Publications

Publications

Group by: Date | Creator(s) | Item type
Jump to: 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999
Number of items at this level: 467.

2018

Miettinen, Markus ; Sadeghi, Ahmad-Reza :
Internet of things or threats?: on building trust in IoT (keynote). 1:1-1:9.
[Online-Edition: https://dl.acm.org/citation.cfm?id=3283569]
In: CODES+ISSS 2018, part of ESWEEK 2018, September 30 - October 5, 2018, Torino, Italy. CODES '18 Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis IEEE Press Piscataway, NJ, USA , Piscataway, NJ, USA
[Conference or workshop item] , (2018)

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian :
VoiceGuard: Secure and Private Speech Processing.
Interspeech 2018 International Speech Communication Association (ISCA)
[Conference or workshop item] , (2018)

Frassetto, Tommaso ; Jauernig, Patrick ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
IMIX: In-Process Memory Isolation EXtension.
In: 27th USENIX Security Symposium, 15.-17.08.2018, Baltimore, MD, USA. 27th USENIX Security Symposium
[Conference or workshop item] , (2018)

Mitev, Richard :
Lyin’ Alexa - Skill-Based Man-in-the-Middle Attack on Virtual Assistants.
TU Darmstadt
[Master thesis] , (2018)

Carpent, Xavier ; Eldefrawy, Karim ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices.
In: Design Automation Conference, 2018, June 24-29, San Francisco, USA. ACM
[Conference or workshop item] , (2018)

Dessouky, Ghada ; Abera, Tigist ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza :
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution.
In: 37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18), 2018.
[Conference or workshop item] , (2018)

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias :
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
In: 23rd European Symposium on Research in Computer Security (ESORICS 2018), 2018, Barcelona, Spain.
[Conference or workshop item] , (2018)

Asokan, N. ; Nyman, Thomas ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems - Special Issue ESWEEK 2018, CASES 2018, CODES + ISSS 2018 and EMSOFT 2018
[Article] , (2018)

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
US-AID: Unattended Scalable Attestation of IoT Devices.
In: 37th IEEE International Symposium on Reliable Distributed Systems (SRDS 2018), 2018.
[Conference or workshop item] , (2018)

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza :
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: AsiaCCS .
[Conference or workshop item] , (2018)

Miettinen, Markus ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza :
Revisiting Context-Based Pairing in IoT.
In: 55th Design Automation Conference (DAC), 24.-29.06. 2018, San Francisco, CA, USA. Proceedings of the 55th Design Automation Conference (DAC) ACM
[Conference or workshop item] , (2018)

Zeitouni, Shaza ; Gens, David ; Sadeghi, Ahmad-Reza :
It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs.
In: Design Automation Conference (DAC) 2018
[Conference or workshop item] , (2018)

Biondo, Andrea ; Conti, Mauro ; Davi, Lucas ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza :
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
In: 27th USENIX Security Symposium.
[Conference or workshop item] , (2018)

Ghaeini, Hamid Reza ; Antonioli, Daniele ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole :
State-Aware Anomaly Detection for Industrial Control Systems.
The 33rd ACM/SIGAPP Symposium On Applied Computing (SAC)
[Conference or workshop item] , (2018)

Liebchen, Christopher :
Advancing Memory-corruption Attacks and Defenses.
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8090]
Technische Universität , Darmstadt
[PhD thesis], (2018)

Gens, David ; Schmitt, Simon ; Davi, Lucas ; Sadeghi, Ahmad-Reza :
K-Miner: Uncovering Memory Corruption in Linux.
25th Annual Network & Distributed System Security Symposium (NDSS)
[Conference or workshop item] , (2018)

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep :
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
[Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=832...]
In: IEEE Internet Computing p. 1. ISSN 1089-7801
[Article] , (2018)

Asokan, N. ; Miettinen, Markus :
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead.
[Online-Edition: http://www.sciencedirect.com/science/article/pii/S0140366418...]
In: Computer Communications ISSN 0140-3664
[Article] , (2018) (Im Druck)

Asokan, N. ; Nguyen, Thien Duc ; Tarkoma, Sasu ; Toivonen, Juhani ; Truong, Hien Thi Thu :
Proximity Verification Based on Acoustic Room Impulse Response.
[Online-Edition: http://arxiv.org/abs/1803.07211]
In: CoRR, abs/1803.07211
[Article] , (2018)

Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Dang, Minh Hoang ; Asokan, N. ; Sadeghi, Ahmad-Reza :
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
[Online-Edition: http://arxiv.org/abs/1804.07474]
In: CoRR, abs/1804.07474
[Article] , (2018)

2017

Frassetto, Tommaso ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
JITGuard: Hardening Just-in-time Compilers with SGX.
24th ACM Conference on Computer and Communications Security (CCS)
[Conference or workshop item] , (2017)

Jauernig, Patrick Thomas :
SMOV: Lighweight In-Process Memory Isolation.
TU Darmstadt
[Master thesis] , (2017)

Zeitouni, Shaza ; Dessouky, Ghada ; Arias, Orlando ; Sullivan, Dean ; Ibrahim, Ahmad ; Jin, Yier ; Sadeghi, Ahmad-Reza :
ATRIUM: Runtime Attestation Resilient Under Memory Attacks.
2017 International Conference On Computer Aided Design (ICCAD'17)
[Conference or workshop item] , (2017)

Antonioli, Daniele ; Ghaeini, Hamid Reza ; Adepu, Sridhar ; Ochoa, Martin ; Tippenhauer, Nils Ole :
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3.
ACM Workshop on Cyber-Physical Systems Security and Privacy, ACM Conference on Computer and Communications Security (CCS)
[Conference or workshop item] , (2017)

Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean :
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017)
[Conference or workshop item] , (2017)

Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Müller, Urs ; Sadeghi, Ahmad-Reza :
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.

[Report] , (2017)

Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro :
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
[Conference or workshop item] , (2017)

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17 .
[Conference or workshop item] , (2017)

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza :
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT .
[Conference or workshop item] , (2017)

Fereidooni, Hossein ; Frassetto, Tommaso ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Conti, Mauro :
Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
The Second IEEE International Workshop on Safe, Energy-Aware, & Reliable Connected Health (CHASE-SEARCH)
[Conference or workshop item] , (2017)

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza :
HardIDX: Practical and Secure Index with SGX.
Conference on Data and Applications Security and Privacy (DBSec)
[Conference or workshop item] , (2017)

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick :
Phonion: Practical Protection of Metadata in Telephony Networks.
Proceedings on Privacy Enhancing Technologies (PoPETs)
[Conference or workshop item] , (2017)

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza :
SeED: Secure Non-Interactive Attestation for Embedded Devices.
10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017)
[Conference or workshop item] , (2017)

Asokan, N. ; Davi, Lucas ; Dessouky, Ghada ; Koeberl, Patrick ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza :
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
In: 54th Design Automation Conference (DAC'17).
[Conference or workshop item] , (2017)

Dessouky, Ghada ; Zeitouni, Shaza ; Nyman, Thomas ; Paverd, Andrew ; Davi, Lucas ; Koeberl, Patrick ; Asokan, N. ; Sadeghi, Ahmad-Reza :
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
54th Design Automation Conference (DAC'17)
[Conference or workshop item] , (2017)

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu :
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT.
Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017)
[Conference or workshop item] , (2017)

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Frassetto, Tommaso ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu :
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017) IEEE
[Conference or workshop item] , (2017)

Portela, Bernardo ; Barbosa, Manuel ; Scerri, Guillaume ; Warinschi, Bogdan ; Bahmani, Raad ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza :
Secure Multiparty Computation from SGX.
Financial Cryptography and Data Security
[Conference or workshop item] , (2017)

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Conference or workshop item] , (2017)

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael :
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17) Internet Society
[Conference or workshop item] , (2017)

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. :
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Conference or workshop item] , (2017)

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed :
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Conference or workshop item] , (2017)

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (1) pp. 62-78.
[Article] , (2017)

2016

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
CATT: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
[Online-Edition: https://arxiv.org/abs/1611.08396]
In: Cryptography and Security
[Article] , (2016)

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
Black Hat Europe
[Conference or workshop item] , (2016)

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
23rd ACM Conference on Computer and Communications Security (CCS)
[Conference or workshop item] , (2016)

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza :
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
23rd ACM Conference on Computer and Communications Security (CCS)
[Conference or workshop item] , (2016)

Ghaeini, Hamid Reza ; Tippenhauer, Nils Ole :
Hamids: Hierarchical monitoring intrusion detection system for industrial control systems.
ACM Workshop on Cyber-Physical Systems Security and Privacy, ACM Conference on Computer and Communications Security (CCS)
[Conference or workshop item] , (2016)

Lacoste, Marc ; Sousa, Paulo ; Neves, Nuno ; Miettinen, Markus ; Ramos, Fernando M.V. ; Vukolic, Marko ; Charmet, Fabien ; Yaich, Reda ; Oborzynski, Krzysztof ; Vernekar, Gitesh :
User-Centric Security and Dependability in the Cloud of Clouds.
In: IEEE Cloud Computing Special issue on Cloud Security, 3 (5) pp. 64-75.
[Article] , (2016)

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Ibrahim, Ahmad ; Conti, Mauro ; Neven, Gregory :
SANA: Secure and Scalable Aggregate Network Attestation.
23rd ACM Conference on Computer and Communications Security (CCS) 2016 CCS 2016
[Conference or workshop item] , (2016)

Mohan, Vaishnavi ; Othmane, Lotfi Ben :
SecDevOps: Is It a Marketing Buzzword?
Proc. of the 11th International Conference on Availability, Reliability and Security (ARES)
[Conference or workshop item] , (2016)

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias :
POSTER: Toward a Secure and Scalable Attestation.
ACM WiSEC 2016
[Conference or workshop item] , (2016)

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza :
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
The annual Privacy Enhancing Technologies Symposium (PETS)
[Conference or workshop item] , (2016)

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza :
DARPA: Device Attestation Resilient to Physical Attacks.
ACM WiSEC 2016
[Conference or workshop item] , (2016)

Sadeghi, Ahmad-Reza ; Dessouky, Ghada :
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
ACM WiSec 2016
[Conference or workshop item] , (2016)

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza :
Things, Trouble, Trust: On Building Trust in IoT Systems.
53rd Design Automation Conference (DAC)
[Conference or workshop item] , (2016)

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Regulating ARM TrustZone Devices in Restricted Spaces.
14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
[Conference or workshop item] , (2016)

Fernando, Ruchith ; Ranchal, Rohit ; An, Byungchan ; Othmane, Lotfi Ben ; Bhargava, Bharat :
Consumer oriented privacy preserving access control for electronic health records in the cloud.
IEEE cloud
[Conference or workshop item] , (2016)

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael :
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
USENIX Annual Technical Conference (ATC)
[Conference or workshop item] , (2016)

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz :
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
53. Annual Design Automation Conference (DAC'16) ACM
[Conference or workshop item] , (2016)

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
53rd Design Automation Conference (DAC)
[Conference or workshop item] , (2016)

McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh :
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, PP (99)
[Article] , (2016)

Zeitouni, Shaza ; Oren, Yossef ; Wachsmann, Christian ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza :
Remanence Decay Side-Channel: The PUF Case.
In: IEEE Transactions on Information Forensics and Security, 99
[Article] , (2016)

Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Leakage-Resilient Layout Randomization for Mobile Devices.
23rd Annual Network & Distributed System Security Symposium (NDSS)
[Conference or workshop item] , (2016)

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza :
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
Financial Crypto 2016
[Conference or workshop item] , (2016)

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza :
Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.

