Number of items: 166.
Zhang, Ruiyi and Gerlach, Lukas and Weber, Daniel and Hetterich, Lorenz and Lü, Youheng and Kogler, Andreas and Schwarz, Michael
(2024)
CacheWarp: Software-based Fault Injection using Selective State Reset.
Gerlach, Lukas and Schwarz, Simon and Faroß, Nicolas and Schwarz, Michael
(2024)
Efficient and Generic Microarchitectural Hash-Function Recovery.
Weber, Daniel and Thomas, Fabian and Gerlach, Lukas and Zhang, Ruiyi and Schwarz, Michael
(2023)
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks.
Bushart, Jonas and Rossow, Christian
(2023)
ResolFuzz: Differential Fuzzing of DNS Resolvers.
Weber, Daniel and Thomas, Fabian and Gerlach, Lukas and Zhang, Ruiyi and Schwarz, Michael
(2023)
Reviving Meltdown 3a.
Gerlach, Lukas and Thomas, Fabian and Pietsch, Robert and Schwarz, Michael
(2023)
A Rowhammer Reproduction Study Using the Blacksmith Fuzzer.
Bars, Nils and Schloegel, Moritz and Scharnowski, Tobias and Schiller, Nico and Holz, Thorsten
(2023)
Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge.
Morio, Kevin and Esiyok, Ilkan and Jackson, Dennis and Künnemann, Robert
(2023)
Automated Security Analysis of Exposure Notification Systems.
(In Press)
Kogler, Andreas and Juffinger, Jonas and Giner, Lukas and Gerlach, Lukas and Schwarzl, Martin and Schwarz, Michael and Gruss, Daniel and Mangard, Stefan
(2023)
Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels.
Zhang, Ruiyi and Kim, Taehyun and Weber, Daniel and Schwarz, Michael
(2023)
(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels.
Nicolae, Maria-Irina and Eisele, Max and Zeller, Andreas
(2023)
Revisiting Neural Program Smoothing for Fuzzing.
(In Press)
Bushart, Jonas and Rossow, Christian
(2023)
Anomaly-based Filtering of Application-Layer DDoS Against DNS Authoritatives.
(Submitted)
Schlüter, Till and Choudhari, Amit and Hetterich, Lorenz and Trampert, Leon and Nemati, Hamed and Ibrahim, Ahmad and Schwarz, Michael and Rossow, Christian and Tippenhauer, Nils Ole
(2023)
FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers.
Erba, Alessandro and Tippenhauer, Nils Ole
(2023)
White-box Concealment Attacks Against Anomaly Detectors for Cyber-Physical Systems.
Gerlach, Lukas and Weber, Daniel and Zhang, Ruiyi and Schwarz, Michael
(2023)
A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs.
Willbold, Johannes and Schloegel, Moritz and Vögele, Manuel and Gerhardt, Maximilian and Holz, Thorsten and Abbasi, Ali
(2023)
Space Odyssey: An Experimental Software Security Analysis of Satellites.
Eisele, Max and Ebert, Daniel and Huth, Christopher and Zeller, Andreas
(2023)
Fuzzing Embedded Systems Using Debug Interfaces.
(In Press)
Borrello, Pietro and Easdon, Catherine and Schwarzl, Martin and Czerny, Roland and Schwarz, Michael
(2023)
CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode.
Thomas, Fabian and Gerlach, Lukas and Schwarz, Michael
(2023)
Hammulator: Simulate Now - Exploit Later.
Schwarzl, Martin and Borrello, Pietro and Saileshwar, Gururaj and Müller, Hanna and Schwarz, Michael and Gruss, Daniel
(2023)
Practical Timing Side-Channel Attacks on Memory Compression.
Cogliati, Benoît-Michel and Ethan, Jordan and Jha, Ashwin
(2023)
Subverting Telegram's End-to-End Encryption.
IACR Transactions on Symmetric Cryptology, 2023 (1).
pp. 5-40.
ISSN 2519-173X
Bauer, Markus and Grishchenko, Ilya and Rossow, Christian
(2022)
TyPro: Forward CFI for C-Style Indirect Function Calls Using Type Propagation.
