Ferdinand Brasser

Affiliations:
  • Technical University of Darmstadt, CASED, Germany


According to our database1, Ferdinand Brasser authored at least 36 papers between 2012 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Trusted Container Extensions for Container-based Confidential Computing.
CoRR, 2022

SafeTEE: Combining Safety and Security on ARM-based Microcontrollers.
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022

VirTEE: a full backward-compatible TEE with native live migration and secure I/O.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

2021
In Hardware We Trust? From TPM to Enclave Computing on RISC-V.
Proceedings of the 29th IFIP/IEEE International Conference on Very Large Scale Integration, 2021

CURE: A Security Architecture with CUstomizable and Resilient Enclaves.
Proceedings of the 30th USENIX Security Symposium, 2021

GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

RealSWATT: Remote Software-based Attestation for Embedded Devices under Realtime Constraints.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Enclave Computing Paradigm: Hardware-assisted Security Architectures & Applications.
PhD thesis, 2020

Control Behavior Integrity for Distributed Cyber-Physical Systems.
Proceedings of the 11th ACM/IEEE International Conference on Cyber-Physical Systems, 2020

LegIoT: Ledgered Trust Management Platform for IoT.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
SADAN: Scalable Adversary Detection in Autonomous Networks.
CoRR, 2019

PAtt: Physics-based Attestation of Control Systems.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

SANCTUARY: ARMing TrustZone with User-space Enclaves.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Sustainable Security & Safety: Challenges and Opportunities.
Proceedings of the 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems, 2019

RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
HardIDX: Practical and secure index with SGX in a malicious environment.
J. Comput. Secur., 2018

State-aware anomaly detection for industrial control systems.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

VoiceGuard: Secure and Private Speech Processing.
Proceedings of the Interspeech 2018, 2018

Towards a Cloud-based System for Software Protection and Licensing.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Advances and throwbacks in hardware-assisted security: special session.
Proceedings of the International Conference on Compilers, 2018

2017
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
CoRR, 2017

Software Grand Exposure: SGX Cache Attacks Are Practical.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
Proceedings of the 26th USENIX Security Symposium, 2017

Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

HardIDX: Practical and Secure Index with SGX.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

2016
Secure Multiparty Computation from SGX.
IACR Cryptol. ePrint Arch., 2016

CAn't Touch This: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
CoRR, 2016

Regulating ARM TrustZone Devices in Restricted Spaces.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Remote attestation for low-end embedded devices: the prover's perspective.
Proceedings of the 53rd Annual Design Automation Conference, 2016

2015
TyTAN: tiny trust anchor for tiny devices.
Proceedings of the 52nd Annual Design Automation Conference, 2015

SEDA: Scalable Embedded Device Attestation.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Swap and Play: Live Updating Hypervisors and Its Application to Xen.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014

2012
Softer Smartcards - Usable Cryptographic Tokens with Secure Execution.
Proceedings of the Financial Cryptography and Data Security, 2012


  Loading...