[Report] , (2016)

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: DAC '16 . ACM
[Conference or workshop item] , (2016)

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
53rd Design Automation Conference (DAC)
[Conference or workshop item] , (2016)

Heuser, Stephan :
Towards Modular and Flexible Access Control on Smart Mobile Devices.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5663]
Technische Universität Darmstadt , Darmstadt
[PhD thesis], (2016)

Miettinen, Markus ; Huang, Jialin ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza :
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16)
[Conference or workshop item] , (2016)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik :
Towards a Unified Security Model for Physically Unclonable Functions.
CT-RSA - Cryptographers' Track at the RSA Conference
[Conference or workshop item] , (2016)

2015

Davi, Lucas ; Sadeghi, Ahmad-Reza:
Building Secure Defenses Against Code-Reuse Attacks.
Springer International Publishing ISBN 978-3-319-25544-6
[Book] , (2015)

Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael:
Automated Software Diversity.
Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool
[Book] , (2015)

Ghaeini, Hamid Reza ; Akbari, Behzad ; Barekatain, Behrang ; Trivino Cabrera, Alicia :
Adaptive video protection in large scale peer‐to‐peer video streaming over mobile wireless mesh networks.
In: International Journal of Communication Systems, 29 (18) pp. 2580-2603.
[Article] , (2015)

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian :
SEDA: Scalable Embedded Device Attestation.
22nd ACM Conference on Computer and Communications Security (CCS)
[Conference or workshop item] , (2015)

Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza :
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
22nd ACM Conference on Computer and Communications Security (CCS)
[Conference or workshop item] , (2015)

Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael :
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
22nd ACM Conference on Computer and Communications Security (CCS)
[Conference or workshop item] , (2015)

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza :
Automated Synthesis of Optimized Circuits for Secure Computation.
22. ACM Conference on Computer and Communications Security (CCS'15) ACM
[Conference or workshop item] , (2015)

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian :
SEDA - Technical Report.

[Report] , (2015)

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael :
Return to Where? You Can't Exploit What You Can't Find.
Blackhat USA
[Conference or workshop item] , (2015)

Huang, Jialin ; Vaudenay, Serge ; Lai, Xuejia ; Nyberg, Kaisa :
Capacity and Data Complexity in Multidimensional Linear Attack.
CRYPTO
[Conference or workshop item] , (2015)

Do, Trinh Minh Tri ; Dousse, Olivier ; Miettinen, Markus ; Gatica-Perez, Daniel :
A probabilistic kernel method for human mobility prediction with smartphones.
In: Pervasive and Mobile Computing, 20 pp. 13-28.
[Article] , (2015)

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean :
HAFIX: Hardware-Assisted Flow Integrity Extension.
52nd Design Automation Conference (DAC)
[Conference or workshop item] , (2015)

Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
TyTAN: Tiny Trust Anchor for Tiny Devices.
52nd Design Automation Conference (DAC) 2015
[Conference or workshop item] , (2015)

Egert, Rolf ; Fischlin, Marc ; Gens, David ; Jacob, Sven ; Senker, Matthias ; Tillmans, Jörg :
Privately computing set-union and set-intersection cardinality via bloom filters.
In: Information Security and Privacy (ACISP) pp. 413-430.
[Article] , (2015)

Nagy, Marcin ; Bui, Thanh Phong ; Cristofaro, Emiliano De ; Asokan, N. ; Ott, Jörg ; Sadeghi, Ahmad-Reza :
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
ACM WiSEC 2015
[Conference or workshop item] , (2015)

Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Waidner, Michael :
Security and Privacy Challenges in Industrial Internet of Things.
52nd Design Automation Conference (DAC) Research
[Conference or workshop item] , (2015)

Songhori, Ebrahim ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz :
Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis.
52nd Design Automation Conference (DAC)
[Conference or workshop item] , (2015)

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael :
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
36th IEEE Symposium on Security and Privacy (Oakland)
[Conference or workshop item] , (2015)

Schuster, Felix ; Tendyck, Thomas ; Liebchen, Christopher ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten :
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
36th IEEE Symposium on Security and Privacy (Oakland)
[Conference or workshop item] , (2015)

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
36. IEEE Symposium on Security and Privacy (IEEE S&P'15) IEEE
[Conference or workshop item] , (2015)

Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza :
XiOS: Extended Application Sandboxing on iOS.
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
[Conference or workshop item] , (2015)

Barekatain, Behrang ; Khezrimotlagh, Dariush ; Aizaini Maarof, Mohd ; Ghaeini, Hamid Reza ; Ariza Quintana, Alfonso ; Trivino Cabrera, Alicia :
Efficient P2P live video streaming over hybrid WMNs using random network coding.
In: Wireless Personal Communications, 80 (4) pp. 1761-1789.
[Article] , (2015)

Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian :
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
22nd Annual Network & Distributed System Security Symposium (NDSS)
[Conference or workshop item] , (2015)

Busold, Christoph ; Heuser, Stephan ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah :
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
Financial Cryptography and Data Security
[Conference or workshop item] , (2015)

Dmitrienko, Alexandra ; Heuser, Stephan ; Nguyen, Thien Duc ; da Silva Ramos, Marcos ; Rein, Andre ; Sadeghi, Ahmad-Reza :
Market-driven Code Provisioning to Mobile Secure Hardware.
Financial Cryptography and Data Security
[Conference or workshop item] , (2015)

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep :
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices.
[Online-Edition: https://arxiv.org/pdf/1511.02119.pdf]
In: CoRR, abs/1511.02119
[Article] , (2015)

Miettinen, Markus ; Asokan, N. ; Koushanfar, Farinaz ; Nguyen, Thien Duc ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Sobhani, Majid ; Yellapantula, Sudha :
I know where you are: Proofs of Presence resilient to malicious provers.
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
[Conference or workshop item] , (2015)

Sadeghi, Ahmad-Reza ; Davi, Lucas ; Larsen, Per :
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? - Keynote -.
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
[Conference or workshop item] , (2015)

2014

Wachsmann, Christian ; Sadeghi, Ahmad-Reza:
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions.
Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool Publishers ISBN 9781627055093
[Book] , (2014)

Miettinen, Markus ; Asokan, N. ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Sobhani, Majid :
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
Proc. ACM Conference on Computer and Communications Security ACM
[Conference or workshop item] , (2014)

Othmane, Lotfi Ben ; Angin, Pelin ; Weffers, Harold ; Bhargava, Bharat :
Extending the Agile Development Approach to Develop Acceptably Secure Software.
In: IEEE Transactions on Dependable and Secure Computing, 11 (6) pp. 497-509.
[Article] , (2014)

Sadeghi, Ahmad-Reza ; Brasser, Ferdinand :
Swap and Play: Live Updating Hypervisors and Its Application to Xen.
CCSW 2014: The ACM Cloud Computing Security Workshop Proceedings
[Conference or workshop item] , (2014)

Dessouky, Ghada ; Klaiber, Michael J. ; Bailey, Donald G. ; Simon, Sven :
Adaptive Dynamic On-chip Memory Management for FPGA-based Reconfigurable Architectures.
In: 24th International Conference on Field Programmable Logic and Applications (FPL), 2014, München, Deutschland.
[Conference or workshop item] , (2014)

Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
Kutylowski, Miroslaw ; Vaidya, Jaideep (eds.) :

Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014. Lecture Notes in Computer Science, 8712. Springer International Publishing , pp. 76-93. ISBN 978-3-319-11202-2
[Book section] , (2014)

Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8) pp. 1189-1206.
[Article] , (2014)

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza :
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
BlackHat USA
[Conference or workshop item] , (2014)

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian :
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
23rd USENIX Security Symposium
[Conference or workshop item] , (2014)

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza :
ASM: A Programmable Interface for Extending Android Security.
23rd USENIX Security Symposium
[Conference or workshop item] , (2014)

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza :
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4)
[Article] , (2014)

Davi, Lucas ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza :
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing
[Conference or workshop item] , (2014)

Kong, Joonho ; Koushanfar, Farinaz ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
Design Automation Conference (DAC) 2014 ACM Press
[Conference or workshop item] , (2014)

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. :
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014)
[Conference or workshop item] , (2014)

Mustafa, Hossen ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Xu, Wenyuan :
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
[Conference or workshop item] , (2014)

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian :
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.

[Report] , (2014)

Koeberl, Patrick ; Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Varadharajan, Vijay :
TrustLite: A Security Architecture for Tiny Embedded Devices.
European Conference on Computer Systems (EuroSys) ACM
[Conference or workshop item] , (2014)

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza :
On the (In)Security of Mobile Two-Factor Authentication.
Financial Cryptography and Data Security (FC'14) Springer
[Conference or workshop item] , (2014)

Dmitrienko, Alexandra ; Noack, David ; Sadeghi, Ahmad-Reza ; Yung, Moti :
POSTER: On Offline Payments with Bitcoin.
FC'2014: Financial Cryptography and Data Security Conference
[Conference or workshop item] , (2014)

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza :
ASM: A Programmable Interface for Extending Android Security.

[Report] , (2014)

Senftleben, Marius ; Bucicoiu, Mihai ; Tews, Erik ; Armknecht, Frederik ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza :
MoP-2-MoP - Mobile private microblogging.
Financial Cryptography and Data Security (FC'14) Springer
[Conference or workshop item] , (2014)

Busold, Christoph ; Dmitrienko, Alexandra ; Wachsmann, Christian :
Key2Share for Authentication Services.
SmartCard Workshop
[Conference or workshop item] , (2014)

Ghaeini, Hamid Reza ; Akbari, Behzad :
Peer-to-Peer Adaptive Forward Error Correction in Live Video Streaming over Wireless Mesh Network.
The 12th International Conference on Wired & Wireless Internet Communications
[Conference or workshop item] , (2014)

Habib, Sheikh Mahbub ; Ries, Sebastian ; Varikkattu, Prabhu ; Mühlhäuser, Max :
Towards a Trust Management System for Cloud Computing Marketplaces: using CAIQ as a trust information source.
In: Security and Communication Networks (SCN), 7 (11) pp. 2185-2200.
[Article] , (2014)

Noisternig, M. ; Hollick, Matthias :
Efficient Solutions for the Authenticated Fragmentation Problem in Delay- and Disruption-Tolerant Networks.
Proc. 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM'14)
[Conference or workshop item] , (2014)

2013

Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza:
Mobile Platform Security.
Synthesis Lectures on Information Security, Privacy, and Trust, 4 (3). Morgan & Claypool
[Book] , (2013)

Laurila, Juha ; Gatica-Perez, Daniel ; Aad, Imad ; Blom, Jan ; Bornet, Olivier ; Do, Trinh Minh Tri ; Dousse, Olivier ; Eberle, Julien ; Miettinen, Markus :
From big smartphone data to worldwide research: The Mobile Data Challenge.
In: Pervasive and Mobile Computing, 9 pp. 752-771.
[Article] , (2013)

