TU Darmstadt / ULB / TUbiblio

Einträge mit Organisationseinheit "20 Fachbereich Informatik > Systemsicherheit"

Ebene hoch
Gruppiere nach: Autor(en) | Datum | Typ des Eintrags | Sprache | Keine Gruppierung
Springe zu: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | V | W | Z
Anzahl der Einträge auf dieser Ebene: 366.

A

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias :
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
In: 23rd European Symposium on Research in Computer Security (ESORICS 2018), 2018, Barcelona, Spain.
[Konferenz- oder Workshop-Beitrag], (2018)

Asokan, N. ; Nyman, Thomas ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems - Special Issue ESWEEK 2018, CASES 2018, CODES + ISSS 2018 and EMSOFT 2018
[Artikel], (2018)

Asokan, N. ; Nguyen, Thien Duc ; Tarkoma, Sasu ; Toivonen, Juhani ; Truong, Hien Thi Thu :
Proximity Verification Based on Acoustic Room Impulse Response.
[Online-Edition: http://arxiv.org/abs/1803.07211]
In: CoRR, abs/1803.07211
[Artikel], (2018)

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep :
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
[Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=832...]
In: IEEE Internet Computing p. 1. ISSN 1089-7801
[Artikel], (2018)

Asokan, N. ; Miettinen, Markus :
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead.
[Online-Edition: http://www.sciencedirect.com/science/article/pii/S0140366418...]
In: Computer Communications ISSN 0140-3664
[Artikel], (2018) (Im Druck)

Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean :
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017)
[Konferenz- oder Workshop-Beitrag], (2017)

Asokan, N. ; Davi, Lucas ; Dessouky, Ghada ; Koeberl, Patrick ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza :
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
In: 54th Design Automation Conference (DAC'17).
[Konferenz- oder Workshop-Beitrag], (2017)

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
23rd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2016)

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias :
POSTER: Toward a Secure and Scalable Attestation.
ACM WiSEC 2016
[Konferenz- oder Workshop-Beitrag], (2016)

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza :
Things, Trouble, Trust: On Building Trust in IoT Systems.
53rd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2016)

Asokan, N. ; Huang, Jialin ; Miettinen, Markus ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza :
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
In: Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16).
[Konferenz- oder Workshop-Beitrag], (2016)

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian :
SEDA: Scalable Embedded Device Attestation.
22nd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2015)

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian :
SEDA - Technical Report.

[Report], (2015)

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean :
HAFIX: Hardware-Assisted Flow Integrity Extension.
52nd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2015)

Asokan, N. ; Busold, Christoph ; Heuser, Stephan ; Rios, Jon ; Sadeghi, Ahmad-Reza :
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
In: Financial Cryptography and Data Security.
[Konferenz- oder Workshop-Beitrag], (2015)

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep :
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices.
[Online-Edition: https://arxiv.org/pdf/1511.02119.pdf]
In: CoRR, abs/1511.02119
[Artikel], (2015)

Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
Kutylowski, Miroslaw ; Vaidya, Jaideep (eds.) :

Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014. Lecture Notes in Computer Science, 8712. Springer International Publishing , pp. 76-93. ISBN 978-3-319-11202-2
[Buchkapitel], (2014)

Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8) pp. 1189-1206.
[Artikel], (2014)

Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza:
Mobile Platform Security.
Synthesis Lectures on Information Security, Privacy, and Trust, 4 (3). Morgan & Claypool
[Buch], (2013)

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
A Security Framework for Analysis and Design of Software Attestation.
ACM Conference on Computer and Communications Security (CCS) ACM Press
[Konferenz- oder Workshop-Beitrag], (2013)

Aderhold, Markus ; Gebhardt, Alexander ; Mantel, Heiko :
Choosing a Formalism for Secure Coding: FSM vs. LTL.

[Report], (2013)

Arzt, Steven ; Falzon, Kevin ; Follner, Andreas ; Rasthofer, Siegfried ; Bodden, Eric ; Stolz, Volker :
How useful are existing monitoring languages for securing Android apps?
In: 6. Arbeitstagung Programmiersprachen (ATPS 2013)
[Artikel], (2013)

Ahmed, Sarah ; Kaiser, Maximilian ; Kreutzer, Michael :
IT-Sicherheitstrends kleiner und mittelständischer Unternehmen.

[Report], (2013)

Alkassar, Ammar ; Schulz, Steffen ; Stüble, Christian :
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), 2012 (3) pp. 175-179.
[Artikel], (2012)

Armknecht, Frederik ; Maes, Roel ; Sadeghi, Ahmad-Reza ; Standaert, François-Xavier ; Wachsmann, Christian :
A Formal Foundation for the Security Features of Physical Functions.
IEEE Symposium on Security and Privacy (SSP) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2011)

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Scafuro, Alessandra ; Visconti, Ivan ; Wachsmann, Christian :
Impossibility Results for RFID Privacy Notions.
In: LNCS , 6480 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Armknecht, Frederik ; Ghosal, Dipak ; Katzenbeisser, Stefan ; Liu, Yali ; Sadeghi, Ahmad-Reza ; Schulz, Steffen :
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Information Hiding Conference (IH) Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
On RFID Privacy with Mutual Authentication and Tag Corruption.
In: LNCS , 6123 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Armknecht, Frederik ; Chen, Liqun ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
Anonymous Authentication for RFID Systems.
In: LNCS , 6370 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Armknecht, Frederik ; Furukawa, Jun ; Kurosawa, Kaoru :
A Universally Composable roup Key Exchange Protocol with Minimum Communication Effort.
Sixth Conference on Security and Cryptography for Networks (SCN 2008)
[Konferenz- oder Workshop-Beitrag], (2008)

Asokan, N. ; Gasmi, Yacine ; Sadeghi, Ahmad-Reza ; Stewin, Patrick ; Unger, Martin :
Beyond Secure Channels.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007). ACM Press
[Konferenz- oder Workshop-Beitrag], (2007)

Adelsbach, Andre ; Huber, Ulrich ; Sadeghi, Ahmad-Reza :
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
In: Transactions on Data Hiding and Multimedia Security II. In: LNCS , 4499 . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2007)

Adelsbach, Andre ; Huber, Ulrich ; Sadeghi, Ahmad-Reza :
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
In: 11th Australasian Conference on Information Security and Privacy (ACISP 2006). In: LNCS , 4058 . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2006)

Adelsbach, Andre ; Rohe, Markus ; Sadeghi, Ahmad-Reza :
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
In: Transactions on Data Hiding and Multimedia Security.
[Konferenz- oder Workshop-Beitrag], (2006)

Adelsbach, Andre ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza :
A Computational Model for Watermark Robustness.
In: Information Hiding Workshop.
[Konferenz- oder Workshop-Beitrag], (2006)

Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Scheibel, Michael ; Stüble, Christian ; Winandy, Marcel :
Security Architecture for Device Encryption and VPN.
In: Information Security Solution Europe (ISSE06).
[Konferenz- oder Workshop-Beitrag], (2006)

Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian :
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
In: 9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI).
[Konferenz- oder Workshop-Beitrag], (2005)

Altmeyer, Oliver ; Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian
Paulus, Sachar ; Pohlmann, Norbert ; Reimer, Helmut (eds.) :

Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004). Vieweg Verlag , pp. 346-361.
[Buchkapitel], (2004)

Alkassar, Ammar ; Stüble, Christian :
A Security Framework for Integrated Networks.
MILCOM 2003 IEEE Military Communications Conference
[Konferenz- oder Workshop-Beitrag], (2003)

Adelsbach, Andre ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza :
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, 9 (3) pp. 266-278.
[Artikel], (2003)

Adelsbach, Andre ; Stüble, Christian ; Creese, Sadie ; Pfitzmann, Birgit ; Ryan, Peter Y. A. ; Simmonds, William ; Steinbrechner, Sandra ; Steiner, Michael ; Waidner, Michael :
Cryptographic Semantics For The Algebraic Models.

