Browse by Research Area

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 100.

Conference or Workshop Item (A Paper)

Reen, Gaganjeet Singh and Rossow, Christian
(2020) DPIFuzz: A Differential Fuzzing Frameworkto Detect DPI Elusion Strategies for QUIC.
In: Annual Computer Security Applications Conference (ACSAC 2020).
Conference: ACSAC Annual Computer Security Applications Conference

Erba, Alessandro and Taormina, Riccardo and Galelli, Stefano and Pogliani, Marcello and Carminati, Michele and Zanero, Stefano and Tippenhauer, Nils Ole
(2020) Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems.
In: Proceedings of the Annual Computer Security Applications Conference (ACSAC).
Conference: ACSAC Annual Computer Security Applications Conference

Turrin, Federico and Erba, Alessandro and Tippenhauer, Nils Ole and Conti, Mauro
(2020) A Statistical Analysis Framework for ICS Process Datasets.
In: Proceedings of the Joint Workshop on CPS&IoT Security and Privacy (CPSIOTSEC’20).
Conference: UNSPECIFIED

Bushart, Jonas and Christian, Rossow
(2020) Padding Ain’t Enough: Assessing the Privacy Guarantees of Encrypted DNS.
In: 10th USENIX Workshop on Free and Open Communications on the Internet, 2020-08-11.
Conference: FOCI USENIX Workshop on Free and Open Communications on the Internet

Schwarz, Fabian and Rossow, Christian
(2020) SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients.
In: 29th USENIX Security Symposium (USENIX Security 20).
Conference: USENIX-Security Usenix Security Symposium

Zhao, Qingchuan and Zuo, Chaoshun and Brendan, Dolan-Gavitt and Pellegrino, Giancarlo and Lin, Zhiqiang
(2020) Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.
In: IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

Frassinelli, Daniel and Park, Sohyeon and Nürnberger, Stefan
(2020) ≪ I Know Where You Parked Last Summer ≫ Automated Reverse Engineering and Privacy Analysis of Modern Cars.
In: S&P - IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

Fass, Aurore and Backes, Michael and Stock, Ben
(2019) JStap: A Static Pre-Filter for Malicious JavaScript Detection.
In: Annual Computer Security Applications Conference (ACSAC 2019).
Conference: ACSAC Annual Computer Security Applications Conference

Fass, Aurore and Backes, Michael and Stock, Ben
(2019) HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs.
In: ACM Conference on Computer and Communications Security (CCS 2019).
Conference: CCS ACM Conference on Computer and Communications Security

Ghaeini, Hamid Reza and Chan, Matthew and Bahmani, Raad and Brasser, Ferdinand and Garcia, Luis and Zhou, Jianying and Sadeghi, Ahmad-Reza and Tippenhauer, Nils Ole and Zonouz, Saman
(2019) PAtt: Physics-based Attestation of Control Systems.
In: Proceedings of International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Ghaeini, Hamid Reza and Tippenhauer, Nils Ole and Zhou, Jianying
(2019) Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures.
In: International Conference on Availability, Reliability and Security (ARES).
Conference: ARES International Conference on Availability, Reliability and Security

Breitenbacher, Dominik and Homoliak, Ivan and Aung, Yan Lin and Tippenhauer, Nils Ole and Elovici, Yuval
(2019) HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices.
In: AsiaCCS.
Conference: ASIACCS ACM ASIA Conference on Computer and Communications Security

van Schaik, Stephan and Milburn, Alyssa and Österlund, Sebastian and Frigo, Pietro and Maisuradze, Giorgi and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano
(2019) RIDL: Rogue In-flight Data Load.
In: 40th IEEE Symposium on Security and Privacy, 20-22 May 2019, San Francisco, USA.
Conference: SP IEEE Symposium on Security and Privacy

Eskandarian, Saba and Cogan, Jonathan and Birnbaum, Sawyer and Brandon, Peh Chang Wei and Franke, Dillon and Fraser, Forest and Garcia, Gaspar and Gong, Eric and Nguyen, Hung T. and Sethi, Taresh K. and Subbiah, Vishal and Backes, Michael and Pellegrino, Giancarlo and Boneh, Dan
(2019) Fidelius: Protecting User Secrets from Compromised Browsers.
In: S&P 2019.
Conference: SP IEEE Symposium on Security and Privacy

