Ghassan Karame

Orcid: 0000-0002-2828-4071

Affiliations:
  • Ruhr University Bochum, Germany


According to our database1, Ghassan Karame authored at least 87 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Closing the Gap: Achieving Better Accuracy-Robustness Tradeoffs against Query-Based Attacks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Short Paper: Estimating Patch Propagation Times Across Blockchain Forks.
Proceedings of the Financial Cryptography and Data Security, 2023

EF↯CF: High Performance Smart Contract Fuzzing for Exploit Generation.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Fuzz on the Beach: Fuzzing Solana Smart Contracts.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

No Forking Way: Detecting Cloning Attacks on Intel SGX Applications.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
PoTS: A Secure Proof of TEE-Stake for Permissionless Blockchains.
IEEE Trans. Serv. Comput., 2022

Censorship-Resilient and Confidential Collateralized Second-Layer Payments.
IACR Cryptol. ePrint Arch., 2022

Estimating Patch Propagation Times across (Blockchain) Forks.
CoRR, 2022

Practical Mitigation of Smart Contract Bugs.
CoRR, 2022

Tutorial: Analyzing, Exploiting, and Patching Smart Contracts in Ethereum.
Proceedings of the IEEE Secure Development Conference, 2022

On the Challenges of Detecting Side-Channel Attacks in SGX.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

On the Storage Overhead of Proof-of-Work Blockchains.
Proceedings of the IEEE International Conference on Blockchain, 2022

2021
Outsourcing Proofs of Retrievability.
IEEE Trans. Cloud Comput., 2021

EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts.
Proceedings of the 30th USENIX Security Symposium, 2021

Regulating Storage Overhead in Existing PoW-based Blockchains.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

Bitcontracts: Supporting Smart Contracts in Legacy Blockchains.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

BaFFLe: Backdoor Detection via Feedback-based Federated Learning.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Mitosis: Practically Scaling Permissioned Blockchains.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Monitoring Performance Metrics is not Enough to Detect Side-Channel Attacks on Intel SGX.
CoRR, 2020

On the Security of Randomized Defenses Against Adversarial Samples.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Proofs of Writing for Robust Storage.
IEEE Trans. Parallel Distributed Syst., 2019

Securing Cloud Data Under Key Exposure.
IEEE Trans. Cloud Comput., 2019

Scalable Byzantine Consensus via Hardware-Assisted Secret Sharing.
IEEE Trans. Computers, 2019

Bitcontracts: Adding Expressive Smart Contracts to Legacy Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2019

Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

ReplicaTEE: Enabling Seamless Replication of SGX Enclaves in the Cloud.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Towards Secure and Decentralized Sharing of IoT Data.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Toward Shared Ownership in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2018

Toward Fairness of Cryptocurrency Payments.
IEEE Secur. Priv., 2018

Blockchain Security and Privacy.
IEEE Secur. Priv., 2018

BITE: Bitcoin Lightweight Client Privacy using Trusted Execution.
IACR Cryptol. ePrint Arch., 2018

Mix'n'Squeeze: Thwarting Adaptive Adversarial Samples Using Randomized Squeezing.
CoRR, 2018

2017
Enabling Anonymous Authorization and Rewarding in the Smart Grid.
IEEE Trans. Dependable Secur. Comput., 2017

Towards Shared Ownership in the Cloud.
IACR Cryptol. ePrint Arch., 2017

Sharding PoW-based Blockchains via Proofs of Knowledge.
IACR Cryptol. ePrint Arch., 2017

Securing Proof-of-Stake Blockchain Protocols.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

CCSW'17: 2017 ACM Cloud Computing Security.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Reconciling Security and Functional Requirements in Multi-tenant Clouds.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

Sharing Proofs of Retrievability across Tenants.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
On the Fingerprinting of Software-Defined Networks.
IEEE Trans. Inf. Forensics Secur., 2016

