Johannes Götzfried

According to our database1, Johannes Götzfried authored at least 22 papers between 2013 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Atlas: Application Confidentiality in Compromised Embedded Systems.
IEEE Trans. Dependable Secur. Comput., 2019

SEVGuard: Protecting User Mode Applications Using Secure Encrypted Virtualization.
Proceedings of the Security and Privacy in Communication Networks, 2019

2018
Hardware-Based Trusted Computing Architectures for Isolation and Attestation.
IEEE Trans. Computers, 2018

Secure Remote Computation using Intel SGX.
Proceedings of the Sicherheit 2018, 2018

Universal Trusted Execution Environments for Securing SDN/NFV Operations.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Trusted Systems in Untrusted Environments: Protecting against Strong Attackers (Vertrauenswürdige Systeme in nicht vertrauenswürdigen Umgebungen: Schutz vor starken Angreifern)
PhD thesis, 2017

Sancus 2.0: A Low-Cost Security Architecture for IoT Devices.
ACM Trans. Priv. Secur., 2017

SOFIA: Software and control flow integrity architecture.
Comput. Secur., 2017

Cache Attacks on Intel SGX.
Proceedings of the 10th European Workshop on Systems Security, 2017

VMAttack: Deobfuscating Virtualization-Based Packed Binaries.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Providing security on demand using invasive computing.
it Inf. Technol., 2016

Design-Time/Run-Time Mapping of Security-Critical Applications in Heterogeneous MPSoCs.
Proceedings of the 19th International Workshop on Software and Compilers for Embedded Systems, 2016

Isolating Operating System Components with Intel SGX.
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016

RamCrypt: Kernel-based Address Space Encryption for User-mode Processes.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Exzess: Hardware-Based RAM Encryption Against Physical Memory Disclosure.
Proceedings of the Architecture of Computing Systems - ARCS 2016, 2016

HyperCrypt: Hypervisor-Based Encryption of Kernel and User Space.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Secure garbage collection: Preventing malicious data harvesting from deallocated Java objects inside the Dalvik VM.
J. Inf. Secur. Appl., 2015

Soteria: Offline Software Protection within Low-cost Embedded Devices.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

Physically Secure Code and Data Storage in Autonomously Booting Systems.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Mutual Authentication and Trust Bootstrapping towards Secure Disk Encryption.
ACM Trans. Inf. Syst. Secur., 2014

Analysing Android's Full Disk Encryption Feature.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

2013
ARMORED: CPU-Bound Encryption for Android-Driven ARM Devices.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013


  Loading...