[Report], (2002)

Adelsbach, Andre ; Sadeghi, Ahmad-Reza :
Zero-Knowledge Watermark Detection and Proof of Ownership.
In: Information Hiding: Fourth International Workshop. In: LNCS , 2137 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2001)

Adelsbach, Andre ; Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza :
Proving ownership of digital content.
In: 3rd International Workshop on Information Hiding, IH 1999. In: LNCS , 1768 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2000)

B

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian :
VoiceGuard: Secure and Private Speech Processing.
In: Interspeech 2018
[Konferenz- oder Workshop-Beitrag], (2018)

Biondo, Andrea ; Conti, Mauro ; Davi, Lucas ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza :
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
In: 27th USENIX Security Symposium.
[Konferenz- oder Workshop-Beitrag], (2018)

Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Müller, Urs ; Sadeghi, Ahmad-Reza :
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
ArXiv preprint
[Report], (2017)

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza :
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT .
[Konferenz- oder Workshop-Beitrag], (2017)

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17 .
[Konferenz- oder Workshop-Beitrag], (2017)

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
CATT: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
[Online-Edition: https://arxiv.org/abs/1611.08396]
In: Cryptography and Security
[Artikel], (2016)

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Regulating ARM TrustZone Devices in Restricted Spaces.
14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
[Konferenz- oder Workshop-Beitrag], (2016)

Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Leakage-Resilient Layout Randomization for Mobile Devices.
23rd Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2016)

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: DAC '16 . ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
TyTAN: Tiny Trust Anchor for Tiny Devices.
52nd Design Automation Conference (DAC) 2015
[Konferenz- oder Workshop-Beitrag], (2015)

Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza :
XiOS: Extended Application Sandboxing on iOS.
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
[Konferenz- oder Workshop-Beitrag], (2015)

Brasser, Ferdinand ; Sadeghi, Ahmad-Reza :
Swap and Play: Live Updating Hypervisors and Its Application to Xen.
In: CCSW 2014: The ACM Cloud Computing Security Workshop Proceedings.
[Konferenz- oder Workshop-Beitrag], (2014)

Busold, Christoph ; Dmitrienko, Alexandra ; Wachsmann, Christian :
Key2Share for Authentication Services.
SmartCard Workshop
[Konferenz- oder Workshop-Beitrag], (2014)

Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael:
Personal Information Dashboard: Putting the Individual Back in Control.
Iso Press Amsterdam , pp. 139-164. ISBN 978-1-61499-294-3 (print) | 978-1-61499-295-0 (online)
[Buch], (2013)

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza :
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
22nd USENIX Security Symposium (USENIX Security '13) USENIX
[Konferenz- oder Workshop-Beitrag], (2013)

Bodden, Eric ; Tanter, Éric ; Inostroza, Milton :
Joint Point Interfaces for Safe and Flexible Decoupling of Aspects.
In: Software Engineering Top Journals, Rank 5, ACM Transactions on Softw
[Artikel], (2013)

Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
Client-controlled Cryptography-as-a-Service in the Cloud.
11th International Conference on Applied Cryptography and Network Security (ACNS 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo :
SPLlift – Statically Analyzing Software Product Lines in Minutes Instead of Years.
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza :
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: CODASPY '13 . ACM Press
[Konferenz- oder Workshop-Beitrag], (2013)

Baecher, Paul ; Brzuska, Christina ; Mittelbach, Arno :
Reset Indifferentiability and its Consequences.
In: Lecture Notes in Computer Science . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza :
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.

[Report], (2012)

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza :
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.

[Report], (2012)

Bessani, Alysson ; Abbadi, Imad M. ; Bugiel, Sven ; Cesena, Emanuele ; Deng, Mina ; Gröne, Michael ; Marnau, Ninja ; Nürnberger, Stefan ; Pasin, Marcelo ; Schirmer, Norbert:
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
Cambridge Scholars Publishing , pp. 160-186.
[Buch], (2012)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava :
Towards Taming Privilege-Escalation Attacks on Android.
19th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2012)

Bodden, Eric ; Thies, Andreas :
RefaFlex: Safer Refactorings for Reflective Java Programs.
International Symposium on Software Testing and Analysis (ISSTA 2012)
[Konferenz- oder Workshop-Beitrag], (2012)

Boneh, Dan ; Dagdelen, Özgür ; Fischlin, Marc ; Lehmann, Anja ; Schaffner, Christian ; Zhandry, Mark :
Random Oracles in a Quantum World.
17th International Conference on Theory and Application of Cryptology and Information Security
[Konferenz- oder Workshop-Beitrag], (2011)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava :
Practical and Lightweight Domain Isolation on Android.
Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM) ACM Press
[Konferenz- oder Workshop-Beitrag], (2011)

Bugiel, Sven ; Davi, Lucas ; Schulz, Steffen
Sadeghi, Ahmad-Reza ; Zhang, Xinwen (eds.) :

Scalable Trust Establishment with Software Reputation.
Workshop on Scalable Trusted Computing (STC) ACM Press
[Konferenz- oder Workshop-Beitrag], (2011)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava :
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
18th ACM Conference on Computer and Communications Security (CCS'11) ACM
[Konferenz- oder Workshop-Beitrag], (2011)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza :
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.

[Report], (2011)

Bugiel, Sven ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
TruWalletM: Secure Web Authentication on Mobile Platforms.
Proceedings of INTRUST 2010 The Second International Conference on Trusted Systems
[Konferenz- oder Workshop-Beitrag], (2010)

Bugiel, Sven ; Ekberg, Jan-Erik :
Implementing an Application-Specific Credential Platform Using Late-Launched Mobile Trusted Module.
5th Annual Workshop on Scalable Trusted Computing (STC 2010)
[Konferenz- oder Workshop-Beitrag], (2010)

Bangerter, Endre ; Briner, Thomas ; Henecka, Wilko ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Automatic Generation of Sigma-Protocols.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-16441-5₅]
In: 6th European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09). In: LNCS , 6391 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Birk, Dominik ; Gajek, Sebastian ; Gröbert, Felix ; Sadeghi, Ahmad-Reza :
Phishing Phishers - Observing and Tracing Organized Cybercrime.
In: Second International Conference on Internet Monitoring and Protection (ICIMP 2007). IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2007)

C

Carpent, Xavier ; Eldefrawy, Karim ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices.
In: Design Automation Conference, 2018, June 24-29, San Francisco, USA.
[Konferenz- oder Workshop-Beitrag], (2018)

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza :
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
The annual Privacy Enhancing Technologies Symposium (PETS)
[Konferenz- oder Workshop-Beitrag], (2016)

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
53rd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2016)

Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael :
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
22nd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2015)

Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza :
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
22nd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2015)

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael :
Return to Where? You Can't Exploit What You Can't Find.
Blackhat USA
[Konferenz- oder Workshop-Beitrag], (2015)

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael :
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
36th IEEE Symposium on Security and Privacy (Oakland)
[Konferenz- oder Workshop-Beitrag], (2015)

Chen, Liqun ; Dietrich, Kurt ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Winter, Johannes :
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
In: LNCS , 6531 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Checkoway, Stephen ; Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Shacham, Hovav ; Winandy, Marcel :
Return-Oriented Programming without Returns.
In: CCS '10 . ACM
[Konferenz- oder Workshop-Beitrag], (2010)

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5 pp. 289-298.
[Artikel], (2010)

Catuogno, Luigi ; Dmitrienko, Alexandra ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramunno, Gianluca ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Schunter, Matthias ; Winandy, Marcel ; Zhan, Jing :
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
International Conference on Trusted Systems (INTRUST) Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Transparent Mobile Storage Protection in Trusted Virtual Domains.
23rd Large Installation System Administration Conference (LISA '09)
[Konferenz- oder Workshop-Beitrag], (2009)

Celik, Mehmet ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza ; Skoric, Boris :
Combining Tardos Fingerprinting Codes and Fingercasting.
In: 9th International Workshop on Information Hiding (IH 2007). In: LNCS , 4567 . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2007)

Carluccio, Dario ; Lemke-Rust, Kerstin ; Paar, Christof ; Sadeghi, Ahmad-Reza :
E-Passport: The Global Traceability or How to Feel Like an UPS Package.
In: Workshop on RFID Security 2006.
[Konferenz- oder Workshop-Beitrag], (2006)

Camenisch, Jan ; Rohe, Markus ; Sadeghi, Ahmad-Reza :
Sokrates - A Compiler Framework for Zero-Knowledge Protocols.
In: Western European Workshop on Research in Cryptology (WEWoRC 2005).
[Konferenz- oder Workshop-Beitrag], (2005)