Tambe, Amit and Aung, Yan Lin and Sridharan, Ragav and Ochoa, Martin and Tippenhauer, Nils Ole and Shabtai, Asaf and Elovici, Yuval
(2019) Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots.
In: ACM Conference on Data and Application Security and Privacy (CODASPY).
Conference: CODASPY ACM Conference on Data and Application Security and Privacy
(In Press)

Iacovazzi, Alfonso and Frassinelli, Daniel and Elovici, Yuval
(2019) The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding.
In: 22nd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2019, Chaoyang District, Beijing, China, September 23-25, 2019..
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Iacovazzi, Alfonso and Frassinelli, Daniel and Elovici, Yuval
(2019) The {DUSTER} Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding.
In: 22nd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2019).
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Giraldo, Jairo and Urbina, David and Cárdenas, Alvaro A. and Tippenhauer, Nils Ole
(2019) Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems.
In: International Conference on Applied Cryptography and Network Security (ACNS).
Conference: ACNS International Conference on Applied Cryptography and Network Security

Walla, Sebastian and Rossow, Christian
(2019) MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware.
In: 4th IEEE European Symposium on Security and Privacy, 17-19 June 2019, Stockholm, Sweden.
Conference: EuroS&P IEEE European Symposium on Security and Privacy
(In Press)

Speicher, Patrick and Steinmetz, Marcel and Hoffmann, Jörg and Backes, Michael and Künnemann, Robert
(2019) Towards Automated Network Mitigation Analysis.
In: The 34th ACM/SIGAPP Symposium On Applied Computing, Limassol, Cyprus.
Conference: SAC ACM Symposium on Applied Computing

Speicher, Patrick and Steinmetz, Marcel and Hoffmann, Jörg and Backes, Michael and Künnemann, Robert
(2019) Towards Automated Network Mitigation Analysis (extended version).
In: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing.

Bushart, Jonas
(2018) Optimizing Recurrent Pulsing Attacks using Application-Layer Amplification of Open DNS Resolvers.
In: 12th USENIX Workshop on Offensive Technologies (WOOT 18).
Conference: WOOT USENIX Workshop on Offensive Technologies

Krupp, Johannes and Rossow, Christian
(2018) teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts.
In: 27th USENIX Security Symposium (USENIX Security 18), 15-17 Aug 2018, Baltimore MD.
Conference: USENIX-Security Usenix Security Symposium

Maisuradze, Giorgi and Rossow, Christian
(2018) Ret2Spec: Speculative Execution Using Return Stack Buffers.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 15-19 Oct 2018, Toronto, Canada.
Conference: CCS ACM Conference on Computer and Communications Security

Tanabe, Rui and Ueno, Wataru and Ishii, Kou and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Inoue, Daisuke and Rossow, Christian
(2018) Evasive Malware via Identifier Implanting.
In: 13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 28-29 June 2018, Paris-Saclay.

Bushart, Jonas and Rossow, Christian
(2018) DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives.
In: Proceedings of the 21th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Xu, Meng and Qian, Chenxiong and Lu, Kangjie and Backes, Michael and Kim, Taesoo
(2018) Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.
In: In Proceedings of the 39th IEEE Symposium on Security and Privacy (Oakland). San Francisco, CA, May 2018..
Conference: SP IEEE Symposium on Security and Privacy

Frassinelli, Daniel and Gambi, Alessio and Nürnberger, Stefan and Park, Sohyeon
(2018) DRiVERSITY - Synthetic Torture Testing to Find Limits of Autonomous Driving Algorithms.
In: ACM Computer Science in Cars Conference.