(In Press)
Wüst, Karl and Kostiainen, Kari and Delius, Noah and Capkun, Srdjan
(2022)
Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation.
Karvandi, Mohammad Sina and Gholamrezaei, MohammadHossein and Monfared, Saleh Khalaj and Meghdadizanjani, Soroush and Abbassi, Behrooz and Amini, Ali and Mortazavi, Reza and Gorgin, Saeid and Rahmati, Dara and Schwarz, Michael
(2022)
HyperDbg: Reinventing Hardware-Assisted Debugging.
Bernhard, Lukas and Scharnowski, Tobias and Schloegel, Moritz and Blazytko, Tim and Holz, Thorsten
(2022)
Jit-Picking: Differential Fuzzing of JavaScript Engines.
Erba, Alessandro and Müller, Anne and Tippenhauer, Nils Ole
(2022)
Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems.
Schwarz, Fabian
(2022)
TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using ARM TrustZone.
(In Press)
Trampert, Leon and Rossow, Christian and Schwarz, Michael
(2022)
Browser-based CPU Fingerprinting.
(In Press)
Rokicki, Thomas and Maurice, Clémentine and Schwarz, Michael
(2022)
CPU Port Contention Without SMT.
Schwarzl, Martin and Borrello, Pietro and Kogler, Andreas and Varda, Kenton and Schuster, Thomas and Gruss, Daniel and Schwarz, Michael
(2022)
Robust and Scalable Process Isolation against
Spectre in the Cloud.
Krupp, Johannes and Grishchenko, Ilya and Rossow, Christian
(2022)
AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities.
Schloegel, Moritz and Blazytko, Tim and Contag, Moritz and Aschermann, Cornelius and Basler, Julius and Holz, Thorsten and Abbasi, Ali
(2022)
Loki: Hardening Code Obfuscation Against Automated Attacks.
Cloosters, Tobias and Willbold, Johannes and Holz, Thorsten and Davi, Lucas
(2022)
SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing.
Borrello, Pietro and Kogler, Andreas and Schwarzl, Martin and Lipp, Moritz and Gruss, Daniel and Schwarz, Michael
(2022)
ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture.
Lipp, Moritz and Gruss, Daniel and Schwarz, Michael
(2022)
AMD Prefetch Attacks through Power and Time.
Scharnowski, Tobias and Bars, Nils and Schloegel, Moritz and Gustafson, Eric and Muench, Marius and Vigna, Giovanni and Kruegel, Christopher and Holz, Thorsten and Abbasi, Ali
(2022)
Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing.
Han, Yi and Chan, Matthew and Aref, Zahra and Tippenhauer, Nils Ole and Zonouz, Saman
(2022)
Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring.
Ibrahim, Ahmad and Nemati, Hamed and Schlüter, Till and Tippenhauer, Nils Ole and Rossow, Christian
(2022)
Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels.
Kogler, Andreas and Gruss, Daniel and Schwarz, Michael
(2022)
Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks.
Easdon, Catherine and Schwarz, Michael and Schwarzl, Martin and Gruss, Daniel
(2022)
Rapid Prototyping for Microarchitectural Attacks.
Giner, Lukas and Kogler, Andreas and Canella, Claudio and Schwarz, Michael and Gruss, Daniel
(2022)
Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.
Sala, Massimiliano and Taufer, Daniele
(2022)
A survey on the group of points arising from elliptic curves with a Weierstrass model over a ring.
International Journal of Group Theory.
ISSN 2251-7669
(In Press)
Bernhard, Lukas and Rodler, Michael and Holz, Thorsten and Davi, Lucas
(2022)
xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64.
Hetterich, Lorenz and Schwarz, Michael
(2022)
Branch Different - Spectre Attacks on Apple Silicon.
Kogler, Andreas and Weber, Daniel and Haubenwallner, Martin and Lipp, Moritz and Gruss, Daniel and Schwarz, Michael
(2022)
Finding and Exploiting CPU Features using MSR Templating.
Schumilo, Sergej and Aschermann, Cornelius and Jemmett, Andrea and Abbasi, Ali and Holz, Thorsten
(2022)
Nyx-Net: Network Fuzzing with Incremental Snapshots.
Eisele, Max
(2022)
Debugger-driven Embedded Fuzzing.