On the Security and Performance of Proof of Work Blockchains.
IACR Cryptol. ePrint Arch., 2016

SPORT: Sharing Proofs of Retrievability across Tenants.
IACR Cryptol. ePrint Arch., 2016

TREDISEC: Towards Realizing a Truly Secure and Trustworthy Cloud.
ERCIM News, 2016

Towards Fairness of Cryptocurrency Payments.
CoRR, 2016

Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud.
Proceedings of the 25th USENIX Security Symposium, 2016

Cases for Including a Reference Monitor to SDN.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

On Information Leakage in Deduplicated Storage Systems.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

On the Security and Scalability of Bitcoin's Blockchain.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Misbehavior in Bitcoin: A Study of Double-Spending and Accountability.
ACM Trans. Inf. Syst. Secur., 2015

Tampering with the Delivery of Blocks and Transactions in Bitcoin.
IACR Cryptol. ePrint Arch., 2015

Secure Erasure and Code Update in Legacy Sensors.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

Ripple: Overview and Outlook.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

Commune: Shared Ownership in an Agnostic Cloud.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Towards an access control scheme for accessing flows in SDN.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015

TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

Transparent Data Deduplication in the Cloud.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Microcomputations as Micropayments in Web-based Services.
ACM Trans. Internet Techn., 2014

Is Bitcoin a Decentralized Currency?
IEEE Secur. Priv., 2014

Securing Cloud Data in the New Attacker Model.
IACR Cryptol. ePrint Arch., 2014

On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients.
IACR Cryptol. ePrint Arch., 2014

PrivLoc: Preventing Location Tracking in Geofencing Services.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Hiding Transaction Amounts and Balances in Bitcoin.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Access control for SDN controllers.
Proceedings of the third workshop on Hot topics in software defined networking, 2014

Privacy-Friendly Planning of Energy Distribution in Smart Grids.
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 2014

Outsourced Proofs of Retrievability.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
On the Security of End-to-End Measurements Based on Packet-Pair Dispersions.
IEEE Trans. Inf. Forensics Secur., 2013

Towards Trustworthy Network Measurements.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Privacy-friendly tasking and trading of energy in smart grids.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

PoWerStore: proofs of writing for efficient and robust storage.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin.
IACR Cryptol. ePrint Arch., 2012

Evaluating User Privacy in Bitcoin.
IACR Cryptol. ePrint Arch., 2012

Proofs of Writing for Efficient and Robust Storage
CoRR, 2012

Double-spending fast payments in bitcoin.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
New Primitives for Secure Resource and Computation Verification.
PhD thesis, 2011

Pay as you browse: microcomputations as micropayments in web-based services.
Proceedings of the 20th International Conference on World Wide Web, 2011

Privacy-preserving outsourcing of brute-force key searches.
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011

Enabling secure VM-vTPM migration in private clouds.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Integrity Regions: Authentication through Presence in Wireless Networks.
IEEE Trans. Mob. Comput., 2010

Low-Cost Client Puzzles Based on Modular Exponentiation.
Proceedings of the Computer Security, 2010

2009
Facilitating human-centric service delivery using a pluggable service development framework.
Int. J. Ad Hoc Ubiquitous Comput., 2009

On the Security of Bottleneck Bandwidth Estimation Techniques.
Proceedings of the Security and Privacy in Communication Networks, 2009

Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

Secure Remote Execution of Sequential Computations.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

2008
SuperTrust - A Secure and Efficient Framework for Handling Trust in Super Peer Networks.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

A Secure Hybrid Reputation Management System for Super-Peer Networks.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
The AIT 2D Face Detection and Tracking System for CLEAR 2007.
Proceedings of the Multimodal Technologies for Perception of Humans, 2007

2D and 3D face localization for complex scenes.
Proceedings of the Fourth IEEE International Conference on Advanced Video and Signal Based Surveillance, 2007


  Loading...