Brengel, Michael and Rossow, Christian
(2018) Identifying Key Leakage of Bitcoin Users.
In: Proceedings of the Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)
(In Press)

Brengel, Michael and Rossow, Christian
(2018) MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps.
In: Proceedings of the Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA).
Conference: DIMVA GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Krupp, Johannes and Karami, Mohammad and Rossow, Christian and McCoy, Damon and Backes, Michael
(2017) Linking Amplification DDoS Attacks to Booter Services.
In: International Symposium on Research in Attacks, Intrusions, and Defenses, September 18-20, 2017, Atlanta, GA, USA.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Kampmann, Alexander
(2017) Local Analysis for Global Inputs.
In: 39th International Symposium on Software Engineering, May 20-28, 2017, Buenos Aires.

Simeonovski, Milivoj and Pellegrino, Giancarlo and Rossow, Christian and Backes, Michael
(2017) Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals.
In: Proc. of the 26rd International Conference on World Wide Web (WWW 2017).
Conference: WWW International World Wide Web Conference

Maisuradze, Giorgi and Backes, Michael and Rossow, Christian
(2017) Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code.
In: Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17).
Conference: NDSS Network and Distributed System Security Symposium

Lu, Kangjie and Walter, Marie-Therese and Pfaff, David and Nürnberger, Stefan and Lee, Wenke and Backes, Michael
(2017) Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying.
In: Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17).
Conference: NDSS Network and Distributed System Security Symposium

Grosse, Kathrin and Papernot, Nicolas and Manoharan, Praveen and Backes, Michael and McDaniel, Patrick
(2017) Adversarial Examples for Malware Detection.
In: Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II.
Conference: ESORICS European Symposium On Research In Computer Security

Milner, Kevin and Cremers, Cas and Jiangshan, Yu and Ryan, Mark
(2017) Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications.
In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Jonker, Mattijs and King, Alistair and Krupp, Johannes and Rossow, Christian and Sperotto, Anna and Dainotti, Alberto
(2017) Millions of Targets Under Attack: A Macroscopic Characterization of the DoS Ecosystem.
In: Proceedings of the 2017 Internet Measurement Conference.
Conference: IMC Internet Measurement Conference

Urbina, David and Giraldo, Jairo and Cardenas, Alvaro A. and Tippenhauer, Nils Ole and Valente, Junia and Faisal, Mustafa and Ruths, Justin and Candell, Richard and Sandberg, Henrik
(2016) Limiting The Impact of Stealthy Attacks on Industrial Control Systems.
In: ACM Conference on Computer and Communications Security (CCS), Vienna, Austria.
Conference: CCS ACM Conference on Computer and Communications Security

Krupp, Johannes and Backes, Michael and Rossow, Christian
(2016) Identifying the Scan and Attack Infrastructures behind Amplification DDoS attacks.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Holz, Thorsten and Rossow, Christian and Rytilahti, Teemu and Simeonovski, Milivoj and Stock, Ben
(2016) On the Feasibility of TTL-based Filtering for DRDoS Mitigation.
In: RAID 2016, 19th International Symposium on Research in Attacks, Intrusions and Defenses.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Maisuradze, Giorgi and Backes, Michael and Rossow, Christian
(2016) What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Nürnberger, Stefan and Rossow, Christian
(2016) VatiCAN - Vetted, Authenticated CAN Bus.
In: . Conference on Cryptographic Hardware and Embedded Systems (CHES).
Conference: CHES Workshop on Cryptographic Hardware and Embedded Systems

Stock, Ben and Livshits, Benjamin and Zorn, Benjamin
(2016) Kizzle: A Signature Compiler for Detecting Exploit Kits.
In: The 46th Annual IEEE/IFIP Conference on Dependable Systems and Networks.
Conference: DSN IEEE/IFIP International Conference on Dependable Systems and Networks

Brengel, Michael and Backes, Michael and Rossow, Christian
(2016) Detecting Hardware-Assisted Virtualization.
In: Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings.

Götzfried, Johannes and Müller, Tilo and Drescher, Gabor and Nürnberger, Stefan and Backes, Michael
(2016) RamCrypt: Kernel-based Address Space Encryption for User-mode Processes.
In: ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS).

Backes, Michael and Hammer, Christian and Pfaff, David and Skoruppa, Malte
(2016) Implementation-level Analysis of the JavaScript Helios Voting Client.
In: Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC 2016.

