Ahmad-Reza Sadeghi

Orcid: 0000-0001-6833-3598

Affiliations:
  • University of Darmstadt, Germany
  • Ruhr University Bochum, Germany


According to our database1, Ahmad-Reza Sadeghi authored at least 413 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices.
CoRR, 2024

DeepEclipse: How to Break White-Box DNN-Watermarking Schemes.
CoRR, 2024

WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors.
CoRR, 2024

2023
FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning.
CoRR, 2023

MABFuzz: Multi-Armed Bandit Algorithms for Fuzzing Processors.
CoRR, 2023

DEMASQ: Unmasking the ChatGPT Wordsmith.
CoRR, 2023

Accountability of Things: Large-Scale Tamper-Evident Logging for Smart Devices.
CoRR, 2023

Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users.
CoRR, 2023

To ChatGPT, or not to ChatGPT: That is the question!
CoRR, 2023

Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms.
Proceedings of the 15th ACM Web Science Conference 2023, 2023

Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M.
Proceedings of the 32nd USENIX Security Symposium, 2023

ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023

HyPFuzz: Formal-Assisted Processor Fuzzing.
Proceedings of the 32nd USENIX Security Symposium, 2023

BayBFed: Bayesian Backdoor Defense for Federated Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

DARWIN: Survival of the Fittest Fuzzing Mutators.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

POSE: Practical Off-chain Smart Contract Execution.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

PSOFuzz: Fuzzing Processors with Particle Swarm Optimization.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023

FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning.
Proceedings of the 33rd International Conference on Field-Programmable Logic and Applications, 2023

Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats.
Proceedings of the Annual Computer Security Applications Conference, 2023

FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks.
Proceedings of the Annual Computer Security Applications Conference, 2023

DMA'n'Play: Practical Remote Attestation Based on Direct Memory Access.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Intelligent Security: Is "AI for Cybersecurity" a Blessing or a Curse (Dagstuhl Seminar 22412).
Dagstuhl Reports, October, 2022

Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges.
IACR Cryptol. ePrint Arch., 2022

Cloud Computing Security: Foundations and Research Directions.
Found. Trends Priv. Secur., 2022

Close the Gate: Detecting Backdoored Models in Federated Learning based on Client-Side Deep Layer Output Analysis.
CoRR, 2022

Trusted Container Extensions for Container-based Confidential Computing.
CoRR, 2022

Wireless and Mobile Security Research and Teaching in the Post-Pandemic World.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

GhostTouch: Targeted Attacks on Touchscreens without Physical Touch.
Proceedings of the 31st USENIX Security Symposium, 2022


V'CER: Efficient Certificate Validation in Constrained Networks.
Proceedings of the 31st USENIX Security Symposium, 2022

TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities.
Proceedings of the 31st USENIX Security Symposium, 2022

WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

CFInsight: A Comprehensive Metric for CFI Policies.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

FedCRI: Federated Mobile Cyber-Risk Intelligence.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

SafeTEE: Combining Safety and Security on ARM-based Microcontrollers.
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022

VirTEE: a full backward-compatible TEE with native live migration and secure I/O.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

Trusting the trust anchor: towards detecting cross-layer vulnerabilities with hardware fuzzing.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

2021
FLGUARD: Secure and Private Federated Learning.
IACR Cryptol. ePrint Arch., 2021

SAFELearn: Secure Aggregation for private FEderated Learning.
IACR Cryptol. ePrint Arch., 2021

Guest Editors' Introduction: Competing to Secure SoCs.
IEEE Des. Test, 2021

ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning.
CoRR, 2021

Technical perspective: The real-world dilemma of security and privacy by design.
Commun. ACM, 2021

In Hardware We Trust? From TPM to Enclave Computing on RISC-V.
Proceedings of the 29th IFIP/IEEE International Conference on Very Large Scale Integration, 2021

CURE: A Security Architecture with CUstomizable and Resilient Enclaves.
Proceedings of the 30th USENIX Security Symposium, 2021

GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Organizing The World's Largest Hardware Security Competition: Challenges, Opportunities, and Lessons Learned.
Proceedings of the GLSVLSI '21: Great Lakes Symposium on VLSI 2021, 2021

Trusted Configuration in Cloud FPGAs.
Proceedings of the 29th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2021

SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Distributed Memory Guard: Enabling Secure Enclave Computing in NoC-based Architectures.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

Invited: Security Beyond Bulk Silicon: Opportunities and Challenges of Emerging Devices.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

RealSWATT: Remote Software-based Attestation for Embedded Devices under Realtime Constraints.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Trusted Execution Environments: Properties, Applications, and Challenges.
IEEE Secur. Priv., 2020

With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security.
IEEE Secur. Priv., 2020

SAFE: A Secure and Efficient Long-Term Distributed Storage System.
IACR Cryptol. ePrint Arch., 2020

SoK: On the Security Challenges and Risks of Multi-Tenant FPGAs in the Cloud.
CoRR, 2020

Trustworthy AI Inference Systems: An Industry Research View.
CoRR, 2020

Mind the GAP: Security & Privacy Risks of Contact Tracing Apps.
CoRR, 2020

Peek-a-boo: i see your smart home activities, even encrypted!
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

V0LTpwn: Attacking x86 Processor Integrity from Software.
Proceedings of the 29th USENIX Security Symposium, 2020

HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.
Proceedings of the 29th USENIX Security Symposium, 2020


Control Behavior Integrity for Distributed Cyber-Physical Systems.
Proceedings of the 11th ACM/IEEE International Conference on Cyber-Physical Systems, 2020

LegIoT: Ledgered Trust Management Platform for IoT.
Proceedings of the Computer Security - ESORICS 2020, 2020

Offline Model Guard: Secure and Private ML on Mobile Devices.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

On the Security of Strong Memristor-based Physically Unclonable Functions.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

INVITED: AI Utopia or Dystopia - On Securing AI Platforms.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

Developing Privacy-preserving AI Systems: The Lessons learned.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

Long Live Randomization: On Privacy-preserving Contact Tracing in Pandemic.
Proceedings of the 7th ACM Workshop on Moving Target Defense, 2020

LeakyPick: IoT Audio Spy Detector.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication.
IEEE J. Sel. Areas Commun., 2019

FastKitten: Practical Smart Contracts on Bitcoin.
IACR Cryptol. ePrint Arch., 2019

Guest Editors' Introduction: Secure Automotive Systems.
IEEE Des. Test, 2019

SADAN: Scalable Adversary Detection in Autonomous Networks.
CoRR, 2019

HomeSnitch: behavior transparency and control for smart home IoT devices.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

HardFails: Insights into Software-Exploitable Hardware Bugs.
Proceedings of the 28th USENIX Security Symposium, 2019

PAtt: Physics-based Attestation of Control Systems.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

SANCTUARY: ARMing TrustZone with User-space Enclaves.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

NAUTILUS: Fishing for Deep Bugs with Grammars.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Towards Systematic Design of Collective Remote Attestation Protocols.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems.
Proceedings of the International Conference on Computer-Aided Design, 2019

Blockchain and the Future of Publishing.
Proceedings of the 49. Jahrestagung der Gesellschaft für Informatik, 50 Jahre Gesellschaft für Informatik - Informatik für Gesellschaft, INFORMATIK 2019, 2019

HEALED: HEaling & Attestation for Low-End Embedded Devices.
Proceedings of the Financial Cryptography and Data Security, 2019

Sustainable Security & Safety: Challenges and Opportunities.
Proceedings of the 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems, 2019

ARM2GC: Succinct Garbled Processor for Secure Computation.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
End-to-End Detection of Caller ID Spoofing Attacks.
IEEE Trans. Dependable Secur. Comput., 2018

ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018

HardIDX: Practical and secure index with SGX in a malicious environment.
J. Comput. Secur., 2018

OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
IEEE Internet Comput., 2018

