Pic for Prof. Sadeghi

Prof. Dr.-Ing. Ahmad-Reza Sadeghi

Contact

work +49 6151 16-25328

Work S2|20 305
Pankratiusstraße 2
64289 Darmstadt

Ahmad-Reza Sadeghi is a full Professor of Computer Science at the Technische Universität Darmstadt, in Germany, where he heads the System Security Lab. Since 2012 Prof. Sadeghi established a long-term cooperation with Intel and founded several Collaborative Research Centers on topics like Secure Computing or Collaborative Autonomous and Resilient Systems. The latest research takes place on Private AI.

He received his PhD in Computer Science with the focus on privacy protecting cryptographic protocols and systems from the University of Saarland in Saarbrücken, Germany. Prior to academia, he worked in Research and Development of Telecommunications enterprises, amongst others Ericson Telecommunications. He has been leading and involved in a variety of national and international research and development projects on design and implementation of Trustworthy Computing Platforms and Trusted Computing, Security Hardware, and Applied Cryptography. He has been serving as general or program chair as well as program committee member of major conferences and workshops in Information Security and Privacy.

Prof. Sadeghi was Editor-In-Chief of IEEE Security and Privacy Magazine, served 5 years on the editorial board of the ACM Transactions on Information and System Security (TISSEC), and guest editor of the IEEE Transactions on Computer-Aided Design (Special Issue on Hardware Security and Trust). Currently he is on the editorial boards of ACM Books, ACM TODAES, ACM TIOT and ACM DTRAP.

He has been awarded with the renowned German prize “Karl Heinz Beckurts” for his research on Trusted and Trustworthy Computing technology and its transfer to industrial practice. The award honors excellent scientific achievements with high impact on industrial innovations in Germany. Further, his group received German IT Security Competition Award 2010.

In 2018 he received the ACM SIGSAC Outstanding Contributions Award for dedicated research, education, and management leadership in the security community and for pioneering contributions in content protection, mobile security and hardware-assisted security. SIGSAC is ACM’s Special Interest Group on Security, Audit and Control.

Jump to: 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999
Number of items: 443.

2021

Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Möllering, Helen ; Nguyen, Thien Duc ; Rieger, Phillip ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Yalame, Mohammad Hossein ; Zeitouni, Shaza (2021):
SAFELearn: Secure Aggregation for private FEderated Learning.
4th Deep Learning and Security Workshop (DLS'21), virtual Conference, 27.05.2021, [Conference or Workshop Item]

Nguyen, Thien Duc ; Rieger, Phillip ; Yalame, Mohammad Hossein ; Möllering, Helen ; Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2021):
FLGUARD: Secure and Private Federated Learning.
In: arXiv-Computer Science, In: Crytography and Security, (Preprint), [Article]

Zeitouni, Shaza ; Dessouky, Ghada ; Sadeghi, Ahmad-Reza (2021):
SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities.
6th IEEE European Symposium on Security and Privacy (Euro S&P 2021), virtual Conference, 06.-10.09.2021, [Conference or Workshop Item]

Bahmani, Raad ; Brasser, Ferdinand ; Dessouky, Ghada ; Jauernig, Patrick ; Klimmek, Matthias ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2021):
CURE: A Security Architecture with CUstomizable and Resilient Enclaves.
30th USENIX Security Symposium (USENIX Security'21), Vancouver, Canada, 11.-13.08., [Conference or Workshop Item]

Zeitouni, Shaza ; Vliegen, Jo ; Frassetto, Tommaso ; Koch, Dirk ; Sadeghi, Ahmad-Reza ; Mentens, Nele (2021):
Trusted Configuration in Cloud FPGAs.
29th IEEE International Symposium on Field-Programmable Custom Computing Machines, virtual Conference, 09.-12.05.2021, [Conference or Workshop Item]

2020

Baumgärtner, Lars ; Dmitrienko, Alexandra ; Freisleben, Bernd ; Gruler, Alexander ; Höchst, Jonas ; Kühlberg, Joshua ; Mezini, Mira ; Mitev, Richard ; Miettinen, Markus ; Muhamedagic, Anel ; Nguyen, Thien Duc ; Penning, Alvar ; Pustelnik, Frederik ; Roos, Filipp ; Sadeghi, Ahmad-Reza ; Schwarz, Michael ; Uhl, Christian (2020):
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps.
In: Proceedings : 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 458-467,
IEEE, TrustCom 2020, virtual Conference, 29.12.2020-01.01.2021, ISBN 978-0-7381-4380-4,
[Conference or Workshop Item]

Nguyen, Thien Duc ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2020):
Long Live Randomization: On Privacy-Preserving Contact Tracing in Pandemic.
In: MTD'20: Proceedings of the 7th ACM Workshop on Moving Target Defense,
ACM, CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, virtual Conference, 09.-13.11.2020, ISBN 978-1-4503-8085-0,
DOI: 10.1145/3411496.3421229,
[Conference or Workshop Item]

Buchmann, Johannes ; Dessouky, Ghada ; Frassetto, Tommaso ; Kiss, Ágnes ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Traverso, Giulia ; Zeitouni, Shaza (2020):
SAFE: A Secure and Efficient Long-Term Distributed Storage System.
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20), Taipei, Taiwan, June 1-5, 2020, [Conference or Workshop Item]

Neureither, Jens ; Dmitrienko, Alexandra ; Koisser, David ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2020):
LegIoT: Ledgered Trust Management Platform for IoT.
In: Lecture Notes in Computer Science, 12308, In: Computer Security - ESORICS 2020, pp. 377-396,
Springer, 25th European Symposium on Research in Computer Security, virtual Conference, 14.-18.09.2020, ISBN 978-3-030-58950-9,
DOI: 10.1007/978-3-030-58951-6_19,
[Conference or Workshop Item]

Cammarota, Rosario ; Schunter, Matthias ; Rajan, Anand ; Boemer, Fabian ; Kiss, Ágnes ; Treiber, Amos ; Weinert, Christian ; Schneider, Thomas ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza ; Demmler, Daniel ; Chen, Huili ; Hussain, Siam Umar ; Riazi, M. Sadegh ; Koushanfar, Farinaz ; Gupta, Saransh ; Rosing, Simunic (2020):
Trustworthy AI Inference Systems: An Industry Research View.
In: arXiv/Computer Science/Cryptography and Security, Version 1, [Report]

Dessouky, Ghada ; Frassetto, Tommaso ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza (2020):
With Great Complexity Comes Great Vulnerability: Challenges of Secure Processor Design.
In: IEEE Security & Privacy, IEEE, ISSN 1540-7993,
DOI: 10.1109/MSEC.2020.2994978,
[Article]

Dessouky, Ghada ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
Enclave Computing on RISC-V: A Brighter Future for Security?
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020, Boston, USA, 5.-7. April, 2020, [Conference or Workshop Item]

Bayerl, Sebastian P. ; Frassetto, Tommaso ; Jauernig, Patrick ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Weinert, Christian (2020):
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20), Grenoble, France, 09. – 13. March 2020, [Conference or Workshop Item]

Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
Trusted Execution Environments: Properties, Applications, and Challenges.
In: IEEE Security & Privacy, 18 (2), pp. 56-60. IEEE, e-ISSN 1558-4046,
DOI: 10.1109/MSEC.2019.2947124,
[Article]

Acar, Abbas ; Fereidooni, Hossein ; Abera, Tigist ; Sikder, Amit Kumsr ; Miettinen, Markus ; Aksu, Hidayet ; Conti, Mauro ; Sadeghi, Ahmad-Reza (2020):
Peek-a-Boo: I see your smart home activities, even encrypted!
pp. 207-218, WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, July 08.-10., 2020, [Conference or Workshop Item]

Dessouky, Ghada ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
INVITED: AI Utopia or Dystopia - On Securing AI Platforms.
DAC'20-Design Automation Conference 2020, virtual Conference, 20.-24.07., [Conference or Workshop Item]

Dessouky, Ghada ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2020):
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.
In: USENIX Security,
k.A., USENIX Association, 29th USENIX Security Syposium, Boston, MA, USA, 12.-14.08.2020, [Conference or Workshop Item]

Zeitouni, Shaza ; Stapf, Emmanuel ; Fereidooni, Hossein ; Sadeghi, Ahmad-Reza (2020):
On the Security of Strong Memristor-based Physically Unclonable Functions.
Design Automation Conference 2020, virtual Conference, 19.-22.07., [Conference or Workshop Item]

Nguyen, Thien Duc ; Rieger, Phillip ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2020):
Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System.
Workshop on Decentralized IoT Systems and Security (DISS) @ NDSS Symposium 2020, San Diego, USA, 23.-26.02. 2020, [Conference or Workshop Item]

Kenjar, Zijo ; Frassetto, Tommaso ; Gens, David ; Franz, Michael ; Sadeghi, Ahmad-Reza (2020):
V0LTpwn: Attacking x86 Processor Integrity from Software.
29th USENIX Security Symposium, Boston, USA, August 12–14, 2020, [Conference or Workshop Item]

Mitev, Richard ; Pazii, Anna ; Miettinen, Markus ; Enck, William ; Sadeghi, Ahmad-Reza (2020):
LeakyPick: IoT Audio Spy Detector.
In: ICPS Proceedings, In: ACSAC '20: Annual Computer Security Applications Conference, pp. 694-705,
ACM, 36th Annual Computer Security Applications Conference, virtual Conference, 07.-11.12.2020, ISBN 978-1-4503-8858-0,
DOI: 10.1145/3427228.3427277,
[Conference or Workshop Item]

2019

Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza (2019):
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization.
ACSAC - 35th Annual Computer Security Applications Conference, San Juan, Puerto Rico, December 9-13, [Conference or Workshop Item]

Dessouky, Ghada ; Zeitouni, Shaza ; Ibrahim, Ahmad ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2019):
CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems.
New York, IEEE, 2019 International Conference On Computer Aided Design (ICCAD), The Westin Westminster Westminster, CO, 4.-7. November 2019, [Conference or Workshop Item]

Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Conference or Workshop Item]

Ghaeini, Hamid Reza ; Chan, Matthew ; Bahmani, Raad ; Brasser, Ferdinand ; Garcia, Luis ; Zhou, Jianying ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole ; Zonouz, Saman A. (2019):
PAtt: Physics-based Attestation of Control Systems.
Beijing, 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Beijing, 23. - 25.09.2019, [Conference or Workshop Item]

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostáková, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Conference or Workshop Item]

Paverd, Andrew ; Völp, Marcus ; Brasser, Ferdinand ; Schunter, Matthias ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Esteves-Verissimo, Paulo ; Steininger, Andreas ; Holz, Thorsten (2019):
Sustainable Security & Safety: Challenges and Opportunities.
Stuttgart, 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS), Stuttgart, 09.07.2019, DOI: 10.4230/OASIcs.CERTS.2019.4,
[Conference or Workshop Item]

