Browse by Research Area

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 166.

Zhang, Ruiyi and Gerlach, Lukas and Weber, Daniel and Hetterich, Lorenz and Lü, Youheng and Kogler, Andreas and Schwarz, Michael
(2024) CacheWarp: Software-based Fault Injection using Selective State Reset.
In: USENIX Security.
Conference: USENIX-Security Usenix Security Symposium

Gerlach, Lukas and Schwarz, Simon and Faroß, Nicolas and Schwarz, Michael
(2024) Efficient and Generic Microarchitectural Hash-Function Recovery.
In: S&P.
Conference: SP IEEE Symposium on Security and Privacy

Weber, Daniel and Thomas, Fabian and Gerlach, Lukas and Zhang, Ruiyi and Schwarz, Michael
(2023) Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks.
In: ESORICS.
Conference: ESORICS European Symposium On Research In Computer Security

Bushart, Jonas and Rossow, Christian
(2023) ResolFuzz: Differential Fuzzing of DNS Resolvers.
In: ESORICS.
Conference: ESORICS European Symposium On Research In Computer Security

Weber, Daniel and Thomas, Fabian and Gerlach, Lukas and Zhang, Ruiyi and Schwarz, Michael
(2023) Reviving Meltdown 3a.
In: ESORICS.
Conference: ESORICS European Symposium On Research In Computer Security

Gerlach, Lukas and Thomas, Fabian and Pietsch, Robert and Schwarz, Michael
(2023) A Rowhammer Reproduction Study Using the Blacksmith Fuzzer.
In: ESORICS.
Conference: ESORICS European Symposium On Research In Computer Security

Bars, Nils and Schloegel, Moritz and Scharnowski, Tobias and Schiller, Nico and Holz, Thorsten
(2023) Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Morio, Kevin and Esiyok, Ilkan and Jackson, Dennis and Künnemann, Robert
(2023) Automated Security Analysis of Exposure Notification Systems.
In: 32st USENIX Security Symposium (USENIX Security 23), 2023, Anaheim, CA.
Conference: USENIX-Security Usenix Security Symposium
(In Press)

Kogler, Andreas and Juffinger, Jonas and Giner, Lukas and Gerlach, Lukas and Schwarzl, Martin and Schwarz, Michael and Gruss, Daniel and Mangard, Stefan
(2023) Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Zhang, Ruiyi and Kim, Taehyun and Weber, Daniel and Schwarz, Michael
(2023) (M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels.
In: USENIX Security.
Conference: USENIX-Security Usenix Security Symposium

Nicolae, Maria-Irina and Eisele, Max and Zeller, Andreas
(2023) Revisiting Neural Program Smoothing for Fuzzing.
In: ESEC/FSE 2023, Sun 3 - Sat 9 December 2023, San Francisco, California, United States.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (formerly listed as ESEC)
(In Press)

Bushart, Jonas and Rossow, Christian
(2023) Anomaly-based Filtering of Application-Layer DDoS Against DNS Authoritatives.
In: 8th IEEE European Symposium on Security and Privacy, 2023-07-03/2023-07-07, Delft.
Conference: EuroS&P IEEE European Symposium on Security and Privacy
(Submitted)

Schlüter, Till and Choudhari, Amit and Hetterich, Lorenz and Trampert, Leon and Nemati, Hamed and Ibrahim, Ahmad and Schwarz, Michael and Rossow, Christian and Tippenhauer, Nils Ole
(2023) FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers.
In: CCS 2023, 26-30 Nov 2023, Copenhagen, Denmark.
Conference: CCS ACM Conference on Computer and Communications Security

Erba, Alessandro and Tippenhauer, Nils Ole
(2023) White-box Concealment Attacks Against Anomaly Detectors for Cyber-Physical Systems.
In: Proceedings of Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA).
Conference: DIMVA GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Gerlach, Lukas and Weber, Daniel and Zhang, Ruiyi and Schwarz, Michael
(2023) A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs.
In: 44th IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

Willbold, Johannes and Schloegel, Moritz and Vögele, Manuel and Gerhardt, Maximilian and Holz, Thorsten and Abbasi, Ali
(2023) Space Odyssey: An Experimental Software Security Analysis of Satellites.
In: IEEE Symposium on Security and Privacy, San Francisco, USA.
Conference: UNSPECIFIED

Eisele, Max and Ebert, Daniel and Huth, Christopher and Zeller, Andreas
(2023) Fuzzing Embedded Systems Using Debug Interfaces.
In: ISSTA 2023, 17-21 July 2023, Seattle, USA.
Conference: ISSTA International Symposium on Software Testing and Analysis
(In Press)

Borrello, Pietro and Easdon, Catherine and Schwarzl, Martin and Czerny, Roland and Schwarz, Michael
(2023) CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode.
In: WOOT.
Conference: WOOT USENIX Workshop on Offensive Technologies

Thomas, Fabian and Gerlach, Lukas and Schwarz, Michael
(2023) Hammulator: Simulate Now - Exploit Later.
In: 3rd Workshop on DRAM Security.
Conference: UNSPECIFIED

Schwarzl, Martin and Borrello, Pietro and Saileshwar, Gururaj and Müller, Hanna and Schwarz, Michael and Gruss, Daniel
(2023) Practical Timing Side-Channel Attacks on Memory Compression.
In: IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

