Stefan Nürnberger

Affiliations:
  • CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
  • Saarland University, Saarbrücken, Germany (PhD 2017)
  • Fraunhofer Institute for Secure Information Technology (SIT), Darmstadt, Germany


According to our database1, Stefan Nürnberger authored at least 27 papers between 2009 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
I Know Where You Parked Last Summer : Automated Reverse Engineering and Privacy Analysis of Modern Cars.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
Proconda - Protected Control Data.
CoRR, 2019

2018
Datenverarbeitung im (vernetzten) Fahrzeug.
Datenschutz und Datensicherheit, 2018

2017
Mitigating the imposition of malicious behaviour on code.
PhD thesis, 2017

Neue Verfahren gegen das Aufoktroyieren von Verhaltensveränderungen in Software.
Proceedings of the Ausgezeichnete Informatikdissertationen 2017, 2017

2016
Autonome Systeme.
Datenschutz und Datensicherheit, 2016

Nearly Optimal Verifiable Data Streaming.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

- vatiCAN - Vetted, Authenticated CAN Bus.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

RamCrypt: Kernel-based Address Space Encryption for User-mode Processes.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Nearly Optimal Verifiable Data Streaming (Full Version).
IACR Cryptol. ePrint Arch., 2015

Diamond Rings: Acknowledged Event Propagation in Many-Core Processors.
Proceedings of the Euro-Par 2015: Parallel Processing Workshops, 2015

2014
Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Shared Memory in the Many-Core Age.
Proceedings of the Euro-Par 2014: Parallel Processing Workshops, 2014

You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Client-Controlled Cryptography-as-a-Service in the Cloud.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
Re-synchronizing audio watermarking after non-linear time stretching.
Proceedings of the Media Forensics and Security III, 2011

Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version).
Proceedings of the Communications and Multimedia Security, 2011

Poster: control-flow integrity for smartphones.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

AmazonIA: when elasticity snaps back.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Ray - a secure micro kernel architecture.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

Sensorium - An Active Monitoring System for Neighborhood Relations in Wireless Sensor Networks.
Proceedings of the Ad Hoc Networks - Second International Conference, 2010

2009
Implicit Sleep Mode Determination in Power Management of Event-Driven Deeply Embedded Systems.
Proceedings of the Wired/Wireless Internet Communications, 7th International Conference, 2009

Security of robust audio hashes.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009


  Loading...