TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 43.

Catuogno, Luigi and Löhr, Hans and Winandy, Marcel and Sadeghi, Ahmad-Reza (2014):
A trusted versioning file system for passive mobile storage devices.
In: J. Network and Computer Applications, 38, [Conference or Workshop Item]

Nas, Aysegül and Filyanov, Atanas and Volkamer, Melanie and Winandy, Marcel (2013):
Poster: On the Usability of Secure GUIs.
Menlo Park, California, [Other]

Davi, Lucas and Dmitrienko, Alexandra and Kowalski, Christoph and Winandy, Marcel (2011):
Trusted Virtual Domains on OKL4: Secure Information Sharing on Smartphones.
In: Proceedings of the 6th ACM Workshop on Scalable Trusted Computing (STC), ACM Press, [Conference or Workshop Item]

Filyanov, Atanas and McCune, Jonathan and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
In: 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2011), Hong Kong, [Conference or Workshop Item]

Davi, Lucas and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
In: 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), [Conference or Workshop Item]

Dmitrienko, Alexandra and Hadzic, Zecir and Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
A Security Architecture for Accessing Health Records on Mobile Phones.
In: HEALTHINF'2011: Proceedings of the 4th International Conference on Health Informatics, Rome, Italy, [Conference or Workshop Item]

Dmitrienko, Alexandra and Hadzic, Zecir and Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
Securing the Access to Electronic Health Records on Mobile Phones.
In: Biomedical Engineering Systems and Technologies, [Conference or Workshop Item]

Bugiel, Sven and Dmitrienko, Alexandra and Kostiainen, Kari and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
TruWalletM: Secure Web Authentication on Mobile Platforms.
In: Proceedings of INTRUST 2010 The Second International Conference on Trusted Systems, [Conference or Workshop Item]

Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Securing the E-Health Cloud.
In: 1st ACM International Health Informatics Symposium (IHI 2010), [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Privilege Escalation Attacks on Android.
In: ISC 2010: Proceedings of the 13th Information Security Conference, Boca Raton, Florida, USA, [Conference or Workshop Item]

Checkoway, Stephen and Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Shacham, Hovav and Winandy, Marcel (2010):
Return-Oriented Programming without Returns.
In: Proceedings of the 17th ACM conference on Computer and communications security, ACM, Chicago, Illinois, USA, In: CCS '10, ISBN 978-1-4503-0245-6,
DOI: http://doi.acm.org/10.1145/1866307.1866370,
[Conference or Workshop Item]

Löhr, Hans and Pöppelmann, Thomas and Rave, Johannes and Steegmanns, Martin and Winandy, Marcel (2010):
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments.
In: 5th Annual Workshop on Scalable Trusted Computing (STC 2010), [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Return-Oriented Programming without Returns on ARM.
(HGI-TR-2010-002), [Report]

Sadeghi, Ahmad-Reza and Schneider, Thomas and Winandy, Marcel (2010):
Token-Based Cloud Computing - Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
In: 3. International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud, Springer, DOI: 10.1007/978-3-642-13869-0_30,
[Online-Edition: https://encrypto.de/papers/SSW10.pdf],
[Conference or Workshop Item]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), pp. 289-298, 5, [Article]

Davi, Lucas and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
(HGI-TR-2010-001), [Report]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), pp. 289-294, 34, (5), [Article]

Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Patterns for Secure Boot and Secure Storage in Computer Systems.
In: 4th International Workshop on Secure systems methodologies using patterns (SPattern 2010),, [Conference or Workshop Item]

Catuogno, Luigi and Dmitrienko, Alexandra and Eriksson, Konrad and Kuhlmann, Dirk and Ramunno, Gianluca and Sadeghi, Ahmad-Reza and Schulz, Steffen and Schunter, Matthias and Winandy, Marcel and Zhan, Jing (2009):
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
In: International Conference on Trusted Systems (INTRUST), Springer, [Conference or Workshop Item]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
Transparent Mobile Storage Protection in Trusted Virtual Domains.
In: USENIX LISA 2009, USENIX, [Conference or Workshop Item]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
Transparent Mobile Storage Protection in Trusted Virtual Domains.
In: 23rd Large Installation System Administration Conference (LISA '09), [Conference or Workshop Item]

Gajek, Sebastian and Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
In: 4th ACM Workshop on Scalable Trusted Computing, [Conference or Workshop Item]