Cogliati, Benoît-Michel and Ethan, Jordan and Jha, Ashwin
(2023) Subverting Telegram's End-to-End Encryption.
IACR Transactions on Symmetric Cryptology, 2023 (1). pp. 5-40. ISSN 2519-173X

Bauer, Markus and Grishchenko, Ilya and Rossow, Christian
(2022) TyPro: Forward CFI for C-Style Indirect Function Calls Using Type Propagation.
In: Annual Computer Security Applications Conference (ACSAC 2022), December 5-9, 2022, Austin, Texas, USA.
Conference: ACSAC Annual Computer Security Applications Conference
(In Press)

Wüst, Karl and Kostiainen, Kari and Delius, Noah and Capkun, Srdjan
(2022) Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation.
In: 29th ACM Conference on Computer and Communications Security (CCS), 7-11 Nov 2022, Los Angeles, U.S.A..
Conference: CCS ACM Conference on Computer and Communications Security

Karvandi, Mohammad Sina and Gholamrezaei, MohammadHossein and Monfared, Saleh Khalaj and Meghdadizanjani, Soroush and Abbassi, Behrooz and Amini, Ali and Mortazavi, Reza and Gorgin, Saeid and Rahmati, Dara and Schwarz, Michael
(2022) HyperDbg: Reinventing Hardware-Assisted Debugging.
In: CCS.
Conference: CCS ACM Conference on Computer and Communications Security

Bernhard, Lukas and Scharnowski, Tobias and Schloegel, Moritz and Blazytko, Tim and Holz, Thorsten
(2022) Jit-Picking: Differential Fuzzing of JavaScript Engines.
In: CCS 2022.
Conference: CCS ACM Conference on Computer and Communications Security

Erba, Alessandro and Müller, Anne and Tippenhauer, Nils Ole
(2022) Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems.
In: 4th Workshop on CPS & IoT Security and Privacy (CPSIoTSec '22), November 7, 2022, Los Angeles, CA, USA.
Conference: UNSPECIFIED

Schwarz, Fabian
(2022) TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using ARM TrustZone.
In: 25th International Symposium on Research in Attacks, Intrusions and Defenses, 26-28 Oct 2022, Limassol, Cyprus.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)
(In Press)

Trampert, Leon and Rossow, Christian and Schwarz, Michael
(2022) Browser-based CPU Fingerprinting.
In: 27th European Symposium on Research in Computer Security (ESORICS) 2022, 26-30 Sep 2022, Copenhagen, Denmark.
Conference: ESORICS European Symposium On Research In Computer Security
(In Press)

Rokicki, Thomas and Maurice, Clémentine and Schwarz, Michael
(2022) CPU Port Contention Without SMT.
In: ESORICS 2022.
Conference: ESORICS European Symposium On Research In Computer Security

Schwarzl, Martin and Borrello, Pietro and Kogler, Andreas and Varda, Kenton and Schuster, Thomas and Gruss, Daniel and Schwarz, Michael
(2022) Robust and Scalable Process Isolation against Spectre in the Cloud.
In: ESORICS.
Conference: ESORICS European Symposium On Research In Computer Security

Krupp, Johannes and Grishchenko, Ilya and Rossow, Christian
(2022) AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities.
In: USENIX Security Symposium (USENIX Security), 2022..
Conference: USENIX-Security Usenix Security Symposium

Schloegel, Moritz and Blazytko, Tim and Contag, Moritz and Aschermann, Cornelius and Basler, Julius and Holz, Thorsten and Abbasi, Ali
(2022) Loki: Hardening Code Obfuscation Against Automated Attacks.
In: USENIX Security Symposium (USENIX Security), 2022..
Conference: USENIX-Security Usenix Security Symposium

Cloosters, Tobias and Willbold, Johannes and Holz, Thorsten and Davi, Lucas
(2022) SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing.
In: USENIX Security Symposium (USENIX Security), 2022..
Conference: USENIX-Security Usenix Security Symposium

Borrello, Pietro and Kogler, Andreas and Schwarzl, Martin and Lipp, Moritz and Gruss, Daniel and Schwarz, Michael
(2022) ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Lipp, Moritz and Gruss, Daniel and Schwarz, Michael
(2022) AMD Prefetch Attacks through Power and Time.
In: 31st USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Scharnowski, Tobias and Bars, Nils and Schloegel, Moritz and Gustafson, Eric and Muench, Marius and Vigna, Giovanni and Kruegel, Christopher and Holz, Thorsten and Abbasi, Ali
(2022) Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing.
In: 31st USENIX Security Symposium (USENIX Security 22).
Conference: USENIX-Security Usenix Security Symposium

Han, Yi and Chan, Matthew and Aref, Zahra and Tippenhauer, Nils Ole and Zonouz, Saman
(2022) Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring.
In: USENIX Security Symposium (USENIX Security).
Conference: USENIX-Security Usenix Security Symposium

Ibrahim, Ahmad and Nemati, Hamed and Schlüter, Till and Tippenhauer, Nils Ole and Rossow, Christian
(2022) Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels.
In: CCS 2022, 7-11 Nov 2022, Los Angeles, CA, USA.
Conference: CCS ACM Conference on Computer and Communications Security

