TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 26.

Alexopoulos, Nikolaos and Habib, Sheikh Mahbub and Schulz, Steffen and Mühlhäuser, Max (2018):
M-STAR: A Modular, Evidence-based Software Trustworthiness Framework.
In: CoRR, abs/1801.05764, [Online-Edition: http://arxiv.org/abs/1801.05764],
[Article]

Schulz, Steffen and Schaller, André and Kohnhäuser, Florian and Katzenbeisser, Stefan (2017):
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors.
In: ESORICS 2017 - European Symposium on Research in Computer Security, Springer, Oslo, Norway, In: LNCS, ISBN 978-3-319-66398-2,
DOI: 10.1007/978-3-319-66399-9_24,
[Conference or Workshop Item]

Koeberl, Patrick and Phegade, Vinay and Rajan, Anand and Schneider, Thomas and Schulz, Steffen and Zhdanova, Maria (2015):
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
In: 8. International Conference on Trust and Trustworthy Computing (TRUST'15), Springer, DOI: 10.1007/978-3-319-22846-4_11,
[Online-Edition: https://encrypto.de/papers/KPRSSZ15.pdf],
[Conference or Workshop Item]

Asokan, N. and Ekberg, Jan-Erik and Kostiainen, Kari and Rajan, Anand and Rozas, Carlos and Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian (2014):
Mobile Trusted Computing.
In: Proceedings of the IEEE, pp. 1189-1206, 102, (8), [Article]

Mustafa, Hossen and Sadeghi, Ahmad-Reza and Schulz, Steffen and Xu, Wenyuan (2014):
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
In: 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), [Conference or Workshop Item]

Koeberl, Patrick and Schulz, Steffen and Sadeghi, Ahmad-Reza and Varadharajan, Vijay (2014):
TrustLite: A Security Architecture for Tiny Embedded Devices.
In: European Conference on Computer Systems (EuroSys), ACM, Amsterdam, Netherlands, DOI: 10.1145/2592798.2592824,
[Conference or Workshop Item]

Schulz, Steffen and Varadharajan, Vijay and Sadeghi, Ahmad-Reza (2014):
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: IEEE Transactions on Information Forensis and Security, IEEE, pp. 221-232, 9, (2), ISSN 1556-6021,
[Article]

Armknecht, Frederik and Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian (2013):
A Security Framework for Analysis and Design of Software Attestation.
In: ACM Conference on Computer and Communications Security (CCS), ACM Press, [Conference or Workshop Item]

Armknecht, Frederik and Schulz, Steffen and Wachsmann, Christian (2013):
A security framework for the analysis and design of software attestation.
New York, NY, USA, DOI: 10.1145/2508859.2516650,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schulz, Steffen and Varadharajan, Vijay (2012):
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version).
[Report]

Wachsmann, Christian and Sadeghi, Ahmad-Reza and Schulz, Steffen (2012):
Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions.
In: Secure Smart Embedded Devices, Platforms and Applications, Springer, pp. 429-449, [Book Section]

Schulz, Steffen and Sadeghi, Ahmad-Reza and Zhdanova, Maria and Xu, Wenyuan and Mustafa, Hossen and Varadharajan, Vijay (2012):
Tetherway: A Framework for Tethering Camouflage.
In: Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), ACM Press, Tuscon, Arizona, ISBN 978-1-4503-1265-3,
[Conference or Workshop Item]

Alkassar, Ammar and Schulz, Steffen and Stüble, Christian (2012):
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), pp. 175-179, 2012, (3), DOI: 10.1007/s11623-012-0060-3,
[Article]

Schulz, Steffen and Brasser, Ferdinand and Filyanov, Atanas (2012):
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution.
In: Financial Cryptography and Data Security (FC), Springer, In: LNCS, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schulz, Steffen and Varadharajan, Vijay
Foresti, Sara and Yung, Moti and Martinelli, Fabio (eds.) (2012):
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: European Symposium on Research in Computer Science (ESORICS), Berlin, Heidelberg, Springer Verlag, pp. 253-270, [Book Section]

Kocabaş, Ünal and Schulz, Steffen (2011):
POSTER: Practical Embedded Remote Attestation Using Physically Unclonable Functions.
In: ACM Conference on Computer and Communications Security (CCS), ACM Press, [Conference or Workshop Item]

Bugiel, Sven and Davi, Lucas and Schulz, Steffen
Sadeghi, Ahmad-Reza and Zhang, Xinwen (eds.) (2011):
Scalable Trust Establishment with Software Reputation.
In: Workshop on Scalable Trusted Computing (STC), ACM Press, Chicago, Illinois, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian (2011):
Lightweight Remote Attestation Using Physical Functions.
In: ACM Conference on Wireless Network Security (WiSec), ACM Press, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian (2011):
Lightweight Remote Attestation using Physical Functions (Extended Version).
(TR-2011-06-01, Technical ), [Report]

Dmitrienko, Alexandra and Gessner, Dennis and Sadeghi, Ahmad-Reza and Schulz, Steffen and Stüble, Christian and Ullmann, Markus (2011):
Trusted embedded System Operating System (TeSOS) - Study and Design.
[Other]

Armknecht, Frederik and Ghosal, Dipak and Katzenbeisser, Stefan and Liu, Yali and Sadeghi, Ahmad-Reza and Schulz, Steffen (2010):
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
In: Information Hiding Conference (IH), Springer, [Conference or Workshop Item]

Schulz, Steffen and Sadeghi, Ahmad-Reza (2010):
Extending IPsec for Efficient Remote Attestation.
In: Financial Cryptography and Data Security (FC), Springer, LNCS, [Conference or Workshop Item]

Liu, Yali and Ghosal, Dipak and Armknecht, Frederik and Sadeghi, Ahmad-Reza and Schulz, Steffen and Katzenbeisser, Stefan (2009):
Hide and Seek in Time - Robust Covert Timing Channels.
In: ESORICS, [Conference or Workshop Item]

Catuogno, Luigi and Dmitrienko, Alexandra and Eriksson, Konrad and Kuhlmann, Dirk and Ramunno, Gianluca and Sadeghi, Ahmad-Reza and Schulz, Steffen and Schunter, Matthias and Winandy, Marcel and Zhan, Jing (2009):
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
In: International Conference on Trusted Systems (INTRUST), Springer, [Conference or Workshop Item]

Liu, Yali and Ghosal, Dipak and Armknecht, Frederik and Sadeghi, Ahmad-Reza and Schulz, Steffen and Katzenbeisser, Stefan (2009):
Hide and Seek in Time - Robust Covert Timing Channels.
In: European Symposium on Research in Computer Security (ESORICS), Springer, In: LNCS, ISBN 978-3-642-04443-4,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schulz, Steffen (2009):
Secure VPNs for Trusted Computing Environments.
In: International Conference on Trusted Computing (TRUST), Springer, Oxford, UK, [Conference or Workshop Item]

This list was generated on Tue Oct 22 00:22:24 2019 CEST.