Blättern nach Person
Ebene hoch |
2024
Koisser, David ; Mitev, Richard ; Chilese, Marco ; Sadeghi, Ahmad-Reza (2024)
Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users.
45th IEEE Symposium on Security and Privacy. San Francisco, USA (19.05.2024 - 23.05.2024)
Konferenzveröffentlichung, Bibliographie
Chilese, Marco ; Mitev, Richard ; Orenbach, Meni ; Thorburn, Robert ; Atamli, Ahmad ; Sadeghi, Ahmad-Reza (2024)
One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices.
45th IEEE Symposium on Security and Privacy. San Francisco, USA (19.05.2024 - 23.05.2024)
Konferenzveröffentlichung, Bibliographie
Rieger, Phillip ; Krauß, Torsten ; Miettinen, Mark ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza (2024)
CrowdGuard: Federated Backdoor Detection in Federated Learning.
Network and Distributed Systems Security (NDSS) Symposium 2024. San Diego, USA (26.02.24-01.03.24)
doi: 10.14722/ndss.2024.23233
Konferenzveröffentlichung, Bibliographie
Fereidooni, Hossein ; Pegoraro, Alessandro ; Rieger, Phillip ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza (2024)
FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning.
Network and Distributed Systems Security (NDSS) Symposium 2024. San Diego, USA (26.02.2024 - 01.03.2024)
Konferenzveröffentlichung, Bibliographie
2023
Pütz, Philipp ; Mitev, Richard ; Sadeghi, Ahmad-Reza (2023)
Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats.
Annual Computer Security Applications Conference (ACSAC 2023). Austin, USA (04.12.2023-08.12.2023)
Konferenzveröffentlichung, Bibliographie
Castillo, Jorge ; Rieger, Phillip ; Fereidooni, Hossein ; Chen, Qian ; Sadeghi, Ahmad-Reza (2023)
FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks.
39th Annual Computer Security Applications Conference (ACSAC'23). Austin, USA (04.12.2023 - 08.12.2023)
doi: 10.1145/3627106.3627194
Konferenzveröffentlichung, Bibliographie
Li, Huimin ; Rieger, Phillip ; Zeitouni, Shaza ; Picek, Stjepan ; Sadeghi, Ahmad-Reza (2023)
FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning.
33rd International Conference on Field-Programmable Logic and Applications. Gothenburg, Sweden (04.09.2023-08.09.2023)
doi: htps://doi.org/10.1109/FPL60245.2023.00046
Konferenzveröffentlichung, Bibliographie
Rieger, Phillip ; Chilese, Marco ; Mohamed, Reham ; Miettinen, Markus ; Fereidooni, Hossein ; Sadeghi, Ahmad-Reza (2023)
ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks.
32nd USENIX Security Symposium. Anaheim, USA (09.08.2023-11.08.2023)
Konferenzveröffentlichung, Bibliographie
Saß, Marvin ; Mitev, Richard ; Sadeghi, Ahmad-Reza (2023)
Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M.
32nd USENIX Security Symposium. Anaheim, USA (09.08.2023-11.08.2023)
Konferenzveröffentlichung, Bibliographie
Kumari, Kavita ; Rieger, Phillip ; Fereidooni, Hossein ; Jadliwala, Murtuza ; Sadeghi, Ahmad-Reza (2023)
BayBFed: Bayesian Backdoor Defense for Federated Learning.
44th IEEE Symposium on Security and Privacy. San Francisco, USA (22.05.2023-25.05.2023)
doi: 10.1109/SP46215.2023.10179362
Konferenzveröffentlichung, Bibliographie
Koisser, David ; Brasser, Ferdinand ; Jauernig, Patrick ; Stapf, Emmanuel ; Wallum, Marcus ; Fischer, Daniel ; Sadeghi, Ahmad-Reza (2023)
Hardware-Based Isolation for Advanced Safety and Security in Spacecraft.
17th International Conference on Space Operations (SpaceOps 2023). Dubai, UAE (06.03.2023-10.03.2023)
Konferenzveröffentlichung, Bibliographie
Jauernig, Patrick ; Jakobovic, Domagoj ; Picek, Stjepan ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza (2023)
DARWIN: Survival of the Fittest Fuzzing Mutators.
Network and Distributed Systems Security (NDSS) Symposium 2023. San Diego, USA (27.02.2023-03.03.2023)
doi: 10.14722/ndss.2023.23159
Konferenzveröffentlichung, Bibliographie
Fereidooni, Hossein ; König, Jan ; Rieger, Phillip ; Chilese, Marco ; Goekbakan, Bora ; Finke, Moritz ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza (2023)
AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms.
Network and Distributed Systems Security (NDSS) Symposium 2023. San Diego, USA (27.02.2023-03.03.2023)
doi: 10.14722/ndss.2023.23194
Konferenzveröffentlichung, Bibliographie
Sendner, Christoph ; Chen, Huili ; Fereidooni, Hossein ; Petzi, Lukas ; König, Jan ; Stang, Jasper ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2023)
Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning.
Network and Distributed Systems Security (NDSS) Symposium 2023. San Diego, USA (27.02.2023-03.03.2023)
doi: 10.14722/ndss.2023.23263
Konferenzveröffentlichung, Bibliographie
Frassetto, Tommaso ; Jauernig, Patrick ; Koisser, David ; Kretzler, David ; Schlosser, Benjamin ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2023)
POSE: Practical Off-chain Smart Contract Execution.
Network and Distributed System Security Symposium 2023. San Diego, USA (27.02.2023-03.03.2023)
Konferenzveröffentlichung, Bibliographie
2022
Chen, Chen ; Kande, Rahul ; Mahmoody, Pouya ; Sadeghi, Ahmad-Reza ; Rajendran, JV (2022)
Trusting the trust anchor: towards detecting cross-layer vulnerabilities with hardware fuzzing.
59th ACM/IEEE Design Automation Conference. San Francisco, USA (10.07.2022-14.07.2022)
doi: 10.1145/3489517.3530638
Konferenzveröffentlichung, Bibliographie
Wang, Jianqiang ; Mahmoody, Pouya ; Brasser, Ferdinand ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Yu, Donghui ; Pan, Dahan ; Zhang, Yuanyuan (2022)
VirTEE: a full backward-compatible TEE with native live migration and secure I/O.
59th ACM/IEEE Design Automation Conference. San Francisco, USA (10.07.2022-14.07.2022)
doi: 10.1145/3489517.3530436
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Mitev, Richard ; Saß, Marvin (2022)
Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M.
25th Black Hat USA. Las Vegas, USA (06.08.2022-11.08.2022)
Konferenzveröffentlichung, Bibliographie
Wang, Kai ; Mitev, Richard ; Yan, Chen ; Ji, Xiaoyu ; Sadeghi, Ahmad-Reza ; Xu, Wenyuan
Hrsg.: USENIX Association (2022)
GhostTouch: Targeted Attacks on Touchscreens without Physical Touch.
31st USENIX Security Symposium (USENIX Security 22). Boston, USA (10.08.2022-12.08.2022)
Konferenzveröffentlichung, Bibliographie
Jiang, Yan ; Ji, Xiaoyu ; Wang, Kai ; Yan, Chen ; Mitev, Richard ; Sadeghi, Ahmad-Reza ; Xu, Wenyuan (2022)
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens.
43rd IEEE Symposium on Security and Privacy. San Francisco, USA (23.05.2022-26.05.2022)
doi: 10.1109/SP46214.2022.9833740
Konferenzveröffentlichung, Bibliographie
Dessouky, Ghada ; Gruler, Alexander ; Mahmoody, Pouya ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2022)
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures.
Network and Distributed Systems Security (NDSS) Symposium 2022. San Diego, USA (24.04.2022-28.04.2022)
Konferenzveröffentlichung, Bibliographie
Rieger, Phillip ; Nguyen, Thien Duc ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2022)
DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection.
Network and Distributed Systems Security (NDSS) Symposium 2022. San Diego, USA (24.04.2022-28.04.2022)
doi: 10.14722/ndss.2022.23156
Konferenzveröffentlichung, Bibliographie
Nguyen, Thien Duc ; Rieger, Phillip ; Chen, Huili ; Yalame, Mohammad Hossein ; Möllering, Helen ; Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Zeitouni, Shaza ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2022)
FLAME: Taming Backdoors in Federated Learning.
31st USENIX Security Symposium (USENIX Security 22). Boston, USA (10.08.2022-12.08.2022)
Konferenzveröffentlichung, Bibliographie
Fereidooni, Hossein ; Dmitrienko, Alexandra ; Rieger, Phillip ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Madlener, Felix (2022)
FedCRI: Federated Mobile Cyber-Risk Intelligence.
Network and Distributed Systems Security (NDSS) Symposium 2022. San Diego, USA (24.04.2022-28.04.2022)
doi: 10.14722/ndss.2022.23153
Konferenzveröffentlichung, Bibliographie
2021
Surminski, Sebastian ; Niesler, Christian ; Brasser, Ferdinand ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2021)
RealSWATT: Remote Software-Based Attestation for Embedded Devices under Realtime Constraints.
2021 ACM SIGSAC Conference on Computer and Communications Security. virtual Conference (15.11.2021-19.11.2021)
doi: 10.1145/3460120.3484788
Konferenzveröffentlichung, Bibliographie
Dessouky, Ghada ; Mahmoody, Pouya ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel ; Zeitouni, Shaza ; Isakov, Mihailo ; Kinsy, Michel ; Mark, Miguel (2021)
Distributed Memory Guard: Enabling Secure Enclave Computing in NoC-based Architectures.
58th Design Automation Conference. San Francisco, USA (05.12.2021-09.12.2021)
doi: 10.1109/DAC18074.2021.9586222
Konferenzveröffentlichung, Bibliographie
Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Möllering, Helen ; Nguyen, Thien Duc ; Rieger, Phillip ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Yalame, Mohammad Hossein ; Zeitouni, Shaza (2021)
SAFELearn: Secure Aggregation for private FEderated Learning.
4th Deep Learning and Security Workshop (DLS'21). virtual Conference (27.05.2021-27.05.2021)
Konferenzveröffentlichung, Bibliographie
Nguyen, Thien Duc ; Rieger, Phillip ; Yalame, Mohammad Hossein ; Möllering, Helen ; Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2021)
FLGUARD: Secure and Private Federated Learning.
Report, Bibliographie
Bahmani, Raad ; Brasser, Ferdinand ; Dessouky, Ghada ; Jauernig, Patrick ; Klimmek, Matthias ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2021)
CURE: A Security Architecture with CUstomizable and Resilient Enclaves.