Tippenhauer, Nils Ole and Chen, Binbin and Mashima, Daisuke and Nicol, David M.
(2021)
vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation.
Canella, Claudio and Werner, Mario and Gruss, Daniel and Schwarz, Michael
(2021)
Automating Seccomp Filter Generation for Linux Applications.
van der Toorn, Olivier and Krupp, Johannes and Jonker, Mattijs and van Rijswijk-Deij, Roland and Rossow, Christian and Sperotto, Anna
(2021)
ANYway: Measuring the Amplification DDoS Potential of Domains.
Krupp, Johannes and Rossow, Christian
(2021)
BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks.
Brengel, Michael and Rossow, Christian
(2021)
YarIx: Scalable YARA-based Malware Intelligence.
Wu, Jianliang and Wu, Ruoyu and Antonioli, Daniele and Payer, Mathias and Tippenhauer, Nils Ole and Xu, Dongyan and Tian, Dave (Jing) and Bianchi, Antonio
(2021)
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks.
Weber, Daniel and Ibrahim, Ahmad and Nemati, Hamed and Schwarz, Michael and Rossow, Christian
(2021)
Osiris: Automated Discovery of Microarchitectural Side Channels.
(In Press)
Barbieri, Giovanni and Conti, Mauro and Tippenhauer, Nils Ole and Turrin, Federico
(2021)
Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis.
Lipp, Moritz and Kogler, Andreas and Oswald, David and Schwarz, Michael and Easdon, Catherine and Canella, Claudio and Gruss, Daniel
(2021)
PLATYPUS: Software-based Power Side-Channel Attacks on x86.
Bauer, Markus and Rossow, Christian
(2021)
Cali: Compiler Assisted Library Isolation.
(In Press)
Schwarzl, Martin and Canella, Claudio and Gruss, Daniel and Schwarz, Michael
(2021)
Specfuscator: Evaluating Branch Removal as a Spectre Mitigation.
Schwarzl, Martin and Schuster, Thomas and Schwarz, Michael and Gruss, Daniel
(2021)
Speculative Dereferencing of Registers: Reviving Foreshadow.
Bauer, Markus and Rossow, Christian
(2021)
NoVT: Eliminating C++ Virtual Calls to Mitigate Vtable Hijacking.
(In Press)
Alsoliman, Anas and Rigoni, Giulio and Levorato, Marco and Pinotti, Cristina and Tippenhauer, Nils Ole and Conti, Mauro
(2021)
COTS Drone Detection Using Video Streaming Characteristics.
Reen, Gaganjeet Singh and Rossow, Christian
(2020)
DPIFuzz: A Differential Fuzzing Frameworkto Detect DPI Elusion Strategies for QUIC.
Brengel, Michael and Rossow, Christian
(2020)
xOSSig: Leveraging OS Diversity to Automatically Extract Malware Code Signatures.
Erba, Alessandro and Taormina, Riccardo and Galelli, Stefano and Pogliani, Marcello and Carminati, Michele and Zanero, Stefano and Tippenhauer, Nils Ole
(2020)
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems.
Turrin, Federico and Erba, Alessandro and Tippenhauer, Nils Ole and Conti, Mauro
(2020)
A Statistical Analysis Framework for ICS Process Datasets.
Wan, Gerry and Izhikevich, Liz and Adrian, David and Yoshioka, Katsunari and Holz, Ralph and Rossow, Christian and Durumeric, Zakir
(2020)
On the Origin of Scanning: The Impact of Location on Internet-Wide Scans.
Fass, Aurore
(2020)
Studying JavaScript Security Through Static Analysis.
Doctoral thesis, Saarland University.
Sala, Massimiliano and Sogiorno, Domenica and Taufer, Daniele
(2020)
A Small Subgroup Attack on Bitcoin Address Generation.
Mathematics, 8 (10).
ISSN 2227-7390
Bushart, Jonas and Rossow, Christian
(2020)
Padding Ain’t Enough: Assessing the Privacy Guarantees of Encrypted DNS.
Schwarz, Fabian and Rossow, Christian
(2020)
SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients.
Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper
(2020)
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy.
ACM Transactions on Privacy and Security.
