Publications

Preprints

Marchal, S., Miettinen, M., Nguyen, T. D., Sadeghi, A-R., & Asokan, N., “AuDI: Towards Autonomous IoT Device-Type Identification using Periodic Communication”. IEEE Journal on Selected Areas in Communications Special Issue on Artificial Intelligence and Machine Learning for Networking and Communications, (Accepted/In press).

[PDF]

Publications

Exportieren als [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Date | Creator(s) | Item type
Jump to: 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999
Number of items at this level: 501.

2020

Dessouky, Ghada ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2020):
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.
In: USENIX Security, k.A., USENIX Association, In: 29th USENIX Security Syposium, Boston, MA, USA, 12.-14.08.2020, [Conference item]

2019

Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza (2019):
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization.
In: ACSAC - 35th Annual Computer Security Applications Conference, San Juan, Puerto Rico, December 9-13, [Conference item]

Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick Thomas ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
In: 2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Conference item]

Dessouky, Ghada ; Zeitouni, Shaza ; Ibrahim, Ahmad ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2019):
CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems.
New York, IEEE, In: 2019 International Conference On Computer Aided Design (ICCAD), The Westin Westminster Westminster, CO, 4.-7. November 2019, [Conference item]

Ghaeini, Hamid Reza ; Chan, Matthew ; Bahmani, Raad ; Brasser, Ferdinand ; Garcia, Luis ; Zhou, Jianying ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole ; Zonouz, Saman A. (2019):
PAtt: Physics-based Attestation of Control Systems.
Beijing, In: 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Beijing, 23. - 25.09.2019, [Conference item]

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostáková, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
In: 28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Conference item]

Paverd, Andrew ; Völp, Marcus ; Brasser, Ferdinand ; Schunter, Matthias ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Esteves-Verissimo, Paulo ; Steininger, Andreas ; Holz, Thorsten (2019):
Sustainable Security & Safety: Challenges and Opportunities.
Stuttgart, In: 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS), Stuttgart, 09.07.2019, DOI: 10.4230/OASIcs.CERTS.2019.4,
[Conference item]

Bock, Carsten ; Brasser, Ferdinand ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2019):
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
Auckland, In: ACM Asia Conference on Computer and Communications Security (AsiaCCS), Auckland, 07. - 12.07.2019, DOI: 10.1145/3321705.3329827,
[Conference item]

Songhori, Ebrahim ; Riazi, M. Sadegh ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2019):
ARM2GC: Succinct Garbled Processor for Secure Computation.
Las Vegas, USA, In: Design Automation Conference (DAC), 2019 56th ACM/EDAC/IEEE, Las Vegas, USA, June, 2.-6., [Conference item]

Batina, Lejla ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019):
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
In: Proceedings of the 56th Annual Design Automation Conference 2019, k.A., ACM, In: Design Automation Conference 2019, Las Vegas, NV, USA, June 02 - 06, 2019, [Online-Edition: https://dl.acm.org/citation.cfm?id=3316781],
[Conference item]

Marchal, Samuel ; Miettinen, Markus ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Asokan, N. (2019):
AuDI: Towards autonomous IoT device-type identification using periodic communications.
In: IEEE Journal on Selected Areas in Communications, IEEE, ISSN 0733-8716,
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8511],
[Article]

Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2019):
HardFails: Insights into Software-Exploitable Hardware Bugs.
In: 28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Conference item]

OConnor, TJ ; Mohamed, Reham ; Miettinen, Markus ; Enck, William ; Reaves, Bradley ; Sadeghi, Ahmad-Reza (2019):
HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices.
In: Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Miami, FL, USA, [Conference item]

Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Fereidooni, Hossein ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019):
DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
In: The 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019), [Conference item]

Ibrahim, Ahmad (2019):
Securing Embedded Networks Through Secure Collective Attestation.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8588],
[PhD thesis]

Truong, Hien Thi Thu ; Toivonen, Juhani ; Nguyen, Thien Duc ; Soriente, Claudio ; Tarkoma, Sasu ; Asokan, N. (2019):
DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification.
k.A., In: IEEE International Conference on Pervasive Computing and Communications (PerCom2019), Kyoto, Japan, March 2019, [Conference item]

Marchal, Samuel ; Miettinen, Markus ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Asokan, N. (2019):
AUDI: Towards Autonomous IoT Device-Type Identification.
In: IEEE Journal on Selected Areas in Communications (JSAC) on Artificial Intelligence and Machine Learning for Networking and Communications, [Article]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019):
HEALED: HEaling & Attestation for Low-end Embedded Devices.
In: 23rd International Conference Financial Cryptography and Data Security (FC 2019), 2019, [Conference item]

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostakova, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
Cryptology ePrint Archive, Report 2019/154, [Online-Edition: https://eprint.iacr.org/2019/154],
[Report]

Miettinen, Markus (2019):
Context and communication profiling for IoT security and privacy: techniques and applications.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8374],
[PhD thesis]

Aschermann, Cornelius ; Frassetto, Tommaso ; Holz, Thorsten ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Teuchert, Daniel (2019):
Nautilus: Fishing for Deep Bugs with Grammars.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Conference item]

Brasser, Ferdinand ; Gens, David ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019):
SANCTUARY: ARMing TrustZone with User-space Enclaves.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Conference item]

Weiser, Samuel ; Werner, Mario ; Brasser, Ferdinand ; Malenko, Maja ; Mangard, Stefan ; Sadeghi, Ahmad-Reza (2019):
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Conference item]

Abera, Tigist ; Bahmani, Raad ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2019):
DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous System.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Conference item]

Mohamed, Reham ; O'Connor, Terrance ; Miettinen, Markus ; Enck, William ; Sadeghi, Ahmad-Reza
Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang (Urheber) (2019):
HONEYSCOPE: IoT Device Protection with Deceptive Network Views,.
In: Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings, [Book section]

De Oliveira Nunes, Ivan ; Dessouky, Ghada ; Ibrahim, Ahmad ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019):
Towards Systematic Design of Collective Remote Attestation Protocols.
In: The 39th International Conference on Distributed Computing Systems (ICDCS) 2019, [Conference item]

Gens, David (2019):
OS-level Attacks and Defenses: from Software to Hardware-based Exploits.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8482],
[PhD thesis]

Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019):
HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.
ACM/IEEE, In: Design Automation Conference (DAC), 2019, [Conference item]

2018

Miettinen, Markus ; Sadeghi, Ahmad-Reza (2018):
Internet of things or threats?: on building trust in IoT (keynote). 1:1-1:9.
In: CODES '18 Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, Piscataway, NJ, USA, IEEE Press Piscataway, NJ, USA, In: CODES+ISSS 2018, part of ESWEEK 2018, Torino, Italy, September 30 - October 5, 2018, [Online-Edition: https://dl.acm.org/citation.cfm?id=3283569],
[Conference item]

Ibrahim, Ahmad (2018):
Collective Attestation: for a Stronger Security in Embedded Networks.
In: IEEE, Salvador, Brazil, Brazil, October, 2.-5., DOI: 10.1109/SRDS.2018.00039,
[Conference item]

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian (2018):
VoiceGuard: Secure and Private Speech Processing.
In: Interspeech 2018, International Speech Communication Association (ISCA), DOI: 10.21437/Interspeech.2018-2032,
[Online-Edition: https://encrypto.de/papers/BFRSSW18.pdf],
[Conference item]

Frassetto, Tommaso ; Jauernig, Patrick ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2018):
IMIX: In-Process Memory Isolation EXtension.
In: 27th USENIX Security Symposium, In: 27th USENIX Security Symposium, Baltimore, MD, USA, 15.-17.08.2018, [Conference item]

Mitev, Richard (2018):
Lyin’ Alexa - Skill-Based Man-in-the-Middle Attack on Virtual Assistants.
TU Darmstadt, [Master thesis]

Carpent, Xavier ; Eldefrawy, Karim ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018):
Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices.
ACM, In: Design Automation Conference, San Francisco, USA, 2018, June 24-29, [Conference item]

Dessouky, Ghada ; Abera, Tigist ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza (2018):
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution.
In: 37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18), 2018, [Conference item]

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2018):
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
In: 23rd European Symposium on Research in Computer Security (ESORICS 2018), Barcelona, Spain, 2018, [Conference item]

Asokan, N. ; Nyman, Thomas ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018):
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems - Special Issue ESWEEK 2018, CASES 2018, CODES + ISSS 2018 and EMSOFT 2018, [Article]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018):
US-AID: Unattended Scalable Attestation of IoT Devices.
In: 37th IEEE International Symposium on Reliable Distributed Systems (SRDS 2018), 2018, [Conference item]

Schaad, Andreas ; Grohmann, Bjoern ; Winzenried, Oliver ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2018):
Towards a Cloud-based System for Software Protection and Licensing.
In: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2, k.A., SciTePress, In: Secrypt 2018, Porto, Portugal, 26.-28.07.2018, ISBN 978-989-758-319-3,
DOI: 10.5220/0006899506980702,
[Conference item]

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza (2018):
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: 13th ASIA Conference on Information, Computer and Communications Security, In: AsiaCCS, [Conference item]

Miettinen, Markus ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2018):
Revisiting Context-Based Pairing in IoT.
In: Proceedings of the 55th Design Automation Conference (DAC), ACM, In: 55th Design Automation Conference (DAC), San Francisco, CA, USA, 24.-29.06. 2018, [Conference item]

Zeitouni, Shaza ; Gens, David ; Sadeghi, Ahmad-Reza (2018):
It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs.
In: Design Automation Conference (DAC) 2018, [Conference item]

Biondo, Andrea ; Conti, Mauro ; Davi, Lucas ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2018):
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
In: 27th USENIX Security Symposium, [Conference item]

Ghaeini, Hamid Reza ; Antonioli, Daniele ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole (2018):
State-Aware Anomaly Detection for Industrial Control Systems.
In: The 33rd ACM/SIGAPP Symposium On Applied Computing (SAC), Pau, France, DOI: 10.1145/3167132.3167305,
[Conference item]

Liebchen, Christopher (2018):
Advancing Memory-corruption Attacks and Defenses.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8090],
[PhD thesis]

Gens, David ; Schmitt, Simon ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2018):
K-Miner: Uncovering Memory Corruption in Linux.
In: 25th Annual Network & Distributed System Security Symposium (NDSS), [Conference item]

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep (2018):
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
In: IEEE Internet Computing, S. 1, ISSN 1089-7801,
DOI: 10.1109/MIC.2018.182130646,
[Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=832...],
[Article]

Asokan, N. ; Miettinen, Markus (2018):
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead.
In: Computer Communications, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2018.07.030,
[Online-Edition: http://www.sciencedirect.com/science/article/pii/S0140366418...],
[Article]

Asokan, N. ; Nguyen, Thien Duc ; Tarkoma, Sasu ; Toivonen, Juhani ; Truong, Hien Thi Thu (2018):
Proximity Verification Based on Acoustic Room Impulse Response.
In: CoRR, abs/1803.07211, [Online-Edition: http://arxiv.org/abs/1803.07211],
[Article]

Brasser, Ferdinand ; Davi, Lucas ; Dhavlle, Abhijitt ; Frassetto, Tommaso ; Dinakarrao, Sai Manoj Pudukotai ; Rafatirad, Setareh ; Sadeghi, Ahmad-Reza ; Sasan, Avesta ; Sayadi, Hossein ; Zeitouni, Shaza ; Homayoun, Houman (2018):
Advances and Throwbacks in Hardware-assisted Security: Special Session.
Piscataway, NJ, USA, IEEE Press, In: Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems, Piscataway, NJ, USA, In: CASES '18, ISBN 978-1-5386-5564-1,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3283552.3283567],
[Conference item]

Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2018):
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs.
In: Cryptography and Security, abs/1812.00197, [Online-Edition: http://arxiv.org/abs/1812.00197],
[Article]

Ibrahim, Ahmad (2018):
Securing Embedded Networks Through Secure Collective Attestation.
New York, NY, USA, ACM, In: Workshop at 16th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2018), 2018, New York, NY, USA, In: MobiSys PhD Forum '18, ISBN 978-1-4503-5841-5,
DOI: 10.1145/3212711.3212712,
[Online-Edition: http://doi.acm.org/10.1145/3212711.3212712],
[Conference item]

Mohan, Sibin ; Asplund, Mikael ; Bloom, Gedare ; Sadeghi, Ahmad-Reza ; Ibrahim, Ahmad ; Salajageh, Negin ; Griffioen, Paul ; Sinopoli, Bruno (2018):
The Future of IoT Security: Special Session.
Piscataway, NJ, USA, IEEE Press, In: International Conference on Embedded Software (EMSOFT 2018), 2018, Piscataway, NJ, USA, In: EMSOFT '18, ISBN 978-1-5386-5564-1,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3283535.3283551],
[Conference item]

Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Dang, Minh Hoang ; Asokan, N. ; Sadeghi, Ahmad-Reza (2018):
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
In: CoRR, abs/1804.07474, [Online-Edition: http://arxiv.org/abs/1804.07474],
[Article]

2017

Frassetto, Tommaso ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
JITGuard: Hardening Just-in-time Compilers with SGX.
In: 24th ACM Conference on Computer and Communications Security (CCS), Dallas, TX, USA, ISBN 978-1-4503-4946-8/17/10,
DOI: 10.1145/3133956.3134037,
[Conference item]

Jauernig, Patrick Thomas (2017):
SMOV: Lighweight In-Process Memory Isolation.
TU Darmstadt, [Master thesis]

Zeitouni, Shaza ; Dessouky, Ghada ; Arias, Orlando ; Sullivan, Dean ; Ibrahim, Ahmad ; Jin, Yier ; Sadeghi, Ahmad-Reza (2017):
ATRIUM: Runtime Attestation Resilient Under Memory Attacks.
In: 2017 International Conference On Computer Aided Design (ICCAD'17), Irvine, California, US, [Conference item]

Antonioli, Daniele ; Ghaeini, Hamid Reza ; Adepu, Sridhar ; Ochoa, Martin ; Tippenhauer, Nils Ole (2017):
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3.
In: ACM Workshop on Cyber-Physical Systems Security and Privacy, ACM Conference on Computer and Communications Security (CCS), Dallas, Texas, USA, ISBN 978-1-4503-5394-6,
DOI: 10.1145/3140241.3140253,
[Conference item]

Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2017):
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
In: 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017), [Conference item]

Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Müller, Urs ; Sadeghi, Ahmad-Reza (2017):
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
[Report]

Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro (2017):
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
In: Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Atlanta, Georgia, USA, [Conference item]

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: 26th USENIX Security Symposium, In: USENIX Security '17, [Conference item]

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza (2017):
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: 11th USENIX Workshop on Offensive Technologies, In: WOOT, [Conference item]

Fereidooni, Hossein ; Frassetto, Tommaso ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Conti, Mauro (2017):
Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
In: The Second IEEE International Workshop on Safe, Energy-Aware, & Reliable Connected Health (CHASE-SEARCH), Philadelphia, Pennsylvania, USA, [Conference item]

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza (2017):
HardIDX: Practical and Secure Index with SGX.
In: Conference on Data and Applications Security and Privacy (DBSec), [Conference item]

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick (2017):
Phonion: Practical Protection of Metadata in Telephony Networks.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), [Conference item]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza (2017):
SeED: Secure Non-Interactive Attestation for Embedded Devices.
In: 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), Boston, USA, [Conference item]

Dessouky, Ghada ; Zeitouni, Shaza ; Nyman, Thomas ; Paverd, Andrew ; Davi, Lucas ; Koeberl, Patrick ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017):
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
In: 54th Design Automation Conference (DAC'17), [Conference item]

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu (2017):
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT.
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017), DOI: 10.1109/ICDCS.2017.283,
[Conference item]

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Frassetto, Tommaso ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu (2017):
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017), IEEE, Atlanta, GA, USA, DOI: 10.1109/ICDCS.2017.284,
[Conference item]

Portela, Bernardo ; Barbosa, Manuel ; Scerri, Guillaume ; Warinschi, Bogdan ; Bahmani, Raad ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2017):
Secure Multiparty Computation from SGX.
In: Financial Cryptography and Data Security, [Conference item]

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference item]

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael (2017):
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17), Internet Society, DOI: 10.14722/ndss.2017.23097,
[Online-Edition: https://encrypto.de/papers/DKSSZZ17.pdf],
[Conference item]

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. (2017):
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference item]

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed (2017):
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference item]

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2017):
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, S. 62-78, 2017, (1), DOI: 10.1515/popets-2017-0005,
[Online-Edition: http://tubiblio.ulb.tu-darmstadt.de/101572/ https://encrypto...],
[Article]

Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017):
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.
In: Cryptography and Security, abs/1705.10295, [Online-Edition: http://arxiv.org/abs/1705.10295],
[Article]

Sullivan, Dean ; Arias, Orlando ; Gens, David ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier (2017):
Execution Integrity with In-Place Encryption.
In: CoRR, abs/1703.02698, [Online-Edition: http://arxiv.org/abs/1703.02698],
[Article]

2016

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
CATT: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
In: Cryptography and Security, [Online-Edition: https://arxiv.org/abs/1611.08396],
[Article]

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
In: Black Hat Europe, [Conference item]

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS), [Conference item]

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza (2016):
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
In: 23rd ACM Conference on Computer and Communications Security (CCS), [Conference item]

Ghaeini, Hamid Reza ; Tippenhauer, Nils Ole (2016):
Hamids: Hierarchical monitoring intrusion detection system for industrial control systems.
In: ACM Workshop on Cyber-Physical Systems Security and Privacy, ACM Conference on Computer and Communications Security (CCS), Austria, ISBN 978-1-4503-4568-2,
DOI: 10.1145/2994487.2994492,
[Conference item]

Lacoste, Marc ; Sousa, Paulo ; Neves, Nuno ; Miettinen, Markus ; Ramos, Fernando M.V. ; Vukolic, Marko ; Charmet, Fabien ; Yaich, Reda ; Oborzynski, Krzysztof ; Vernekar, Gitesh (2016):
User-Centric Security and Dependability in the Cloud of Clouds.
In: IEEE Cloud Computing Special issue on Cloud Security, S. 64-75, 3, (5), [Article]

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Ibrahim, Ahmad ; Conti, Mauro ; Neven, Gregory (2016):
SANA: Secure and Scalable Aggregate Network Attestation.
In: 23rd ACM Conference on Computer and Communications Security (CCS) 2016, CCS 2016, [Conference item]

Mohan, Vaishnavi ; Othmane, Lotfi Ben (2016):
SecDevOps: Is It a Marketing Buzzword?
In: Proc. of the 11th International Conference on Availability, Reliability and Security (ARES), [Conference item]

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2016):
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016, [Conference item]

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza (2016):
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In: The annual Privacy Enhancing Technologies Symposium (PETS), [Conference item]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza (2016):
DARPA: Device Attestation Resilient to Physical Attacks.
In: ACM WiSEC 2016, [Conference item]

Sadeghi, Ahmad-Reza ; Dessouky, Ghada (2016):
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
In: ACM WiSec 2016, [Conference item]

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza (2016):
Things, Trouble, Trust: On Building Trust in IoT Systems.
In: 53rd Design Automation Conference (DAC), [Conference item]

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Regulating ARM TrustZone Devices in Restricted Spaces.
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), [Conference item]

Fernando, Ruchith ; Ranchal, Rohit ; An, Byungchan ; Othmane, Lotfi Ben ; Bhargava, Bharat (2016):
Consumer oriented privacy preserving access control for electronic health records in the cloud.
In: IEEE cloud, [Conference item]

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael (2016):
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
In: USENIX Annual Technical Conference (ATC), [Conference item]

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2016):
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
In: 53. Annual Design Automation Conference (DAC'16), ACM, DOI: 10.1145/2897937.2898027,
[Online-Edition: https://encrypto.de/papers/SZDSSK16.pdf],
[Conference item]

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
In: 53rd Design Automation Conference (DAC), [Conference item]

McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh (2016):
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, PP, (99), DOI: 10.1109/JPROC.2015.2512235,
[Article]

Zeitouni, Shaza ; Oren, Yossef ; Wachsmann, Christian ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2016):
Remanence Decay Side-Channel: The PUF Case.
In: IEEE Transactions on Information Forensics and Security, 99, DOI: TIFS.2015.2512534,
[Article]

Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Leakage-Resilient Layout Randomization for Mobile Devices.
In: 23rd Annual Network & Distributed System Security Symposium (NDSS), [Conference item]

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016):
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
In: Financial Crypto 2016, [Conference item]

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016):
Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
[Report]

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: Proceedings of the 53nd Annual Design Automation Conference, ACM, In: DAC '16, [Conference item]

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
In: 53rd Design Automation Conference (DAC), [Conference item]

Heuser, Stephan (2016):
Towards Modular and Flexible Access Control on Smart Mobile Devices.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5663],
[PhD thesis]

Miettinen, Markus ; Huang, Jialin ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2016):
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
In: Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16), Darmstadt, Germany, [Conference item]

Sadeghi, Ahmad-Reza ; Armknecht, Frederik (2016):
Towards a Unified Security Model for Physically Unclonable Functions.
In: CT-RSA - Cryptographers' Track at the RSA Conference, [Conference item]

2015

Davi, Lucas ; Sadeghi, Ahmad-Reza (2015):
Building Secure Defenses Against Code-Reuse Attacks.
Springer International Publishing, ISBN 978-3-319-25544-6,
DOI: 10.1007/978-3-319-25546-0,
[Book]

Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael (2015):
Automated Software Diversity.
Morgan & Claypool, In: Synthesis Lectures on Information Security, Privacy, and Trust, DOI: 10.2200/S00686ED1V01Y201512SPT014,
[Book]

Ghaeini, Hamid Reza ; Akbari, Behzad ; Barekatain, Behrang ; Trivino Cabrera, Alicia (2015):
Adaptive video protection in large scale peer‐to‐peer video streaming over mobile wireless mesh networks.
In: International Journal of Communication Systems, S. 2580-2603, 29, (18), DOI: 10.1002/dac.3088,
[Article]

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015):
SEDA: Scalable Embedded Device Attestation.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference item]

Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza (2015):
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference item]

Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael (2015):
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference item]

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2015):
Automated Synthesis of Optimized Circuits for Secure Computation.
In: 22. ACM Conference on Computer and Communications Security (CCS'15), ACM, DOI: 10.1145/2810103.2813678,
[Online-Edition: https://encrypto.de/papers/DDKSSZ15.pdf],
[Conference item]

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015):
SEDA - Technical Report.
[Report]

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015):
Return to Where? You Can't Exploit What You Can't Find.
In: Blackhat USA, [Conference item]

Huang, Jialin ; Vaudenay, Serge ; Lai, Xuejia ; Nyberg, Kaisa (2015):
Capacity and Data Complexity in Multidimensional Linear Attack.
In: CRYPTO, [Conference item]

Do, Trinh Minh Tri ; Dousse, Olivier ; Miettinen, Markus ; Gatica-Perez, Daniel (2015):
A probabilistic kernel method for human mobility prediction with smartphones.
In: Pervasive and Mobile Computing, S. 13-28, 20, DOI: 10.1016/j.pmcj.2014.09.001,
[Article]

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension.
In: 52nd Design Automation Conference (DAC), [Conference item]

Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2015):
TyTAN: Tiny Trust Anchor for Tiny Devices.
In: 52nd Design Automation Conference (DAC) 2015, [Conference item]

Egert, Rolf ; Fischlin, Marc ; Gens, David ; Jacob, Sven ; Senker, Matthias ; Tillmans, Jörg (2015):
Privately computing set-union and set-intersection cardinality via bloom filters.
In: Information Security and Privacy (ACISP), Springer International, S. 413-430, [Article]

Nagy, Marcin ; Bui, Thanh Phong ; Cristofaro, Emiliano De ; Asokan, N. ; Ott, Jörg ; Sadeghi, Ahmad-Reza (2015):
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
In: ACM WiSEC 2015, [Conference item]

Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Waidner, Michael (2015):
Security and Privacy Challenges in Industrial Internet of Things.
In: 52nd Design Automation Conference (DAC) Research, [Conference item]

Songhori, Ebrahim ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2015):
Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis.
In: 52nd Design Automation Conference (DAC), [Conference item]

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015):
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
In: 36th IEEE Symposium on Security and Privacy (Oakland), [Conference item]

Schuster, Felix ; Tendyck, Thomas ; Liebchen, Christopher ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten (2015):
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
In: 36th IEEE Symposium on Security and Privacy (Oakland), [Conference item]

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2015):
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
In: 36. IEEE Symposium on Security and Privacy (IEEE S&P'15), IEEE, DOI: 10.1109/SP.2015.32,
[Online-Edition: https://encrypto.de/papers/SHSSK15.pdf],
[Conference item]

Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza (2015):
XiOS: Extended Application Sandboxing on iOS.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), [Conference item]

Barekatain, Behrang ; Khezrimotlagh, Dariush ; Aizaini Maarof, Mohd ; Ghaeini, Hamid Reza ; Ariza Quintana, Alfonso ; Trivino Cabrera, Alicia (2015):
Efficient P2P live video streaming over hybrid WMNs using random network coding.
In: Wireless Personal Communications, S. 1761-1789, 80, (4), DOI: 10.1007/s11277-014-2112-5,
[Article]

Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian (2015):
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
In: 22nd Annual Network & Distributed System Security Symposium (NDSS), [Conference item]