30th USENIX Security Symposium (USENIX Security'21). Vancouver, Canada (11.08.2021-13.08.2021)
Konferenzveröffentlichung, Bibliographie
Chen, Yanjiao ; Bai, Yijie ; Wang, Kaibo ; Mitev, Richard ; Xu, Wenyuan ; Sadeghi, Ahmad-Reza (2021)
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants.
ACM Conference on Computer and Communications Security (CCS). virtual Conference (15.11.2021-19.11.2021)
Konferenzveröffentlichung, Bibliographie
Zeitouni, Shaza ; Dessouky, Ghada ; Sadeghi, Ahmad-Reza (2021)
SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities.
6th IEEE European Symposium on Security and Privacy (Euro S&P 2021). virtual Conference (06.09.2021-10.09.2021)
Konferenzveröffentlichung, Bibliographie
Zeitouni, Shaza ; Vliegen, Jo ; Frassetto, Tommaso ; Koch, Dirk ; Sadeghi, Ahmad-Reza ; Mentens, Nele (2021)
Trusted Configuration in Cloud FPGAs.
29th IEEE International Symposium on Field-Programmable Custom Computing Machines. virtual Conference (09.05.2021-12.05.2021)
Konferenzveröffentlichung, Bibliographie
2020
Baumgärtner, Lars ; Dmitrienko, Alexandra ; Freisleben, Bernd ; Gruler, Alexander ; Höchst, Jonas ; Kühlberg, Joshua ; Mezini, Mira ; Mitev, Richard ; Miettinen, Markus ; Muhamedagic, Anel ; Nguyen, Thien Duc ; Penning, Alvar ; Pustelnik, Frederik ; Roos, Filipp ; Sadeghi, Ahmad-Reza ; Schwarz, Michael ; Uhl, Christian (2020)
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps.
TrustCom 2020. virtual Conference (29.12.2020-01.01.2021)
Konferenzveröffentlichung, Bibliographie
Nguyen, Thien Duc ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2020)
Long Live Randomization: On Privacy-Preserving Contact Tracing in Pandemic.
CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. virtual Conference (09.11.2020-13.11.2020)
doi: 10.1145/3411496.3421229
Konferenzveröffentlichung, Bibliographie
Buchmann, Johannes ; Dessouky, Ghada ; Frassetto, Tommaso ; Kiss, Ágnes ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Traverso, Giulia ; Zeitouni, Shaza (2020)
SAFE: A Secure and Efficient Long-Term Distributed Storage System.
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20). Taipei, Taiwan (01.06.2020-05.06.2020)
Konferenzveröffentlichung, Bibliographie
Neureither, Jens ; Dmitrienko, Alexandra ; Koisser, David ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2020)
LegIoT: Ledgered Trust Management Platform for IoT.
25th European Symposium on Research in Computer Security. virtual Conference (14.09.2020-18.09.2020)
doi: 10.1007/978-3-030-58951-6_19
Konferenzveröffentlichung, Bibliographie
Cammarota, Rosario ; Schunter, Matthias ; Rajan, Anand ; Boemer, Fabian ; Kiss, Ágnes ; Treiber, Amos ; Weinert, Christian ; Schneider, Thomas ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza ; Demmler, Daniel ; Chen, Huili ; Hussain, Siam Umar ; Riazi, M. Sadegh ; Koushanfar, Farinaz ; Gupta, Saransh ; Rosing, Tajan Simunic ; Chaudhuri, Kamalika ; Nejatollahi, Hamid ; Dutt, Nikil ; Imani, Mohsen ; Laine, Kim ; Dubey, Anuj ; Aysu, Aydin ; Sadat Hosseini, Fateme ; Yang, Chengmo ; Wallace, Eric ; Norton, Pamela (2020)
Trustworthy AI Inference Systems: An Industry Research View.
doi: 10.48550/arXiv.2008.04449
Report, Bibliographie
Dessouky, Ghada ; Frassetto, Tommaso ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza (2020)
With Great Complexity Comes Great Vulnerability: Challenges of Secure Processor Design.
In: IEEE Security & Privacy
doi: 10.1109/MSEC.2020.2994978
Artikel, Bibliographie
Dessouky, Ghada ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020)
Enclave Computing on RISC-V: A Brighter Future for Security?
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020. Boston, USA (05.04.2020-07.04.2020)
Konferenzveröffentlichung, Bibliographie
Bayerl, Sebastian P. ; Frassetto, Tommaso ; Jauernig, Patrick ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Weinert, Christian (2020)
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20). Grenoble, France (09.03.2020-13.03.2020)
Konferenzveröffentlichung, Bibliographie
Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020)
Trusted Execution Environments: Properties, Applications, and Challenges.
In: IEEE Security & Privacy, 18 (2)
doi: 10.1109/MSEC.2019.2947124
Artikel, Bibliographie
Adepu, Sridhar ; Brasser, Ferdinand ; Garcia, Luis ; Rodler, Michael ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Zonouz, Saman A. (2020)
Control Behavior Integrity for Distributed Cyber-Physical Systems.
11th International Conference on Cyber-Physical Systems (ICCPS). Sydney, Australia (22.04.2020-24.04.2020)
doi: 10.1109/ICCPS48487.2020.00011
Konferenzveröffentlichung, Bibliographie
Dessouky, Ghada ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2020)
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.
29th USENIX Security Syposium. Boston, MA, USA (12.08.2020-14.08.2020)
Konferenzveröffentlichung, Bibliographie
Dessouky, Ghada ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020)
INVITED: AI Utopia or Dystopia - On Securing AI Platforms.
DAC'20-Design Automation Conference 2020. virtual Conference (20.07.2020-24.07.2020)
Konferenzveröffentlichung, Bibliographie
Mitev, Richard ; Pazii, Anna ; Miettinen, Markus ; Enck, William ; Sadeghi, Ahmad-Reza (2020)
LeakyPick: IoT Audio Spy Detector.
36th Annual Computer Security Applications Conference. virtual Conference (07.12.2020-11.12.2020)
doi: 10.1145/3427228.3427277
Konferenzveröffentlichung, Bibliographie
Zeitouni, Shaza ; Stapf, Emmanuel ; Fereidooni, Hossein ; Sadeghi, Ahmad-Reza (2020)
On the Security of Strong Memristor-based Physically Unclonable Functions.
Design Automation Conference 2020. virtual Conference (19.07.2020-24.07.2020)
Konferenzveröffentlichung, Bibliographie
Acar, Abbas ; Fereidooni, Hossein ; Abera, Tigist ; Sikder, Amit Kumsr ; Miettinen, Markus ; Aksu, Hidayet ; Conti, Mauro ; Sadeghi, Ahmad-Reza (2020)
Peek-a-Boo: I see your smart home activities, even encrypted!
WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. virtual Conference (08.07.2020-10.07.2020)
Konferenzveröffentlichung, Bibliographie
Nguyen, Thien Duc ; Rieger, Phillip ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2020)
Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System.
Workshop on Decentralized IoT Systems and Security (DISS) @ NDSS Symposium 2020. San Diego, USA (23.02.2020-26.02.2020)
Konferenzveröffentlichung, Bibliographie
Kenjar, Zijo ; Frassetto, Tommaso ; Gens, David ; Franz, Michael ; Sadeghi, Ahmad-Reza (2020)
V0LTpwn: Attacking x86 Processor Integrity from Software.
29th USENIX Security Symposium. Boston, USA (12.08.2020-14.08.2020)
Konferenzveröffentlichung, Bibliographie
2019
Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza (2019)
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization.
ACSAC - 35th Annual Computer Security Applications Conference. San Juan, Puerto Rico (09.12.2019-13.12.2019)
Konferenzveröffentlichung, Bibliographie
Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019)
Privacy-preserving speech processing via STPC and TEEs.
2nd Privacy Preserving Machine Learning (PPML) - CCS 2019 Workshop. London, United Kingdom (15.11.2019-15.11.2019)
Konferenzveröffentlichung, Bibliographie
Dessouky, Ghada ; Zeitouni, Shaza ; Ibrahim, Ahmad ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2019)
CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems.
2019 International Conference On Computer Aided Design (ICCAD). The Westin Westminster Westminster, CO (04.11.2019-07.11.2019)
Konferenzveröffentlichung, Bibliographie
Ghaeini, Hamid Reza ; Chan, Matthew ; Bahmani, Raad ; Brasser, Ferdinand ; Garcia, Luis ; Zhou, Jianying ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole ; Zonouz, Saman A. (2019)
PAtt: Physics-based Attestation of Control Systems.
22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID). Beijing (23.09.2019-25.09.2019)
Konferenzveröffentlichung, Bibliographie
Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostáková, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019)
FastKitten: Practical Smart Contracts on Bitcoin.
28th USENIX Security Symposium. Santa Clara, CA, USA (14.08.2019-16.08.2019)
Konferenzveröffentlichung, Bibliographie
Paverd, Andrew ; Völp, Marcus ; Brasser, Ferdinand ; Schunter, Matthias ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Esteves-Verissimo, Paulo ; Steininger, Andreas ; Holz, Thorsten (2019)
Sustainable Security & Safety: Challenges and Opportunities.
4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS). Stuttgart (09.07.2019-09.07.2019)
doi: 10.4230/OASIcs.CERTS.2019.4
Konferenzveröffentlichung, Bibliographie
Bock, Carsten ; Brasser, Ferdinand ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2019)
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
ACM Asia Conference on Computer and Communications Security (AsiaCCS). Auckland (07.07.2019-12.07.2019)
doi: 10.1145/3321705.3329827
Konferenzveröffentlichung, Bibliographie
Mitev, Richard ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2019)
Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants.
ASIACCS 2019. Auckland, New Zealand (09.07.2019-11.07.2019)
doi: 10.1145/3321705.3329842
Konferenzveröffentlichung, Erstveröffentlichung
Songhori, Ebrahim ; Riazi, M. Sadegh ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2019)
ARM2GC: Succinct Garbled Processor for Secure Computation.
Design Automation Conference (DAC), 2019 56th ACM/EDAC/IEEE. Las Vegas, USA (02.06.2019-06.06.2019)
Konferenzveröffentlichung, Bibliographie
Marchal, Samuel ; Miettinen, Markus ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Asokan, N. (2019)
AuDI: Towards autonomous IoT device-type identification using periodic communications.
In: IEEE Journal on Selected Areas in Communications
Artikel, Bibliographie
Batina, Lejla ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019)
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
Design Automation Conference 2019. Las Vegas, NV, USA (02.06.2019-06.06.2019)
Konferenzveröffentlichung, Bibliographie
Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2019)
HardFails: Insights into Software-Exploitable Hardware Bugs.
