Nikolov, Javor and Pegoraro, Alessandro and Rieger, Phillip and Sadeghi, Ahmad-Reza (2024):
“LayerDBA: Circumventing Similarity-Based Defenses in Federated Learning”
In: 7th Deep Learning and Security Workshop (DLS'21), [Conference or Workshop Item]

Rostami, Mohamadreza and Zeitouni, Shaza and Kande, Rahul and Chen, Chen and Mahmoody, Pouya and Rajendran, Jeyavijayan and Sadeghi, Ahmad-Reza (2024):
Lost and Found in Speculation: Hybrid Speculative Vulnerability Detection
In: IEEE/ACM Design Automation Conference (DAC ’24), 2024. Moscone West, San Francisco, 23. – 27. June 2024, [Conference or Workshop Item]

Rostami, Mohamadreza and Chen, Chen and Kande, Rahul and Li, Huimin and Rajendran, Jeyavijayan and Sadeghi, Ahmad-Reza (2024):
Fuzzerfly Effect: Hardware Fuzzing for Memory Safety
In: IEEE Security & Privacy 2024, pp. 2-12. IEEE, p-ISSN 1540-7993, e-ISSN 1558-4046, DOI: 10.1109/MSEC.2024.3365070, [Article]

Borkar, Pallavi and Chen, Chen and Rostami, Mohamadreza and Singh, Nikhilesh and Kande, Rahul and Sadeghi, Ahmad-Reza and Rebeiro, Chester and Rajendran, Jeyavijayan (2024):
WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors.
In: 33rd USENIX Security Symposium, 2024, [Conference or Workshop Item]

Chilese, Marco and Mitev, Richard and Orenbach, Meni and Thorburn, Robert and Atamli, Ahmad and Sadeghi, Ahmad-Reza (2024):
One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices
In: 45th IEEE Symposium on Security and Privacy (S&P), 20.05 – 23.05 2024, [Conference or Workshop Item]

Gohil, Vasudev and Kande, Rahul and Chen, Chen and Sadeghi, Ahmad-Reza and Rajendran, Jeyavijayan (2024):
MABFuzz: Multi-Armed Bandit Algorithms for Fuzzing Processors
27. IEEE Design, Automation and Test in Europe Conference (DATE ‘24), Valencia, Spain, 25. – 27. March 2024, [Conference or Workshop Item]

Rostami, Mohamadreza and Chilese, Marco and Zeitouni, Shaza and Kande, Rahul and Rajendran, Jeyavijayan and Sadeghi, Ahmad-Reza (2024):
Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing
27. IEEE Design, Automation and Test in Europe Conference (DATE ‘24), Valencia, Spain, 25. – 27. March 2024, [Conference or Workshop Item]

Chen, Chen and Gohil, Vasudev and Kande, Rahul and Sadeghi, Ahmad-Reza and Rajendran, Jeyavijayan (2024):
PSOFuzz: Fuzzing Processors with Particle Swarm Optimization
In: ICCAD'24 – 8th International Conference on Control, Automation and Diagnosis, May 15-17, [Conference or Workshop Item]

Kumari, Kavita and Pegoraro, Alessandro and Fereidooni, Hossein and Sadeghi, Ahmad-Reza (2024):
DEMASQ: Unmasking the ChatGPT Wordsmith
In: Network and Distributed System Security (NDSS) Symposium 2024, [Conference or Workshop Item]

Fereidooni, Hossein and Pegoraro, Alessandro and Rieger, Phillip and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza (2024):
FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning
In: Network and Distributed System Security (NDSS) Symposium 2024, [Conference or Workshop Item]

Rieger, Phillip and Krauß,Torsten and Miettinen, Markus and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza (2024):
CrowdGuard: Federated Backdoor Detection in Federated Learning
In: Network and Distributed System Security (NDSS) Symposium 2024, [Conference or Workshop Item]

Koisser, David and Mitev, Richard and Chilese, Marco and Sadeghi, Ahmad-Reza (2024):
Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users
In: 45th IEEE Symposium on Security and Privacy (S&P), 20.05 – 23.05 2024, [Conference or Workshop Item]

Koisser, David and Brasser, Ferdinand and Jauernig, Patrick and Stapf, Emmanuel and Wallum, Marcus and Fischer, Daniel and Sadeghi, Ahmad-Reza (2023):
Hardware-Based Isolation for Advanced Safety and Security in Spacecraft
Presented in: SpaceOps 2023 Conference [Talk]

Jiang, Yan and Ji, Xiaoyu and Wang, Kai and Yan, Chen and Mitev, Richard and Sadeghi, Ahmad-Reza and Xu, Wenyuan (2023):
Marionette: Manipulate Your Touchscreen via A Charging Cable
TDSC – IEEE Transactions on Dependable and Secure Computing [Article]

Castillo, Jorge and Rieger, Phillip and Fereidooni, Hossein and Chen, Qian and Sadeghi, Ahmad-Reza (2023):
FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks
In: ACSAC – 39th Annual Computer Security Applications Conference, Austin, Texas, USA, December 5-9, [Conference or Workshop Item]

Li, Huimin and Rieger, Phillip and Zeitouni, Shaza and Picek, Stjepan and Sadeghi, Ahmad-Reza (2023):
FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning
In: International Conference on Field-Programmable Logic and Applications (FPL) 2023, [Conference or Workshop Item]

Pütz, Philipp and Mitev, Richard and Miettinen, Markus and Sadeghi, Ahmad-Reza (2023):
Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats
In: ACSAC – 39th Annual Computer Security Applications Conference, Austin, Texas, USA, December 5-9, [Conference or Workshop Item]

Chen, Chen and Kande, Rahul and Nyugen, Nathan and Andersen, Flemming and Tyagi, Aakash and Sadeghi, Ahmad-Reza and Rajendran, Jeyavijayan (2023):
HyPFuzz: Formal-Assisted Processor Fuzzing.
In: 32st USENIX Security Symposium, 2023 [Conference or Workshop Item]

Tricomi, Pier Paolo and Chilese, Marco and Conti, Mauro and Sadeghi, Ahmad-Reza (2023):
Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms.
In: 15th ACM Web Science Conference, 2023, [Conference or Workshop Item]

Jauernig, Patrick and Jakobovic, Domagoj and Picek, Stjepan and Stapf, Emmanuel and Sadeghi, Ahmad-Reza (2023):
DARWIN: Survival of the Fittest Fuzzing Mutators.
In: 30th Annual Network & Distributed System Security Symposium (NDSS), 27.02 – 03.03 2023, [Conference or Workshop Item]

Saß, Marvin and Mitev, Richard and Sadeghi, Ahmad-Reza (2023):
Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M.
In: 32st USENIX Security Symposium, 2023, [Conference or Workshop Item]

Rieger, Phillip and Chilese, Marco and Reham, Mohamed and Miettenen, Markus and Fereidooni, Hossein and Sadeghi, Ahmad-Reza (2023):
ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks.
In: 32st USENIX Security Symposium, 2023, [Conference or Workshop Item]

Kumari, Kavita and Rieger, Phillip and Fereidooni, Hossein and Jadliwala, Murtuza and Sadeghi, Ahmad-Reza (2023):
BayBFed: Bayesian Backdoor Defense for Federated Learning.
In: 44th IEEE Symposium on Security and Privacy (S&P), 22.05 – 25.05 2023, [Conference or Workshop Item]

Fereidooni, Hossein and Koenig, Jan and Rieger, Phillip and Chilese, Marco and Goekbakan, Bora and Finke, Moritz and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza (2023):
AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms.
In: 30th Annual Network & Distributed System Security Symposium (NDSS), 27.02 – 03.03 2023, [Conference or Workshop Item]

Sendner, Christoph and Chen, Huili and Fereidooni, Hossein and Petzi, Lukas and König, Jan and Stang, Jasper and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Koushanfar, Farinaz (2023):
Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with
Deep Transfer Learning.

In: 30th Annual Network & Distributed System Security Symposium (NDSS), 27.02 – 03.03 2023, [Conference or Workshop Item]

Frassetto, Tommaso, and Jauernig, Patrick, and Koisser, David, and Kretzler, David, and Schlosser, Benjamin, and Faust, Sebastian, and Sadeghi, Ahmad-Reza (2023):
POSE: Practical Off-chain Smart Contract Execution.
In: Network and Distributed Systems Security (NDSS) Symposium 2023, [Conference or Workshop Item]

Nguyen, Thien Duc and Miettinen, Markus and Dmitrienko, Alexandraand Sadeghi, Ahmad-Reza and Visconti, Ivan (2022):
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges.
In Special Section on Hardware and System Security, IEEE Transactions on Emerging Topics in Computing, 2022, [Journal]

Jiang, Yan and Ji, Xiaoyu and Wang, Kai and Yan, Chen and Mitev, Richard and Sadeghi, Ahmad-Reza and Xu, Wenyuan (2022):
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens.
In IEEE Symposium on Security and Privacy (SP), 2022, [Conference or Workshop Item]

Kande, Rahul and Crump, Addison and Persyn, Garrett and Jauernig, Patrick and Sadeghi, Ahmad-Reza and Tyagi, Aakash and Rajendran, Jeyavijayan (2022):
TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities.
In 31st USENIX Security Symposium, 2022, [Conference or Workshop Item]

Koisser, David and Jauernig, Patrick and Tsudik, Gene and Sadeghi, Ahmad-Reza (2022):
V’CER: Efficient Certificate Validation in Constrained Networks.
In 31st USENIX Security Symposium, 2022, [Conference or Workshop Item]

Wang, Jianqiang and Mahmoody, Pouya and Brasser, Ferdinand and Jauernig, Patric and Yu, Donghui and Pan, Dahan and Zhang, Yuanyuan and Sadeghi, Ahmad-Reza (2022):
VirTee: A Full Backward-Compatible TEE with Native Live Migration and Secure I/O.
In The Design Automation Conference (DAC), 2022, [Conference or Workshop Item]

Stapf, Emmanuel and Jauernig, Patrick and Brasser, Ferdinand and Sadeghi, Ahmad-Reza (2022):
In Hardware We Trust? From TPM to Enclave Computing on RISC-V.
In IFIPIEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC), 2021, [Conference or Workshop Item]

Nguyen, Thien Duc and Rieger, Phillip and Chen, Huili and Yalame, Hossein and Möllering, Helen and Fereidooni, Hossein and Marchal, Samuel and Miettinen, Markus and Mirhoseini, Azalia and Zeitouni, Shaza and Koushanfar, Farinaz and Sadeghi, Ahmad-Reza and Schneider, Thomas (2022):
FLAME: Taming Backdoors in Federated Learning.
In 31st USENIX Security Symposium, 2022, [Conference or Workshop Item]

Wang, Kai and Mitev, Richard and Yan, Chen and Ji, Xiaoyu Sadeghi, Ahmad-Reza and Xu, Wenyuan (2022):
GhostTouch: Targeted Attacks on Touchscreens without Physical Touch.
In 31st USENIX Security Symposium, 2022, [Conference or Workshop Item]

Fereidooni, Hossein and Dmitrienko, Alexandra and Madlener, Felix and Rieger, Phillip and Miettinen, Markus and Sadeghi, Ahmad-Reza (2022):
FedCRI: Federated Mobile Cyber-Risk Intelligence.
In: 29th Annual Network & Distributed System Security Symposium (NDSS), 27.02 – 03.03 2022, [Conference or Workshop Item]

Frassetto, Tommaso and Jauernig, Patrick and Koisser, David and Sadeghi, Ahmad-Reza (2022):
CFInsight: A Comprehensive Metric for CFI Policies.
In Network and Distributed Systems Security (NDSS) Symposium 2022, [Conference or Workshop Item]

Koisser, David and Fischer, Daniel and Wallum, Marcus and Sadeghi, Ahmad-Reza (2022):
TruSat: Building Cyber Trust in Collaborative Spacecraft Networks.
In 2022 IEEE Aerospace Conference, [Conference or Workshop Item]

Dessouky, Ghada and Gruler, Alexander and Mahmoody, Pouya and Sadeghi, Ahmad-Reza and Stapf, Emmanuel (2022):
CHUNKED-CACHE: On-Demand and Scalable Cache Isolation for Security Architectures.
In Network and Distributed System Security (NDSS) Symposium 2022, [Conference or Workshop Item]

Schönstedt, Martin and Brasser, Ferdinand and Jauernig, Patrick and Sadeghi, Ahmad-Reza and Stapf, Emmanuel (2022):
SafeTEE: Combining Safety and Security on ARM-based Microcontrollers.
In Conference on Design, Automation and Test in Europe (DATE) 2022, [Conference or Workshop Item]

Rieger, Phillip and Nguyen, Thien Duc and Miettinen, Markus and Sadeghi, Ahmad-Reza (2022):
DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection.
In Network and Distributed System Security (NDSS) Symposium 2022, [Conference or Workshop Item]

Surminski, Sebastian and Niesler, Christian and Davi, Lucas and Brasser, Ferdinand and Sadeghi, Ahmad-Reza (2021):
RealSWATT: Remote Software-based Attestation for Embedded Devices under Realtime Constraints.
ACM CCS 2021, [Conference or Workshop Item]

Chen, Yanjiao and Bai, Yijie and Wang, Kaibo and Xu, Wenyuan and Mitev, Richard and Sadeghi, Ahmad-Reza (2021):
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants.
ACM CCS 2021, [Conference or Workshop Item]