Busold, Christoph ; Heuser, Stephan ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah (2015):
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
In: Financial Cryptography and Data Security, [Conference item]

Dmitrienko, Alexandra ; Heuser, Stephan ; Nguyen, Thien Duc ; da Silva Ramos, Marcos ; Rein, Andre ; Sadeghi, Ahmad-Reza (2015):
Market-driven Code Provisioning to Mobile Secure Hardware.
In: Financial Cryptography and Data Security, [Conference item]

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep (2015):
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices.
In: CoRR, abs/1511.02119, [Online-Edition: https://arxiv.org/pdf/1511.02119.pdf],
[Article]

Miettinen, Markus ; Asokan, N. ; Koushanfar, Farinaz ; Nguyen, Thien Duc ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Sobhani, Majid ; Yellapantula, Sudha (2015):
I know where you are: Proofs of Presence resilient to malicious provers.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), [Conference item]

Sadeghi, Ahmad-Reza ; Davi, Lucas ; Larsen, Per (2015):
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? - Keynote -.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), [Conference item]

2014

Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2014):
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions.
Morgan & Claypool Publishers, In: Synthesis Lectures on Information Security, Privacy, and Trust, ISBN 9781627055093,
DOI: 10.2200/S00622ED1V01Y201412SPT012,
[Book]

Habib, Sheikh Mahbub ; Ries, Sebastian ; Varikkattu, Prabhu ; Mühlhäuser, Max (2014):
Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source.
In: Security and Communication Networks, S. 2185-2200, 7, (11), DOI: 10.1002/sec.748,
[Online-Edition: https://onlinelibrary.wiley.com/doi/abs/10.1002/sec.748],
[Article]

Miettinen, Markus ; Asokan, N. ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Sobhani, Majid (2014):
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
In: Proc. ACM Conference on Computer and Communications Security, ACM, DOI: 10.1145/2660267.2660334,
[Conference item]

Othmane, Lotfi Ben ; Angin, Pelin ; Weffers, Harold ; Bhargava, Bharat (2014):
Extending the Agile Development Approach to Develop Acceptably Secure Software.
In: IEEE Transactions on Dependable and Secure Computing, S. 497-509, 11, (6), [Article]

Sadeghi, Ahmad-Reza ; Brasser, Ferdinand (2014):
Swap and Play: Live Updating Hypervisors and Its Application to Xen.
In: CCSW 2014: The ACM Cloud Computing Security Workshop Proceedings, DOI: http://dl.acm.org/citation.cfm?doid=2664168.2664173,
[Conference item]

Dessouky, Ghada ; Klaiber, Michael J. ; Bailey, Donald G. ; Simon, Svenja (2014):
Adaptive Dynamic On-chip Memory Management for FPGA-based Reconfigurable Architectures.
In: 24th International Conference on Field Programmable Logic and Applications (FPL), München, Deutschland, 2014, [Conference item]

Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
Kutylowski, Miroslaw ; Vaidya, Jaideep (Hrsg.) (2014):
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014, Springer International Publishing, S. 76-93, DOI: 10.1007/978-3-319-11203-9_5,
[Book section]

Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2014):
Mobile Trusted Computing.
In: Proceedings of the IEEE, S. 1189-1206, 102, (8), [Article]

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza (2014):
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
In: BlackHat USA, [Conference item]

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
In: 23rd USENIX Security Symposium, [Conference item]

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
In: 23rd USENIX Security Symposium, [Conference item]

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014):
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18, (4), [Article]

Davi, Lucas ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2014):
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
In: 51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing, [Conference item]

Kong, Joonho ; Koushanfar, Farinaz ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2014):
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
In: Design Automation Conference (DAC) 2014, ACM Press, [Conference item]

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. (2014):
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), Kyoto, Japan, DOI: 10.1145/2590296.2590337,
[Conference item]

Mustafa, Hossen ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Xu, Wenyuan (2014):
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
In: 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), [Conference item]

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
[Report]

Koeberl, Patrick ; Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Varadharajan, Vijay (2014):
TrustLite: A Security Architecture for Tiny Embedded Devices.
In: European Conference on Computer Systems (EuroSys), ACM, Amsterdam, Netherlands, DOI: 10.1145/2592798.2592824,
[Conference item]

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014):
On the (In)Security of Mobile Two-Factor Authentication.
In: Financial Cryptography and Data Security (FC'14), Springer, [Conference item]

Dmitrienko, Alexandra ; Noack, David ; Sadeghi, Ahmad-Reza ; Yung, Moti (2014):
POSTER: On Offline Payments with Bitcoin.
In: FC'2014: Financial Cryptography and Data Security Conference, [Conference item]

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
(TUD-CS-2014-0063), [Report]

Senftleben, Marius ; Bucicoiu, Mihai ; Tews, Erik ; Armknecht, Frederik ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza (2014):
MoP-2-MoP - Mobile private microblogging.
In: Financial Cryptography and Data Security (FC'14), Springer, [Conference item]

Busold, Christoph ; Dmitrienko, Alexandra ; Wachsmann, Christian (2014):
Key2Share for Authentication Services.
In: SmartCard Workshop, [Conference item]

Ghaeini, Hamid Reza ; Akbari, Behzad (2014):
Peer-to-Peer Adaptive Forward Error Correction in Live Video Streaming over Wireless Mesh Network.
In: The 12th International Conference on Wired & Wireless Internet Communications, DOI: 10.1007/978-3-319-13174-0_9,
[Conference item]

Noisternig, M. ; Hollick, Matthias (2014):
Efficient Solutions for the Authenticated Fragmentation Problem in Delay- and Disruption-Tolerant Networks.
In: Proc. 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM'14), Montreal, Canada, [Conference item]

2013

Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza (2013):
Mobile Platform Security.
Morgan & Claypool, In: Synthesis Lectures on Information Security, Privacy, and Trust, 4, DOI: 10.2200/S00555ED1V01Y201312SPT009,
[Book]

Laurila, Juha ; Gatica-Perez, Daniel ; Aad, Imad ; Blom, Jan ; Bornet, Olivier ; Do, Trinh Minh Tri ; Dousse, Olivier ; Eberle, Julien ; Miettinen, Markus (2013):
From big smartphone data to worldwide research: The Mobile Data Challenge.
In: Pervasive and Mobile Computing, S. 752-771, 9, DOI: 10.1016/j.pmcj.2013.07.014,
[Article]

Nagy, Marcin ; Cristofaro, Emiliano De ; Dmitrienko, Alexandra ; Asokan, N. ; Sadeghi, Ahmad-Reza (2013):
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
In: Annual Computer Security Applications Conference (ACSAC 2013), New Orleans, Loouisiana, USA, [Conference item]

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2013):
A Security Framework for Analysis and Design of Software Attestation.
In: ACM Conference on Computer and Communications Security (CCS), ACM Press, [Conference item]

Tews, Erik ; Weiner, M. ; Massar, M. ; Giese, D. ; Wieser, W. (2013):
Security analysis of a widely deployed locking system.
Proceedings of the 2013 A, [Article]

Stancill, Blaine ; Snow, Kevin ; Otterness, Nathan ; Monrose, Fabian ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2013):
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
In: 16th Research in Attacks, Intrusions and Defenses (RAID) Symposium, [Conference item]

Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael (2013):
Personal Information Dashboard: Putting the Individual Back in Control.
Iso Press, ISBN 978-1-61499-294-3 (print) | 978-1-61499-295-0 (online),
DOI: 10.3233/978-1-61499-295-0-139,
[Book]

Gay, Richard ; Mantel, Heiko ; Sudbrock, Henning (2013):
An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels.
In: 2nd International Workshop on Quantitative Aspects in Security Assurance, [Online-Edition: https://www.iit.cnr.it/qasa2013/],
[Conference item]

Wachsmann, Christian (2013):
Trusted and Privacy-Preserving Embedded Systems.
Technische Universität Darmstadt, [PhD thesis]

Barekatain, Behrang ; Khezrimotlagh, Dariush ; Aizaini Maarof, Mohd ; Ghaeini, Hamid Reza ; Salleh, Shaharuddin ; Ariza Quintana, Alfonso ; Akbari, Behzad ; Trivino Cabrera, Alicia (2013):
MATIN: A random network coding based framework for high quality peer-to-peer live video streaming.
In: PloS one, S. e69844, 8, (8), DOI: 10.1371/journal.pone.0069844,
[Article]

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2013):
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
In: 22nd USENIX Security Symposium (USENIX Security '13), USENIX, [Conference item]

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. (2013):
ConXsense – Context Sensing for Adaptive Usable Access Control.
[Report]

Octeau, Damien ; McDaniel, Patrick ; Jha, Somesh ; Bartel, Alexandre ; Bodden, Eric ; Klein, Jacques ; Le Traon, Yves (2013):
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
In: Proceedings of the 22nd USENIX Conference on Security, Berkeley, Calif, USENIX Association, S. 543-558, [Book section]

Oren, Yossef ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2013):
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Springer, In: Lecture Notes on Computer Science (LNCS), 8068, [Conference item]

Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza (2013):
Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same.
In: BlackHat USA, [Conference item]

Tews, Erik (2013):
How to enable Live Cloning of Virtual Machines using the Xen Hypervisor.
[Report]

Bodden, Eric ; Tanter, Éric ; Inostroza, Milton (2013):
Joint Point Interfaces for Safe and Flexible Decoupling of Aspects.
In: Software Engineering Top Journals, Rank 5, ACM Transactions on Softw, [Article]

Buchmann, Johannes (Hrsg.) (2013):
Internet Privacy: Options for adequate realization.
Springer Vieweg; 2013 edition, ISBN 978-3642379123,
[Book]

Aderhold, Markus ; Gebhardt, Alexander ; Mantel, Heiko (2013):
Choosing a Formalism for Secure Coding: FSM vs. LTL.
[Report]

Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013):
Client-controlled Cryptography-as-a-Service in the Cloud.
In: 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), [Conference item]

Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo (2013):
SPLlift – Statically Analyzing Software Product Lines in Minutes Instead of Years.
In: ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013), [Conference item]

Simo-Fhom, Hervais (2013):
Internet Privacy. Taking opportunities, assessing risks, building trust.
In: >Springer Vieweg; 2013, [Article]

Werner, M. ; Kaiser, J. ; Hollick, Matthias ; Weingärtner, E. ; Wehrle, K. (2013):
A Blueprint for Switching Between Secure Routing Protocols in Wireless Multihop Networks.
In: Proceedings of the 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM, D-SPAN Workshop), [Conference item]

Alkassar, Ammar ; Heuser, Stephan ; Stüble, Christian (2013):
Vertrauenswürdige Smartphones: Technologien und Lösungen.
In: 13. Deutscher IT-Sicherheitskongress, [Conference item]

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013):
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), [Conference item]

Fleischhacker, N. ; Günther, F. ; Kiefer, F. ; Poettering, B. (2013):
Pseudorandom Signatures.
In: >8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 7-10 May, Hangzhou, China, [Article]

Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza (2013):
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (Best Student Paper Award).
In: 34th IEEE Symposium on Security and Privacy (Oakland 2013), [Conference item]

do Carmo, Rodrigo ; Hollick, Matthias (2013):
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks.
In: Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy, DOI: 10.1145/2463183.2463187,
[Article]

Kocabas, Unal ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2013):
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
In: Conference on Digital Automation and Test Europe (DATE), Interactive Presentation, [Conference item]

Sepehrdad, Pouyan ; Susil, Petr ; Vaudenay, Serge ; Vuagnoux, Martin (2013):
Smashing WEP in a Passive Attack.
In: 20th International Workshop on Fast Software Encryption (FSE), [Conference item]

Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2013):
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, ACM Press, San Antonio, Texas, USA, In: CODASPY '13, ISBN 978-1-4503-1890-7,
DOI: 10.1145/2435349.2435382,
[Conference item]

Peter, Andreas ; Tews, Erik ; Katzenbeisser, Stefan (2013):
Efficiently Outsourcing Multiparty Computation under Multiple Keys.
In: >IACR Cryptology ePrint Archive, Report 2013/013, [Article]

Ahmed, Sarah ; Kaiser, Maximilian ; Kreutzer, Michael (2013):
IT-Sicherheitstrends kleiner und mittelständischer Unternehmen.
[Report]

Baecher, Paul ; Brzuska, Christina ; Mittelbach, Arno (2013):
Reset Indifferentiability and its Consequences.
In: Advances in Cryptology - ASIACRYPT 2013, Springer, In: Lecture Notes in Computer Science, [Conference item]

Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in a Quantum World.
In: arXiv:1306.0315, 2013, [Article]

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max (2013):
A Framework for Evaluating Trust of Service Providers in Cloud Marketplaces.
In: Proceedings of 28th ACM SAC 2013, New York, NY, USA, ACM, S. 1963-1965, DOI: 10.1145/2480362.2480727,
[Online-Edition: http://doi.acm.org/10.1145/2480362.2480727],
[Book section]