Kogler, Andreas and Gruss, Daniel and Schwarz, Michael
(2022) Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks.
In: 31st USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Easdon, Catherine and Schwarz, Michael and Schwarzl, Martin and Gruss, Daniel
(2022) Rapid Prototyping for Microarchitectural Attacks.
In: 31st USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Giner, Lukas and Kogler, Andreas and Canella, Claudio and Schwarz, Michael and Gruss, Daniel
(2022) Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.
In: 31st USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Sala, Massimiliano and Taufer, Daniele
(2022) A survey on the group of points arising from elliptic curves with a Weierstrass model over a ring.
International Journal of Group Theory. ISSN 2251-7669
(In Press)

Bernhard, Lukas and Rodler, Michael and Holz, Thorsten and Davi, Lucas
(2022) xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64.
In: IEEE EuroS&P 2022, June 6-10, 2022, Genoa, Italy.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Hetterich, Lorenz and Schwarz, Michael
(2022) Branch Different - Spectre Attacks on Apple Silicon.
In: DIMVA.
Conference: DIMVA GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Kogler, Andreas and Weber, Daniel and Haubenwallner, Martin and Lipp, Moritz and Gruss, Daniel and Schwarz, Michael
(2022) Finding and Exploiting CPU Features using MSR Templating.
In: 43rd IEEE Symposium on Security and Privacy (S&P '22).
Conference: SP IEEE Symposium on Security and Privacy

Schumilo, Sergej and Aschermann, Cornelius and Jemmett, Andrea and Abbasi, Ali and Holz, Thorsten
(2022) Nyx-Net: Network Fuzzing with Incremental Snapshots.
In: EuroSys 2022, April 5-8, 2022, Rennes, France.
Conference: EuroSys Eurosys Conference

Eisele, Max
(2022) Debugger-driven Embedded Fuzzing.
In: ICST 2022.
Conference: ICST International Conference on Software Testing, Verification and Validation

Tippenhauer, Nils Ole and Chen, Binbin and Mashima, Daisuke and Nicol, David M.
(2021) vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation.
In: Workshop on CPS&IoT Security and Privacy (CPSIoTSec).
Conference: UNSPECIFIED

Canella, Claudio and Werner, Mario and Gruss, Daniel and Schwarz, Michael
(2021) Automating Seccomp Filter Generation for Linux Applications.
In: CCSW.
Conference: CCSW ACM Cloud Computing Security Workshop

van der Toorn, Olivier and Krupp, Johannes and Jonker, Mattijs and van Rijswijk-Deij, Roland and Rossow, Christian and Sperotto, Anna
(2021) ANYway: Measuring the Amplification DDoS Potential of Domains.
In: 17th International Conference on Network and Service Management.
Conference: CNSM International Conference on Network and Service Management (amalgamation of DSOM and related workshops from 2010)

Krupp, Johannes and Rossow, Christian
(2021) BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks.
In: 6th IEEE European Symposium on Security and Privacy, September 7-11, 2021, Vienna, Austria.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Brengel, Michael and Rossow, Christian
(2021) YarIx: Scalable YARA-based Malware Intelligence.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Wu, Jianliang and Wu, Ruoyu and Antonioli, Daniele and Payer, Mathias and Tippenhauer, Nils Ole and Xu, Dongyan and Tian, Dave (Jing) and Bianchi, Antonio
(2021) LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks.
In: Proceedings of the USENIX Security Symposium (USENIX Security).
Conference: USENIX-Security Usenix Security Symposium

Weber, Daniel and Ibrahim, Ahmad and Nemati, Hamed and Schwarz, Michael and Rossow, Christian
(2021) Osiris: Automated Discovery of Microarchitectural Side Channels.
In: 30th USENIX Security Symposium (USENIX Security '21), 11-13 August, 2021.
Conference: USENIX-Security Usenix Security Symposium
(In Press)

Barbieri, Giovanni and Conti, Mauro and Tippenhauer, Nils Ole and Turrin, Federico
(2021) Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis.
In: 30th International Conference on Computer Communications and Networks, ICCCN 2021, Athens, Greece, July 19-22, 2021.
Conference: UNSPECIFIED

Lipp, Moritz and Kogler, Andreas and Oswald, David and Schwarz, Michael and Easdon, Catherine and Canella, Claudio and Gruss, Daniel
(2021) PLATYPUS: Software-based Power Side-Channel Attacks on x86.
In: 2021 IEEE Symposium on Security and Privacy (SP).
Conference: SP IEEE Symposium on Security and Privacy

Bauer, Markus and Rossow, Christian
(2021) Cali: Compiler Assisted Library Isolation.
In: AsiaCCS 2021, 7-11 Jun 2021, Hong Kong, Hong Kong.
Conference: ASIACCS ACM ASIA Conference on Computer and Communications Security
(In Press)

Schwarzl, Martin and Canella, Claudio and Gruss, Daniel and Schwarz, Michael
(2021) Specfuscator: Evaluating Branch Removal as a Spectre Mitigation.
In: Financial Cryptography and Data Security 2021.
Conference: FC Financial Cryptography and Data Security Conference

Schwarzl, Martin and Schuster, Thomas and Schwarz, Michael and Gruss, Daniel
(2021) Speculative Dereferencing of Registers: Reviving Foreshadow.
In: Financial Cryptography and Data Security 2021.
Conference: FC Financial Cryptography and Data Security Conference

