Felix Schuster

According to our database1, Felix Schuster authored at least 17 papers between 2012 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Confidential Computing.
Datenschutz und Datensicherheit (dud), October, 2023

2018
Attacking dynamic code.
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018

2017
The Pyramid Scheme: Oblivious RAM for Trusted Processors.
CoRR, 2017

Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
Securing application software in modern adversarial settings.
PhD thesis, 2016

Oblivious Multi-Party Machine Learning on Trusted Processors.
Proceedings of the 25th USENIX Security Symposium, 2016

Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

2015
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

VC3: Trustworthy Data Analytics in the Cloud Using SGX.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Scriptless attacks: Stealing more pie without touching the sill.
J. Comput. Secur., 2014

Evaluating the Effectiveness of Current Anti-ROP Defenses.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

Leveraging semantic signatures for bug search in binary programs.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Preventing Backdoors in Server Applications with a Separated Software Architecture - (Short Paper).
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013

Towards reducing the attack surface of software backdoors.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Integrating smart cameras into ZigBee.
Proceedings of the 9th IEEE International Workshop on Factory Communication Systems, 2012

Scriptless attacks: stealing the pie without touching the sill.
Proceedings of the ACM Conference on Computer and Communications Security, 2012


  Loading...