Mittelbach, Arno (2013):
Cryptophia’s Short Combiner for Collision-Resistant Hash Functions (best student paper).
In: Applied Cryptography and Network Security, Springer, In: Lecture Notes in Computer Science, [Conference item]

Werthmann, Tim ; Hund, Ralf ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten (2013):
PSiOS: Bring Your Own Privacy & Security to iOS Devices (Distinguished Paper Award).
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), [Conference item]

2012

Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2012):
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
In: BlackHat Abu Dhabi, [Conference item]

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012):
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
(TUD-CS-2012-0231), [Report]

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012):
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
(TUD-CS-2012-0226), [Report]

do Carmo, R. ; Werner, M. ; Hollick, Matthias (2012):
Signs of a Bad Neighborhood: A Lightweight Metric for Anomaly Detection in Mobile Ad Hoc Networks.
In: Proceedings of the 8th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (ACM Q2SWinet), [Conference item]

Gupta, Aditi ; Miettinen, Markus ; Asokan, N. ; Nagy, Marcin (2012):
Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling.
In: 2012 International Conference on Privacy, Security, Risk and Trust (PASSAT), and 2012 International Confernece on Social Computing (SocialCom), IEEE, Amsterdam, The Netherlands, ISBN 978-1-4673-5638-1,
DOI: 10.1109/SocialCom-PASSAT.2012.60,
[Conference item]

Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
Prouff, Emmanuel ; Schaumont, Patrick (Hrsg.) (2012):
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), Springer, Leuven, Belgium, In: LNCS, ISBN 978-3-642-33026-1,
[Conference item]

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Rožic, Vladimir ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012):
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Springer, In: Lecture Notes in Computer Science (LNCS), 7428, [Conference item]

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012):
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012), [Conference item]

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay (2012):
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version).
[Report]

Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Tamrakar, Sandeep ; Wachsmann, Christian (2012):
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
In: International Conference on Trust & Trustworthy Computing (TRUST), Springer, In: Lecture Notes in Computer Science (LNCS), 7344, [Conference item]

Sadeghi, Ahmad-Reza ; Kocabaş, Ünal ; Katzenbeisser, Stefan (2012):
Converse PUF-Based Authentication.
In: International Conference on Trust & Trustworthy Computing (TRUST), Springer, [Conference item]

Seudié, Hervé ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza (2012):
EDA for Secure and Dependable Cybercars: Challenges and Opportunities.
In: ACM/IEEE Design Automation Conference (DAC), [Conference item]

Djatmiko, Mentari ; Boreli, Roksana ; Seneviratne, Aruna ; Ries, Sebastian (2012):
Resources-aware trusted node selection for content distribution in mobile ad hoc networks.
In: Wireless Networks, Springer US, S. 1-14, 18, DOI: 10.1007/s11276-012-0505-5,
[Article]

Jiang, Xuxian ; Grace, Michael ; Sadeghi, Ahmad-Reza ; Zhou, Wu (2012):
Unsafe Exposure Analysis of Mobile In-App Advertisements.
In: to appear at WiSec, ACM, [Conference item]

Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Zhdanova, Maria ; Xu, Wenyuan ; Mustafa, Hossen ; Varadharajan, Vijay (2012):
Tetherway: A Framework for Tethering Camouflage.
In: Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), ACM Press, Tuscon, Arizona, ISBN 978-1-4503-1265-3,
[Conference item]

Wachsmann, Christian ; Sadeghi, Ahmad-Reza ; Schulz, Steffen (2012):
Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions.
In: Secure Smart Embedded Devices, Platforms and Applications, Springer, S. 429-449, [Book section]

Alkassar, Ammar ; Schulz, Steffen ; Stüble, Christian (2012):
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), S. 175-179, 2012, (3), DOI: 10.1007/s11623-012-0060-3,
[Article]

Bessani, Alysson ; Abbadi, Imad M. ; Bugiel, Sven ; Cesena, Emanuele ; Deng, Mina ; Gröne, Michael ; Marnau, Ninja ; Nürnberger, Stefan ; Pasin, Marcelo ; Schirmer, Norbert (2012):
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
Cambridge Scholars Publishing, [Book]

Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid (2012):
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
In: Conference on Digital Automation and Test Europe (DATE), [Conference item]

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2012):
Towards Taming Privilege-Escalation Attacks on Android.
In: 19th Annual Network & Distributed System Security Symposium (NDSS), [Conference item]

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012):
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
In: 19th Annual Network & Distributed System Security Symposium (NDSS), [Conference item]

Schulz, Steffen ; Brasser, Ferdinand ; Filyanov, Atanas (2012):
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution.
In: Financial Cryptography and Data Security (FC), Springer, In: LNCS, [Conference item]

Van Herrewege, Anthony ; Katzenbeisser, Stefan ; Maes, Roel ; Peeters, Roel ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012):
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
In: Financial Cryptography (FC) 2012, Springer, In: Lecture Notes in Computer Science (LNCS), 7397, [Conference item]

Bodden, Eric ; Thies, Andreas (2012):
RefaFlex: Safer Refactorings for Reflective Java Programs.
In: International Symposium on Software Testing and Analysis (ISSTA 2012), [Conference item]

Gupta, Aditi ; Miettinen, Markus ; Nagy, Marcin ; Asokan, Nadarajah ; Wetzel, Alexandre (2012):
PeerSense: Who is near you?
In: Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Lugano, Switzerland, ISBN 978-1-4673-0905-9,
DOI: 10.1109/PerComW.2012.6197553,
[Conference item]

Laurila, Juha ; Gatica-Perez, Daniel ; Aad, Imad ; Blom, Jan ; Bornet, Olivier ; Do, Trinh-Minh-Tri ; Dousse, Olivier ; Eberle, Julien ; Miettinen, Markus (2012):
The Mobile Data Challenge: Big Data for Mobile Computing Research.
In: Proceedings of the Workshop on the Nokia Mobile Data Challenge, in Conjunction with the 10th International Conference on Pervasive Computing, [Conference item]

Mittelbach, Arno (2012):
Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output.
In: Security and Cryptography for Networks, Springer, In: Lecture Notes in Computer Science, [Conference item]

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay
Foresti, Sara ; Yung, Moti ; Martinelli, Fabio (Hrsg.) (2012):
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: European Symposium on Research in Computer Science (ESORICS), Berlin, Heidelberg, Springer Verlag, S. 253-270, [Book section]

Schreiner, Steffen ; Grigoras, Costin ; Litmaath, Maarten ; Betev, Latchezar ; Buchmann, Johannes (2012):
Certified Grid Job Submission in the ALICE Grid Services.
In: Open Access Journal of Physics: Conference Series (JPCS), International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2012, [Article]

2011

Boneh, Dan ; Dagdelen, Özgür ; Fischlin, Marc ; Lehmann, Anja ; Schaffner, Christian ; Zhandry, Mark (2011):
Random Oracles in a Quantum World.
In: 17th International Conference on Theory and Application of Cryptology and Information Security, [Conference item]

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2011):
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
In: 18th ACM Conference on Computer and Communications Security (CCS'11), ACM, [Conference item]

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2011):
Practical and Lightweight Domain Isolation on Android.
In: Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM), ACM Press, [Conference item]

Bugiel, Sven ; Davi, Lucas ; Schulz, Steffen
Sadeghi, Ahmad-Reza ; Zhang, Xinwen (Hrsg.) (2011):
Scalable Trust Establishment with Software Reputation.
In: Workshop on Scalable Trusted Computing (STC), ACM Press, Chicago, Illinois, USA, [Conference item]

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011):
POSTER: Control-Flow Integrity for Smartphones.
In: 18th ACM Conference on Computer and Communications Security (CCS'11), ACM, [Conference item]

Davi, Lucas ; Dmitrienko, Alexandra ; Kowalski, Christoph ; Winandy, Marcel (2011):
Trusted Virtual Domains on OKL4: Secure Information Sharing on Smartphones.
In: Proceedings of the 6th ACM Workshop on Scalable Trusted Computing (STC), ACM Press, [Conference item]

Kocabaş, Ünal ; Schulz, Steffen (2011):
POSTER: Practical Embedded Remote Attestation Using Physically Unclonable Functions.
In: ACM Conference on Computer and Communications Security (CCS), ACM Press, [Conference item]

Schneider, Michael ; Göttert, Norman
Preneel, Bart ; Takagi, Tsuyoshi (Hrsg.) (2011):
Random Sampling for Short Lattice Vectors on Graphics Cards.
In: Workshop on Cryptographic Hardware and Embedded Systems 2011 (CHES 2011), Springer, Nara, Japan, In: LNCS, DOI: 10.1007/978-3-642-23951-9_11,
[Conference item]

Shen, Yiyun ; Miettinen, Markus ; Moen, Pirjo ; Kutvonen, Lea (2011):
Privacy Preservation Approach in Service Ecosystems.
In: 15th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW), IEEE, Helsinki, Finland, ISBN 978-1-4577-0869-5,
DOI: 10.1109/EDOCW.2011.59,
[Conference item]

Shirazi, Fatemeh ; Neumann, Stephan ; Ciolacu, Ines ; Volkamer, Melanie (2011):
Robust Electronic Voting: Introducing robustness in Civitas.
In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011, Trento, Italy, DOI: 10.1109/REVOTE.2011.6045915,
[Conference item]

Filyanov, Atanas ; McCune, Jonathan ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011):
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
In: 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2011), Hong Kong, [Conference item]

Ries, Sebastian ; Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max (2011):
CertainLogic: A Logic for Modeling Trust and Uncertainty (Short Paper).
In: In Proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST 2011), Springer Berlin Heidelberg, Pittsburgh, USA, Lecture Notes in Computer, ISBN 978-3-642-21599-5,
DOI: 10.1007/978-3-642-21599-5_19,
[Conference item]

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2011):
Lightweight Remote Attestation Using Physical Functions.
In: ACM Conference on Wireless Network Security (WiSec), ACM Press, [Conference item]

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2011):
Lightweight Remote Attestation using Physical Functions (Extended Version).
(TR-2011-06-01, Technical ), [Report]

Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2011):
Location Privacy in RFID Systemen.
In: Digma - Zeitschrift für Datenrecht und Informationssicherheit, S. 70-75, 11, (2), [Article]

Wahid, Khan (2011):
An ID-based mutually authenticated edge-to-edge security architecture for bridged provider networks to secure layer-2 communications.
Universitat Pompeu Fabra, [PhD thesis]

Armknecht, Frederik ; Maes, Roel ; Sadeghi, Ahmad-Reza ; Standaert, François-Xavier ; Wachsmann, Christian (2011):
A Formal Foundation for the Security Features of Physical Functions.
In: IEEE Symposium on Security and Privacy (SSP), IEEE Computer Society, [Conference item]

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza (2011):
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.
(TR-2011-04), [Report]

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Ries, Sebastian ; Mühlhäuser, Max (2011):
CertainLogic: A Logic for Modeling Trust and Uncertainty (Full version).
(27 pages), [Report]

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011):
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
In: 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), [Conference item]

Li, Shujun ; Sadeghi, Ahmad-Reza ; Heisrath, Soeren ; Schmitz, Roland ; Ahmad, Junaid Jameel (2011):
hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers.
In: 15th International Conference on Financial Cryptography and Data Security (FC), St. Lucia, [Conference item]

Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011):
A Security Architecture for Accessing Health Records on Mobile Phones.
In: HEALTHINF'2011: Proceedings of the 4th International Conference on Health Informatics, Rome, Italy, [Conference item]

Kneževic, M. ; Kobayashi, K. ; Ikegami, J. ; Matsuo, S. ; Satoh, A. ; Kocabas, U. ; Fan, J. ; Katashita, T. ; Sugawara, T. ; Sakiyama, K. ; Verbauwhede, I. ; Ohta, K. ; Homma, N. ; Aoki, T. (2011):
Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates.
In: IEEE Transactions on VLSI journal, [Article]

Nürnberger, Stefan ; Steinebach, Martin ; Zmudzinski, Sascha (2011):
Re-synchronizing audio watermarking after nonlinear time stretching.
In: Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII, [Conference item]

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011):
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED), [Book section]

Dmitrienko, Alexandra ; Gessner, Dennis ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Stüble, Christian ; Ullmann, Markus (2011):
Trusted embedded System Operating System (TeSOS) - Study and Design.
[Other]

Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011):
Securing the Access to Electronic Health Records on Mobile Phones.
In: Biomedical Engineering Systems and Technologies, [Conference item]

Gupta, Aditi ; Miettinen, Markus ; Asokan, N. (2011):
Using context-profiling to aid in access control decisions on mobile devices.
In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Seattle, WA, USA, ISBN 978-1-61284-938-6,
DOI: 10.1109/PERCOMW.2011.5766891,
[Conference item]