Bock, Carsten ; Brasser, Ferdinand ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2019):
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
Auckland, ACM Asia Conference on Computer and Communications Security (AsiaCCS), Auckland, 07. - 12.07.2019, DOI: 10.1145/3321705.3329827,
[Conference or Workshop Item]

Mitev, Richard ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2019):
Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants.
ACM, ASIACCS 2019, Auckland, New Zealand, Juli 2019, DOI: 10.1145/3321705.3329842,
[Conference or Workshop Item]

Songhori, Ebrahim ; Riazi, M. Sadegh ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2019):
ARM2GC: Succinct Garbled Processor for Secure Computation.
Las Vegas, USA, Design Automation Conference (DAC), 2019 56th ACM/EDAC/IEEE, Las Vegas, USA, June, 2.-6., [Conference or Workshop Item]

Marchal, Samuel ; Miettinen, Markus ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Asokan, N. (2019):
AuDI: Towards autonomous IoT device-type identification using periodic communications.
In: IEEE Journal on Selected Areas in Communications, IEEE, ISSN 0733-8716,
[Article]

Batina, Lejla ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019):
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
In: Proceedings of the 56th Annual Design Automation Conference 2019,
k.A., ACM, Design Automation Conference 2019, Las Vegas, NV, USA, June 02 - 06, 2019, [Conference or Workshop Item]

Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2019):
HardFails: Insights into Software-Exploitable Hardware Bugs.
28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Conference or Workshop Item]

OConnor, TJ ; Mohamed, Reham ; Miettinen, Markus ; Enck, William ; Reaves, Bradley ; Sadeghi, Ahmad-Reza (2019):
HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices.
Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Miami, FL, USA, [Conference or Workshop Item]

Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Fereidooni, Hossein ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019):
DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
In: The 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019),
[Conference or Workshop Item]

Marchal, Samuel ; Miettinen, Markus ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Asokan, N. (2019):
AUDI: Towards Autonomous IoT Device-Type Identification.
In: IEEE Journal on Selected Areas in Communications (JSAC) on Artificial Intelligence and Machine Learning for Networking and Communications, [Article]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019):
HEALED: HEaling & Attestation for Low-end Embedded Devices.
23rd International Conference Financial Cryptography and Data Security (FC 2019), 2019, [Conference or Workshop Item]

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostakova, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
Cryptology ePrint Archive, Report 2019/154, [Report]

Weiser, Samuel ; Werner, Mario ; Brasser, Ferdinand ; Malenko, Maja ; Mangard, Stefan ; Sadeghi, Ahmad-Reza (2019):
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Aschermann, Cornelius ; Frassetto, Tommaso ; Holz, Thorsten ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Teuchert, Daniel (2019):
Nautilus: Fishing for Deep Bugs with Grammars.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Brasser, Ferdinand ; Gens, David ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019):
SANCTUARY: ARMing TrustZone with User-space Enclaves.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Abera, Tigist ; Bahmani, Raad ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2019):
DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous System.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Mohamed, Reham ; O'Connor, Terrance ; Miettinen, Markus ; Enck, William ; Sadeghi, Ahmad-Reza
Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang (Corporate Creators) (2019):
HONEYSCOPE: IoT Device Protection with Deceptive Network Views,.
In: Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings, [Book Section]

De Oliveira Nunes, Ivan ; Dessouky, Ghada ; Ibrahim, Ahmad ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019):
Towards Systematic Design of Collective Remote Attestation Protocols.
The 39th International Conference on Distributed Computing Systems (ICDCS) 2019, [Conference or Workshop Item]

Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019):
HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.
ACM/IEEE, Design Automation Conference (DAC), 2019, [Conference or Workshop Item]

2018

Miettinen, Markus ; Sadeghi, Ahmad-Reza (2018):
Internet of things or threats?: on building trust in IoT (keynote). 1:1-1:9.
In: CODES '18 Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis,
Piscataway, NJ, USA, IEEE Press Piscataway, NJ, USA, CODES+ISSS 2018, part of ESWEEK 2018, Torino, Italy, September 30 - October 5, 2018, [Conference or Workshop Item]

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian (2018):
VoiceGuard: Secure and Private Speech Processing.
In: Interspeech 2018, pp. 1303-1307,
International Speech Communication Association (ISCA), DOI: 10.21437/Interspeech.2018-2032,
[Conference or Workshop Item]

Frassetto, Tommaso ; Jauernig, Patrick ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2018):
IMIX: In-Process Memory Isolation EXtension.
In: Proceedings of the 27th USENIX Security Symposium, pp. 83-97,
27th USENIX Security Symposium - Technical Sessions Track 2, Baltimore, MD, USA, 15.-17.08.2018, ISBN 978-1-939133-04-5,
[Conference or Workshop Item]

Dessouky, Ghada ; Abera, Tigist ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza (2018):
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution.
37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18), 2018, [Conference or Workshop Item]

Carpent, Xavier ; Eldefrawy, Karim ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018):
Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices.
ACM, Design Automation Conference, San Francisco, USA, 2018, June 24-29, [Conference or Workshop Item]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018):
US-AID: Unattended Scalable Attestation of IoT Devices.
37th IEEE International Symposium on Reliable Distributed Systems (SRDS 2018), 2018, [Conference or Workshop Item]

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2018):
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
23rd European Symposium on Research in Computer Security (ESORICS 2018), Barcelona, Spain, 2018, [Conference or Workshop Item]

Asokan, N. ; Nyman, Thomas ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018):
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems - Special Issue ESWEEK 2018, CASES 2018, CODES + ISSS 2018 and EMSOFT 2018, [Article]

Schaad, Andreas ; Grohmann, Bjoern ; Winzenried, Oliver ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2018):
Towards a Cloud-based System for Software Protection and Licensing.
In: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2, pp. 698-702,
k.A., SciTePress, Secrypt 2018, Porto, Portugal, 26.-28.07.2018, ISBN 978-989-758-319-3,
DOI: 10.5220/0006899506980702,
[Conference or Workshop Item]

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza (2018):
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: AsiaCCS, In: 13th ASIA Conference on Information, Computer and Communications Security,
[Conference or Workshop Item]

Miettinen, Markus ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2018):
Revisiting Context-Based Pairing in IoT.
In: Proceedings of the 55th Design Automation Conference (DAC), pp. 32:1-32:6,
ACM, 55th Design Automation Conference (DAC), San Francisco, CA, USA, 24.-29.06. 2018, [Conference or Workshop Item]

Zeitouni, Shaza ; Gens, David ; Sadeghi, Ahmad-Reza (2018):
It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs.
In: Design Automation Conference (DAC) 2018,
[Conference or Workshop Item]

Biondo, Andrea ; Conti, Mauro ; Davi, Lucas ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2018):
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
27th USENIX Security Symposium, [Conference or Workshop Item]

Ghaeini, Hamid Reza ; Antonioli, Daniele ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole (2018):
State-Aware Anomaly Detection for Industrial Control Systems.
In: The 33rd ACM/SIGAPP Symposium On Applied Computing (SAC),
Pau, France, DOI: 10.1145/3167132.3167305,
[Conference or Workshop Item]

Gens, David ; Schmitt, Simon ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2018):
K-Miner: Uncovering Memory Corruption in Linux.
In: 25th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Dang, Minh Hoang ; Asokan, N. ; Sadeghi, Ahmad-Reza (2018):
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
In: CoRR, abs/1804.07474, [Article]

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep (2018):
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
In: IEEE Internet Computing, p. 1. ISSN 1089-7801,
DOI: 10.1109/MIC.2018.182130646,
[Article]

Brasser, Ferdinand ; Davi, Lucas ; Dhavlle, Abhijitt ; Frassetto, Tommaso ; Dinakarrao, Sai Manoj Pudukotai ; Rafatirad, Setareh ; Sadeghi, Ahmad-Reza ; Sasan, Avesta ; Sayadi, Hossein ; Zeitouni, Shaza ; Homayoun, Houman (2018):
Advances and Throwbacks in Hardware-assisted Security: Special Session.
In: CASES '18, pp. 15:1-15:10, Piscataway, NJ, USA, IEEE Press, Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems, Piscataway, NJ, USA, ISBN 978-1-5386-5564-1,
[Conference or Workshop Item]

Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2018):
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs.
In: Cryptography and Security, abs/1812.00197, [Article]

Mohan, Sibin ; Asplund, Mikael ; Bloom, Gedare ; Sadeghi, Ahmad-Reza ; Ibrahim, Ahmad ; Salajageh, Negin ; Griffioen, Paul ; Sinopoli, Bruno (2018):
The Future of IoT Security: Special Session.
In: EMSOFT '18, pp. 16:1-16:7, Piscataway, NJ, USA, IEEE Press, International Conference on Embedded Software (EMSOFT 2018), 2018, Piscataway, NJ, USA, ISBN 978-1-5386-5564-1,
[Conference or Workshop Item]

2017

Zeitouni, Shaza ; Dessouky, Ghada ; Arias, Orlando ; Sullivan, Dean ; Ibrahim, Ahmad ; Jin, Yier ; Sadeghi, Ahmad-Reza (2017):
ATRIUM: Runtime Attestation Resilient Under Memory Attacks.
In: 2017 International Conference On Computer Aided Design (ICCAD'17),
Irvine, California, US, [Conference or Workshop Item]

Frassetto, Tommaso ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
JITGuard: Hardening Just-in-time Compilers with SGX.
In: 24th ACM Conference on Computer and Communications Security (CCS),
Dallas, TX, USA, ISBN 978-1-4503-4946-8/17/10,
DOI: 10.1145/3133956.3134037,
[Conference or Workshop Item]

Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Müller, Urs ; Sadeghi, Ahmad-Reza (2017):
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
[Report]

Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro (2017):
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
In: Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID),
Atlanta, Georgia, USA, [Conference or Workshop Item]

Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2017):
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
In: 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017),
[Conference or Workshop Item]

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17, In: 26th USENIX Security Symposium,
[Conference or Workshop Item]

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza (2017):
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT, In: 11th USENIX Workshop on Offensive Technologies,
[Conference or Workshop Item]

Fereidooni, Hossein ; Frassetto, Tommaso ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Conti, Mauro (2017):
Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
In: The Second IEEE International Workshop on Safe, Energy-Aware, & Reliable Connected Health (CHASE-SEARCH),
Philadelphia, Pennsylvania, USA, [Conference or Workshop Item]

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza (2017):
HardIDX: Practical and Secure Index with SGX.
In: Conference on Data and Applications Security and Privacy (DBSec),
[Conference or Workshop Item]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza (2017):
SeED: Secure Non-Interactive Attestation for Embedded Devices.
In: 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017),
Boston, USA, [Conference or Workshop Item]

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick (2017):
Phonion: Practical Protection of Metadata in Telephony Networks.
In: Proceedings on Privacy Enhancing Technologies (PoPETs),
[Conference or Workshop Item]

Dessouky, Ghada ; Zeitouni, Shaza ; Nyman, Thomas ; Paverd, Andrew ; Davi, Lucas ; Koeberl, Patrick ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017):
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
54th Design Automation Conference (DAC'17), [Conference or Workshop Item]

