TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 43.

Catuogno, Luigi and Löhr, Hans and Winandy, Marcel and Sadeghi, Ahmad-Reza (2014):
A trusted versioning file system for passive mobile storage devices.
38, In: J. Network and Computer Applications, pp. 65-75,
[Conference or Workshop Item]

Nas, Aysegül and Filyanov, Atanas and Volkamer, Melanie and Winandy, Marcel (2013):
Poster: On the Usability of Secure GUIs.
pp. 1-2, Menlo Park, California, [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Kowalski, Christoph and Winandy, Marcel (2011):
Trusted Virtual Domains on OKL4: Secure Information Sharing on Smartphones.
In: Proceedings of the 6th ACM Workshop on Scalable Trusted Computing (STC),
ACM Press, [Conference or Workshop Item]

Filyanov, Atanas and McCune, Jonathan and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
In: 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2011),
Hong Kong, [Conference or Workshop Item]

Davi, Lucas and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
In: 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011),
[Conference or Workshop Item]

Dmitrienko, Alexandra and Hadzic, Zecir and Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
A Security Architecture for Accessing Health Records on Mobile Phones.
In: HEALTHINF'2011: Proceedings of the 4th International Conference on Health Informatics,
Rome, Italy, [Conference or Workshop Item]

Dmitrienko, Alexandra and Hadzic, Zecir and Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
Securing the Access to Electronic Health Records on Mobile Phones.
In: Biomedical Engineering Systems and Technologies,
[Conference or Workshop Item]

Bugiel, Sven and Dmitrienko, Alexandra and Kostiainen, Kari and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
TruWalletM: Secure Web Authentication on Mobile Platforms.
In: Proceedings of INTRUST 2010 The Second International Conference on Trusted Systems,
[Conference or Workshop Item]

Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Securing the E-Health Cloud.
In: 1st ACM International Health Informatics Symposium (IHI 2010),
[Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Privilege Escalation Attacks on Android.
In: ISC 2010: Proceedings of the 13th Information Security Conference,
Boca Raton, Florida, USA, [Conference or Workshop Item]

Checkoway, Stephen and Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Shacham, Hovav and Winandy, Marcel (2010):
Return-Oriented Programming without Returns.
In: CCS '10, In: Proceedings of the 17th ACM conference on Computer and communications security, pp. 559--572,
ACM, Chicago, Illinois, USA, ISBN 978-1-4503-0245-6,
DOI: http://doi.acm.org/10.1145/1866307.1866370,
[Conference or Workshop Item]

Löhr, Hans and Pöppelmann, Thomas and Rave, Johannes and Steegmanns, Martin and Winandy, Marcel (2010):
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments.
In: 5th Annual Workshop on Scalable Trusted Computing (STC 2010),
[Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Return-Oriented Programming without Returns on ARM.
(HGI-TR-2010-002), [Report]

Sadeghi, Ahmad-Reza and Schneider, Thomas and Winandy, Marcel (2010):
Token-Based Cloud Computing - Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
In: 3. International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud, pp. 417-429,
Springer, DOI: 10.1007/978-3-642-13869-0_30,
[Conference or Workshop Item]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5, pp. 289-298. [Article]

Davi, Lucas and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
(HGI-TR-2010-001), [Report]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 34 (5), pp. 289-294. [Article]

Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Patterns for Secure Boot and Secure Storage in Computer Systems.
In: 4th International Workshop on Secure systems methodologies using patterns (SPattern 2010),,
[Conference or Workshop Item]

Catuogno, Luigi and Dmitrienko, Alexandra and Eriksson, Konrad and Kuhlmann, Dirk and Ramunno, Gianluca and Sadeghi, Ahmad-Reza and Schulz, Steffen and Schunter, Matthias and Winandy, Marcel and Zhan, Jing (2009):
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
In: International Conference on Trusted Systems (INTRUST),
Springer, [Conference or Workshop Item]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
Transparent Mobile Storage Protection in Trusted Virtual Domains.
In: USENIX LISA 2009,
USENIX, [Conference or Workshop Item]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
Transparent Mobile Storage Protection in Trusted Virtual Domains.
In: 23rd Large Installation System Administration Conference (LISA '09), pp. 159-172,
[Conference or Workshop Item]

Gajek, Sebastian and Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
In: 4th ACM Workshop on Scalable Trusted Computing,
[Conference or Workshop Item]

Davi, Lucas and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
In: STC '09, In: Proceedings of the 2009 ACM workshop on Scalable trusted computing, pp. 49--54,
ACM, Chicago, Illinois, USA, ISBN 978-1-60558-788-2,
DOI: http://doi.acm.org/10.1145/1655108.1655117,
[Conference or Workshop Item]