Bauer, Markus and Rossow, Christian
(2021) NoVT: Eliminating C++ Virtual Calls to Mitigate Vtable Hijacking.
In: 6th IEEE European Symposium on Security and Privacy, September 7-11, 2021, Vienna, Austria.
Conference: EuroS&P IEEE European Symposium on Security and Privacy
(In Press)

Alsoliman, Anas and Rigoni, Giulio and Levorato, Marco and Pinotti, Cristina and Tippenhauer, Nils Ole and Conti, Mauro
(2021) COTS Drone Detection Using Video Streaming Characteristics.
In: International Conference on Distributed Computing and Networking.
Conference: ICDCN International Conference on Distributed Computing and Networking

Reen, Gaganjeet Singh and Rossow, Christian
(2020) DPIFuzz: A Differential Fuzzing Frameworkto Detect DPI Elusion Strategies for QUIC.
In: Annual Computer Security Applications Conference (ACSAC 2020).
Conference: ACSAC Annual Computer Security Applications Conference

Brengel, Michael and Rossow, Christian
(2020) xOSSig: Leveraging OS Diversity to Automatically Extract Malware Code Signatures.
In: Botconf, Dec 1-4, 2020, (online).
Conference: UNSPECIFIED

Erba, Alessandro and Taormina, Riccardo and Galelli, Stefano and Pogliani, Marcello and Carminati, Michele and Zanero, Stefano and Tippenhauer, Nils Ole
(2020) Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems.
In: Proceedings of the Annual Computer Security Applications Conference (ACSAC).
Conference: ACSAC Annual Computer Security Applications Conference

Turrin, Federico and Erba, Alessandro and Tippenhauer, Nils Ole and Conti, Mauro
(2020) A Statistical Analysis Framework for ICS Process Datasets.
In: Proceedings of the Joint Workshop on CPS&IoT Security and Privacy (CPSIOTSEC’20).
Conference: ECCV European Conference on Computer Vision

Wan, Gerry and Izhikevich, Liz and Adrian, David and Yoshioka, Katsunari and Holz, Ralph and Rossow, Christian and Durumeric, Zakir
(2020) On the Origin of Scanning: The Impact of Location on Internet-Wide Scans.
In: 2020 ACM SIGCOMM Internet Measurement Conference, October 27-29, 2020, Virtual Event.
Conference: IMC Internet Measurement Conference

Fass, Aurore
(2020) Studying JavaScript Security Through Static Analysis.
Doctoral thesis, Saarland University.

Sala, Massimiliano and Sogiorno, Domenica and Taufer, Daniele
(2020) A Small Subgroup Attack on Bitcoin Address Generation.
Mathematics, 8 (10). ISSN 2227-7390

Bushart, Jonas and Rossow, Christian
(2020) Padding Ain’t Enough: Assessing the Privacy Guarantees of Encrypted DNS.
In: 10th USENIX Workshop on Free and Open Communications on the Internet, 2020-08-11.
Conference: FOCI USENIX Workshop on Free and Open Communications on the Internet

Schwarz, Fabian and Rossow, Christian
(2020) SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients.
In: 29th USENIX Security Symposium (USENIX Security 20).
Conference: USENIX-Security Usenix Security Symposium

Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper
(2020) Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy.
ACM Transactions on Privacy and Security. ISSN 2471-2566

Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper
(2020) BIAS: Bluetooth Impersonation AttackS.
In: Proceedings of the IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Zhao, Qingchuan and Zuo, Chaoshun and Brendan, Dolan-Gavitt and Pellegrino, Giancarlo and Lin, Zhiqiang
(2020) Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.
In: IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

Frassinelli, Daniel and Park, Sohyeon and Nürnberger, Stefan
(2020) ≪ I Know Where You Parked Last Summer ≫ Automated Reverse Engineering and Privacy Analysis of Modern Cars.
In: S&P - IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

Fass, Aurore and Backes, Michael and Stock, Ben
(2019) JStap: A Static Pre-Filter for Malicious JavaScript Detection.
In: Annual Computer Security Applications Conference (ACSAC 2019).
Conference: ACSAC Annual Computer Security Applications Conference

Fass, Aurore and Backes, Michael and Stock, Ben
(2019) HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs.
In: ACM Conference on Computer and Communications Security (CCS 2019).
Conference: CCS ACM Conference on Computer and Communications Security

Ghaeini, Hamid Reza and Chan, Matthew and Bahmani, Raad and Brasser, Ferdinand and Garcia, Luis and Zhou, Jianying and Sadeghi, Ahmad-Reza and Tippenhauer, Nils Ole and Zonouz, Saman
(2019) PAtt: Physics-based Attestation of Control Systems.
In: Proceedings of International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Ghaeini, Hamid Reza and Tippenhauer, Nils Ole and Zhou, Jianying
(2019) Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures.
In: International Conference on Availability, Reliability and Security (ARES).
Conference: ARES International Conference on Availability, Reliability and Security