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Frassetto, Tommaso ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu (2017):
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017),
IEEE, Atlanta, GA, USA, DOI: 10.1109/ICDCS.2017.284,
[Conference or Workshop Item]

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu (2017):
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT.
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017),
DOI: 10.1109/ICDCS.2017.283,
[Conference or Workshop Item]

Portela, Bernardo ; Barbosa, Manuel ; Scerri, Guillaume ; Warinschi, Bogdan ; Bahmani, Raad ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2017):
Secure Multiparty Computation from SGX.
In: Financial Cryptography and Data Security,
[Conference or Workshop Item]

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed (2017):
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael (2017):
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17),
Internet Society, DOI: 10.14722/ndss.2017.23097,
[Conference or Workshop Item]

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. (2017):
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2017):
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (1), pp. 62-78. De Gruyter Open, DOI: 10.1515/popets-2017-0005,
[Article]

Sullivan, Dean ; Arias, Orlando ; Gens, David ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier (2017):
Execution Integrity with In-Place Encryption.
In: CoRR, abs/1703.02698, [Article]

Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017):
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.
In: Cryptography and Security, abs/1705.10295, [Article]

2016

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
In: Black Hat Europe,
[Conference or Workshop Item]

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
CATT: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
In: Cryptography and Security, [Article]

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Ibrahim, Ahmad ; Conti, Mauro ; Neven, Gregory (2016):
SANA: Secure and Scalable Aggregate Network Attestation.
In: 23rd ACM Conference on Computer and Communications Security (CCS) 2016,
CCS 2016, [Conference or Workshop Item]

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza (2016):
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
In: 23rd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza (2016):
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In: The annual Privacy Enhancing Technologies Symposium (PETS),
[Conference or Workshop Item]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza (2016):
DARPA: Device Attestation Resilient to Physical Attacks.
In: ACM WiSEC 2016,
[Conference or Workshop Item]

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2016):
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Dessouky, Ghada (2016):
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
In: ACM WiSec 2016,
[Conference or Workshop Item]

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2016):
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
In: 53. Annual Design Automation Conference (DAC'16), pp. 73:1-73:6,
ACM, DOI: 10.1145/2897937.2898027,
[Conference or Workshop Item]

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza (2016):
Things, Trouble, Trust: On Building Trust in IoT Systems.
In: 53rd Design Automation Conference (DAC),
[Conference or Workshop Item]

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael (2016):
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
In: USENIX Annual Technical Conference (ATC),
[Conference or Workshop Item]

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
In: 53rd Design Automation Conference (DAC),
[Conference or Workshop Item]

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Regulating ARM TrustZone Devices in Restricted Spaces.
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys),
[Conference or Workshop Item]

Zeitouni, Shaza ; Oren, Yossef ; Wachsmann, Christian ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2016):
Remanence Decay Side-Channel: The PUF Case.
In: IEEE Transactions on Information Forensics and Security, 99, DOI: TIFS.2015.2512534,
[Article]

McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh (2016):
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, 104 (5), pp. 1039-1057. DOI: 10.1109/JPROC.2015.2512235,
[Article]

Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Leakage-Resilient Layout Randomization for Mobile Devices.
In: 23rd Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016):
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
In: Financial Crypto 2016,
[Conference or Workshop Item]

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016):
Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
[Report]

Miettinen, Markus ; Huang, Jialin ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2016):
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
In: Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16),
Darmstadt, Germany, [Conference or Workshop Item]

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: DAC '16, In: Proceedings of the 53nd Annual Design Automation Conference,
ACM, [Conference or Workshop Item]

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
In: 53rd Design Automation Conference (DAC),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Armknecht, Frederik (2016):
Towards a Unified Security Model for Physically Unclonable Functions.
In: CT-RSA - Cryptographers' Track at the RSA Conference,
[Conference or Workshop Item]

2015

Davi, Lucas ; Sadeghi, Ahmad-Reza (2015):
Building Secure Defenses Against Code-Reuse Attacks.
Cham, Springer International Publishing, ISBN 978-3-319-25544-6,
DOI: 10.1007/978-3-319-25546-0,
[Book]

Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael (2015):
Automated Software Diversity.
In: Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool, DOI: 10.2200/S00686ED1V01Y201512SPT014,
[Book]

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2015):
Automated Synthesis of Optimized Circuits for Secure Computation.
In: 22. ACM Conference on Computer and Communications Security (CCS'15), pp. 1504-1517,
ACM, DOI: 10.1145/2810103.2813678,
[Conference or Workshop Item]

Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza (2015):
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael (2015):
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015):
SEDA: Scalable Embedded Device Attestation.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015):
Return to Where? You Can't Exploit What You Can't Find.
In: Blackhat USA,
[Conference or Workshop Item]

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015):
SEDA - Technical Report.
[Report]

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension (Best Paper Award).
In: 52nd Design Automation Conference (DAC),
[Conference or Workshop Item]

Songhori, Ebrahim ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2015):
Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis.
In: 52nd Design Automation Conference (DAC),
[Conference or Workshop Item]

Nagy, Marcin ; Bui, Thanh Phong ; Cristofaro, Emiliano De ; Asokan, N. ; Ott, Jörg ; Sadeghi, Ahmad-Reza (2015):
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
In: ACM WiSEC 2015,
[Conference or Workshop Item]

Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2015):
TyTAN: Tiny Trust Anchor for Tiny Devices.
In: 52nd Design Automation Conference (DAC) 2015,
[Conference or Workshop Item]

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension.
In: 52nd Design Automation Conference (DAC),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Waidner, Michael (2015):
Security and Privacy Challenges in Industrial Internet of Things.
In: 52nd Design Automation Conference (DAC) Research,
[Conference or Workshop Item]

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2015):
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
In: 36. IEEE Symposium on Security and Privacy (IEEE S&P'15), pp. 411-428,
IEEE, DOI: 10.1109/SP.2015.32,
[Conference or Workshop Item]

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015):
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
In: 36th IEEE Symposium on Security and Privacy (Oakland),
[Conference or Workshop Item]

Schuster, Felix ; Tendyck, Thomas ; Liebchen, Christopher ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten (2015):
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
In: 36th IEEE Symposium on Security and Privacy (Oakland),
[Conference or Workshop Item]

Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza (2015):
XiOS: Extended Application Sandboxing on iOS.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015),
[Conference or Workshop Item]

Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian (2015):
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
In: 22nd Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Busold, Christoph ; Heuser, Stephan ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah (2015):
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
In: Financial Cryptography and Data Security,
[Conference or Workshop Item]

Dmitrienko, Alexandra ; Heuser, Stephan ; Nguyen, Thien Duc ; Ramos, Marcos da Silva ; Rein, Andre ; Sadeghi, Ahmad-Reza (2015):
Market-driven Code Provisioning to Mobile Secure Hardware.
In: Financial Cryptography and Data Security,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Davi, Lucas ; Larsen, Per (2015):
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? - Keynote -.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015),
[Conference or Workshop Item]

Miettinen, Markus ; Asokan, N. ; Koushanfar, Farinaz ; Nguyen, Thien Duc ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Sobhani, Majid ; Yellapantula, Sudha (2015):
I know where you are: Proofs of Presence resilient to malicious provers.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015),
[Conference or Workshop Item]

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep (2015):
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices.
In: CoRR, abs/1511.02119, [Article]

2014

Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2014):
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions.
In: Synthesis Lectures on Information Security, Privacy, and Trust, 12, San Rafael, Morgan & Claypool Publishers, ISBN 9781627055093,
DOI: 10.2200/S00622ED1V01Y201412SPT012,
[Book]

Sadeghi, Ahmad-Reza ; Brasser, Ferdinand (2014):
Swap and Play: Live Updating Hypervisors and Its Application to Xen.
In: CCSW 2014: The ACM Cloud Computing Security Workshop Proceedings,
DOI: http://dl.acm.org/citation.cfm?doid=2664168.2664173,
[Conference or Workshop Item]

Miettinen, Markus ; Asokan, N. ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Sobhani, Majid (2014):
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
In: Proc. ACM Conference on Computer and Communications Security,
ACM, DOI: 10.1145/2660267.2660334,
[Conference or Workshop Item]

Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
Kutylowski, Miroslaw ; Vaidya, Jaideep (eds.) (2014):
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Lecture Notes in Computer Science, 8712, In: Computer Security - ESORICS 2014, pp. 76-93, Springer International Publishing, ISBN 978-3-319-11202-2,
DOI: 10.1007/978-3-319-11203-9_5,
[Book Section]

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
In: 23rd USENIX Security Symposium,
[Conference or Workshop Item]

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza (2014):
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
In: BlackHat USA,
[Conference or Workshop Item]

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
In: 23rd USENIX Security Symposium,
[Conference or Workshop Item]

Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2014):
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8), pp. 1189-1206. [Article]

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014):
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4), [Article]

Kong, Joonho ; Koushanfar, Farinaz ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2014):
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
In: Design Automation Conference (DAC) 2014, pp. 1-6,
ACM Press, [Conference or Workshop Item]

Mustafa, Hossen ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Xu, Wenyuan (2014):
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
In: 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),
[Conference or Workshop Item]

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. (2014):
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014),
Kyoto, Japan, DOI: 10.1145/2590296.2590337,
[Conference or Workshop Item]

Davi, Lucas ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2014):
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
In: 51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing,
[Conference or Workshop Item]

Koeberl, Patrick ; Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Varadharajan, Vijay (2014):
TrustLite: A Security Architecture for Tiny Embedded Devices.
In: European Conference on Computer Systems (EuroSys),
ACM, Amsterdam, Netherlands, DOI: 10.1145/2592798.2592824,
[Conference or Workshop Item]

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
[Report]

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014):
On the (In)Security of Mobile Two-Factor Authentication.
In: Financial Cryptography and Data Security (FC'14),
Springer, [Conference or Workshop Item]

Dmitrienko, Alexandra ; Noack, David ; Sadeghi, Ahmad-Reza ; Yung, Moti (2014):
POSTER: On Offline Payments with Bitcoin.
In: FC'2014: Financial Cryptography and Data Security Conference,
[Conference or Workshop Item]

Senftleben, Marius ; Bucicoiu, Mihai ; Tews, Erik ; Armknecht, Frederik ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza (2014):
MoP-2-MoP - Mobile private microblogging.
In: Financial Cryptography and Data Security (FC'14),
Springer, [Conference or Workshop Item]

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
(TUD-CS-2014-0063), [Report]

Schulz, Steffen ; Varadharajan, Vijay ; Sadeghi, Ahmad-Reza (2014):
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: IEEE Transactions on Information Forensis and Security, 9 (2), pp. 221-232. IEEE, ISSN 1556-6021,
[Article]

Catuogno, Luigi ; Löhr, Hans ; Winandy, Marcel ; Sadeghi, Ahmad-Reza (2014):
A trusted versioning file system for passive mobile storage devices.
38, In: J. Network and Computer Applications, pp. 65-75,
[Conference or Workshop Item]