Lu, Kangjie and Backes, Michael and Nürnberger, Stefan and Lee, Wenke
(2016) How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.
In: Proceedings of the 23rd Annual Symposium on Network and Distributed System Security (NDSS '16).
Conference: NDSS Network and Distributed System Security Symposium

Yokoyama, Akira and Ishii, Kou and Tanabe, Rui and Papa, Yinmin and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Inoue, Daisuke and Brengel, Michael and Backes, Michael and Rossow, Christian
(2016) SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
In: Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Karimi, M. and Tavakoli, E. and Farajtabar, Mehrdad and Song, Le and Gomez-Rodriguez, Manuel
(2016) Smart Broadcasting: Do you want to be seen?
In: Proc. of the 22nd ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'16).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Pellegrino, Giancarlo and Catakoglu, Onur and Balzarotti, Davide and Rossow, Christian
(2016) Uses and Abuses of Server-Side Requests.
In: Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2016.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Krämer, Lukas and Krupp, Johannes and Makita, Daisuke and Nishizoe, Tomomi and Koide, Takashi and Yoshioka, Katsunari and Rossow, Christian
(2015) AmpPot: Monitoring and Defending Against Amplification DDoS Attacks.
In: Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Pewny, Jannik and Garmany, Behrad and Gawlik, Robert and Rossow, Christian and Holz, Thorsten
(2015) Cross-Architecture Bug Search in Binary Executables.
In: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Pfaff, David and Hack, Sebastian and Hammer, Christian
(2015) Learning How to Prevent Return-Oriented Programming Efficiently.
In: Engineering Secure Software and Systems.

Pellegrino, Giancarlo and Rossow, Christian and Ryba, Fabrice J. and Schmidt, Thomas C. and Wählisch, Matthias
(2015) Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics.
In: 9th USENIX Workshop on Offensive Technologies (WOOT 15).

Kührer, Marc and Hupperich, Thomas and Bushart, Jonas and Rossow, Christian and Holz, Thorsten
(2015) Going Wild: Large-Scale Classification of Open DNS Resolvers.
In: Proc. of the 2015 Internet Measurement Conference (IMC'15).
Conference: IMC Internet Measurement Conference

Pa, Yin Minn Pa and Suzuki, Shogo and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Rossow, Christian
(2015) IoTPOT: Analysing the Rise of IoT Compromises.
In: 9th USENIX Workshop on Offensive Technologies (WOOT 15).

Andriesse, Dennis and Rossow, Christian and Bos, Herbert
(2015) Reliable Recon in Adversarial Peer-to-Peer Botnets.
In: Proc. of the 2015 Internet Measurement Conference (IMC'15).
Conference: IMC Internet Measurement Conference

Perl, Henning and Dechand, Sergej and Smith, Matthew and Arp, Daniel and Yamaguchi, Fabian and Rieck, Konrad and Fahl, Sascha and Acar, Yasemin
(2015) Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits.
In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Karuppayah, Shankar and Roos, Stefanie and Rossow, Christian and Mühlhäuser, Max and Fischer, Mathias
(2015) Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism.
In: Proc. of the 35th IEEE International Conference on Distributed Computing Systems (ICDCS'15).
Conference: ICDCS International Conference on Distributed Computing Systems

Backes, Michael and Holz, Thorsten and Kollenda, Benjamin and Koppe, Philipp and Nürnberger, Stefan and Pewny, Jannik
(2014) You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.
In: Proceedings of the 21st ACM conference on Computer and Communications Security (ACM CCS '14).
Conference: CCS ACM Conference on Computer and Communications Security

Kührer, Marc and Hupperich, Thomas and Rossow, Christian and Holz, Thorsten
(2014) Exit from Hell? Reducing the Impact of Amplification DDoS Attacks.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

Blond, Stevens Le and Uritesc, Adina and Gilbert, Cedric and Chua, Zheng Leong and Saxena, Prateek and Kirda, Engin
(2014) A Look at Targeted Attacks Through the Lense of an NGO.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

Backes, Michael and Nürnberger, Stefan
(2014) Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

Backes, Michael and Gerling, Rainer W. and Gerling, Sebastian and Nürnberger, Stefan and Schröder, Dominique and Simkin, Mark
(2014) WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP.
In: 12th International Conference on Applied Cryptography and Network Security (ACNS 2014).