Nagy, Marcin ; Cristofaro, Emiliano De ; Dmitrienko, Alexandra ; Asokan, N. ; Sadeghi, Ahmad-Reza :
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
Annual Computer Security Applications Conference (ACSAC 2013)
[Conference or workshop item] , (2013)

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
A Security Framework for Analysis and Design of Software Attestation.
ACM Conference on Computer and Communications Security (CCS) ACM Press
[Conference or workshop item] , (2013)

Tews, Erik ; Weiner, M. ; Massar, M. ; Giese, D. ; Wieser, W. :
Security analysis of a widely deployed locking system.
In:
[Article] , (2013)

Stancill, Blaine ; Snow, Kevin ; Otterness, Nathan ; Monrose, Fabian ; Davi, Lucas ; Sadeghi, Ahmad-Reza :
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
16th Research in Attacks, Intrusions and Defenses (RAID) Symposium
[Conference or workshop item] , (2013)

Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael:
Personal Information Dashboard: Putting the Individual Back in Control.
Iso Press Amsterdam , pp. 139-164. ISBN 978-1-61499-294-3 (print) | 978-1-61499-295-0 (online)
[Book] , (2013)

Gay, Richard ; Mantel, Heiko ; Sudbrock, Henning :
An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels.
[Online-Edition: https://www.iit.cnr.it/qasa2013/]
2nd International Workshop on Quantitative Aspects in Security Assurance
[Conference or workshop item] , (2013)

Wachsmann, Christian :
Trusted and Privacy-Preserving Embedded Systems.
Technische Universität Darmstadt
[PhD thesis]

Barekatain, Behrang ; Khezrimotlagh, Dariush ; Aizaini Maarof, Mohd ; Ghaeini, Hamid Reza ; Salleh, Shaharuddin ; Ariza Quintana, Alfonso ; Akbari, Behzad ; Trivino Cabrera, Alicia :
MATIN: A random network coding based framework for high quality peer-to-peer live video streaming.
In: PloS one, 8 (8) e69844.
[Article] , (2013)

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza :
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
22nd USENIX Security Symposium (USENIX Security '13) USENIX
[Conference or workshop item] , (2013)

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. :
ConXsense – Context Sensing for Adaptive Usable Access Control.

[Report] , (2013)

Oren, Yossef ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
In: Lecture Notes on Computer Science (LNCS) , 8068 . Springer
[Conference or workshop item] , (2013)

Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza :
Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same.
BlackHat USA
[Conference or workshop item] , (2013)

Tews, Erik :
How to enable Live Cloning of Virtual Machines using the Xen Hypervisor.

[Report] , (2013)

Bodden, Eric ; Tanter, Éric ; Inostroza, Milton :
Joint Point Interfaces for Safe and Flexible Decoupling of Aspects.
In: Software Engineering Top Journals, Rank 5, ACM Transactions on Softw
[Article] , (2013)

Buchmann, Johannes (ed.), :
Internet Privacy: Options for adequate realization.
Springer Vieweg; 2013 edition ISBN 978-3642379123
[Book] , (2013)

Aderhold, Markus ; Gebhardt, Alexander ; Mantel, Heiko :
Choosing a Formalism for Secure Coding: FSM vs. LTL.

[Report] , (2013)

Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
Client-controlled Cryptography-as-a-Service in the Cloud.
11th International Conference on Applied Cryptography and Network Security (ACNS 2013)
[Conference or workshop item] , (2013)

Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo :
SPLlift – Statically Analyzing Software Product Lines in Minutes Instead of Years.
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013)
[Conference or workshop item] , (2013)

Simo-Fhom, Hervais :
Internet Privacy. Taking opportunities, assessing risks, building trust.
In: >Springer Vieweg; 2013
[Article] , (2013)

Werner, M. ; Kaiser, J. ; Hollick, Matthias ; Weingärtner, E. ; Wehrle, K. :
A Blueprint for Switching Between Secure Routing Protocols in Wireless Multihop Networks.
Proceedings of the 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM, D-SPAN Workshop)
[Conference or workshop item] , (2013)

Alkassar, Ammar ; Heuser, Stephan ; Stüble, Christian :
Vertrauenswürdige Smartphones: Technologien und Lösungen.
13. Deutscher IT-Sicherheitskongress
[Conference or workshop item] , (2013)

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)
[Conference or workshop item] , (2013)

Fleischhacker, N. ; Günther, F. ; Kiefer, F. ; Poettering, B. :
Pseudorandom Signatures.
In: >8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 7-10 May, Hangzhou, China
[Article] , (2013)

Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza :
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (Best Student Paper Award).
34th IEEE Symposium on Security and Privacy (Oakland 2013)
[Conference or workshop item] , (2013)

do Carmo, Rodrigo ; Hollick, Matthias :
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks.
In: Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
[Article] , (2013)

Kocabas, Unal ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza :
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
Conference on Digital Automation and Test Europe (DATE) Interactive Presentation
[Conference or workshop item] , (2013)

Sepehrdad, Pouyan ; Susil, Petr ; Vaudenay, Serge ; Vuagnoux, Martin :
Smashing WEP in a Passive Attack.
20th International Workshop on Fast Software Encryption (FSE)
[Conference or workshop item] , (2013)

Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza :
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: CODASPY '13 . ACM Press
[Conference or workshop item] , (2013)

Peter, Andreas ; Tews, Erik ; Katzenbeisser, Stefan :
Efficiently Outsourcing Multiparty Computation under Multiple Keys.
In: >IACR Cryptology ePrint Archive, Report 2013/013
[Article] , (2013)

Ahmed, Sarah ; Kaiser, Maximilian ; Kreutzer, Michael :
IT-Sicherheitstrends kleiner und mittelständischer Unternehmen.

[Report] , (2013)

Arzt, Steven ; Falzon, Kevin ; Follner, Andreas ; Rasthofer, Siegfried ; Bodden, Eric ; Stolz, Volker :
How useful are existing monitoring languages for securing Android apps?
In: 6. Arbeitstagung Programmiersprachen (ATPS 2013)
[Article] , (2013)

Baecher, Paul ; Brzuska, Christina ; Mittelbach, Arno :
Reset Indifferentiability and its Consequences.
In: Lecture Notes in Computer Science . Springer
[Conference or workshop item] , (2013)

Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso :
The Fiat-Shamir Transformation in a Quantum World.
In: arXiv:1306.0315, 2013
[Article] , (2013)

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max :
A Framework for Evaluating Trust of Service Providers in Cloud Marketplaces.
Proceedings of 28th ACM SAC 2013 ACM
[Conference or workshop item] , (2013)

Mittelbach, Arno :
Cryptophia’s Short Combiner for Collision-Resistant Hash Functions (best student paper).
In: Lecture Notes in Computer Science . Springer
[Conference or workshop item] , (2013)

Werthmann, Tim ; Hund, Ralf ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten :
PSiOS: Bring Your Own Privacy & Security to iOS Devices (Distinguished Paper Award).
8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)
[Conference or workshop item] , (2013)

2012

Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
BlackHat Abu Dhabi
[Conference or workshop item] , (2012)

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza :
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.

[Report] , (2012)

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza :
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.

[Report] , (2012)

do Carmo, R. ; Werner, M. ; Hollick, Matthias :
Signs of a Bad Neighborhood: A Lightweight Metric for Anomaly Detection in Mobile Ad Hoc Networks.
Proceedings of the 8th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (ACM Q2SWinet)
[Conference or workshop item] , (2012)

Gupta, Aditi ; Miettinen, Markus ; Asokan, N. ; Nagy, Marcin :
Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling.
2012 International Conference on Privacy, Security, Risk and Trust (PASSAT), and 2012 International Confernece on Social Computing (SocialCom) IEEE
[Conference or workshop item] , (2012)

Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
Prouff, Emmanuel ; Schaumont, Patrick (eds.) :

On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
In: LNCS (7428). Springer
[Conference or workshop item] , (2012)

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Rožic, Vladimir ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian :
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
In: Lecture Notes in Computer Science (LNCS) , 7428 . Springer
[Conference or workshop item] , (2012)

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012)
[Conference or workshop item] , (2012)

Octeau, Damien ; McDaniel, Patrick ; Jha, Somesh ; Bartel, Alexandre ; Bodden, Eric ; Klein, J. ; Le Traon, Yves :
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
In: USENIX Security Symposium 2013.
[Article] , (2012)

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay :
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version).

[Report] , (2012)

Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Tamrakar, Sandeep ; Wachsmann, Christian :
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
In: Lecture Notes in Computer Science (LNCS) , 7344 . Springer
[Conference or workshop item] , (2012)

Sadeghi, Ahmad-Reza ; Kocabaş, Ünal ; Katzenbeisser, Stefan :
Converse PUF-Based Authentication.
International Conference on Trust & Trustworthy Computing (TRUST) Springer
[Conference or workshop item] , (2012)

Seudié, Hervé ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza :
EDA for Secure and Dependable Cybercars: Challenges and Opportunities.
ACM/IEEE Design Automation Conference (DAC)
[Conference or workshop item] , (2012)

Djatmiko, Mentari ; Boreli, Roksana ; Seneviratne, Aruna ; Ries, Sebastian :
Resources-aware trusted node selection for content distribution in mobile ad hoc networks.
In: Wireless Networks, Springer US, 18 pp. 1-14.
[Article] , (2012)

Jiang, Xuxian ; Grace, Michael ; Sadeghi, Ahmad-Reza ; Zhou, Wu :
Unsafe Exposure Analysis of Mobile In-App Advertisements.
to appear at WiSec ACM
[Conference or workshop item] , (2012)

Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Zhdanova, Maria ; Xu, Wenyuan ; Mustafa, Hossen ; Varadharajan, Vijay :
Tetherway: A Framework for Tethering Camouflage.
Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) ACM Press
[Conference or workshop item] , (2012)

Wachsmann, Christian ; Sadeghi, Ahmad-Reza ; Schulz, Steffen :
Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions.
In: Secure Smart Embedded Devices, Platforms and Applications. Springer , pp. 429-449.
[Book section] , (2012)

Alkassar, Ammar ; Schulz, Steffen ; Stüble, Christian :
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), 2012 (3) pp. 175-179.
[Article] , (2012)

Bessani, Alysson ; Abbadi, Imad M. ; Bugiel, Sven ; Cesena, Emanuele ; Deng, Mina ; Gröne, Michael ; Marnau, Ninja ; Nürnberger, Stefan ; Pasin, Marcelo ; Schirmer, Norbert:
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
Cambridge Scholars Publishing , pp. 160-186.
[Book] , (2012)

Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid :
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
Conference on Digital Automation and Test Europe (DATE)
[Conference or workshop item] , (2012)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava :
Towards Taming Privilege-Escalation Attacks on Android.
19th Annual Network & Distributed System Security Symposium (NDSS)
[Conference or workshop item] , (2012)

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
19th Annual Network & Distributed System Security Symposium (NDSS)
[Conference or workshop item] , (2012)

Schulz, Steffen ; Brasser, Ferdinand ; Filyanov, Atanas :
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution.
In: LNCS . Springer
[Conference or workshop item] , (2012)

Van Herrewege, Anthony ; Katzenbeisser, Stefan ; Maes, Roel ; Peeters, Roel ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian :
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
In: Lecture Notes in Computer Science (LNCS) , 7397 . Springer
[Conference or workshop item] , (2012)

