TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 27.

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max (2020):
The Tip of the Iceberg: On the Merits of Finding Security Bugs.
In: ACM Transactions on Privacy and Security, 24 (1), Association for Computing Machinery, ISSN 2471-2566,
DOI: 10.1145/3406112,
[Article]

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max (2018):
M-STAR: A Modular, Evidence-based Software Trustworthiness Framework.
In: Cryptography and Security, (Preprint), 1. Version, arXiv, 1801.05764, [Report]

Schulz, Steffen ; Schaller, André ; Kohnhäuser, Florian ; Katzenbeisser, Stefan (2017):
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors.
In: LNCS, In: ESORICS 2017 - European Symposium on Research in Computer Security, pp. 437-455,
Springer, Oslo, Norway, ISBN 978-3-319-66398-2,
DOI: 10.1007/978-3-319-66399-9_24,
[Conference or Workshop Item]

Koeberl, Patrick ; Phegade, Vinay ; Rajan, Anand ; Schneider, Thomas ; Schulz, Steffen ; Zhdanova, Maria (2015):
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
In: 8. International Conference on Trust and Trustworthy Computing (TRUST'15), pp. 181-190,
Springer, DOI: 10.1007/978-3-319-22846-4_11,
[Conference or Workshop Item]

Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2014):
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8), pp. 1189-1206. [Article]

Mustafa, Hossen ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Xu, Wenyuan (2014):
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
In: 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),
[Conference or Workshop Item]

Koeberl, Patrick ; Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Varadharajan, Vijay (2014):
TrustLite: A Security Architecture for Tiny Embedded Devices.
In: European Conference on Computer Systems (EuroSys),
ACM, Amsterdam, Netherlands, DOI: 10.1145/2592798.2592824,
[Conference or Workshop Item]

Schulz, Steffen ; Varadharajan, Vijay ; Sadeghi, Ahmad-Reza (2014):
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: IEEE Transactions on Information Forensis and Security, 9 (2), pp. 221-232. IEEE, ISSN 1556-6021,
[Article]

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2013):
A Security Framework for Analysis and Design of Software Attestation.
In: ACM Conference on Computer and Communications Security (CCS), pp. 1-12,
ACM Press, [Conference or Workshop Item]

Armknecht, Frederik ; Schulz, Steffen ; Wachsmann, Christian (2013):
A security framework for the analysis and design of software attestation.
New York, NY, USA, DOI: 10.1145/2508859.2516650,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay (2012):
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version).
[Report]

Wachsmann, Christian ; Sadeghi, Ahmad-Reza ; Schulz, Steffen (2012):
Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions.
In: Secure Smart Embedded Devices, Platforms and Applications, pp. 429-449, Springer, [Book Section]

Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Zhdanova, Maria ; Xu, Wenyuan ; Mustafa, Hossen ; Varadharajan, Vijay (2012):
Tetherway: A Framework for Tethering Camouflage.
In: Conference on Security and Privacy in Wireless and Mobile Networks (WiSec),
ACM Press, Tuscon, Arizona, ISBN 978-1-4503-1265-3,
[Conference or Workshop Item]

Alkassar, Ammar ; Schulz, Steffen ; Stüble, Christian (2012):
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), 2012 (3), pp. 175-179. DOI: 10.1007/s11623-012-0060-3,
[Article]

Schulz, Steffen ; Brasser, Ferdinand ; Filyanov, Atanas (2012):
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution.
In: LNCS, In: Financial Cryptography and Data Security (FC),
Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay
Foresti, Sara ; Yung, Moti ; Martinelli, Fabio (eds.) (2012):
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: Lecture Notes in Computer Science, In: European Symposium on Research in Computer Science (ESORICS), pp. 253-270, Berlin, Heidelberg, Springer Verlag, ISBN 978-3-642-33166-4,
[Book Section]

Kocabaş, Ünal ; Schulz, Steffen (2011):
POSTER: Practical Embedded Remote Attestation Using Physically Unclonable Functions.
In: ACM Conference on Computer and Communications Security (CCS), pp. 797-800,
ACM Press, [Conference or Workshop Item]

Bugiel, Sven ; Davi, Lucas ; Schulz, Steffen
Sadeghi, Ahmad-Reza ; Zhang, Xinwen (eds.) (2011):
Scalable Trust Establishment with Software Reputation.
In: Workshop on Scalable Trusted Computing (STC),
ACM Press, Chicago, Illinois, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2011):
Lightweight Remote Attestation Using Physical Functions.
In: ACM Conference on Wireless Network Security (WiSec), pp. 109-114,
ACM Press, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2011):
Lightweight Remote Attestation using Physical Functions (Extended Version).
(TR-2011-06-01, Technical ), [Report]

Dmitrienko, Alexandra ; Gessner, Dennis ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Stüble, Christian ; Ullmann, Markus (2011):
Trusted embedded System Operating System (TeSOS) - Study and Design.
[Other]

Armknecht, Frederik ; Ghosal, Dipak ; Katzenbeisser, Stefan ; Liu, Yali ; Sadeghi, Ahmad-Reza ; Schulz, Steffen (2010):
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
In: Information Hiding Conference (IH),
Springer, [Conference or Workshop Item]

Schulz, Steffen ; Sadeghi, Ahmad-Reza (2010):
Extending IPsec for Efficient Remote Attestation.
LNCS, In: Financial Cryptography and Data Security (FC),
Springer, [Conference or Workshop Item]

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan (2009):
Hide and Seek in Time - Robust Covert Timing Channels.
In: ESORICS, pp. 120-135,
[Conference or Workshop Item]

Catuogno, Luigi ; Dmitrienko, Alexandra ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramunno, Gianluca ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Schunter, Matthias ; Winandy, Marcel ; Zhan, Jing (2009):
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
In: International Conference on Trusted Systems (INTRUST),
Springer, [Conference or Workshop Item]

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan (2009):
Hide and Seek in Time - Robust Covert Timing Channels.
In: LNCS, In: European Symposium on Research in Computer Security (ESORICS), pp. 120-135,
Springer, ISBN 978-3-642-04443-4,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schulz, Steffen (2009):
Secure VPNs for Trusted Computing Environments.
In: International Conference on Trusted Computing (TRUST),
Springer, Oxford, UK, [Conference or Workshop Item]

This list was generated on Tue Jun 6 01:41:26 2023 CEST.