D

Dessouky, Ghada ; Abera, Tigist ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza :
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution.
In: 37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18), 2018.
[Konferenz- oder Workshop-Beitrag], (2018)

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza :
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: AsiaCCS .
[Konferenz- oder Workshop-Beitrag], (2018)

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael :
Pushing the communication barrier in secure computation using lookup tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17) The Internet society
[Konferenz- oder Workshop-Beitrag], (2017)

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2017)

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza :
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
23rd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2016)

Davi, Lucas ; Sadeghi, Ahmad-Reza:
Building Secure Defenses Against Code-Reuse Attacks.
Springer International Publishing ISBN 978-3-319-25544-6
[Buch], (2015)

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza :
Automated Synthesis of Optimized Circuits for Secure Computation.
22nd ACM Conference on Computer and Communications Security (CCS'15)
[Konferenz- oder Workshop-Beitrag], (2015)

Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian :
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
22nd Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2015)

Dmitrienko, Alexandra ; Heuser, Stephan ; Nguyen, Thien Duc ; da Silva Ramos, Marcos ; Rein, Andre ; Sadeghi, Ahmad-Reza :
Market-driven Code Provisioning to Mobile Secure Hardware.
Financial Cryptography and Data Security
[Konferenz- oder Workshop-Beitrag], (2015)

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian :
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
23rd USENIX Security Symposium
[Konferenz- oder Workshop-Beitrag], (2014)

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza :
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
BlackHat USA
[Konferenz- oder Workshop-Beitrag], (2014)

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza :
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4)
[Artikel], (2014)

Davi, Lucas ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza :
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing
[Konferenz- oder Workshop-Beitrag], (2014)

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian :
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.

[Report], (2014)

Dmitrienko, Alexandra ; Noack, David ; Sadeghi, Ahmad-Reza ; Yung, Moti :
POSTER: On Offline Payments with Bitcoin.
FC'2014: Financial Cryptography and Data Security Conference
[Konferenz- oder Workshop-Beitrag], (2014)

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza :
On the (In)Security of Mobile Two-Factor Authentication.
Financial Cryptography and Data Security (FC'14) Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

do Carmo, Rodrigo ; Hollick, Matthias :
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks.
In: Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
[Artikel], (2013)

Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso :
The Fiat-Shamir Transformation in a Quantum World.
In: arXiv:1306.0315, 2013
[Artikel], (2013)

Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
BlackHat Abu Dhabi
[Konferenz- oder Workshop-Beitrag], (2012)

do Carmo, R. ; Werner, M. ; Hollick, Matthias :
Signs of a Bad Neighborhood: A Lightweight Metric for Anomaly Detection in Mobile Ad Hoc Networks.
Proceedings of the 8th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (ACM Q2SWinet)
[Konferenz- oder Workshop-Beitrag], (2012)

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012)
[Konferenz- oder Workshop-Beitrag], (2012)

Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Tamrakar, Sandeep ; Wachsmann, Christian :
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
In: Lecture Notes in Computer Science (LNCS) , 7344 . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Djatmiko, Mentari ; Boreli, Roksana ; Seneviratne, Aruna ; Ries, Sebastian :
Resources-aware trusted node selection for content distribution in mobile ad hoc networks.
In: Wireless Networks, Springer US, 18 pp. 1-14.
[Artikel], (2012)

Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid :
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
Conference on Digital Automation and Test Europe (DATE)
[Konferenz- oder Workshop-Beitrag], (2012)

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
19th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2012)

Davi, Lucas ; Dmitrienko, Alexandra ; Kowalski, Christoph ; Winandy, Marcel :
Trusted Virtual Domains on OKL4: Secure Information Sharing on Smartphones.
Proceedings of the 6th ACM Workshop on Scalable Trusted Computing (STC) ACM Press
[Konferenz- oder Workshop-Beitrag], (2011)

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
POSTER: Control-Flow Integrity for Smartphones.
18th ACM Conference on Computer and Communications Security (CCS'11) ACM
[Konferenz- oder Workshop-Beitrag], (2011)

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011)
[Konferenz- oder Workshop-Beitrag], (2011)

Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
A Security Architecture for Accessing Health Records on Mobile Phones.
HEALTHINF'2011: Proceedings of the 4th International Conference on Health Informatics
[Konferenz- oder Workshop-Beitrag], (2011)

Dmitrienko, Alexandra ; Gessner, Dennis ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Stüble, Christian ; Ullmann, Markus :
Trusted embedded System Operating System (TeSOS) - Study and Design.

[Anderes], (2011) ((Noch) nicht publiziert)

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED). Leuven, Belgium
[Buchkapitel], (2011)

Dmitrienko, Alexandra ; Hadzic, Zecir ; Lhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Securing the Access to Electronic Health Records on Mobile Phones.
Biomedical Engineering Systems and Technologies
[Konferenz- oder Workshop-Beitrag], (2011)

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Privilege Escalation Attacks on Android.
ISC 2010: Proceedings of the 13th Information Security Conference
[Konferenz- oder Workshop-Beitrag], (2010)

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Return-Oriented Programming without Returns on ARM.

[Report], (2010)

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.

[Report], (2010)

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
In: STC '09 . ACM
[Konferenz- oder Workshop-Beitrag], (2009)

E

Egert, Rolf ; Fischlin, Marc ; Gens, David ; Jacob, Sven ; Senker, Matthias ; Tillmans, Jörg :
Privately computing set-union and set-intersection cardinality via bloom filters.
In: Information Security and Privacy (ACISP) pp. 413-430.
[Artikel], (2015)

Ekberg, Jan-Erik ; Bugiel, Sven :
Trust in a Small Package: Minimized MRTM Software Implementation for Mobile Secure Environments.
4th Annual Workshop on Scalable Trusted Computing (STC2009)
[Konferenz- oder Workshop-Beitrag], (2009)

Eisenbarth, Thomas ; Güneysu, Tim ; Paar, Christof ; Sadeghi, Ahmad-Reza ; Schellekens, Dries ; Wolf, Marko :
Reconfigurable Trusted Computing in Hardware.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007). ACM Press
[Konferenz- oder Workshop-Beitrag], (2007)

F

Frassetto, Tommaso ; Jauernig, Patrick Thomas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
IMIX: In-Process Memory Isolation EXtension.
In: 27th USENIX Security Symposium, 15.-17.08.2018, Baltimore, MD, USA. 27th USENIX Security Symposium
[Konferenz- oder Workshop-Beitrag], (2018)

Frassetto, Tommaso ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
JITGuard: Hardening Just-in-time Compilers with SGX.
24th ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2017)

Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro :
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
[Konferenz- oder Workshop-Beitrag], (2017)

Fereidooni, Hossein ; Frassetto, Tommaso ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Conti, Mauro :
Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
The Second IEEE International Workshop on Safe, Energy-Aware, & Reliable Connected Health (CHASE-SEARCH)
[Konferenz- oder Workshop-Beitrag], (2017)

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza :
HardIDX: Practical and Secure Index with SGX.
Conference on Data and Applications Security and Privacy (DBSec)
[Konferenz- oder Workshop-Beitrag], (2017)

Fernando, Ruchith ; Ranchal, Rohit ; An, Byungchan ; Othmane, Lotfi Ben ; Bhargava, Bharat :
Consumer oriented privacy preserving access control for electronic health records in the cloud.
IEEE cloud
[Konferenz- oder Workshop-Beitrag], (2016)

Fleischhacker, N. ; Günther, F. ; Kiefer, F. ; Poettering, B. :
Pseudorandom Signatures.
In: >8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 7-10 May, Hangzhou, China
[Artikel], (2013)

Filyanov, Atanas ; McCune, Jonathan ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2011)
[Konferenz- oder Workshop-Beitrag], (2011)

Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
A Pattern for Secure Graphical User Interface Systems.
3rd International Workshop on Secure systems methodologies using patterns (SPattern'09), Proceedings of the 20th International Workshop on Database and Expert Systems Applications IEEE
[Konferenz- oder Workshop-Beitrag], (2009)