Katzenbeisser, Stefan ; Kocabaş, Ünal ; van der Leest, Vincent ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Schröder, Heike ; Wachsmann, Christian (2011):
Recyclable PUFs: Logically Reconfigurable PUFs.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Springer, In: Lecture Notes in Computer Science (LNCS), 6917, [Conference item]

Katzenbeisser, Stefan ; Kocabaş, Ünal ; van der Leest, Vincent ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Wachsmann, Christian (2011):
Recyclable PUFs: logically reconfigurable PUFs.
In: Journal of Cryptographic Engineering, S. 177-186, 1, (3), [Article]

2010

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Scafuro, Alessandra ; Visconti, Ivan ; Wachsmann, Christian (2010):
Impossibility Results for RFID Privacy Notions.
In: Transactions on Computational Science IX, Springer, In: LNCS, 6480, [Conference item]

Bugiel, Sven ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
TruWalletM: Secure Web Authentication on Mobile Platforms.
In: Proceedings of INTRUST 2010 The Second International Conference on Trusted Systems, [Conference item]

Sadeghi, Ahmad-Reza ; Li, Shujun ; Shah, Syed Amier Haider ; Khan, Muhammad Asad Usman ; Khayam, Syed Ali ; Schmitz, Roland (2010):
Breaking e-Banking CAPTCHAs.
In: 26th Annual Computer Security Applications Conference (ACSAC 2010), [Conference item]

Sadeghi, Ahmad-Reza ; Preneel, Bart ; Pfitzmann, Andreas ; Moran, Tal ; Maier-Rabler, Ursula ; Kutylowski, Miroslaw ; Klonowski, Marek ; Guerses, Seda ; Danezis, George ; Borisov, Nikita ; Baer, Walter (2010):
Machiavelli Confronts 21st Century Digital Technology: Democracy in a Network Society.
[Conference item]

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
Securing the E-Health Cloud.
In: 1st ACM International Health Informatics Symposium (IHI 2010), [Conference item]

Sadeghi, Ahmad-Reza ; Naccache, David (2010):
Towards Hardware-Intrinsic Security.
In: Information Security and Cryptography, [Conference item]

Bugiel, Sven ; Ekberg, Jan-Erik (2010):
Implementing an Application-Specific Credential Platform Using Late-Launched Mobile Trusted Module.
In: 5th Annual Workshop on Scalable Trusted Computing (STC 2010), [Conference item]

Checkoway, Stephen ; Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Shacham, Hovav ; Winandy, Marcel (2010):
Return-Oriented Programming without Returns.
In: Proceedings of the 17th ACM conference on Computer and communications security, ACM, Chicago, Illinois, USA, In: CCS '10, ISBN 978-1-4503-0245-6,
DOI: http://doi.acm.org/10.1145/1866307.1866370,
[Conference item]

Chen, Liqun ; Dietrich, Kurt ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Winter, Johannes (2010):
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
In: Information Security Conference (ISC), Springer, In: LNCS, 6531, [Conference item]

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
Privilege Escalation Attacks on Android.
In: ISC 2010: Proceedings of the 13th Information Security Conference, Boca Raton, Florida, USA, [Conference item]

Henecka, Wilko ; Kögl, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo (2010):
TASTY: Tool for Automating Secure Two-partY computations.
In: Proceedings of the 17. ACM Conference on Computer and Communications Security (CCS'10), Chicago, Illinois, ACM, In: CCS'10, October 04-08 2010, ISBN 978-1-4503-0245-6,
DOI: 10.1145/1866307.1866358,
[Online-Edition: https://encrypto.de/papers/HKSSW10.pdf],
[Conference item]

Löhr, Hans ; Pöppelmann, Thomas ; Rave, Johannes ; Steegmanns, Martin ; Winandy, Marcel (2010):
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments.
In: 5th Annual Workshop on Scalable Trusted Computing (STC 2010), [Conference item]

Sadeghi, Ahmad-Reza ; Mukherjee, Biswanath ; Ghosal, Dipak ; Liu, Yali (2010):
Video Streaming Forensic - Content Identification with Traffic Snooping.
In: 13th Information Security Conference (ISC 2010), [Conference item]

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010):
Enhancing RFID Security and Privacy by Physically Unclonable Functions.
In: Towards Hardware-Intrinsic Security: Foundations and Practice, Springer, S. 281-307, [Book section]

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010):
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
In: 12. International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10), Springer, DOI: 10.1007/978-3-642-15031-9_26,
[Online-Edition: https://encrypto.de/papers/JKSS10OTP.pdf],
[Conference item]

Nürnberger, Stefan ; Feller, Thomas ; Huss, Sorin (2010):
RAY - A Secure Microkernel Architecture.
In: IEEE Privacy Security and Trust 2010 (PST2010), [Conference item]

Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2010):
Trusted Computing.
In: Handbook of Financial Cryptography and Security, CRC Press, [Conference item]

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
Return-Oriented Programming without Returns on ARM.
(HGI-TR-2010-002), [Report]

Armknecht, Frederik ; Chen, Liqun ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2010):
Anonymous Authentication for RFID Systems.
In: Workshop on RFID Security (RFIDSec), Springer, In: LNCS, 6370, [Conference item]

Armknecht, Frederik ; Ghosal, Dipak ; Katzenbeisser, Stefan ; Liu, Yali ; Sadeghi, Ahmad-Reza ; Schulz, Steffen (2010):
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
In: Information Hiding Conference (IH), Springer, [Conference item]

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010):
On RFID Privacy with Mutual Authentication and Tag Corruption.
In: International Conference on Applied Cryptography and Network Security (ACNS), Springer, In: LNCS, 6123, [Conference item]

Kostiainen, Kari ; Dmitrienko, Alexandra ; Ekberg, Jan-Erik ; Sadeghi, Ahmad-Reza ; Asokan, N. (2010):
Key Attestation from Trusted Execution Environments.
In: TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, Berlin, [Conference item]

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Cesena, Emanuele ; Ramunno, Gianluca ; Vernizzi, Davide (2010):
Anonymous Authentication with TLS and DAA.
In: TRUST2010, [Conference item]

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Winandy, Marcel (2010):
Token-Based Cloud Computing - Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
In: 3. International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud, Springer, DOI: 10.1007/978-3-642-13869-0_30,
[Online-Edition: https://encrypto.de/papers/SSW10.pdf],
[Conference item]

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), S. 289-298, 5, [Article]

Sadeghi, Ahmad-Reza ; Li, Shujun ; Khayam, Syed Ali ; Schmitz, Roland (2010):
Breaking a Virtual Password System Based on Randomized Linear Generation Functions.
In: IEEE ICC 2010 - Communication and Information System Security Symposium ('ICC'10 CISS'), [Conference item]

Wahid, Khan (2010):
Maximizing Ethernet Security by Switch-based Single Secure Domain.
In: 7th International Conference on Information Technology: New Generations (ITNG 2010), Las Vegas, USA, April 2010. Page(s): 774 - 778, DOI: 10.1109/ITNG.2010.143, IEEE Xplore Digital Library, [Conference item]

Wahid, Khan (2010):
Rethinking The Link Security Approach to Manage Large Scale Ethernet Network.
In: 17th IEEE Workshop on Local and Metropolitan Area Networks (LANMAN 2010), New Jersey, USA, May 2010. Page(s): 1 - 6, DOI: 10.1109/LANMAN.2010.5507143, IEEE Xplore Digital Library, [Conference item]

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010):
PUF-Enhanced RFID Security and Privacy.
In: Workshop on Secure Component and System Identification (SECSI), [Conference item]

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
(HGI-TR-2010-001), [Report]

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
Patterns for Secure Boot and Secure Storage in Computer Systems.
In: 4th International Workshop on Secure systems methodologies using patterns (SPattern 2010),, [Conference item]

Implementation of Binary Edwards Curves for very-constrained Devices.
In: IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP), [Article]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Cabuk, Serdar ; Dalton, Chris ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramasamy, Hari Govind ; Ramunno, Gianluca ; Schunter, Matthias (2010):
Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers.
In: Journal of Computer Security, S. 89-121, 18, (1), [Article]

Schulz, Steffen ; Sadeghi, Ahmad-Reza (2010):
Extending IPsec for Efficient Remote Attestation.
In: Financial Cryptography and Data Security (FC), Springer, LNCS, [Conference item]

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010):
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens.
In: Towards Hardware Intrinsic Security: Foundation and Practice, Springer-Verlag Berlin Heidelberg, S. 367-386, DOI: 10.1007/978-3-642-14452-3_17,
[Book section]

Kobayashi, K. ; Ikegami, J. ; Kneževic, M. ; Guo, X. ; Matsuo, S. ; Huang, S. ; Nazhandali, L. ; Kocabas, U. ; Fan, J. ; Satoh, A. ; Verbauwhede, I. ; Sakiyama, K. ; Ohta, K. (2010):
Prototyping Platform for Performance Evaluation of SHA-3 Candidates.
In: IEEE International Workshop on Hardware-Oriented Security and Trust - HOST 2010, pp. 60-63, [Conference item]

Miettinen, Markus ; Asokan, N. (2010):
Towards security policy decisions based on context profiling.
In: Proceedings of the 3rd ACM workshop on Artificial intelligence and security (AISec '10), ACM, Chicago, Illinois, USA, In: AISec '10, ISBN 978-1-4503-0088-9,
DOI: 10.1145/1866423.1866428,
[Conference item]

2009

Catuogno, Luigi ; Dmitrienko, Alexandra ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramunno, Gianluca ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Schunter, Matthias ; Winandy, Marcel ; Zhan, Jing (2009):
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
In: International Conference on Trusted Systems (INTRUST), Springer, [Conference item]

Kokkinen, Heikki ; Heikkinen, Mikko ; Miettinen, Markus (2009):
Post-Payment Copyright System versus Online Music Shop: Business Model and Privacy.
In: International Journal on Advances in Security, S. 112-128, 2, (2-3), [Article]

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Maes, Roel ; Sunar, Berk ; Tuyls, Pim (2009):
Memory Leakage-Resilient Encryption based on Physically Unclonable Functions.
In: ASIACRYPT'09, [Conference item]

Sadeghi, Ahmad-Reza ; Li, Shujun ; Asghar, Hassan Jameel ; Pieprzyk, Josef ; Schmitz, Roland ; Wang, Huaxiong (2009):
On the Security of PAS (Predicate-based Authentication Service).
In: Annual Computer Security Applications Conference (ACSAC’09), 2009., [Conference item]

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009):
Anonymizer-Enabled Security and Privacy for RFID.
In: International Conference on Cryptology and Network Security (CANS), Springer, In: LNCS, 5888, [Conference item]

Thiemert, Stefan ; Nürnberger, Stefan ; Steinebach, Martin ; Zmudzinski, Sascha (2009):
Security of robust audio hashes.
In: IEEE International Workshop on Information Forensics and Security, WIFS 2009, London, UK, London, UK, [Conference item]

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
Transparent Mobile Storage Protection in Trusted Virtual Domains.
In: 23rd Large Installation System Administration Conference (LISA '09), [Conference item]

Ekberg, Jan-Erik ; Bugiel, Sven (2009):
Trust in a Small Package: Minimized MRTM Software Implementation for Mobile Secure Environments.
In: 4th Annual Workshop on Scalable Trusted Computing (STC2009), [Conference item]

Gajek, Sebastian ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
In: 4th ACM Workshop on Scalable Trusted Computing, [Conference item]

Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009):
Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics (Poster).
In: Section Days of Ruhr-University Bochum Research School, [Online-Edition: https://encrypto.de/papers/SS09Poster.pdf],
[Other]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Zhan, Jing ; Korthaus, René (2009):
A Practical Property-based Bootstrap Architecture.
In: ACMSTC'09, [Conference item]

Sadeghi, Ahmad-Reza ; Vishik, Claire ; Verbauwhede, Ingrid (2009):
Future of Assurance: Ensuring that a System is Trustworthy.
In: ISSE'09, [Conference item]

Bangerter, Endre ; Briner, Thomas ; Henecka, Wilko ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009):
Automatic Generation of Sigma-Protocols.
In: 6. European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09), Springer, DOI: 10.1007/978-3-642-16441-5_5,
[Online-Edition: https://encrypto.de/papers/BBHKSS09.pdf],
[Conference item]

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
In: Proceedings of the 2009 ACM workshop on Scalable trusted computing, ACM, Chicago, Illinois, USA, In: STC '09, ISBN 978-1-60558-788-2,
DOI: http://doi.acm.org/10.1145/1655108.1655117,
[Conference item]

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan (2009):
Hide and Seek in Time - Robust Covert Timing Channels.
In: European Symposium on Research in Computer Security (ESORICS), Springer, In: LNCS, ISBN 978-3-642-04443-4,
[Conference item]

Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
A Pattern for Secure Graphical User Interface Systems.
In: 3rd International Workshop on Secure systems methodologies using patterns (SPattern'09), Proceedings of the 20th International Workshop on Database and Expert Systems Applications, IEEE, [Conference item]

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009):
Location Privacy in RFID Applications.
In: Privacy in Location-Based Applications: Research Issues and Emerging Trends, Springer, In: LNCS, 5599, [Conference item]

Sadeghi, Ahmad-Reza ; Kursawe, Klaus ; Schellekens, Dries ; Skoric, Boris ; Tuyls, Pim (2009):
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage.
In: 2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), [Conference item]

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009):
Enhancing RFID Security and Privacy by Physically Unclonable Functions (Extended Abstract).
In: Foundations for Forgery-Resilient Cryptographic Hardware, Schloss Dagstuhl, In: Dagstuhl Seminar Proceedings, [Conference item]

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2009):
Efficient RFID Security and Privacy with Anonymizers.
In: Workshop on RFID Security (RFIDSec), [Conference item]

Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
Einsatz von Sicherheitskernen und Trusted Computing.
In: D-A-CH Security, [Conference item]

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Weber, Marion ; Winandy, Marcel (2009):
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
In: Proceedings of the 2nd International Conference on Trusted Computing, Springer, In: LNCS, 5471, [Conference item]

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Vishik, Claire ; Winandy, Marcel (2009):
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
In: 5th Information Security Practice and Experience Conference (ISPEC'09), Springer, In: LNCS, 5451, [Conference item]

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Tuyls, Pim ; Maes, Roel ; Sunar, Berk (2009):
Physically Unclonable Pseudorandom Functions.
In: Poster session of Advances in Cryptology - EUROCRYPT, [Conference item]

Sadeghi, Ahmad-Reza ; Schulz, Steffen (2009):
Secure VPNs for Trusted Computing Environments.
In: International Conference on Trusted Computing (TRUST), Springer, Oxford, UK, [Conference item]

Lee, Y. K. ; Batina, L. ; Fan, J. ; Karaklajic, D. ; Kneževic, M. ; Kocabas, U. ; Rožic, V. ; Verbauwhede, I. (2009):
Tiny Public-Key Security Processor.
In: ISSCC09 Student Forum, [Article]

Sadeghi, Ahmad-Reza ; Bangerter, Endre ; Barbosa, Manuel ; Bernstein, Daniel ; Damgård, Ivan ; Page, Dan ; Pagter, Jakob ; Sovio, Sampo (2009):
Using Compilers to Enhance Cryptographic Product Development.
In: Information Security Solutions Europe (ISSE), [Conference item]

Halonen, Perttu ; Miettinen, Markus ; Hätönen, Kimmo
Iliadis, L. ; Vlahavas, I. ; Bramer, M. (Hrsg.) (2009):
Computer Log Anomaly Detection Using Frequent Episodes.
In: Artificial Intelligence Applications and Innovations III, Springer US, S. 417-422, DOI: 10.1007/978-1-4419-0221-4_49,
[Book section]

2008

Rupp, Andy ; Leander, Gregor ; Bangerter, Endre ; Dent, Alexander ; Sadeghi, Ahmad-Reza (2008):
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
In: Advances in Cryptology - ASIACRYPT 2008, [Conference item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark ; Pereira, Olivier (2008):
Universally Composable Security Analysis of TLS.
In: Second Conference on Provable Security (ProvSec), [Conference item]

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Gasmi, Yacine ; Ramunno, Gianluca ; Vernizzi, Davide ; Stewin, Patrick ; Unger, Martin (2008):
An Efficient Implementation of Trusted Channels Based on OpenSSL.
In: ACMSTC 2008, [Conference item]

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008):
Improved Security Notions and Protocols for Non-Transferable Identification.
In: 13th European Symposium on Research in Computer Security (ESORICS), [Conference item]

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2008):
User Privacy in Transport Systems Based on RFID E-Tickets.
In: International Workshop on Privacy in Location-Based Applications (PiLBA), Malaga, Spain, [Conference item]

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Husseiki, Rani ; Gasmi, Yacine ; Stewin, Patrick ; Unger, Martin (2008):
Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains.
In: 3rd ACM Workshop on Scalable Trusted Computing, [Conference item]

Armknecht, Frederik ; Furukawa, Jun ; Kurosawa, Kaoru (2008):
A Universally Composable roup Key Exchange Protocol with Minimum Communication Effort.
In: Sixth Conference on Security and Cryptography for Networks (SCN 2008), [Conference item]

Gasmi, Yacine ; Hessmann, Christian ; Pittenauer, Martin ; Winandy, Marcel (2008):
Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis.
In: INFORMATIK 2008, Beherrschbare Systeme - dank Informatik, Band 1, Beiträge der 38. Jahrestagung der Gesellschaft für Informatik e.V. (GI), In: LNI, 1, [Conference item]

Sadeghi, Ahmad-Reza ; Bangerter, Endre ; Djackov, Maksim (2008):
A Demonstrative Ad-hoc Attestation System.
In: Information Security Conference 2008 (ISC'08), Taipei, Taiwan, [Conference item]

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark (2008):
Property-Based Attestation without a Trusted Third Party.
In: Information Security Conference (ISC'08), [Conference item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2008):
Property-Based TPM Virtualization.
In: Information Security, 11th International Conference (ISC 2008), In: LNCS, [Conference item]

Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Gröbert, Felix ; Birk, Dominik (2008):
A Forensic Framework for Tracing Phishers.
Springer, In: LNCS, [Conference item]

Sadeghi, Ahmad-Reza ; Shokrollahi, Jamshid ; Bösch, Christoph ; Guajardo, Jorge ; Tuyls, Pim (2008):
Efficient Helper Data Key Extractor on FPGAs.
In: Workshop on Cryptographic Hardware and Embedded Systems 2008 (CHES 2008), [Conference item]

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008):
Resettable and Non-Transferable Chip Authentication for E-Passports.
In: RFIDSec 2008, [Conference item]

Armknecht, Frederik ; Mirzadeh, Shahab ; Tafazolli, Rahim ; Pallares, Jordi Jaen ; Afifi, Hossam (2008):
CPFP: An efficient key management scheme for large scale personal networks.
In: IEEE ISWPC 2008, [Conference item]

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Löhr, Hans ; Manulis, Mark ; Escalante, Alberto (2008):
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
In: 4th Information Security Practice and Experience Conference (ISPEC 2008), Sydney, Australia, [Conference item]

Sadeghi, Ahmad-Reza ; Stüble, André ; Wolf, Marko ; Asokan, N. (2008):
Securing Peer-to-Peer Distributions for Mobile Devices.
In: 4th Information Security Practice and Experience Conference (ISPEC 2008), [Conference item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Osterhues, André ; Wolf, Marko ; Asokan, Nadarajah (2008):
Securing Peer-to-Peer Distributions for Mobile Devices.
In: 4th Information Security Practice and Experience Conference (ISPEC 2008), Sydney, Australia, [Conference item]

Armknecht, Frederik ; Westhoff, Dirk ; Girao, Joao ; Hessler, Alban (2008):
A life-time optimized end-to-end encryption scheme for sensor networks allowing in-networking processing.
In: Computer Communications Journal, S. 734-749, 31, (4), [Article]

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008):
Identification Protocols Revisited - Episode I: E-Passports.
In: e-crypt workshop on Secure Component and System Identification (SECSI), [Conference item]

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan (2008):
Identification Protocols Revisited - Episode I: E-Passports.
In: e-crypt workshop on Secure Component and System Identification (SECSI), [Conference item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2008):
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), [Conference item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2008):
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), [Conference item]

Sadeghi, Ahmad-Reza (2008):
Trusted Computing—State of the Art and Challenges.
In: SOFSEM 2008, Springer, In: LNCS, [Conference item]

Seitz, Katja (2008):
Sicheres Padding für RSA.
Johann W. Goethe University Frankfurt, [Master thesis]

2007

Asokan, N. ; Gasmi, Yacine ; Sadeghi, Ahmad-Reza ; Stewin, Patrick ; Unger, Martin (2007):
Beyond Secure Channels.
ACM Press, In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), [Conference item]

Eisenbarth, Thomas ; Güneysu, Tim ; Paar, Christof ; Sadeghi, Ahmad-Reza ; Schellekens, Dries ; Wolf, Marko (2007):
Reconfigurable Trusted Computing in Hardware.
ACM Press, In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), [Conference item]

Paar, Christof ; Sadeghi, Ahmad-Reza ; Güneysu, Tim ; Eisenbarth, Thomas ; Schellekens, Dries ; Wolf, Marko (2007):
Reconfigurable Trusted Computing in Hardware.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), ACM Press, Alexandria, Virginia, USA, [Conference item]

Sadeghi, Ahmad-Reza ; Gasmi, Yacine ; Stewin, Patrick ; Unger, Martin ; Asokan, Nadarajah (2007):
Beyond Secure Channels.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), ACM Press, Alexandria, Virginia, USA, [Conference item]

Sadeghi, Ahmad-Reza ; Wolf, Christopher ; Stüble, Christian ; Asokan, N. ; Ekberg, Jan-Erik (2007):
Enabling Fairer Digital Rights Management with Trusted Computing.
In: 10th International Conference on Information Security (ISC 2007), Springer Verlag, Valparaíso, Chile, In: LNCS, 4779, [Conference item]

Battestini, Agathe ; Rossow, Christian ; Flanagan, Adrian ; Miettinen, Markus (2007):
Creating Next Generation Applications and Services for Mobile Devices: Challenges and Opportunities.
In: Proc. IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2007), Athens, ISBN 978-1-4244-1144-3,
DOI: 10.1109/PIMRC.2007.4394846,
[Conference item]

Celik, Mehmet ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza ; Skoric, Boris (2007):
Combining Tardos Fingerprinting Codes and Fingercasting.
Springer Verlag, In: 9th International Workshop on Information Hiding (IH 2007), In: LNCS, 4567, [Conference item]

Sadeghi, Ahmad-Reza ; Katzenbeisser, Stefan ; Skoric, Boris ; Celik, Mehmet (2007):
Combining Tardos Fingerprinting Codes and Fingercasting.
In: 9th International Workshop on Information Hiding (IH 2007), Springer Verlag, Saint Malo, France, In: LNCS, 4567, [Conference item]

Adelsbach, Andre ; Huber, Ulrich ; Sadeghi, Ahmad-Reza (2007):
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
Springer Verlag, In: Transactions on Data Hiding and Multimedia Security II, In: LNCS, 4499, [Conference item]

Birk, Dominik ; Gajek, Sebastian ; Gröbert, Felix ; Sadeghi, Ahmad-Reza (2007):
Phishing Phishers - Observing and Tracing Organized Cybercrime.
IEEE Computer Society, In: Second International Conference on Internet Monitoring and Protection (ICIMP 2007), [Conference item]

Dmitrienko, Alexandra (2007):
Zigbee-to-tcp/ip gateway: New opportunities for ZigBee-based sensor networks.
In: 6th International Workshop on Ambient Intelligence and Embedded Systems, [Conference item]

Gajek, Sebastian ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2007):
Browser-based Authentication Protocols for Naive Users.
In: Western European Workshop on Research in Cryptology (WEWoRC 2007), [Conference item]

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2007):
Compartmented Security for Browsers.
(HGI-TR-2007-001), [Report]

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2007):
Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing.
In: Second International Conference on Availability, Reliability and Security (ARES 2007), Vienna, Austria, [Conference item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2007):
Fingercasting—Joint Fingerprinting and Decryption of Broadcast Messages.
In: Transactions on Data Hiding and Multimedia Security II, Springer Verlag, In: LNCS, 4499, [Conference item]

Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Gröbert, Felix ; Birk, Dominik (2007):
Phishing Phishers - Observing and Tracing Organized Cybercrime.
In: Second International Conference on Internet Monitoring and Protection (ICIMP 2007), IEEE Computer Society, Silicon Valley, California, USA, [Conference item]

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark ; Escalante, Alberto (2007):
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
In: 11th International Conference on Financial Cryptography and Data Security (FC 2007), Springer Verlag, Scarborough, Trinidad and Tobago, In: LNCS, 4886, [Conference item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Löhr, Hans ; Ramasamy, Hari Govind ; Schulz, Stefan ; Schunter, Matthias (2007):
Enhancing Grid Security Using Trusted Virtualization.
In: 4th International Conference on Autonomic and Trusted Computing (ATC 2007), Springer Verlag, Hong Kong, China, In: LNCS, 4610, [Conference item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2007):
Browser Models for Usable Authentication Protocols.
In: IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07), Oakland, USA, [Conference item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2007):
Browser-based Authentication Protocols for Naive Users.
In: Western European Workshop on Research in Cryptology (WEWoRC 2007), Bochum, Germany, [Conference item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Winandy, Marcel (2007):
Trusted User-Aware Web Authentication.
In: Workshop on Trustworthy User Interfaces for Passwords and Personal Information (TIPPI'07),, Stanford, USA, [Conference item]