ISSN 2471-2566
Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper
(2020)
BIAS: Bluetooth Impersonation AttackS.
Zhao, Qingchuan and Zuo, Chaoshun and Brendan, Dolan-Gavitt and Pellegrino, Giancarlo and Lin, Zhiqiang
(2020)
Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.
Frassinelli, Daniel and Park, Sohyeon and Nürnberger, Stefan
(2020)
≪ I Know Where You Parked Last Summer ≫ Automated Reverse
Engineering and Privacy Analysis of Modern Cars.
Fass, Aurore and Backes, Michael and Stock, Ben
(2019)
JStap: A Static Pre-Filter for Malicious JavaScript Detection.
Fass, Aurore and Backes, Michael and Stock, Ben
(2019)
HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs.
Ghaeini, Hamid Reza and Chan, Matthew and Bahmani, Raad and Brasser, Ferdinand and Garcia, Luis and Zhou, Jianying and Sadeghi, Ahmad-Reza and Tippenhauer, Nils Ole and Zonouz, Saman
(2019)
PAtt: Physics-based Attestation of Control Systems.
Ghaeini, Hamid Reza and Tippenhauer, Nils Ole and Zhou, Jianying
(2019)
Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures.
Breitenbacher, Dominik and Homoliak, Ivan and Aung, Yan Lin and Tippenhauer, Nils Ole and Elovici, Yuval
(2019)
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices.
van Schaik, Stephan and Milburn, Alyssa and Österlund, Sebastian and Frigo, Pietro and Maisuradze, Giorgi and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano
(2019)
RIDL: Rogue In-flight Data Load.
Eskandarian, Saba and Cogan, Jonathan and Birnbaum, Sawyer and Brandon, Peh Chang Wei and Franke, Dillon and Fraser, Forest and Garcia, Gaspar and Gong, Eric and Nguyen, Hung T. and Sethi, Taresh K. and Subbiah, Vishal and Backes, Michael and Pellegrino, Giancarlo and Boneh, Dan
(2019)
Fidelius: Protecting User Secrets from Compromised Browsers.
Tambe, Amit and Aung, Yan Lin and Sridharan, Ragav and Ochoa, Martin and Tippenhauer, Nils Ole and Shabtai, Asaf and Elovici, Yuval
(2019)
Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots.
(In Press)
Chattopadhyay, Sudipta and Beck, Moritz and Rezine, Ahmed and Zeller, Andreas
(2019)
Quantifying the Information Leakage in Cache Attacks via Symbolic Execution.
ACM Trans. Embed. Comput. Syst., 18 (1).
Iacovazzi, Alfonso and Frassinelli, Daniel and Elovici, Yuval
(2019)
The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding.
Tippenhauer, Nils Ole
(2019)
Design and Realization of Testbeds for Security Research in the Industrial Internet of Things.
In:
Security and Privacy Trends in the Industrial Internet of Things.
Springer, Cham, pp. 287-310.
ISBN 978-3-030-12330-7
Giraldo, Jairo and Urbina, David and Cárdenas, Alvaro A. and Tippenhauer, Nils Ole
(2019)
Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems.
Walla, Sebastian and Rossow, Christian
(2019)
MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware.
(In Press)
Speicher, Patrick and Steinmetz, Marcel and Hoffmann, Jörg and Backes, Michael and Künnemann, Robert
(2019)
Towards Automated Network Mitigation Analysis.
Speicher, Patrick and Steinmetz, Marcel and Hoffmann, Jörg and Backes, Michael and Künnemann, Robert
(2019)
Towards Automated Network Mitigation Analysis (extended version).
Bushart, Jonas
(2018)
Optimizing Recurrent Pulsing Attacks using Application-Layer Amplification of Open DNS Resolvers.
Krupp, Johannes and Rossow, Christian
(2018)
teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts.
Maisuradze, Giorgi and Rossow, Christian
(2018)
Ret2Spec: Speculative Execution Using Return Stack Buffers.
Tanabe, Rui and Ueno, Wataru and Ishii, Kou and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Inoue, Daisuke and Rossow, Christian
(2018)
Evasive Malware via Identifier Implanting.
Bushart, Jonas and Rossow, Christian
(2018)
DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives.