Rossow, Christian
(2014) Amplification Hell: Revisiting Network Protocols for DDoS Abuse.
In: Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS '14).
Conference: NDSS Network and Distributed System Security Symposium

Kührer, Marc and Hupperich, Thomas and Rossow, Christian and Holz, Thorsten
(2014) Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks.
In: Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT ’14).

Pewny, Jannik and Schuster, Felix and Bernhard, Lukas and Holz, Thorsten and Rossow, Christian
(2014) Leveraging semantic signatures for bug search in binary programs.
In: Proc. of the 30th Annual Computer Security Applications Conference (ACSAC'14).
Conference: ACSAC Annual Computer Security Applications Conference

Karuppayah, Shankar and Fischer, Mathias and Rossow, Christian and Mühlhäuser, Max
(2014) On Advanced Monitoring in Resilient and Unstructured P2P Botnets.
In: Proceedings of the 2014 IEEE International Conference on Communications (ICC 2014).

Welzel, Arne and Rossow, Christian and Bos, Herbert
(2014) On Measuring the Impact of DDoS Botnets.
In: Proceedings of the Seventh European Workshop on System Security (EuroSec '14).

Dmitrienko, Alexandra and Liebchen, Christopher and Rossow, Christian and Sadeghi, Ahmad-Reza
(2014) On the (In)Security of Mobile Two-Factor Authentication.
In: Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers.

Kührer, Marc and Rossow, Christian and Holz, Thorsten
(2014) Paint it Black: Evaluating the Effectiveness of Malware Blacklists.
In: Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses.

Pecina, Kim and Mohammadi, Esfandiar and Pöpper, Christina
(2014) Zero-Communication Seed Establishment for Anti-Jamming Techniques.
In: Proceedings of the NDSS Workshop on Security of Emerging Networking Technologies (SENT).
Conference: NDSS Network and Distributed System Security Symposium

Bleikertz, Sören and Bugiel, Sven and Ideler, Hugo and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2013) Client-controlled Cryptography-as-a-Service in the Cloud.
In: 11th International Conference on Applied Cryptography and Network Security (ACNS'13).

Davi, Lucas Vincenzo and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2013) Gadge Me if You Can: Secure and Efficient Ad-Hoc Instruction-Level Randomization for x86 and ARM.
In: 8th ACM SIGSAC symposium on Information, computer and communications security (ACM ASIACCS 2013).

Zhao, Mingchen and Aditya, Paarijaat and Chen, Ang and Lin, Yin and Haeberlen, Andreas and Druschel, Peter and Maggs, Bruce and Wishon, Bill and Ponec, Miroslav
(2013) Peer-assisted Content Distribution in Akamai Netsession.
In: Proc. of the 2013 Internet Measurement Conference (IMC'13).
Conference: IMC Internet Measurement Conference

Gujarati, Arpan and Cerqueira, Felipe and Brandenburg, Björn B.
(2013) Schedulability Analysis of the Linux Push and Pull Scheduler with Arbitrary Processor Affinities.
In: 25th Euromicro Conference on Real-Time Systems, ECRTS 2013, Paris, France, July 9-12, 2013.
Conference: ECRTS Euromicro Conference on Real-Time Systems

Santos, Nuno and Rodrigues, Rodrigo and Gummadi, Krishna P. and Saroiu, Stefan
(2012) Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services.
In: Proceedings of the 21st Usenix Security Symposium (USENIX '12).
Conference: USENIX-Security Usenix Security Symposium

Basin, David and Cremers, Cas and Meier, Simon
(2012) Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication.
In: Proc. 1st Conference on Principles of Security and Trust (POST).

Aditya, Paarijaat and Zhao, Mingchen and Lin, Yin and Haeberlen, Andreas and Druschel, Peter and Maggs, Bruce and Wishon, Bill
(2012) Reliable Client Accounting for P2P-infrastructure Hybrids.
In: Proc. of the 9th Usenix Symposium on Networked Systems Design and Implementation (NSDI 2012).

Davi, Lucas and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2012) XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3).