2006

Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian ; Wachsmann, Christian ; Winandy, Marcel (2006):
TCG Inside? - A Note on TPM Specification Compliance.
ACM Press, In: ACM Workshop on Scalable Trusted Computing (ACMSTC), [Conference item]

Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Selhorst, Marcel ; Stüble, Christian ; Winandy, Marcel (2006):
TCG Inside? - A Note on TPM Specification Compliance.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC), ACM Press, Alexandria, Virginia (USA), [Conference item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2006):
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
In: 11th Australasian Conference on Information Security and Privacy (ACISP 2006), Springer Verlag, Melbourne, Australia, In: LNCS, 4058, [Conference item]

Wahid, Khan (2006):
Bluetooth based Login for Windows Servers.
KTH Royal Institute of Technology, [Master thesis]

Miettinen, Markus ; Halonen, Perttu ; Hätönen, Kimmo (2006):
Host-based intrusion detection for advanced mobile devices.
In: Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), IEEE Computer Society, Vienna, 2, ISBN 0-7695-2466-4,
DOI: 10.1109/AINA.2006.192,
[Conference item]

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006):
Property-based Taming Lying Mobile Node.
In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006), Vienna, Austria, [Conference item]

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006):
Property-based Taming Lying Mobile Nodes.
In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006), Vienna, Austria, [Conference item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Manulis, Mark (2006):
Linkable Democratic Group Signatures.
In: 2nd Information Security Practice and Experience Conference (ISPEC 2006), Hangzhou, China, [Conference item]

Adelsbach, Andre ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza (2006):
A Computational Model for Watermark Robustness.
In: Information Hiding Workshop, [Conference item]

Adelsbach, Andre ; Rohe, Markus ; Sadeghi, Ahmad-Reza (2006):
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
In: Transactions on Data Hiding and Multimedia Security, [Conference item]

Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Scheibel, Michael ; Stüble, Christian ; Winandy, Marcel (2006):
Security Architecture for Device Encryption and VPN.
In: Information Security Solution Europe (ISSE06), [Conference item]

Carluccio, Dario ; Lemke-Rust, Kerstin ; Paar, Christof ; Sadeghi, Ahmad-Reza (2006):
E-Passport: The Global Traceability or How to Feel Like an UPS Package.
In: Workshop on RFID Security 2006, [Conference item]

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2006):
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
In: Workshop on Information and System Security (WISSEC'06), [Conference item]

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2006):
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
In: Workshop on Information and System Security (WISSEC'06), Antwerpen, Belgium, [Conference item]

Huber, Ulrich ; Sadeghi, Ahmad-Reza (2006):
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
Springer, In: 9th Information Security Conference (ISC 2006), In: LNCS, 4173, [Conference item]

Hätönen, Kimmo ; Klemettinen, Mika ; Miettinen, Markus
Boulicaut, Jean-François ; Raedt, Luc De ; Mannila, Heikki (Hrsg.) (2006):
Constraint-Based Mining and Inductive Databases.
In: Constraint-Based Mining and Inductive Databases, Springer, S. 196-215, DOI: 10.1007/11615576_10,
[Online-Edition: https://link.springer.com/chapter/10.1007%2F11615576_10],
[Book section]

Lemke, Kerstin ; Paar, Christof ; Sadeghi, Ahmad-Reza (2006):
Physical Security Bounds Against Tampering.
In: International Conference on Applied Cryptography and Network Security (ACNS 2006), [Conference item]

Manulis, Mark ; Sadeghi, Ahmad-Reza (2006):
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
In: Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing), [Conference item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2006):
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
[Report]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzebeisser, Stefan (2006):
A Computational Model for Watermark Robustness.
In: Information Hiding Workshop, [Conference item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2006):
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
In: Transactions on Data Hiding and Multimedia Security, [Conference item]

Sadeghi, Ahmad-Reza ; Gajek, Sebastian (2006):
Client Authentication in Federations Using a Security Mode.
In: Toward a More Secure Web - W3C Workshop on Usability and Transparency of Web Authentication., [Conference item]

Sadeghi, Ahmad-Reza ; Huber, Ulrich (2006):
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
[Report]

Sadeghi, Ahmad-Reza ; Huber, Ulrich (2006):
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
In: 9th Information Security Conference (ISC 2006), Springer, Samos, Greece, In: LNCS, 4173, [Conference item]

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006):
Key Agreement for Heterogeneous Ad-Hoc Groups.
In: International Journal of Wireless and Mobile Computing (IJWMC), [Conference item]

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006):
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
In: Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing), [Conference item]

Sadeghi, Ahmad-Reza ; Paar, Christof ; Carluccio, Dario ; Lemke-Rust, Kerstin (2006):
E-Passport: The Global Traceability or How to Feel Like an UPS Package.
In: Workshop on RFID Security 2006, Graz, Austria, [Conference item]

Sadeghi, Ahmad-Reza ; Paar, Christof ; Lemke, Kerstin (2006):
Physical Security Bounds Against Tampering.
In: International Conference on Applied Cryptography and Network Security (ACNS 2006), [Conference item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Löhr, Hans ; Chen, Liquen ; Landfermann, Rainer ; Rohe, Markus (2006):
A Protocol for Property-Based Attestation.
In: First ACM Workshop on Scalable Trusted Computing (STC'06), [Conference item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Wolf, Marko ; Scheibel, Michael (2006):
Play it once again, Sam - Enforcing Stateful Licenses on Open Platforms.
In: The Second Workshop on Advances in Trusted Computing (WATC '06 Fall), [Conference item]

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Alkassar, Ammar ; Scheibel, Michael (2006):
Security Architecture for Device Encryption and VPN.
In: Information Security Solution Europe (ISSE06), [Conference item]

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Scheibel, Michael (2006):
Design and Implementation of a Secure Linux Device Encryption Architecture.
In: LinuxTag, [Conference item]

2005

Greveler, Ulrich ; Adelsbach, Andre ; Löschner, Sven (2005):
Anonymous Data Broadcasting by Misuse of Satellite ISPs.
In: 22C3 Chaos Computer Club (CCC) Congress, Berlin, Germany, [Conference item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005):
Property-Based Broadcast Encryption for Multi-level Security Policies.
Springer Verlag, In: 8th International Conference on Information Security and Cryptology (ICISC 2005), In: LNCS, 3935, [Conference item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005):
Property-Based Broadcast Encryption for Multi-level Security Policies.
In: 8th International Conference on Information Security and Cryptology (ICISC 2005), Springer Verlag, Seoul, Korea, In: LNCS, 3935, [Conference item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005):
Towards Multilateral Secure Digital Rights Distribution Infrastructures.
In: ACM DRM Workshop'05, Alexandria, Virginia, USA, [Conference item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich (2005):
Embedding Trust into Cars—Secure Software Delivery and Installation.
In: Third Workshop on Embedded Security in Cars (escar 2005), Cologne, Germany, [Conference item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005):
Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme.
In: 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Salzburg, Austria, [Conference item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005):
Multilaterally Secure Computing Platforms - in your office, car and at home.
In: 1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society, [Conference item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005):
Multilaterally Secure Computing Platforms – in your office, car and at home.
In: 1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society, Tokyo, Japan, [Conference item]

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Selhorst, Marcel ; Senft, Oska (2005):
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9, [Article]

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Selhorst, Marcel ; Senft, Oska (2005):
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9, [Article]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Kühn, Ulrich ; Kursawe, Klaus ; Lucks, Stefan (2005):
Secure Data Management in Trusted Computing.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Springer Verlag, In: LNCS, 3659, [Conference item]

Sadeghi, Ahmad-Reza ; Stüble, Ulrich ; Kursawe, Klaus ; Lucks, Stefan (2005):
Secure Data Management in Trusted Computing.
Springer Verlag, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), In: LNCS, 3659, [Conference item]

Camenisch, Jan ; Rohe, Markus ; Sadeghi, Ahmad-Reza (2005):
Sokrates - A Compiler Framework for Zero-Knowledge Protocols.
In: Western European Workshop on Research in Cryptology (WEWoRC 2005), [Conference item]

Sadeghi, Ahmad-Reza ; Rohe, Markus ; Camenisch, Jan (2005):
Sokrates - A Compiler Framework for Zero-Knowledge Protocols.
In: Western European Workshop on Research in Cryptology (WEWoRC 2005), Leuven, Belgium, [Conference item]

Sadeghi, Ahmad-Reza ; Rupp, Andy ; Bangerter, Endre (2005):
Simplified Hardness Proofs in the Generic Group Model.
In: Western European Workshop on Research in Cryptology (WEWoRC 2005), Leuven, Belgium, [Conference item]

Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian (2005):
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
In: 9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI), [Conference item]

Sadeghi, Ahmad-Reza ; Alkassar, Ammar ; Stüble, Christian ; Selhorst, Marcel (2005):
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
In: 9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI), [Conference item]

Schwenk, Jörg ; Greveler, Ulrich ; Adelsbach, Andre (2005):
Fair DRM - Ermöglichen von Privatkopien und Schutz digitaler Waren.
In: 9. Deutscher IT-Sicherheitskongress des BSI, [Conference item]

Greveler, Ulrich ; Adelsbach, Andre (2005):
Satellite Communication without Privacy - Attacker's Paradise.
In: GI Fachtagung "Sicherheit 2005", Springer Verlag, Regensburg, Germany, In: LNI, [Conference item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005):
Secure Software Delivery and Installation in Embedded Systems.
In: First Information Security Practice and Experience Conference (ISPEC 2005), Singapore, [Conference item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005):
Security Engineering for Zero-knowledge Watermark Detection.
In: Special Session on Media Security (WIAMIS 2005), Montreux, Switzerland, [Conference item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005):
Towards Multilateral Security On DRM Platforms.
In: First Information Security Practice and Experience Conference (ISPEC 2005), [Conference item]

Greveler, Ulrich ; Adelsbach, Andre (2005):
Datenschutzverletzungen bei Internetzugängen via Satellit.
In: Datenschutznachrichten, S. 4-7, 1, [Article]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005):
Towards multilaterally secure computing platforms - with open source and trusted computing.
In: Information Security Technical Report, S. 83-95, 10, (2), [Article]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2005):
Towards multilaterally secure computing platforms - with open source and trusted computing.
In: Information Security Technical Report, S. 83-95, 10, (2), [Article]

Greveler, Ulrich ; Adelsbach, Andre (2005):
A Broadcast Encryption Scheme with Free-Riders but Unconditional Security.
In: First International Conference on Digital Rights Management, Sydney, [Conference item]

Sadeghi, Ahmad-Reza (2005):
Trusted Computing: Whom do we trust? Building Open Multilateral Secure Platforms Based On Trusted Computing.
In: DRM Conference, [Conference item]

Sadeghi, Ahmad-Reza (2005):
Trusted Computing: Whom do we trust? Building Open Multilateral Secure Platforms Based On Trusted Computing.
In: DRM Conference, [Conference item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Bas, Patrick ; Barni, Mauro ; Rosa, Alessia De
Katzenbeisser, Stefan (Hrsg.) (2005):
First Summary Report on Asymmetric Watermarking.
In: ECRYPT, Network of Excellence in Cryptology, [Conference item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich (2005):
Secure Software Delivery and Installation in Embedded Systems.
[Report]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich
Lemke, Kerstin (Hrsg.) (2005):
Secure Software Delivery and Installation in Embedded Systems.
In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications, Springer-Verlag, S. 27-49, [Book section]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005):
Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it.
In: ACM Multimedia Systems, [Article]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2005):
Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it.
In: ACM Multimedia Systems, [Article]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich (2005):
Property-Based Broadcast Encryption for Multi-level Security Policies.
[Book]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich (2005):
Property-Based Broadcast Encryption for Multi-level Security Policies.
[Report]

Sadeghi, Ahmad-Reza ; Chen, Liqun ; Enzmann, Matthias ; Schneider, Markus ; Steiner, Michael (2005):
A Privacy-Protecting Coupon System.
In: Financial Cryptography, [Conference item]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Browser Model for Security Analysis of Browser-Based Protocols.
In: European Symposium for Research in Computer Science (ESORICS), [Conference item]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Browser Model for Security Analysis of Browser-Based Protocols.
[Book]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Browser Model for Security Analysis of Browser-Based Protocols.
In: European Symposium for Research in Computer Science (ESORICS), [Conference item]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Browser Model for Security Analysis of Browser-Based Protocols.
(RZ3600), [Report]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
In: Workshop on Secure Web Services (SWS), [Conference item]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
In: Workshop on Secure Web Services (SWS), [Conference item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin (2005):
An Open Approach for Designing Secure Electronic Immobilizers.
In: First Information Security Practice and Experience Conference (ISPEC 2005), [Conference item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin
Lemke, Kerstin ; Wolf, Marko ; Paar, Christof (Hrsg.) (2005):
Anti-theft Protection: Electronic Immobilizers.
Springer Verlag, In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications., [Conference item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin
Lemke, Kerstin ; Wolf, Marko ; Paar, Christof (Hrsg.) (2005):
Anti-theft Protection: Electronic Immobilizers.
In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications., Springer Verlag, [Conference item]