Bodden, Eric ; Thies, Andreas :
RefaFlex: Safer Refactorings for Reflective Java Programs.
International Symposium on Software Testing and Analysis (ISSTA 2012)
[Conference or workshop item] , (2012)

Gupta, Aditi ; Miettinen, Markus ; Nagy, Marcin ; Asokan, Nadarajah ; Wetzel, Alexandre :
PeerSense: Who is near you?
Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)
[Conference or workshop item] , (2012)

Laurila, Juha ; Gatica-Perez, Daniel ; Aad, Imad ; Blom, Jan ; Bornet, Olivier ; Do, Trinh-Minh-Tri ; Dousse, Olivier ; Eberle, Julien ; Miettinen, Markus :
The Mobile Data Challenge: Big Data for Mobile Computing Research.
Proceedings of the Workshop on the Nokia Mobile Data Challenge, in Conjunction with the 10th International Conference on Pervasive Computing
[Conference or workshop item] , (2012)

Mittelbach, Arno :
Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output.
In: Lecture Notes in Computer Science . Springer
[Conference or workshop item] , (2012)

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay
Foresti, Sara ; Yung, Moti (eds.) :

The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: LNCS . Springer Verlag
[Conference or workshop item] , (2012)

Schreiner, Steffen ; Grigoras, Costin ; Litmaath, Maarten ; Betev, Latchezar ; Buchmann, Johannes :
Certified Grid Job Submission in the ALICE Grid Services.
In: Open Access Journal of Physics: Conference Series (JPCS), International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2012
[Article] , (2012)

2011

Boneh, Dan ; Dagdelen, Özgür ; Fischlin, Marc ; Lehmann, Anja ; Schaffner, Christian ; Zhandry, Mark :
Random Oracles in a Quantum World.
17th International Conference on Theory and Application of Cryptology and Information Security
[Conference or workshop item] , (2011)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava :
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
18th ACM Conference on Computer and Communications Security (CCS'11) ACM
[Conference or workshop item] , (2011)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava :
Practical and Lightweight Domain Isolation on Android.
Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM) ACM Press
[Conference or workshop item] , (2011)

Bugiel, Sven ; Davi, Lucas ; Schulz, Steffen
Sadeghi, Ahmad-Reza ; Zhang, Xinwen (eds.) :

Scalable Trust Establishment with Software Reputation.
Workshop on Scalable Trusted Computing (STC) ACM Press
[Conference or workshop item] , (2011)

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
POSTER: Control-Flow Integrity for Smartphones.
18th ACM Conference on Computer and Communications Security (CCS'11) ACM
[Conference or workshop item] , (2011)

Davi, Lucas ; Dmitrienko, Alexandra ; Kowalski, Christoph ; Winandy, Marcel :
Trusted Virtual Domains on OKL4: Secure Information Sharing on Smartphones.
Proceedings of the 6th ACM Workshop on Scalable Trusted Computing (STC) ACM Press
[Conference or workshop item] , (2011)

Kocabaş, Ünal ; Schulz, Steffen :
POSTER: Practical Embedded Remote Attestation Using Physically Unclonable Functions.
ACM Conference on Computer and Communications Security (CCS) ACM Press
[Conference or workshop item] , (2011)

Schneider, Michael ; Göttert, Norman
Preneel, Bart ; Takagi, Tsuyoshi (eds.) :

Random Sampling for Short Lattice Vectors on Graphics Cards.
In: LNCS (6917). Springer
[Conference or workshop item] , (2011)

Shen, Yiyun ; Miettinen, Markus ; Moen, Pirjo ; Kutvonen, Lea :
Privacy Preservation Approach in Service Ecosystems.
15th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW) IEEE
[Conference or workshop item] , (2011)

Shirazi, Fatemeh ; Neumann, Stephan ; Ciolacu, Ines ; Volkamer, Melanie :
Robust Electronic Voting: Introducing robustness in Civitas.
International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011
[Conference or workshop item] , (2011)

Filyanov, Atanas ; McCune, Jonathan ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2011)
[Conference or workshop item] , (2011)

Ries, Sebastian ; Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max :
CertainLogic: A Logic for Modeling Trust and Uncertainty (Short Paper).
In Proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST 2011) Springer Berlin Heidelberg
[Conference or workshop item] , (2011)

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
Lightweight Remote Attestation Using Physical Functions.
ACM Conference on Wireless Network Security (WiSec) ACM Press
[Conference or workshop item] , (2011)

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
Lightweight Remote Attestation using Physical Functions (Extended Version).

[Report] , (2011)

Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
Location Privacy in RFID Systemen.
In: Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (2) pp. 70-75.
[Article] , (2011)

Wahid, Khan :
An ID-based mutually authenticated edge-to-edge security architecture for bridged provider networks to secure layer-2 communications.
Universitat Pompeu Fabra
[PhD thesis]

Armknecht, Frederik ; Maes, Roel ; Sadeghi, Ahmad-Reza ; Standaert, François-Xavier ; Wachsmann, Christian :
A Formal Foundation for the Security Features of Physical Functions.
IEEE Symposium on Security and Privacy (SSP) IEEE Computer Society
[Conference or workshop item] , (2011)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza :
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.

[Report] , (2011)

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Ries, Sebastian ; Mühlhäuser, Max :
CertainLogic: A Logic for Modeling Trust and Uncertainty (Full version).

[Report] , (2011)

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011)
[Conference or workshop item] , (2011)

Li, Shujun ; Sadeghi, Ahmad-Reza ; Heisrath, Soeren ; Schmitz, Roland ; Ahmad, Junaid Jameel :
hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers.
15th International Conference on Financial Cryptography and Data Security (FC)
[Conference or workshop item] , (2011)

Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
A Security Architecture for Accessing Health Records on Mobile Phones.
HEALTHINF'2011: Proceedings of the 4th International Conference on Health Informatics
[Conference or workshop item] , (2011)

Kneževic, M. ; Kobayashi, K. ; Ikegami, J. ; Matsuo, S. ; Satoh, A. ; Kocabas, U. ; Fan, J. ; Katashita, T. ; Sugawara, T. ; Sakiyama, K. ; Verbauwhede, I. ; Ohta, K. ; Homma, N. ; Aoki, T. :
Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates.
In: IEEE Transactions on VLSI journal
[Article] , (2011)

Nürnberger, Stefan ; Steinebach, Martin ; Zmudzinski, Sascha :
Re-synchronizing audio watermarking after nonlinear time stretching.
Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII
[Conference or workshop item] , (2011)

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED). Leuven, Belgium
[Book section] , (2011)

Dmitrienko, Alexandra ; Gessner, Dennis ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Stüble, Christian ; Ullmann, Markus :
Trusted embedded System Operating System (TeSOS) - Study and Design.

[Other] , (2011) ((Noch) nicht publiziert)

Dmitrienko, Alexandra ; Hadzic, Zecir ; Lhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Securing the Access to Electronic Health Records on Mobile Phones.
Biomedical Engineering Systems and Technologies
[Conference or workshop item] , (2011)

Gupta, Aditi ; Miettinen, Markus ; Asokan, N. :
Using context-profiling to aid in access control decisions on mobile devices.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)
[Conference or workshop item] , (2011)

Katzenbeisser, Stefan ; Kocabaş, Ünal ; van der Leest, Vincent ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Schröder, Heike ; Wachsmann, Christian :
Recyclable PUFs: Logically Reconfigurable PUFs.
In: Lecture Notes in Computer Science (LNCS) , 6917 . Springer
[Conference or workshop item] , (2011)

Katzenbeisser, Stefan ; Kocabaş, Ünal ; van der Leest, Vincent ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Wachsmann, Christian :
Recyclable PUFs: logically reconfigurable PUFs.
In: Journal of Cryptographic Engineering, 1 (3) pp. 177-186.
[Article] , (2011)

2010

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Scafuro, Alessandra ; Visconti, Ivan ; Wachsmann, Christian :
Impossibility Results for RFID Privacy Notions.
In: LNCS , 6480 . Springer
[Conference or workshop item] , (2010)

Bugiel, Sven ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
TruWalletM: Secure Web Authentication on Mobile Platforms.
Proceedings of INTRUST 2010 The Second International Conference on Trusted Systems
[Conference or workshop item] , (2010)

Sadeghi, Ahmad-Reza ; Li, Shujun ; Shah, Syed Amier Haider ; Khan, Muhammad Asad Usman ; Khayam, Syed Ali ; Schmitz, Roland :
Breaking e-Banking CAPTCHAs.
26th Annual Computer Security Applications Conference (ACSAC 2010)
[Conference or workshop item] , (2010)

Sadeghi, Ahmad-Reza ; Preneel, Bart ; Pfitzmann, Andreas ; Moran, Tal ; Maier-Rabler, Ursula ; Kutylowski, Miroslaw ; Klonowski, Marek ; Guerses, Seda ; Danezis, George ; Borisov, Nikita ; Baer, Walter :
Machiavelli Confronts 21st Century Digital Technology: Democracy in a Network Society.

[Conference or workshop item] , (2010)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Securing the E-Health Cloud.
1st ACM International Health Informatics Symposium (IHI 2010)
[Conference or workshop item] , (2010)

Sadeghi, Ahmad-Reza ; Naccache, David :
Towards Hardware-Intrinsic Security.
In: Information Security and Cryptography .
[Conference or workshop item] , (2010)

Bugiel, Sven ; Ekberg, Jan-Erik :
Implementing an Application-Specific Credential Platform Using Late-Launched Mobile Trusted Module.
5th Annual Workshop on Scalable Trusted Computing (STC 2010)
[Conference or workshop item] , (2010)

Checkoway, Stephen ; Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Shacham, Hovav ; Winandy, Marcel :
Return-Oriented Programming without Returns.
In: CCS '10 . ACM
[Conference or workshop item] , (2010)

Chen, Liqun ; Dietrich, Kurt ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Winter, Johannes :
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
In: LNCS , 6531 . Springer
[Conference or workshop item] , (2010)

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Privilege Escalation Attacks on Android.
ISC 2010: Proceedings of the 13th Information Security Conference
[Conference or workshop item] , (2010)

Henecka, Wilko ; Kögl, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo :
TASTY: Tool for Automating Secure Two-partY computations.
17. ACM Conference on Computer and Communications Security (CCS'10) ACM
[Conference or workshop item] , (2010)

Löhr, Hans ; Pöppelmann, Thomas ; Rave, Johannes ; Steegmanns, Martin ; Winandy, Marcel :
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments.
5th Annual Workshop on Scalable Trusted Computing (STC 2010)
[Conference or workshop item] , (2010)

Sadeghi, Ahmad-Reza ; Mukherjee, Biswanath ; Ghosal, Dipak ; Liu, Yali :
Video Streaming Forensic - Content Identification with Traffic Snooping.
13th Information Security Conference (ISC 2010)
[Conference or workshop item] , (2010)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
Enhancing RFID Security and Privacy by Physically Unclonable Functions.
In: Towards Hardware-Intrinsic Security: Foundations and Practice. Information Security and Cryptography. Springer , pp. 281-307.
[Book section] , (2010)

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
12. International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10) Springer
[Conference or workshop item] , (2010)

Nürnberger, Stefan ; Feller, Thomas ; Huss, Sorin :
RAY - A Secure Microkernel Architecture.
IEEE Privacy Security and Trust 2010 (PST2010)
[Conference or workshop item] , (2010)

Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
Trusted Computing.
Handbook of Financial Cryptography and Security CRC Press
[Conference or workshop item] , (2010)

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Return-Oriented Programming without Returns on ARM.