Xu, Meng and Qian, Chenxiong and Lu, Kangjie and Backes, Michael and Kim, Taesoo
(2018)
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.
Yu, Jiangshan and Ryan, Mark and Cremers, Cas
(2018)
DECIM: Detecting Endpoint Compromise In Messaging.
IEEE Transactions on Information Forensics and Security, 13 (1).
pp. 106-118.
Frassinelli, Daniel and Gambi, Alessio and Nürnberger, Stefan and Park, Sohyeon
(2018)
DRiVERSITY - Synthetic Torture Testing to Find Limits of Autonomous Driving Algorithms.
Brengel, Michael and Rossow, Christian
(2018)
Identifying Key Leakage of Bitcoin Users.
(In Press)
Brengel, Michael and Rossow, Christian
(2018)
MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps.
Feltz, Michèle and Cremers, Cas
(2018)
Strengthening the Security of Authenticated Key Exchange against Bad Randomness.
Designs, Codes and Cryptography, 86 (3).
pp. 481-516.
Krupp, Johannes and Karami, Mohammad and Rossow, Christian and McCoy, Damon and Backes, Michael
(2017)
Linking Amplification DDoS Attacks to Booter Services.
Kampmann, Alexander
(2017)
Local Analysis for Global Inputs.
Simeonovski, Milivoj and Pellegrino, Giancarlo and Rossow, Christian and Backes, Michael
(2017)
Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals.
Maisuradze, Giorgi and Backes, Michael and Rossow, Christian
(2017)
Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code.
Lu, Kangjie and Walter, Marie-Therese and Pfaff, David and Nürnberger, Stefan and Lee, Wenke and Backes, Michael
(2017)
Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying.
Grosse, Kathrin and Papernot, Nicolas and Manoharan, Praveen and Backes, Michael and McDaniel, Patrick
(2017)
Adversarial Examples for Malware Detection.
Milner, Kevin and Cremers, Cas and Jiangshan, Yu and Ryan, Mark
(2017)
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications.
Jonker, Mattijs and King, Alistair and Krupp, Johannes and Rossow, Christian and Sperotto, Anna and Dainotti, Alberto
(2017)
Millions of Targets Under Attack: A Macroscopic Characterization of the DoS Ecosystem.
Grosse, Kathrin and Manoharan, Praveen and Papernot, Nicolas and Backes, Michael and McDaniel, Patrick
(2017)
On the (Statistical) Detection of Adversarial Examples.
CoRR, abs/17.
(Submitted)
Urbina, David and Giraldo, Jairo and Cardenas, Alvaro A. and Tippenhauer, Nils Ole and Valente, Junia and Faisal, Mustafa and Ruths, Justin and Candell, Richard and Sandberg, Henrik
(2016)
Limiting The Impact of Stealthy Attacks on Industrial Control Systems.
Krupp, Johannes and Backes, Michael and Rossow, Christian
(2016)
Identifying the Scan and Attack Infrastructures behind Amplification DDoS attacks.
Backes, Michael and Holz, Thorsten and Rossow, Christian and Rytilahti, Teemu and Simeonovski, Milivoj and Stock, Ben
(2016)
On the Feasibility of TTL-based Filtering for DRDoS Mitigation.
Maisuradze, Giorgi and Backes, Michael and Rossow, Christian
(2016)
What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses.
Nürnberger, Stefan and Rossow, Christian
(2016)
VatiCAN - Vetted, Authenticated CAN Bus.
Stock, Ben and Livshits, Benjamin and Zorn, Benjamin
(2016)
Kizzle: A Signature Compiler for Detecting Exploit Kits.
Brengel, Michael and Backes, Michael and Rossow, Christian
(2016)
Detecting Hardware-Assisted Virtualization.
Götzfried, Johannes and Müller, Tilo and Drescher, Gabor and Nürnberger, Stefan and Backes, Michael
(2016)
RamCrypt: Kernel-based Address Space Encryption for User-mode Processes.
Backes, Michael and Hammer, Christian and Pfaff, David and Skoruppa, Malte
(2016)
Implementation-level Analysis of the JavaScript Helios Voting Client.
Lu, Kangjie and Backes, Michael and Nürnberger, Stefan and Lee, Wenke
(2016)
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.