Schwenk, Jörg ; Gajek, Sebastian ; Adelsbach, Andre (2005):
Phishing - Die Täuschung des Benutzers zur Preisgabe geheimer Benutzerdaten.
In: 9. Deutscher IT-Sicherheitskongress des BSI, [Conference item]

Schwenk, Jörg ; Gajek, Sebastian ; Adelsbach, Andre (2005):
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures.
In: First Information Security Practice and Experience Conference (ISPEC 2005), Springer-Verlag, In: LNCS, 3439, [Conference item]

Spalka, Adrian ; Cremers, Armin ; Winandy, Marcel (2005):
Multilateral Security Considerations for Adaptive Mobile Applications.
In: 2nd International Conference on E-Business and Telecommunication Networks (ICETE 2005), INSTICC, [Conference item]

2004

Sadeghi, Ahmad-Reza ; Stüble, Christian (2004):
Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms.
In: 20th Annual Computer Security Applications Conference (ACSAC), Tucson, Arizona, USA, [Conference item]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2004):
Property-based Attestation for Computing Platforms: Caring about policies, not mechanisms.
In: New Security Paradigm Workshop (NSPW), White Point Beach Resort, Nova Scotia, Canada, [Conference item]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Pohlmann, Norbert (2004):
European Multilateral Secure Computing Base - Open Trusted Computing for You and Me.
In: Datenschutz und Datensicherheit (DUD), S. 548-554, 9, [Article]

Altmeyer, Oliver ; Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian
Paulus, Sachar ; Pohlmann, Norbert ; Reimer, Helmut (Hrsg.) (2004):
Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004), Vieweg Verlag, S. 346-361, [Book section]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2004):
Overcoming the Obstacles of Zero-Knowledge Watermark Detection.
ACM Press, In: ACM Multimedia and Security Workshop, [Conference item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus (2004):
Overcoming the Obstacles of Zero-Knowledge Watermark Detection.
In: ACM Multimedia and Security Workshop, ACM Press, Magdeburg, Germany, [Conference item]

Sadeghi, Ahmad-Reza ; Günnewig, Dirk ; Rannenberg, Kai ; Stüble, Christian
Koenig, Christian ; Neu­mann, An­dre­as ; Katz­sch­mann, To­bi­as (Hrsg.) (2004):
Trusted Computing Platforms: Zur technischen und industriepolitischen Situation und Vorgehensweise.
In: Vertrauenswürdige Systemumgebungen Technik, Recht und gesellschaftspolitische Implikationen des "Trusted Computing", Verlag Recht und Wirtschaft, [Book section]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Altmeyer, Oliver ; Selhorst, Marcel
Paulus, Sachar ; Pohlmann, Norbert ; Reimer, Helmut (Hrsg.) (2004):
Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004), Vieweg Verlag, S. 346-361, [Book section]

Schwenk, Jörg ; Adelsbach, Andre (2004):
Key-Assignment Strategies for CPPM.
In: ACM Multimedia and Security Workshop, ACM Press, Magdeburg, Germany, [Conference item]

2003

Stüble, Christian ; Himmelein, Gerald (2003):
Vertrauensfragen - IBMs Antworten auf die TCPA-Fragen des Chaos Computer Club.
In: c't, 15, [Article]

Alkassar, Ammar ; Stüble, Christian (2003):
A Security Framework for Integrated Networks.
In: MILCOM 2003 IEEE Military Communications Conference, Boston, USA, [Conference item]

Sadeghi, Ahmad-Reza ; Alkassar, Ammar (2003):
The Quest for Security in Integrated Networks.
In: 11th International Conference on Telecommunication Systems, Modeling and Analysis, [Conference item]

Sadeghi, Ahmad-Reza ; Alkassar, Ammar (2003):
The Quest for Security in Integrated Networks.
In: 11th International Conference on Telecommunication Systems, Modeling and Analysis, Monterey, USA, [Conference item]

Adelsbach, Andre ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza (2003):
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, S. 266-278, 9, (3), [Article]

Hätönen, Kimmo ; Boulicaut, Jean-François ; Klemettinen, Mika ; Miettinen, Markus ; Masson, Cyrille
Kambayashi, Y. ; Mohania, M. K. ; Wöss, W. (Hrsg.) (2003):
Comprehensive log compression with frequent patterns.
In: Proceedings of the 5th International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2003), Springer, http://liris.cnrs.fr/~jboulica/dawak03.pdf, In: LNCS, 2734, [Conference item]

Hätönen, Kimmo ; Halonen, Perttu ; Klemettinen, Mika ; Miettinen, Markus
Boulicaut, J.-F. ; Dzeroski, S. (Hrsg.) (2003):
Queryable Lossless Log Database Compression.
In: Proceedings of the Second International Workshop on Knowledge Discovery in Inductive Databases (KDID), ISBN 953-6690-34-9,
[Conference item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzenbeisser, Stefan (2003):
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, S. 266-278, 9, (3), [Article]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003):
Taming "Trusted Computing" by Operating System Design.
In: 4th International Workshop on Information Security Applications (WISA'03), Springer-Verlag, Cheju Island, Korea, [Conference item]

Stüble, Christian ; Kursawe, Klaus (2003):
Improving End-user Security and Trustworthiness of TCG Platforms.
In: 33. GI-Fachtagung, Frankfurt, Germany, [Conference item]

Sadeghi, Ahmad-Reza ; Alkassar, Ammar ; Stüble, Christian (2003):
Secure Object Identification - or: Solving The Chess Grandmaster Problem.
In: New Security Paradigms Workshop, Ascona, Switzerland, [Conference item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre (2003):
Advanced Techniques for Dispute Resolving and Authorship Proofs on Digital Works.
In: Security and Watermarking of Multimedia Contents V, [Conference item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Schneider, Markus ; Stüble, Christian (2003):
Die digitale Signatur.
In: Digitale Signaturen in der Praxis, AWV Verlag, [Book section]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Schneider, Markus ; Stüble, Christian (2003):
Die digitale Signatur.
In: Digitale Signaturen in der Praxis, AWV Verlag, [Book section]

Sadeghi, Ahmad-Reza ; Schneider, Markus (2003):
Electronic Payment Systems.
In: Digital Rights Management, Springer Verlag, S. 113-137, [Book section]

Sadeghi, Ahmad-Reza ; Schneider, Markus (2003):
Electronic Payment Systems.
In: Digital Rights Management, Springer Verlag, S. 113-137, [Book section]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003):
Bridging the Gap between TCPA/Palladium and Personal Security.
[Report]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003):
Sinn und Unsinn von TCPA und Palladium.
In: c't, 13, [Article]

Sadeghi, Ahmad-Reza ; Stüble, Christian (2003):
Sinn und Unsinn von TCPA und Palladium.
In: c't, 13, [Article]

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Günnewig, Dirk (2003):
Trusted Computing ohne Nebenwirkungen.
In: Datenschutz und Datensicherheit (DUD), Vieweg Verlag, S. 556-560, [Book section]

Sadeghi, Ahmad-Reza ; Stüble, Dirk (2003):
Trusted Computing ohne Nebenwirkungen.
In: Datenschutz und Datensicherheit (DUD), Vieweg Verlag, S. 556-560, [Book section]

2002

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzenbeisser, Stefan (2002):
Cryptography Meets Watermarking: Detecting Watermarks with Minimal- or Zero-Knowledge Disclosure.
In: XI European Signal Processing Conference, 1, [Conference item]

Adelsbach, Andre ; Stüble, Christian ; Creese, Sadie ; Pfitzmann, Birgit ; Ryan, Peter Y. A. ; Simmonds, William ; Steinbrechner, Sandra ; Steiner, Michael ; Waidner, Michael (2002):
Cryptographic Semantics For The Algebraic Models.
(MAF­TIA De­li­ver­a­ble D), [Report]

Alkassar, Ammar ; Stüble, Christian (2002):
Towards Secure IFF: Preventing Mafia Fraud Attacks.
In: MILCOM 2002, IEEE Military Communication Conference, [Conference item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian (2002):
Final Report on Verification and Assessment.
[Book]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian (2002):
Final Report on Verification and Assessment.
(MAF­TIA De­li­ver­a­ble D), [Report]

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Steinbrecher, Sandra (2002):
Auctions with Multiple Rounds and Multiple Items.
In: Int. Workshop on Trust and Privacy in Digital Business (DEXA 2002), [Conference item]

Stüble, Christian ; Lange, Steffen ; Nonnengart, Andreas ; Vogt, Roland (2002):
Common Criteria Protection Profiles - Discretionary Information Flow Control (DiC).
In: 3rd International Common Criteria Conference, Ottawa, Canada, [Conference item]

2001

Sadeghi, Ahmad-Reza ; Steiner, Michael (2001):
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference.
In: Eurocrypt, Springer-Verlag, In: LNCS, 2045, [Conference item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Geraldy, Alexander ; Pfitzmann, Birgit (2001):
Optimized Self-Synchronizing Mode of Operation.
In: 8th International Workshop on Fast Software Encryption, Yokohama, Japan, [Conference item]

Adelsbach, Andre ; Sadeghi, Ahmad-Reza (2001):
Zero-Knowledge Watermark Detection and Proof of Ownership.
Springer-Verlag, In: Information Hiding: Fourth International Workshop, In: LNCS, 2137, [Conference item]

Sadeghi, Ahmad-Reza (2001):
How to Break a Semi-Anonymous Fingerprinting Scheme.
Springer-Verlag, In: Information Hiding: Fourth International Workshop, In: LNCS, 2137, [Conference item]

Sadeghi, Ahmad-Reza (2001):
How to Break a Semi-Anonymous Fingerprinting Scheme.
In: Information Hiding: Fourth International Workshop, Springer-Verlag, In: LNCS, 2137, [Conference item]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre (2001):
Zero-Knowledge Watermark Detection and Proof of Ownership.
In: Information Hiding: Fourth International Workshop, Springer-Verlag, Berlin, Germany, In: LNCS, 2137, [Conference item]

Stüble, Christian ; Pfitzmann, Birgit (2001):
PERSEUS: A Quick Open-source Path to Secure Signatures.
In: 2nd Workshop on Microkernel-based Systems, Banff, Canada, [Conference item]

Stüble, Christian ; Pfitzmann, Birgit ; Riordan, James ; Waidner, Michael ; Weber, Arnd (2001):
The PERSEUS System Architecture.
In: Verlässliche Informationssysteme (VIS) '01, DuD Fachbeiträge, Vieweg Verlag, S. 1-18, [Book section]

2000

Adelsbach, Andre ; Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza (2000):
Proving ownership of digital content.
Springer-Verlag, In: 3rd International Workshop on Information Hiding, IH 1999, In: LNCS, 1768, [Conference item]

Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza (2000):
Self-escrowed cash against user black-mailing.
Springer-Verlag, In: Fourth Conference on Financial Cryptography (FC 2000 Anguilla), In: LNCS, 1962, [Conference item]

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (2000):
Self-escrowed cash against user black-mailing.
In: Fourth Conference on Financial Cryptography (FC’00),, Springer-Verlag, Anguilla, British West Indies, In: LNCS, 1962, [Conference item]

Stüble, Christian ; Weber, Arnd (2000):
From Security Instruments to Secure End-User Systems.
In: World Markets Series - Wireless Technology 2000, S. 207-209, [Article]

Adelsbach, Andre (2000):
Anonymous fingerprinting with direct non-repudiation.
In: Advances in Cryptology - ASIACRYPT‘2000, Springer-Verlag, Kyoto, Japan, In: LNCS, 1976, [Conference item]

1999

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999):
Coin-based anonymous fingerprinting.
In: EUROCRYPT ’99, Springer-Verlag, In: LNCS, 1599, [Conference item]

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999):
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99, Vieweg Verlag, S. 35-48, [Book section]

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999):
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99, Vieweg Verlag, S. 35-48, [Book section]

Stüble, Christian (1999):
Effiziente Implementierung von kryptographischen Datenaustauschformaten am Beispiel OpenPGP und S/MIME v.3.
In: Sicherheitsinfrastrukturen: DuD Fachbeiträge, Vieweg Verlag, S. 272-284, [Book section]

This list was generated on Mon Sep 23 02:12:34 2019 CEST.