Changing the Game of Software Security.
IEEE Secur. Priv., 2018

Five Freedoms for the Homo Deus.
IEEE Secur. Priv., 2018

Pushing the Communication Barrier in Secure Computation using Lookup Tables.
IACR Cryptol. ePrint Arch., 2018

When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs.
CoRR, 2018

Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management.
CoRR, 2018

DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
CoRR, 2018

IMIX: In-Process Memory Isolation EXtension.
Proceedings of the 27th USENIX Security Symposium, 2018

The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
Proceedings of the 27th USENIX Security Symposium, 2018

US-AID: Unattended Scalable Attestation of IoT Devices.
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018

State-aware anomaly detection for industrial control systems.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

K-Miner: Uncovering Memory Corruption in Linux.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

VoiceGuard: Secure and Private Speech Processing.
Proceedings of the Interspeech 2018, 2018

Towards a Cloud-based System for Software Protection and Licensing.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

LiteHAX: lightweight hardware-assisted attestation of program execution.
Proceedings of the International Conference on Computer-Aided Design, 2018

SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices.
Proceedings of the Computer Security, 2018

The future of IoT security: special session.
Proceedings of the International Conference on Embedded Software, 2018

It's hammer time: how to attack (rowhammer-based) DRAM-PUFs.
Proceedings of the 55th Annual Design Automation Conference, 2018

Revisiting context-based authentication in IoT.
Proceedings of the 55th Annual Design Automation Conference, 2018

Reconciling remote attestation and safety-critical operation on simple IoT devices.
Proceedings of the 55th Annual Design Automation Conference, 2018

Internet of things or threats?: on building trust in IoT (keynote).
Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, 2018

iOracle: Automated Evaluation of Access Control Policies in iOS.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Advances and throwbacks in hardware-assisted security: special session.
Proceedings of the International Conference on Compilers, 2018

Hardware control flow integrity.
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018

2017
Toward Practical Secure Stable Matching.
Proc. Priv. Enhancing Technol., 2017

Phonion: Practical Protection of Metadata in Telephony Networks.
Proc. Priv. Enhancing Technol., 2017

ACM CCS 2016 Interview, Part 3.
IEEE Secur. Priv., 2017

ACM CCS 2016 Interviews, Part 2.
IEEE Secur. Priv., 2017

ACM CCS 2016 Interviews, Part 1.
IEEE Secur. Priv., 2017

Security & Privacy Week Interviews, Part 3.
IEEE Secur. Priv., 2017

Security and Privacy More Crucial than Ever.
IEEE Secur. Priv., 2017

ARM2GC: Simple and Efficient Garbled Circuit Framework by Skipping.
IACR Cryptol. ePrint Arch., 2017

DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
CoRR, 2017

Execution Integrity with In-Place Encryption.
CoRR, 2017

HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.
CoRR, 2017

Exploiting PUF Models for Error Free Response Generation.
CoRR, 2017

Modeling Attack Resilient Reconfigurable Latent Obfuscation Technique for PUF based Lightweight Authentication.
CoRR, 2017

Software Grand Exposure: SGX Cache Attacks Are Practical.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

SeED: secure non-interactive attestation for embedded devices.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
Proceedings of the 26th USENIX Security Symposium, 2017

LAZARUS: Practical Side-Channel Resilient Kernel-Space Randomization.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

ATRIUM: Runtime attestation resilient under memory attacks.
Proceedings of the 2017 IEEE/ACM International Conference on Computer-Aided Design, 2017

HardIDX: Practical and Secure Index with SGX.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
Proceedings of the 54th Annual Design Automation Conference, 2017

Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

Hardware-Assisted Security: Promises, Pitfalls and Opportunities.
Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, 2017

Moving Targets vs. Moving Adversaries: On the Effectiveness of System Randomization.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

JITGuard: Hardening Just-in-time Compilers with SGX.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Remanence Decay Side-Channel: The PUF Case.
IEEE Trans. Inf. Forensics Secur., 2016

Selfrando: Securing the Tor Browser against De-anonymization Exploits.
Proc. Priv. Enhancing Technol., 2016