Bugiel, Sven and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas
(2011) Twin Clouds: An Architecture for Secure Cloud Computing.
In: Workshop on Cryptography and Security in Clouds (CSC).

Li, Qi and Xu, Mingwei and Wu, Jianping and Zhang, Xinwen and Lee, Patrick P. C. and Xu, Ke
(2011) Enhancing the Trust of Internet Routing with Lightweight Route Attestation.
In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS).

Petrlic, Ronald
(2011) Integrity Protection for Automated Teller Machines.
In: Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11).

Jagadeesan, Radha and Pitcher, Corin and Rathke, Julian and Riely, James
(2011) Local Memory via Layout Randomization.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Schlesinger, Cole and Pattabiraman, Karthik and Swamy, Nikhil and Walker, David and Zorn, Benjamin
(2011) Modular Protections Against Non-control Data Attacks.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Kehuan, Zhang and Xiaoyong, Zhou and Yangyi, Chen and XiaoFeng, Wang and Yaoping, Ruan
(2011) Sedic: Privacy-Aware Data Intensive Computing on Hybrid Clouds.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Bugiel, Sven and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas
(2011) Twin Clouds: Secure Cloud Computing with Low Latency.
In: Communications and Multimedia Security Conference (CMS'11).

Backes, Michael and Grochulla, Martin and Hriţcu, Cătălin and Maffei, Matteo
(2009) Achieving Security Despite Compromise Using Zero-knowledge.
In: Proceedings of 22nd IEEE Computer Security Foundations Symposium (CSF).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Article

Chattopadhyay, Sudipta and Beck, Moritz and Rezine, Ahmed and Zeller, Andreas
(2019) Quantifying the Information Leakage in Cache Attacks via Symbolic Execution.
ACM Trans. Embed. Comput. Syst., 18 (1).

Yu, Jiangshan and Ryan, Mark and Cremers, Cas
(2018) DECIM: Detecting Endpoint Compromise In Messaging.
IEEE Transactions on Information Forensics and Security, 13 (1). pp. 106-118.

Feltz, Michèle and Cremers, Cas
(2018) Strengthening the Security of Authenticated Key Exchange against Bad Randomness.
Designs, Codes and Cryptography, 86 (3). pp. 481-516.

Grosse, Kathrin and Manoharan, Praveen and Papernot, Nicolas and Backes, Michael and McDaniel, Patrick
(2017) On the (Statistical) Detection of Adversarial Examples.
CoRR, abs/17.
(Submitted)

Gerling, Sebastian and Rossow, Christian
(2016) Angreiferjagd im "Internet der Dinge".
Datenschutz und Datensicherheit, 40 (8). pp. 507-510.

Berrang, Pascal and Bogdoll, Jonathan and Hahn, Ernst Moritz and Hartmanns, Arnd and Hermanns, Holger
(2012) Dependability Results for Power Grids with Decentralized Stabilization Strategies.
AVACS Technical Report (83). ISSN 1860-9821

Thesis

Spier, Steffen
(2015) Cold boot attacks and the error model of DRAM modules.
Bachelors thesis, Saarland University.

Reischuk, Raphael M.
(2014) Declarative Design and Enforcement for Secure Cloud Applications.
Doctoral thesis, Saarland University.

Book Section

Tippenhauer, Nils Ole
(2019) Design and Realization of Testbeds for Security Research in the Industrial Internet of Things.
In: Security and Privacy Trends in the Industrial Internet of Things. Springer, Cham, pp. 287-310. ISBN 978-3-030-12330-7

Asghar, Muhammad Rizwan and Ion, Mihaela and Russello, Giovanni and Crispo, Bruno
(2012) Securing Data Provenance in the Cloud.
In: UNSPECIFIED Lecture Notes in Computer Science, 7039 . Springer Berlin Heidelberg, pp. 145-160. ISBN 978-3-642-27584-5

Monograph

Paul, Wolfgang J. and Lutsyk, P and Oberhauser, J
(2016) Multi-core System Architecture.
Technical Report. UNSPECIFIED.

This list was generated on Sun Nov 29 00:02:30 2020 CET.