TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Jump to: 2016 | 2015 | 2014 | 2013 | 2012 | 2011
Number of items: 13.


Matyunin, Nikolay ; Szefer, Jakub ; Biedermann, Sebastian ; Katzenbeisser, Stefan (2016):
Covert channels using mobile device's magnetic field sensors.
pp. 525-532, 21st Asia and South Pacific Design Automation Conference, ASP-DAC 2016, Macao, Macao, January 25-28, 2016, DOI: 10.1109/ASPDAC.2016.7428065,
[Conference or Workshop Item]


Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub (2015):
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, pp. 5-13. [Article]

Biedermann, Sebastian (2015):
Transparent Security Services for an Infrastructure-as-a-Service Cloud.
TU Darmstadt,
[Ph.D. Thesis]


Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub (2014):
Hot-Hardening: Getting More Out of Your Security Settings.
In: ACSAC '14, In: Proceedings of the 30th Annual Computer Security Applications Conference, pp. 6-15,
ACM, New Orleans, Louisiana, USA, ISBN 978-1-4503-3005-3,
DOI: 10.1145/2664243.2664246,
[Conference or Workshop Item]

Araujo, Frederico ; Hamlen, Kevin ; Biedermann, Sebastian ; Katzenbeisser, Stefan (2014):
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
In: ACM, In: Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, pp. 942-953,
Scottsdale, AZ, USA, [Conference or Workshop Item]

Biedermann, Sebastian ; Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan (2014):
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
In: IACR Cryptology ePrint Archive 2014,
[Conference or Workshop Item]

Riecker, Michael ; Biedermann, Sebastian ; Bansarkhani, Rachid El ; Hollick, Matthias (2014):
Lightweight Energy Consumption Based Intrusion Detection System for Wireless Sensor Networks.
In: International Journal of Information Security, 14 (2), pp. 155-167. Springer, ISSN 1615-5270,

Biedermann, Sebastian ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Strufe, Thorsten ; Peter, Andreas (2014):
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, 8327, pp. 114-125. [Article]


Hauke, Sascha ; Biedermann, Sebastian ; Mühlhäuser, Max ; Heider, Dominik (2013):
On the Application of the Supervised Machine Learning to Trustworthiness Assessment.
In: Proceedings: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications: TrustCom 2013, pp. 525 - 534,
IEEE, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Australia, 16.-18.07.2013, ISBN 978-0-7695-5022-0,
DOI: 10.1109/TrustCom.2013.5,
[Conference or Workshop Item]

Biedermann, Sebastian ; Zittel, Martin ; Katzenbeisser, Stefan (2013):
Improving security of virtual machines during live migrations.
In: IEEE Press, pp. 352-357. [Article]

Biedermann, Sebastian ; Katzenbeisser, Stefan (2013):
POSTER: Event-based Isolation of Critical Data in the Cloud.


Riecker, Michael ; Barroso, Ana ; Hollick, Matthias ; Biedermann, Sebastian (2012):
On Data-centric Intrusion Detection in Wireless Sensor Networks.
In: Proceedings of the IEEE Conference on Cyber, Physical and Social Computing (CPSCom),
[Conference or Workshop Item]


Biedermann, Sebastian ; Katzenbeisser, Stefan (2011):
Detecting Computer Worms in the Cloud.
In: Open Problems in Network Security (iNetSec 2011), pp. 43-54,
Springer, [Conference or Workshop Item]

This list was generated on Tue Mar 21 00:11:27 2023 CET.