The Cybersecurity Landscape in Industrial Control Systems.
Proc. IEEE, 2016

Security & Privacy Week Interviews, Part 2.
IEEE Secur. Priv., 2016

Security & Privacy Week Interviews, Part 1.
IEEE Secur. Priv., 2016

Games without Frontiers: Whither Information Security and Privacy?
IEEE Secur. Priv., 2016

Secure Multiparty Computation from SGX.
IACR Cryptol. ePrint Arch., 2016

Towards a Unified Security Model for Physically Unclonable Functions.
IACR Cryptol. ePrint Arch., 2016

SandBlaster: Reversing the Apple Sandbox.
CoRR, 2016

CAn't Touch This: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
CoRR, 2016

POSTER: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

DARPA: Device Attestation Resilient to Physical Attacks.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

POSTER: Toward a Secure and Scalable Attestation.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

Leakage-Resilient Layout Randomization for Mobile Devices.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Regulating ARM TrustZone Devices in Restricted Spaces.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

CryptoML: Secure outsourcing of big data machine learning applications.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

Strategy without tactics: policy-agnostic hardware-enhanced control-flow integrity.
Proceedings of the 53rd Annual Design Automation Conference, 2016

GarbledCPU: a MIPS processor for secure computation in hardware.
Proceedings of the 53rd Annual Design Automation Conference, 2016

Invited - Can IoT be secured: emerging challenges in connecting the unconnected.
Proceedings of the 53rd Annual Design Automation Conference, 2016

Remote attestation for low-end embedded devices: the prover's perspective.
Proceedings of the 53rd Annual Design Automation Conference, 2016

Invited - Things, trouble, trust: on building trust in IoT systems.
Proceedings of the 53rd Annual Design Automation Conference, 2016

SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

SANA: Secure and Scalable Aggregate Network Attestation.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

C-FLAT: Control-Flow Attestation for Embedded Systems Software.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Security analysis on consumer and industrial IoT devices.
Proceedings of the 21st Asia and South Pacific Design Automation Conference, 2016

2015
Automated Software Diversity
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02346-0, 2015

Building Secure Defenses Against Code-Reuse Attacks
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-25546-0, 2015

Guest Editorial Special Section on Hardware Security and Trust.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015

On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
IACR Cryptol. ePrint Arch., 2015

OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices.
CoRR, 2015

How far removed are you?: scalable privacy-preserving estimation of social path length with Social PaL.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Readactor: Practical Code Randomization Resilient to Memory Disclosure.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Market-Driven Code Provisioning to Mobile Secure Hardware.
Proceedings of the Financial Cryptography and Data Security, 2015

Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
Proceedings of the Financial Cryptography and Data Security, 2015

Compacting privacy-preserving k-nearest neighbor search using logic synthesis.
Proceedings of the 52nd Annual Design Automation Conference, 2015

Security and privacy challenges in industrial internet of things.
Proceedings of the 52nd Annual Design Automation Conference, 2015

HAFIX: hardware-assisted flow integrity extension.
Proceedings of the 52nd Annual Design Automation Conference, 2015

TyTAN: tiny trust anchor for tiny devices.
Proceedings of the 52nd Annual Design Automation Conference, 2015

Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future?
Proceedings of the 10th ACM Symposium on Information, 2015

I Know Where You are: Proofs of Presence Resilient to Malicious Provers.
Proceedings of the 10th ACM Symposium on Information, 2015

Automated Synthesis of Optimized Circuits for Secure Computation.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

XiOS: Extended Application Sandboxing on iOS.
Proceedings of the 10th ACM Symposium on Information, 2015

SEDA: Scalable Embedded Device Attestation.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02344-6, 2014

The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
IEEE Trans. Inf. Forensics Secur., 2014

Mobile Trusted Computing.
Proc. IEEE, 2014

A trusted versioning file system for passive mobile storage devices.
J. Netw. Comput. Appl., 2014

ASM: A Programmable Interface for Extending Android Security.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

MoP-2-MoP - Mobile Private Microblogging.
Proceedings of the Financial Cryptography and Data Security, 2014