Abera, Tigist and Brasser, Ferdinand and Gunn, Lachlan and Jauernig, Patrick and Koisser, David and Sadeghi, Ahmad-Reza (2021):
GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Network.
24th International Symposium on Research in Attacks, Intrusions and Defenses (RAID) 2021, [Conference or Workshop Item]

Dessouky, Ghada and Isakov, Mihailo and Kinsy, Michel A. and Mahmoody, Pouya and Mark, Miguel and Sadeghi, Ahmad-Reza and Stapf, Emmanuel and Zeitouni, Shaza (2021):
Distributed Memory Guard: Enabling Secure Enclave Computing in NoC-based Architectures.
To appear in Design Automation Conference (DAC) 2021, [Conference or Workshop Item]

Fereidooni, Hossein and Marchal, Samuel and Miettinen, Markus and Mirhoseini, Azalia and Möllering, Helen and Nguyen, Thien Duc and Rieger, Phillip and Sadeghi, Ahmad-Reza and Schneider, Thomas and Yalame, Mohammad Hossein and Zeitouni, Shaza (2021):
SAFELearn: Secure Aggregation for private Federated Learning.
4th Deep Learning and Security Workshop (DLS'21), virtual Conference, 27.05.2021, [Conference or Workshop Item]

Nguyen, Thien Duc and Rieger, Phillip and Yalame, Mohammad Hossein and Möllering, Helen and Fereidooni, Hossein and Marchal, Samuel and Miettinen, Markus and Mirhoseini, Azalia and Sadeghi, Ahmad-Reza and Schneider, Thomas and Zeitouni, Shaza (2021):
FLGUARD: Secure and Private Federated Learning.
In: arXiv-Computer Science, In: Crytography and Security, (Preprint), [Article]

Bahmani, Raad and Brasser, Ferdinand and Dessouky, Ghada and Jauernig, Patrick and Klimmek, Matthias and Sadeghi, Ahmad-Reza and Stapf, Emmanuel (2021):
CURE: A Security Architecture with CUstomizable and Resilient Enclaves.
30th USENIX Security Symposium (USENIX Security'21), Vancouver, Canada, 11.-13.08., [Conference or Workshop Item]

Zeitouni, Shaza and Dessouky, Ghada and Sadeghi, Ahmad-Reza (2021):
SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities.
6th IEEE European Symposium on Security and Privacy (Euro S&P 2021), virtual Conference, 06.-10.09.2021, [Conference or Workshop Item]

Zeitouni, Shaza and Vliegen, Jo and Frassetto, Tommaso and Koch, Dirk and Sadeghi, Ahmad-Reza and Mentens, Nele (2021):
Trusted Configuration in Cloud FPGAs.
29th IEEE International Symposium on Field-Programmable Custom Computing Machines, virtual Conference, 09.-12.05.2021, [Conference or Workshop Item]

Baumgärtner, Lars and Dmitrienko, Alexandra and Freisleben, Bernd and Gruler, Alexander and Höchst, Jonas and Kühlberg, Joshua and Mezini, Mira and Mitev, Richard and Miettinen, Markus and Muhamedagic, Anel and Nguyen, Thien Duc and Penning, Alvar and Pustelnik, Frederik and Roos, Filipp and Sadeghi, Ahmad-Reza and Schwarz, Michael and Uhl, Christian (2020):
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps.
In: Proceedings : 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 458-467, IEEE, TrustCom 2020, virtual Conference, 29.12.2020-01.01.2021, ISBN 978-0-7381-4380-4, [Conference or Workshop Item]

Nguyen, Thien Duc and Miettinen, Markus and Sadeghi, Ahmad-Reza (2020):
Long Live Randomization: On Privacy-Preserving Contact Tracing in Pandemic.
In: MTD'20: Proceedings of the 7th ACM Workshop on Moving Target Defense, ACM, CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, virtual Conference, 09.-13.11.2020, ISBN 978-1-4503-8085-0, DOI: 10.1145/3411496.3421229, [Conference or Workshop Item]

Buchmann, Johannes and Dessouky, Ghada and Frassetto, Tommaso and Kiss, Ágnes and Sadeghi, Ahmad-Reza and Schneider, Thomas and Traverso, Giulia and Zeitouni, Shaza (2020):
SAFE: A Secure and Efficient Long-Term Distributed Storage System.
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20), Taipei, Taiwan, June 1-5, 2020, [Conference or Workshop Item]

Neureither, Jens and Dmitrienko, Alexandra and Koisser, David and Brasser, Ferdinand and Sadeghi, Ahmad-Reza (2020):
LegIoT: Ledgered Trust Management Platform for IoT.
In: Lecture Notes in Computer Science, 12308, In: Computer Security – ESORICS 2020, pp. 377-396,
Springer, 25th European Symposium on Research in Computer Security, virtual Conference, 14.-18.09.2020, ISBN 978-3-030-58950-9,
DOI: 10.1007/978-3-030-58951-6_19,
[Conference or Workshop Item]

Cammarota, Rosario and Schunter, Matthias and Rajan, Anand and Boemer, Fabian and Kiss, Ágnes and Treiber, Amos and Weinert, Christian and Schneider, Thomas and Stapf, Emmanuel and Sadeghi, Ahmad-Reza and Demmler, Daniel and Chen, Huili and Hussain, Siam Umar and Riazi, M. Sadegh and Koushanfar, Farinaz and Gupta, Saransh and Rosing, Simunic (2020):
Trustworthy AI Inference Systems: An Industry Research View.
In: arXiv/Computer Science/Cryptography and Security, Version 1, [Report]

Dessouky, Ghada and Frassetto, Tommaso and Jauernig, Patrick and Sadeghi, Ahmad-Reza (2020):
With Great Complexity Comes Great Vulnerability: Challenges of Secure Processor Design.
In: IEEE Security & Privacy, IEEE, ISSN 1540-7993, DOI: 10.1109/MSEC.2020.2994978, [Article]

Dessouky, Ghada and Sadeghi, Ahmad-Reza and Stapf, Emmanuel (2020):
Enclave Computing on RISC-V: A Brighter Future for Security?
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020, Boston, USA, 5.-7. April, 2020, [Conference or Workshop Item]

Bayerl, Sebastian P. and Frassetto, Tommaso and Jauernig, Patrick and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stapf, Emmanuel and Weinert, Christian (2020):
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20), Grenoble, France, 09. – 13. March 2020, [Conference or Workshop Item]

Jauernig, Patrick and Sadeghi, Ahmad-Reza and Stapf, Emmanuel (2020):
Trusted Execution Environments: Properties, Applications, and Challenges.
In: IEEE Security & Privacy, 18 (2), pp. 56-60. IEEE, e-ISSN 1558-4046, DOI: 10.1109/MSEC.2019.2947124, [Article]

Acar, Abbas and Fereidooni, Hossein and Abera, Tigist and Sikder, Amit Kumsr and Miettinen, Markus and Aksu, Hidayet and Conti, Mauro and Sadeghi, Ahmad-Reza (2020):
Peek-a-Boo: I see your smart home activities, even encrypted!
pp. 207-218, WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, July 08.-10., 2020, [Conference or Workshop Item]

Brasser, Franz Ferdinand Peter (2020):
Enclave Computing Paradigm: Hardware-assisted Security Architectures & Applications.
Darmstadt, Technische Universität, DOI: 10.25534/tuprints-00011912, [Ph.D. Thesis]

Dessouky, Ghada and Frassetto, Tommaso and Sadeghi, Ahmad-Reza (2020):
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.
In: USENIX Security, k.A., USENIX Association, 29th USENIX Security Syposium, Boston, MA, USA, 12.-14.08.2020, [Conference or Workshop Item]

Dessouky, Ghada and Jauernig, Patrick and Mentens, Nele and Sadeghi, Ahmad-Reza and Stapf, Emmanuel (2020):
INVITED: AI Utopia or Dystopia – On Securing AI Platforms.
DAC'20-Design Automation Conference 2020, virtual Conference, 20.-24.07., [Conference or Workshop Item]

Kenjar, Zijo and Frassetto, Tommaso and Gens, David and Franz, Michael and Sadeghi, Ahmad-Reza (2020):
V0LTpwn: Attacking x86 Processor Integrity from Software.
29th USENIX Security Symposium, Boston, USA, August 12–14, 2020, [Conference or Workshop Item]

Mitev, Richard and Pazii, Anna and Miettinen, Markus and Enck, William and Sadeghi, Ahmad-Reza (2020):
LeakyPick: IoT Audio Spy Detector.
In: ICPS Proceedings, In: ACSAC '20: Annual Computer Security Applications Conference, pp. 694-705, ACM, 36th Annual Computer Security Applications Conference, virtual Conference, 07.-11.12.2020, ISBN 978-1-4503-8858-0, DOI: 10.1145/3427228.3427277, [Conference or Workshop Item]

Nguyen, Thien Duc and Rieger, Phillip and Miettinen, Markus and Sadeghi, Ahmad-Reza (2020):
Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System.
Workshop on Decentralized IoT Systems and Security (DISS) @ NDSS Symposium 2020, San Diego, USA, 23.-26.02. 2020, [Conference or Workshop Item]

Zeitouni, Shaza and Stapf, Emmanuel and Fereidooni, Hossein and Sadeghi, Ahmad-Reza (2020):
On the Security of Strong Memristor-based Physically Unclonable Functions.
Design Automation Conference 2020, virtual Conference, 19.-22.07., [Conference or Workshop Item]

Brasser, Ferdinand and Capkun, Srdjan and Dmitrienko, Alexandra and Frassetto, Tommaso and Kostiainen, Kari and Sadeghi, Ahmad-Reza (2019):
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization.
ACSAC – 35th Annual Computer Security Applications Conference, San Juan, Puerto Rico, December 9-13, [Conference or Workshop Item]

Bayerl, Sebastian P. and Brasser, Ferdinand and Busch, Christoph and Frassetto, Tommaso and Jauernig, Patrick and Kolberg, Jascha and Nautsch, Andreas and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stapf, Emmanuel and Treiber, Amos and Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Conference or Workshop Item]

Dessouky, Ghada and Zeitouni, Shaza and Ibrahim, Ahmad and Davi, Lucas and Sadeghi, Ahmad-Reza (2019):
CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems.
New York, IEEE, 2019 International Conference On Computer Aided Design (ICCAD), The Westin Westminster Westminster, CO, 4.-7. November 2019, [Conference or Workshop Item]

Zaidan, Firas (2019):
Developing a Fuzzing Framework for ARM TrustZone.
Darmstadt, TU Darmstadt, [Master Thesis]

Ghaeini, Hamid Reza and Chan, Matthew and Bahmani, Raad and Brasser, Ferdinand and Garcia, Luis and Zhou, Jianying and Sadeghi, Ahmad-Reza and Tippenhauer, Nils Ole and Zonouz, Saman A. (2019):
PAtt: Physics-based Attestation of Control Systems.
Beijing, 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Beijing, 23. – 25.09.2019, [Conference or Workshop Item]

Das, Poulami and Eckey, Lisa and Frassetto, Tommaso and Gens, David and Hostáková, Kristina and Jauernig, Patrick and Faust, Sebastian and Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Conference or Workshop Item]

Paverd, Andrew and Völp, Marcus and Brasser, Ferdinand and Schunter, Matthias and Asokan, N. and Sadeghi, Ahmad-Reza and Esteves-Verissimo, Paulo and Steininger, Andreas and Holz, Thorsten (2019):
Sustainable Security & Safety: Challenges and Opportunities.
Stuttgart, 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS), Stuttgart, 09.07.2019, DOI: 10.4230/OASIcs.CERTS.2019.4, [Conference or Workshop Item]

Bock, Carsten and Brasser, Ferdinand and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2019):
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
Auckland, ACM Asia Conference on Computer and Communications Security (AsiaCCS), Auckland, 07. – 12.07.2019, DOI: 10.1145/3321705.3329827, [Conference or Workshop Item]

Songhori, Ebrahim and Riazi, M. Sadegh and Hussain, Siam and Sadeghi, Ahmad-Reza and Koushanfar, Farinaz (2019):
ARM2GC: Succinct Garbled Processor for Secure Computation.
Las Vegas, USA, Design Automation Conference (DAC), 2019 56th ACM/EDAC/IEEE, Las Vegas, USA, June, 2.-6., [Conference or Workshop Item]

Batina, Lejla and Jauernig, Patrick and Mentens, Nele and Sadeghi, Ahmad-Reza and Stapf, Emmanuel (2019):
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
In: Proceedings of the 56th Annual Design Automation Conference 2019, k.A., ACM, Design Automation Conference 2019, Las Vegas, NV, USA, June 02 – 06, 2019, [Conference or Workshop Item]

Marchal, Samuel and Miettinen, Markus and Nguyen, Thien Duc and Sadeghi, Ahmad-Reza and Asokan, N. (2019):
AuDI: Towards autonomous IoT device-type identification using periodic communications.
In: IEEE Journal on Selected Areas in Communications, IEEE, ISSN 0733-8716, [Article]

Dessouky, Ghada and Gens, David and Haney, Patrick and Persyn, Garrett and Kanuparthi, Arun K. and Khattri, Hareesh and Fung, Jason M. and Sadeghi, Ahmad-Reza and Rajendran, Jeyavijayan (2019):
HardFails: Insights into Software-Exploitable Hardware Bugs.
28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Conference or Workshop Item]

OConnor, TJ and Mohamed, Reham and Miettinen, Markus and Enck, William and Reaves, Bradley and Sadeghi, Ahmad-Reza (2019):
HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices.
Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Miami, FL, USA, [Conference or Workshop Item]