[Report] , (2010)

Armknecht, Frederik ; Chen, Liqun ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
Anonymous Authentication for RFID Systems.
In: LNCS , 6370 . Springer
[Conference or workshop item] , (2010)

Armknecht, Frederik ; Ghosal, Dipak ; Katzenbeisser, Stefan ; Liu, Yali ; Sadeghi, Ahmad-Reza ; Schulz, Steffen :
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Information Hiding Conference (IH) Springer
[Conference or workshop item] , (2010)

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
On RFID Privacy with Mutual Authentication and Tag Corruption.
In: LNCS , 6123 . Springer
[Conference or workshop item] , (2010)

Kostiainen, Kari ; Dmitrienko, Alexandra ; Ekberg, Jan-Erik ; Sadeghi, Ahmad-Reza ; Asokan, N. :
Key Attestation from Trusted Execution Environments.
TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing
[Conference or workshop item] , (2010)

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Cesena, Emanuele ; Ramunno, Gianluca ; Vernizzi, Davide :
Anonymous Authentication with TLS and DAA.
TRUST2010
[Conference or workshop item] , (2010)

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Winandy, Marcel :
Token-Based Cloud Computing - Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
3. International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud Springer
[Conference or workshop item] , (2010)

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5 pp. 289-298.
[Article] , (2010)

Sadeghi, Ahmad-Reza ; Li, Shujun ; Khayam, Syed Ali ; Schmitz, Roland :
Breaking a Virtual Password System Based on Randomized Linear Generation Functions.
IEEE ICC 2010 - Communication and Information System Security Symposium ('ICC'10 CISS')
[Conference or workshop item] , (2010)

Wahid, Khan :
Maximizing Ethernet Security by Switch-based Single Secure Domain.
7th International Conference on Information Technology: New Generations (ITNG 2010), Las Vegas, USA, April 2010. Page(s): 774 - 778, DOI: 10.1109/ITNG.2010.143, IEEE Xplore Digital Library
[Conference or workshop item] , (2010)

Wahid, Khan :
Rethinking The Link Security Approach to Manage Large Scale Ethernet Network.
17th IEEE Workshop on Local and Metropolitan Area Networks (LANMAN 2010), New Jersey, USA, May 2010. Page(s): 1 - 6, DOI: 10.1109/LANMAN.2010.5507143, IEEE Xplore Digital Library
[Conference or workshop item] , (2010)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
PUF-Enhanced RFID Security and Privacy.
Workshop on Secure Component and System Identification (SECSI)
[Conference or workshop item] , (2010)

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.

[Report] , (2010)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Patterns for Secure Boot and Secure Storage in Computer Systems.
4th International Workshop on Secure systems methodologies using patterns (SPattern 2010),
[Conference or workshop item] , (2010)

:
Implementation of Binary Edwards Curves for very-constrained Devices.
In: IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP)
[Article] , (2010)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Cabuk, Serdar ; Dalton, Chris ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramasamy, Hari Govind ; Ramunnok, Gianluca ; Schunter, Matthias :
Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers.
In: Journal of Computer Security, 18 (1) pp. 89-121.
[Article] , (2010)

Schulz, Steffen ; Sadeghi, Ahmad-Reza :
Extending IPsec for Efficient Remote Attestation.
Financial Cryptography and Data Security (FC) Springer
[Conference or workshop item] , (2010)

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens.
In: Towards Hardware Intrinsic Security: Foundation and Practice. Information Security and Cryptography. Springer-Verlag Berlin Heidelberg , pp. 367-386.
[Book section] , (2010)

Kobayashi, K. ; Ikegami, J. ; Kneževic, M. ; Guo, X. ; Matsuo, S. ; Huang, S. ; Nazhandali, L. ; Kocabas, U. ; Fan, J. ; Satoh, A. ; Verbauwhede, I. ; Sakiyama, K. ; Ohta, K. :
Prototyping Platform for Performance Evaluation of SHA-3 Candidates.
IEEE International Workshop on Hardware-Oriented Security and Trust - HOST 2010, pp. 60-63
[Conference or workshop item] , (2010)

Miettinen, Markus ; Asokan, N. :
Towards security policy decisions based on context profiling.
In: AISec '10 . ACM
[Conference or workshop item] , (2010)

2009

Catuogno, Luigi ; Dmitrienko, Alexandra ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramunno, Gianluca ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Schunter, Matthias ; Winandy, Marcel ; Zhan, Jing :
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
International Conference on Trusted Systems (INTRUST) Springer
[Conference or workshop item] , (2009)

Kokkinen, Heikki ; Heikkinen, Mikko ; Miettinen, Markus :
Post-Payment Copyright System versus Online Music Shop: Business Model and Privacy.
In: International Journal on Advances in Security, 2 (2-3) pp. 112-128.
[Article] , (2009)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Maes, Roel ; Sunar, Berk ; Tuyls, Pim :
Memory Leakage-Resilient Encryption based on Physically Unclonable Functions.
ASIACRYPT'09
[Conference or workshop item] , (2009)

Sadeghi, Ahmad-Reza ; Li, Shujun ; Asghar, Hassan Jameel ; Pieprzyk, Josef ; Schmitz, Roland ; Wang, Huaxiong :
On the Security of PAS (Predicate-based Authentication Service).
Annual Computer Security Applications Conference (ACSAC’09), 2009.
[Conference or workshop item] , (2009)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
Anonymizer-Enabled Security and Privacy for RFID.
In: LNCS , 5888 . Springer
[Conference or workshop item] , (2009)

Thiemert, Stefan ; Nürnberger, Stefan ; Steinebach, Martin ; Zmudzinski, Sascha :
Security of robust audio hashes.
IEEE International Workshop on Information Forensics and Security, WIFS 2009, London, UK
[Conference or workshop item] , (2009)

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Transparent Mobile Storage Protection in Trusted Virtual Domains.
23rd Large Installation System Administration Conference (LISA '09)
[Conference or workshop item] , (2009)

Ekberg, Jan-Erik ; Bugiel, Sven :
Trust in a Small Package: Minimized MRTM Software Implementation for Mobile Secure Environments.
4th Annual Workshop on Scalable Trusted Computing (STC2009)
[Conference or workshop item] , (2009)

Gajek, Sebastian ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
4th ACM Workshop on Scalable Trusted Computing
[Conference or workshop item] , (2009)

Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics.
In: Section Days of Ruhr-University Bochum Research School
[Other] , (2009)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Zhan, Jing ; Korthaus, René :
A Practical Property-based Bootstrap Architecture.
ACMSTC'09
[Conference or workshop item] , (2009)

Sadeghi, Ahmad-Reza ; Vishik, Claire ; Verbauwhede, Ingrid :
Future of Assurance: Ensuring that a System is Trustworthy.
ISSE'09
[Conference or workshop item] , (2009)

Bangerter, Endre ; Briner, Thomas ; Henecka, Wilko ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Automatic Generation of Sigma-Protocols.
6. European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09) Springer
[Conference or workshop item] , (2009)

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
In: STC '09 . ACM
[Conference or workshop item] , (2009)

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan :
Hide and Seek in Time - Robust Covert Timing Channels.
In: LNCS (5789). Springer
[Conference or workshop item] , (2009)

Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
A Pattern for Secure Graphical User Interface Systems.
3rd International Workshop on Secure systems methodologies using patterns (SPattern'09), Proceedings of the 20th International Workshop on Database and Expert Systems Applications IEEE
[Conference or workshop item] , (2009)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
Location Privacy in RFID Applications.
In: LNCS , 5599 . Springer
[Conference or workshop item] , (2009)

Sadeghi, Ahmad-Reza ; Kursawe, Klaus ; Schellekens, Dries ; Skoric, Boris ; Tuyls, Pim :
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage.
2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)
[Conference or workshop item] , (2009)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
Enhancing RFID Security and Privacy by Physically Unclonable Functions (Extended Abstract).
In: Dagstuhl Seminar Proceedings (09282). Schloss Dagstuhl
[Conference or workshop item] , (2009)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
Efficient RFID Security and Privacy with Anonymizers.
Workshop on RFID Security (RFIDSec)
[Conference or workshop item] , (2009)

Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Einsatz von Sicherheitskernen und Trusted Computing.
D-A-CH Security
[Conference or workshop item] , (2009)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Weber, Marion ; Winandy, Marcel :
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
In: LNCS , 5471 . Springer
[Conference or workshop item] , (2009)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Vishik, Claire ; Winandy, Marcel :
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
In: LNCS , 5451 . Springer
[Conference or workshop item] , (2009)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Tuyls, Pim ; Maes, Roel ; Sunar, Berk :
Physically Unclonable Pseudorandom Functions.
Poster session of Advances in Cryptology - EUROCRYPT
[Conference or workshop item] , (2009)

Sadeghi, Ahmad-Reza ; Schulz, Steffen :
Secure VPNs for Trusted Computing Environments.
International Conference on Trusted Computing (TRUST) Springer
[Conference or workshop item] , (2009)

Lee, Y. K. ; Batina, L. ; Fan, J. ; Karaklajic, D. ; Kneževic, M. ; Kocabas, U. ; Rožic, V. ; Verbauwhede, I. :
Tiny Public-Key Security Processor.
In: ISSCC09 Student Forum
[Article] , (2009)

Sadeghi, Ahmad-Reza ; Bangerter, Endre ; Barbosa, Manuel ; Bernstein, Daniel ; Damgård, Ivan ; Page, Dan ; Pagter, Jakob ; Sovio, Sampo :
Using Compilers to Enhance Cryptographic Product Development.
Information Security Solutions Europe (ISSE)
[Conference or workshop item] , (2009)

Halonen, Perttu ; Miettinen, Markus ; Hätönen, Kimmo
Iliadis, L. ; Vlahavas, I. ; Bramer, M. (eds.) :

Computer Log Anomaly Detection Using Frequent Episodes.
In: Artificial Intelligence Applications and Innovations III. IFIP International Federation for Information Processing, 296. Springer US , pp. 417-422. ISBN 978-1-4419-0220-7
[Book section] , (2009)

2008

Rupp, Andy ; Leander, Gregor ; Bangerter, Endre ; Dent, Alexander ; Sadeghi, Ahmad-Reza :
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
Advances in Cryptology - ASIACRYPT 2008
[Conference or workshop item] , (2008)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark ; Pereira, Olivier :
Universally Composable Security Analysis of TLS.
Second Conference on Provable Security (ProvSec)
[Conference or workshop item] , (2008)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Gasmi, Yacine ; Ramunno, Gianluca ; Vernizzi, Davide ; Stewin, Patrick ; Unger, Martin :
An Efficient Implementation of Trusted Channels Based on OpenSSL.
ACMSTC 2008
[Conference or workshop item] , (2008)

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan :
Improved Security Notions and Protocols for Non-Transferable Identification.
13th European Symposium on Research in Computer Security (ESORICS)
[Conference or workshop item] , (2008)

Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
User Privacy in Transport Systems Based on RFID E-Tickets.
International Workshop on Privacy in Location-Based Applications (PiLBA)
[Conference or workshop item] , (2008)

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Husseiki, Rani ; Gasmi, Yacine ; Stewin, Patrick ; Unger, Martin :
Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains.
3rd ACM Workshop on Scalable Trusted Computing
[Conference or workshop item] , (2008)

Armknecht, Frederik ; Furukawa, Jun ; Kurosawa, Kaoru :
A Universally Composable roup Key Exchange Protocol with Minimum Communication Effort.
Sixth Conference on Security and Cryptography for Networks (SCN 2008)
[Conference or workshop item] , (2008)

Gasmi, Yacine ; Hessmann, Christian ; Pittenauer, Martin ; Winandy, Marcel :
Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis.
In: LNI , 1 (133).
[Conference or workshop item] , (2008)

Sadeghi, Ahmad-Reza ; Bangerter, Endre ; Djackov, Maksim :
A Demonstrative Ad-hoc Attestation System.
Information Security Conference 2008 (ISC'08)
[Conference or workshop item] , (2008)

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark :
Property-Based Attestation without a Trusted Third Party.
Information Security Conference (ISC'08)
[Conference or workshop item] , (2008)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Property-Based TPM Virtualization.
In: LNCS (5222).
[Conference or workshop item] , (2008)

Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Gröbert, Felix ; Birk, Dominik :
A Forensic Framework for Tracing Phishers.
In: LNCS (6102). Springer
[Conference or workshop item] , (2008)

Sadeghi, Ahmad-Reza ; Shokrollahi, Jamshid ; Bösch, Christoph ; Guajardo, Jorge ; Tuyls, Pim :
Efficient Helper Data Key Extractor on FPGAs.
Workshop on Cryptographic Hardware and Embedded Systems 2008 (CHES 2008)
[Conference or workshop item] , (2008)

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan :
Resettable and Non-Transferable Chip Authentication for E-Passports.
RFIDSec 2008
[Conference or workshop item] , (2008)

Armknecht, Frederik ; Mirzadeh, Shahab ; Tafazolli, Rahim ; Pallares, Jordi Jaen ; Afifi, Hossam :
CPFP: An efficient key management scheme for large scale personal networks.
IEEE ISWPC 2008
[Conference or workshop item] , (2008)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Löhr, Hans ; Manulis, Mark ; Escalante, Alberto :
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
4th Information Security Practice and Experience Conference (ISPEC 2008)
[Conference or workshop item] , (2008)

Sadeghi, Ahmad-Reza ; Stüble, André ; Wolf, Marko ; Asokan, N. :
Securing Peer-to-Peer Distributions for Mobile Devices.
In: 4th Information Security Practice and Experience Conference (ISPEC 2008).
[Conference or workshop item] , (2008)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Osterhues, André ; Wolf, Marko ; Asokan, Nadarajah :
Securing Peer-to-Peer Distributions for Mobile Devices.
4th Information Security Practice and Experience Conference (ISPEC 2008)
[Conference or workshop item] , (2008)

Armknecht, Frederik ; Westhoff, Dirk ; Girao, Joao ; Hessler, Alban :
A life-time optimized end-to-end encryption scheme for sensor networks allowing in-networking processing.
In: Computer Communications Journal, 31 (4) pp. 734-749.
[Article] , (2008)

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan :
Identification Protocols Revisited - Episode I: E-Passports.
In: e-crypt workshop on Secure Component and System Identification (SECSI).
[Conference or workshop item] , (2008)

Sadeghi, Ahmad-Reza ; Blundo, Carlo ; Persiano, Giuseppe ; Visconti, Ivan :
Identification Protocols Revisited - Episode I: E-Passports.
e-crypt workshop on Secure Component and System Identification (SECSI)
[Conference or workshop item] , (2008)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark :
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: ACM Symposium on Information, Computer and Communications Security (ASIACCS'08).
[Conference or workshop item] , (2008)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark :
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
ACM Symposium on Information, Computer and Communications Security (ASIACCS'08)
[Conference or workshop item] , (2008)

Sadeghi, Ahmad-Reza :
Trusted Computing—State of the Art and Challenges.
In: LNCS (4910). Springer
[Conference or workshop item] , (2008)

Seitz, Katja :
Sicheres Padding für RSA.
Johann W. Goethe University Frankfurt
[Master thesis] , (2008)

2007

Asokan, N. ; Gasmi, Yacine ; Sadeghi, Ahmad-Reza ; Stewin, Patrick ; Unger, Martin :
Beyond Secure Channels.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007). ACM Press
[Conference or workshop item] , (2007)

Eisenbarth, Thomas ; Güneysu, Tim ; Paar, Christof ; Sadeghi, Ahmad-Reza ; Schellekens, Dries ; Wolf, Marko :
Reconfigurable Trusted Computing in Hardware.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007). ACM Press
[Conference or workshop item] , (2007)

Paar, Christof ; Sadeghi, Ahmad-Reza ; Güneysu, Tim ; Eisenbarth, Thomas ; Schellekens, Dries ; Wolf, Marko :
Reconfigurable Trusted Computing in Hardware.
ACM Workshop on Scalable Trusted Computing (ACMSTC 2007) ACM Press
[Conference or workshop item] , (2007)

Sadeghi, Ahmad-Reza ; Gasmi, Yacine ; Stewin, Patrick ; Unger, Martin ; Asokan, Nadarajah :
Beyond Secure Channels.
ACM Workshop on Scalable Trusted Computing (ACMSTC 2007) ACM Press
[Conference or workshop item] , (2007)

Sadeghi, Ahmad-Reza ; Wolf, Christopher ; Stüble, Christian ; Asokan, N. ; Ekberg, Jan-Erik :
Enabling Fairer Digital Rights Management with Trusted Computing.
In: LNCS , 4779 . Springer Verlag
[Conference or workshop item] , (2007)

Battestini, Agathe ; Rossow, Christian ; Flanagan, Adrian ; Miettinen, Markus :
Creating Next Generation Applications and Services for Mobile Devices: Challenges and Opportunities.
Proc. IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2007)
[Conference or workshop item] , (2007)

Celik, Mehmet ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza ; Skoric, Boris :
Combining Tardos Fingerprinting Codes and Fingercasting.
In: 9th International Workshop on Information Hiding (IH 2007). In: LNCS , 4567 . Springer Verlag
[Conference or workshop item] , (2007)

Sadeghi, Ahmad-Reza ; Katzenbeisser, Stefan ; Skoric, Boris ; Celik, Mehmet :
Combining Tardos Fingerprinting Codes and Fingercasting.
In: LNCS , 4567 . Springer Verlag
[Conference or workshop item] , (2007)

Adelsbach, Andre ; Huber, Ulrich ; Sadeghi, Ahmad-Reza :
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
In: Transactions on Data Hiding and Multimedia Security II. In: LNCS , 4499 . Springer Verlag
[Conference or workshop item] , (2007)

Birk, Dominik ; Gajek, Sebastian ; Gröbert, Felix ; Sadeghi, Ahmad-Reza :
Phishing Phishers - Observing and Tracing Organized Cybercrime.
In: Second International Conference on Internet Monitoring and Protection (ICIMP 2007). IEEE Computer Society
[Conference or workshop item] , (2007)

Dmitrienko, Alexandra :
Zigbee-to-tcp/ip gateway: New opportunities for ZigBee-based sensor networks.
6th International Workshop on Ambient Intelligence and Embedded Systems
[Conference or workshop item] , (2007)

Gajek, Sebastian ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg :
Browser-based Authentication Protocols for Naive Users.
In: Western European Workshop on Research in Cryptology (WEWoRC 2007).
[Conference or workshop item] , (2007)

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Compartmented Security for Browsers.

[Report] , (2007)

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing.
Second International Conference on Availability, Reliability and Security (ARES 2007)
[Conference or workshop item] , (2007)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich :
Fingercasting—Joint Fingerprinting and Decryption of Broadcast Messages.
In: LNCS , 4499 . Springer Verlag
[Conference or workshop item] , (2007)

Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Gröbert, Felix ; Birk, Dominik :
Phishing Phishers - Observing and Tracing Organized Cybercrime.
Second International Conference on Internet Monitoring and Protection (ICIMP 2007) IEEE Computer Society
[Conference or workshop item] , (2007)

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark ; Escalante, Alberto :
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
In: LNCS , 4886 . Springer Verlag
[Conference or workshop item] , (2007)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Löhr, Hans ; Ramasamy, Hari Govind ; Schulz, Stefan ; Schunter, Matthias :
Enhancing Grid Security Using Trusted Virtualization.
In: LNCS , 4610 . Springer Verlag
[Conference or workshop item] , (2007)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark :
Browser Models for Usable Authentication Protocols.
IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07)
[Conference or workshop item] , (2007)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark :
Browser-based Authentication Protocols for Naive Users.
Western European Workshop on Research in Cryptology (WEWoRC 2007)
[Conference or workshop item] , (2007)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Winandy, Marcel :
Trusted User-Aware Web Authentication.
Workshop on Trustworthy User Interfaces for Passwords and Personal Information (TIPPI'07),
[Conference or workshop item] , (2007)

2006

Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian ; Wachsmann, Christian ; Winandy, Marcel :
TCG Inside? - A Note on TPM Specification Compliance.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC). ACM Press
[Conference or workshop item] , (2006)

Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Selhorst, Marcel ; Stüble, Christian ; Winandy, Marcel :
TCG Inside? - A Note on TPM Specification Compliance.
ACM Workshop on Scalable Trusted Computing (ACMSTC) ACM Press
[Conference or workshop item] , (2006)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich :
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
In: LNCS , 4058 . Springer Verlag
[Conference or workshop item] , (2006)

Wahid, Khan :
Bluetooth based Login for Windows Servers.
KTH Royal Institute of Technology
[Master thesis] , (2006)

Miettinen, Markus ; Halonen, Perttu ; Hätönen, Kimmo :
Host-based intrusion detection for advanced mobile devices.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006) IEEE Computer Society
[Conference or workshop item] , (2006)

Sadeghi, Ahmad-Reza ; Manulis, Mark :
Property-based Taming Lying Mobile Node.
International Workshop on Trusted and Autonomic Computing Systems (TACS 2006)
[Conference or workshop item] , (2006)

Sadeghi, Ahmad-Reza ; Manulis, Mark :
Property-based Taming Lying Mobile Nodes.
International Workshop on Trusted and Autonomic Computing Systems (TACS 2006)
[Conference or workshop item] , (2006)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Manulis, Mark :
Linkable Democratic Group Signatures.
2nd Information Security Practice and Experience Conference (ISPEC 2006)
[Conference or workshop item] , (2006)

Adelsbach, Andre ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza :
A Computational Model for Watermark Robustness.
In: Information Hiding Workshop.
[Conference or workshop item] , (2006)

Adelsbach, Andre ; Rohe, Markus ; Sadeghi, Ahmad-Reza :
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
In: Transactions on Data Hiding and Multimedia Security.
[Conference or workshop item] , (2006)

Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Scheibel, Michael ; Stüble, Christian ; Winandy, Marcel :
Security Architecture for Device Encryption and VPN.
In: Information Security Solution Europe (ISSE06).
[Conference or workshop item] , (2006)

Carluccio, Dario ; Lemke-Rust, Kerstin ; Paar, Christof ; Sadeghi, Ahmad-Reza :
E-Passport: The Global Traceability or How to Feel Like an UPS Package.
In: Workshop on RFID Security 2006.
[Conference or workshop item] , (2006)

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
In: Workshop on Information and System Security (WISSEC'06).
[Conference or workshop item] , (2006)

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
Workshop on Information and System Security (WISSEC'06)
[Conference or workshop item] , (2006)

Huber, Ulrich ; Sadeghi, Ahmad-Reza :
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
In: 9th Information Security Conference (ISC 2006). In: LNCS , 4173 . Springer
[Conference or workshop item] , (2006)

Hätönen, Kimmo ; Klemettinen, Mika ; Miettinen, Markus
Boulicaut, Jean-François ; Raedt, Luc De ; Mannila, Heikki (eds.) :

Constraint-Based Mining and Inductive Databases.
[Online-Edition: https://link.springer.com/chapter/10.1007%2F11615576_10]
In: Constraint-Based Mining and Inductive Databases. LNCS, 3848. Springer , pp. 196-215. ISBN 978-3-540-31331-1
[Book section] , (2006)

Lemke, Kerstin ; Paar, Christof ; Sadeghi, Ahmad-Reza :
Physical Security Bounds Against Tampering.
In: International Conference on Applied Cryptography and Network Security (ACNS 2006).
[Conference or workshop item] , (2006)

Manulis, Mark ; Sadeghi, Ahmad-Reza :
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
In: Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing).
[Conference or workshop item] , (2006)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich :
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.