G

Ghaeini, Hamid Reza ; Antonioli, Daniele ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole :
State-Aware Anomaly Detection for Industrial Control Systems.
The 33rd ACM/SIGAPP Symposium On Applied Computing (SAC)
[Konferenz- oder Workshop-Beitrag], (2018)

Gens, David ; Schmitt, Simon ; Davi, Lucas ; Sadeghi, Ahmad-Reza :
K-Miner: Uncovering Memory Corruption in Linux.
25th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2018)

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. :
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2017)

Gay, Richard ; Mantel, Heiko ; Sudbrock, Henning :
An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels.
2nd International Workshop on Quantitative Aspects in Security Assurance
[Konferenz- oder Workshop-Beitrag], (2013)

Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
Prouff, Emmanuel ; Schaumont, Patrick (eds.) :

On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
In: LNCS (7428). Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Gajek, Sebastian ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
4th ACM Workshop on Scalable Trusted Computing
[Konferenz- oder Workshop-Beitrag], (2009)

Gasmi, Yacine ; Hessmann, Christian ; Pittenauer, Martin ; Winandy, Marcel :
Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis.
In: LNI , 1 (133).
[Konferenz- oder Workshop-Beitrag], (2008)

Gajek, Sebastian ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg :
Browser-based Authentication Protocols for Naive Users.
In: Western European Workshop on Research in Cryptology (WEWoRC 2007).
[Konferenz- oder Workshop-Beitrag], (2007)

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Compartmented Security for Browsers.

[Report], (2007)

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing.
Second International Conference on Availability, Reliability and Security (ARES 2007)
[Konferenz- oder Workshop-Beitrag], (2007)

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
In: Workshop on Information and System Security (WISSEC'06).
[Konferenz- oder Workshop-Beitrag], (2006)

Greveler, Ulrich ; Adelsbach, Andre ; Löschner, Sven :
Anonymous Data Broadcasting by Misuse of Satellite ISPs.
22C3 Chaos Computer Club (CCC) Congress
[Konferenz- oder Workshop-Beitrag], (2005)

Greveler, Ulrich ; Adelsbach, Andre :
Satellite Communication without Privacy - Attacker's Paradise.
In: LNI . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2005)

Greveler, Ulrich ; Adelsbach, Andre :
Datenschutzverletzungen bei Internetzugängen via Satellit.
In: Datenschutznachrichten, 1 pp. 4-7.
[Artikel], (2005)

Greveler, Ulrich ; Adelsbach, Andre :
A Broadcast Encryption Scheme with Free-Riders but Unconditional Security.
First International Conference on Digital Rights Management
[Konferenz- oder Workshop-Beitrag], (2005)

H

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick :
Phonion: Practical Protection of Metadata in Telephony Networks.
Proceedings on Privacy Enhancing Technologies (PoPETs)
[Konferenz- oder Workshop-Beitrag], (2017)

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza :
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
Financial Crypto 2016
[Konferenz- oder Workshop-Beitrag], (2016)

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza :
Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.

[Report], (2016)

Heuser, Stephan :
Towards Modular and Flexible Access Control on Smart Mobile Devices.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5663]
Technische Universität Darmstadt , Darmstadt
[Dissertation], (2016)

Huang, Jialin ; Vaudenay, Serge ; Lai, Xuejia ; Nyberg, Kaisa :
Capacity and Data Complexity in Multidimensional Linear Attack.
CRYPTO
[Konferenz- oder Workshop-Beitrag], (2015)

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza :
ASM: A Programmable Interface for Extending Android Security.
23rd USENIX Security Symposium
[Konferenz- oder Workshop-Beitrag], (2014)

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza :
ASM: A Programmable Interface for Extending Android Security.

[Report], (2014)

Habib, Sheikh Mahbub ; Ries, Sebastian ; Varikkattu, Prabhu ; Mühlhäuser, Max :
Towards a Trust Management System for Cloud Computing Marketplaces: using CAIQ as a trust information source.
In: Security and Communication Networks (SCN), 7 (11) pp. 2185-2200.
[Artikel], (2014)

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max :
A Framework for Evaluating Trust of Service Providers in Cloud Marketplaces.
Proceedings of 28th ACM SAC 2013 ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Ries, Sebastian ; Mühlhäuser, Max :
CertainLogic: A Logic for Modeling Trust and Uncertainty (Full version).

[Report], (2011)

Henecka, Wilko ; Kögl, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo :
TASTY: Tool for Automating Secure Two-partY computations.
[Online-Edition: http://dx.doi.org/10.1145/1866307.1866358]
In: 17th ACM Conference on Computer and Communications Security (CCS'10). ACM
[Konferenz- oder Workshop-Beitrag], (2010)

Huber, Ulrich ; Sadeghi, Ahmad-Reza :
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
In: 9th Information Security Conference (ISC 2006). In: LNCS , 4173 . Springer
[Konferenz- oder Workshop-Beitrag], (2006)

Hätönen, Kimmo ; Klemettinen, Mika ; Miettinen, Markus
Boulicaut, Jean-François ; Raedt, Luc De ; Mannila, Heikki (eds.) :

Constraint-Based Mining and Inductive Databases.
In: Constraint-Based Mining and Inductive Databases. LNCS, 3848. Springer , pp. 196-215. ISBN 978-3-540-31331-1
[Buchkapitel], (2006)

I

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
US-AID: Unattended Scalable Attestation of IoT Devices.
In: 37th IEEE International Symposium on Reliable Distributed Systems (SRDS 2018), 2018.
[Konferenz- oder Workshop-Beitrag], (2018)

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza :
SeED: Secure Non-Interactive Attestation for Embedded Devices.
10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017)
[Konferenz- oder Workshop-Beitrag], (2017)

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza :
DARPA: Device Attestation Resilient to Physical Attacks.
ACM WiSEC 2016
[Konferenz- oder Workshop-Beitrag], (2016)

J

Jauernig, Patrick Thomas :
SMOV: Lighweight In-Process Memory Isolation.
TU Darmstadt
[Masterarbeit], (2017)

Jiang, Xuxian ; Grace, Michael ; Sadeghi, Ahmad-Reza ; Zhou, Wu :
Unsafe Exposure Analysis of Mobile In-App Advertisements.
to appear at WiSec ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-15031-9₂₆]
In: 12th International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10). In: LNCS , 6225 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas
Sadeghi, Ahmad-Reza ; Naccache, David (eds.) :

Efficient Secure Two-Party Computation with Untrusted Hardware Tokens.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-14452-3₁₇]
In: Towards Hardware Intrinsic Security: Foundation and Practice. Information Security and Cryptography. Springer-Verlag Berlin Heidelberg , pp. 367-386.
[Buchkapitel], (2010)

K

Kong, Joonho ; Koushanfar, Farinaz ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
Design Automation Conference (DAC) 2014 ACM Press
[Konferenz- oder Workshop-Beitrag], (2014)

Koeberl, Patrick ; Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Varadharajan, Vijay :
TrustLite: A Security Architecture for Tiny Embedded Devices.
European Conference on Computer Systems (EuroSys) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Kocabas, Unal ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza :
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
Conference on Digital Automation and Test Europe (DATE) Interactive Presentation
[Konferenz- oder Workshop-Beitrag], (2013)

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Rožic, Vladimir ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian :
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
In: Lecture Notes in Computer Science (LNCS) , 7428 . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Kocabaş, Ünal ; Schulz, Steffen :
POSTER: Practical Embedded Remote Attestation Using Physically Unclonable Functions.
ACM Conference on Computer and Communications Security (CCS) ACM Press
[Konferenz- oder Workshop-Beitrag], (2011)

Kneževic, M. ; Kobayashi, K. ; Ikegami, J. ; Matsuo, S. ; Satoh, A. ; Kocabas, U. ; Fan, J. ; Katashita, T. ; Sugawara, T. ; Sakiyama, K. ; Verbauwhede, I. ; Ohta, K. ; Homma, N. ; Aoki, T. :
Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates.
In: IEEE Transactions on VLSI journal
[Artikel], (2011)