Breitenbacher, Dominik and Homoliak, Ivan and Aung, Yan Lin and Tippenhauer, Nils Ole and Elovici, Yuval
(2019) HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices.
In: AsiaCCS.
Conference: ASIACCS ACM ASIA Conference on Computer and Communications Security

van Schaik, Stephan and Milburn, Alyssa and Österlund, Sebastian and Frigo, Pietro and Maisuradze, Giorgi and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano
(2019) RIDL: Rogue In-flight Data Load.
In: 40th IEEE Symposium on Security and Privacy, 20-22 May 2019, San Francisco, USA.
Conference: SP IEEE Symposium on Security and Privacy

Eskandarian, Saba and Cogan, Jonathan and Birnbaum, Sawyer and Brandon, Peh Chang Wei and Franke, Dillon and Fraser, Forest and Garcia, Gaspar and Gong, Eric and Nguyen, Hung T. and Sethi, Taresh K. and Subbiah, Vishal and Backes, Michael and Pellegrino, Giancarlo and Boneh, Dan
(2019) Fidelius: Protecting User Secrets from Compromised Browsers.
In: S&P 2019.
Conference: SP IEEE Symposium on Security and Privacy

Tambe, Amit and Aung, Yan Lin and Sridharan, Ragav and Ochoa, Martin and Tippenhauer, Nils Ole and Shabtai, Asaf and Elovici, Yuval
(2019) Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots.
In: ACM Conference on Data and Application Security and Privacy (CODASPY).
Conference: CODASPY ACM Conference on Data and Application Security and Privacy
(In Press)

Chattopadhyay, Sudipta and Beck, Moritz and Rezine, Ahmed and Zeller, Andreas
(2019) Quantifying the Information Leakage in Cache Attacks via Symbolic Execution.
ACM Trans. Embed. Comput. Syst., 18 (1).

Iacovazzi, Alfonso and Frassinelli, Daniel and Elovici, Yuval
(2019) The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding.
In: 22nd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2019, Chaoyang District, Beijing, China, September 23-25, 2019..
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Tippenhauer, Nils Ole
(2019) Design and Realization of Testbeds for Security Research in the Industrial Internet of Things.
In: Security and Privacy Trends in the Industrial Internet of Things. Springer, Cham, pp. 287-310. ISBN 978-3-030-12330-7

Giraldo, Jairo and Urbina, David and Cárdenas, Alvaro A. and Tippenhauer, Nils Ole
(2019) Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems.
In: International Conference on Applied Cryptography and Network Security (ACNS).
Conference: ACNS International Conference on Applied Cryptography and Network Security

Walla, Sebastian and Rossow, Christian
(2019) MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware.
In: 4th IEEE European Symposium on Security and Privacy, 17-19 June 2019, Stockholm, Sweden.
Conference: EuroS&P IEEE European Symposium on Security and Privacy
(In Press)

Speicher, Patrick and Steinmetz, Marcel and Hoffmann, Jörg and Backes, Michael and Künnemann, Robert
(2019) Towards Automated Network Mitigation Analysis.
In: The 34th ACM/SIGAPP Symposium On Applied Computing, Limassol, Cyprus.
Conference: SAC ACM Symposium on Applied Computing

Speicher, Patrick and Steinmetz, Marcel and Hoffmann, Jörg and Backes, Michael and Künnemann, Robert
(2019) Towards Automated Network Mitigation Analysis (extended version).
In: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing.
Conference: SAC ACM Symposium on Applied Computing

Bushart, Jonas
(2018) Optimizing Recurrent Pulsing Attacks using Application-Layer Amplification of Open DNS Resolvers.
In: 12th USENIX Workshop on Offensive Technologies (WOOT 18).
Conference: WOOT USENIX Workshop on Offensive Technologies

Krupp, Johannes and Rossow, Christian
(2018) teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts.
In: 27th USENIX Security Symposium (USENIX Security 18), 15-17 Aug 2018, Baltimore MD.
Conference: USENIX-Security Usenix Security Symposium

Maisuradze, Giorgi and Rossow, Christian
(2018) Ret2Spec: Speculative Execution Using Return Stack Buffers.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 15-19 Oct 2018, Toronto, Canada.
Conference: CCS ACM Conference on Computer and Communications Security

Tanabe, Rui and Ueno, Wataru and Ishii, Kou and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Inoue, Daisuke and Rossow, Christian
(2018) Evasive Malware via Identifier Implanting.
In: 13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 28-29 June 2018, Paris-Saclay.
Conference: DIMVA GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Bushart, Jonas and Rossow, Christian
(2018) DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives.
In: Proceedings of the 21th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Xu, Meng and Qian, Chenxiong and Lu, Kangjie and Backes, Michael and Kim, Taesoo
(2018) Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.
In: In Proceedings of the 39th IEEE Symposium on Security and Privacy (Oakland). San Francisco, CA, May 2018..
Conference: SP IEEE Symposium on Security and Privacy

Yu, Jiangshan and Ryan, Mark and Cremers, Cas
(2018) DECIM: Detecting Endpoint Compromise In Messaging.
IEEE Transactions on Information Forensics and Security, 13 (1). pp. 106-118.