On Offline Payments with Bitcoin (Poster Abstract).
Proceedings of the Financial Cryptography and Data Security, 2014

On the (In)Security of Mobile Two-Factor Authentication.
Proceedings of the Financial Cryptography and Data Security, 2014

TrustLite: a security architecture for tiny embedded devices.
Proceedings of the Ninth Eurosys Conference 2014, 2014

Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014

You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014

Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014

Beasty Memories: The Quest for Practical Defense against Code Reuse Attacks.
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014

ConXsense: automated context classification for context-aware access control.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Swap and Play: Live Updating Hypervisors and Its Application to Xen.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014

Physical Security Primitives - A Survey on Physically Unclonable Functions and PUF-Based Security Solutions.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

2013
Mobile Platform Security
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02341-5, 2013

A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design.
J. Comput. Secur., 2013

Do I know you? - Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
IACR Cryptol. ePrint Arch., 2013

Towards Provably Secure Software Attestation.
IACR Cryptol. ePrint Arch., 2013

ConXsense - Context Sensing for Adaptive Usable Access Control.
CoRR, 2013

Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Mobile security and privacy: the quest for the mighty access control.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Memristor PUFs: a new generation of memory-based physically unclonable functions.
Proceedings of the Design, Automation and Test in Europe, 2013

Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

PSiOS: bring your own privacy & security to iOS devices.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

CyCAR'2013: first international academic workshop on security, privacy and dependability for cybervehicles.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

A security framework for the analysis and design of software attestation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Client-Controlled Cryptography-as-a-Service in the Cloud.
Proceedings of the Applied Cryptography and Network Security, 2013

CrowdShare: Secure Mobile Resource Sharing.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version).
IACR Cryptol. ePrint Arch., 2012

SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version).
IACR Cryptol. ePrint Arch., 2012

Tetherway: a framework for tethering camouflage.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Unsafe exposure analysis of mobile in-app advertisements.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Converse PUF-Based Authentication.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

SmartTokens: Delegable Access Control with NFC-Enabled Smartphones.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Towards Taming Privilege-Escalation Attacks on Android.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Flexible patient-controlled security for electronic health records.
Proceedings of the ACM International Health Informatics Symposium, 2012

Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs.
Proceedings of the Financial Cryptography and Data Security, 2012

Softer Smartcards - Usable Cryptographic Tokens with Secure Execution.
Proceedings of the Financial Cryptography and Data Security, 2012

PUF-based secure test wrapper design for cryptographic SoC testing.
Proceedings of the 2012 Design, Automation & Test in Europe Conference & Exhibition, 2012

EDA for secure and dependable cybercars: challenges and opportunities.
Proceedings of the 49th Annual Design Automation Conference 2012, 2012

PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2011
Privacy-Preserving ECG Classification With Branching Programs and Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2011

Recyclable PUFs: logically reconfigurable PUFs.
J. Cryptogr. Eng., 2011

Recyclable PUFs: Logically Reconfigurable PUFs.
IACR Cryptol. ePrint Arch., 2011

Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
IACR Cryptol. ePrint Arch., 2011

On Constructing Homomorphic Encryption Schemes from Coding Theory.
IACR Cryptol. ePrint Arch., 2011

CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
IACR Cryptol. ePrint Arch., 2011

Secure Computing in the Cloud (Dagstuhl Seminar 11491).
Dagstuhl Reports, 2011

Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 11511).
Dagstuhl Reports, 2011

Short paper: lightweight remote attestation using physical functions.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

A Formalization of the Security Features of Physical Functions.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Trustworthy Clouds Underpinning the Future Internet.
Proceedings of the Future Internet, 2011

hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers.
Proceedings of the Financial Cryptography and Data Security, 2011

Uni-directional trusted path: Transaction confirmation on just one device.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

Secure Set Intersection with Untrusted Hardware Tokens.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version).
Proceedings of the Communications and Multimedia Security, 2011

Poster: practical embedded remote attestation using physically unclonable functions.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

