Items where Author is "Nürnberger, Stefan"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 21.

Article

Nürnberger, Stefan and Bugiel, Sven
(2016) Autonome Systeme.
Datenschutz und Datensicherheit, 40 (8). pp. 503-506.

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2011) CFI Goes Mobile: Control-Flow Integrity for Smartphones.
International Workshop on Trustworthy Embedded Devices (TrustED).

Book Section

Bessani, Alysson and Abbadi, Imad and Bugiel, Sven and Cesena, Emanuele and Deng, Mina and Gröne, Michael and Marnau, Ninja and Nürnberger, Stefan and Pasin, Marco and Schirmer, Norbert
(2012) TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
In: UNSPECIFIED Cambridge Scholars Publishing.
(Unpublished)

Conference or Workshop Item

Lu, Kangjie and Walter, Marie-Therese and Pfaff, David and Nürnberger, Stefan and Lee, Wenke and Backes, Michael
(2017) Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying.
In: Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17).
Conference: NDSS - Network and Distributed System Security Symposium

Nürnberger, Stefan and Rossow, Christian
(2016) VatiCAN - Vetted, Authenticated CAN Bus.
In: . Conference on Cryptographic Hardware and Embedded Systems (CHES).
Conference: CHES - Workshop on Cryptographic Hardware and Embedded Systems

Götzfried, Johannes and Müller, Tilo and Drescher, Gabor and Nürnberger, Stefan and Backes, Michael
(2016) RamCrypt: Kernel-based Address Space Encryption for User-mode Processes.
In: ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS).
Conference: None | Not Set

Lu, Kangjie and Backes, Michael and Nürnberger, Stefan and Lee, Wenke
(2016) How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.
In: Proceedings of the 23rd Annual Symposium on Network and Distributed System Security (NDSS '16).
Conference: NDSS - Network and Distributed System Security Symposium

Krupp, Johannes and Schröder, Dominique and Simkin, Mark and Fiore, Dario and Ateniese, Giuseppe and Nürnberger, Stefan
(2016) Nearly Optimal Verifiable Data Streaming.
In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I.
Conference: None | Not Set

Backes, Michael and Holz, Thorsten and Kollenda, Benjamin and Koppe, Philipp and Nürnberger, Stefan and Pewny, Jannik
(2014) You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.
In: Proceedings of the 21st ACM conference on Computer and Communications Security (ACM CCS '14).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Nürnberger, Stefan
(2014) Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security - Usenix Security Symposium

Backes, Michael and Gerling, Rainer W. and Gerling, Sebastian and Nürnberger, Stefan and Schröder, Dominique and Simkin, Mark
(2014) WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP.
In: 12th International Conference on Applied Cryptography and Network Security (ACNS 2014).
Conference: None | Not Set

Bleikertz, Sören and Bugiel, Sven and Ideler, Hugo and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2013) Client-controlled Cryptography-as-a-Service in the Cloud.
In: 11th International Conference on Applied Cryptography and Network Security (ACNS'13).
Conference: None | Not Set

Davi, Lucas Vincenzo and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2013) Gadge Me if You Can: Secure and Efficient Ad-Hoc Instruction-Level Randomization for x86 and ARM.
In: 8th ACM SIGSAC symposium on Information, computer and communications security (ACM ASIACCS 2013).
Conference: None | Not Set

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2012) MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
In: Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS '12).
Conference: NDSS - Network and Distributed System Security Symposium

Davi, Lucas and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2012) XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3).

Bugiel, Sven and Pöppelmann, Thomas and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas
(2011) AmazonIA: When Elasticity Snaps Back.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11).
Conference: CCS - ACM Conference on Computer and Communications Security

Bugiel, Sven and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas
(2011) Twin Clouds: An Architecture for Secure Cloud Computing.
In: Workshop on Cryptography and Security in Clouds (CSC).
Conference: None | Not Set

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2011) Poster: Control-flow Integrity for Smartphones.
In: 18th ACM conference on Computer and communications security (ACM CCS 2012).
Conference: CCS - ACM Conference on Computer and Communications Security

Bugiel, Sven and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas
(2011) Twin Clouds: Secure Cloud Computing with Low Latency.
In: Communications and Multimedia Security Conference (CMS'11).
Conference: None | Not Set

Nürnberger, Stefan and Feller, Thomas and Huss, Sorin A
(2010) Ray - A Secure Microkernel Architecture.
In: Eighth Annual International Conference on Privacy Security and Trust (IEEE PST 2010).
Conference: None | Not Set

Thiemert, Stefan and Nürnberger, Stefan and Steinebach, Martin and Zmudzinski, Sascha
(2009) Security of Robust Audio Hashes.
In: First IEEE International Workshop on Information Forensics and Security (WIFS 2009).
Conference: None | Not Set

This list was generated on Tue Jul 23 00:03:53 2019 CEST.