2013

Nagy, Marcin ; Cristofaro, Emiliano De ; Dmitrienko, Alexandra ; Asokan, N. ; Sadeghi, Ahmad-Reza (2013):
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
In: Annual Computer Security Applications Conference (ACSAC 2013),
New Orleans, Loouisiana, USA, [Conference or Workshop Item]

Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza (2013):
Mobile Platform Security.
In: Synthesis Lectures on Information Security, Privacy, and Trust, 9, San Rafael, Morgan & Claypool, ISBN 9781627050975,
DOI: 10.2200/S00555ED1V01Y201312SPT009,
[Book]

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2013):
A Security Framework for Analysis and Design of Software Attestation.
In: ACM Conference on Computer and Communications Security (CCS), pp. 1-12,
ACM Press, [Conference or Workshop Item]

Stancill, Blaine ; Snow, Kevin ; Otterness, Nathan ; Monrose, Fabian ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2013):
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
In: 16th Research in Attacks, Intrusions and Defenses (RAID) Symposium,
[Conference or Workshop Item]

Oren, Yossef ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2013):
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
In: Lecture Notes on Computer Science (LNCS), 8068, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 107-125,
Springer, [Conference or Workshop Item]

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2013):
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
In: 22nd USENIX Security Symposium (USENIX Security '13),
USENIX, [Conference or Workshop Item]

Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza (2013):
Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same.
In: BlackHat USA,
[Conference or Workshop Item]

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. (2013):
ConXsense – Context Sensing for Adaptive Usable Access Control.
[Report]

Asokan, N. ; Dmitrienko, Alexandra ; Nagy, Marcin ; Reshetova, Elena ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stelle, Stanislaus (2013):
CrowdShare: Secure Mobile Resource Sharing.
pp. 432-440, Springer, 11. International Conference on Applied Cryptography and Network Security (ACNS'13), ISSN 0302-9743,
DOI: 10.1007/978-3-642-38980-1_27,
[Conference or Workshop Item]

Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013):
Client-controlled Cryptography-as-a-Service in the Cloud.
In: 11th International Conference on Applied Cryptography and Network Security (ACNS 2013),
[Conference or Workshop Item]

Buchmann, Johannes ; Demirel, Denise ; Graaf, Jeroen van de
Sadeghi, Ahmad-Reza (ed.) (2013):
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
In: LNCS, In: Financial Cryptography and Data Security: 17th International Conference, 2013, pp. 197-204,
Springer, ISBN 978-3-642-39883-4,
[Conference or Workshop Item]

Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza (2013):
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (Best Student Paper Award).
In: 34th IEEE Symposium on Security and Privacy (Oakland 2013),
[Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013):
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013),
[Conference or Workshop Item]

Kocabas, Unal ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2013):
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
In: Conference on Digital Automation and Test Europe (DATE),
Interactive Presentation, [Conference or Workshop Item]

Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2013):
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: CODASPY '13, In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 233-242,
ACM Press, San Antonio, Texas, USA, ISBN 978-1-4503-1890-7,
DOI: 10.1145/2435349.2435382,
[Conference or Workshop Item]

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2013):
A Systematic Approach to Practically Efficient General Two-Party Secure Function Evaluation Protocols and their Modular Design.
In: Journal of Computer Security (JCS), 21 (2), pp. 283-315. IOS Press, DOI: 10.3233/JCS-130464,
[Article]

Werthmann, Tim ; Hund, Ralf ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten (2013):
PSiOS: Bring Your Own Privacy & Security to iOS Devices (Distinguished Paper Award).
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013),
[Conference or Workshop Item]

2012

Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2012):
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
In: BlackHat Abu Dhabi,
[Conference or Workshop Item]

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012):
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
(TUD-CS-2012-0226), [Report]

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012):
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
(TUD-CS-2012-0231), [Report]

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Rožic, Vladimir ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012):
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
In: Lecture Notes in Computer Science (LNCS), 7428, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 283-301,
Springer, [Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012):
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay (2012):
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version).
[Report]

Sadeghi, Ahmad-Reza ; Kocabaş, Ünal ; Katzenbeisser, Stefan (2012):
Converse PUF-Based Authentication.
In: International Conference on Trust & Trustworthy Computing (TRUST),
Springer, [Conference or Workshop Item]

Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Tamrakar, Sandeep ; Wachsmann, Christian (2012):
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
In: Lecture Notes in Computer Science (LNCS), 7344, In: International Conference on Trust & Trustworthy Computing (TRUST), pp. 219-238,
Springer, [Conference or Workshop Item]

Seudié, Hervé ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza (2012):
EDA for Secure and Dependable Cybercars: Challenges and Opportunities.
In: ACM/IEEE Design Automation Conference (DAC),
[Conference or Workshop Item]

Jiang, Xuxian ; Grace, Michael ; Sadeghi, Ahmad-Reza ; Zhou, Wu (2012):
Unsafe Exposure Analysis of Mobile In-App Advertisements.
In: to appear at WiSec,
ACM, [Conference or Workshop Item]

Wachsmann, Christian ; Sadeghi, Ahmad-Reza ; Schulz, Steffen (2012):
Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions.
In: Secure Smart Embedded Devices, Platforms and Applications, pp. 429-449, Springer, [Book Section]

Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Zhdanova, Maria ; Xu, Wenyuan ; Mustafa, Hossen ; Varadharajan, Vijay (2012):
Tetherway: A Framework for Tethering Camouflage.
In: Conference on Security and Privacy in Wireless and Mobile Networks (WiSec),
ACM Press, Tuscon, Arizona, ISBN 978-1-4503-1265-3,
[Conference or Workshop Item]

Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid (2012):
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
In: Conference on Digital Automation and Test Europe (DATE),
[Conference or Workshop Item]

Ahmad, Junaid Jameel ; Li, Shujun ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2012):
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
In: 16. International Conference on Financial Cryptography and Data Security (FC'12), pp. 299-313,
Springer, DOI: 10.1007/978-3-642-32946-3_22,
[Conference or Workshop Item]

Herrewege, Anthony van ; Katzenbeisser, Stefan ; Maes, Roel ; Peeters, Roel ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012):
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
In: Lecture Notes in Computer Science (LNCS), 7397, In: Financial Cryptography (FC) 2012, pp. 374-389,
Springer, [Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012):
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
In: 19th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2012):
Towards Taming Privilege-Escalation Attacks on Android.
In: 19th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay
Foresti, Sara ; Yung, Moti ; Martinelli, Fabio (eds.) (2012):
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: Lecture Notes in Computer Science, In: European Symposium on Research in Computer Science (ESORICS), pp. 253-270, Berlin, Heidelberg, Springer Verlag, ISBN 978-3-642-33166-4,
[Book Section]

2011

Bugiel, Sven ; Davi, Lucas ; Schulz, Steffen
Sadeghi, Ahmad-Reza ; Zhang, Xinwen (eds.) (2011):
Scalable Trust Establishment with Software Reputation.
In: Workshop on Scalable Trusted Computing (STC),
ACM Press, Chicago, Illinois, USA, [Conference or Workshop Item]

Bugiel, Sven ; Pöppelmann, Thomas ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011):
AmazonIA: When Elasticity Snaps Back.
In: 18. ACM Conference on Computer and Communications Security (CCS'11), pp. 389-400,
ACM, DOI: 10.1145/2046707.2046753,
[Conference or Workshop Item]

Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011):
Twin Clouds: Secure Cloud Computing with Low Latency.
In: 12. Communications and Multimedia Security Conference (CMS'11), pp. 32-44,
Springer, DOI: 10.1007/978-3-642-24712-5_3,
[Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011):
POSTER: Control-Flow Integrity for Smartphones.
In: 18th ACM Conference on Computer and Communications Security (CCS'11),
ACM, [Conference or Workshop Item]

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2011):
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
In: 18th ACM Conference on Computer and Communications Security (CCS'11),
ACM, [Conference or Workshop Item]

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2011):
Practical and Lightweight Domain Isolation on Android.
In: Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM),
ACM Press, [Conference or Workshop Item]

Barni, Mauro ; Failla, Pierluigi ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011):
Privacy-Preserving ECG Classification with Branching Programs and Neural Networks.
In: IEEE Transactions on Information Forensics and Security (TIFS), 6 (2), pp. 452-468. DOI: 10.1109/TIFS.2011.2108650,
[Article]

Filyanov, Atanas ; McCune, Jonathan ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011):
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
In: 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2011),
Hong Kong, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2011):
Location Privacy in RFID Systemen.
In: Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (2), pp. 70-75. [Article]

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2011):
Lightweight Remote Attestation Using Physical Functions.
In: ACM Conference on Wireless Network Security (WiSec), pp. 109-114,
ACM Press, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2011):
Lightweight Remote Attestation using Physical Functions (Extended Version).
(TR-2011-06-01, Technical ), [Report]

Armknecht, Frederik ; Maes, Roel ; Sadeghi, Ahmad-Reza ; Standaert, François-Xavier ; Wachsmann, Christian (2011):
A Formal Foundation for the Security Features of Physical Functions.
In: IEEE Symposium on Security and Privacy (SSP), pp. 397-412,
IEEE Computer Society, [Conference or Workshop Item]

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza (2011):
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.
(TR-2011-04), [Report]

Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011):
Twin Clouds: An Architecture for Secure Cloud Computing (Extended Abstract).
In: Workshop on Cryptography and Security in Clouds (WCSC'11),
[Conference or Workshop Item]

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011):
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
In: 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011),
[Conference or Workshop Item]

Fischlin, Marc ; Pinkas, Benny ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Visconti, Ivan (2011):
Secure Set Intersection with Untrusted Hardware Tokens.
In: 11th Cryptographers' Track at the RSA Conference (CT-RSA'11), pp. 1-16,
Springer, DOI: 10.1007/978-3-642-19074-2_1,
[Conference or Workshop Item]

Li, Shujun ; Sadeghi, Ahmad-Reza ; Heisrath, Soeren ; Schmitz, Roland ; Ahmad, Junaid Jameel (2011):
hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers.
In: 15th International Conference on Financial Cryptography and Data Security (FC),
St. Lucia, [Conference or Workshop Item]

Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011):
A Security Architecture for Accessing Health Records on Mobile Phones.
In: HEALTHINF'2011: Proceedings of the 4th International Conference on Health Informatics,
Rome, Italy, [Conference or Workshop Item]

Dmitrienko, Alexandra ; Gessner, Dennis ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Stüble, Christian ; Ullmann, Markus (2011):
Trusted embedded System Operating System (TeSOS) - Study and Design.
[Other]

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Leest, Vincent van der ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Schröder, Heike ; Wachsmann, Christian (2011):
Recyclable PUFs: Logically Reconfigurable PUFs.
In: Lecture Notes in Computer Science (LNCS), 6917, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 374-389,
Springer, [Conference or Workshop Item]

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Leest, Vincent van der ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Wachsmann, Christian (2011):
Recyclable PUFs: logically reconfigurable PUFs.
In: Journal of Cryptographic Engineering, 1 (3), pp. 177-186. [Article]