ROPdefender: a detection tool to defend against return-oriented programming attacks.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Poster: control-flow integrity for smartphones.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

AmazonIA: when elasticity snaps back.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Practical and lightweight domain isolation on Android.
Proceedings of the SPSM'11, 2011

Poster: the quest for security against privilege escalation attacks on android.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

A Security Architecture for Accessing Health Records on Mobile Phones.
Proceedings of the HEALTHINF 2011, 2011

Securing the Access to Electronic Health Records on Mobile Phones.
Proceedings of the Biomedical Engineering Systems and Technologies, 2011

2010
Enhancing RFID Security and Privacy by Physically Unclonable Functions.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version).
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

Trusted Computing.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

Impossibility Results for RFID Privacy Notions.
Trans. Comput. Sci., 2010

Towards automated security policy enforcement in multi-tenant virtual data centers.
J. Comput. Secur., 2010

Key agreement for heterogeneous mobile ad-hoc groups.
Int. J. Wirel. Mob. Comput., 2010

From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design.
IACR Cryptol. ePrint Arch., 2010

Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
IACR Cryptol. ePrint Arch., 2010

TASTY: Tool for Automating Secure Two-partY computations.
IACR Cryptol. ePrint Arch., 2010

A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
IACR Cryptol. ePrint Arch., 2010

Trusted virtual domains: Color your network.
Datenschutz und Datensicherheit, 2010

Token-Based Cloud Computing.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Key Attestation from Trusted Execution Environments.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Anonymous Authentication with TLS and DAA.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Anonymous Authentication for RFID Systems.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten.
Proceedings of the perspeGKtive 2010, 2010

Video Streaming Forensic - Content Identification with Traffic Snooping.
Proceedings of the Information Security - 13th International Conference, 2010

Privilege Escalation Attacks on Android.
Proceedings of the Information Security - 13th International Conference, 2010

TruWalletM: Secure Web Authentication on Mobile Platforms.
Proceedings of the Trusted Systems - Second International Conference, 2010

Securing the e-health cloud.
Proceedings of the ACM International Health Informatics Symposium, 2010

Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Proceedings of the Information Hiding - 12th International Conference, 2010

Breaking Randomized Linear Generation Functions Based Virtual Password System.
Proceedings of IEEE International Conference on Communications, 2010

Extending IPsec for Efficient Remote Attestation.
Proceedings of the Financial Cryptography and Data Security, 2010

hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version).
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

Return-oriented programming without returns.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk).
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

Breaking e-banking CAPTCHAs.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

On RFID Privacy with Mutual Authentication and Tag Corruption.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

Patterns for Secure Boot and Secure Storage in Computer Systems.
Proceedings of the ARES 2010, 2010

2009
Efficient Privacy-Preserving Face Recognition.
IACR Cryptol. ePrint Arch., 2009

Practical Secure Evaluation of Semi-Private Functions.
IACR Cryptol. ePrint Arch., 2009

On the Security of PAS (Predicate-based Authentication Service).
IACR Cryptol. ePrint Arch., 2009

Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
IACR Cryptol. ePrint Arch., 2009

Embedded SFE: Offloading Server and Network using Hardware Tokens.
IACR Cryptol. ePrint Arch., 2009

Secure Evaluation of Private Linear Branching Programs with Medical Applications.
IACR Cryptol. ePrint Arch., 2009

Bringing Zero-Knowledge Proofs of Knowledge to Practice.
IACR Cryptol. ePrint Arch., 2009

Efficient privacy-preserving classification of ECG signals.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Secure VPNs for Trusted Computing Environments.
Proceedings of the Trusted Computing, 2009

Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
Proceedings of the Trusted Computing, 2009

Transparent Mobile Storage Protection in Trusted Virtual Domains.
Proceedings of the 23rd Large Installation System Administration Conference, 2009

Future of Assurance: Ensuring that a System is Trustworthy.
Proceedings of the ISSE 2009, 2009

Using Compilers to Enhance Cryptographic Product Development.
Proceedings of the ISSE 2009, 2009

Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
Proceedings of the Information Security Practice and Experience, 2009