Katzenbeisser, Stefan ; Kocabaş, Ünal ; van der Leest, Vincent ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Schröder, Heike ; Wachsmann, Christian :
Recyclable PUFs: Logically Reconfigurable PUFs.
In: Lecture Notes in Computer Science (LNCS) , 6917 . Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Katzenbeisser, Stefan ; Kocabaş, Ünal ; van der Leest, Vincent ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Wachsmann, Christian :
Recyclable PUFs: logically reconfigurable PUFs.
In: Journal of Cryptographic Engineering, 1 (3) pp. 177-186.
[Artikel], (2011)

Kostiainen, Kari ; Dmitrienko, Alexandra ; Ekberg, Jan-Erik ; Sadeghi, Ahmad-Reza ; Asokan, N. :
Key Attestation from Trusted Execution Environments.
TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing
[Konferenz- oder Workshop-Beitrag], (2010)

Kobayashi, K. ; Ikegami, J. ; Kneževic, M. ; Guo, X. ; Matsuo, S. ; Huang, S. ; Nazhandali, L. ; Kocabas, U. ; Fan, J. ; Satoh, A. ; Verbauwhede, I. ; Sakiyama, K. ; Ohta, K. :
Prototyping Platform for Performance Evaluation of SHA-3 Candidates.
IEEE International Workshop on Hardware-Oriented Security and Trust - HOST 2010, pp. 60-63
[Konferenz- oder Workshop-Beitrag], (2010)

L

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael :
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
USENIX Annual Technical Conference (ATC)
[Konferenz- oder Workshop-Beitrag], (2016)

Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael:
Automated Software Diversity.
Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool
[Buch], (2015)

Li, Shujun ; Sadeghi, Ahmad-Reza ; Heisrath, Soeren ; Schmitz, Roland ; Ahmad, Junaid Jameel :
hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers.
15th International Conference on Financial Cryptography and Data Security (FC)
[Konferenz- oder Workshop-Beitrag], (2011)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Securing the E-Health Cloud.
1st ACM International Health Informatics Symposium (IHI 2010)
[Konferenz- oder Workshop-Beitrag], (2010)

Löhr, Hans ; Pöppelmann, Thomas ; Rave, Johannes ; Steegmanns, Martin ; Winandy, Marcel :
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments.
5th Annual Workshop on Scalable Trusted Computing (STC 2010)
[Konferenz- oder Workshop-Beitrag], (2010)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Patterns for Secure Boot and Secure Storage in Computer Systems.
4th International Workshop on Secure systems methodologies using patterns (SPattern 2010),
[Konferenz- oder Workshop-Beitrag], (2010)

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan :
Hide and Seek in Time - Robust Covert Timing Channels.
In: LNCS (5789). Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Vishik, Claire ; Winandy, Marcel :
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
In: LNCS , 5451 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Weber, Marion ; Winandy, Marcel :
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
In: LNCS , 5471 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Lemke, Kerstin ; Paar, Christof ; Sadeghi, Ahmad-Reza :
Physical Security Bounds Against Tampering.
In: International Conference on Applied Cryptography and Network Security (ACNS 2006).
[Konferenz- oder Workshop-Beitrag], (2006)

M

Miettinen, Markus ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza :
Revisiting Context-Based Pairing in IoT.
In: 55th Design Automation Conference (DAC), 24.-29.06. 2018, San Francisco, CA, USA. Proceedings of the 55th Design Automation Conference (DAC) ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu :
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT.
Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017)
[Konferenz- oder Workshop-Beitrag], (2017)

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Frassetto, Tommaso ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu :
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017) IEEE
[Konferenz- oder Workshop-Beitrag], (2017)

Mohan, Vaishnavi ; Othmane, Lotfi Ben :
SecDevOps: Is It a Marketing Buzzword?
Proc. of the 11th International Conference on Availability, Reliability and Security (ARES)
[Konferenz- oder Workshop-Beitrag], (2016)

McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh :
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, PP (99)
[Artikel], (2016)

Miettinen, Markus ; Asokan, N. ; Koushanfar, Farinaz ; Nguyen, Thien Duc ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Sobhani, Majid ; Yellapantula, Sudha :
I know where you are: Proofs of Presence resilient to malicious provers.
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
[Konferenz- oder Workshop-Beitrag], (2015)

Miettinen, Markus ; Asokan, N. ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Sobhani, Majid :
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
Proc. ACM Conference on Computer and Communications Security ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Mustafa, Hossen ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Xu, Wenyuan :
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
[Konferenz- oder Workshop-Beitrag], (2014)

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. :
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014)
[Konferenz- oder Workshop-Beitrag], (2014)

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. :
ConXsense – Context Sensing for Adaptive Usable Access Control.

[Report], (2013)

Mittelbach, Arno :
Cryptophia’s Short Combiner for Collision-Resistant Hash Functions (best student paper).
In: Lecture Notes in Computer Science . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Mittelbach, Arno :
Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output.
In: Lecture Notes in Computer Science . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Manulis, Mark ; Sadeghi, Ahmad-Reza :
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
In: Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing).
[Konferenz- oder Workshop-Beitrag], (2006)

N

Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Dang, Minh Hoang ; Asokan, N. ; Sadeghi, Ahmad-Reza :
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
[Online-Edition: http://arxiv.org/abs/1804.07474]
In: CoRR, abs/1804.07474
[Artikel], (2018)

Nagy, Marcin ; Bui, Thanh Phong ; Cristofaro, Emiliano De ; Asokan, N. ; Ott, Jörg ; Sadeghi, Ahmad-Reza :
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
ACM WiSEC 2015
[Konferenz- oder Workshop-Beitrag], (2015)

Noisternig, M. ; Hollick, Matthias :
Efficient Solutions for the Authenticated Fragmentation Problem in Delay- and Disruption-Tolerant Networks.
Proc. 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM'14)
[Konferenz- oder Workshop-Beitrag], (2014)

Nagy, Marcin ; Cristofaro, Emiliano De ; Dmitrienko, Alexandra ; Asokan, N. ; Sadeghi, Ahmad-Reza :
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
Annual Computer Security Applications Conference (ACSAC 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Nürnberger, Stefan ; Steinebach, Martin ; Zmudzinski, Sascha :
Re-synchronizing audio watermarking after nonlinear time stretching.
Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII
[Konferenz- oder Workshop-Beitrag], (2011)

Nürnberger, Stefan ; Feller, Thomas ; Huss, Sorin :
RAY - A Secure Microkernel Architecture.
IEEE Privacy Security and Trust 2010 (PST2010)
[Konferenz- oder Workshop-Beitrag], (2010)

O

Othmane, Lotfi Ben ; Angin, Pelin ; Weffers, Harold ; Bhargava, Bharat :
Extending the Agile Development Approach to Develop Acceptably Secure Software.
In: IEEE Transactions on Dependable and Secure Computing, 11 (6) pp. 497-509.
[Artikel], (2014)

Oren, Yossef ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
In: Lecture Notes on Computer Science (LNCS) , 8068 . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Octeau, Damien ; McDaniel, Patrick ; Jha, Somesh ; Bartel, Alexandre ; Bodden, Eric ; Klein, J. ; Le Traon, Yves :
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
In: USENIX Security Symposium 2013.
[Artikel], (2012)

P

Portela, Bernardo ; Barbosa, Manuel ; Scerri, Guillaume ; Warinschi, Bogdan ; Bahmani, Raad ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza :
Secure Multiparty Computation from SGX.
Financial Cryptography and Data Security
[Konferenz- oder Workshop-Beitrag], (2017)

Peter, Andreas ; Tews, Erik ; Katzenbeisser, Stefan :
Efficiently Outsourcing Multiparty Computation under Multiple Keys.
In: >IACR Cryptology ePrint Archive, Report 2013/013
[Artikel], (2013)

Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza :
Self-escrowed cash against user black-mailing.
In: Fourth Conference on Financial Cryptography (FC 2000 Anguilla). In: LNCS , 1962 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2000)

Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza :
Coin-based anonymous fingerprinting.
In: EUROCRYPT 1999. In: LNCS , 1599 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (1999)

R

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs)
[Artikel], (2017)

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed :
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2017)

Ries, Sebastian ; Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max :
CertainLogic: A Logic for Modeling Trust and Uncertainty (Short Paper).
In Proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST 2011) Springer Berlin Heidelberg
[Konferenz- oder Workshop-Beitrag], (2011)