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011):
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED), [Book Section]

Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011):
Securing the Access to Electronic Health Records on Mobile Phones.
In: Biomedical Engineering Systems and Technologies,
[Conference or Workshop Item]

2010

Sadeghi, Ahmad-Reza ; Preneel, Bart ; Pfitzmann, Andreas ; Moran, Tal ; Maier-Rabler, Ursula ; Kutylowski, Miroslaw ; Klonowski, Marek ; Guerses, Seda ; Danezis, George ; Borisov, Nikita ; Baer, Walter (2010):
Machiavelli Confronts 21st Century Digital Technology: Democracy in a Network Society.
[Conference or Workshop Item]

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Scafuro, Alessandra ; Visconti, Ivan ; Wachsmann, Christian (2010):
Impossibility Results for RFID Privacy Notions.
In: LNCS, 6480, In: Transactions on Computational Science IX, pp. 39-63,
Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Li, Shujun ; Shah, Syed Amier Haider ; Khan, Muhammad Asad Usman ; Khayam, Syed Ali ; Schmitz, Roland (2010):
Breaking e-Banking CAPTCHAs.
In: 26th Annual Computer Security Applications Conference (ACSAC 2010),
[Conference or Workshop Item]

Bugiel, Sven ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
TruWalletM: Secure Web Authentication on Mobile Platforms.
In: Proceedings of INTRUST 2010 The Second International Conference on Trusted Systems,
[Conference or Workshop Item]

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
Securing the E-Health Cloud.
In: 1st ACM International Health Informatics Symposium (IHI 2010),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Naccache, David (2010):
Towards Hardware-Intrinsic Security.
In: Information Security and Cryptography, [Conference or Workshop Item]

Henecka, Wilko ; Kögl, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo (2010):
TASTY: Tool for Automating Secure Two-partY computations.
In: Proceedings of the 17. ACM Conference on Computer and Communications Security (CCS'10), pp. 451-462,
Chicago, Illinois, ACM, CCS'10, October 04-08 2010, ISBN 978-1-4503-0245-6,
DOI: 10.1145/1866307.1866358,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Mukherjee, Biswanath ; Ghosal, Dipak ; Liu, Yali (2010):
Video Streaming Forensic - Content Identification with Traffic Snooping.
In: 13th Information Security Conference (ISC 2010),
[Conference or Workshop Item]

Chen, Liqun ; Dietrich, Kurt ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Winter, Johannes (2010):
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
In: LNCS, 6531, In: Information Security Conference (ISC), pp. 84-98,
Springer, [Conference or Workshop Item]

Checkoway, Stephen ; Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Shacham, Hovav ; Winandy, Marcel (2010):
Return-Oriented Programming without Returns.
In: CCS '10, In: Proceedings of the 17th ACM conference on Computer and communications security, pp. 559--572,
ACM, Chicago, Illinois, USA, ISBN 978-1-4503-0245-6,
DOI: http://doi.acm.org/10.1145/1866307.1866370,
[Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
Privilege Escalation Attacks on Android.
In: ISC 2010: Proceedings of the 13th Information Security Conference,
Boca Raton, Florida, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010):
Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten.
In: LNI, P-174, In: Workshop Innovative und sichere Informationstechnologie für das Gesundheitswesen von morgen (perspeGKtive'10), pp. 11-25,
Bonner Köllen Verlag, [Conference or Workshop Item]

Almeida, José Bacelar ; Bangerter, Endre ; Barbosa, Manuel ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010):
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
In: 15. European Symposium on Research in Computer Security (ESORICS'10), pp. 151-167,
Springer, DOI: 10.1007/978-3-642-15497-3_10,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010):
Enhancing RFID Security and Privacy by Physically Unclonable Functions.
In: Information Security and Cryptography, In: Towards Hardware-Intrinsic Security: Foundations and Practice, pp. 281-307, Springer, [Book Section]

Bangerter, Endre ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010):
YACZK: Yet Another Compiler for Zero-Knowledge (Poster Abstract).
19th USENIX Security Symposium : Security'10 ; Poster Session, Santa Clara, CA, USA, August 14–16, 2019, [Conference or Workshop Item]

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010):
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
In: 12. International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10), pp. 383-397,
Springer, DOI: 10.1007/978-3-642-15031-9_26,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2010):
Trusted Computing.
In: Handbook of Financial Cryptography and Security, pp. 221-256,
CRC Press, [Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
Return-Oriented Programming without Returns on ARM.
(HGI-TR-2010-002), [Report]

Alsouri, Sami ; Dagdelen, Özgür ; Katzenbeisser, Stefan
Acquisti, A. ; Sadeghi, Ahmad-Reza (eds.) (2010):
Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation.
In: 3rd International Conference on Trust and Trustworthy Computing (TRUST 2010), pp. 63-77,
[Conference or Workshop Item]

Armknecht, Frederik ; Ghosal, Dipak ; Katzenbeisser, Stefan ; Liu, Yali ; Sadeghi, Ahmad-Reza ; Schulz, Steffen (2010):
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
In: Information Hiding Conference (IH),
Springer, [Conference or Workshop Item]

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010):
On RFID Privacy with Mutual Authentication and Tag Corruption.
In: LNCS, 6123, In: International Conference on Applied Cryptography and Network Security (ACNS), pp. 493-510,
Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Cesena, Emanuele ; Ramunno, Gianluca ; Vernizzi, Davide (2010):
Anonymous Authentication with TLS and DAA.
In: TRUST2010,
[Conference or Workshop Item]

Armknecht, Frederik ; Chen, Liqun ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2010):
Anonymous Authentication for RFID Systems.
In: LNCS, 6370, In: Workshop on RFID Security (RFIDSec), pp. 158-175,
Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Winandy, Marcel (2010):
Token-Based Cloud Computing - Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
In: 3. International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud, pp. 417-429,
Springer, DOI: 10.1007/978-3-642-13869-0_30,
[Conference or Workshop Item]

Kostiainen, Kari ; Dmitrienko, Alexandra ; Ekberg, Jan-Erik ; Sadeghi, Ahmad-Reza ; Asokan, N. (2010):
Key Attestation from Trusted Execution Environments.
In: TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, p. 30,
Berlin, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Li, Shujun ; Khayam, Syed Ali ; Schmitz, Roland (2010):
Breaking a Virtual Password System Based on Randomized Linear Generation Functions.
In: IEEE ICC 2010 - Communication and Information System Security Symposium ('ICC'10 CISS'),
[Conference or Workshop Item]

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5, pp. 289-298. [Article]

Manulis, Mark ; Sadeghi, Ahmad-Reza (2010):
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.
In: Int. J. of Wireless and Mobile Computing (IJWMC), 4 (1), pp. 17-30. [Article]

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010):
PUF-Enhanced RFID Security and Privacy.
In: Workshop on Secure Component and System Identification (SECSI),
[Conference or Workshop Item]

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 34 (5), pp. 289-294. [Article]

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
(HGI-TR-2010-001), [Report]

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
Patterns for Secure Boot and Secure Storage in Computer Systems.
In: 4th International Workshop on Secure systems methodologies using patterns (SPattern 2010),,
[Conference or Workshop Item]

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010):
Embedded SFE: Offloading Server and Network using Hardware Tokens.
In: 14. International Conference on Financial Cryptography and Data Security (FC'10), pp. 207-221,
Springer, DOI: 10.1007/978-3-642-14577-3_17,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Cabuk, Serdar ; Dalton, Chris ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramasamy, Hari Govind ; Ramunno, Gianluca ; Schunter, Matthias (2010):
Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers.
In: Journal of Computer Security, 18 (1), pp. 89-121. [Article]

Schulz, Steffen ; Sadeghi, Ahmad-Reza (2010):
Extending IPsec for Efficient Remote Attestation.
LNCS, In: Financial Cryptography and Data Security (FC),
Springer, [Conference or Workshop Item]

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010):
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens.
In: Information Security and Cryptography, In: Towards Hardware Intrinsic Security: Foundation and Practice, pp. 367-386, Springer-Verlag Berlin Heidelberg, DOI: 10.1007/978-3-642-14452-3_17,
[Book Section]

2009

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo (2009):
Efficient Privacy-Preserving Face Recognition.
In: 12. International Conference on Information Security and Cryptology (ICISC'09), pp. 229-244,
Springer, DOI: 10.1007/978-3-642-14423-3_16,
[Conference or Workshop Item]

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Paus, Annika ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009):
Efficient Privacy-Preserving Classification of ECG Signals.
In: 1. IEEE International Workshop on Information Forensics and Security (IEEE WIFS'09), pp. 91-95,
London, IEEE, DOI: 10.1109/WIFS.2009.5386475,
[Conference or Workshop Item]

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009):
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
In: 8. International Conference on Cryptology And Network Security (CANS'09), pp. 1-20,
Springer, DOI: 10.1007/978-3-642-10433-6_1,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Maes, Roel ; Sunar, Berk ; Tuyls, Pim (2009):
Memory Leakage-Resilient Encryption based on Physically Unclonable Functions.
In: ASIACRYPT'09,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Li, Shujun ; Asghar, Hassan Jameel ; Pieprzyk, Josef ; Schmitz, Roland ; Wang, Huaxiong (2009):
On the Security of PAS (Predicate-based Authentication Service).
In: Annual Computer Security Applications Conference (ACSAC’09), 2009.,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009):
Anonymizer-Enabled Security and Privacy for RFID.
In: LNCS, 5888, In: International Conference on Cryptology and Network Security (CANS), pp. 134-153,
Springer, [Conference or Workshop Item]

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan (2009):
Hide and Seek in Time - Robust Covert Timing Channels.
In: ESORICS, pp. 120-135,
[Conference or Workshop Item]

Catuogno, Luigi ; Dmitrienko, Alexandra ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramunno, Gianluca ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Schunter, Matthias ; Winandy, Marcel ; Zhan, Jing (2009):
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
In: International Conference on Trusted Systems (INTRUST),
Springer, [Conference or Workshop Item]

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
Transparent Mobile Storage Protection in Trusted Virtual Domains.
In: USENIX LISA 2009,
USENIX, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Zhan, Jing ; Korthaus, René (2009):
A Practical Property-based Bootstrap Architecture.
In: ACMSTC'09,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009):
Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics (Poster).
Bochum, Section Days of Ruhr-University Bochum Research School, Bochum, 6. November 2009, [Conference or Workshop Item]

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
Transparent Mobile Storage Protection in Trusted Virtual Domains.
In: 23rd Large Installation System Administration Conference (LISA '09), pp. 159-172,
[Conference or Workshop Item]

Gajek, Sebastian ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
In: 4th ACM Workshop on Scalable Trusted Computing,
[Conference or Workshop Item]

Bangerter, Endre ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Tsay, Joe-Kai (2009):
On the Design and Implementation of Efficient Zero-Knowledge Proofs of Knowledge.
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09), pp. 125-144,
[Conference or Workshop Item]

