Andreas Fuchs

Orcid: 0000-0002-0105-003X

Affiliations:
  • Fraunhofer Institute for Secure Information Technology, Darmstadt, Germany
  • Technical University of Darmstadt, Germany


According to our database1, Andreas Fuchs authored at least 34 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Acceleration of DICE Key Generation using Key Caching.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Evaluating the applicability of hardware trust anchors for automotive applications.
Comput. Secur., December, 2023

Secure and Lightweight ECU Attestations for Resilient Over-the-Air Updates in Connected Vehicles.
Proceedings of the Annual Computer Security Applications Conference, 2023

Secure and Lightweight Over-the-Air Software Update Distribution for Connected Vehicles.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Engineering Trustworthy Systems by Minimizing and Strengthening their TCBs using Trusted Computing.
PhD thesis, 2022

Analysis and Evaluation of Hardware Trust Anchors in the Automotive Domain.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Secure Role and Rights Management for Automotive Access and Feature Activation.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Secure Attestation of Virtualized Environments.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

Securing Electric Vehicle Charging Systems Through Component Binding.
Proceedings of the Computer Safety, Reliability, and Security, 2020

TrustEV: trustworthy electric vehicle charging and billing.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure.
Proceedings of the CSCS '20: Computer Science in Cars Symposium, 2020

HIP: HSM-based identities for plug-and-charge.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Security Requirements Engineering in Safety-Critical Railway Signalling Networks.
Secur. Commun. Networks, 2019

2017
Runtime Firmware Product Lines Using TPM2.0.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Rolling DICE: Lightweight Remote Attestation for COTS IoT Hardware.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Security patterns modeling and formalization for pattern-based development of secure software systems.
Innov. Syst. Softw. Eng., 2016

Advanced Remote Firmware Upgrades Using TPM 2.0.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

2015
On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

2014
Generating Secure Service Compositions.
Proceedings of the Cloud Computing and Services Sciences, 2014

Discovering Secure Service Compositions.
Proceedings of the CLOSER 2014, 2014

2013
Preserving Confidentiality in Component Compositions.
Proceedings of the Software Composition - 12th International Conference, 2013

2012
Redefining Security Engineering.
Proceedings of the 5th International Conference on New Technologies, 2012

Supporting Security Engineering at Design Time with Adequate Tooling.
Proceedings of the 15th IEEE International Conference on Computational Science and Engineering, 2012

2011
Formal Notions of Trust and Confidentiality- Enabling Reasoning about System Security.
J. Inf. Process., 2011

2010
Trust in Peer-to-Peer Content Distribution Protocols.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

A Formal Notion of Trust - Enabling Reasoning about Security Properties.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

2009
Security and Dependability Solutions for Networks and Devices.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Final Architecture Specification of security, privacy, and incentive mechanisms
CoRR, 2009

On the Security Validation of Integrated Security Solutions.
Proceedings of the Emerging Challenges for Security, 2009

Identification of Security Requirements in Systems of Systems by Functional Security Analysis.
Proceedings of the Architecting Dependable Systems VII, 2009

Towards a Generic Process for Security Pattern Integration.
Proceedings of the Database and Expert Systems Applications, 2009

Reliable Identities Using Off-the-Shelf Hardware Security in MANETs.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Improving the scalability of platform attestation.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008


  Loading...