Rupp, Andy ; Leander, Gregor ; Bangerter, Endre ; Dent, Alexander ; Sadeghi, Ahmad-Reza :
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
Advances in Cryptology - ASIACRYPT 2008
[Konferenz- oder Workshop-Beitrag], (2008)

S

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
Black Hat Europe
[Konferenz- oder Workshop-Beitrag], (2016)

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Ibrahim, Ahmad ; Conti, Mauro ; Neven, Gregory :
SANA: Secure and Scalable Aggregate Network Attestation.
23rd ACM Conference on Computer and Communications Security (CCS) 2016 CCS 2016
[Konferenz- oder Workshop-Beitrag], (2016)

Sadeghi, Ahmad-Reza ; Dessouky, Ghada :
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
ACM WiSec 2016
[Konferenz- oder Workshop-Beitrag], (2016)

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz :
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
53rd Design Automation Conference (DAC'16)
[Konferenz- oder Workshop-Beitrag], (2016)

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
53rd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2016)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik :
Towards a Unified Security Model for Physically Unclonable Functions.
CT-RSA - Cryptographers' Track at the RSA Conference
[Konferenz- oder Workshop-Beitrag], (2016)

Songhori, Ebrahim ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz :
Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis.
52nd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2015)

Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Waidner, Michael :
Security and Privacy Challenges in Industrial Internet of Things.
52nd Design Automation Conference (DAC) Research
[Konferenz- oder Workshop-Beitrag], (2015)

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
36th IEEE Symposium on Security and Privacy (Oakland)
[Konferenz- oder Workshop-Beitrag], (2015)

Schuster, Felix ; Tendyck, Thomas ; Liebchen, Christopher ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten :
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
36th IEEE Symposium on Security and Privacy (Oakland)
[Konferenz- oder Workshop-Beitrag], (2015)

Sadeghi, Ahmad-Reza ; Davi, Lucas ; Larsen, Per :
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? - Keynote -.
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
[Konferenz- oder Workshop-Beitrag], (2015)

Senftleben, Marius ; Bucicoiu, Mihai ; Tews, Erik ; Armknecht, Frederik ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza :
MoP-2-MoP - Mobile private microblogging.
Financial Cryptography and Data Security (FC'14) Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Stancill, Blaine ; Snow, Kevin ; Otterness, Nathan ; Monrose, Fabian ; Davi, Lucas ; Sadeghi, Ahmad-Reza :
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
16th Research in Attacks, Intrusions and Defenses (RAID) Symposium
[Konferenz- oder Workshop-Beitrag], (2013)

Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza :
Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same.
BlackHat USA
[Konferenz- oder Workshop-Beitrag], (2013)

Simo-Fhom, Hervais :
Internet Privacy. Taking opportunities, assessing risks, building trust.
In: >Springer Vieweg; 2013
[Artikel], (2013)

Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza :
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (Best Student Paper Award).
34th IEEE Symposium on Security and Privacy (Oakland 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Sepehrdad, Pouyan ; Susil, Petr ; Vaudenay, Serge ; Vuagnoux, Martin :
Smashing WEP in a Passive Attack.
20th International Workshop on Fast Software Encryption (FSE)
[Konferenz- oder Workshop-Beitrag], (2013)

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay :
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version).

[Report], (2012)

Sadeghi, Ahmad-Reza ; Kocabaş, Ünal ; Katzenbeisser, Stefan :
Converse PUF-Based Authentication.
International Conference on Trust & Trustworthy Computing (TRUST) Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Seudié, Hervé ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza :
EDA for Secure and Dependable Cybercars: Challenges and Opportunities.
ACM/IEEE Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2012)

Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Zhdanova, Maria ; Xu, Wenyuan ; Mustafa, Hossen ; Varadharajan, Vijay :
Tetherway: A Framework for Tethering Camouflage.
Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) ACM Press
[Konferenz- oder Workshop-Beitrag], (2012)

Schulz, Steffen ; Brasser, Ferdinand ; Filyanov, Atanas :
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Schreiner, Steffen ; Grigoras, Costin ; Litmaath, Maarten ; Betev, Latchezar ; Buchmann, Johannes :
Certified Grid Job Submission in the ALICE Grid Services.
In: Open Access Journal of Physics: Conference Series (JPCS), International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2012
[Artikel], (2012)

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay
Foresti, Sara ; Yung, Moti (eds.) :

The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: LNCS . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2012)

Schneider, Michael ; Göttert, Norman
Preneel, Bart ; Takagi, Tsuyoshi (eds.) :

Random Sampling for Short Lattice Vectors on Graphics Cards.
In: LNCS (6917). Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Shirazi, Fatemeh ; Neumann, Stephan ; Ciolacu, Ines ; Volkamer, Melanie :
Robust Electronic Voting: Introducing robustness in Civitas.
International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011
[Konferenz- oder Workshop-Beitrag], (2011)

Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
Location Privacy in RFID Systemen.
In: Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (2) pp. 70-75.
[Artikel], (2011)

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
Lightweight Remote Attestation using Physical Functions (Extended Version).

[Report], (2011)

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
Lightweight Remote Attestation Using Physical Functions.
ACM Conference on Wireless Network Security (WiSec) ACM Press
[Konferenz- oder Workshop-Beitrag], (2011)

Sadeghi, Ahmad-Reza ; Preneel, Bart ; Pfitzmann, Andreas ; Moran, Tal ; Maier-Rabler, Ursula ; Kutylowski, Miroslaw ; Klonowski, Marek ; Guerses, Seda ; Danezis, George ; Borisov, Nikita ; Baer, Walter :
Machiavelli Confronts 21st Century Digital Technology: Democracy in a Network Society.

[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Li, Shujun ; Shah, Syed Amier Haider ; Khan, Muhammad Asad Usman ; Khayam, Syed Ali ; Schmitz, Roland :
Breaking e-Banking CAPTCHAs.
26th Annual Computer Security Applications Conference (ACSAC 2010)
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Naccache, David :
Towards Hardware-Intrinsic Security.
In: Information Security and Cryptography .
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Mukherjee, Biswanath ; Ghosal, Dipak ; Liu, Yali :
Video Streaming Forensic - Content Identification with Traffic Snooping.
13th Information Security Conference (ISC 2010)
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
Enhancing RFID Security and Privacy by Physically Unclonable Functions.
In: Towards Hardware-Intrinsic Security: Foundations and Practice. Information Security and Cryptography. Springer , pp. 281-307.
[Buchkapitel], (2010)

Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
Trusted Computing.
Handbook of Financial Cryptography and Security CRC Press
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Cesena, Emanuele ; Ramunno, Gianluca ; Vernizzi, Davide :
Anonymous Authentication with TLS and DAA.
TRUST2010
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Winandy, Marcel :
Token-Based Cloud Computing — Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
3rd International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Li, Shujun ; Khayam, Syed Ali ; Schmitz, Roland :
Breaking a Virtual Password System Based on Randomized Linear Generation Functions.
IEEE ICC 2010 - Communication and Information System Security Symposium ('ICC'10 CISS')
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
PUF-Enhanced RFID Security and Privacy.
Workshop on Secure Component and System Identification (SECSI)
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Cabuk, Serdar ; Dalton, Chris ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramasamy, Hari Govind ; Ramunnok, Gianluca ; Schunter, Matthias :
Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers.
In: Journal of Computer Security, 18 (1) pp. 89-121.
[Artikel], (2010)