Nguyen, Thien Duc and Marchal, Samuel and Miettinen, Markus and Fereidooni, Hossein and Asokan, N. and Sadeghi, Ahmad-Reza (2019):
DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
In: The 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019), [Conference or Workshop Item]

Ibrahim, Ahmad (2019):
Securing Embedded Networks Through Secure Collective Attestation.
Darmstadt, Technische Universität, [Ph.D. Thesis]

Truong, Hien Thi Thu and Toivonen, Juhani and Nguyen, Thien Duc and Soriente, Claudio and Tarkoma, Sasu and Asokan, N. (2019):
DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification.
k.A., IEEE International Conference on Pervasive Computing and Communications (PerCom2019), Kyoto, Japan, March 2019, [Conference or Workshop Item]

Marchal, Samuel and Miettinen, Markus and Nguyen, Thien Duc and Sadeghi, Ahmad-Reza and Asokan, N. (2019):
AUDI: Towards Autonomous IoT Device-Type Identification.
In: IEEE Journal on Selected Areas in Communications (JSAC) on Artificial Intelligence and Machine Learning for Networking and Communications, [Article]

Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Tsudik, Gene (2019):
HEALED: HEaling & Attestation for Low-end Embedded Devices.
23rd International Conference Financial Cryptography and Data Security (FC 2019), 2019, [Conference or Workshop Item]

Das, Poulami and Eckey, Lisa and Frassetto, Tommaso and Gens, David and Hostakova, Kristina and Jauernig, Patrick and Faust, Sebastian and Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
Cryptology ePrint Archive, Report 2019/154, [Report]

Miettinen, Markus (2019):
Context and communication profiling for IoT security and privacy: techniques and applications.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Aschermann, Cornelius and Frassetto, Tommaso and Holz, Thorsten and Jauernig, Patrick and Sadeghi, Ahmad-Reza and Teuchert, Daniel (2019):
Nautilus: Fishing for Deep Bugs with Grammars.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Brasser, Ferdinand and Gens, David and Jauernig, Patrick and Sadeghi, Ahmad-Reza and Stapf, Emmanuel (2019):
SANCTUARY: ARMing TrustZone with User-space Enclaves.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Weiser, Samuel and Werner, Mario and Brasser, Ferdinand and Malenko, Maja and Mangard, Stefan and Sadeghi, Ahmad-Reza (2019):
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Abera, Tigist and Bahmani, Raad and Brasser, Ferdinand and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias (2019):
DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous System.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Mohamed, Reham and O'Connor, Terrance and Miettinen, Markus and Enck, William and Sadeghi, Ahmad-Reza Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang (Corporate Creators) (2019):
HONEYSCOPE: IoT Device Protection with Deceptive Network Views,.
In: Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings, [Book Section]

De Oliveira Nunes, Ivan and Dessouky, Ghada and Ibrahim, Ahmad and Rattanavipanon, Norrathep and Sadeghi, Ahmad-Reza and Tsudik, Gene (2019):
Towards Systematic Design of Collective Remote Attestation Protocols.
The 39th International Conference on Distributed Computing Systems (ICDCS) 2019, [Conference or Workshop Item]

Gens, David (2019):
OS-level Attacks and Defenses: from Software to Hardware-based Exploits.
Darmstadt, Technische Universität, [Ph.D. Thesis]

Nyman, Thomas and Dessouky, Ghada and Zeitouni, Shaza and Lehikoinen, Aaro and Paverd, Andrew and Asokan, N. and Sadeghi, Ahmad-Reza (2019):
HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.
ACM/IEEE, Design Automation Conference (DAC), 2019, [Conference or Workshop Item]

Miettinen, Markus and Sadeghi, Ahmad-Reza (2018):
Internet of things or threats? on building trust in IoT (keynote). 1:1-1:9.
In: CODES '18 Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis,
Piscataway, NJ, USA, IEEE Press Piscataway, NJ, USA, CODES+ISSS 2018, part of ESWEEK 2018, Torino, Italy, September 30 – October 5, 2018, [Conference or Workshop Item]

Ibrahim, Ahmad (2018):
Collective Attestation: for a Stronger Security in Embedded Networks.
IEEE, Salvador, Brazil, Brazil, October, 2.-5., DOI: 10.1109/SRDS.2018.00039, [Conference or Workshop Item]

Brasser, Ferdinand and Frassetto, Tommaso and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Weinert, Christian (2018):
VoiceGuard: Secure and Private Speech Processing.
In: Interspeech 2018, pp. 1303-1307, International Speech Communication Association (ISCA), DOI: 10.21437/Interspeech.2018-2032, [Conference or Workshop Item]

Frassetto, Tommaso and Jauernig, Patrick and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2018):
IMIX: In-Process Memory Isolation EXtension.
In: Proceedings of the 27th USENIX Security Symposium, pp. 83-97, 27th USENIX Security Symposium – Technical Sessions Track 2, Baltimore, MD, USA, 15.-17.08.2018, ISBN 978-1-939133-04-5, [Conference or Workshop Item]

Mitev, Richard (2018):
Lyin’ Alexa – Skill-Based Man-in-the-Middle Attack on Virtual Assistants.
TU Darmstadt, [Master Thesis]

Carpent, Xavier and Eldefrawy, Karim and Rattanavipanon, Norrathep and Sadeghi, Ahmad-Reza and Tsudik, Gene (2018):
Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices.
ACM, Design Automation Conference, San Francisco, USA, 2018, June 24-29, [Conference or Workshop Item]

Dessouky, Ghada and Abera, Tigist and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza (2018):
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution.
37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18), 2018, [Conference or Workshop Item]

Ambrosin, Moreno and Conti, Mauro and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias (2018):
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
23rd European Symposium on Research in Computer Security (ESORICS 2018), Barcelona, Spain, 2018, [Conference or Workshop Item]

Asokan, N. and Nyman, Thomas and Rattanavipanon, Norrathep and Sadeghi, Ahmad-Reza and Tsudik, Gene (2018):
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems – Special Issue ESWEEK 2018, CASES 2018, CODES + ISSS 2018 and EMSOFT 2018, [Article]

Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Tsudik, Gene (2018):
US-AID: Unattended Scalable Attestation of IoT Devices.
37th IEEE International Symposium on Reliable Distributed Systems (SRDS 2018), 2018, [Conference or Workshop Item]

Schaad, Andreas and Grohmann, Bjoern and Winzenried, Oliver and Brasser, Ferdinand and Sadeghi, Ahmad-Reza (2018):
Towards a Cloud-based System for Software Protection and Licensing.
In: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 – Volume 2, pp. 698-702,
k.A., SciTePress, Secrypt 2018, Porto, Portugal, 26.-28.07.2018, ISBN 978-989-758-319-3, DOI: 10.5220/0006899506980702, [Conference or Workshop Item]

Deaconescu, Razvan and Carabas, Costin and Manda, Iulia and Enck, William and Chiroiu, Mihai and Li, Ninghui and Sadeghi, Ahmad-Reza (2018):
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: AsiaCCS, In: 13th ASIA Conference on Information, Computer and Communications Security, [Conference or Workshop Item]

Miettinen, Markus and Nguyen, Thien Duc and Asokan, N. and Sadeghi, Ahmad-Reza (2018):
Revisiting Context-Based Pairing in IoT.
In: Proceedings of the 55th Design Automation Conference (DAC), pp. 32:1-32:6, ACM, 55th Design Automation Conference (DAC), San Francisco, CA, USA, 24.-29.06. 2018, [Conference or Workshop Item]

Zeitouni, Shaza and Gens, David and Sadeghi, Ahmad-Reza (2018):
It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs.
In: Design Automation Conference (DAC) 2018, [Conference or Workshop Item]

Biondo, Andrea and Conti, Mauro and Davi, Lucas and Frassetto, Tommaso and Sadeghi, Ahmad-Reza (2018):
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
27th USENIX Security Symposium, [Conference or Workshop Item]

Ghaeini, Hamid Reza and Antonioli, Daniele and Brasser, Ferdinand and Sadeghi, Ahmad-Reza and Tippenhauer, Nils Ole (2018):
State-Aware Anomaly Detection for Industrial Control Systems.
In: The 33rd ACM/SIGAPP Symposium On Applied Computing (SAC), Pau, France, DOI: 10.1145/3167132.3167305,
[Conference or Workshop Item]

Liebchen, Christopher (2018):
Advancing Memory-corruption Attacks and Defenses.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Gens, David and Schmitt, Simon and Davi, Lucas and Sadeghi, Ahmad-Reza (2018):
K-Miner: Uncovering Memory Corruption in Linux.
In: 25th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Asokan, N. and Gröndahl, Tommi and Nguyen, Hoang Long and Nguyen, Thien Duc and Paverd, Andrew and Pendyala, Praveen and Sadeghi, Ahmad-Reza and Stobert, Elizabeth and Tamrakar, Sandeep (2018):
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
In: IEEE Internet Computing, p. 1. ISSN 1089-7801, DOI: 10.1109/MIC.2018.182130646, [Article]

Asokan, N. and Miettinen, Markus (2018):
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead.
In: Computer Communications, ISSN 0140-3664, DOI: 10.1016/j.comcom.2018.07.030, [Article]

Asokan, N. and Nguyen, Thien Duc and Tarkoma, Sasu and Toivonen, Juhani and Truong, Hien Thi Thu (2018):
Proximity Verification Based on Acoustic Room Impulse Response.
In: CoRR, abs/1803.07211, [Article]

Brasser, Ferdinand and Davi, Lucas and Dhavlle, Abhijitt and Frassetto, Tommaso and Dinakarrao, Sai Manoj Pudukotai and Rafatirad, Setareh and Sadeghi, Ahmad-Reza and Sasan, Avesta and Sayadi, Hossein and Zeitouni, Shaza and Homayoun, Houman (2018):
Advances and Throwbacks in Hardware-assisted Security: Special Session.
In: CASES '18, pp. 15:1-15:10, Piscataway, NJ, USA, IEEE Press, Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems, Piscataway, NJ, USA, ISBN 978-1-5386-5564-1, [Conference or Workshop Item]

Dessouky, Ghada and Gens, David and Haney, Patrick and Persyn, Garrett and Kanuparthi, Arun K. and Khattri, Hareesh and Fung, Jason M. and Sadeghi, Ahmad-Reza and Rajendran, Jeyavijayan (2018):
When a Patch is Not Enough – HardFails: Software-Exploitable Hardware Bugs.
In: Cryptography and Security, abs/1812.00197, [Article]

Ibrahim, Ahmad (2018):
Securing Embedded Networks Through Secure Collective Attestation.
In: MobiSys PhD Forum '18, pp. 1-2, New York, NY, USA, ACM, Workshop at 16th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2018), 2018, New York, NY, USA, ISBN 978-1-4503-5841-5, DOI: 10.1145/3212711.3212712, [Conference or Workshop Item]

Mohan, Sibin and Asplund, Mikael and Bloom, Gedare and Sadeghi, Ahmad-Reza and Ibrahim, Ahmad and Salajageh, Negin and Griffioen, Paul and Sinopoli, Bruno (2018):
The Future of IoT Security: Special Session.
In: EMSOFT '18, pp. 16:1-16:7, Piscataway, NJ, USA, IEEE Press, International Conference on Embedded Software (EMSOFT 2018), 2018, Piscataway, NJ, USA, ISBN 978-1-5386-5564-1, [Conference or Workshop Item]

Nguyen, Thien Duc and Marchal, Samuel and Miettinen, Markus and Dang, Minh Hoang and Asokan, N. and Sadeghi, Ahmad-Reza (2018):
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
In: CoRR, abs/1804.07474, [Article]

Frassetto, Tommaso and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2017):
JITGuard: Hardening Just-in-time Compilers with SGX.
In: 24th ACM Conference on Computer and Communications Security (CCS), Dallas, TX, USA, ISBN 978-1-4503-4946-8/17/10, DOI: 10.1145/3133956.3134037, [Conference or Workshop Item]

Jauernig, Patrick Thomas (2017):
SMOV: Lighweight In-Process Memory Isolation.
Darmstadt, Technische Universität, [Bachelor Thesis]

Zeitouni, Shaza and Dessouky, Ghada and Arias, Orlando and Sullivan, Dean and Ibrahim, Ahmad and Jin, Yier and Sadeghi, Ahmad-Reza (2017):
ATRIUM: Runtime Attestation Resilient Under Memory Attacks.
In: 2017 International Conference On Computer Aided Design (ICCAD'17), Irvine, California, US, [Conference or Workshop Item]

Antonioli, Daniele and Ghaeini, Hamid Reza and Adepu, Sridhar and Ochoa, Martin and Tippenhauer, Nils Ole (2017):
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3.
In: ACM Workshop on Cyber-Physical Systems Security and Privacy, ACM Conference on Computer and Communications Security (CCS), Dallas, Texas, USA, ISBN 978-1-4503-5394-6, DOI: 10.1145/3140241.3140253, [Conference or Workshop Item]

Arias, Orlando and Gens, David and Jin, Yier and Liebchen, Christopher and Sadeghi, Ahmad-Reza and Sullivan, Dean (2017):
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
In: 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017), [Conference or Workshop Item]

Brasser, Ferdinand and Capkun, Srdjan and Dmitrienko, Alexandra and Frassetto, Tommaso and Kostiainen, Kari and Müller, Urs and Sadeghi, Ahmad-Reza (2017):
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
[Report]