Frassinelli, Daniel and Gambi, Alessio and Nürnberger, Stefan and Park, Sohyeon
(2018) DRiVERSITY - Synthetic Torture Testing to Find Limits of Autonomous Driving Algorithms.
In: ACM Computer Science in Cars Conference.
Conference: CSCS ACM Computer Science in Cars Symposium

Brengel, Michael and Rossow, Christian
(2018) Identifying Key Leakage of Bitcoin Users.
In: Proceedings of the Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)
(In Press)

Brengel, Michael and Rossow, Christian
(2018) MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps.
In: Proceedings of the Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA).
Conference: DIMVA GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Feltz, Michèle and Cremers, Cas
(2018) Strengthening the Security of Authenticated Key Exchange against Bad Randomness.
Designs, Codes and Cryptography, 86 (3). pp. 481-516.

Krupp, Johannes and Karami, Mohammad and Rossow, Christian and McCoy, Damon and Backes, Michael
(2017) Linking Amplification DDoS Attacks to Booter Services.
In: International Symposium on Research in Attacks, Intrusions, and Defenses, September 18-20, 2017, Atlanta, GA, USA.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Kampmann, Alexander
(2017) Local Analysis for Global Inputs.
In: 39th International Symposium on Software Engineering, May 20-28, 2017, Buenos Aires.

Simeonovski, Milivoj and Pellegrino, Giancarlo and Rossow, Christian and Backes, Michael
(2017) Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals.
In: Proc. of the 26rd International Conference on World Wide Web (WWW 2017).
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Maisuradze, Giorgi and Backes, Michael and Rossow, Christian
(2017) Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code.
In: Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17).
Conference: NDSS Network and Distributed System Security Symposium

Lu, Kangjie and Walter, Marie-Therese and Pfaff, David and Nürnberger, Stefan and Lee, Wenke and Backes, Michael
(2017) Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying.
In: Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17).
Conference: NDSS Network and Distributed System Security Symposium

Grosse, Kathrin and Papernot, Nicolas and Manoharan, Praveen and Backes, Michael and McDaniel, Patrick
(2017) Adversarial Examples for Malware Detection.
In: Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II.
Conference: ESORICS European Symposium On Research In Computer Security

Milner, Kevin and Cremers, Cas and Jiangshan, Yu and Ryan, Mark
(2017) Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications.
In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Jonker, Mattijs and King, Alistair and Krupp, Johannes and Rossow, Christian and Sperotto, Anna and Dainotti, Alberto
(2017) Millions of Targets Under Attack: A Macroscopic Characterization of the DoS Ecosystem.
In: Proceedings of the 2017 Internet Measurement Conference.
Conference: IMC Internet Measurement Conference

Grosse, Kathrin and Manoharan, Praveen and Papernot, Nicolas and Backes, Michael and McDaniel, Patrick
(2017) On the (Statistical) Detection of Adversarial Examples.
CoRR, abs/17.
(Submitted)

Urbina, David and Giraldo, Jairo and Cardenas, Alvaro A. and Tippenhauer, Nils Ole and Valente, Junia and Faisal, Mustafa and Ruths, Justin and Candell, Richard and Sandberg, Henrik
(2016) Limiting The Impact of Stealthy Attacks on Industrial Control Systems.
In: ACM Conference on Computer and Communications Security (CCS), Vienna, Austria.
Conference: CCS ACM Conference on Computer and Communications Security

Krupp, Johannes and Backes, Michael and Rossow, Christian
(2016) Identifying the Scan and Attack Infrastructures behind Amplification DDoS attacks.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Holz, Thorsten and Rossow, Christian and Rytilahti, Teemu and Simeonovski, Milivoj and Stock, Ben
(2016) On the Feasibility of TTL-based Filtering for DRDoS Mitigation.
In: RAID 2016, 19th International Symposium on Research in Attacks, Intrusions and Defenses.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Maisuradze, Giorgi and Backes, Michael and Rossow, Christian
(2016) What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Nürnberger, Stefan and Rossow, Christian
(2016) VatiCAN - Vetted, Authenticated CAN Bus.
In: . Conference on Cryptographic Hardware and Embedded Systems (CHES).
Conference: CHES Workshop on Cryptographic Hardware and Embedded Systems

Stock, Ben and Livshits, Benjamin and Zorn, Benjamin
(2016) Kizzle: A Signature Compiler for Detecting Exploit Kits.
In: The 46th Annual IEEE/IFIP Conference on Dependable Systems and Networks.
Conference: DSN IEEE/IFIP International Conference on Dependable Systems and Networks

Brengel, Michael and Backes, Michael and Rossow, Christian
(2016) Detecting Hardware-Assisted Virtualization.
In: Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings.

Götzfried, Johannes and Müller, Tilo and Drescher, Gabor and Nürnberger, Stefan and Backes, Michael
(2016) RamCrypt: Kernel-based Address Space Encryption for User-mode Processes.
In: ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS).

Backes, Michael and Hammer, Christian and Pfaff, David and Skoruppa, Malte
(2016) Implementation-level Analysis of the JavaScript Helios Voting Client.
In: Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC 2016.

Lu, Kangjie and Backes, Michael and Nürnberger, Stefan and Lee, Wenke
(2016) How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.
In: Proceedings of the 23rd Annual Symposium on Network and Distributed System Security (NDSS '16).
Conference: NDSS Network and Distributed System Security Symposium

Gerling, Sebastian and Rossow, Christian
(2016) Angreiferjagd im "Internet der Dinge".
Datenschutz und Datensicherheit, 40 (8). pp. 507-510.

Paul, Wolfgang J. and Lutsyk, P and Oberhauser, J
(2016) Multi-core System Architecture.
Technical Report. UNSPECIFIED.