28th USENIX Security Symposium. Santa Clara, CA, USA (14.08.2019-16.08.2019)
Konferenzveröffentlichung, Bibliographie
O'Connor, T. J. ; Mohamed, Reham ; Miettinen, Markus ; Enck, William ; Reaves, Bradley ; Sadeghi, Ahmad-Reza (2019)
HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices.
Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). Miami, FL, USA
Konferenzveröffentlichung, Bibliographie
Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Fereidooni, Hossein ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019)
DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
Konferenzveröffentlichung, Bibliographie
Marchal, Samuel ; Miettinen, Markus ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Asokan, N. (2019)
AUDI: Towards Autonomous IoT Device-Type Identification.
In: IEEE Journal on Selected Areas in Communications (JSAC) on Artificial Intelligence and Machine Learning for Networking and Communications
Artikel, Bibliographie
Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019)
HEALED: HEaling & Attestation for Low-end
Embedded Devices.
23rd International Conference Financial Cryptography and Data Security (FC 2019), 2019.
Konferenzveröffentlichung, Bibliographie
Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostakova, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019)
FastKitten: Practical Smart Contracts on Bitcoin.
Report, Bibliographie
Aschermann, Cornelius ; Frassetto, Tommaso ; Holz, Thorsten ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Teuchert, Daniel (2019)
Nautilus: Fishing for Deep Bugs with Grammars.
Konferenzveröffentlichung, Bibliographie
Brasser, Ferdinand ; Gens, David ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019)
SANCTUARY: ARMing TrustZone with User-space Enclaves.
Konferenzveröffentlichung, Bibliographie
Weiser, Samuel ; Werner, Mario ; Brasser, Ferdinand ; Malenko, Maja ; Mangard, Stefan ; Sadeghi, Ahmad-Reza (2019)
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V.
Konferenzveröffentlichung, Bibliographie
Abera, Tigist ; Bahmani, Raad ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2019)
DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous System.
Konferenzveröffentlichung, Bibliographie
Mohamed, Reham ; O'Connor, Terrance ; Miettinen, Markus ; Enck, William ; Sadeghi, Ahmad-Reza
Hrsg.: Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang (2019)
HONEYSCOPE: IoT Device Protection with Deceptive Network Views,.
In: Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings
Buchkapitel, Bibliographie
Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019)
HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.
Design Automation Conference (DAC). Las Vegas, USA (03.06.2019-05.06.2019)
Konferenzveröffentlichung, Bibliographie
Oliveira Nunes, Ivan de ; Dessouky, Ghada ; Ibrahim, Ahmad ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019)
Towards Systematic Design of Collective Remote Attestation Protocols.
The 39th International Conference on Distributed Computing Systems (ICDCS) 2019. Dallas, TX, USA (07.07.2019-10.07.2019)
doi: 10.1109/ICDCS.2019.00120
Konferenzveröffentlichung, Bibliographie
2018
Miettinen, Markus ; Sadeghi, Ahmad-Reza (2018)
Internet of things or threats?: on building trust in IoT (keynote). 1:1-1:9.
CODES+ISSS 2018, part of ESWEEK 2018. Torino, Italy (30.09.2018-05.10.2018)
Konferenzveröffentlichung, Bibliographie
Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian (2018)
VoiceGuard: Secure and Private Speech Processing.
Interspeech 2018. HYDERABAD (02.09.2018-06.09.2018)
doi: 10.21437/Interspeech.2018-2032
Konferenzveröffentlichung, Bibliographie
Frassetto, Tommaso ; Jauernig, Patrick ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2018)
IMIX: In-Process Memory Isolation EXtension.
27th USENIX Security Symposium - Technical Sessions Track 2. Baltimore, MD, USA (15.08.2018-17.08.2018)
Konferenzveröffentlichung, Bibliographie
Carpent, Xavier ; Eldefrawy, Karim ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018)
Invited: Reconciling Remote Attestation and Safety-Critical
Operation on Simple IoT Devices.
Design Automation Conference. San Francisco, USA (24.06.2018-29.06.2018)
Konferenzveröffentlichung, Bibliographie
Dessouky, Ghada ; Abera, Tigist ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza (2018)
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution.
37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18). San Diego, CA, USA (05.11.2018-08.11.2018)
Konferenzveröffentlichung, Bibliographie
Asokan, N. ; Nyman, Thomas ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018)
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems - Special Issue ESWEEK 2018, CASES 2018, CODES + ISSS 2018 and EMSOFT 2018
Artikel, Bibliographie
Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2018)
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
23rd European Symposium on Research in Computer Security (ESORICS 2018). Barcelona, Spain (03.09.2018-07.09.2018)
Konferenzveröffentlichung, Bibliographie
Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018)
US-AID: Unattended Scalable Attestation of IoT Devices.
37th IEEE International Symposium on Reliable Distributed Systems (SRDS 2018). Salvador, Brazil (02.10.2018-05.10.2018)
Konferenzveröffentlichung, Bibliographie
Schaad, Andreas ; Grohmann, Bjoern ; Winzenried, Oliver ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2018)
Towards a Cloud-based System for Software Protection and Licensing.
Secrypt 2018. Porto, Portugal (26.07.2018-28.07.2018)
doi: 10.5220/0006899506980702
Konferenzveröffentlichung, Bibliographie
Zeitouni, Shaza ; Gens, David ; Sadeghi, Ahmad-Reza (2018)
It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs.
Konferenzveröffentlichung, Bibliographie
Miettinen, Markus ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2018)
Revisiting Context-Based Pairing in IoT.
55th Design Automation Conference (DAC). San Francisco, CA, USA (24.06.2018-29.06.2018)
Konferenzveröffentlichung, Bibliographie
Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza (2018)
iOracle: Automated Evaluation of Access Control Policies in iOS.
Konferenzveröffentlichung, Bibliographie
Biondo, Andrea ; Conti, Mauro ; Davi, Lucas ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2018)
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
27th USENIX Security Symposium.
Konferenzveröffentlichung, Bibliographie
Ghaeini, Hamid Reza ; Antonioli, Daniele ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole (2018)
State-Aware Anomaly Detection for Industrial Control Systems.
Pau, France
doi: 10.1145/3167132.3167305
Konferenzveröffentlichung, Bibliographie
Gens, David ; Schmitt, Simon ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2018)
K-Miner: Uncovering Memory Corruption in Linux.
Konferenzveröffentlichung, Bibliographie
Brasser, Ferdinand ; Davi, Lucas ; Dhavlle, Abhijitt ; Frassetto, Tommaso ; Dinakarrao, Sai Manoj Pudukotai ; Rafatirad, Setareh ; Sadeghi, Ahmad-Reza ; Sasan, Avesta ; Sayadi, Hossein ; Zeitouni, Shaza ; Homayoun, Houman (2018)
Advances and Throwbacks in Hardware-assisted Security: Special Session.
Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems. Piscataway, NJ, USA
Konferenzveröffentlichung, Bibliographie
Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Dang, Minh Hoang ; Asokan, N. ; Sadeghi, Ahmad-Reza (2018)
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
In: CoRR, abs/1804.07474
Artikel, Bibliographie
Mohan, Sibin ; Asplund, Mikael ; Bloom, Gedare ; Sadeghi, Ahmad-Reza ; Ibrahim, Ahmad ; Salajageh, Negin ; Griffioen, Paul ; Sinopoli, Bruno (2018)
The Future of IoT Security: Special Session.
International Conference on Embedded Software (EMSOFT 2018), 2018. Piscataway, NJ, USA
Konferenzveröffentlichung, Bibliographie
Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep (2018)
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
In: IEEE Internet Computing
doi: 10.1109/MIC.2018.182130646
Artikel, Bibliographie
Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2018)
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs.
In: Cryptography and Security, abs/1812.00197
Artikel, Bibliographie
2017
Zeitouni, Shaza ; Dessouky, Ghada ; Arias, Orlando ; Sullivan, Dean ; Ibrahim, Ahmad ; Jin, Yier ; Sadeghi, Ahmad-Reza (2017)
ATRIUM: Runtime Attestation Resilient Under Memory Attacks.
Irvine, California, US
Konferenzveröffentlichung, Bibliographie
Frassetto, Tommaso ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017)
JITGuard: Hardening Just-in-time Compilers with SGX.
Dallas, TX, USA
doi: 10.1145/3133956.3134037
Konferenzveröffentlichung, Bibliographie
Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Müller, Urs ; Sadeghi, Ahmad-Reza (2017)
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
doi: 10.48550/arXiv.1709.09917
Report, Bibliographie
Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro (2017)
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
Atlanta, Georgia, USA
Konferenzveröffentlichung, Bibliographie
Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2017)
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
Konferenzveröffentlichung, Bibliographie
Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017)
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
Konferenzveröffentlichung, Bibliographie
Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza (2017)
Software Grand Exposure: SGX Cache Attacks Are Practical.
Konferenzveröffentlichung, Bibliographie
Fereidooni, Hossein ; Frassetto, Tommaso ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Conti, Mauro (2017)
Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
Philadelphia, Pennsylvania, USA
Konferenzveröffentlichung, Bibliographie
Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza (2017)
HardIDX: Practical and Secure Index with SGX.
Konferenzveröffentlichung, Bibliographie
Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick (2017)
Phonion: Practical Protection of Metadata in Telephony Networks.
Konferenzveröffentlichung, Bibliographie
Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza (2017)
SeED: Secure Non-Interactive Attestation for Embedded Devices.
Boston, USA
Konferenzveröffentlichung, Bibliographie
Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Frassetto, Tommaso ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu (2017)
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
Atlanta, GA, USA
doi: 10.1109/ICDCS.2017.284
Konferenzveröffentlichung, Bibliographie
Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu (2017)
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT.
doi: 10.1109/ICDCS.2017.283
Konferenzveröffentlichung, Bibliographie
Dessouky, Ghada ; Zeitouni, Shaza ; Nyman, Thomas ; Paverd, Andrew ; Davi, Lucas ; Koeberl, Patrick ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017)
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
54th Design Automation Conference (DAC'17).
Konferenzveröffentlichung, Bibliographie
Portela, Bernardo ; Barbosa, Manuel ; Scerri, Guillaume ; Warinschi, Bogdan ; Bahmani, Raad ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2017)
Secure Multiparty Computation from SGX.