Fereidooni, Hossein and Classen, Jiska and Spink, Tom and Patras, Paul and Miettinen, Markus and Sadeghi, Ahmad-Reza and Hollick, Matthias and Conti, Mauro (2017):
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
In: Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Atlanta, Georgia, USA, [Conference or Workshop Item]

Brasser, Ferdinand and Davi, Lucas and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2017):
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17, In: 26th USENIX Security Symposium, [Conference or Workshop Item]

Brasser, Ferdinand and Müller, Urs and Dmitrienko, Alexandra and Kostiainen, Kari and Capkun, Srdjan and Sadeghi, Ahmad-Reza (2017):
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT, In: 11th USENIX Workshop on Offensive Technologies, [Conference or Workshop Item]

Fereidooni, Hossein and Frassetto, Tommaso and Miettinen, Markus and Sadeghi, Ahmad-Reza and Conti, Mauro (2017):
Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
In: The Second IEEE International Workshop on Safe, Energy-Aware, & Reliable Connected Health (CHASE-SEARCH), Philadelphia, Pennsylvania, USA, [Conference or Workshop Item]

Fuhry, Benny and Bahmani, Raad and Brasser, Ferdinand and Hahn, Florian and Kerschbaum, Florian and Sadeghi, Ahmad-Reza (2017):
HardIDX: Practical and Secure Index with SGX.
In: Conference on Data and Applications Security and Privacy (DBSec), [Conference or Workshop Item]

Heuser, Stephan and Reaves, Bradley and Pendyala, Praveen Kumar and Carter, Henry and Dmitrienko, Alexandra and Kiyavash, Negar and Enck, William and Sadeghi, Ahmad-Reza and Traynor, Patrick (2017):
Phonion: Practical Protection of Metadata in Telephony Networks.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), [Conference or Workshop Item]

Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Zeitouni, Shaza (2017):
SeED: Secure Non-Interactive Attestation for Embedded Devices.
In: 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), Boston, USA, [Conference or Workshop Item]

Dessouky, Ghada and Zeitouni, Shaza and Nyman, Thomas and Paverd, Andrew and Davi, Lucas and Koeberl, Patrick and Asokan, N. and Sadeghi, Ahmad-Reza (2017):
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
54th Design Automation Conference (DAC'17), [Conference or Workshop Item]

Miettinen, Markus and Marchal, Samuel and Hafeez, Ibbad and Asokan, N. and Sadeghi, Ahmad-Reza and Tarkoma, Sasu (2017):
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT.
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017), DOI: 10.1109/ICDCS.2017.283, [Conference or Workshop Item]

Miettinen, Markus and Marchal, Samuel and Hafeez, Ibbad and Frassetto, Tommaso and Asokan, N. and Sadeghi, Ahmad-Reza and Tarkoma, Sasu (2017):
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017), IEEE, Atlanta, GA, USA, DOI: 10.1109/ICDCS.2017.284, [Conference or Workshop Item]

Portela, Bernardo and Barbosa, Manuel and Scerri, Guillaume and Warinschi, Bogdan and Bahmani, Raad and Brasser, Ferdinand and Sadeghi, Ahmad-Reza (2017):
Secure Multiparty Computation from SGX.
In: Financial Cryptography and Data Security, [Conference or Workshop Item]

Davi, Lucas and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2017):
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Dessouky, Ghada and Koushanfar, Farinaz and Sadeghi, Ahmad-Reza and Schneider, Thomas and Zeitouni, Shaza and Zohner, Michael (2017):
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17), Internet Society, DOI: 10.14722/ndss.2017.23097, [Conference or Workshop Item]

Garcia, Luis and Brasser, Ferdinand and Cintuglu, Mehmet H. and Sadeghi, Ahmad-Reza and Mohammed, Osama and Zonouz, Saman A. (2017):
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Rudd, Robert and Skowyra, Richard and Bigelow, David and Dedhia, Veer and Hobson, Thomas and Crane, Stephen and Liebchen, Christopher and Larsen, Per and Davi, Lucas and Franz, Michael and Sadeghi, Ahmad-Reza and Okhravi, Hamed (2017):
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Riazi, M. Sadegh and Songhori, Ebrahim M. and Sadeghi, Ahmad-Reza and Schneider, Thomas and Koushanfar, Farinaz (2017):
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (1), pp. 62-78. De Gruyter Open, DOI: 10.1515/popets-2017-0005, [Article]

Nyman, Thomas and Dessouky, Ghada and Zeitouni, Shaza and Lehikoinen, Aaro and Paverd, Andrew and Asokan, N. and Sadeghi, Ahmad-Reza (2017):
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.
In: Cryptography and Security, abs/1705.10295, [Article]

Sullivan, Dean and Arias, Orlando and Gens, David and Davi, Lucas and Sadeghi, Ahmad-Reza and Jin, Yier (2017):
Execution Integrity with In-Place Encryption.
In: CoRR, abs/1703.02698, [Article]

Brasser, Ferdinand and Davi, Lucas and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2016):
CATT: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
In: Cryptography and Security, [Article]

Sullivan, Dean and Arias, Orlando and Davi, Lucas and Sadeghi, Ahmad-Reza and Jin, Yier (2016):
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
In: Black Hat Europe, [Conference or Workshop Item]

Abera, Tigist and Asokan, N. and Davi, Lucas and Ekberg, Jan-Erik and Nyman, Thomas and Paverd, Andrew and Sadeghi, Ahmad-Reza and Tsudik, Gene (2016):
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Deshotels, Luke and Deaconescu, Razvan and Chiroiu, Mihai and Davi, Lucas and Enck, William and Sadeghi, Ahmad-Reza (2016):
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
In: 23rd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Ghaeini, Hamid Reza and Tippenhauer, Nils Ole (2016):
Hamids: Hierarchical monitoring intrusion detection system for industrial control systems.
In: ACM Workshop on Cyber-Physical Systems Security and Privacy, ACM Conference on Computer and Communications Security (CCS), Austria, ISBN 978-1-4503-4568-2, DOI: 10.1145/2994487.2994492, [Conference or Workshop Item]

Lacoste, Marc and Sousa, Paulo and Neves, Nuno and Miettinen, Markus and Ramos, Fernando M.V. and Vukolic, Marko and Charmet, Fabien and Yaich, Reda and Oborzynski, Krzysztof and Vernekar, Gitesh (2016):
User-Centric Security and Dependability in the Cloud of Clouds.
In: IEEE Cloud Computing Special issue on Cloud Security, 3 (5), pp. 64-75. [Article]

Sadeghi, Ahmad-Reza and Schunter, Matthias and Ibrahim, Ahmad and Conti, Mauro and Neven, Gregory (2016):
SANA: Secure and Scalable Aggregate Network Attestation.
In: 23rd ACM Conference on Computer and Communications Security (CCS) 2016, CCS 2016, [Conference or Workshop Item]

Mohan, Vaishnavi and Othmane, Lotfi Ben (2016):
SecDevOps: Is It a Marketing Buzzword?
In: Proc. of the 11th International Conference on Availability, Reliability and Security (ARES), [Conference or Workshop Item]

Ambrosin, Moreno and Conti, Mauro and Ibrahim, Ahmad and Neven, Gregory and Sadeghi, Ahmad-Reza and Schunter, Matthias (2016):
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016, [Conference or Workshop Item]

Conti, Mauro and Crane, Stephen and Frassetto, Tommaso and Homescu, Andrei and Koppen, Georg and Larsen, Per and Liebchen, Christopher and Perry, Mike and Sadeghi, Ahmad-Reza (2016):
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In: The annual Privacy Enhancing Technologies Symposium (PETS), [Conference or Workshop Item]

Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Tsudik, Gene and Zeitouni, Shaza (2016):
DARPA: Device Attestation Resilient to Physical Attacks.
In: ACM WiSEC 2016, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Dessouky, Ghada (2016):
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
In: ACM WiSec 2016, [Conference or Workshop Item]

Abera, Tigist and Asokan, N. and Davi, Lucas and Koushanfar, Farinaz and Praverd, Andrew and Tsudik, Gene and Sadeghi, Ahmad-Reza (2016):
Things, Trouble, Trust: On Building Trust in IoT Systems.
In: 53rd Design Automation Conference (DAC), [Conference or Workshop Item]

Brasser, Ferdinand and Ganapathy, Vinod and Iftode, Liviu and Kim, Daeyoung and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2016):
Regulating ARM TrustZone Devices in Restricted Spaces.
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), [Conference or Workshop Item]

Fernando, Ruchith and Ranchal, Rohit and An, Byungchan and Othmane, Lotfi Ben and Bhargava, Bharat (2016):
Consumer oriented privacy preserving access control for electronic health records in the cloud.
In: IEEE cloud, [Conference or Workshop Item]

Lettner, Julian and Kollenda, Benjamin and Homescu, Andrei and Larsen, Per and Schuster, Felix and Davi, Lucas and Sadeghi, Ahmad-Reza and Holz, Thorsten and Franz, Michael (2016):
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.

In: USENIX Annual Technical Conference (ATC), [Conference or Workshop Item]

Songhori, Ebrahim and Zeitouni, Shaza and Dessouky, Ghada and Schneider, Thomas and Sadeghi, Ahmad-Reza and Koushanfar, Farinaz (2016):
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
In: 53. Annual Design Automation Conference (DAC'16), pp. 73:1-73:6, ACM, DOI: 10.1145/2897937.2898027, [Conference or Workshop Item]

Sullivan, Dean and Arias, Orlando and Davi, Lucas and Larsen, Per and Sadeghi, Ahmad-Reza and Jin, Yier (2016):
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
In: 53rd Design Automation Conference (DAC), [Conference or Workshop Item]

McLaughlin, Stephen and Konstantinou, Charalambos and Wang, Xueyang and Davi, Lucas and Sadeghi, Ahmad-Reza and Maniatakos, Michail and Karri, Ramesh (2016):
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, 104 (5), pp. 1039-1057. DOI: 10.1109/JPROC.2015.2512235, [Article]

Zeitouni, Shaza and Oren, Yossef and Wachsmann, Christian and Koeberl, Patrick and Sadeghi, Ahmad-Reza (2016):
Remanence Decay Side-Channel: The PUF Case.
In: IEEE Transactions on Information Forensics and Security, 99, DOI: TIFS.2015.2512534, [Article]

Braden, Kjell and Crane, Stephen and Davi, Lucas and Franz, Michael and Larsen, Per and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2016):
Leakage-Resilient Layout Randomization for Mobile Devices.
In: 23rd Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Heuser, Stephan and Negro, Marco and Pendyala, Praveen Kumar and Sadeghi, Ahmad-Reza (2016):
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
In: Financial Crypto 2016, [Conference or Workshop Item]

Heuser, Stephan and Negro, Marco and Pendyala, Praveen Kumar and Sadeghi, Ahmad-Reza (2016):
Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
[Report]

Brasser, Ferdinand and Rasmussen, Kasper and Sadeghi, Ahmad-Reza and Tsudik, Gene (2016):
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: DAC '16, In: Proceedings of the 53nd Annual Design Automation Conference, ACM, [Conference or Workshop Item]

Cam-Winget, Nancy and Sadeghi, Ahmad-Reza and Jin, Yier (2016):
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
In: 53rd Design Automation Conference (DAC), [Conference or Workshop Item]

Heuser, Stephan (2016):
Towards Modular and Flexible Access Control on Smart Mobile Devices.
Darmstadt, Technische Universität Darmstadt, [Ph.D. Thesis]

Miettinen, Markus and Huang, Jialin and Nguyen, Thien Duc and Asokan, N. and Sadeghi, Ahmad-Reza (2016):
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
In: Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16), Darmstadt, Germany, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Armknecht, Frederik (2016):
Towards a Unified Security Model for Physically Unclonable Functions.
In: CT-RSA – Cryptographers' Track at the RSA Conference, [Conference or Workshop Item]

Davi, Lucas; Sadeghi, Ahmad-Reza (2015):
Building Secure Defenses Against Code-Reuse Attacks.
Cham, Springer International Publishing, ISBN: 978-3-319-25544-6, DOI: 10.1007/978-3-319-25546-0, [Book]

Larsen, Per; Brunthaler, Stefan; Davi, Lucas; Sadeghi, Ahmad-Reza; Franz, Michael (2015):
Automated Software Diversity.
In: Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool, DOI: 10.2200/S00686ED1V01Y201512SPT014, [Book]

Ghaeini, Hamid Reza; Akbari, Behzad; Barekatain, Behrang; Trivino Cabrera, Alicia (2015):
Adaptive video protection in large scale peer‐to‐peer video streaming over mobile wireless mesh networks.
In: International Journal of Communication Systems, 18 (29), pp. 2580-2603, UK, DOI: 10.1002/dac.3088, [Article]

Asokan, N.; Brasser, Ferdinand; Ibrahim, Ahmad; Sadeghi, Ahmad-Reza; Schunter, Matthias; Tsudik, Gene; Wachsmann, Christian (2015):
SEDA: Scalable Embedded Device Attestation.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Conti, Mauro; Crane, Stephen; Davi, Lucas; Franz, Michael; Larsen, Per; Liebchen, Christopher; Negro, Marco; Qunaibit, Mohaned; Sadeghi, Ahmad-Reza (2015):
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Crane, Stephen; Volckaert, Stijn; Schuster, Felix; Liebchen, Christopher; Larsen, Per; Davi, Lucas; Sadeghi, Ahmad-Reza; Holz, Thorsten; Sutter, Bjorn De; Franz, Michael (2015):
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Demmler, Daniel; Dessouky, Ghada; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza; Schneider, Thomas; Zeitouni, Shaza (2015):
Automated Synthesis of Optimized Circuits for Secure Computation.
In: 22. ACM Conference on Computer and Communications Security (CCS'15), pp. 1504-1517, ACM, DOI: 10.1145/2810103.2813678, Official URL, [Conference or Workshop Item]