Gerling, Sebastian and Rossow, Christian
(2016)
Angreiferjagd im "Internet der Dinge".
Datenschutz und Datensicherheit, 40 (8).
pp. 507-510.
Paul, Wolfgang J. and Lutsyk, P and Oberhauser, J
(2016)
Multi-core System Architecture.
Technical Report.
UNSPECIFIED.
Yokoyama, Akira and Ishii, Kou and Tanabe, Rui and Papa, Yinmin and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Inoue, Daisuke and Brengel, Michael and Backes, Michael and Rossow, Christian
(2016)
SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
Karimi, M. and Tavakoli, E. and Farajtabar, Mehrdad and Song, Le and Gomez-Rodriguez, Manuel
(2016)
Smart Broadcasting: Do you want to be seen?
Pellegrino, Giancarlo and Catakoglu, Onur and Balzarotti, Davide and Rossow, Christian
(2016)
Uses and Abuses of Server-Side Requests.
Krämer, Lukas and Krupp, Johannes and Makita, Daisuke and Nishizoe, Tomomi and Koide, Takashi and Yoshioka, Katsunari and Rossow, Christian
(2015)
AmpPot: Monitoring and Defending Against Amplification DDoS Attacks.
Spier, Steffen
(2015)
Cold boot attacks and the error model of DRAM modules.
Bachelors thesis, Saarland University.
Pewny, Jannik and Garmany, Behrad and Gawlik, Robert and Rossow, Christian and Holz, Thorsten
(2015)
Cross-Architecture Bug Search in Binary Executables.
Pfaff, David and Hack, Sebastian and Hammer, Christian
(2015)
Learning How to Prevent Return-Oriented Programming Efficiently.
Pellegrino, Giancarlo and Rossow, Christian and Ryba, Fabrice J. and Schmidt, Thomas C. and Wählisch, Matthias
(2015)
Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics.
Kührer, Marc and Hupperich, Thomas and Bushart, Jonas and Rossow, Christian and Holz, Thorsten
(2015)
Going Wild: Large-Scale Classification of Open DNS Resolvers.
Pa, Yin Minn Pa and Suzuki, Shogo and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Rossow, Christian
(2015)
IoTPOT: Analysing the Rise of IoT Compromises.
Andriesse, Dennis and Rossow, Christian and Bos, Herbert
(2015)
Reliable Recon in Adversarial Peer-to-Peer Botnets.
Perl, Henning and Dechand, Sergej and Smith, Matthew and Arp, Daniel and Yamaguchi, Fabian and Rieck, Konrad and Fahl, Sascha and Acar, Yasemin
(2015)
Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits.
Karuppayah, Shankar and Roos, Stefanie and Rossow, Christian and Mühlhäuser, Max and Fischer, Mathias
(2015)
Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism.
Backes, Michael and Holz, Thorsten and Kollenda, Benjamin and Koppe, Philipp and Nürnberger, Stefan and Pewny, Jannik
(2014)
You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.
Kührer, Marc and Hupperich, Thomas and Rossow, Christian and Holz, Thorsten
(2014)
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks.
Blond, Stevens Le and Uritesc, Adina and Gilbert, Cedric and Chua, Zheng Leong and Saxena, Prateek and Kirda, Engin
(2014)
A Look at Targeted Attacks Through the Lense of an NGO.
Backes, Michael and Nürnberger, Stefan
(2014)
Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing.
Backes, Michael and Gerling, Rainer W. and Gerling, Sebastian and Nürnberger, Stefan and Schröder, Dominique and Simkin, Mark
(2014)
WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP.
Rossow, Christian
(2014)
Amplification Hell: Revisiting Network Protocols for DDoS Abuse.
Reischuk, Raphael M.
(2014)
Declarative Design and Enforcement for Secure Cloud Applications.
Doctoral thesis, Saarland University.
Kührer, Marc and Hupperich, Thomas and Rossow, Christian and Holz, Thorsten
(2014)
Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks.
Pewny, Jannik and Schuster, Felix and Bernhard, Lukas and Holz, Thorsten and Rossow, Christian
(2014)
Leveraging semantic signatures for bug search in binary programs.