Schulz, Steffen ; Sadeghi, Ahmad-Reza :
Extending IPsec for Efficient Remote Attestation.
Financial Cryptography and Data Security (FC) Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Maes, Roel ; Sunar, Berk ; Tuyls, Pim :
Memory Leakage-Resilient Encryption based on Physically Unclonable Functions.
ASIACRYPT'09
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Li, Shujun ; Asghar, Hassan Jameel ; Pieprzyk, Josef ; Schmitz, Roland ; Wang, Huaxiong :
On the Security of PAS (Predicate-based Authentication Service).
Annual Computer Security Applications Conference (ACSAC’09), 2009.
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
Anonymizer-Enabled Security and Privacy for RFID.
In: LNCS , 5888 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Zhan, Jing ; Korthaus, René :
A Practical Property-based Bootstrap Architecture.
ACMSTC'09
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Vishik, Claire ; Verbauwhede, Ingrid :
Future of Assurance: Ensuring that a System is Trustworthy.
ISSE'09
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
Location Privacy in RFID Applications.
In: LNCS , 5599 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Kursawe, Klaus ; Schellekens, Dries ; Skoric, Boris ; Tuyls, Pim :
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage.
2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
Enhancing RFID Security and Privacy by Physically Unclonable Functions (Extended Abstract).
In: Dagstuhl Seminar Proceedings (09282). Schloss Dagstuhl
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
Efficient RFID Security and Privacy with Anonymizers.
Workshop on RFID Security (RFIDSec)
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Einsatz von Sicherheitskernen und Trusted Computing.
D-A-CH Security
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Tuyls, Pim ; Maes, Roel ; Sunar, Berk :
Physically Unclonable Pseudorandom Functions.
Poster session of Advances in Cryptology - EUROCRYPT
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Schulz, Steffen :
Secure VPNs for Trusted Computing Environments.
International Conference on Trusted Computing (TRUST) Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Bangerter, Endre ; Barbosa, Manuel ; Bernstein, Daniel ; Damgård, Ivan ; Page, Dan ; Pagter, Jakob ; Sovio, Sampo :
Using Compilers to Enhance Cryptographic Product Development.
Information Security Solutions Europe (ISSE)
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics.
In: Section Days of Ruhr-University Bochum Research School
[Anderes], (2009)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark ; Pereira, Olivier :
Universally Composable Security Analysis of TLS.
Second Conference on Provable Security (ProvSec)
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan :
Improved Security Notions and Protocols for Non-Transferable Identification.
13th European Symposium on Research in Computer Security (ESORICS)
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Gasmi, Yacine ; Ramunno, Gianluca ; Vernizzi, Davide ; Stewin, Patrick ; Unger, Martin :
An Efficient Implementation of Trusted Channels Based on OpenSSL.
ACMSTC 2008
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Husseiki, Rani ; Gasmi, Yacine ; Stewin, Patrick ; Unger, Martin :
Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains.
3rd ACM Workshop on Scalable Trusted Computing
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
User Privacy in Transport Systems Based on RFID E-Tickets.
International Workshop on Privacy in Location-Based Applications (PiLBA)
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Bangerter, Endre ; Djackov, Maksim :
A Demonstrative Ad-hoc Attestation System.
Information Security Conference 2008 (ISC'08)
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Property-Based TPM Virtualization.
In: LNCS (5222).
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark :
Property-Based Attestation without a Trusted Third Party.
Information Security Conference (ISC'08)
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Gröbert, Felix ; Birk, Dominik :
A Forensic Framework for Tracing Phishers.
In: LNCS (6102). Springer
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Shokrollahi, Jamshid ; Bösch, Christoph ; Guajardo, Jorge ; Tuyls, Pim :
Efficient Helper Data Key Extractor on FPGAs.
Workshop on Cryptographic Hardware and Embedded Systems 2008 (CHES 2008)
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan :
Resettable and Non-Transferable Chip Authentication for E-Passports.
RFIDSec 2008
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Stüble, André ; Wolf, Marko ; Asokan, N. :
Securing Peer-to-Peer Distributions for Mobile Devices.
In: 4th Information Security Practice and Experience Conference (ISPEC 2008).
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Löhr, Hans ; Manulis, Mark ; Escalante, Alberto :
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
4th Information Security Practice and Experience Conference (ISPEC 2008)
[Konferenz- oder Workshop-Beitrag], (2008)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark :
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: ACM Symposium on Information, Computer and Communications Security (ASIACCS'08).
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan :
Identification Protocols Revisited - Episode I: E-Passports.
In: e-crypt workshop on Secure Component and System Identification (SECSI).
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza :
Trusted Computing - State of the Art and Challenges.
In: SOFSEM 2008. In: LNCS (4910). Springer
[Konferenz- oder Workshop-Beitrag], (2008)

Sadeghi, Ahmad-Reza ; Wolf, Christopher ; Stüble, Christian ; Asokan, N. ; Ekberg, Jan-Erik :
Enabling Fairer Digital Rights Management with Trusted Computing.
In: LNCS , 4779 . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2007)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Winandy, Marcel :
Trusted User-Aware Web Authentication.
Workshop on Trustworthy User Interfaces for Passwords and Personal Information (TIPPI'07),
[Konferenz- oder Workshop-Beitrag], (2007)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Löhr, Hans ; Ramasamy, Hari Govind ; Schulz, Stefan ; Schunter, Matthias :
Enhancing Grid Security Using Trusted Virtualization.
In: LNCS , 4610 . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2007)

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark ; Escalante, Alberto :
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
In: LNCS , 4886 . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2007)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark :
Browser Models for Usable Authentication Protocols.
IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07)
[Konferenz- oder Workshop-Beitrag], (2007)

Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian ; Wachsmann, Christian ; Winandy, Marcel :
TCG Inside? - A Note on TPM Specification Compliance.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC). ACM Press
[Konferenz- oder Workshop-Beitrag], (2006)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Manulis, Mark :
Linkable Democratic Group Signatures.
2nd Information Security Practice and Experience Conference (ISPEC 2006)
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Manulis, Mark :
Property-based Taming Lying Mobile Node.
International Workshop on Trusted and Autonomic Computing Systems (TACS 2006)
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Löhr, Hans ; Chen, Liquen ; Landfermann, Rainer ; Rohe, Markus :
A Protocol for Property-Based Attestation.
First ACM Workshop on Scalable Trusted Computing (STC'06)
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Gajek, Sebastian :
Client Authentication in Federations Using a Security Mode.
Toward a More Secure Web - W3C Workshop on Usability and Transparency of Web Authentication.
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Scheibel, Michael :
Design and Implementation of a Secure Linux Device Encryption Architecture.
LinuxTag
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Wolf, Marko ; Scheibel, Michael :
Play it once again, Sam - Enforcing Stateful Licenses on Open Platforms.
The Second Workshop on Advances in Trusted Computing (WATC '06 Fall)
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich :
Property-Based Broadcast Encryption for Multi-level Security Policies.
In: 8th International Conference on Information Security and Cryptology (ICISC 2005). In: LNCS , 3935 . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus :
Towards Multilateral Secure Digital Rights Distribution Infrastructures.
In: ACM DRM Workshop'05.
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich :
Embedding Trust into Cars—Secure Software Delivery and Installation.
Third Workshop on Embedded Security in Cars (escar 2005)
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Multilaterally Secure Computing Platforms - in your office, car and at home.
In: 1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society.
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Selhorst, Marcel ; Senft, Oska :
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9
[Artikel], (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus :
Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme.
In: 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security.
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Stüble, Ulrich ; Kursawe, Klaus ; Lucks, Stefan :
Secure Data Management in Trusted Computing.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES). In: LNCS , 3659 . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Rupp, Andy ; Bangerter, Endre :
Simplified Hardness Proofs in the Generic Group Model.
In: Western European Workshop on Research in Cryptology (WEWoRC 2005).
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Towards Multilateral Security On DRM Platforms.
In: First Information Security Practice and Experience Conference (ISPEC 2005).
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus :
Security Engineering for Zero-knowledge Watermark Detection.
In: Special Session on Media Security (WIAMIS 2005).
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich :
Secure Software Delivery and Installation in Embedded Systems.
First Information Security Practice and Experience Conference (ISPEC 2005)
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Towards multilaterally secure computing platforms - with open source and trusted computing.
In: Information Security Technical Report, 10 (2) pp. 83-95.
[Artikel], (2005)

Sadeghi, Ahmad-Reza :
Trusted Computing: Whom do we trust? Building Open Multilateral Secure Platforms Based On Trusted Computing.
In: DRM Conference.
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich :
Property-Based Broadcast Encryption for Multi-level Security Policies.
Technische Universität Darmstadt
[Monograph], (2005)

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit :
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
In: Workshop on Secure Web Services (SWS).
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin
Lemke, Kerstin ; Wolf, Marko ; Paar, Christof (eds.) :