Yokoyama, Akira and Ishii, Kou and Tanabe, Rui and Papa, Yinmin and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Inoue, Daisuke and Brengel, Michael and Backes, Michael and Rossow, Christian
(2016) SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
In: Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Karimi, M. and Tavakoli, E. and Farajtabar, Mehrdad and Song, Le and Gomez-Rodriguez, Manuel
(2016) Smart Broadcasting: Do you want to be seen?
In: Proc. of the 22nd ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'16).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Pellegrino, Giancarlo and Catakoglu, Onur and Balzarotti, Davide and Rossow, Christian
(2016) Uses and Abuses of Server-Side Requests.
In: Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2016.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Krämer, Lukas and Krupp, Johannes and Makita, Daisuke and Nishizoe, Tomomi and Koide, Takashi and Yoshioka, Katsunari and Rossow, Christian
(2015) AmpPot: Monitoring and Defending Against Amplification DDoS Attacks.
In: Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Spier, Steffen
(2015) Cold boot attacks and the error model of DRAM modules.
Bachelors thesis, Saarland University.

Pewny, Jannik and Garmany, Behrad and Gawlik, Robert and Rossow, Christian and Holz, Thorsten
(2015) Cross-Architecture Bug Search in Binary Executables.
In: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Pfaff, David and Hack, Sebastian and Hammer, Christian
(2015) Learning How to Prevent Return-Oriented Programming Efficiently.
In: Engineering Secure Software and Systems.

Pellegrino, Giancarlo and Rossow, Christian and Ryba, Fabrice J. and Schmidt, Thomas C. and Wählisch, Matthias
(2015) Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics.
In: 9th USENIX Workshop on Offensive Technologies (WOOT 15).

Kührer, Marc and Hupperich, Thomas and Bushart, Jonas and Rossow, Christian and Holz, Thorsten
(2015) Going Wild: Large-Scale Classification of Open DNS Resolvers.
In: Proc. of the 2015 Internet Measurement Conference (IMC'15).
Conference: IMC Internet Measurement Conference

Pa, Yin Minn Pa and Suzuki, Shogo and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Rossow, Christian
(2015) IoTPOT: Analysing the Rise of IoT Compromises.
In: 9th USENIX Workshop on Offensive Technologies (WOOT 15).

Andriesse, Dennis and Rossow, Christian and Bos, Herbert
(2015) Reliable Recon in Adversarial Peer-to-Peer Botnets.
In: Proc. of the 2015 Internet Measurement Conference (IMC'15).
Conference: IMC Internet Measurement Conference

Perl, Henning and Dechand, Sergej and Smith, Matthew and Arp, Daniel and Yamaguchi, Fabian and Rieck, Konrad and Fahl, Sascha and Acar, Yasemin
(2015) Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits.
In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Karuppayah, Shankar and Roos, Stefanie and Rossow, Christian and Mühlhäuser, Max and Fischer, Mathias
(2015) Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism.
In: Proc. of the 35th IEEE International Conference on Distributed Computing Systems (ICDCS'15).
Conference: ICDCS International Conference on Distributed Computing Systems

Backes, Michael and Holz, Thorsten and Kollenda, Benjamin and Koppe, Philipp and Nürnberger, Stefan and Pewny, Jannik
(2014) You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.
In: Proceedings of the 21st ACM conference on Computer and Communications Security (ACM CCS '14).
Conference: CCS ACM Conference on Computer and Communications Security

Kührer, Marc and Hupperich, Thomas and Rossow, Christian and Holz, Thorsten
(2014) Exit from Hell? Reducing the Impact of Amplification DDoS Attacks.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

Blond, Stevens Le and Uritesc, Adina and Gilbert, Cedric and Chua, Zheng Leong and Saxena, Prateek and Kirda, Engin
(2014) A Look at Targeted Attacks Through the Lense of an NGO.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

Backes, Michael and Nürnberger, Stefan
(2014) Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

Backes, Michael and Gerling, Rainer W. and Gerling, Sebastian and Nürnberger, Stefan and Schröder, Dominique and Simkin, Mark
(2014) WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP.
In: 12th International Conference on Applied Cryptography and Network Security (ACNS 2014).

Rossow, Christian
(2014) Amplification Hell: Revisiting Network Protocols for DDoS Abuse.
In: Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS '14).
Conference: NDSS Network and Distributed System Security Symposium

Reischuk, Raphael M.
(2014) Declarative Design and Enforcement for Secure Cloud Applications.
Doctoral thesis, Saarland University.

Kührer, Marc and Hupperich, Thomas and Rossow, Christian and Holz, Thorsten
(2014) Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks.
In: Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT ’14).

Pewny, Jannik and Schuster, Felix and Bernhard, Lukas and Holz, Thorsten and Rossow, Christian
(2014) Leveraging semantic signatures for bug search in binary programs.
In: Proc. of the 30th Annual Computer Security Applications Conference (ACSAC'14).
Conference: ACSAC Annual Computer Security Applications Conference

Karuppayah, Shankar and Fischer, Mathias and Rossow, Christian and Mühlhäuser, Max
(2014) On Advanced Monitoring in Resilient and Unstructured P2P Botnets.
In: Proceedings of the 2014 IEEE International Conference on Communications (ICC 2014).