Karuppayah, Shankar and Fischer, Mathias and Rossow, Christian and Mühlhäuser, Max
(2014)
On Advanced Monitoring in Resilient and Unstructured P2P Botnets.
Welzel, Arne and Rossow, Christian and Bos, Herbert
(2014)
On Measuring the Impact of DDoS Botnets.
Dmitrienko, Alexandra and Liebchen, Christopher and Rossow, Christian and Sadeghi, Ahmad-Reza
(2014)
On the (In)Security of Mobile Two-Factor Authentication.
Kührer, Marc and Rossow, Christian and Holz, Thorsten
(2014)
Paint it Black: Evaluating the Effectiveness of Malware Blacklists.
Pecina, Kim and Mohammadi, Esfandiar and Pöpper, Christina
(2014)
Zero-Communication Seed Establishment for Anti-Jamming Techniques.
Bleikertz, Sören and Bugiel, Sven and Ideler, Hugo and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2013)
Client-controlled Cryptography-as-a-Service in the Cloud.
Davi, Lucas Vincenzo and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2013)
Gadge Me if You Can: Secure and Efficient Ad-Hoc Instruction-Level Randomization for x86 and ARM.
Zhao, Mingchen and Aditya, Paarijaat and Chen, Ang and Lin, Yin and Haeberlen, Andreas and Druschel, Peter and Maggs, Bruce and Wishon, Bill and Ponec, Miroslav
(2013)
Peer-assisted Content Distribution in Akamai Netsession.
Gujarati, Arpan and Cerqueira, Felipe and Brandenburg, Björn B.
(2013)
Schedulability Analysis of the Linux Push and Pull Scheduler with Arbitrary Processor Affinities.
Santos, Nuno and Rodrigues, Rodrigo and Gummadi, Krishna P. and Saroiu, Stefan
(2012)
Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services.
Berrang, Pascal and Bogdoll, Jonathan and Hahn, Ernst Moritz and Hartmanns, Arnd and Hermanns, Holger
(2012)
Dependability Results for Power Grids with Decentralized Stabilization Strategies.
AVACS Technical Report (83).
ISSN 1860-9821
Basin, David and Cremers, Cas and Meier, Simon
(2012)
Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication.
Aditya, Paarijaat and Zhao, Mingchen and Lin, Yin and Haeberlen, Andreas and Druschel, Peter and Maggs, Bruce and Wishon, Bill
(2012)
Reliable Client Accounting for P2P-infrastructure Hybrids.
Asghar, Muhammad Rizwan and Ion, Mihaela and Russello, Giovanni and Crispo, Bruno
(2012)
Securing Data Provenance in the Cloud.
In:
UNSPECIFIED
Lecture Notes in Computer Science, 7039
.
Springer Berlin Heidelberg, pp. 145-160.
ISBN 978-3-642-27584-5
Davi, Lucas and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2012)
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
Bugiel, Sven and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas
(2011)
Twin Clouds: An Architecture for Secure Cloud Computing.
Li, Qi and Xu, Mingwei and Wu, Jianping and Zhang, Xinwen and Lee, Patrick P. C. and Xu, Ke
(2011)
Enhancing the Trust of Internet Routing with Lightweight Route Attestation.
Petrlic, Ronald
(2011)
Integrity Protection for Automated Teller Machines.
Jagadeesan, Radha and Pitcher, Corin and Rathke, Julian and Riely, James
(2011)
Local Memory via Layout Randomization.
Schlesinger, Cole and Pattabiraman, Karthik and Swamy, Nikhil and Walker, David and Zorn, Benjamin
(2011)
Modular Protections Against Non-control Data Attacks.
Kehuan, Zhang and Xiaoyong, Zhou and Yangyi, Chen and XiaoFeng, Wang and Yaoping, Ruan
(2011)
Sedic: Privacy-Aware Data Intensive Computing on Hybrid Clouds.
Bugiel, Sven and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas
(2011)
Twin Clouds: Secure Cloud Computing with Low Latency.
Backes, Michael and Grochulla, Martin and Hriţcu, Cătălin and Maffei, Matteo
(2009)
Achieving Security Despite Compromise Using Zero-knowledge.
This list was generated on Sat Dec 21 05:15:20 2024 CET.