Konferenzveröffentlichung, Bibliographie
Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed (2017)
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
Konferenzveröffentlichung, Bibliographie
Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. (2017)
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
Konferenzveröffentlichung, Bibliographie
Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017)
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
Konferenzveröffentlichung, Bibliographie
Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael (2017)
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17). San Diego, California (26.02.2017-01.03.2017)
doi: 10.14722/ndss.2017.23097
Konferenzveröffentlichung, Bibliographie
Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2017)
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (1)
doi: 10.1515/popets-2017-0005
Artikel, Bibliographie
Sullivan, Dean ; Arias, Orlando ; Gens, David ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier (2017)
Execution Integrity with In-Place Encryption.
In: CoRR, abs/1703.02698
Artikel, Bibliographie
Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017)
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.
In: Cryptography and Security, abs/1705.10295
Artikel, Bibliographie
2016
Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016)
CATT: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
In: Cryptography and Security
Artikel, Bibliographie
Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016)
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
Konferenzveröffentlichung, Bibliographie
Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016)
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Ibrahim, Ahmad ; Conti, Mauro ; Neven, Gregory (2016)
SANA: Secure and Scalable Aggregate Network Attestation.
Konferenzveröffentlichung, Bibliographie
Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza (2016)
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
Konferenzveröffentlichung, Bibliographie
Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza (2016)
DARPA: Device Attestation Resilient to Physical Attacks.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Dessouky, Ghada (2016)
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
Konferenzveröffentlichung, Bibliographie
Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2016)
POSTER: Toward a Secure and Scalable Attestation.
Konferenzveröffentlichung, Bibliographie
Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza (2016)
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
Konferenzveröffentlichung, Bibliographie
Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2016)
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
53. Annual Design Automation Conference (DAC'16). Austin Texas (05.06.2016-09.06.2016)
doi: 10.1145/2897937.2898027
Konferenzveröffentlichung, Bibliographie
Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016)
Regulating ARM TrustZone Devices in Restricted Spaces.
Konferenzveröffentlichung, Bibliographie
Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016)
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
Konferenzveröffentlichung, Bibliographie
Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael (2016)
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
Konferenzveröffentlichung, Bibliographie
Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza (2016)
Things, Trouble, Trust: On Building Trust in IoT Systems.
Konferenzveröffentlichung, Bibliographie
McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh (2016)
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, 104 (5)
doi: 10.1109/JPROC.2015.2512235
Artikel, Bibliographie
Zeitouni, Shaza ; Oren, Yossef ; Wachsmann, Christian ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2016)
Remanence Decay Side-Channel: The PUF Case.
In: IEEE Transactions on Information Forensics and Security, 99
doi: 10.1109/TIFS.2015.2512534
Artikel, Bibliographie
Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016)
Leakage-Resilient Layout Randomization for Mobile Devices.
Konferenzveröffentlichung, Bibliographie
Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016)
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
Report, Bibliographie
Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016)
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
Konferenzveröffentlichung, Bibliographie
Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016)
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
Konferenzveröffentlichung, Bibliographie
Miettinen, Markus ; Huang, Jialin ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2016)
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
Darmstadt, Germany
Konferenzveröffentlichung, Bibliographie
Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016)
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Armknecht, Frederik (2016)
Towards a Unified Security Model for Physically Unclonable Functions.
Konferenzveröffentlichung, Bibliographie
2015
Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael (2015)
Automated Software Diversity.
doi: 10.2200/S00686ED1V01Y201512SPT014
Buch, Bibliographie
Davi, Lucas ; Sadeghi, Ahmad-Reza (2015)
Building Secure Defenses Against Code-Reuse Attacks.
doi: 10.1007/978-3-319-25546-0
Buch, Bibliographie
Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2015)
Automated Synthesis of Optimized Circuits for Secure Computation.
22. ACM Conference on Computer and Communications Security (CCS'15). Denver Colorado USA (12.10.2015-16.10.2015)
doi: 10.1145/2810103.2813678
Konferenzveröffentlichung, Bibliographie
Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael (2015)
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
Konferenzveröffentlichung, Bibliographie
Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza (2015)
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
Konferenzveröffentlichung, Bibliographie
Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015)
SEDA: Scalable Embedded Device Attestation.
Konferenzveröffentlichung, Bibliographie
Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015)
Return to Where? You Can't Exploit What You Can't Find.
Konferenzveröffentlichung, Bibliographie
Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015)
SEDA - Technical Report.
Report, Bibliographie
Songhori, Ebrahim ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2015)
Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis.
Konferenzveröffentlichung, Bibliographie
Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015)
HAFIX: Hardware-Assisted Flow Integrity Extension.
Konferenzveröffentlichung, Bibliographie
Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015)
HAFIX: Hardware-Assisted Flow Integrity Extension (Best Paper Award).
DAC '15: The 52nd Annual Design Automation Conference 2015. San Francisco, California (07.06.2015-11.06.2015)
Konferenzveröffentlichung, Bibliographie
Nagy, Marcin ; Bui, Thanh Phong ; Cristofaro, Emiliano De ; Asokan, N. ; Ott, Jörg ; Sadeghi, Ahmad-Reza (2015)
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Waidner, Michael (2015)
Security and Privacy Challenges in Industrial Internet of Things.
Konferenzveröffentlichung, Bibliographie
Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2015)
TyTAN: Tiny Trust Anchor for Tiny Devices.
Konferenzveröffentlichung, Bibliographie
Schuster, Felix ; Tendyck, Thomas ; Liebchen, Christopher ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten (2015)
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
Konferenzveröffentlichung, Bibliographie
Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015)
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
Konferenzveröffentlichung, Bibliographie
Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2015)
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
36. IEEE Symposium on Security and Privacy (IEEE S&P'15). San Jose, California (18.05.2015-20.05.2015)
doi: 10.1109/SP.2015.32
Konferenzveröffentlichung, Bibliographie
Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza (2015)
XiOS: Extended Application Sandboxing on iOS.
Konferenzveröffentlichung, Bibliographie
Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian (2015)
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
Konferenzveröffentlichung, Bibliographie
Dmitrienko, Alexandra ; Heuser, Stephan ; Nguyen, Thien Duc ; Ramos, Marcos da Silva ; Rein, Andre ; Sadeghi, Ahmad-Reza (2015)
Market-driven Code Provisioning to Mobile Secure Hardware.
Konferenzveröffentlichung, Bibliographie
Busold, Christoph ; Heuser, Stephan ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah (2015)
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
Konferenzveröffentlichung, Bibliographie
Miettinen, Markus ; Asokan, N. ; Koushanfar, Farinaz ; Nguyen, Thien Duc ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Sobhani, Majid ; Yellapantula, Sudha (2015)
I know where you are: Proofs of Presence resilient to malicious provers.
Konferenzveröffentlichung, Bibliographie
Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep (2015)
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices.
In: CoRR, abs/1511.02119
Artikel, Bibliographie
Sadeghi, Ahmad-Reza ; Davi, Lucas ; Larsen, Per (2015)
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? - Keynote -.
Konferenzveröffentlichung, Bibliographie
2014
Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2014)
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions.
doi: 10.2200/S00622ED1V01Y201412SPT012
Buch, Bibliographie
Miettinen, Markus ; Asokan, N. ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Sobhani, Majid (2014)
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
doi: 10.1145/2660267.2660334
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Brasser, Ferdinand (2014)
Swap and Play: Live Updating Hypervisors and Its Application to Xen.
doi: 10.1145/2664168.2664173
Konferenzveröffentlichung, Bibliographie
Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
Hrsg.: Kutylowski, Miroslaw ; Vaidya, Jaideep (2014)
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014
doi: 10.1007/978-3-319-11203-9_5
Buchkapitel, Bibliographie
Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014)
ASM: A Programmable Interface for Extending Android Security.
Konferenzveröffentlichung, Bibliographie
Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza (2014)
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
Konferenzveröffentlichung, Bibliographie
Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2014)
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8)
Artikel, Bibliographie
Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014)
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Konferenzveröffentlichung, Bibliographie
Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014)
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4)
Artikel, Bibliographie
Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. (2014)
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
Kyoto, Japan
doi: 10.1145/2590296.2590337
Konferenzveröffentlichung, Bibliographie
Davi, Lucas ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2014)
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
Konferenzveröffentlichung, Bibliographie
Kong, Joonho ; Koushanfar, Farinaz ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2014)
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
Konferenzveröffentlichung, Bibliographie
Mustafa, Hossen ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Xu, Wenyuan (2014)
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
Konferenzveröffentlichung, Bibliographie
Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014)
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Report, Bibliographie
Koeberl, Patrick ; Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Varadharajan, Vijay (2014)
TrustLite: A Security Architecture for Tiny Embedded Devices.
Amsterdam, Netherlands
doi: 10.1145/2592798.2592824
Konferenzveröffentlichung, Bibliographie
Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014)
ASM: A Programmable Interface for Extending Android Security.
Report, Bibliographie
Senftleben, Marius ; Bucicoiu, Mihai ; Tews, Erik ; Armknecht, Frederik ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza (2014)
MoP-2-MoP - Mobile private microblogging.
Konferenzveröffentlichung, Bibliographie
Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014)
On the (In)Security of Mobile Two-Factor Authentication.
Konferenzveröffentlichung, Bibliographie
Dmitrienko, Alexandra ; Noack, David ; Sadeghi, Ahmad-Reza ; Yung, Moti (2014)
POSTER: On Offline Payments with Bitcoin.
Konferenzveröffentlichung, Bibliographie
Schulz, Steffen ; Varadharajan, Vijay ; Sadeghi, Ahmad-Reza (2014)
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: IEEE Transactions on Information Forensis and Security, 9 (2)
Artikel, Bibliographie
Catuogno, Luigi ; Löhr, Hans ; Winandy, Marcel ; Sadeghi, Ahmad-Reza (2014)
A trusted versioning file system for passive mobile storage devices.
Konferenzveröffentlichung, Bibliographie
2013
Nagy, Marcin ; Cristofaro, Emiliano De ; Dmitrienko, Alexandra ; Asokan, N. ; Sadeghi, Ahmad-Reza (2013)
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
New Orleans, Loouisiana, USA
Konferenzveröffentlichung, Bibliographie
Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza (2013)
Mobile Platform Security.
doi: 10.2200/S00555ED1V01Y201312SPT009
Buch, Bibliographie
Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2013)
A Security Framework for Analysis and Design of Software Attestation.
Konferenzveröffentlichung, Bibliographie
Stancill, Blaine ; Snow, Kevin ; Otterness, Nathan ; Monrose, Fabian ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2013)
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
Konferenzveröffentlichung, Bibliographie
Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. (2013)
ConXsense – Context Sensing for Adaptive Usable Access Control.
Report, Bibliographie
Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2013)
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
Konferenzveröffentlichung, Bibliographie
Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza (2013)
Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same.
Konferenzveröffentlichung, Bibliographie
Oren, Yossef ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2013)
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
Konferenzveröffentlichung, Bibliographie
Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013)
Client-controlled Cryptography-as-a-Service in the Cloud.
