Sven Bugiel

Affiliations:
  • CISPA Helmholtz Center for Information Security, Saarbrücken, Germany


According to our database1, Sven Bugiel authored at least 49 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors (Technical Report).
CoRR, 2023

A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors.
Proceedings of the Financial Cryptography and Data Security, 2023

2022
A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites (Extended Version).
CoRR, 2022

2021
Towards a Principled Approach for Dynamic Analysis of Android's Middleware.
CoRR, 2021

Explanation Beats Context: The Effect of Timing & Rationales on Users' Runtime Permission Decisions.
Proceedings of the 30th USENIX Security Symposium, 2021

A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on Android.
Proceedings of the 30th USENIX Security Symposium, 2021

Bringing Balance to the Force: Dynamic Analysis of the Android Application Framework.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Up2Dep: Android Tool Support to Fix Insecure Code Dependencies.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
simTPM: User-centric TPM for Mobile Devices (Technical Report).
CoRR, 2019

simTPM: User-centric TPM for Mobile Devices.
Proceedings of the 28th USENIX Security Symposium, 2019

Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Secure multi-execution in Android.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

DroidCap: OS Support for Capability-based Permissions in Android.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Up-To-Crash: Evaluating Third-Party Library Updatability on Android.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

simFIDO: FIDO2 User Authentication with simTPM.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Poster: Let History not Repeat Itself (this Time) - Tackling WebAuthn Developer Issues Early On.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse.
Proceedings of the 27th USENIX Security Symposium, 2018

The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017
Studying the Impact of Managers on Password Strength and Reuse.
CoRR, 2017

Seamless In-App Ad Blocking on Stock Android.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

ARTist: The Android Runtime Instrumentation and Security Toolkit.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Establishing mandatory access control on Android OS.
PhD thesis, 2016

Boxify: Bringing Full-Fledged App Sandboxing to Stock Android.
login Usenix Mag., 2016

Autonome Systeme.
Datenschutz und Datensicherheit, 2016

On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis.
Proceedings of the 25th USENIX Security Symposium, 2016

SoK: Lessons Learned from Android Security Research for Appified Software Platforms.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

POSTER: The ART of App Compartmentalization.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

R-Droid: Leveraging Android App Analysis with Static Slice Optimization.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Reliable Third-Party Library Detection in Android and its Security Applications.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Boxify: Full-fledged App Sandboxing for Stock Android.
Proceedings of the 24th USENIX Security Symposium, 2015

2014
Android Security Framework: Enabling Generic and Extensible Access Control on Android.
CoRR, 2014

Android security framework: extensible multi-layered access control on Android.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

Scippa: system-centric IPC provenance on Android.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Client-Controlled Cryptography-as-a-Service in the Cloud.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Towards Taming Privilege-Escalation Attacks on Android.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Softer Smartcards - Usable Cryptographic Tokens with Secure Execution.
Proceedings of the Financial Cryptography and Data Security, 2012

2011
Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version).
Proceedings of the Communications and Multimedia Security, 2011

AmazonIA: when elasticity snaps back.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Practical and lightweight domain isolation on Android.
Proceedings of the SPSM'11, 2011

Poster: the quest for security against privilege escalation attacks on android.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Scalable trust establishment with software reputation.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011

2010
TruWalletM: Secure Web Authentication on Mobile Platforms.
Proceedings of the Trusted Systems - Second International Conference, 2010

Implementing an application-specific credential platform using late-launched mobile trusted module.
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010

2009
Trust in a small package: minimized MRTM software implementation for mobile secure environments.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009


  Loading...