Anti-theft Protection: Electronic Immobilizers.
In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications.. Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit :
Browser Model for Security Analysis of Browser-Based Protocols.
In: European Symposium for Research in Computer Science (ESORICS).
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit :
Browser Model for Security Analysis of Browser-Based Protocols.
IBM
[Monograph], (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus :
Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it.
In: ACM Multimedia Systems
[Artikel], (2005)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin :
An Open Approach for Designing Secure Electronic Immobilizers.
In: First Information Security Practice and Experience Conference (ISPEC 2005).
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Chen, Liqun ; Enzmann, Matthias ; Schneider, Markus ; Steiner, Michael :
A Privacy-Protecting Coupon System.
Financial Cryptography
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Bas, Patrick ; Barni, Mauro ; Rosa, Alessia De
Katzenbeisser, Stefan (ed.) :

First Summary Report on Asymmetric Watermarking.
ECRYPT, Network of Excellence in Cryptology
[Konferenz- oder Workshop-Beitrag], (2005)

Schwenk, Jörg ; Gajek, Sebastian ; Adelsbach, Andre :
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures.
In: LNCS , 3439 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2005)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms.
20th Annual Computer Security Applications Conference (ACSAC)
[Konferenz- oder Workshop-Beitrag], (2004)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Pohlmann, Norbert :
European Multilateral Secure Computing Base - Open Trusted Computing for You and Me.
In: Datenschutz und Datensicherheit (DUD), 9 pp. 548-554.
[Artikel], (2004)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Property-based Attestation for Computing Platforms: Caring about policies, not mechanisms.
New Security Paradigm Workshop (NSPW)
[Konferenz- oder Workshop-Beitrag], (2004)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus :
Overcoming the Obstacles of Zero-Knowledge Watermark Detection.
In: ACM Multimedia and Security Workshop. ACM Press
[Konferenz- oder Workshop-Beitrag], (2004)

Sadeghi, Ahmad-Reza ; Günnewig, Dirk ; Rannenberg, Kai ; Stüble, Christian
Koenig, Christian ; Neu­mann, An­dre­as ; Katz­sch­mann, To­bi­as (eds.) :

Trusted Computing Platforms: Zur technischen und industriepolitischen Situation und Vorgehensweise.
In: Vertrauenswürdige Systemumgebungen Technik, Recht und gesellschaftspolitische Implikationen des "Trusted Computing". Verlag Recht und Wirtschaft
[Buchkapitel], (2004)

Sadeghi, Ahmad-Reza ; Alkassar, Ammar :
The Quest for Security in Integrated Networks.
In: 11th International Conference on Telecommunication Systems, Modeling and Analysis.
[Konferenz- oder Workshop-Beitrag], (2003)

Stüble, Christian ; Kursawe, Klaus :
Improving End-user Security and Trustworthiness of TCG Platforms.
33. GI-Fachtagung
[Konferenz- oder Workshop-Beitrag], (2003)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Taming "Trusted Computing" by Operating System Design.
4th International Workshop on Information Security Applications (WISA'03) Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2003)

Sadeghi, Ahmad-Reza ; Alkassar, Ammar ; Stüble, Christian :
Secure Object Identification - or: Solving The Chess Grandmaster Problem.
New Security Paradigms Workshop
[Konferenz- oder Workshop-Beitrag], (2003)

Sadeghi, Ahmad-Reza ; Stüble, Dirk :
Trusted Computing ohne Nebenwirkungen.
In: Datenschutz und Datensicherheit (DUD). Vieweg Verlag , pp. 556-560.
[Buchkapitel], (2003)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Sinn und Unsinn von TCPA und Palladium.
In: c't, 13
[Artikel], (2003)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Schneider, Markus ; Stüble, Christian :
Die digitale Signatur.
In: Digitale Signaturen in der Praxis. AWV Verlag
[Buchkapitel], (2003)

Sadeghi, Ahmad-Reza ; Schneider, Markus :
Electronic Payment Systems.
In: Digital Rights Management. LNCS, 2770. Springer Verlag , pp. 113-137.
[Buchkapitel], (2003)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Bridging the Gap between TCPA/Palladium and Personal Security.

[Report], (2003)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre :
Advanced Techniques for Dispute Resolving and Authorship Proofs on Digital Works.
Security and Watermarking of Multimedia Contents V
[Konferenz- oder Workshop-Beitrag], (2003)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzenbeisser, Stefan :
Cryptography Meets Watermarking: Detecting Watermarks with Minimal- or Zero-Knowledge Disclosure.
In: XI European Signal Processing Conference , 1
[Konferenz- oder Workshop-Beitrag], (2002)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian :
Final Report on Verification and Assessment.

[Monograph], (2002)

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Steinbrecher, Sandra :
Auctions with Multiple Rounds and Multiple Items.
Int. Workshop on Trust and Privacy in Digital Business (DEXA 2002)
[Konferenz- oder Workshop-Beitrag], (2002)

Sadeghi, Ahmad-Reza ; Steiner, Michael :
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference.
In: LNCS , 2045 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2001)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Geraldy, Alexander ; Pfitzmann, Birgit :
Optimized Self-Synchronizing Mode of Operation.
In: 8th International Workshop on Fast Software Encryption.
[Konferenz- oder Workshop-Beitrag], (2001)

Sadeghi, Ahmad-Reza :
How to Break a Semi-Anonymous Fingerprinting Scheme.
In: Information Hiding: Fourth International Workshop. In: LNCS , 2137 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2001)

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit :
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99. Vieweg Verlag , pp. 35-48.
[Buchkapitel], (1999)

T

Tews, Erik ; Weiner, M. ; Massar, M. ; Giese, D. ; Wieser, W. :
Security analysis of a widely deployed locking system.
In:
[Artikel], (2013)

Tews, Erik :
How to enable Live Cloning of Virtual Machines using the Xen Hypervisor.

[Report], (2013)

Thiemert, Stefan ; Nürnberger, Stefan ; Steinebach, Martin ; Zmudzinski, Sascha :
Security of robust audio hashes.
IEEE International Workshop on Information Forensics and Security, WIFS 2009, London, UK
[Konferenz- oder Workshop-Beitrag], (2009)

V

Van Herrewege, Anthony ; Katzenbeisser, Stefan ; Maes, Roel ; Peeters, Roel ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian :
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
In: Lecture Notes in Computer Science (LNCS) , 7397 . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

W

Wachsmann, Christian ; Sadeghi, Ahmad-Reza:
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions.
Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool Publishers ISBN 9781627055093
[Buch], (2014)

Wachsmann, Christian :
Trusted and Privacy-Preserving Embedded Systems.
Technische Universität Darmstadt
[Dissertation]

Werner, M. ; Kaiser, J. ; Hollick, Matthias ; Weingärtner, E. ; Wehrle, K. :
A Blueprint for Switching Between Secure Routing Protocols in Wireless Multihop Networks.
Proceedings of the 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM, D-SPAN Workshop)
[Konferenz- oder Workshop-Beitrag], (2013)

Werthmann, Tim ; Hund, Ralf ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten :
PSiOS: Bring Your Own Privacy & Security to iOS Devices (Distinguished Paper Award).
8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Wachsmann, Christian ; Sadeghi, Ahmad-Reza ; Schulz, Steffen :
Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions.
In: Secure Smart Embedded Devices, Platforms and Applications. Springer , pp. 429-449.
[Buchkapitel], (2012)

Z

Zeitouni, Shaza ; Gens, David ; Sadeghi, Ahmad-Reza :
It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs.
In: Design Automation Conference (DAC) 2018
[Konferenz- oder Workshop-Beitrag], (2018)

Zeitouni, Shaza ; Dessouky, Ghada ; Arias, Orlando ; Sullivan, Dean ; Ibrahim, Ahmad ; Jin, Yier ; Sadeghi, Ahmad-Reza :
ATRIUM: Runtime Attestation Resilient Under Memory Attacks.
2017 International Conference On Computer Aided Design (ICCAD'17)
[Konferenz- oder Workshop-Beitrag], (2017)

Zeitouni, Shaza ; Oren, Yossef ; Wachsmann, Christian ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza :
Remanence Decay Side-Channel: The PUF Case.
In: IEEE Transactions on Information Forensics and Security, 99
[Artikel], (2016)

Diese Liste wurde am Thu Sep 20 02:46:13 2018 CEST generiert.