Fischer, Thomas and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
A Pattern for Secure Graphical User Interface Systems.
In: 3rd International Workshop on Secure systems methodologies using patterns (SPattern'09), Proceedings of the 20th International Workshop on Database and Expert Systems Applications, pp. 186-190,
IEEE, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
Einsatz von Sicherheitskernen und Trusted Computing.
In: D-A-CH Security,
[Conference or Workshop Item]

Löhr, Hans and Sadeghi, Ahmad-Reza and Stüble, Christian and Weber, Marion and Winandy, Marcel (2009):
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
In: LNCS, 5471, In: Proceedings of the 2nd International Conference on Trusted Computing, pp. 45-62,
Springer, [Conference or Workshop Item]

Löhr, Hans and Sadeghi, Ahmad-Reza and Vishik, Claire and Winandy, Marcel (2009):
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
In: LNCS, 5451, In: 5th Information Security Practice and Experience Conference (ISPEC'09), pp. 396-407,
Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Winandy, Marcel and Stüble, Christian and Husseiki, Rani and Gasmi, Yacine and Stewin, Patrick and Unger, Martin (2008):
Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains.
In: 3rd ACM Workshop on Scalable Trusted Computing,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2008):
Property-Based TPM Virtualization.
In: LNCS, In: Information Security, 11th International Conference (ISC 2008), pp. 1-16,
[Conference or Workshop Item]

Gasmi, Yacine and Hessmann, Christian and Pittenauer, Martin and Winandy, Marcel (2008):
Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis.
In: LNI, 1, In: INFORMATIK 2008, Beherrschbare Systeme - dank Informatik, Band 1, Beiträge der 38. Jahrestagung der Gesellschaft für Informatik e.V. (GI),
[Conference or Workshop Item]

Gajek, Sebastian and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2007):
Compartmented Security for Browsers.
(HGI-TR-2007-001), [Report]

Gajek, Sebastian and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2007):
Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing.
In: Second International Conference on Availability, Reliability and Security (ARES 2007), pp. 120-127,
Vienna, Austria, [Conference or Workshop Item]

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Winandy, Marcel (2007):
Trusted User-Aware Web Authentication.
In: Workshop on Trustworthy User Interfaces for Passwords and Personal Information (TIPPI'07),,
Stanford, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Selhorst, Marcel and Stüble, Christian and Wachsmann, Christian and Winandy, Marcel (2006):
TCG Inside? - A Note on TPM Specification Compliance.
pp. 47-56, ACM Press, ACM Workshop on Scalable Trusted Computing (ACMSTC), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Wachsmann, Christian and Selhorst, Marcel and Stüble, Christian and Winandy, Marcel (2006):
TCG Inside? - A Note on TPM Specification Compliance.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC), pp. 47-56,
ACM Press, Alexandria, Virginia (USA), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Winandy, Marcel and Stüble, Christian and Scheibel, Michael (2006):
Design and Implementation of a Secure Linux Device Encryption Architecture.
In: LinuxTag,
[Conference or Workshop Item]

Alkassar, Ammar and Sadeghi, Ahmad-Reza and Scheibel, Michael and Stüble, Christian and Winandy, Marcel (2006):
Security Architecture for Device Encryption and VPN.
Information Security Solution Europe (ISSE06), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Winandy, Marcel and Stüble, Christian and Alkassar, Ammar and Scheibel, Michael (2006):
Security Architecture for Device Encryption and VPN.
In: Information Security Solution Europe (ISSE06),
[Conference or Workshop Item]

Gajek, Sebastian and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2006):
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
Workshop on Information and System Security (WISSEC'06), [Conference or Workshop Item]

Gajek, Sebastian and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2006):
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
In: Workshop on Information and System Security (WISSEC'06),
Antwerpen, Belgium, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Winandy, Marcel and Stüble, Christian and Selhorst, Marcel and Senft, Oska (2005):
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9, [Article]

Sadeghi, Ahmad-Reza and Winandy, Marcel and Stüble, Christian and Selhorst, Marcel and Senft, Oska (2005):
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9, [Article]

Spalka, Adrian and Cremers, Armin and Winandy, Marcel (2005):
Multilateral Security Considerations for Adaptive Mobile Applications.
In: 2nd International Conference on E-Business and Telecommunication Networks (ICETE 2005), pp. 133-137,
INSTICC, [Conference or Workshop Item]

This list was generated on Tue Jun 15 00:47:07 2021 CEST.