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009):
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Vishik, Claire ; Verbauwhede, Ingrid (2009):
Future of Assurance: Ensuring that a System is Trustworthy.
In: ISSE'09,
[Conference or Workshop Item]

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009):
How to Combine Homomorphic Encryption and Garbled Circuits - Improved Circuits and Computing the Minimum Distance Efficiently.
In: 1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09),
[Conference or Workshop Item]

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009):
Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification.
In: 1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09),
[Conference or Workshop Item]

Bangerter, Endre ; Briner, Thomas ; Henecka, Wilko ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009):
Automatic Generation of Sigma-Protocols.
In: 6. European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09), pp. 67-82,
Springer, DOI: 10.1007/978-3-642-16441-5_5,
[Conference or Workshop Item]

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009):
Secure Evaluation of Private Linear Branching Programs with Medical Applications.
In: 14. European Symposium on Research in Computer Security (ESORICS'09), pp. 424-439,
Springer, DOI: 10.1007/978-3-642-04444-1_26,
[Conference or Workshop Item]

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
In: STC '09, In: Proceedings of the 2009 ACM workshop on Scalable trusted computing, pp. 49--54,
ACM, Chicago, Illinois, USA, ISBN 978-1-60558-788-2,
DOI: http://doi.acm.org/10.1145/1655108.1655117,
[Conference or Workshop Item]

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan (2009):
Hide and Seek in Time - Robust Covert Timing Channels.
In: LNCS, In: European Symposium on Research in Computer Security (ESORICS), pp. 120-135,
Springer, ISBN 978-3-642-04443-4,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009):
Location Privacy in RFID Applications.
In: LNCS, 5599, In: Privacy in Location-Based Applications: Research Issues and Emerging Trends, pp. 127-150,
Springer, [Conference or Workshop Item]

Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
A Pattern for Secure Graphical User Interface Systems.
In: 3rd International Workshop on Secure systems methodologies using patterns (SPattern'09), Proceedings of the 20th International Workshop on Database and Expert Systems Applications, pp. 186-190,
IEEE, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Kursawe, Klaus ; Schellekens, Dries ; Skoric, Boris ; Tuyls, Pim (2009):
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage.
In: 2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009):
Enhancing RFID Security and Privacy by Physically Unclonable Functions (Extended Abstract).
In: Dagstuhl Seminar Proceedings, In: Foundations for Forgery-Resilient Cryptographic Hardware, pp. 10-11,
Schloss Dagstuhl, [Conference or Workshop Item]

Paus, Annika ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009):
Practical Secure Evaluation of Semi-Private Functions.
In: 7. International Conference on Applied Cryptography and Network Security (ACNS'09), pp. 89-106,
Springer, DOI: 10.1007/978-3-642-01957-9_6,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009):
Efficient RFID Security and Privacy with Anonymizers.
In: Workshop on RFID Security (RFIDSec),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
Einsatz von Sicherheitskernen und Trusted Computing.
In: D-A-CH Security,
[Conference or Workshop Item]

Bangerter, Endre ; Barzan, Stefania ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Tsay, Joe-Kai (2009):
Bringing Zero-Knowledge Proofs of Knowledge to Practice.
In: 17. International Workshop on Security Protocols (SPW'09),
Springer, DOI: 10.1007/978-3-642-36213-2_9,
[Conference or Workshop Item]

Bangerter, Endre ; Camenisch, Jan ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009):
Automatic Generation of Sound Zero-Knowledge Protocols.
In: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques : Poster session,
28th Advances in Cryptology - EUROCRYPT 2009, Cologne, Germany, April 26-30, 2009, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Tuyls, Pim ; Maes, Roel ; Sunar, Berk (2009):
Physically Unclonable Pseudorandom Functions.
In: Poster session of Advances in Cryptology - EUROCRYPT,
[Conference or Workshop Item]

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Vishik, Claire ; Winandy, Marcel (2009):
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
In: LNCS, 5451, In: 5th Information Security Practice and Experience Conference (ISPEC'09), pp. 396-407,
Springer, [Conference or Workshop Item]

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Weber, Marion ; Winandy, Marcel (2009):
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
In: LNCS, 5471, In: Proceedings of the 2nd International Conference on Trusted Computing, pp. 45-62,
Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schulz, Steffen (2009):
Secure VPNs for Trusted Computing Environments.
In: International Conference on Trusted Computing (TRUST),
Springer, Oxford, UK, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Bangerter, Endre ; Barbosa, Manuel ; Bernstein, Daniel ; Damgård, Ivan ; Page, Dan ; Pagter, Jakob ; Sovio, Sampo (2009):
Using Compilers to Enhance Cryptographic Product Development.
In: Information Security Solutions Europe (ISSE),
[Conference or Workshop Item]

2008

Sadeghi, Ahmad-Reza ; Schneider, Thomas (2008):
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.
In: 11. International Conference on Information Security and Cryptology (ICISC'08), pp. 336-353,
Springer, DOI: 10.1007/978-3-642-00730-9_21,
[Conference or Workshop Item]

Rupp, Andy ; Leander, Gregor ; Bangerter, Endre ; Dent, Alexander ; Sadeghi, Ahmad-Reza (2008):
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
In: Advances in Cryptology - ASIACRYPT 2008,
[Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark ; Pereira, Olivier (2008):
Universally Composable Security Analysis of TLS.
In: Second Conference on Provable Security (ProvSec),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008):
Improved Security Notions and Protocols for Non-Transferable Identification.
In: 13th European Symposium on Research in Computer Security (ESORICS),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Gasmi, Yacine ; Ramunno, Gianluca ; Vernizzi, Davide ; Stewin, Patrick ; Unger, Martin (2008):
An Efficient Implementation of Trusted Channels Based on OpenSSL.
In: ACMSTC 2008,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2008):
User Privacy in Transport Systems Based on RFID E-Tickets.
In: International Workshop on Privacy in Location-Based Applications (PiLBA),
Malaga, Spain, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Husseiki, Rani ; Gasmi, Yacine ; Stewin, Patrick ; Unger, Martin (2008):
Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains.
In: 3rd ACM Workshop on Scalable Trusted Computing,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Bangerter, Endre ; Djackov, Maksim (2008):
A Demonstrative Ad-hoc Attestation System.
In: Information Security Conference 2008 (ISC'08),
Taipei, Taiwan, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark (2008):
Property-Based Attestation without a Trusted Third Party.
In: Information Security Conference (ISC'08),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2008):
Property-Based TPM Virtualization.
In: LNCS, In: Information Security, 11th International Conference (ISC 2008), pp. 1-16,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Shokrollahi, Jamshid ; Bösch, Christoph ; Guajardo, Jorge ; Tuyls, Pim (2008):
Efficient Helper Data Key Extractor on FPGAs.
In: Workshop on Cryptographic Hardware and Embedded Systems 2008 (CHES 2008),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Gröbert, Felix ; Birk, Dominik (2008):
A Forensic Framework for Tracing Phishers.
In: LNCS, Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008):
Resettable and Non-Transferable Chip Authentication for E-Passports.
In: RFIDSec 2008,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Osterhues, André ; Wolf, Marko ; Asokan, Nadarajah (2008):
Securing Peer-to-Peer Distributions for Mobile Devices.
In: 4th Information Security Practice and Experience Conference (ISPEC 2008),
Sydney, Australia, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, André ; Wolf, Marko ; Asokan, N. (2008):
Securing Peer-to-Peer Distributions for Mobile Devices.
4th Information Security Practice and Experience Conference (ISPEC 2008), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Löhr, Hans ; Manulis, Mark ; Escalante, Alberto (2008):
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
In: 4th Information Security Practice and Experience Conference (ISPEC 2008),
Sydney, Australia, [Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2008):
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008):
Identification Protocols Revisited - Episode I: E-Passports.
e-crypt workshop on Secure Component and System Identification (SECSI), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008):
Identification Protocols Revisited - Episode I: E-Passports.
In: e-crypt workshop on Secure Component and System Identification (SECSI),
[Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2008):
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: ACM Symposium on Information, Computer and Communications Security (ASIACCS'08),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza (2008):
Trusted Computing—State of the Art and Challenges.
In: LNCS, In: SOFSEM 2008,
Springer, [Conference or Workshop Item]

Armknecht, Frederik ; Escalante, Alberto ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza (2008):
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
In: Lecture Notes in Computer Science, 4991, In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, pp. 29--44,
Springer, [Conference or Workshop Item]

Chen, Liqun ; Escalante, Alberto ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza (2008):
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
In: Lecture Notes in Computer Science, 4886, In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, pp. 29--44,
Springer-Verlag, [Conference or Workshop Item]

Chen, Liqun ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza (2008):
Property-Based Attestation without a Trusted Third Party.
In: Lecture Notes in Computer Science, 5222, In: Information Security, 11th International Conference, ISC 2008, pp. 31--46,
Springer, [Conference or Workshop Item]

Gajek, Sebastian ; Manulis, Mark ; Pereira, Olivier ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2008):
Universally Composable Security Analysis of TLS.
In: Lecture Notes in Computer Science, 5324, In: Proceedings of the 2nd International Conference on Provable Security (ProvSec 2008), pp. 313--327,
Springer, [Conference or Workshop Item]

Gajek, Sebastian ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2008):
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), pp. 300--311,
ACM Press, [Conference or Workshop Item]

2007

Asokan, N. ; Gasmi, Yacine ; Sadeghi, Ahmad-Reza ; Stewin, Patrick ; Unger, Martin (2007):
Beyond Secure Channels.
pp. 30-40, ACM Press, ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), [Conference or Workshop Item]

Eisenbarth, Thomas ; Güneysu, Tim ; Paar, Christof ; Sadeghi, Ahmad-Reza ; Schellekens, Dries ; Wolf, Marko (2007):
Reconfigurable Trusted Computing in Hardware.
pp. 15-25, ACM Press, ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Gasmi, Yacine ; Stewin, Patrick ; Unger, Martin ; Asokan, Nadarajah (2007):
Beyond Secure Channels.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), pp. 30-40,
ACM Press, Alexandria, Virginia, USA, [Conference or Workshop Item]

Paar, Christof ; Sadeghi, Ahmad-Reza ; Güneysu, Tim ; Eisenbarth, Thomas ; Schellekens, Dries ; Wolf, Marko (2007):
Reconfigurable Trusted Computing in Hardware.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), pp. 15-25,
ACM Press, Alexandria, Virginia, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Wolf, Christopher ; Stüble, Christian ; Asokan, N. ; Ekberg, Jan-Erik (2007):
Enabling Fairer Digital Rights Management with Trusted Computing.
In: LNCS, 4779, In: 10th International Conference on Information Security (ISC 2007), pp. 53-70,
Springer Verlag, Valparaíso, Chile, [Conference or Workshop Item]