Asokan, N.; Brasser, Ferdinand; Ibrahim, Ahmad; Sadeghi, Ahmad-Reza; Schunter, Matthias; Tsudik, Gene; Wachsmann, Christian (2015):
SEDA – Technical Report.
[Report]

Crane, Stephen; Liebchen, Christopher; Homescu, Andrei; Davi, Lucas; Larsen, Per; Sadeghi, Ahmad-Reza; Brunthaler, Stefan; Franz, Michael (2015):
Return to Where? You Can't Exploit What You Can't Find.
In: Blackhat USA, [Conference or Workshop Item]

Huang, Jialin; Vaudenay, Serge; Lai, Xuejia; Nyberg, Kaisa (2015):
Capacity and Data Complexity in Multidimensional Linear Attack.
In: CRYPTO, [Conference or Workshop Item]

Do, Trinh Minh Tri; Dousse, Olivier; Miettinen, Markus; Gatica-Perez, Daniel (2015):
A probabilistic kernel method for human mobility prediction with smartphones.
In: Pervasive and Mobile Computing, pp. 13-28, DOI: http://dx.doi.org/10.1016/j.pmcj.2014.09.001, [Article]

Arias, Orlando; Davi, Lucas; Hanreich, Matthias; Jin, Yier; Koeberl, Patrick; Paul, Debayan; Sadeghi, Ahmad-Reza; Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension.
In: 52nd Design Automation Conference (DAC), [Conference or Workshop Item]

Brasser, Ferdinand; Koeberl, Patrick; Mahjoub, Brahim El; Sadeghi, Ahmad-Reza; Wachsmann, Christian (2015):
TyTAN: Tiny Trust Anchor for Tiny Devices.
In: 52nd Design Automation Conference (DAC) 2015, [Conference or Workshop Item]

Egert, Rolf; Fischlin, Marc; Gens, David; Jacob, Sven; Senker, Matthias; Tillmans, Jörg (2015):
Privately computing set-union and set-intersection cardinality via bloom filters.
In: Information Security and Privacy (ACISP), pp. 413-430, Springer International, [Article]

Nagy, Marcin; Bui, Thanh Phong; Cristofaro, Emiliano De; Asokan, N.; Ott, Jörg; Sadeghi, Ahmad-Reza (2015):
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
In: ACM WiSEC 2015, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza; Wachsmann, Christian; Waidner, Michael (2015):
Security and Privacy Challenges in Industrial Internet of Things.
In: 52nd Design Automation Conference (DAC) Research, [Conference or Workshop Item]

Songhori, Ebrahim; Sadeghi, Ahmad-Reza; Koushanfar, Farinaz (2015):
Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis.
In: 52nd Design Automation Conference (DAC), [Conference or Workshop Item]

Crane, Stephen; Liebchen, Christopher; Homescu, Andrei; Davi, Lucas; Larsen, Per; Sadeghi, Ahmad-Reza; Brunthaler, Stefan; Franz, Michael (2015):
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
In: 36th IEEE Symposium on Security and Privacy (Oakland), [Conference or Workshop Item]

Schuster, Felix; Tendyck, Thomas; Liebchen, Christopher; Davi, Lucas; Sadeghi, Ahmad-Reza; Holz, Thorsten (2015):
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
In: 36th IEEE Symposium on Security and Privacy (Oakland), [Conference or Workshop Item]

Songhori, Ebrahim; Hussain, Siam; Sadeghi, Ahmad-Reza; Schneider, Thomas; Koushanfar, Farinaz (2015):
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
In: 36. IEEE Symposium on Security and Privacy (IEEE S&P'15), pp. 411-428, IEEE, DOI: 10.1109/SP.2015.32, Official URL, [Conference or Workshop Item]

Bucicoiu, Mihai; Davi, Lucas; Deaconescu, Razvan; Sadeghi, Ahmad-Reza (2015):
XiOS: Extended Application Sandboxing on iOS.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), [Conference or Workshop Item]

Barekatain, Behrang; Khezrimotlagh, Dariush; Aizaini Maarof, Mohd; Ghaeini, Hamid Reza; Ariza Quintana, Alfonso; Trivino Cabrera, Alicia (2015):
Efficient P2P live video streaming over hybrid WMNs using random network coding.
In: Wireless Personal Communications, 4 (80), pp. 1761-1789, Springer US, DOI: 10.1007/s11277-014-2112-5, [Article]

Davi, Lucas; Liebchen, Christopher; Sadeghi, Ahmad-Reza; Snow, Kevin; Monrose, Fabian (2015):
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
In: 22nd Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Busold, Christoph; Heuser, Stephan; Rios, Jon; Sadeghi, Ahmad-Reza; Asokan, Nadarajah (2015):
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
In: Financial Cryptography and Data Security, [Conference or Workshop Item]

Dmitrienko, Alexandra; Heuser, Stephan; Nguyen, Thien Duc; Ramos, Marcos da Silva; Rein, Andre; Sadeghi, Ahmad-Reza (2015):
Market-driven Code Provisioning to Mobile Secure Hardware.
In: Financial Cryptography and Data Security, [Conference or Workshop Item]

Asokan, N.; Gröndahl, Tommi; Nguyen, Hoang Long; Nguyen, Thien Duc; Paverd, Andrew; Pendyala, Praveen Kumar; Sadeghi, Ahmad-Reza; Stobert, Elizabeth; Tamrakar, Sandeep (2015):
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices.
In: CoRR, Official URL, [Article]

Miettinen, Markus; Asokan, N.; Koushanfar, Farinaz; Nguyen, Thien Duc; Rios, Jon; Sadeghi, Ahmad-Reza; Sobhani, Majid; Yellapantula, Sudha (2015):
I know where you are: Proofs of Presence resilient to malicious provers.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza; Davi, Lucas; Larsen, Per (2015):
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? – Keynote -.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), [Conference or Workshop Item]

Wachsmann, Christian; Sadeghi, Ahmad-Reza (2014):
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions.
12, In: Synthesis Lectures on Information Security, Privacy, and Trust, 12, San Rafael, Morgan & Claypool Publishers, ISBN: 9781627055093, DOI: 10.2200/S00622ED1V01Y201412SPT012, [Book]

Habib, Sheikh Mahbub; Ries, Sebastian; Varikkattu, Prabhu; Mühlhäuser, Max (2014):
Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source.
In: Security and Communication Networks, 11 (7), pp. 2185-2200, Wiley & Sons Ltd., ISSN: 1939-0122, DOI: 10.1002/sec.748, Official URL, [Article]

Miettinen, Markus; Asokan, N.; Nguyen, Thien Duc; Sadeghi, Ahmad-Reza; Sobhani, Majid (2014):
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
In: Proc. ACM Conference on Computer and Communications Security, ACM, DOI: http://dx.doi.org/10.1145/2660267.2660334, [Conference or Workshop Item]

Othmane, Lotfi Ben; Angin, Pelin; Weffers, Harold; Bhargava, Bharat (2014):
Extending the Agile Development Approach to Develop Acceptably Secure Software.
In: IEEE Transactions on Dependable and Secure Computing, 6 (11), pp. 497-509, [Article]

Sadeghi, Ahmad-Reza; Brasser, Ferdinand (2014):
Swap and Play: Live Updating Hypervisors and Its Application to Xen.
In: CCSW 2014: The ACM Cloud Computing Security Workshop Proceedings, DOI: http://dl.acm.org/citation.cfm?doid=2664168.2664173, [Conference or Workshop Item]

Dessouky, Ghada; Klaiber, Michael J.; Bailey, Donald G.; Simon, Svenja (2014):
Adaptive Dynamic On-chip Memory Management for FPGA-based Reconfigurable Architectures.
24th International Conference on Field Programmable Logic and Applications (FPL), München, Deutschland, 2014, [Conference or Workshop Item]

Ambrosin, Moreno; Busold, Christoph; Conti, Mauro; Sadeghi, Ahmad-Reza; Schunter, Matthias;Kutylowski, Miroslaw; Vaidya, Jaideep (eds.) (2014):
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security – ESORICS 2014, 8712, In: Lecture Notes in Computer Science, 8712, pp. 76-93, Springer International Publishing, ISBN: 978-3-319-11202-2, DOI: 10.1007/978-3-319-11203-9_5, [Book Section]

Asokan, N.; Ekberg, Jan-Erik; Kostiainen, Kari; Rajan, Anand; Rozas, Carlos; Sadeghi, Ahmad-Reza; Schulz, Steffen; Wachsmann, Christian (2014):
Mobile Trusted Computing.
In: Proceedings of the IEEE, 8 (102), pp. 1189-1206, [Article]

Davi, Lucas; Lehmann, Daniel; Sadeghi, Ahmad-Reza (2014):
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
In: BlackHat USA, [Conference or Workshop Item]

Davi, Lucas; Lehmann, Daniel; Sadeghi, Ahmad-Reza; Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
In: 23rd USENIX Security Symposium, [Conference or Workshop Item]

Heuser, Stephan; Nadkarni, Adwait; Enck, William; Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
In: 23rd USENIX Security Symposium, [Conference or Workshop Item]

Dmitrienko, Alexandra; Liebchen, Christopher; Rossow, Christian; Sadeghi, Ahmad-Reza (2014):
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 4 (18), [Article]

Davi, Lucas; Koeberl, Patrick; Sadeghi, Ahmad-Reza (2014):
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
In: 51st Design Automation Conference (DAC) – Special Session: Trusted Mobile Embedded Computing, [Conference or Workshop Item]

Kong, Joonho; Koushanfar, Farinaz; Pendyala, Praveen; Sadeghi, Ahmad-Reza; Wachsmann, Christian (2014):
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
In: Design Automation Conference (DAC) 2014, pp. 1-6, ACM Press, [Conference or Workshop Item]

Miettinen, Markus; Heuser, Stephan; Kronz, Wiebke; Sadeghi, Ahmad-Reza; Asokan, N. (2014):
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), Kyoto, Japan, DOI: http://dx.doi.org/10.1145/2590296.2590337, [Conference or Workshop Item]

Mustafa, Hossen; Sadeghi, Ahmad-Reza; Schulz, Steffen; Xu, Wenyuan (2014):
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
In: 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), [Conference or Workshop Item]

Davi, Lucas; Lehmann, Daniel; Sadeghi, Ahmad-Reza; Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
[Report]

Koeberl, Patrick; Schulz, Steffen; Sadeghi, Ahmad-Reza; Varadharajan, Vijay (2014):
TrustLite: A Security Architecture for Tiny Embedded Devices.
In: European Conference on Computer Systems (EuroSys), ACM, Amsterdam, Netherlands, DOI: 10.1145/2592798.2592824, [Conference or Workshop Item]

Dmitrienko, Alexandra; Liebchen, Christopher; Rossow, Christian; Sadeghi, Ahmad-Reza (2014):
On the (In)Security of Mobile Two-Factor Authentication.
In: Financial Cryptography and Data Security (FC'14), Springer, [Conference or Workshop Item]

Dmitrienko, Alexandra; Noack, David; Sadeghi, Ahmad-Reza; Yung, Moti (2014):
POSTER: On Offline Payments with Bitcoin.
In: FC'2014: Financial Cryptography and Data Security Conference, [Conference or Workshop Item]

Heuser, Stephan; Nadkarni, Adwait; Enck, William; Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
TUD-CS-2014-0063, [Report]

Senftleben, Marius; Bucicoiu, Mihai; Tews, Erik; Armknecht, Frederik; Katzenbeisser, Stefan; Sadeghi, Ahmad-Reza (2014):
MoP-2-MoP – Mobile private microblogging.
In: Financial Cryptography and Data Security (FC'14), Springer, [Conference or Workshop Item]

Busold, Christoph; Dmitrienko, Alexandra; Wachsmann, Christian (2014):
Key2Share for Authentication Services.
In: SmartCard Workshop, [Conference or Workshop Item]

Ghaeini, Hamid Reza; Akbari, Behzad (2014):
Peer-to-Peer Adaptive Forward Error Correction in Live Video Streaming over Wireless Mesh Network.
In: The 12th International Conference on Wired & Wireless Internet Communications, DOI: 10.1007/978-3-319-13174-0_9, [Conference or Workshop Item]

Noisternig, M.; Hollick, Matthias (2014):
Efficient Solutions for the Authenticated Fragmentation Problem in Delay- and Disruption-Tolerant Networks.
In: Proc. 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM'14), p. 177–185, Montreal, Canada, [Conference or Workshop Item]

Asokan, N. and Davi, Lucas and Dmitrienko, Alexandra and Heuser, Stephan and Kostiainen, Kari and Reshetova, Elena and Sadeghi, Ahmad-Reza (2013):
Mobile Platform Security.
In: Synthesis Lectures on Information Security, Privacy, and Trust, 4, Morgan & Claypool, DOI: 10.2200/S00555ED1V01Y201312SPT009, [Book]