[Report] , (2006)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzebeisser, Stefan :
A Computational Model for Watermark Robustness.
Information Hiding Workshop
[Conference or workshop item] , (2006)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus :
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
Transactions on Data Hiding and Multimedia Security
[Conference or workshop item] , (2006)

Sadeghi, Ahmad-Reza ; Gajek, Sebastian :
Client Authentication in Federations Using a Security Mode.
Toward a More Secure Web - W3C Workshop on Usability and Transparency of Web Authentication.
[Conference or workshop item] , (2006)

Sadeghi, Ahmad-Reza ; Huber, Ulrich :
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.

[Report] , (2006)

Sadeghi, Ahmad-Reza ; Huber, Ulrich :
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
In: LNCS , 4173 . Springer
[Conference or workshop item] , (2006)

Sadeghi, Ahmad-Reza ; Manulis, Mark :
Key Agreement for Heterogeneous Ad-Hoc Groups.
International Journal of Wireless and Mobile Computing (IJWMC)
[Conference or workshop item] , (2006)

Sadeghi, Ahmad-Reza ; Manulis, Mark :
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing)
[Conference or workshop item] , (2006)

Sadeghi, Ahmad-Reza ; Paar, Christof ; Carluccio, Dario ; Lemke-Rust, Kerstin :
E-Passport: The Global Traceability or How to Feel Like an UPS Package.
Workshop on RFID Security 2006
[Conference or workshop item] , (2006)

Sadeghi, Ahmad-Reza ; Paar, Christof ; Lemke, Kerstin :
Physical Security Bounds Against Tampering.
International Conference on Applied Cryptography and Network Security (ACNS 2006)
[Conference or workshop item] , (2006)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Löhr, Hans ; Chen, Liquen ; Landfermann, Rainer ; Rohe, Markus :
A Protocol for Property-Based Attestation.
First ACM Workshop on Scalable Trusted Computing (STC'06)
[Conference or workshop item] , (2006)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Wolf, Marko ; Scheibel, Michael :
Play it once again, Sam - Enforcing Stateful Licenses on Open Platforms.
The Second Workshop on Advances in Trusted Computing (WATC '06 Fall)
[Conference or workshop item] , (2006)

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Alkassar, Ammar ; Scheibel, Michael :
Security Architecture for Device Encryption and VPN.
Information Security Solution Europe (ISSE06)
[Conference or workshop item] , (2006)

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Scheibel, Michael :
Design and Implementation of a Secure Linux Device Encryption Architecture.
LinuxTag
[Conference or workshop item] , (2006)

2005

Greveler, Ulrich ; Adelsbach, Andre ; Löschner, Sven :
Anonymous Data Broadcasting by Misuse of Satellite ISPs.
22C3 Chaos Computer Club (CCC) Congress
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich :
Property-Based Broadcast Encryption for Multi-level Security Policies.
In: 8th International Conference on Information Security and Cryptology (ICISC 2005). In: LNCS , 3935 . Springer Verlag
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich :
Property-Based Broadcast Encryption for Multi-level Security Policies.
In: LNCS , 3935 . Springer Verlag
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus :
Towards Multilateral Secure Digital Rights Distribution Infrastructures.
ACM DRM Workshop'05
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich :
Embedding Trust into Cars—Secure Software Delivery and Installation.
Third Workshop on Embedded Security in Cars (escar 2005)
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus :
Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme.
9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Multilaterally Secure Computing Platforms - in your office, car and at home.
In: 1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society.
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Multilaterally Secure Computing Platforms – in your office, car and at home.
1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Selhorst, Marcel ; Senft, Oska :
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9
[Article] , (2005)

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Selhorst, Marcel ; Senft, Oska :
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9
[Article] , (2005)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Kühn, Ulrich ; Kursawe, Klaus ; Lucks, Stefan :
Secure Data Management in Trusted Computing.
In: LNCS , 3659 . Springer Verlag
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Stüble, Ulrich ; Kursawe, Klaus ; Lucks, Stefan :
Secure Data Management in Trusted Computing.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES). In: LNCS , 3659 . Springer Verlag
[Conference or workshop item] , (2005)

Camenisch, Jan ; Rohe, Markus ; Sadeghi, Ahmad-Reza :
Sokrates - A Compiler Framework for Zero-Knowledge Protocols.
In: Western European Workshop on Research in Cryptology (WEWoRC 2005).
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Rohe, Markus ; Camenisch, Jan :
Sokrates - A Compiler Framework for Zero-Knowledge Protocols.
Western European Workshop on Research in Cryptology (WEWoRC 2005)
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Rupp, Andy ; Bangerter, Endre :
Simplified Hardness Proofs in the Generic Group Model.
Western European Workshop on Research in Cryptology (WEWoRC 2005)
[Conference or workshop item] , (2005)

Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian :
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
In: 9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI).
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Alkassar, Ammar ; Stüble, Christian ; Selhorst, Marcel :
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI)
[Conference or workshop item] , (2005)

Schwenk, Jörg ; Greveler, Ulrich ; Adelsbach, Andre :
Fair DRM - Ermöglichen von Privatkopien und Schutz digitaler Waren.
9. Deutscher IT-Sicherheitskongress des BSI
[Conference or workshop item] , (2005)

Greveler, Ulrich ; Adelsbach, Andre :
Satellite Communication without Privacy - Attacker's Paradise.
In: LNI . Springer Verlag
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich :
Secure Software Delivery and Installation in Embedded Systems.
First Information Security Practice and Experience Conference (ISPEC 2005)
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus :
Security Engineering for Zero-knowledge Watermark Detection.
Special Session on Media Security (WIAMIS 2005)
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Towards Multilateral Security On DRM Platforms.
First Information Security Practice and Experience Conference (ISPEC 2005)
[Conference or workshop item] , (2005)

Greveler, Ulrich ; Adelsbach, Andre :
Datenschutzverletzungen bei Internetzugängen via Satellit.
In: Datenschutznachrichten, 1 pp. 4-7.
[Article] , (2005)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Towards multilaterally secure computing platforms - with open source and trusted computing.
In: Information Security Technical Report, 10 (2) pp. 83-95.
[Article] , (2005)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Towards multilaterally secure computing platforms - with open source and trusted computing.
In: Information Security Technical Report, 10 (2) pp. 83-95.
[Article] , (2005)

Greveler, Ulrich ; Adelsbach, Andre :
A Broadcast Encryption Scheme with Free-Riders but Unconditional Security.
First International Conference on Digital Rights Management
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza :
Trusted Computing: Whom do we trust? Building Open Multilateral Secure Platforms Based On Trusted Computing.
In: DRM Conference.
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza :
Trusted Computing: Whom do we trust? Building Open Multilateral Secure Platforms Based On Trusted Computing.
DRM Conference
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Bas, Patrick ; Barni, Mauro ; Rosa, Alessia De
Katzenbeisser, Stefan (ed.) :

First Summary Report on Asymmetric Watermarking.
ECRYPT, Network of Excellence in Cryptology
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich :
Secure Software Delivery and Installation in Embedded Systems.

[Report] , (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Huber, Ulrich
Lemke, Kerstin (ed.) :

Secure Software Delivery and Installation in Embedded Systems.
In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications. Springer-Verlag , pp. 27-49.
[Book section] , (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus :
Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it.
In: ACM Multimedia Systems
[Article] , (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus :
Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it.
In: ACM Multimedia Systems
[Article] , (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich :
Property-Based Broadcast Encryption for Multi-level Security Policies.
Technische Universität Darmstadt
[Monograph] , (2005)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian ; Huber, Ulrich :
Property-Based Broadcast Encryption for Multi-level Security Policies.

[Report] , (2005)

Sadeghi, Ahmad-Reza ; Chen, Liqun ; Enzmann, Matthias ; Schneider, Markus ; Steiner, Michael :
A Privacy-Protecting Coupon System.
Financial Cryptography
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit :
Browser Model for Security Analysis of Browser-Based Protocols.
In: European Symposium for Research in Computer Science (ESORICS).
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit :
Browser Model for Security Analysis of Browser-Based Protocols.
IBM
[Monograph] , (2005)

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit :
Browser Model for Security Analysis of Browser-Based Protocols.
European Symposium for Research in Computer Science (ESORICS)
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit :
Browser Model for Security Analysis of Browser-Based Protocols.