Konferenzveröffentlichung, Bibliographie
Asokan, N. ; Dmitrienko, Alexandra ; Nagy, Marcin ; Reshetova, Elena ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stelle, Stanislaus (2013)
CrowdShare: Secure Mobile Resource Sharing.
11. International Conference on Applied Cryptography and Network Security (ACNS'13). Banff AB Canada (25.06.2013-28.06.2013)
doi: 10.1007/978-3-642-38980-1_27
Konferenzveröffentlichung, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013)
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
Konferenzveröffentlichung, Bibliographie
Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza (2013)
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (Best Student Paper Award).
Konferenzveröffentlichung, Bibliographie
Buchmann, Johannes ; Demirel, Denise ; Graaf, Jeroen van de
Hrsg.: Sadeghi, Ahmad-Reza (2013)
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
Konferenzveröffentlichung, Bibliographie
Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2013)
A Systematic Approach to Practically Efficient General Two-Party Secure Function Evaluation Protocols and their Modular Design.
In: Journal of Computer Security (JCS), 21 (2)
doi: 10.3233/JCS-130464
Artikel, Bibliographie
Kocabas, Unal ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2013)
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
Konferenzveröffentlichung, Bibliographie
Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2013)
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
San Antonio, Texas, USA
doi: 10.1145/2435349.2435382
Konferenzveröffentlichung, Bibliographie
Werthmann, Tim ; Hund, Ralf ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten (2013)
PSiOS: Bring Your Own Privacy & Security to iOS Devices (Distinguished Paper Award).
Konferenzveröffentlichung, Bibliographie
2012
Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2012)
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
Konferenzveröffentlichung, Bibliographie
Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012)
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
Report, Bibliographie
Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012)
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
Report, Bibliographie
Katzenbeisser, Stefan ; Kocabaş, Ünal ; Rožic, Vladimir ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012)
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay (2012)
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version).
Report, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012)
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Kocabaş, Ünal ; Katzenbeisser, Stefan (2012)
Converse PUF-Based Authentication.
Konferenzveröffentlichung, Bibliographie
Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Tamrakar, Sandeep ; Wachsmann, Christian (2012)
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
Konferenzveröffentlichung, Bibliographie
Seudié, Hervé ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza (2012)
EDA for Secure and Dependable Cybercars: Challenges and Opportunities.
Konferenzveröffentlichung, Bibliographie
Wachsmann, Christian ; Sadeghi, Ahmad-Reza ; Schulz, Steffen (2012)
Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions.
In: Secure Smart Embedded Devices, Platforms and Applications
Buchkapitel, Bibliographie
Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Zhdanova, Maria ; Xu, Wenyuan ; Mustafa, Hossen ; Varadharajan, Vijay (2012)
Tetherway: A Framework for Tethering Camouflage.
Tuscon, Arizona
Konferenzveröffentlichung, Bibliographie
Jiang, Xuxian ; Grace, Michael ; Sadeghi, Ahmad-Reza ; Zhou, Wu (2012)
Unsafe Exposure Analysis of Mobile In-App Advertisements.
Konferenzveröffentlichung, Bibliographie
Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid (2012)
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
Konferenzveröffentlichung, Bibliographie
Ahmad, Junaid Jameel ; Li, Shujun ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2012)
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
16. International Conference on Financial Cryptography and Data Security (FC'12). Kralendijk, Bonaire (02.03.2012-02.03.2012)
doi: 10.1007/978-3-642-32946-3_22
Konferenzveröffentlichung, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012)
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
Konferenzveröffentlichung, Bibliographie
Herrewege, Anthony van ; Katzenbeisser, Stefan ; Maes, Roel ; Peeters, Roel ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012)
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
Konferenzveröffentlichung, Bibliographie
Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2012)
Towards Taming Privilege-Escalation Attacks on Android.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay
Hrsg.: Foresti, Sara ; Yung, Moti ; Martinelli, Fabio (2012)
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: European Symposium on Research in Computer Science (ESORICS)
Buchkapitel, Bibliographie
2011
Bugiel, Sven ; Pöppelmann, Thomas ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
AmazonIA: When Elasticity Snaps Back.
18. ACM Conference on Computer and Communications Security (CCS'11). Chicago Illinois USA (17.10.2011- 21.10.2011)
doi: 10.1145/2046707.2046753
Konferenzveröffentlichung, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011)
POSTER: Control-Flow Integrity for Smartphones.
Konferenzveröffentlichung, Bibliographie
Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2011)
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
Konferenzveröffentlichung, Bibliographie
Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2011)
Practical and Lightweight Domain Isolation on Android.
Konferenzveröffentlichung, Bibliographie
Bugiel, Sven ; Davi, Lucas ; Schulz, Steffen
Hrsg.: Sadeghi, Ahmad-Reza ; Zhang, Xinwen (2011)
Scalable Trust Establishment with Software Reputation.
Chicago, Illinois, USA
Konferenzveröffentlichung, Bibliographie
Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
Twin Clouds: Secure Cloud Computing with Low Latency.
12. Communications and Multimedia Security Conference (CMS'11). Ghent, Belgium (19.10.2011-21.10.2011)
doi: 10.1007/978-3-642-24712-5_3
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2011)
Lightweight Remote Attestation Using Physical Functions.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2011)
Lightweight Remote Attestation using Physical Functions (Extended Version).
Report, Bibliographie
Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2011)
Location Privacy in RFID Systemen.
In: Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (2)
Artikel, Bibliographie
Barni, Mauro ; Failla, Pierluigi ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
Privacy-Preserving ECG Classification with Branching Programs and Neural Networks.
In: IEEE Transactions on Information Forensics and Security (TIFS), 6 (2)
doi: 10.1109/TIFS.2011.2108650
Artikel, Bibliographie
Filyanov, Atanas ; McCune, Jonathan ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
Hong Kong
Konferenzveröffentlichung, Bibliographie
Armknecht, Frederik ; Maes, Roel ; Sadeghi, Ahmad-Reza ; Standaert, François-Xavier ; Wachsmann, Christian (2011)
A Formal Foundation for the Security Features of Physical Functions.
Konferenzveröffentlichung, Bibliographie
Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza (2011)
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.
Report, Bibliographie
Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
Konferenzveröffentlichung, Bibliographie
Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
Twin Clouds: An Architecture for Secure Cloud Computing.
Workshop on Cryptography and Security in Clouds (WCSC'11). Zurich, Switzerland (15.03.2011 - 16.03.2011)
Konferenzveröffentlichung, Bibliographie
Fischlin, Marc ; Pinkas, Benny ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Visconti, Ivan (2011)
Secure Set Intersection with Untrusted Hardware Tokens.
11th Cryptographers' Track at the RSA Conference (CT-RSA'11). San Francisco, CA, USA (14.02.2011-18.02.2011)
doi: 10.1007/978-3-642-19074-2_1
Konferenzveröffentlichung, Bibliographie
Li, Shujun ; Sadeghi, Ahmad-Reza ; Heisrath, Soeren ; Schmitz, Roland ; Ahmad, Junaid Jameel (2011)
hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers.
St. Lucia
Konferenzveröffentlichung, Bibliographie
Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
A Security Architecture for Accessing Health Records on Mobile Phones.
Rome, Italy
Konferenzveröffentlichung, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011)
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED)
Buchkapitel, Bibliographie
Katzenbeisser, Stefan ; Kocabaş, Ünal ; Leest, Vincent van der ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Schröder, Heike ; Wachsmann, Christian (2011)
Recyclable PUFs: Logically Reconfigurable PUFs.
Konferenzveröffentlichung, Bibliographie
Katzenbeisser, Stefan ; Kocabaş, Ünal ; Leest, Vincent van der ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Wachsmann, Christian (2011)
Recyclable PUFs: logically reconfigurable PUFs.
In: Journal of Cryptographic Engineering, 1 (3)
Artikel, Bibliographie
Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
Securing the Access to Electronic Health Records on Mobile Phones.
Konferenzveröffentlichung, Bibliographie
Dmitrienko, Alexandra ; Gessner, Dennis ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Stüble, Christian ; Ullmann, Markus (2011)
Trusted embedded System Operating System (TeSOS) - Study and Design.
Anderes, Bibliographie
2010
Sadeghi, Ahmad-Reza ; Li, Shujun ; Shah, Syed Amier Haider ; Khan, Muhammad Asad Usman ; Khayam, Syed Ali ; Schmitz, Roland (2010)
Breaking e-Banking CAPTCHAs.
Konferenzveröffentlichung, Bibliographie
Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Scafuro, Alessandra ; Visconti, Ivan ; Wachsmann, Christian (2010)
Impossibility Results for RFID Privacy Notions.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Preneel, Bart ; Pfitzmann, Andreas ; Moran, Tal ; Maier-Rabler, Ursula ; Kutylowski, Miroslaw ; Klonowski, Marek ; Guerses, Seda ; Danezis, George ; Borisov, Nikita ; Baer, Walter (2010)
Machiavelli Confronts 21st Century Digital Technology: Democracy in a Network Society.
Konferenzveröffentlichung, Bibliographie
Bugiel, Sven ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
TruWalletM: Secure Web Authentication on Mobile Platforms.
Konferenzveröffentlichung, Bibliographie
Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
Securing the E-Health Cloud.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Naccache, David (2010)
Towards Hardware-Intrinsic Security.
Konferenzveröffentlichung, Bibliographie
Chen, Liqun ; Dietrich, Kurt ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Winter, Johannes (2010)
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
Konferenzveröffentlichung, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
Privilege Escalation Attacks on Android.
Boca Raton, Florida, USA
Konferenzveröffentlichung, Bibliographie
Checkoway, Stephen ; Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Shacham, Hovav ; Winandy, Marcel (2010)
Return-Oriented Programming without Returns.
Chicago, Illinois, USA
doi: 10.1145/1866307.1866370
Konferenzveröffentlichung, Bibliographie
Henecka, Wilko ; Kögl, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo (2010)
TASTY: Tool for Automating Secure Two-partY computations.
CCS'10. Chicago Illinois USA (04.10.2010-08.10.2010)
doi: 10.1145/1866307.1866358
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Mukherjee, Biswanath ; Ghosal, Dipak ; Liu, Yali (2010)
Video Streaming Forensic - Content Identification with Traffic Snooping.
Konferenzveröffentlichung, Bibliographie
Almeida, José Bacelar ; Bangerter, Endre ; Barbosa, Manuel ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
15th European Symposium on Research in Computer Security (ESORICS'10). Athens, Greece (20.09.2010 - 22.09.2010)
doi: 10.1007/978-3-642-15497-3_10
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten.
