Steffen Schulz

Affiliations:
  • Intel, Germany


According to our database1, Steffen Schulz authored at least 25 papers between 2009 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
The Tip of the Iceberg: On the Merits of Finding Security Bugs.
ACM Trans. Priv. Secur., 2020

2018
End-to-End Detection of Caller ID Spoofing Attacks.
IEEE Trans. Dependable Secur. Comput., 2018

M-STAR: A Modular, Evidence-based Software Trustworthiness Framework.
CoRR, 2018

2017
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors.
IACR Cryptol. ePrint Arch., 2017

2016
Trusted channels and roots of trust in distributed embedded systems.
PhD thesis, 2016

2015
Time to Rethink: Trust Brokerage Using Trusted Execution Environments.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

2014
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
IEEE Trans. Inf. Forensics Secur., 2014

Mobile Trusted Computing.
Proc. IEEE, 2014

TrustLite: a security architecture for tiny embedded devices.
Proceedings of the Ninth Eurosys Conference 2014, 2014

You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Physical Security Primitives - A Survey on Physically Unclonable Functions and PUF-Based Security Solutions.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

2013
Towards Provably Secure Software Attestation.
IACR Cryptol. ePrint Arch., 2013

A security framework for the analysis and design of software attestation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen - Vom Mikrokern bis zu Capabilities - Verschiedene Lösungsansätze für die App-Trennung und -Kontrolle.
Datenschutz und Datensicherheit, 2012

Tetherway: a framework for tethering camouflage.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Securing Smartphone Compartments: Approaches and Solutions.
Proceedings of the ISSE 2012, 2012

Softer Smartcards - Usable Cryptographic Tokens with Secure Execution.
Proceedings of the Financial Cryptography and Data Security, 2012

2011
Short paper: lightweight remote attestation using physical functions.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Poster: practical embedded remote attestation using physically unclonable functions.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Scalable trust establishment with software reputation.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011

2010
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Proceedings of the Information Hiding - 12th International Conference, 2010

Extending IPsec for Efficient Remote Attestation.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
Secure VPNs for Trusted Computing Environments.
Proceedings of the Trusted Computing, 2009

Trusted Virtual Domains - Design, Implementation and Lessons Learned.
Proceedings of the Trusted Systems, First International Conference, 2009

Hide and Seek in Time - Robust Covert Timing Channels.
Proceedings of the Computer Security, 2009


  Loading...