Celik, Mehmet ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza ; Skoric, Boris (2007):
Combining Tardos Fingerprinting Codes and Fingercasting.
In: LNCS, 4567, pp. 294-310, Springer Verlag, 9th International Workshop on Information Hiding (IH 2007), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Katzenbeisser, Stefan ; Skoric, Boris ; Celik, Mehmet (2007):
Combining Tardos Fingerprinting Codes and Fingercasting.
In: LNCS, 4567, In: 9th International Workshop on Information Hiding (IH 2007), pp. 294-310,
Springer Verlag, Saint Malo, France, [Conference or Workshop Item]

Manulis, Mark
Paar, Christof ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (eds.) (2007):
Provably Secure Group Key Exchange.
In: IT Security, 5, Europäischer Universitätsverlag, ISBN 978-3-89966-275-7,
[Book]

Adelsbach, Andre ; Huber, Ulrich ; Sadeghi, Ahmad-Reza (2007):
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
In: LNCS, 4499, pp. 1-34, Springer Verlag, Transactions on Data Hiding and Multimedia Security II, [Conference or Workshop Item]

Gajek, Sebastian ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2007):
Browser-based Authentication Protocols for Naive Users.
Western European Workshop on Research in Cryptology (WEWoRC 2007), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Gröbert, Felix ; Birk, Dominik (2007):
Phishing Phishers - Observing and Tracing Organized Cybercrime.
In: Second International Conference on Internet Monitoring and Protection (ICIMP 2007), p. 3,
IEEE Computer Society, Silicon Valley, California, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2007):
Fingercasting—Joint Fingerprinting and Decryption of Broadcast Messages.
In: LNCS, 4499, In: Transactions on Data Hiding and Multimedia Security II, pp. 1-34,
Springer Verlag, [Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2007):
Browser-based Authentication Protocols for Naive Users.
In: Western European Workshop on Research in Cryptology (WEWoRC 2007),
Bochum, Germany, [Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2007):
Browser Models for Usable Authentication Protocols.
In: IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07),
Oakland, USA, [Conference or Workshop Item]

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2007):
Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing.
In: Second International Conference on Availability, Reliability and Security (ARES 2007), pp. 120-127,
Vienna, Austria, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark ; Escalante, Alberto (2007):
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
In: LNCS, 4886, In: 11th International Conference on Financial Cryptography and Data Security (FC 2007), pp. 29-44,
Springer Verlag, Scarborough, Trinidad and Tobago, [Conference or Workshop Item]

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2007):
Compartmented Security for Browsers.
(HGI-TR-2007-001), [Report]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Löhr, Hans ; Ramasamy, Hari Govind ; Schulz, Stefan ; Schunter, Matthias (2007):
Enhancing Grid Security Using Trusted Virtualization.
In: LNCS, 4610, In: 4th International Conference on Autonomic and Trusted Computing (ATC 2007), pp. 372-384,
Springer Verlag, Hong Kong, China, [Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Winandy, Marcel (2007):
Trusted User-Aware Web Authentication.
In: Workshop on Trustworthy User Interfaces for Passwords and Personal Information (TIPPI'07),,
Stanford, USA, [Conference or Workshop Item]

Birk, Dominik ; Gajek, Sebastian ; Gröbert, Felix ; Sadeghi, Ahmad-Reza (2007):
Phishing Phishers - Observing and Tracing Organized Cybercrime.
p. 3, IEEE Computer Society, Second International Conference on Internet Monitoring and Protection (ICIMP 2007), [Conference or Workshop Item]

2006

Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian ; Wachsmann, Christian ; Winandy, Marcel (2006):
TCG Inside? - A Note on TPM Specification Compliance.
pp. 47-56, ACM Press, ACM Workshop on Scalable Trusted Computing (ACMSTC), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Selhorst, Marcel ; Stüble, Christian ; Winandy, Marcel (2006):
TCG Inside? - A Note on TPM Specification Compliance.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC), pp. 47-56,
ACM Press, Alexandria, Virginia (USA), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2006):
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
In: LNCS, 4058, In: 11th Australasian Conference on Information Security and Privacy (ACISP 2006),
Springer Verlag, Melbourne, Australia, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006):
Property-based Taming Lying Mobile Nodes.
In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006),
Vienna, Austria, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006):
Property-based Taming Lying Mobile Node.
In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006),
Vienna, Austria, [Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Manulis, Mark (2006):
Linkable Democratic Group Signatures.
In: 2nd Information Security Practice and Experience Conference (ISPEC 2006),
Hangzhou, China, [Conference or Workshop Item]

Manulis, Mark ; Sadeghi, Ahmad-Reza (2006):
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing), [Conference or Workshop Item]

Adelsbach, Andre ; Rohe, Markus ; Sadeghi, Ahmad-Reza (2006):
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
Transactions on Data Hiding and Multimedia Security, [Conference or Workshop Item]

Huber, Ulrich ; Sadeghi, Ahmad-Reza (2006):
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
In: LNCS, 4173, Springer, 9th Information Security Conference (ISC 2006), [Conference or Workshop Item]

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2006):
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
Workshop on Information and System Security (WISSEC'06), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006):
Key Agreement for Heterogeneous Ad-Hoc Groups.
In: International Journal of Wireless and Mobile Computing (IJWMC),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006):
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
In: Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Paar, Christof ; Lemke, Kerstin (2006):
Physical Security Bounds Against Tampering.
In: International Conference on Applied Cryptography and Network Security (ACNS 2006),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Paar, Christof ; Carluccio, Dario ; Lemke-Rust, Kerstin (2006):
E-Passport: The Global Traceability or How to Feel Like an UPS Package.
In: Workshop on RFID Security 2006,
Graz, Austria, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2006):
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
In: Transactions on Data Hiding and Multimedia Security,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2006):
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
[Report]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzebeisser, Stefan (2006):
A Computational Model for Watermark Robustness.
In: Information Hiding Workshop,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Huber, Ulrich (2006):
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
[Report]

Sadeghi, Ahmad-Reza ; Huber, Ulrich (2006):
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
In: LNCS, 4173, In: 9th Information Security Conference (ISC 2006),
Springer, Samos, Greece, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Alkassar, Ammar ; Scheibel, Michael (2006):
Security Architecture for Device Encryption and VPN.
In: Information Security Solution Europe (ISSE06),
[Conference or Workshop Item]

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2006):
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
In: Workshop on Information and System Security (WISSEC'06),
Antwerpen, Belgium, [Conference or Workshop Item]

Manulis, Mark ; Sadeghi, Ahmad-Reza (2006):
Property-Based Taming of Lying Mobile Nodes.
In: Proceedings of 20th International Conference on Advanced Information Networking and Applications (AINA 2006) Volume 2 IEEE International Workshop on Trusted and Autonomic Computing Systems (TACS 2006), pp. 476--480,
IEEE Computer Society, [Conference or Workshop Item]

Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2006):
Linkable Democratic Group Signatures.
In: Lecture Notes in Computer Science, 3903, In: Proceedings of the 2nd Information Security Practice and Experience Conference (ISPEC 2006), pp. 187--201,
Springer-Verlag, ISBN 3-540-33052-6,
[Conference or Workshop Item]

Volkamer, Melanie ; Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Schulz, Stefan (2006):
Enabling the Application of Open Systems like PCs for Online Voting.
In: Frontiers in Electronic Elections -- FEE '06, url{http://fee.iavoss.org/2006/papers/fee-2006-iavoss-Enabling_the_applicat ion_of_open_systems_like-PCs_for_Online_Voting.pdf},
[Conference or Workshop Item]

Lemke, Kerstin ; Paar, Christof ; Sadeghi, Ahmad-Reza (2006):
Physical Security Bounds Against Tampering.
International Conference on Applied Cryptography and Network Security (ACNS 2006), [Conference or Workshop Item]

Carluccio, Dario ; Lemke-Rust, Kerstin ; Paar, Christof ; Sadeghi, Ahmad-Reza (2006):
E-Passport: The Global Traceability or How to Feel Like an UPS Package.
Workshop on RFID Security 2006, [Conference or Workshop Item]

Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Scheibel, Michael ; Stüble, Christian ; Winandy, Marcel (2006):
Security Architecture for Device Encryption and VPN.
Information Security Solution Europe (ISSE06), [Conference or Workshop Item]

Adelsbach, Andre ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza (2006):
A Computational Model for Watermark Robustness.
Information Hiding Workshop, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Wolf, Marko ; Scheibel, Michael (2006):
Play it once again, Sam - Enforcing Stateful Licenses on Open Platforms.
In: The Second Workshop on Advances in Trusted Computing (WATC '06 Fall),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Scheibel, Michael (2006):
Design and Implementation of a Secure Linux Device Encryption Architecture.
In: LinuxTag,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Gajek, Sebastian (2006):
Client Authentication in Federations Using a Security Mode.
In: Toward a More Secure Web - W3C Workshop on Usability and Transparency of Web Authentication.,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Löhr, Hans ; Chen, Liquen ; Landfermann, Rainer ; Rohe, Markus (2006):
A Protocol for Property-Based Attestation.
In: First ACM Workshop on Scalable Trusted Computing (STC'06),
[Conference or Workshop Item]

2005

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005):
Property-Based Broadcast Encryption for Multi-level Security Policies.
In: LNCS, 3935, In: 8th International Conference on Information Security and Cryptology (ICISC 2005),
Springer Verlag, Seoul, Korea, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005):
Property-Based Broadcast Encryption for Multi-level Security Policies.
In: LNCS, 3935, Springer Verlag, 8th International Conference on Information Security and Cryptology (ICISC 2005), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005):
Towards Multilateral Secure Digital Rights Distribution Infrastructures.
In: ACM DRM Workshop'05,
Alexandria, Virginia, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich (2005):
Embedding Trust into Cars—Secure Software Delivery and Installation.
In: Third Workshop on Embedded Security in Cars (escar 2005),
Cologne, Germany, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005):
Multilaterally Secure Computing Platforms - in your office, car and at home.
1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005):
Multilaterally Secure Computing Platforms – in your office, car and at home.
In: 1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society,
Tokyo, Japan, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Selhorst, Marcel ; Senft, Oska (2005):
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9, [Article]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005):
Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme.
In: 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security,
Salzburg, Austria, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Selhorst, Marcel ; Senft, Oska (2005):
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9, [Article]

Sadeghi, Ahmad-Reza ; Stüble, Ulrich ; Kursawe, Klaus ; Lucks, Stefan (2005):
Secure Data Management in Trusted Computing.
In: LNCS, 3659, pp. 324-338, Springer Verlag, Workshop on Cryptographic Hardware and Embedded Systems (CHES), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Kühn, Ulrich ; Kursawe, Klaus ; Lucks, Stefan (2005):
Secure Data Management in Trusted Computing.
In: LNCS, 3659, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 324-338,
Springer Verlag, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Rupp, Andy ; Bangerter, Endre (2005):
Simplified Hardness Proofs in the Generic Group Model.
In: Western European Workshop on Research in Cryptology (WEWoRC 2005),
Leuven, Belgium, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Rohe, Markus ; Camenisch, Jan (2005):
Sokrates - A Compiler Framework for Zero-Knowledge Protocols.
In: Western European Workshop on Research in Cryptology (WEWoRC 2005),
Leuven, Belgium, [Conference or Workshop Item]

