Jens Lindemann
Orcid: 0000-0003-0103-2461Affiliations:
- University of Hamburg, Germany (PhD 2021)
According to our database1,
Jens Lindemann
authored at least 16 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
An In-Depth Analysis of Security and Privacy Concerns in Smart Home IoT Devices Through Expert User Interviews.
Proceedings of the Information Security Education - Challenges in the Digital Age, 2024
Proceedings of the Annual Computer Security Applications Conference, 2024
2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
How to hide your VM from the big bad wolf? Co-location resistance vs. resource utilisation in VM placement strategies.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2021
Memory deduplication side-channel attacks to detect applications in co-resident virtual machines and defence mechanisms.
PhD thesis, 2021
2020
How do app vendors respond to subject access requests?: a longitudinal privacy study on iOS and Android Apps.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2018
Efficient Identification of Applications in Co-resident VMs via a Memory Side-Channel.
Proceedings of the ICT Systems Security and Privacy Protection, 2018
A memory-deduplication side-channel attack to detect applications in co-resident virtual machines.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
2016
Obtaining personal data and asking for erasure: do app vendors and website owners honour your privacy rights?
Proceedings of the Sicherheit 2016: Sicherheit, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Tracked Without a Trace: Linking Sessions of Users by Unsupervised Learning of Patterns in Their DNS Traffic.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016
2015
Catching Inside Attackers: Balancing Forensic Detectability and Privacy of Employees.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2015
Anonymity Online for Everyone: What Is Missing for Zero-Effort Privacy on the Internet?
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Proceedings of the Computer Security - ESORICS 2014, 2014