Workshop Innovative und sichere Informationstechnologie für das Gesundheitswesen von morgen (perspeGKtive'10). Mannheim (08.09.2010-08.09.2010)
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010)
Enhancing RFID Security and Privacy by Physically Unclonable Functions.
In: Towards Hardware-Intrinsic Security: Foundations and Practice
Buchkapitel, Bibliographie
Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
12. International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10). Santa Barbara, USA (17.08.2010-20.08.2010)
doi: 10.1007/978-3-642-15031-9_26
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2010)
Trusted Computing.
Konferenzveröffentlichung, Bibliographie
Bangerter, Endre ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
YACZK: Yet Another Compiler for Zero-Knowledge.
19th USENIX Security Symposium. Washington D.C., USA (14.08.2019-16.08.2019)
Konferenzveröffentlichung, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
Return-Oriented Programming without Returns on ARM.
Report, Bibliographie
Armknecht, Frederik ; Chen, Liqun ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2010)
Anonymous Authentication for RFID Systems.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Löhr, Hans ; Cesena, Emanuele ; Ramunno, Gianluca ; Vernizzi, Davide (2010)
Anonymous Authentication with TLS and DAA.
Konferenzveröffentlichung, Bibliographie
Alsouri, Sami ; Dagdelen, Özgür ; Katzenbeisser, Stefan
Hrsg.: Acquisti, A. ; Sadeghi, Ahmad-Reza (2010)
Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation.
Konferenzveröffentlichung, Bibliographie
Kostiainen, Kari ; Dmitrienko, Alexandra ; Ekberg, Jan-Erik ; Sadeghi, Ahmad-Reza ; Asokan, N. (2010)
Key Attestation from Trusted Execution Environments.
Berlin
Konferenzveröffentlichung, Bibliographie
Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010)
On RFID Privacy with Mutual Authentication and Tag Corruption.
Konferenzveröffentlichung, Bibliographie
Armknecht, Frederik ; Ghosal, Dipak ; Katzenbeisser, Stefan ; Liu, Yali ; Sadeghi, Ahmad-Reza ; Schulz, Steffen (2010)
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Winandy, Marcel (2010)
Token-Based Cloud Computing - Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
3. International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud. Berlin (21.06.2010-23.06.2010)
doi: 10.1007/978-3-642-13869-0_30
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Li, Shujun ; Khayam, Syed Ali ; Schmitz, Roland (2010)
Breaking a Virtual Password System Based on Randomized Linear Generation Functions.
Konferenzveröffentlichung, Bibliographie
Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2010)
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5
Artikel, Bibliographie
Manulis, Mark ; Sadeghi, Ahmad-Reza (2010)
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.
In: Int. J. of Wireless and Mobile Computing (IJWMC), 4 (1)
Artikel, Bibliographie
Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010)
PUF-Enhanced RFID Security and Privacy.
Konferenzveröffentlichung, Bibliographie
Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
Report, Bibliographie
Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2010)
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 34 (5)
Artikel, Bibliographie
Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
Patterns for Secure Boot and Secure Storage in Computer Systems.
Konferenzveröffentlichung, Bibliographie
Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Embedded SFE: Offloading Server and Network using Hardware Tokens.
14. International Conference on Financial Cryptography and Data Security (FC'10). Tenerife, Canary Islands (25.01.2010-28.10.2010)
doi: 10.1007/978-3-642-14577-3_17
Konferenzveröffentlichung, Bibliographie
Schulz, Steffen ; Sadeghi, Ahmad-Reza (2010)
Extending IPsec for Efficient Remote Attestation.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian ; Cabuk, Serdar ; Dalton, Chris ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramasamy, Hari Govind ; Ramunno, Gianluca ; Schunter, Matthias (2010)
Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers.
In: Journal of Computer Security, 18 (1)
Artikel, Bibliographie
Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens.
In: Towards Hardware Intrinsic Security: Foundation and Practice
doi: 10.1007/978-3-642-14452-3_17
Buchkapitel, Bibliographie
2009
Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009)
Anonymizer-Enabled Security and Privacy for RFID.
Konferenzveröffentlichung, Bibliographie
Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Paus, Annika ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Efficient Privacy-Preserving Classification of ECG Signals.
2009 First IEEE International Workshop on Information Forensics and Security (WIFS). London (06.12.2009-09.12.2009)
doi: 10.1109/WIFS.2009.5386475
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo (2009)
Efficient Privacy-Preserving Face Recognition.
12. International Conference on Information Security and Cryptology (ICISC'09). Seoul, Korea (02.12.2009-04.12.2009)
doi: 10.1007/978-3-642-14423-3_16
Konferenzveröffentlichung, Bibliographie
Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan (2009)
Hide and Seek in Time - Robust Covert Timing Channels.
Konferenzveröffentlichung, Bibliographie
Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
8. International Conference on Cryptology And Network Security (CANS'09). Kanazawa, Japan (12.12.2009-14.12.2009)
doi: 10.1007/978-3-642-10433-6_1
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Maes, Roel ; Sunar, Berk ; Tuyls, Pim (2009)
Memory Leakage-Resilient Encryption based on Physically Unclonable Functions.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Li, Shujun ; Asghar, Hassan Jameel ; Pieprzyk, Josef ; Schmitz, Roland ; Wang, Huaxiong (2009)
On the Security of PAS (Predicate-based Authentication Service).
Konferenzveröffentlichung, Bibliographie
Catuogno, Luigi ; Dmitrienko, Alexandra ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramunno, Gianluca ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Schunter, Matthias ; Winandy, Marcel ; Zhan, Jing (2009)
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics.
3rd Section Days of Ruhr-University Bochum Research School. Bochum, Germany (06.11.2009-06.11.2009)
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian ; Zhan, Jing ; Korthaus, René (2009)
A Practical Property-based Bootstrap Architecture.
Konferenzveröffentlichung, Bibliographie
Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
Transparent Mobile Storage Protection in Trusted Virtual Domains.
Konferenzveröffentlichung, Bibliographie
Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
Transparent Mobile Storage Protection in Trusted Virtual Domains.
Konferenzveröffentlichung, Bibliographie
Gajek, Sebastian ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Vishik, Claire ; Verbauwhede, Ingrid (2009)
Future of Assurance: Ensuring that a System is Trustworthy.
Konferenzveröffentlichung, Bibliographie
Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09)
Buchkapitel, Bibliographie
Bangerter, Endre ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Tsay, Joe-Kai (2009)
On the Design and Implementation of Efficient Zero-Knowledge Proofs of Knowledge.
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09)
Buchkapitel, Bibliographie
Bangerter, Endre ; Briner, Thomas ; Henecka, Wilko ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Automatic Generation of Sigma-Protocols.
In: 6. European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09)
doi: 10.1007/978-3-642-16441-5_5
Buchkapitel, Bibliographie
Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification.
In: 1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09)
Buchkapitel, Bibliographie
Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
Chicago, Illinois, USA
doi: 10.1145/1655108.1655117
Konferenzveröffentlichung, Bibliographie
Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan (2009)
Hide and Seek in Time - Robust Covert Timing Channels.
Konferenzveröffentlichung, Bibliographie
Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
How to Combine Homomorphic Encryption and Garbled Circuits - Improved Circuits and Computing the Minimum Distance Efficiently.
In: 1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09)
Buchkapitel, Bibliographie
Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Secure Evaluation of Private Linear Branching Programs with Medical Applications.
In: 14. European Symposium on Research in Computer Security (ESORICS'09)
doi: 10.1007/978-3-642-04444-1_26
Buchkapitel, Bibliographie
Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009)
Location Privacy in RFID Applications.
Konferenzveröffentlichung, Bibliographie
Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
A Pattern for Secure Graphical User Interface Systems.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009)
Enhancing RFID Security and Privacy by Physically Unclonable Functions (Extended Abstract).
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Kursawe, Klaus ; Schellekens, Dries ; Skoric, Boris ; Tuyls, Pim (2009)
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009)
Efficient RFID Security and Privacy with Anonymizers.
Konferenzveröffentlichung, Bibliographie
Paus, Annika ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Practical Secure Evaluation of Semi-Private Functions.
7. International Conference on Applied Cryptography and Network Security (ACNS'09). Paris, France (02.06.2009 - 05.06.2009)
doi: 10.1007/978-3-642-01957-9_6
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
Einsatz von Sicherheitskernen und Trusted Computing.
Konferenzveröffentlichung, Bibliographie
Bangerter, Endre ; Camenisch, Jan ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Automatic Generation of Sound Zero-Knowledge Protocols.
28th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Cologne, Germany (26.04.2009-30.04.2009)
Konferenzveröffentlichung, Bibliographie
Bangerter, Endre ; Barzan, Stefania ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Tsay, Joe-Kai (2009)
Bringing Zero-Knowledge Proofs of Knowledge to Practice.
17. International Workshop on Security Protocols (SPW'09). Cambridge, UK (01.04.2009-03.04.2009)
doi: 10.1007/978-3-642-36213-2_9
Konferenzveröffentlichung, Bibliographie
Löhr, Hans ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Weber, Marion ; Winandy, Marcel (2009)
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Tuyls, Pim ; Maes, Roel ; Sunar, Berk (2009)
Physically Unclonable Pseudorandom Functions.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Schulz, Steffen (2009)
Secure VPNs for Trusted Computing Environments.
Oxford, UK
Konferenzveröffentlichung, Bibliographie
Löhr, Hans ; Sadeghi, Ahmad-Reza ; Vishik, Claire ; Winandy, Marcel (2009)
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Bangerter, Endre ; Barbosa, Manuel ; Bernstein, Daniel ; Damgard, Ivan ; Page, Dan ; Pagter, Jakob ; Sovio, Sampo (2009)
Using Compilers to Enhance Cryptographic Product Development.
Konferenzveröffentlichung, Bibliographie
2008
Sadeghi, Ahmad-Reza ; Schneider, Thomas (2008)
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.
In: 11. International Conference on Information Security and Cryptology (ICISC'08)
doi: 10.1007/978-3-642-00730-9_21
Buchkapitel, Bibliographie
Rupp, Andy ; Leander, Gregor ; Bangerter, Endre ; Dent, Alexander ; Sadeghi, Ahmad-Reza (2008)
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
Konferenzveröffentlichung, Bibliographie
Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark ; Pereira, Olivier (2008)
Universally Composable Security Analysis of TLS.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Gasmi, Yacine ; Ramunno, Gianluca ; Vernizzi, Davide ; Stewin, Patrick ; Unger, Martin (2008)
An Efficient Implementation of Trusted Channels Based on OpenSSL.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Husseiki, Rani ; Gasmi, Yacine ; Stewin, Patrick ; Unger, Martin (2008)
Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008)
Improved Security Notions and Protocols for Non-Transferable Identification.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2008)
User Privacy in Transport Systems Based on RFID E-Tickets.