Camenisch, Jan ; Rohe, Markus ; Sadeghi, Ahmad-Reza (2005):
Sokrates - A Compiler Framework for Zero-Knowledge Protocols.
Western European Workshop on Research in Cryptology (WEWoRC 2005), [Conference or Workshop Item]

Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian (2005):
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Alkassar, Ammar ; Stüble, Christian ; Selhorst, Marcel (2005):
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
In: 9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005):
Towards Multilateral Security On DRM Platforms.
In: First Information Security Practice and Experience Conference (ISPEC 2005),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005):
Security Engineering for Zero-knowledge Watermark Detection.
In: Special Session on Media Security (WIAMIS 2005),
Montreux, Switzerland, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005):
Secure Software Delivery and Installation in Embedded Systems.
In: First Information Security Practice and Experience Conference (ISPEC 2005),
Singapore, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005):
Towards multilaterally secure computing platforms - with open source and trusted computing.
In: Information Security Technical Report, 10 (2), pp. 83-95. [Article]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005):
Towards multilaterally secure computing platforms - with open source and trusted computing.
In: Information Security Technical Report, 10 (2), pp. 83-95. [Article]

Sadeghi, Ahmad-Reza (2005):
Trusted Computing: Whom do we trust? Building Open Multilateral Secure Platforms Based On Trusted Computing.
DRM Conference, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich (2005):
Property-Based Broadcast Encryption for Multi-level Security Policies.
[Book]

Sadeghi, Ahmad-Reza (2005):
Trusted Computing: Whom do we trust? Building Open Multilateral Secure Platforms Based On Trusted Computing.
In: DRM Conference,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005):
Secure Software Delivery and Installation in Embedded Systems.
[Report]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich
Lemke, Kerstin (ed.) (2005):
Secure Software Delivery and Installation in Embedded Systems.
In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications, pp. 27-49, Springer-Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich (2005):
Property-Based Broadcast Encryption for Multi-level Security Policies.
[Report]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
In: Workshop on Secure Web Services (SWS),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin
Lemke, Kerstin ; Wolf, Marko ; Paar, Christof (eds.) (2005):
Anti-theft Protection: Electronic Immobilizers.
In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications., pp. 51-67,
Springer Verlag, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Browser Model for Security Analysis of Browser-Based Protocols.
In: European Symposium for Research in Computer Science (ESORICS),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Browser Model for Security Analysis of Browser-Based Protocols.
(RZ3600), [Report]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005):
Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it.
In: ACM Multimedia Systems, [Article]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin (2005):
An Open Approach for Designing Secure Electronic Immobilizers.
In: First Information Security Practice and Experience Conference (ISPEC 2005),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
Workshop on Secure Web Services (SWS), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin
Lemke, Kerstin ; Wolf, Marko ; Paar, Christof (eds.) (2005):
Anti-theft Protection: Electronic Immobilizers.
pp. 51-67, Springer Verlag, Embedded Security in Cars: Securing Current and Future Automotive IT Applications., [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Browser Model for Security Analysis of Browser-Based Protocols.
European Symposium for Research in Computer Science (ESORICS), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Browser Model for Security Analysis of Browser-Based Protocols.
[Book]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005):
Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it.
In: ACM Multimedia Systems, 11 (2), pp. 143-158. [Article]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Bas, Patrick ; Barni, Mauro ; Rosa, Alessia De
Katzenbeisser, Stefan (ed.) (2005):
First Summary Report on Asymmetric Watermarking.
In: ECRYPT, Network of Excellence in Cryptology,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Chen, Liqun ; Enzmann, Matthias ; Schneider, Markus ; Steiner, Michael (2005):
A Privacy-Protecting Coupon System.
In: Financial Cryptography,
[Conference or Workshop Item]

2004

Sadeghi, Ahmad-Reza ; Stüble, Christian (2004):
Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms.
In: 20th Annual Computer Security Applications Conference (ACSAC),
Tucson, Arizona, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2004):
Property-based Attestation for Computing Platforms: Caring about policies, not mechanisms.
In: New Security Paradigm Workshop (NSPW),
White Point Beach Resort, Nova Scotia, Canada, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Pohlmann, Norbert (2004):
European Multilateral Secure Computing Base - Open Trusted Computing for You and Me.
In: Datenschutz und Datensicherheit (DUD), 9, pp. 548-554. [Article]

Altmeyer, Oliver ; Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian
Paulus, Sachar ; Pohlmann, Norbert ; Reimer, Helmut (eds.) (2004):
Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004), pp. 346-361, Vieweg Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2004):
Overcoming the Obstacles of Zero-Knowledge Watermark Detection.
In: ACM Multimedia and Security Workshop, pp. pp. 46 - 55,
ACM Press, Magdeburg, Germany, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Altmeyer, Oliver ; Selhorst, Marcel
Paulus, Sachar ; Pohlmann, Norbert ; Reimer, Helmut (eds.) (2004):
Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004), pp. 346-361, Vieweg Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2004):
Overcoming the Obstacles of Zero-Knowledge Watermark Detection.
pp. pp. 46 - 55, ACM Press, ACM Multimedia and Security Workshop, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Günnewig, Dirk ; Rannenberg, Kai ; Stüble, Christian
Koenig, Christian ; Neu­mann, An­dre­as ; Katz­sch­mann, To­bi­as (eds.) (2004):
Trusted Computing Platforms: Zur technischen und industriepolitischen Situation und Vorgehensweise.
In: Vertrauenswürdige Systemumgebungen Technik, Recht und gesellschaftspolitische Implikationen des "Trusted Computing", Verlag Recht und Wirtschaft, [Book Section]

2003

Sadeghi, Ahmad-Reza ; Alkassar, Ammar (2003):
The Quest for Security in Integrated Networks.
In: 11th International Conference on Telecommunication Systems, Modeling and Analysis,
Monterey, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Alkassar, Ammar (2003):
The Quest for Security in Integrated Networks.
11th International Conference on Telecommunication Systems, Modeling and Analysis, [Conference or Workshop Item]

Adelsbach, Andre ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza (2003):
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, 9 (3), pp. 266-278. [Article]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzenbeisser, Stefan (2003):
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, 9 (3), pp. 266-278. [Article]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003):
Taming "Trusted Computing" by Operating System Design.
In: 4th International Workshop on Information Security Applications (WISA'03),
Springer-Verlag, Cheju Island, Korea, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Alkassar, Ammar ; Stüble, Christian (2003):
Secure Object Identification - or: Solving The Chess Grandmaster Problem.
In: New Security Paradigms Workshop,
Ascona, Switzerland, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Dirk (2003):
Trusted Computing ohne Nebenwirkungen.
9, In: Datenschutz und Datensicherheit (DUD), pp. 556-560, Vieweg Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Günnewig, Dirk (2003):
Trusted Computing ohne Nebenwirkungen.
9, In: Datenschutz und Datensicherheit (DUD), pp. 556-560, Vieweg Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003):
Sinn und Unsinn von TCPA und Palladium.
In: c't, 13, [Article]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Schneider, Markus ; Stüble, Christian (2003):
Die digitale Signatur.
In: Digitale Signaturen in der Praxis, AWV Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Schneider, Markus (2003):
Electronic Payment Systems.
In: LNCS, 2770, In: Digital Rights Management, pp. 113-137, Springer Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003):
Sinn und Unsinn von TCPA und Palladium.
In: c't, 13, [Article]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Schneider, Markus ; Stüble, Christian (2003):
Die digitale Signatur.
In: Digitale Signaturen in der Praxis, AWV Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Schneider, Markus (2003):
Electronic Payment Systems.
In: LNCS, 2770, In: Digital Rights Management, pp. 113-137, Springer Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre (2003):
Advanced Techniques for Dispute Resolving and Authorship Proofs on Digital Works.
In: Security and Watermarking of Multimedia Contents V,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003):
Bridging the Gap between TCPA/Palladium and Personal Security.
[Report]

2002

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzenbeisser, Stefan (2002):
Cryptography Meets Watermarking: Detecting Watermarks with Minimal- or Zero-Knowledge Disclosure.
1, In: XI European Signal Processing Conference, pp. 446-449,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian (2002):
Final Report on Verification and Assessment.
(MAF­TIA De­li­ver­a­ble D), [Report]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian (2002):
Final Report on Verification and Assessment.
[Book]

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Steinbrecher, Sandra (2002):
Auctions with Multiple Rounds and Multiple Items.
In: Int. Workshop on Trust and Privacy in Digital Business (DEXA 2002),
[Conference or Workshop Item]

2001

Sadeghi, Ahmad-Reza ; Steiner, Michael (2001):
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference.
In: LNCS, 2045, In: Eurocrypt, pp. 243-260,
Springer-Verlag, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Geraldy, Alexander ; Pfitzmann, Birgit (2001):
Optimized Self-Synchronizing Mode of Operation.
In: 8th International Workshop on Fast Software Encryption,
Yokohama, Japan, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza (2001):
How to Break a Semi-Anonymous Fingerprinting Scheme.
In: LNCS, 2137, pp. 384-394, Springer-Verlag, Information Hiding: Fourth International Workshop, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza (2001):
How to Break a Semi-Anonymous Fingerprinting Scheme.
In: LNCS, 2137, In: Information Hiding: Fourth International Workshop, pp. 384-394,
Springer-Verlag, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre (2001):
Zero-Knowledge Watermark Detection and Proof of Ownership.
In: LNCS, 2137, In: Information Hiding: Fourth International Workshop, pp. 273-288,
Springer-Verlag, Berlin, Germany, [Conference or Workshop Item]

Adelsbach, Andre ; Sadeghi, Ahmad-Reza (2001):
Zero-Knowledge Watermark Detection and Proof of Ownership.
In: LNCS, 2137, pp. 273-288, Springer-Verlag, Information Hiding: Fourth International Workshop, [Conference or Workshop Item]

2000

Adelsbach, Andre ; Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza (2000):
Proving ownership of digital content.
In: LNCS, 1768, pp. 126-141, Springer-Verlag, 3rd International Workshop on Information Hiding, IH 1999, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (2000):
Self-escrowed cash against user black-mailing.
In: LNCS, 1962, In: Fourth Conference on Financial Cryptography (FC’00),,
Springer-Verlag, Anguilla, British West Indies, [Conference or Workshop Item]

Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza (2000):
Self-escrowed cash against user black-mailing.
In: LNCS, 1962, Springer-Verlag, Fourth Conference on Financial Cryptography (FC 2000 Anguilla), [Conference or Workshop Item]

1999

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999):
Coin-based anonymous fingerprinting.
In: LNCS, 1599, In: EUROCRYPT ’99, pp. 150-164,
Springer-Verlag, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999):
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99, pp. 35-48, Vieweg Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999):
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99, pp. 35-48, Vieweg Verlag, [Book Section]

This list was generated on Mon Aug 2 02:58:12 2021 CEST.