Welzel, Arne and Rossow, Christian and Bos, Herbert
(2014) On Measuring the Impact of DDoS Botnets.
In: Proceedings of the Seventh European Workshop on System Security (EuroSec '14).

Dmitrienko, Alexandra and Liebchen, Christopher and Rossow, Christian and Sadeghi, Ahmad-Reza
(2014) On the (In)Security of Mobile Two-Factor Authentication.
In: Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers.

Kührer, Marc and Rossow, Christian and Holz, Thorsten
(2014) Paint it Black: Evaluating the Effectiveness of Malware Blacklists.
In: Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses.

Pecina, Kim and Mohammadi, Esfandiar and Pöpper, Christina
(2014) Zero-Communication Seed Establishment for Anti-Jamming Techniques.
In: Proceedings of the NDSS Workshop on Security of Emerging Networking Technologies (SENT).
Conference: NDSS Network and Distributed System Security Symposium

Bleikertz, Sören and Bugiel, Sven and Ideler, Hugo and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2013) Client-controlled Cryptography-as-a-Service in the Cloud.
In: 11th International Conference on Applied Cryptography and Network Security (ACNS'13).

Davi, Lucas Vincenzo and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2013) Gadge Me if You Can: Secure and Efficient Ad-Hoc Instruction-Level Randomization for x86 and ARM.
In: 8th ACM SIGSAC symposium on Information, computer and communications security (ACM ASIACCS 2013).

Zhao, Mingchen and Aditya, Paarijaat and Chen, Ang and Lin, Yin and Haeberlen, Andreas and Druschel, Peter and Maggs, Bruce and Wishon, Bill and Ponec, Miroslav
(2013) Peer-assisted Content Distribution in Akamai Netsession.
In: Proc. of the 2013 Internet Measurement Conference (IMC'13).
Conference: IMC Internet Measurement Conference

Gujarati, Arpan and Cerqueira, Felipe and Brandenburg, Björn B.
(2013) Schedulability Analysis of the Linux Push and Pull Scheduler with Arbitrary Processor Affinities.
In: 25th Euromicro Conference on Real-Time Systems, ECRTS 2013, Paris, France, July 9-12, 2013.
Conference: ECRTS Euromicro Conference on Real-Time Systems

Santos, Nuno and Rodrigues, Rodrigo and Gummadi, Krishna P. and Saroiu, Stefan
(2012) Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services.
In: Proceedings of the 21st Usenix Security Symposium (USENIX '12).
Conference: USENIX-Security Usenix Security Symposium

Berrang, Pascal and Bogdoll, Jonathan and Hahn, Ernst Moritz and Hartmanns, Arnd and Hermanns, Holger
(2012) Dependability Results for Power Grids with Decentralized Stabilization Strategies.
AVACS Technical Report (83). ISSN 1860-9821

Basin, David and Cremers, Cas and Meier, Simon
(2012) Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication.
In: Proc. 1st Conference on Principles of Security and Trust (POST).

Aditya, Paarijaat and Zhao, Mingchen and Lin, Yin and Haeberlen, Andreas and Druschel, Peter and Maggs, Bruce and Wishon, Bill
(2012) Reliable Client Accounting for P2P-infrastructure Hybrids.
In: Proc. of the 9th Usenix Symposium on Networked Systems Design and Implementation (NSDI 2012).

Asghar, Muhammad Rizwan and Ion, Mihaela and Russello, Giovanni and Crispo, Bruno
(2012) Securing Data Provenance in the Cloud.
In: UNSPECIFIED Lecture Notes in Computer Science, 7039 . Springer Berlin Heidelberg, pp. 145-160. ISBN 978-3-642-27584-5

Davi, Lucas and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2012) XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3).

Bugiel, Sven and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas
(2011) Twin Clouds: An Architecture for Secure Cloud Computing.
In: Workshop on Cryptography and Security in Clouds (CSC).

Li, Qi and Xu, Mingwei and Wu, Jianping and Zhang, Xinwen and Lee, Patrick P. C. and Xu, Ke
(2011) Enhancing the Trust of Internet Routing with Lightweight Route Attestation.
In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS).

Petrlic, Ronald
(2011) Integrity Protection for Automated Teller Machines.
In: Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11).

Jagadeesan, Radha and Pitcher, Corin and Rathke, Julian and Riely, James
(2011) Local Memory via Layout Randomization.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Schlesinger, Cole and Pattabiraman, Karthik and Swamy, Nikhil and Walker, David and Zorn, Benjamin
(2011) Modular Protections Against Non-control Data Attacks.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Kehuan, Zhang and Xiaoyong, Zhou and Yangyi, Chen and XiaoFeng, Wang and Yaoping, Ruan
(2011) Sedic: Privacy-Aware Data Intensive Computing on Hybrid Clouds.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Bugiel, Sven and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas
(2011) Twin Clouds: Secure Cloud Computing with Low Latency.
In: Communications and Multimedia Security Conference (CMS'11).

Backes, Michael and Grochulla, Martin and Hriţcu, Cătălin and Maffei, Matteo
(2009) Achieving Security Despite Compromise Using Zero-knowledge.
In: Proceedings of 22nd IEEE Computer Security Foundations Symposium (CSF).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

This list was generated on Sat Dec 21 05:15:20 2024 CET.