Laurila, Juha and Gatica-Perez, Daniel and Aad, Imad and Blom, Jan and Bornet, Olivier and Do, Trinh Minh Tri and Dousse, Olivier and Eberle, Julien and Miettinen, Markus (2013):
From big smartphone data to worldwide research: The Mobile Data Challenge.
In: Pervasive and Mobile Computing, 9, pp. 752-771. DOI: 10.1016/j.pmcj.2013.07.014, [Article]

Nagy, Marcin and Cristofaro, Emiliano De and Dmitrienko, Alexandra and Asokan, N. and Sadeghi, Ahmad-Reza (2013):
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
In: Annual Computer Security Applications Conference (ACSAC 2013),
New Orleans, Loouisiana, USA, [Conference or Workshop Item]

Armknecht, Frederik and Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian (2013):
A Security Framework for Analysis and Design of Software Attestation.
In: ACM Conference on Computer and Communications Security (CCS), pp. 1-12, ACM Press, [Conference or Workshop Item]

Tews, Erik and Weiner, M. and Massar, M. and Giese, D. and Wieser, W. (2013):
Security analysis of a widely deployed locking system.
Proceedings of the 2013 A, In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 929-940, [Conference or Workshop Item]

Stancill, Blaine and Snow, Kevin and Otterness, Nathan and Monrose, Fabian and Davi, Lucas and Sadeghi, Ahmad-Reza (2013):
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
In: 16th Research in Attacks, Intrusions and Defenses (RAID) Symposium, [Conference or Workshop Item]

Buchmann, Johannes and Nebel, Maxi and Roßnagel, Alexander and Shirazi, Fatemeh and Simo, Hervais and Waidner, Michael (2013):
Personal Information Dashboard: Putting the Individual Back in Control.
Iso Press, ISBN 978-1-61499-294-3 (print) | 978-1-61499-295-0 (online), DOI: 10.3233/978-1-61499-295-0-139, [Book]

Gay, Richard and Mantel, Heiko and Sudbrock, Henning (2013):
An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels.
In: 2nd International Workshop on Quantitative Aspects in Security Assurance, [Conference or Workshop Item]

Wachsmann, Christian (2013):
Trusted and Privacy-Preserving Embedded Systems.
Technische Universität Darmstadt, [Ph.D. Thesis]

Barekatain, Behrang and Khezrimotlagh, Dariush and Aizaini Maarof, Mohd and Ghaeini, Hamid Reza and Salleh, Shaharuddin and Ariza Quintana, Alfonso and Akbari, Behzad and Trivino Cabrera, Alicia (2013):
MATIN: A random network coding based framework for high quality peer-to-peer live video streaming.
In: PloS one, 8 (8), pp. e69844. DOI: 10.1371/journal.pone.0069844, [Article]

Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza (2013):
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
In: 22nd USENIX Security Symposium (USENIX Security '13), USENIX, [Conference or Workshop Item]

Miettinen, Markus and Heuser, Stephan and Kronz, Wiebke and Sadeghi, Ahmad-Reza and Asokan, N. (2013):
ConXsense – Context Sensing for Adaptive Usable Access Control.[Report]

Octeau, Damien and McDaniel, Patrick and Jha, Somesh and Bartel, Alexandre and Bodden, Eric and Klein, Jacques and Le Traon, Yves (2013):
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
In: SEC'13, In: Proceedings of the 22nd USENIX Conference on Security, pp. 543-558, Berkeley, Calif, USENIX Association, ISBN 978-1-931971-03-4, [Book Section]

Oren, Yossef and Sadeghi, Ahmad-Reza and Wachsmann, Christian (2013):
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
In: Lecture Notes on Computer Science (LNCS), 8068, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 107-125, Springer, [Conference or Workshop Item]

Snow, Kevin and Davi, Lucas and Dmitrienko, Alexandra and Liebchen, Christopher and Monrose, Fabian and Sadeghi, Ahmad-Reza (2013):
Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same.
In: BlackHat USA, [Conference or Workshop Item]

Tews, Erik (2013):
How to enable Live Cloning of Virtual Machines using the Xen Hypervisor.[Report]

Bodden, Eric and Tanter, Éric and Inostroza, Milton (2013):
Joint Point Interfaces for Safe and Flexible Decoupling of Aspects.
In: ACM Transactions on Software Engineering and Methodology, 23 (1), [Article]

Buchmann, Johannes (ed.) (2013):
Internet Privacy: Options for adequate realization.
2013 edition, Berlin, Springer Vieweg, ISBN 978-3642379123, [Book]

Aderhold, Markus and Gebhardt, Alexander and Mantel, Heiko (2013):
Choosing a Formalism for Secure Coding: FSM vs. LTL.[Report]

Bleikertz, Sören and Bugiel, Sven and Ideler, Hugo and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2013):
Client-controlled Cryptography-as-a-Service in the Cloud.
In: 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), [Conference or Workshop Item]

Bodden, Eric and Mezini, Mira and Brabrand, Claus and Tolêdo, Társis and Ribeiro, Márcio and Borba, Paulo (2013):
SPLlift – Statically Analyzing Software Product Lines in Minutes Instead of Years.
In: ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013),
[Conference or Workshop Item]

Simo-Fhom, Hervais (2013):
Internet Privacy. Taking opportunities, assessing risks, building trust.
In: Springer Vieweg; 2013, [Article]

Werner, M. and Kaiser, J. and Hollick, Matthias and Weingärtner, E. and Wehrle, K. (2013):
A Blueprint for Switching Between Secure Routing Protocols in Wireless Multihop Networks.
In: Proceedings of the 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM, D-SPAN Workshop), [Conference or Workshop Item]

Alkassar, Ammar and Heuser, Stephan and Stüble, Christian (2013):
Vertrauenswürdige Smartphones: Technologien und Lösungen.
In: 13. Deutscher IT-Sicherheitskongress, [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2013):
Gadge Me If You Can – Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), [Conference or Workshop Item]

Fleischhacker, N. and Günther, F. and Kiefer, F. and Poettering, B. (2013):
Pseudorandom Signatures.
In: >8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 7-10 May, Hangzhou, China, [Article]

Snow, Kevin and Davi, Lucas and Dmitrienko, Alexandra and Liebchen, Christopher and Monrose, Fabian and Sadeghi, Ahmad-Reza (2013):
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (Best Student Paper Award).
In: 34th IEEE Symposium on Security and Privacy (Oakland 2013), [Conference or Workshop Item]

do Carmo, Rodrigo and Hollick, Matthias (2013):
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks.
In: Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy, DOI: 10.1145/2463183.2463187, [Article]

Kocabas, Unal and Koeberl, Patrick and Sadeghi, Ahmad-Reza (2013):
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
In: Conference on Digital Automation and Test Europe (DATE), Interactive Presentation, [Conference or Workshop Item]

Sepehrdad, Pouyan and Susil, Petr and Vaudenay, Serge and Vuagnoux, Martin (2013):
Smashing WEP in a Passive Attack.
In: 20th International Workshop on Fast Software Encryption (FSE), [Conference or Workshop Item]

Busold, Christoph and Dmitrienko, Alexandra and Seudié, Hervé and Taha, Ahmed and Sobhani, Majid and Wachsmann, Christian and Sadeghi, Ahmad-Reza (2013):
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: CODASPY '13, In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 233-242, ACM Press, San Antonio, Texas, USA, ISBN 978-1-4503-1890-7, DOI: 10.1145/2435349.2435382, [Conference or Workshop Item]

Peter, Andreas and Tews, Erik and Katzenbeisser, Stefan (2013):
Efficiently Outsourcing Multiparty Computation under Multiple Keys.
In: Cryptology ePrint Archive, 2013 (13), pp. 1-24. International Association for Cryptologic Research (IACR), [Article]

Ahmed, Sarah and Kaiser, Maximilian and Kreutzer, Michael (2013):
IT-Sicherheitstrends kleiner und mittelständischer Unternehmen.
[Report]

Baecher, Paul and Brzuska, Christina and Mittelbach, Arno (2013):
Reset Indifferentiability and its Consequences.
In: Lecture Notes in Computer Science, In: Advances in Cryptology – ASIACRYPT 2013, pp. 154-173, Springer, [Conference or Workshop Item]

Dagdelen, Ö. and Fischlin, M. and Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in a Quantum World.
In: arXiv:1306.0315, 2013, [Article]

Habib, Sheikh Mahbub and Varadharajan, Vijay and Mühlhäuser, Max (2013):
A Framework for Evaluating Trust of Service Providers in Cloud Marketplaces.
pp. 1963-1965, ACM, Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC'13), Coimbra, Portugal, March 2013, ISBN 978-1-4503-1656-9, DOI: 10.1145/2480362.2480727, [Conference or Workshop Item]

Mittelbach, Arno (2013):
Cryptophia’s Short Combiner for Collision-Resistant Hash Functions (best student paper).
In: Lecture Notes in Computer Science, In: Applied Cryptography and Network Security, pp. 136-153, Springer, [Conference or Workshop Item]

Werthmann, Tim and Hund, Ralf and Davi, Lucas and Sadeghi, Ahmad-Reza and Holz, Thorsten (2013):
PSiOS: Bring Your Own Privacy & Security to iOS Devices (Distinguished Paper Award).
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2012):
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
In: BlackHat Abu Dhabi, [Conference or Workshop Item]

Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza (2012):
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
(TUD-CS-2012-0231), [Report]

Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza (2012):
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
(TUD-CS-2012-0226), [Report]

do Carmo, R. and Werner, M. and Hollick, Matthias (2012):
Signs of a Bad Neighborhood: A Lightweight Metric for Anomaly Detection in Mobile Ad Hoc Networks.
In: Proceedings of the 8th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (ACM Q2SWinet), [Conference or Workshop Item]

Gupta, Aditi and Miettinen, Markus and Asokan, N. and Nagy, Marcin (2012):
Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling.
In: 2012 International Conference on Privacy, Security, Risk and Trust (PASSAT), and 2012 International Confernece on Social Computing (SocialCom), pp. 471 – 480, IEEE, Amsterdam, The Netherlands, ISBN 978-1-4673-5638-1, DOI: 10.1109/SocialCom-PASSAT.2012.60, [Conference or Workshop Item]

Göttert, Norman and Feller, Thomas and Schneider, Michael and Huss, Sorin and Buchmann, Johannes Prouff, Emmanuel and Schaumont, Patrick (eds.) (2012):
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
In: LNCS, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), pp. 512-529, Springer, Leuven, Belgium, ISBN 978-3-642-33026-1, [Conference or Workshop Item]

Katzenbeisser, Stefan and Kocabaş, Ünal and Rožic, Vladimir and Sadeghi, Ahmad-Reza and Verbauwhede, Ingrid and Wachsmann, Christian (2012):
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
In: Lecture Notes in Computer Science (LNCS), 7428, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 283-301, Springer, [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2012):
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schulz, Steffen and Varadharajan, Vijay (2012):
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version).
[Report]

Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Tamrakar, Sandeep and Wachsmann, Christian (2012):
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
In: Lecture Notes in Computer Science (LNCS), 7344, In: International Conference on Trust & Trustworthy Computing (TRUST), pp. 219-238, Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Kocabaş, Ünal and Katzenbeisser, Stefan (2012):
Converse PUF-Based Authentication.
In: International Conference on Trust & Trustworthy Computing (TRUST), Springer, [Conference or Workshop Item]

Seudié, Hervé and Koushanfar, Farinaz and Sadeghi, Ahmad-Reza (2012):
EDA for Secure and Dependable Cybercars: Challenges and Opportunities.
In: ACM/IEEE Design Automation Conference (DAC), [Conference or Workshop Item]

Djatmiko, Mentari and Boreli, Roksana and Seneviratne, Aruna and Ries, Sebastian (2012):
Resources-aware trusted node selection for content distribution in mobile ad hoc networks.
In: Wireless Networks, Springer US, 18, pp. 1-14. DOI: 10.1007/s11276-012-0505-5, [Article]

Jiang, Xuxian and Grace, Michael and Sadeghi, Ahmad-Reza and Zhou, Wu (2012):
Unsafe Exposure Analysis of Mobile In-App Advertisements.
In: to appear at WiSec, ACM, [Conference or Workshop Item]

Schulz, Steffen and Sadeghi, Ahmad-Reza and Zhdanova, Maria and Xu, Wenyuan and Mustafa, Hossen and Varadharajan, Vijay (2012):
Tetherway: A Framework for Tethering Camouflage.
In: Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), ACM Press, Tuscon, Arizona, ISBN 978-1-4503-1265-3, [Conference or Workshop Item]

Wachsmann, Christian and Sadeghi, Ahmad-Reza and Schulz, Steffen (2012):
Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions.
In: Secure Smart Embedded Devices, Platforms and Applications, pp. 429-449, Springer, [Book Section]

Alkassar, Ammar and Schulz, Steffen and Stüble, Christian (2012):
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), 2012 (3), pp. 175-179. DOI: 10.1007/s11623-012-0060-3, [Article]

Bessani, Alysson and Abbadi, Imad M. and Bugiel, Sven and Cesena, Emanuele and Deng, Mina and Gröne, Michael and Marnau, Ninja and Nürnberger, Stefan and Pasin, Marcelo and Schirmer, Norbert Petcu, Dana and Vazquez-Poletti, Jose Luis (eds.) (2012):
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
In: European research activities in cloud computing, pp. 151-177, New Castle upon Tyne, Cambridge Scholars Publishing, ISBN 978-1-44383-550-3, [Book Section]

Das, Amitabh and Kocabaş, Ünal and Sadeghi, Ahmad-Reza and Verbauwhede, Ingrid (2012):
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
In: Conference on Digital Automation and Test Europe (DATE), [Conference or Workshop Item]