Davi, Lucas and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
In: Proceedings of the 2009 ACM workshop on Scalable trusted computing, ACM, Chicago, Illinois, USA, In: STC '09, ISBN 978-1-60558-788-2,
DOI: http://doi.acm.org/10.1145/1655108.1655117,
[Conference or Workshop Item]

Fischer, Thomas and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
A Pattern for Secure Graphical User Interface Systems.
In: 3rd International Workshop on Secure systems methodologies using patterns (SPattern'09), Proceedings of the 20th International Workshop on Database and Expert Systems Applications, IEEE, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
Einsatz von Sicherheitskernen und Trusted Computing.
In: D-A-CH Security, [Conference or Workshop Item]

Löhr, Hans and Sadeghi, Ahmad-Reza and Stüble, Christian and Weber, Marion and Winandy, Marcel (2009):
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
In: Proceedings of the 2nd International Conference on Trusted Computing, Springer, In: LNCS, 5471, [Conference or Workshop Item]

Löhr, Hans and Sadeghi, Ahmad-Reza and Vishik, Claire and Winandy, Marcel (2009):
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
In: 5th Information Security Practice and Experience Conference (ISPEC'09), Springer, In: LNCS, 5451, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Winandy, Marcel and Stüble, Christian and Husseiki, Rani and Gasmi, Yacine and Stewin, Patrick and Unger, Martin (2008):
Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains.
In: 3rd ACM Workshop on Scalable Trusted Computing, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2008):
Property-Based TPM Virtualization.
In: Information Security, 11th International Conference (ISC 2008), In: LNCS, [Conference or Workshop Item]

Gasmi, Yacine and Hessmann, Christian and Pittenauer, Martin and Winandy, Marcel (2008):
Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis.
In: INFORMATIK 2008, Beherrschbare Systeme - dank Informatik, Band 1, Beiträge der 38. Jahrestagung der Gesellschaft für Informatik e.V. (GI), In: LNI, 1, [Conference or Workshop Item]

Gajek, Sebastian and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2007):
Compartmented Security for Browsers.
(HGI-TR-2007-001), [Report]

Gajek, Sebastian and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2007):
Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing.
In: Second International Conference on Availability, Reliability and Security (ARES 2007), Vienna, Austria, [Conference or Workshop Item]

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Winandy, Marcel (2007):
Trusted User-Aware Web Authentication.
In: Workshop on Trustworthy User Interfaces for Passwords and Personal Information (TIPPI'07),, Stanford, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Selhorst, Marcel and Stüble, Christian and Wachsmann, Christian and Winandy, Marcel (2006):
TCG Inside? - A Note on TPM Specification Compliance.
ACM Press, In: ACM Workshop on Scalable Trusted Computing (ACMSTC), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Wachsmann, Christian and Selhorst, Marcel and Stüble, Christian and Winandy, Marcel (2006):
TCG Inside? - A Note on TPM Specification Compliance.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC), ACM Press, Alexandria, Virginia (USA), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Winandy, Marcel and Stüble, Christian and Scheibel, Michael (2006):
Design and Implementation of a Secure Linux Device Encryption Architecture.
In: LinuxTag, [Conference or Workshop Item]

Alkassar, Ammar and Sadeghi, Ahmad-Reza and Scheibel, Michael and Stüble, Christian and Winandy, Marcel (2006):
Security Architecture for Device Encryption and VPN.
In: Information Security Solution Europe (ISSE06), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Winandy, Marcel and Stüble, Christian and Alkassar, Ammar and Scheibel, Michael (2006):
Security Architecture for Device Encryption and VPN.
In: Information Security Solution Europe (ISSE06), [Conference or Workshop Item]

Gajek, Sebastian and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2006):
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
In: Workshop on Information and System Security (WISSEC'06), [Conference or Workshop Item]

Gajek, Sebastian and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2006):
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
In: Workshop on Information and System Security (WISSEC'06), Antwerpen, Belgium, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Winandy, Marcel and Stüble, Christian and Selhorst, Marcel and Senft, Oska (2005):
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9, [Article]

Sadeghi, Ahmad-Reza and Winandy, Marcel and Stüble, Christian and Selhorst, Marcel and Senft, Oska (2005):
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9, [Article]

Spalka, Adrian and Cremers, Armin and Winandy, Marcel (2005):
Multilateral Security Considerations for Adaptive Mobile Applications.
In: 2nd International Conference on E-Business and Telecommunication Networks (ICETE 2005), INSTICC, [Conference or Workshop Item]

This list was generated on Tue Oct 15 01:59:41 2019 CEST.