[Report] , (2005)

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit :
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
In: Workshop on Secure Web Services (SWS).
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit :
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
Workshop on Secure Web Services (SWS)
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin :
An Open Approach for Designing Secure Electronic Immobilizers.
First Information Security Practice and Experience Conference (ISPEC 2005)
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin
Lemke, Kerstin ; Wolf, Marko ; Paar, Christof (eds.) :

Anti-theft Protection: Electronic Immobilizers.
In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications.. Springer Verlag
[Conference or workshop item] , (2005)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Lemke-Rust, Kerstin
Lemke, Kerstin ; Wolf, Marko ; Paar, Christof (eds.) :

Anti-theft Protection: Electronic Immobilizers.
Embedded Security in Cars: Securing Current and Future Automotive IT Applications. Springer Verlag
[Conference or workshop item] , (2005)

Schwenk, Jörg ; Gajek, Sebastian ; Adelsbach, Andre :
Phishing - Die Täuschung des Benutzers zur Preisgabe geheimer Benutzerdaten.
9. Deutscher IT-Sicherheitskongress des BSI
[Conference or workshop item] , (2005)

Schwenk, Jörg ; Gajek, Sebastian ; Adelsbach, Andre :
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures.
In: LNCS , 3439 . Springer-Verlag
[Conference or workshop item] , (2005)

Spalka, Adrian ; Cremers, Armin ; Winandy, Marcel :
Multilateral Security Considerations for Adaptive Mobile Applications.
2nd International Conference on E-Business and Telecommunication Networks (ICETE 2005) INSTICC
[Conference or workshop item] , (2005)

2004

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms.
20th Annual Computer Security Applications Conference (ACSAC)
[Conference or workshop item] , (2004)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Property-based Attestation for Computing Platforms: Caring about policies, not mechanisms.
New Security Paradigm Workshop (NSPW)
[Conference or workshop item] , (2004)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Pohlmann, Norbert :
European Multilateral Secure Computing Base - Open Trusted Computing for You and Me.
In: Datenschutz und Datensicherheit (DUD), 9 pp. 548-554.
[Article] , (2004)

Altmeyer, Oliver ; Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian
Paulus, Sachar ; Pohlmann, Norbert ; Reimer, Helmut (eds.) :

Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004). Vieweg Verlag , pp. 346-361.
[Book section] , (2004)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus :
Overcoming the Obstacles of Zero-Knowledge Watermark Detection.
In: ACM Multimedia and Security Workshop. ACM Press
[Conference or workshop item] , (2004)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Rohe, Markus :
Overcoming the Obstacles of Zero-Knowledge Watermark Detection.
ACM Multimedia and Security Workshop ACM Press
[Conference or workshop item] , (2004)

Sadeghi, Ahmad-Reza ; Günnewig, Dirk ; Rannenberg, Kai ; Stüble, Christian
Koenig, Christian ; Neu­mann, An­dre­as ; Katz­sch­mann, To­bi­as (eds.) :

Trusted Computing Platforms: Zur technischen und industriepolitischen Situation und Vorgehensweise.
In: Vertrauenswürdige Systemumgebungen Technik, Recht und gesellschaftspolitische Implikationen des "Trusted Computing". Verlag Recht und Wirtschaft
[Book section] , (2004)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Altmeyer, Oliver ; Selhorst, Marcel
Pau­lus, Sachar ; Pohlmann, Norbert ; Reimer, Helmut (eds.) :

Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004). Vieweg Verlag , pp. 346-361.
[Book section] , (2004)

Schwenk, Jörg ; Adelsbach, Andre :
Key-Assignment Strategies for CPPM.
ACM Multimedia and Security Workshop ACM Press
[Conference or workshop item] , (2004)

2003

Stüble, Christian ; Himmelein, Gerald :
Vertrauensfragen - IBMs Antworten auf die TCPA-Fragen des Chaos Computer Club.
In: c't, 15
[Article] , (2003)

Alkassar, Ammar ; Stüble, Christian :
A Security Framework for Integrated Networks.
MILCOM 2003 IEEE Military Communications Conference
[Conference or workshop item] , (2003)

Sadeghi, Ahmad-Reza ; Alkassar, Ammar :
The Quest for Security in Integrated Networks.
In: 11th International Conference on Telecommunication Systems, Modeling and Analysis.
[Conference or workshop item] , (2003)

Sadeghi, Ahmad-Reza ; Alkassar, Ammar :
The Quest for Security in Integrated Networks.
11th International Conference on Telecommunication Systems, Modeling and Analysis
[Conference or workshop item] , (2003)

Adelsbach, Andre ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza :
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, 9 (3) pp. 266-278.
[Article] , (2003)

Hätönen, Kimmo ; Boulicaut, Jean-François ; Klemettinen, Mika ; Miettinen, Markus ; Masson, Cyrille
Kambayashi, Y. ; Mohania, M. K. ; Wöss, W. (eds.) :

Comprehensive log compression with frequent patterns.
In: LNCS , 2734 . Springer
[Conference or workshop item] , (2003)

Hätönen, Kimmo ; Halonen, Perttu ; Klemettinen, Mika ; Miettinen, Markus
Boulicaut, J.-F. ; Dzeroski, S. (eds.) :

Queryable Lossless Log Database Compression.
Proceedings of the Second International Workshop on Knowledge Discovery in Inductive Databases (KDID)
[Conference or workshop item] , (2003)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzenbeisser, Stefan :
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, 9 (3) pp. 266-278.
[Article] , (2003)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Taming "Trusted Computing" by Operating System Design.
4th International Workshop on Information Security Applications (WISA'03) Springer-Verlag
[Conference or workshop item] , (2003)

Stüble, Christian ; Kursawe, Klaus :
Improving End-user Security and Trustworthiness of TCG Platforms.
33. GI-Fachtagung
[Conference or workshop item] , (2003)

Sadeghi, Ahmad-Reza ; Alkassar, Ammar ; Stüble, Christian :
Secure Object Identification - or: Solving The Chess Grandmaster Problem.
New Security Paradigms Workshop
[Conference or workshop item] , (2003)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre :
Advanced Techniques for Dispute Resolving and Authorship Proofs on Digital Works.
Security and Watermarking of Multimedia Contents V
[Conference or workshop item] , (2003)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Schneider, Markus ; Stüble, Christian :
Die digitale Signatur.
In: Digitale Signaturen in der Praxis. AWV Verlag
[Book section] , (2003)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Schneider, Markus ; Stüble, Christian :
Die digitale Signatur.
In: Digitale Signaturen in der Praxis. AWV Verlag
[Book section] , (2003)

Sadeghi, Ahmad-Reza ; Schneider, Markus :
Electronic Payment Systems.
In: Digital Rights Management. LNCS, 2770. Springer Verlag , pp. 113-137.
[Book section] , (2003)

Sadeghi, Ahmad-Reza ; Schneider, Markus :
Electronic Payment Systems.
In: Digital Rights Management. LNCS, 2770. Springer Verlag , pp. 113-137.
[Book section] , (2003)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Bridging the Gap between TCPA/Palladium and Personal Security.

[Report] , (2003)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Sinn und Unsinn von TCPA und Palladium.
In: c't, 13
[Article] , (2003)

Sadeghi, Ahmad-Reza ; Stüble, Christian :
Sinn und Unsinn von TCPA und Palladium.
In: c't, 13
[Article] , (2003)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Günnewig, Dirk :
Trusted Computing ohne Nebenwirkungen.
In: Datenschutz und Datensicherheit (DUD). Vieweg Verlag , pp. 556-560.
[Book section] , (2003)

Sadeghi, Ahmad-Reza ; Stüble, Dirk :
Trusted Computing ohne Nebenwirkungen.
In: Datenschutz und Datensicherheit (DUD). Vieweg Verlag , pp. 556-560.
[Book section] , (2003)

2002

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzenbeisser, Stefan :
Cryptography Meets Watermarking: Detecting Watermarks with Minimal- or Zero-Knowledge Disclosure.
In: XI European Signal Processing Conference , 1
[Conference or workshop item] , (2002)

Adelsbach, Andre ; Stüble, Christian ; Creese, Sadie ; Pfitzmann, Birgit ; Ryan, Peter Y. A. ; Simmonds, William ; Steinbrechner, Sandra ; Steiner, Michael ; Waidner, Michael :
Cryptographic Semantics For The Algebraic Models.

[Report] , (2002)

Alkassar, Ammar ; Stüble, Christian :
Towards Secure IFF: Preventing Mafia Fraud Attacks.
MILCOM 2002, IEEE Military Communication Conference
[Conference or workshop item] , (2002)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian :
Final Report on Verification and Assessment.

[Monograph] , (2002)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Stüble, Christian :
Final Report on Verification and Assessment.

[Report] , (2002)

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Steinbrecher, Sandra :
Auctions with Multiple Rounds and Multiple Items.
Int. Workshop on Trust and Privacy in Digital Business (DEXA 2002)
[Conference or workshop item] , (2002)

Stüble, Christian ; Lange, Steffen ; Nonnengart, Andreas ; Vogt, Roland :
Common Criteria Protection Profiles - Discretionary Information Flow Control (DiC).
3rd International Common Criteria Conference
[Conference or workshop item] , (2002)

2001

Sadeghi, Ahmad-Reza ; Steiner, Michael :
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference.
In: LNCS , 2045 . Springer-Verlag
[Conference or workshop item] , (2001)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Geraldy, Alexander ; Pfitzmann, Birgit :
Optimized Self-Synchronizing Mode of Operation.
8th International Workshop on Fast Software Encryption
[Conference or workshop item] , (2001)

Adelsbach, Andre ; Sadeghi, Ahmad-Reza :
Zero-Knowledge Watermark Detection and Proof of Ownership.
In: Information Hiding: Fourth International Workshop. In: LNCS , 2137 . Springer-Verlag
[Conference or workshop item] , (2001)

Sadeghi, Ahmad-Reza :
How to Break a Semi-Anonymous Fingerprinting Scheme.
In: Information Hiding: Fourth International Workshop. In: LNCS , 2137 . Springer-Verlag
[Conference or workshop item] , (2001)

Sadeghi, Ahmad-Reza :
How to Break a Semi-Anonymous Fingerprinting Scheme.
In: LNCS , 2137 . Springer-Verlag
[Conference or workshop item] , (2001)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre :
Zero-Knowledge Watermark Detection and Proof of Ownership.
In: LNCS , 2137 . Springer-Verlag
[Conference or workshop item] , (2001)

Stüble, Christian ; Pfitzmann, Birgit :
PERSEUS: A Quick Open-source Path to Secure Signatures.
2nd Workshop on Microkernel-based Systems
[Conference or workshop item] , (2001)

Stüble, Christian ; Pfitzmann, Birgit ; Riordan, James ; Waidner, Michael ; Weber, Arnd :
The PERSEUS System Architecture.
In: Verlässliche Informationssysteme (VIS) '01, DuD Fachbeiträge. Vieweg Verlag Kiel, Germany , pp. 1-18.
[Book section] , (2001)

2000

Adelsbach, Andre ; Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza :
Proving ownership of digital content.
In: 3rd International Workshop on Information Hiding, IH 1999. In: LNCS , 1768 . Springer-Verlag
[Conference or workshop item] , (2000)

Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza :
Self-escrowed cash against user black-mailing.
In: Fourth Conference on Financial Cryptography (FC 2000 Anguilla). In: LNCS , 1962 . Springer-Verlag
[Conference or workshop item] , (2000)

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit :
Self-escrowed cash against user black-mailing.
In: LNCS , 1962 . Springer-Verlag
[Conference or workshop item] , (2000)

Stüble, Christian ; Weber, Arnd :
From Security Instruments to Secure End-User Systems.
In: World Markets Series - Wireless Technology 2000 pp. 207-209.
[Article] , (2000)

Adelsbach, Andre :
Anonymous fingerprinting with direct non-repudiation.
In: LNCS , 1976 . Springer-Verlag
[Conference or workshop item] , (2000)

1999

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit :
Coin-based anonymous fingerprinting.
In: LNCS , 1599 . Springer-Verlag
[Conference or workshop item] , (1999)

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit :
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99. Vieweg Verlag , pp. 35-48.
[Book section] , (1999)

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit :
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99. Vieweg Verlag , pp. 35-48.
[Book section] , (1999)

Stüble, Christian :
Effiziente Implementierung von kryptographischen Datenaustauschformaten am Beispiel OpenPGP und S/MIME v.3.
In: Sicherheitsinfrastrukturen: DuD Fachbeiträge. Vieweg Verlag , pp. 272-284.
[Book section] , (1999)

This list was generated on Mon Dec 17 02:01:53 2018 CET.