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza and Shastry, Bhargava (2012):
Towards Taming Privilege-Escalation Attacks on Android.
In: 19th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2012):
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
In: 19th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Schulz, Steffen and Brasser, Ferdinand and Filyanov, Atanas (2012):
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution.
In: LNCS, In: Financial Cryptography and Data Security (FC), Springer, [Conference or Workshop Item]

Van Herrewege, Anthony and Katzenbeisser, Stefan and Maes, Roel and Peeters, Roel and Sadeghi, Ahmad-Reza and Verbauwhede, Ingrid and Wachsmann, Christian (2012):
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
In: Lecture Notes in Computer Science (LNCS), 7397, In: Financial Cryptography (FC) 2012, pp. 374-389, Springer, [Conference or Workshop Item]

Bodden, Eric and Thies, Andreas (2012):
RefaFlex: Safer Refactorings for Reflective Java Programs.
In: International Symposium on Software Testing and Analysis (ISSTA 2012), [Conference or Workshop Item]

Gupta, Aditi and Miettinen, Markus and Nagy, Marcin and Asokan, Nadarajah and Wetzel, Alexandre (2012):
PeerSense: Who is near you?
In: Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 516-518, Lugano, Switzerland, ISBN 978-1-4673-0905-9, DOI: 10.1109/PerComW.2012.6197553, [Conference or Workshop Item]

Laurila, Juha and Gatica-Perez, Daniel and Aad, Imad and Blom, Jan and Bornet, Olivier and Do, Trinh-Minh-Tri and Dousse, Olivier and Eberle, Julien and Miettinen, Markus (2012):
The Mobile Data Challenge: Big Data for Mobile Computing Research.
In: Proceedings of the Workshop on the Nokia Mobile Data Challenge, in Conjunction with the 10th International Conference on Pervasive Computing, [Conference or Workshop Item]

Mittelbach, Arno (2012):
Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output.
In: Lecture Notes in Computer Science, In: Security and Cryptography for Networks, pp. 522-539, Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schulz, Steffen and Varadharajan, Vijay Foresti, Sara and Yung, Moti and Martinelli, Fabio (eds.) (2012):
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: Lecture Notes in Computer Science, In: European Symposium on Research in Computer Science (ESORICS), pp. 253-270, Berlin, Heidelberg, Springer Verlag, ISBN 978-3-642-33166-4, [Book Section]

Schreiner, Steffen and Grigoras, Costin and Litmaath, Maarten and Betev, Latchezar and Buchmann, Johannes (2012):
Certified Grid Job Submission in the ALICE Grid Services.
In: Open Access Journal of Physics: Conference Series (JPCS), International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2012, [Article]

Boneh, Dan and Dagdelen, Özgür and Fischlin, Marc and Lehmann, Anja and Schaffner, Christian and Zhandry, Mark (2011):
Random Oracles in a Quantum World.
In: 17th International Conference on Theory and Application of Cryptology and Information Security, [Conference or Workshop Item]

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza and Shastry, Bhargava (2011):
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
In: 18th ACM Conference on Computer and Communications Security (CCS'11), ACM, [Conference or Workshop Item]

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Heuser, Stephan and Sadeghi, Ahmad-Reza and Shastry, Bhargava (2011):
Practical and Lightweight Domain Isolation on Android.
In: Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM), ACM Press, [Conference or Workshop Item]

Bugiel, Sven and Davi, Lucas and Schulz, Steffenand Sadeghi, Ahmad-Reza and Zhang, Xinwen (eds.) (2011):
Scalable Trust Establishment with Software Reputation.
In: Workshop on Scalable Trusted Computing (STC), ACM Press, Chicago, Illinois, USA, [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2011):
POSTER: Control-Flow Integrity for Smartphones.
In: 18th ACM Conference on Computer and Communications Security (CCS'11), ACM, [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Kowalski, Christoph and Winandy, Marcel (2011):
Trusted Virtual Domains on OKL4: Secure Information Sharing on Smartphones.
In: Proceedings of the 6th ACM Workshop on Scalable Trusted Computing (STC), ACM Press, [Conference or Workshop Item]

Kocabaş, Ünal and Schulz, Steffen (2011):
POSTER: Practical Embedded Remote Attestation Using Physically Unclonable Functions.
In: ACM Conference on Computer and Communications Security (CCS), pp. 797-800, ACM Press, [Conference or Workshop Item]

Schneider, Michael and Göttert, Norman and Preneel, Bart and Takagi, Tsuyoshi (eds.) (2011):
Random Sampling for Short Lattice Vectors on Graphics Cards.
In: LNCS, In: Workshop on Cryptographic Hardware and Embedded Systems 2011 (CHES 2011), pp. 160-175, Springer, Nara, Japan, DOI: 10.1007/978-3-642-23951-9_11, [Conference or Workshop Item]

Shen, Yiyun and Miettinen, Markus and Moen, Pirjo and Kutvonen, Lea (2011):
Privacy Preservation Approach in Service Ecosystems.
In: 15th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW), pp. 283 – 292, IEEE, Helsinki, Finland, ISBN 978-1-4577-0869-5, DOI: 10.1109/EDOCW.2011.59, [Conference or Workshop Item]

Shirazi, Fatemeh and Neumann, Stephan and Ciolacu, Ines and Volkamer, Melanie (2011):
Robust Electronic Voting: Introducing robustness in Civitas.
In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011, pp. 47 -55, Trento, Italy, DOI: 10.1109/REVOTE.2011.6045915, [Conference or Workshop Item]

Filyanov, Atanas and McCune, Jonathan and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
In: 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2011), Hong Kong, [Conference or Workshop Item]

Ries, Sebastian and Habib, Sheikh Mahbub and Varadharajan, Vijay and Mühlhäuser, Max (2011):
CertainLogic: A Logic for Modeling Trust and Uncertainty (Short Paper).
Lecture Notes in Computer, In: In Proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST 2011), pp. 254-261, Springer Berlin Heidelberg, Pittsburgh, USA, ISBN 978-3-642-21599-5, DOI: 10.1007/978-3-642-21599-5_19, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian (2011):
Lightweight Remote Attestation Using Physical Functions.
In: ACM Conference on Wireless Network Security (WiSec), pp. 109-114, ACM Press, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian (2011):
Lightweight Remote Attestation using Physical Functions (Extended Version).
(TR-2011-06-01, Technical ), [Report]

Sadeghi, Ahmad-Reza and Wachsmann, Christian (2011):
Location Privacy in RFID Systemen.
In: Digma – Zeitschrift für Datenrecht und Informationssicherheit, 11 (2), pp. 70-75. [Article]

Wahid, Khan (2011):
An ID-based mutually authenticated edge-to-edge security architecture for bridged provider networks to secure layer-2 communications.
Universitat Pompeu Fabra, [Ph.D. Thesis]

Armknecht, Frederik and Maes, Roel and Sadeghi, Ahmad-Reza and Standaert, François-Xavier and Wachsmann, Christian (2011):
A Formal Foundation for the Security Features of Physical Functions.
In: IEEE Symposium on Security and Privacy (SSP), pp. 397-412, IEEE Computer Society, [Conference or Workshop Item]

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza (2011):
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.
(TR-2011-04), [Report]

Habib, Sheikh Mahbub and Varadharajan, Vijay and Ries, Sebastian and Mühlhäuser, Max (2011):
CertainLogic: A Logic for Modeling Trust and Uncertainty (Full version).
(27 pages), [Report]

Davi, Lucas and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
In: 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), [Conference or Workshop Item]

Li, Shujun and Sadeghi, Ahmad-Reza and Heisrath, Soeren and Schmitz, Roland and Ahmad, Junaid Jameel (2011):
hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers.
In: 15th International Conference on Financial Cryptography and Data Security (FC), St. Lucia, [Conference or Workshop Item]

Dmitrienko, Alexandra and Hadzic, Zecir and Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
A Security Architecture for Accessing Health Records on Mobile Phones.
In: HEALTHINF'2011: Proceedings of the 4th International Conference on Health Informatics,
Rome, Italy, [Conference or Workshop Item]

Kneževic, M. and Kobayashi, K. and Ikegami, J. and Matsuo, S. and Satoh, A. and Kocabas, U. and Fan, J. and Katashita, T. and Sugawara, T. and Sakiyama, K. and Verbauwhede, I. and Ohta, K. and Homma, N. and Aoki, T. (2011):
Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates.
In: IEEE Transactions on VLSI journal, [Article]

Nürnberger, Stefan and Steinebach, Martin and Zmudzinski, Sascha (2011):
Re-synchronizing audio watermarking after nonlinear time stretching.
In: Proceeding of Electronic Imaging 2011 – Media Watermarking, Security, and Forensics XIII,
[Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2011):
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED), [Book Section]

Dmitrienko, Alexandra and Gessner, Dennis and Sadeghi, Ahmad-Reza and Schulz, Steffen and Stüble, Christian and Ullmann, Markus (2011):
Trusted embedded System Operating System (TeSOS) – Study and Design.
[Other]

Dmitrienko, Alexandra and Hadzic, Zecir and Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
Securing the Access to Electronic Health Records on Mobile Phones.
In: Biomedical Engineering Systems and Technologies, [Conference or Workshop Item]

Gupta, Aditi and Miettinen, Markus and Asokan, N. (2011):
Using context-profiling to aid in access control decisions on mobile devices.
In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 310 – 312,
Seattle, WA, USA, ISBN 978-1-61284-938-6, DOI: 10.1109/PERCOMW.2011.5766891, [Conference or Workshop Item]

Katzenbeisser, Stefan and Kocabaş, Ünal and van der Leest, Vincent and Sadeghi, Ahmad-Reza and Schrijen, Geert-Jan and Schröder, Heike and Wachsmann, Christian (2011):
Recyclable PUFs: Logically Reconfigurable PUFs.
In: Lecture Notes in Computer Science (LNCS), 6917, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 374-389, Springer, [Conference or Workshop Item]

Katzenbeisser, Stefan and Kocabaş, Ünal and van der Leest, Vincent and Sadeghi, Ahmad-Reza and Schrijen, Geert-Jan and Wachsmann, Christian (2011):
Recyclable PUFs: logically reconfigurable PUFs.
In: Journal of Cryptographic Engineering, 1 (3), pp. 177-186. [Article]

Armknecht, Frederik and Sadeghi, Ahmad-Reza and Scafuro, Alessandra and Visconti, Ivan and Wachsmann, Christian (2010):
Impossibility Results for RFID Privacy Notions.
In: LNCS, 6480, In: Transactions on Computational Science IX, pp. 39-63, Springer, [Conference or Workshop Item]

Bugiel, Sven and Dmitrienko, Alexandra and Kostiainen, Kari and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
TruWalletM: Secure Web Authentication on Mobile Platforms.
In: Proceedings of INTRUST 2010 The Second International Conference on Trusted Systems, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Li, Shujun and Shah, Syed Amier Haider and Khan, Muhammad Asad Usman and Khayam, Syed Ali and Schmitz, Roland (2010):
Breaking e-Banking CAPTCHAs.
In: 26th Annual Computer Security Applications Conference (ACSAC 2010), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Preneel, Bart and Pfitzmann, Andreas and Moran, Tal and Maier-Rabler, Ursula and Kutylowski, Miroslaw and Klonowski, Marek and Guerses, Seda and Danezis, George and Borisov, Nikita and Baer, Walter (2010):
Machiavelli Confronts 21st Century Digital Technology: Democracy in a Network Society.
[Conference or Workshop Item]

Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Securing the E-Health Cloud.
In: 1st ACM International Health Informatics Symposium (IHI 2010), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Naccache, David (2010):
Towards Hardware-Intrinsic Security.
In: Information Security and Cryptography, [Conference or Workshop Item]

Bugiel, Sven and Ekberg, Jan-Erik (2010):
Implementing an Application-Specific Credential Platform Using Late-Launched Mobile Trusted Module.
In: 5th Annual Workshop on Scalable Trusted Computing (STC 2010), [Conference or Workshop Item]

Checkoway, Stephen and Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Shacham, Hovav and Winandy, Marcel (2010):
Return-Oriented Programming without Returns.
In: CCS '10, In: Proceedings of the 17th ACM conference on Computer and communications security, pp. 559--572, ACM, Chicago, Illinois, USA, ISBN 978-1-4503-0245-6, DOI: http://doi.acm.org/10.1145/1866307.1866370, [Conference or Workshop Item]

Chen, Liqun and Dietrich, Kurt and Löhr, Hans and Sadeghi, Ahmad-Reza and Wachsmann, Christian and Winter, Johannes (2010):
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
In: LNCS, 6531, In: Information Security Conference (ISC), pp. 84-98, Springer, [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Privilege Escalation Attacks on Android.
In: ISC 2010: Proceedings of the 13th Information Security Conference, Boca Raton, Florida, USA, [Conference or Workshop Item]

Henecka, Wilko and Kögl, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas and Wehrenberg, Immo (2010):
TASTY: Tool for Automating Secure Two-partY computations.
In: Proceedings of the 17. ACM Conference on Computer and Communications Security (CCS'10), pp. 451-462, Chicago, Illinois, ACM, CCS'10, October 04-08 2010, ISBN 978-1-4503-0245-6, DOI: 10.1145/1866307.1866358, [Conference or Workshop Item]

