferenzveröffentlichung, Bibliographie

Manulis, Mark ; Sadeghi, Ahmad-Reza (2006)
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006)
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
Konferenzveröffentlichung, Bibliographie

Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2006)
Linkable Democratic Group Signatures.
Konferenzveröffentlichung, Bibliographie

Lemke, Kerstin ; Paar, Christof ; Sadeghi, Ahmad-Reza (2006)
Physical Security Bounds Against Tampering.
International Conference on Applied Cryptography and Network Security (ACNS 2006).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Paar, Christof ; Lemke, Kerstin (2006)
Physical Security Bounds Against Tampering.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Wolf, Marko ; Scheibel, Michael (2006)
Play it once again, Sam - Enforcing Stateful Licenses on Open Platforms.
Konferenzveröffentlichung, Bibliographie

Manulis, Mark ; Sadeghi, Ahmad-Reza (2006)
Property-Based Taming of Lying Mobile Nodes.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Löhr, Hans ; Chen, Liquen ; Landfermann, Rainer ; Rohe, Markus (2006)
A Protocol for Property-Based Attestation.
Konferenzveröffentlichung, Bibliographie

Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Scheibel, Michael ; Stüble, Christian ; Winandy, Marcel (2006)
Security Architecture for Device Encryption and VPN.
Information Security Solution Europe (ISSE06).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Alkassar, Ammar ; Scheibel, Michael (2006)
Security Architecture for Device Encryption and VPN.
Konferenzveröffentlichung, Bibliographie

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2006)
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
Workshop on Information and System Security (WISSEC'06).
Konferenzveröffentlichung, Bibliographie

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2006)
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
Antwerpen, Belgium
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005)
Property-Based Broadcast Encryption for Multi-level Security Policies.
8th International Conference on Information Security and Cryptology (ICISC 2005).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005)
Property-Based Broadcast Encryption for Multi-level Security Policies.
Seoul, Korea
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich (2005)
Embedding Trust into Cars—Secure Software Delivery and Installation.
Cologne, Germany
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005)
Towards Multilateral Secure Digital Rights Distribution Infrastructures.
Alexandria, Virginia, USA
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005)
Multilaterally Secure Computing Platforms - in your office, car and at home.
1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005)
Multilaterally Secure Computing Platforms – in your office, car and at home.
Tokyo, Japan
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Selhorst, Marcel ; Senft, Oska (2005)
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Selhorst, Marcel ; Senft, Oska (2005)
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005)
Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme.
Salzburg, Austria
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Ulrich ; Kursawe, Klaus ; Lucks, Stefan (2005)
Secure Data Management in Trusted Computing.
Workshop on Cryptographic Hardware and Embedded Systems (CHES).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Kühn, Ulrich ; Kursawe, Klaus ; Lucks, Stefan (2005)
Secure Data Management in Trusted Computing.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Rupp, Andy ; Bangerter, Endre (2005)
Simplified Hardness Proofs in the Generic Group Model.
Leuven, Belgium
Konferenzveröffentlichung, Bibliographie

Camenisch, Jan ; Rohe, Markus ; Sadeghi, Ahmad-Reza (2005)
Sokrates - A Compiler Framework for Zero-Knowledge Protocols.
Western European Workshop on Research in Cryptology (WEWoRC 2005).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Rohe, Markus ; Camenisch, Jan (2005)
Sokrates - A Compiler Framework for Zero-Knowledge Protocols.
Leuven, Belgium
Konferenzveröffentlichung, Bibliographie

Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian (2005)
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Alkassar, Ammar ; Stüble, Christian ; Selhorst, Marcel (2005)
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005)
Secure Software Delivery and Installation in Embedded Systems.
Singapore
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005)
Security Engineering for Zero-knowledge Watermark Detection.
Montreux, Switzerland
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005)
Towards Multilateral Security On DRM Platforms.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005)
Towards multilaterally secure computing platforms - with open source and trusted computing.
In: Information Security Technical Report, 10 (2)
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005)
Towards multilaterally secure computing platforms - with open source and trusted computing.
In: Information Security Technical Report, 10 (2)
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin
Hrsg.: Lemke, Kerstin ; Wolf, Marko ; Paar, Christof (2005)
Anti-theft Protection: Electronic Immobilizers.
Embedded Security in Cars: Securing Current and Future Automotive IT Applications..
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin
Hrsg.: Lemke, Kerstin ; Wolf, Marko ; Paar, Christof (2005)
Anti-theft Protection: Electronic Immobilizers.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Browser Model for Security Analysis of Browser-Based Protocols.
European Symposium for Research in Computer Science (ESORICS).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Browser Model for Security Analysis of Browser-Based Protocols.
Buch, Bibliographie

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Browser Model for Security Analysis of Browser-Based Protocols.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Browser Model for Security Analysis of Browser-Based Protocols.
Report, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005)
Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it.
In: ACM Multimedia Systems, 11 (2)
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005)
Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it.
In: ACM Multimedia Systems
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Bas, Patrick ; Barni, Mauro ; Rosa, Alessia De
Hrsg.: Katzenbeisser, Stefan (2005)
First Summary Report on Asymmetric Watermarking.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin (2005)
An Open Approach for Designing Secure Electronic Immobilizers.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Chen, Liqun ; Enzmann, Matthias ; Schneider, Markus ; Steiner, Michael (2005)
A Privacy-Protecting Coupon System.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich (2005)
Property-Based Broadcast Encryption for Multi-level Security Policies.
Buch, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich (2005)
Property-Based Broadcast Encryption for Multi-level Security Policies.
Report, Bibliographie