Malaga, Spain
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Bangerter, Endre ; Djackov, Maksim (2008)
A Demonstrative Ad-hoc Attestation System.
Taipei, Taiwan
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark (2008)
Property-Based Attestation without a Trusted Third Party.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2008)
Property-Based TPM Virtualization.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Shokrollahi, Jamshid ; Bösch, Christoph ; Guajardo, Jorge ; Tuyls, Pim (2008)
Efficient Helper Data Key Extractor on FPGAs.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Gröbert, Felix ; Birk, Dominik (2008)
A Forensic Framework for Tracing Phishers.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008)
Resettable and Non-Transferable Chip Authentication for E-Passports.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Löhr, Hans ; Manulis, Mark ; Escalante, Alberto (2008)
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
Sydney, Australia
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, André ; Wolf, Marko ; Asokan, N. (2008)
Securing Peer-to-Peer Distributions for Mobile Devices.
4th Information Security Practice and Experience Conference (ISPEC 2008).
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian ; Osterhues, André ; Wolf, Marko ; Asokan, Nadarajah (2008)
Securing Peer-to-Peer Distributions for Mobile Devices.
Sydney, Australia
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008)
Identification Protocols Revisited - Episode I: E-Passports.
e-crypt workshop on Secure Component and System Identification (SECSI).
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008)
Identification Protocols Revisited - Episode I: E-Passports.
Konferenzveröffentlichung, Bibliographie
Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2008)
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
ACM Symposium on Information, Computer and Communications Security (ASIACCS'08).
Konferenzveröffentlichung, Bibliographie
Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2008)
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
Konferenzveröffentlichung, Bibliographie
Chen, Liqun ; Escalante, Alberto ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza (2008)
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
Konferenzveröffentlichung, Bibliographie
Chen, Liqun ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza (2008)
Property-Based Attestation without a Trusted Third Party.
Konferenzveröffentlichung, Bibliographie
Gajek, Sebastian ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2008)
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
Konferenzveröffentlichung, Bibliographie
Armknecht, Frederik ; Escalante, Alberto ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza (2008)
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza (2008)
Trusted Computing—State of the Art and Challenges.
Konferenzveröffentlichung, Bibliographie
Gajek, Sebastian ; Manulis, Mark ; Pereira, Olivier ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2008)
Universally Composable Security Analysis of TLS.
Konferenzveröffentlichung, Bibliographie
2007
Asokan, N. ; Gasmi, Yacine ; Sadeghi, Ahmad-Reza ; Stewin, Patrick ; Unger, Martin (2007)
Beyond Secure Channels.
ACM Workshop on Scalable Trusted Computing (ACMSTC 2007).
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Gasmi, Yacine ; Stewin, Patrick ; Unger, Martin ; Asokan, Nadarajah (2007)
Beyond Secure Channels.
Alexandria, Virginia, USA
Konferenzveröffentlichung, Bibliographie
Eisenbarth, Thomas ; Güneysu, Tim ; Paar, Christof ; Sadeghi, Ahmad-Reza ; Schellekens, Dries ; Wolf, Marko (2007)
Reconfigurable Trusted Computing in Hardware.
ACM Workshop on Scalable Trusted Computing (ACMSTC 2007).
Konferenzveröffentlichung, Bibliographie
Paar, Christof ; Sadeghi, Ahmad-Reza ; Güneysu, Tim ; Eisenbarth, Thomas ; Schellekens, Dries ; Wolf, Marko (2007)
Reconfigurable Trusted Computing in Hardware.
Alexandria, Virginia, USA
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Wolf, Christopher ; Stüble, Christian ; Asokan, N. ; Ekberg, Jan-Erik (2007)
Enabling Fairer Digital Rights Management with Trusted Computing.
Valparaíso, Chile
Konferenzveröffentlichung, Bibliographie
Celik, Mehmet ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza ; Skoric, Boris (2007)
Combining Tardos Fingerprinting Codes and Fingercasting.
9th International Workshop on Information Hiding (IH 2007).
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Katzenbeisser, Stefan ; Skoric, Boris ; Celik, Mehmet (2007)
Combining Tardos Fingerprinting Codes and Fingercasting.
Saint Malo, France
Konferenzveröffentlichung, Bibliographie
Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2007)
Browser Models for Usable Authentication Protocols.
Oakland, USA
Konferenzveröffentlichung, Bibliographie
Gajek, Sebastian ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2007)
Browser-based Authentication Protocols for Naive Users.
Western European Workshop on Research in Cryptology (WEWoRC 2007).
Konferenzveröffentlichung, Bibliographie
Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2007)
Browser-based Authentication Protocols for Naive Users.
Bochum, Germany
Konferenzveröffentlichung, Bibliographie
Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2007)
Compartmented Security for Browsers.
Report, Bibliographie
Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2007)
Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing.
Vienna, Austria
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian ; Löhr, Hans ; Ramasamy, Hari Govind ; Schulz, Stefan ; Schunter, Matthias (2007)
Enhancing Grid Security Using Trusted Virtualization.
Hong Kong, China
Konferenzveröffentlichung, Bibliographie
Adelsbach, Andre ; Huber, Ulrich ; Sadeghi, Ahmad-Reza (2007)
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
Transactions on Data Hiding and Multimedia Security II.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2007)
Fingercasting—Joint Fingerprinting and Decryption of Broadcast Messages.
Konferenzveröffentlichung, Bibliographie
Birk, Dominik ; Gajek, Sebastian ; Gröbert, Felix ; Sadeghi, Ahmad-Reza (2007)
Phishing Phishers - Observing and Tracing Organized Cybercrime.
Second International Conference on Internet Monitoring and Protection (ICIMP 2007).
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Gröbert, Felix ; Birk, Dominik (2007)
Phishing Phishers - Observing and Tracing Organized Cybercrime.
Silicon Valley, California, USA
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark ; Escalante, Alberto (2007)
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
Scarborough, Trinidad and Tobago
Konferenzveröffentlichung, Bibliographie
Manulis, Mark
Hrsg.: Paar, Christof ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2007)
Provably Secure Group Key Exchange.
Buch, Bibliographie
Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Winandy, Marcel (2007)
Trusted User-Aware Web Authentication.
Stanford, USA
Konferenzveröffentlichung, Bibliographie
2006
Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian ; Wachsmann, Christian ; Winandy, Marcel (2006)
TCG Inside? - A Note on TPM Specification Compliance.
ACM Workshop on Scalable Trusted Computing (ACMSTC).
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Selhorst, Marcel ; Stüble, Christian ; Winandy, Marcel (2006)
TCG Inside? - A Note on TPM Specification Compliance.
Alexandria, Virginia (USA)
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2006)
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
Melbourne, Australia
Konferenzveröffentlichung, Bibliographie
Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Manulis, Mark (2006)
Linkable Democratic Group Signatures.
Hangzhou, China
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Manulis, Mark (2006)
Property-based Taming Lying Mobile Node.
Vienna, Austria
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Manulis, Mark (2006)
Property-based Taming Lying Mobile Nodes.
Vienna, Austria
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Gajek, Sebastian (2006)
Client Authentication in Federations Using a Security Mode.
Konferenzveröffentlichung, Bibliographie
Adelsbach, Andre ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza (2006)
A Computational Model for Watermark Robustness.
Information Hiding Workshop.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzebeisser, Stefan (2006)
A Computational Model for Watermark Robustness.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Scheibel, Michael (2006)
Design and Implementation of a Secure Linux Device Encryption Architecture.
Konferenzveröffentlichung, Bibliographie
Carluccio, Dario ; Lemke-Rust, Kerstin ; Paar, Christof ; Sadeghi, Ahmad-Reza (2006)
E-Passport: The Global Traceability or How to Feel Like an UPS Package.
Workshop on RFID Security 2006.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Paar, Christof ; Carluccio, Dario ; Lemke-Rust, Kerstin (2006)
E-Passport: The Global Traceability or How to Feel Like an UPS Package.
Graz, Austria
Konferenzveröffentlichung, Bibliographie
Adelsbach, Andre ; Rohe, Markus ; Sadeghi, Ahmad-Reza (2006)
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
Transactions on Data Hiding and Multimedia Security.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2006)
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
Konferenzveröffentlichung, Bibliographie
Volkamer, Melanie ; Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Schulz, Stefan (2006)
Enabling the Application of Open Systems like PCs for Online Voting.
In: Frontiers in Electronic Elections
doi: 10.5445/IR/1000081833
Buchkapitel, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2006)
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
Report, Bibliographie
Huber, Ulrich ; Sadeghi, Ahmad-Reza (2006)
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
9th Information Security Conference (ISC 2006).
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Huber, Ulrich (2006)
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
Report, Bibliographie
Sadeghi, Ahmad-Reza ; Huber, Ulrich (2006)
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
Samos, Greece
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Manulis, Mark (2006)
Key Agreement for Heterogeneous Ad-Hoc Groups.
Konferenzveröffentlichung, Bibliographie
Manulis, Mark ; Sadeghi, Ahmad-Reza (2006)
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing).
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Manulis, Mark (2006)
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
Konferenzveröffentlichung, Bibliographie
Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2006)
Linkable Democratic Group Signatures.
Konferenzveröffentlichung, Bibliographie
Lemke, Kerstin ; Paar, Christof ; Sadeghi, Ahmad-Reza (2006)
Physical Security Bounds Against Tampering.
International Conference on Applied Cryptography and Network Security (ACNS 2006).
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Paar, Christof ; Lemke, Kerstin (2006)
Physical Security Bounds Against Tampering.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian ; Wolf, Marko ; Scheibel, Michael (2006)
Play it once again, Sam - Enforcing Stateful Licenses on Open Platforms.
Konferenzveröffentlichung, Bibliographie
Manulis, Mark ; Sadeghi, Ahmad-Reza (2006)
Property-Based Taming of Lying Mobile Nodes.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian ; Löhr, Hans ; Chen, Liquen ; Landfermann, Rainer ; Rohe, Markus (2006)
A Protocol for Property-Based Attestation.
Konferenzveröffentlichung, Bibliographie
Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Scheibel, Michael ; Stüble, Christian ; Winandy, Marcel (2006)
Security Architecture for Device Encryption and VPN.
Information Security Solution Europe (ISSE06).
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Alkassar, Ammar ; Scheibel, Michael (2006)
Security Architecture for Device Encryption and VPN.
Konferenzveröffentlichung, Bibliographie
Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2006)
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
Workshop on Information and System Security (WISSEC'06).
