Jonas Röckl

Orcid: 0000-0002-3970-5580

According to our database1, Jonas Röckl authored at least 18 papers between 2019 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
Plug'n'Trust: Fine-Grained USB Device Isolation for ARM TrustZone.
Proceedings of the 12th International Conference on Information Systems Security and Privacy, 2026

2025
SH3ARS: Privilege Reduction for ARMv8.0-A Secure Monitors.
Proceedings of the 28th International Symposium on Research in Attacks, 2025

WireTrust: A TrustZone-Based Non-bypassable VPN Tunnel.
Proceedings of the Secure IT Systems, 2025

TrustLeech: Privileged System Analysis using Nested Virtualization.
Proceedings of the IEEE Annual Computer Security Applications Conference, 2025

2024
Profiling with trust: system monitoring from trusted execution environments.
Des. Autom. Embed. Syst., March, 2024

Key extraction-based lawful access to encrypted data: Taxonomy and survey.
Forensic Sci. Int. Digit. Investig., 2024

CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic.
Proceedings of the Secure IT Systems, 2024

BarriCCAde: Isolating Closed-Source Drivers with ARM CCA.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

Conditional Network Availability: Enhancing Connectivity Guarantees for TEE-Based Services.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

SyncEmu: Enabling Dynamic Analysis of Stateful Trusted Applications.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

IlluminaTEE: Effective Man-At-The-End Attacks from within ARM TrustZone.
Proceedings of the 2024 Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks, 2024

TeeFilter: High-Assurance Network Filtering Engine for High-End IoT and Edge Devices based on TEEs.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Veto: Prohibit Outdated Edge System Software from Booting.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
Trusted Monitor: TEE-Based System Monitoring.
Proceedings of the XII Brazilian Symposium on Computing Systems Engineering, 2022

Compiler-Aided Development of Trusted Enclaves with Rust.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Performance Evaluation of Policy-Based SQL Query Classification for Data-Privacy Compliance.
Datenbank-Spektrum, 2021

Advanced System Resiliency Based on Virtualization Techniques for IoT Devices.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2019
Query-Driven Enforcement of Rule-Based Policies for Data-Privacy Compliance.
Proceedings of the Conference on "Lernen, Wissen, Daten, Analysen", Berlin, Germany, September 30, 2019


  Loading...