Trusted Virtual Domains - Design, Implementation and Lessons Learned.
Proceedings of the Trusted Systems, First International Conference, 2009

Software distribution as a malware infection vector.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009

Automatic Generation of Sigma-Protocols.
Proceedings of the Public Key Infrastructures, Services and Applications, 2009

Location Privacy in RFID Applications.
Proceedings of the Privacy in Location-Based Applications, 2009

Hide and Seek in Time - Robust Covert Timing Channels.
Proceedings of the Computer Security, 2009

A Pattern for Secure Graphical User Interface Systems.
Proceedings of the Database and Expert Systems Applications, 2009

09282 Abstracts Collection - Foundations for Forgery-Resilient Cryptographic Hardware.
Proceedings of the Foundations for Forgery-Resilient Cryptographic Hardware, 05.07., 2009

09282 Executive Summary - Foundations for Forgery-Resilient Cryptographic Hardware.
Proceedings of the Foundations for Forgery-Resilient Cryptographic Hardware, 05.07., 2009

A practical property-based bootstrap architecture.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

TruWallet: trustworthy and migratable wallet-based web authentication.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

Anonymizer-Enabled Security and Privacy for RFID.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions.
Proceedings of the Advances in Cryptology, 2009

2008
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.
IACR Cryptol. ePrint Arch., 2008

Universally Composable Security Analysis of TLS - Secure Sessions with Handshake and Record Layer Protocols.
IACR Cryptol. ePrint Arch., 2008

Automatic Generation of Sound Zero-Knowledge Protocols.
IACR Cryptol. ePrint Arch., 2008

A New Approach for Algebraically Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2008

Trusted Computing - Special Aspects and Challenges.
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008

Universally Composable Security Analysis of TLS.
Proceedings of the Provable Security, Second International Conference, 2008

Property-Based TPM Virtualization.
Proceedings of the Information Security, 11th International Conference, 2008

Property-Based Attestation without a Trusted Third Party.
Proceedings of the Information Security, 11th International Conference, 2008

A Demonstrative Ad Hoc Attestation System.
Proceedings of the Information Security, 11th International Conference, 2008

Securing Peer-to-Peer Distributions for Mobile Devices.
Proceedings of the Information Security Practice and Experience, 2008

Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
Proceedings of the Information Security Practice and Experience, 2008

User Privacy in Transport Systems Based on RFID E-Tickets.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008

Improved Security Notions and Protocols for Non-transferable Identification.
Proceedings of the Computer Security, 2008

Efficient Helper Data Key Extractor on FPGAs.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

Flexible and secure enterprise rights management based on trusted virtual domains.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008

Provably secure browser-based user-aware mutual authentication over TLS.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

An efficient implementation of trusted channels based on openssl.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008

2007
Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages.
Trans. Data Hiding Multim. Secur., 2007

Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
IACR Cryptol. ePrint Arch., 2007

Studieren mit Sicherheit in Bochum - Die Studiengänge zum Thema IT-Sicherheit.
Datenschutz und Datensicherheit, 2007

The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and Detection.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Enabling Fairer Digital Rights Management with Trusted Computing.
Proceedings of the Information Security, 10th International Conference, 2007

Combining Tardos Fingerprinting Codes and Fingercasting.
Proceedings of the Information Hiding, 9th International Workshop, 2007

A Forensic Framework for Tracing Phishers.
Proceedings of the Future of Identity in the Information Society, 2007

A Non-Sequential Unsplittable Privacy-Protecting Multi-Coupon Scheme.
Proceedings of the 37. Jahrestagung der Gesellschaft für Informatik, 2007

Establishing Chain of Trust in Reconfigurable Hardware.
Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines, 2007

A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting.
Proceedings of the Financial Cryptography and Data Security, 2007

Beyond secure channels.
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007

Reconfigurable trusted computing in hardware.
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007

Enhancing Grid Security Using Trusted Virtualization.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing.
Proceedings of the The Second International Conference on Availability, 2007