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
Workshop on Secure Web Services (SWS).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005)
Secure Software Delivery and Installation in Embedded Systems.
Report, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich
Hrsg.: Lemke, Kerstin (2005)
Secure Software Delivery and Installation in Embedded Systems.
In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza (2005)
Trusted Computing: Whom do we trust? Building Open Multilateral Secure Platforms Based On Trusted Computing.
DRM Conference.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza (2005)
Trusted Computing: Whom do we trust? Building Open Multilateral Secure Platforms Based On Trusted Computing.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian (2004)
Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms.
Tucson, Arizona, USA
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Pohlmann, Norbert (2004)
European Multilateral Secure Computing Base - Open Trusted Computing for You and Me.
In: Datenschutz und Datensicherheit (DUD), 9
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian (2004)
Property-based Attestation for Computing Platforms: Caring about policies, not mechanisms.
White Point Beach Resort, Nova Scotia, Canada
Konferenzveröffentlichung, Bibliographie

Altmeyer, Oliver ; Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian
Hrsg.: Paulus, Sachar ; Pohlmann, Norbert ; Reimer, Helmut (2004)
Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004)
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Altmeyer, Oliver ; Selhorst, Marcel
Hrsg.: Paulus, Sachar ; Pohlmann, Norbert ; Reimer, Helmut (2004)
Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004)
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2004)
Overcoming the Obstacles of Zero-Knowledge Watermark Detection.
ACM Multimedia and Security Workshop.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2004)
Overcoming the Obstacles of Zero-Knowledge Watermark Detection.
Magdeburg, Germany
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Günnewig, Dirk ; Rannenberg, Kai ; Stüble, Christian
Hrsg.: Koenig, Christian ; Neu­mann, An­dre­as ; Katz­sch­mann, To­bi­as (2004)
Trusted Computing Platforms: Zur technischen und industriepolitischen Situation und Vorgehensweise.
In: Vertrauenswürdige Systemumgebungen Technik, Recht und gesellschaftspolitische Implikationen des "Trusted Computing"
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Alkassar, Ammar (2003)
The Quest for Security in Integrated Networks.
11th International Conference on Telecommunication Systems, Modeling and Analysis.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Alkassar, Ammar (2003)
The Quest for Security in Integrated Networks.
Monterey, USA
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003)
Taming "Trusted Computing" by Operating System Design.
Cheju Island, Korea
Konferenzveröffentlichung, Bibliographie

Adelsbach, Andre ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza (2003)
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, 9 (3)
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzenbeisser, Stefan (2003)
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, 9 (3)
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Alkassar, Ammar ; Stüble, Christian (2003)
Secure Object Identification - or: Solving The Chess Grandmaster Problem.
Ascona, Switzerland
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre (2003)
Advanced Techniques for Dispute Resolving and Authorship Proofs on Digital Works.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003)
Bridging the Gap between TCPA/Palladium and Personal Security.
Report, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Schneider, Markus ; Stüble, Christian (2003)
Die digitale Signatur.
In: Digitale Signaturen in der Praxis
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Schneider, Markus ; Stüble, Christian (2003)
Die digitale Signatur.
In: Digitale Signaturen in der Praxis
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Markus (2003)
Electronic Payment Systems.
In: Digital Rights Management
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Markus (2003)
Electronic Payment Systems.
In: Digital Rights Management
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003)
Sinn und Unsinn von TCPA und Palladium.
In: c't, 13
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003)
Sinn und Unsinn von TCPA und Palladium.
In: c't, 13
Artikel, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Dirk (2003)
Trusted Computing ohne Nebenwirkungen.
In: Datenschutz und Datensicherheit (DUD)
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Günnewig, Dirk (2003)
Trusted Computing ohne Nebenwirkungen.
In: Datenschutz und Datensicherheit (DUD)
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzenbeisser, Stefan (2002)
Cryptography Meets Watermarking: Detecting Watermarks with Minimal- or Zero-Knowledge Disclosure.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Steinbrecher, Sandra (2002)
Auctions with Multiple Rounds and Multiple Items.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian (2002)
Final Report on Verification and Assessment.
Buch, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian (2002)
Final Report on Verification and Assessment.
Report, Bibliographie

Sadeghi, Ahmad-Reza ; Steiner, Michael (2001)
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Geraldy, Alexander ; Pfitzmann, Birgit (2001)
Optimized Self-Synchronizing Mode of Operation.
Yokohama, Japan
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza (2001)
How to Break a Semi-Anonymous Fingerprinting Scheme.
Information Hiding: Fourth International Workshop.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza (2001)
How to Break a Semi-Anonymous Fingerprinting Scheme.
Konferenzveröffentlichung, Bibliographie

Adelsbach, Andre ; Sadeghi, Ahmad-Reza (2001)
Zero-Knowledge Watermark Detection and Proof of Ownership.
Information Hiding: Fourth International Workshop.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Adelsbach, Andre (2001)
Zero-Knowledge Watermark Detection and Proof of Ownership.
Berlin, Germany
Konferenzveröffentlichung, Bibliographie

Adelsbach, Andre ; Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza (2000)
Proving ownership of digital content.
3rd International Workshop on Information Hiding, IH 1999.
Konferenzveröffentlichung, Bibliographie

Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza (2000)
Self-escrowed cash against user black-mailing.
Fourth Conference on Financial Cryptography (FC 2000 Anguilla).
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (2000)
Self-escrowed cash against user black-mailing.
Anguilla, British West Indies
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999)
Coin-based anonymous fingerprinting.
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999)
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999)
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99
Buchkapitel, Bibliographie

Diese Liste wurde am Sat Nov 16 03:10:17 2024 CET generiert.