Konferenzveröffentlichung, Bibliographie
Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2006)
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
Antwerpen, Belgium
Konferenzveröffentlichung, Bibliographie
2005
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005)
Property-Based Broadcast Encryption for Multi-level Security Policies.
8th International Conference on Information Security and Cryptology (ICISC 2005).
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005)
Property-Based Broadcast Encryption for Multi-level Security Policies.
Seoul, Korea
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich (2005)
Embedding Trust into Cars—Secure Software Delivery and Installation.
Cologne, Germany
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005)
Towards Multilateral Secure Digital Rights Distribution Infrastructures.
Alexandria, Virginia, USA
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian (2005)
Multilaterally Secure Computing Platforms - in your office, car and at home.
1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian (2005)
Multilaterally Secure Computing Platforms – in your office, car and at home.
Tokyo, Japan
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Selhorst, Marcel ; Senft, Oska (2005)
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9
Artikel, Bibliographie
Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Selhorst, Marcel ; Senft, Oska (2005)
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9
Artikel, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005)
Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme.
Salzburg, Austria
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Ulrich ; Kursawe, Klaus ; Lucks, Stefan (2005)
Secure Data Management in Trusted Computing.
Workshop on Cryptographic Hardware and Embedded Systems (CHES).
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian ; Kühn, Ulrich ; Kursawe, Klaus ; Lucks, Stefan (2005)
Secure Data Management in Trusted Computing.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Rupp, Andy ; Bangerter, Endre (2005)
Simplified Hardness Proofs in the Generic Group Model.
Leuven, Belgium
Konferenzveröffentlichung, Bibliographie
Camenisch, Jan ; Rohe, Markus ; Sadeghi, Ahmad-Reza (2005)
Sokrates - A Compiler Framework for Zero-Knowledge Protocols.
Western European Workshop on Research in Cryptology (WEWoRC 2005).
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Rohe, Markus ; Camenisch, Jan (2005)
Sokrates - A Compiler Framework for Zero-Knowledge Protocols.
Leuven, Belgium
Konferenzveröffentlichung, Bibliographie
Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian (2005)
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI).
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Alkassar, Ammar ; Stüble, Christian ; Selhorst, Marcel (2005)
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005)
Secure Software Delivery and Installation in Embedded Systems.
Singapore
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005)
Security Engineering for Zero-knowledge Watermark Detection.
Montreux, Switzerland
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian (2005)
Towards Multilateral Security On DRM Platforms.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian (2005)
Towards multilaterally secure computing platforms - with open source and trusted computing.
In: Information Security Technical Report, 10 (2)
Artikel, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian (2005)
Towards multilaterally secure computing platforms - with open source and trusted computing.
In: Information Security Technical Report, 10 (2)
Artikel, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin
Hrsg.: Lemke, Kerstin ; Wolf, Marko ; Paar, Christof (2005)
Anti-theft Protection: Electronic Immobilizers.
Embedded Security in Cars: Securing Current and Future Automotive IT Applications..
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin
Hrsg.: Lemke, Kerstin ; Wolf, Marko ; Paar, Christof (2005)
Anti-theft Protection: Electronic Immobilizers.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Browser Model for Security Analysis of Browser-Based Protocols.
European Symposium for Research in Computer Science (ESORICS).
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Browser Model for Security Analysis of Browser-Based Protocols.
Buch, Bibliographie
Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Browser Model for Security Analysis of Browser-Based Protocols.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Browser Model for Security Analysis of Browser-Based Protocols.
Report, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005)
Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it.
In: ACM Multimedia Systems, 11 (2)
Artikel, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005)
Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it.
In: ACM Multimedia Systems
Artikel, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Bas, Patrick ; Barni, Mauro ; Rosa, Alessia De
Hrsg.: Katzenbeisser, Stefan (2005)
First Summary Report on Asymmetric Watermarking.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin (2005)
An Open Approach for Designing Secure Electronic Immobilizers.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Chen, Liqun ; Enzmann, Matthias ; Schneider, Markus ; Steiner, Michael (2005)
A Privacy-Protecting Coupon System.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich (2005)
Property-Based Broadcast Encryption for Multi-level Security Policies.
Buch, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich (2005)
Property-Based Broadcast Encryption for Multi-level Security Policies.
Report, Bibliographie
Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
Workshop on Secure Web Services (SWS).
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005)
Secure Software Delivery and Installation in Embedded Systems.
Report, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich
Hrsg.: Lemke, Kerstin (2005)
Secure Software Delivery and Installation in Embedded Systems.
In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications
Buchkapitel, Bibliographie
Sadeghi, Ahmad-Reza (2005)
Trusted Computing: Whom do we trust? Building Open Multilateral Secure Platforms Based On Trusted Computing.
DRM Conference.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza (2005)
Trusted Computing: Whom do we trust? Building Open Multilateral Secure Platforms Based On Trusted Computing.
Konferenzveröffentlichung, Bibliographie
2004
Sadeghi, Ahmad-Reza ; Stüble, Christian (2004)
Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms.
Tucson, Arizona, USA
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian ; Pohlmann, Norbert (2004)
European Multilateral Secure Computing Base - Open Trusted Computing for You and Me.
In: Datenschutz und Datensicherheit (DUD), 9
Artikel, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian (2004)
Property-based Attestation for Computing Platforms: Caring about policies, not mechanisms.
White Point Beach Resort, Nova Scotia, Canada
Konferenzveröffentlichung, Bibliographie
Altmeyer, Oliver ; Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian
Hrsg.: Paulus, Sachar ; Pohlmann, Norbert ; Reimer, Helmut (2004)
Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004)
Buchkapitel, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian ; Altmeyer, Oliver ; Selhorst, Marcel
Hrsg.: Paulus, Sachar ; Pohlmann, Norbert ; Reimer, Helmut (2004)
Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004)
Buchkapitel, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2004)
Overcoming the Obstacles of Zero-Knowledge Watermark Detection.
ACM Multimedia and Security Workshop.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2004)
Overcoming the Obstacles of Zero-Knowledge Watermark Detection.
Magdeburg, Germany
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Günnewig, Dirk ; Rannenberg, Kai ; Stüble, Christian
Hrsg.: Koenig, Christian ; Neumann, Andreas ; Katzschmann, Tobias (2004)
Trusted Computing Platforms: Zur technischen und industriepolitischen Situation und Vorgehensweise.
In: Vertrauenswürdige Systemumgebungen Technik, Recht und gesellschaftspolitische Implikationen des "Trusted Computing"
Buchkapitel, Bibliographie
2003
Sadeghi, Ahmad-Reza ; Alkassar, Ammar (2003)
The Quest for Security in Integrated Networks.
11th International Conference on Telecommunication Systems, Modeling and Analysis.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Alkassar, Ammar (2003)
The Quest for Security in Integrated Networks.
Monterey, USA
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian (2003)
Taming "Trusted Computing" by Operating System Design.
Cheju Island, Korea
Konferenzveröffentlichung, Bibliographie
Adelsbach, Andre ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza (2003)
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, 9 (3)
Artikel, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzenbeisser, Stefan (2003)
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, 9 (3)
Artikel, Bibliographie
Sadeghi, Ahmad-Reza ; Alkassar, Ammar ; Stüble, Christian (2003)
Secure Object Identification - or: Solving The Chess Grandmaster Problem.
Ascona, Switzerland
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre (2003)
Advanced Techniques for Dispute Resolving and Authorship Proofs on Digital Works.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian (2003)
Bridging the Gap between TCPA/Palladium and Personal Security.
Report, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Schneider, Markus ; Stüble, Christian (2003)
Die digitale Signatur.
In: Digitale Signaturen in der Praxis
Buchkapitel, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Schneider, Markus ; Stüble, Christian (2003)
Die digitale Signatur.
In: Digitale Signaturen in der Praxis
Buchkapitel, Bibliographie
Sadeghi, Ahmad-Reza ; Schneider, Markus (2003)
Electronic Payment Systems.
In: Digital Rights Management
Buchkapitel, Bibliographie
Sadeghi, Ahmad-Reza ; Schneider, Markus (2003)
Electronic Payment Systems.
In: Digital Rights Management
Buchkapitel, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian (2003)
Sinn und Unsinn von TCPA und Palladium.
In: c't, 13
Artikel, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian (2003)
Sinn und Unsinn von TCPA und Palladium.
In: c't, 13
Artikel, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Dirk (2003)
Trusted Computing ohne Nebenwirkungen.
In: Datenschutz und Datensicherheit (DUD)
Buchkapitel, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian ; Günnewig, Dirk (2003)
Trusted Computing ohne Nebenwirkungen.
In: Datenschutz und Datensicherheit (DUD)
Buchkapitel, Bibliographie
2002
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzenbeisser, Stefan (2002)
Cryptography Meets Watermarking: Detecting Watermarks with Minimal- or Zero-Knowledge Disclosure.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Steinbrecher, Sandra (2002)
Auctions with Multiple Rounds and Multiple Items.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian (2002)
Final Report on Verification and Assessment.
Buch, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian (2002)
Final Report on Verification and Assessment.
Report, Bibliographie
2001
Sadeghi, Ahmad-Reza ; Steiner, Michael (2001)
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Geraldy, Alexander ; Pfitzmann, Birgit (2001)
Optimized Self-Synchronizing Mode of Operation.
Yokohama, Japan
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza (2001)
How to Break a Semi-Anonymous Fingerprinting Scheme.
Information Hiding: Fourth International Workshop.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza (2001)
How to Break a Semi-Anonymous Fingerprinting Scheme.
Konferenzveröffentlichung, Bibliographie
Adelsbach, Andre ; Sadeghi, Ahmad-Reza (2001)
Zero-Knowledge Watermark Detection and Proof of Ownership.
Information Hiding: Fourth International Workshop.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre (2001)
Zero-Knowledge Watermark Detection and Proof of Ownership.
Berlin, Germany
Konferenzveröffentlichung, Bibliographie
2000
Adelsbach, Andre ; Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza (2000)
Proving ownership of digital content.
3rd International Workshop on Information Hiding, IH 1999.
Konferenzveröffentlichung, Bibliographie
Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza (2000)
Self-escrowed cash against user black-mailing.
Fourth Conference on Financial Cryptography (FC 2000 Anguilla).
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (2000)
Self-escrowed cash against user black-mailing.
Anguilla, British West Indies
Konferenzveröffentlichung, Bibliographie
1999
Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999)
Coin-based anonymous fingerprinting.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999)
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99
Buchkapitel, Bibliographie
Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999)
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99
Buchkapitel, Bibliographie