2006
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
Trans. Data Hiding Multim. Secur., 2006

Linkable Democratic Group Signatures.
IACR Cryptol. ePrint Arch., 2006

E-Passport: The Global Traceability Or How to Feel Like a UPS Package.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
Proceedings of the Information Security, 9th International Conference, 2006

Security Architecture for Device Encryption and VPN.
Proceedings of the ISSE 2006, 2006

A Computational Model for Watermark Robustness.
Proceedings of the Information Hiding, 8th International Workshop, 2006

Challenges for Trusted Computing.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

TCG inside?: a note on TPM specification compliance.
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006

A protocol for property-based attestation.
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006

Property-Based Taming of Lying Mobile Nodes.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Physical Security Bounds Against Tampering.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Complementing zero-knowledge watermark detection: Proving properties of embedded information without revealing it.
Multim. Syst., 2005

Towards multilaterally secure computing platforms - with open source and trusted computing.
Inf. Secur. Tech. Rep., 2005

Browser Model for Security Analysis of Browser-Based Protocols.
IACR Cryptol. ePrint Arch., 2005

Proving a WS-federation passive requestor profile with a browser model.
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005

Towards Multilateral-Secure DRM Platforms.
Proceedings of the Information Security Practice and Experience, 2005

An Open Approach for Designing Secure Electronic Immobilizers.
Proceedings of the Information Security Practice and Experience, 2005

Secure Software Delivery and Installation in Embedded Systems.
Proceedings of the Information Security Practice and Experience, 2005

Property-Based Broadcast Encryption for Multi-level Security Policies.
Proceedings of the Information Security and Cryptology, 2005

A Privacy-Protecting Coupon System.
Proceedings of the Financial Cryptography and Data Security, 2005

Towards multilateral secure digital rights distribution infrastructures.
Proceedings of the Fifth ACM Workshop on Digital Rights Management, 2005

Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme.
Proceedings of the Communications and Multimedia Security, 2005

Secure Data Management in Trusted Computing.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

2004
Property-based attestation for computing platforms: caring about properties, not mechanisms.
Proceedings of the New Security Paradigms Workshop 2004, 2004

Overcoming the obstacles of zero-knowledge watermark detection.
Proceedings of the 6th workshop on Multimedia & Security, 2004

Enhancing Security of Computing Platforms with TC-Technology.
Proceedings of the ISSE 2004, 2004

2003
Secure fingerprinting on sound foundations.
PhD thesis, 2003

Watermark detection with zero-knowledge disclosure.
Multim. Syst., 2003

Trusted Computing ohne Nebenwirkungen - Spezifikationen der Trusted Computing Group sinnvoll nutzen.
Datenschutz und Datensicherheit, 2003

Taming "Trusted Platforms" by Operating System Design.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

Advanced techniques for dispute resolving and authorship proofs on digital works.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

Secure object identification: or: solving the Chess Grandmaster Problem.
Proceedings of the New Security Paradigms Workshop 2003, 2003

On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

Electronic Payment Systems.
Proceedings of the Digital Rights Management, 2003

2002
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference.
IACR Cryptol. ePrint Arch., 2002

Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure.
Proceedings of the 11th European Signal Processing Conference, 2002

Private Auctions with Multiple Rounds and Multiple Items.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

2001
How to Break a Semi-anonymous Fingerprinting Scheme.
Proceedings of the Information Hiding, 4th International Workshop, 2001

Zero-Knowledge Watermark Detection and Proof of Ownership.
Proceedings of the Information Hiding, 4th International Workshop, 2001

Optimized Self-Synchronizing Mode of Operation.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

2000
Anonymous Fingerprinting with Direct Non-Repudiation.
IACR Cryptol. ePrint Arch., 2000

Self-Escrowed Cash against User Blackmailing.
Proceedings of the Financial Cryptography, 2000

1999
Proving Ownership of Digital Content.
Proceedings of the Information Hiding, Third International Workshop, 1999

Coin-Based Anonymous Fingerprinting.
Proceedings of the Advances in Cryptology, 1999


  Loading...