Löhr, Hans and Pöppelmann, Thomas and Rave, Johannes and Steegmanns, Martin and Winandy, Marcel (2010):
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments.
In: 5th Annual Workshop on Scalable Trusted Computing (STC 2010), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Mukherjee, Biswanath and Ghosal, Dipak and Liu, Yali (2010):
Video Streaming Forensic – Content Identification with Traffic Snooping.
In: 13th Information Security Conference (ISC 2010), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Visconti, Ivan and Wachsmann, Christian (2010):
Enhancing RFID Security and Privacy by Physically Unclonable Functions.
In: Information Security and Cryptography, In: Towards Hardware-Intrinsic Security: Foundations and Practice, pp. 281-307, Springer, [Book Section]

Järvinen, Kimmo and Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas (2010):
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
In: 12. International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10), pp. 383-397, Springer, DOI: 10.1007/978-3-642-15031-9_26, [Conference or Workshop Item]

Nürnberger, Stefan and Feller, Thomas and Huss, Sorin (2010):
RAY – A Secure Microkernel Architecture.
In: IEEE Privacy Security and Trust 2010 (PST2010), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Wachsmann, Christian (2010):
Trusted Computing.
In: Handbook of Financial Cryptography and Security, pp. 221-256, CRC Press, [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Return-Oriented Programming without Returns on ARM.
(HGI-TR-2010-002), [Report]

Armknecht, Frederik and Chen, Liqun and Sadeghi, Ahmad-Reza and Wachsmann, Christian (2010):
Anonymous Authentication for RFID Systems.
In: LNCS, 6370, In: Workshop on RFID Security (RFIDSec), pp. 158-175, Springer, [Conference or Workshop Item]

Armknecht, Frederik and Ghosal, Dipak and Katzenbeisser, Stefan and Liu, Yali and Sadeghi, Ahmad-Reza and Schulz, Steffen (2010):
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
In: Information Hiding Conference (IH), Springer, [Conference or Workshop Item]

Armknecht, Frederik and Sadeghi, Ahmad-Reza and Visconti, Ivan and Wachsmann, Christian (2010):
On RFID Privacy with Mutual Authentication and Tag Corruption.
In: LNCS, 6123, In: International Conference on Applied Cryptography and Network Security (ACNS), pp. 493-510, Springer, [Conference or Workshop Item]

Kostiainen, Kari and Dmitrienko, Alexandra and Ekberg, Jan-Erik and Sadeghi, Ahmad-Reza and Asokan, N. (2010):
Key Attestation from Trusted Execution Environments.
In: TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, p. 30,
Berlin, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Löhr, Hans and Cesena, Emanuele and Ramunno, Gianluca and Vernizzi, Davide (2010):
Anonymous Authentication with TLS and DAA.
In: TRUST2010, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schneider, Thomas and Winandy, Marcel (2010):
Token-Based Cloud Computing – Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
In: 3. International Conference on Trust and Trustworthy Computing (TRUST'10) – Workshop on Trust in the Cloud, pp. 417-429, Springer, DOI: 10.1007/978-3-642-13869-0_30, [Conference or Workshop Item]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5, pp. 289-298. [Article]

Sadeghi, Ahmad-Reza and Li, Shujun and Khayam, Syed Ali and Schmitz, Roland (2010):
Breaking a Virtual Password System Based on Randomized Linear Generation Functions.
In: IEEE ICC 2010 – Communication and Information System Security Symposium ('ICC'10 CISS'), [Conference or Workshop Item]

Wahid, Khan (2010):
Maximizing Ethernet Security by Switch-based Single Secure Domain.
In: 7th International Conference on Information Technology: New Generations (ITNG 2010), Las Vegas, USA, April 2010. Page(s): 774 – 778, DOI: 10.1109/ITNG.2010.143, IEEE Xplore Digital Library, [Conference or Workshop Item]

Wahid, Khan (2010):
Rethinking The Link Security Approach to Manage Large Scale Ethernet Network.
In: 17th IEEE Workshop on Local and Metropolitan Area Networks (LANMAN 2010), New Jersey, USA, May 2010. Page(s): 1 – 6, DOI: 10.1109/LANMAN.2010.5507143, IEEE Xplore Digital Library, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Visconti, Ivan and Wachsmann, Christian (2010):
PUF-Enhanced RFID Security and Privacy.
In: Workshop on Secure Component and System Identification (SECSI), [Conference or Workshop Item]

Davi, Lucas and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
(HGI-TR-2010-001), [Report]

Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Patterns for Secure Boot and Secure Storage in Computer Systems.
In: 4th International Workshop on Secure systems methodologies using patterns (SPattern 2010),, [Conference or Workshop Item]

Implementation of Binary Edwards Curves for very-constrained Devices.
In: IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP), [Article]

Sadeghi, Ahmad-Reza and Stüble, Christian and Cabuk, Serdar and Dalton, Chris and Eriksson, Konrad and Kuhlmann, Dirk and Ramasamy, Hari Govind and Ramunno, Gianluca and Schunter, Matthias (2010):
Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers.
In: Journal of Computer Security, 18 (1), pp. 89-121. [Article]

Schulz, Steffen and Sadeghi, Ahmad-Reza (2010):
Extending IPsec for Efficient Remote Attestation.
LNCS, In: Financial Cryptography and Data Security (FC), Springer, [Conference or Workshop Item]

Järvinen, Kimmo and Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas (2010):
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens.
In: Information Security and Cryptography, In: Towards Hardware Intrinsic Security: Foundation and Practice, pp. 367-386, Springer-Verlag Berlin Heidelberg, DOI: 10.1007/978-3-642-14452-3_17, [Book Section]

Kobayashi, K. and Ikegami, J. and Kneževic, M. and Guo, X. and Matsuo, S. and Huang, S. and Nazhandali, L. and Kocabas, U. and Fan, J. and Satoh, A. and Verbauwhede, I. and Sakiyama, K. and Ohta, K. (2010):
Prototyping Platform for Performance Evaluation of SHA-3 Candidates.
In: IEEE International Workshop on Hardware-Oriented Security and Trust – HOST 2010, pp. 60-63, [Conference or Workshop Item]

Miettinen, Markus and Asokan, N. (2010):
Towards security policy decisions based on context profiling.
In: AISec '10, In: Proceedings of the 3rd ACM workshop on Artificial intelligence and security (AISec '10), pp. 19-23, ACM, Chicago, Illinois, USA, ISBN 978-1-4503-0088-9, DOI: 10.1145/1866423.1866428, [Conference or Workshop Item]

Catuogno, Luigi and Dmitrienko, Alexandra and Eriksson, Konrad and Kuhlmann, Dirk and Ramunno, Gianluca and Sadeghi, Ahmad-Reza and Schulz, Steffen and Schunter, Matthias and Winandy, Marcel and Zhan, Jing (2009):
Trusted Virtual Domains – Design, Implementation and Lessons Learned.
In: International Conference on Trusted Systems (INTRUST), Springer, [Conference or Workshop Item]

Kokkinen, Heikki and Heikkinen, Mikko and Miettinen, Markus (2009):
Post-Payment Copyright System versus Online Music Shop: Business Model and Privacy.
In: International Journal on Advances in Security, 2 (2-3), pp. 112-128. [Article]

Sadeghi, Ahmad-Reza and Armknecht, Frederik and Maes, Roel and Sunar, Berk and Tuyls, Pim (2009):
Memory Leakage-Resilient Encryption based on Physically Unclonable Functions.
In: ASIACRYPT'09, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Li, Shujun and Asghar, Hassan Jameel and Pieprzyk, Josef and Schmitz, Roland and Wang, Huaxiong (2009):
On the Security of PAS (Predicate-based Authentication Service).
In: Annual Computer Security Applications Conference (ACSAC’09), 2009., [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Visconti, Ivan and Wachsmann, Christian (2009):
Anonymizer-Enabled Security and Privacy for RFID.
In: LNCS, 5888, In: International Conference on Cryptology and Network Security (CANS), pp. 134-153, Springer, [Conference or Workshop Item]

Thiemert, Stefan and Nürnberger, Stefan and Steinebach, Martin and Zmudzinski, Sascha (2009):
Security of robust audio hashes.
In: IEEE International Workshop on Information Forensics and Security, WIFS 2009, London, UK, London, UK, [Conference or Workshop Item]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
Transparent Mobile Storage Protection in Trusted Virtual Domains.
In: 23rd Large Installation System Administration Conference (LISA '09), pp. 159-172, [Conference or Workshop Item]

Ekberg, Jan-Erik and Bugiel, Sven (2009):
Trust in a Small Package: Minimized MRTM Software Implementation for Mobile Secure Environments.
In: 4th Annual Workshop on Scalable Trusted Computing (STC2009), [Conference or Workshop Item]

Gajek, Sebastian and Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
In: 4th ACM Workshop on Scalable Trusted Computing, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schneider, Thomas (2009):
Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics (Poster).
Bochum, Section Days of Ruhr-University Bochum Research School, Bochum, 6. November 2009, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Zhan, Jing and Korthaus, René (2009):
A Practical Property-based Bootstrap Architecture.
In: ACMSTC'09, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Vishik, Claire and Verbauwhede, Ingrid (2009):
Future of Assurance: Ensuring that a System is Trustworthy.
In: ISSE'09, [Conference or Workshop Item]

Bangerter, Endre and Briner, Thomas and Henecka, Wilko and Krenn, Stephan and Sadeghi, Ahmad-Reza and Schneider, Thomas (2009):
Automatic Generation of Sigma-Protocols.
In: 6. European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09), pp. 67-82, Springer, DOI: 10.1007/978-3-642-16441-5_5, [Conference or Workshop Item]

Davi, Lucas and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
In: STC '09, In: Proceedings of the 2009 ACM workshop on Scalable trusted computing, pp. 49--54, ACM, Chicago, Illinois, USA, ISBN 978-1-60558-788-2, DOI: http://doi.acm.org/10.1145/1655108.1655117, [Conference or Workshop Item]

Liu, Yali and Ghosal, Dipak and Armknecht, Frederik and Sadeghi, Ahmad-Reza and Schulz, Steffen and Katzenbeisser, Stefan (2009):
Hide and Seek in Time – Robust Covert Timing Channels.
In: LNCS, In: European Symposium on Research in Computer Security (ESORICS), pp. 120-135, Springer, ISBN 978-3-642-04443-4, [Conference or Workshop Item]

Fischer, Thomas and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
A Pattern for Secure Graphical User Interface Systems.
In: 3rd International Workshop on Secure systems methodologies using patterns (SPattern'09), Proceedings of the 20th International Workshop on Database and Expert Systems Applications, pp. 186-190, IEEE, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Visconti, Ivan and Wachsmann, Christian (2009):
Location Privacy in RFID Applications.
In: LNCS, 5599, In: Privacy in Location-Based Applications: Research Issues and Emerging Trends, pp. 127-150, Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Kursawe, Klaus and Schellekens, Dries and Skoric, Boris and Tuyls, Pim (2009):
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage.
In: 2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Visconti, Ivan and Wachsmann, Christian (2009):
Enhancing RFID Security and Privacy by Physically Unclonable Functions (Extended Abstract).
In: Dagstuhl Seminar Proceedings, In: Foundations for Forgery-Resilient Cryptographic Hardware, pp. 10-11, Schloss Dagstuhl, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Visconti, Ivan and Wachsmann, Christian (2009):
Efficient RFID Security and Privacy with Anonymizers.
In: Workshop on RFID Security (RFIDSec), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
Einsatz von Sicherheitskernen und Trusted Computing.
In: D-A-CH Security, [Conference or Workshop Item]

Löhr, Hans and Sadeghi, Ahmad-Reza and Stüble, Christian and Weber, Marion and Winandy, Marcel (2009):
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
In: LNCS, 5471, In: Proceedings of the 2nd International Conference on Trusted Computing, pp. 45-62, Springer, [Conference or Workshop Item]

Löhr, Hans and Sadeghi, Ahmad-Reza and Vishik, Claire and Winandy, Marcel (2009):
Trusted Privacy Domains – Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
In: LNCS, 5451, In: 5th Information Security Practice and Experience Conference (ISPEC'09), pp. 396-407, Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Armknecht, Frederik and Tuyls, Pim and Maes, Roel and Sunar, Berk (2009):
Physically Unclonable Pseudorandom Functions.
In: Poster session of Advances in Cryptology – EUROCRYPT, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schulz, Steffen (2009):
Secure VPNs for Trusted Computing Environments.
In: International Conference on Trusted Computing (TRUST), Springer, Oxford, UK, [Conference or Workshop Item]

Lee, Y. K. and Batina, L. and Fan, J. and Karaklajic, D. and Kneževic, M. and Kocabas, U. and Rožic, V. and Verbauwhede, I. (2009):
Tiny Public-Key Security Processor.
In: ISSCC09 Student Forum, [Article]

Sadeghi, Ahmad-Reza and Bangerter, Endre and Barbosa, Manuel and Bernstein, Daniel and Damgård, Ivan and Page, Dan and Pagter, Jakob and Sovio, Sampo (2009):
Using Compilers to Enhance Cryptographic Product Development.
In: Information Security Solutions Europe (ISSE), [Conference or Workshop Item]

Halonen, Perttu and Miettinen, Markus and Hätönen, Kimmo and Iliadis, L. and Vlahavas, I. and Bramer, M. (eds.) (2009):
Computer Log Anomaly Detection Using Frequent Episodes.
In: IFIP International Federation for Information Processing, 296, In: Artificial Intelligence Applications and Innovations III, pp. 417-422, Springer US, ISBN 978-1-4419-0220-7, DOI: 10.1007/978-1-4419-0221-4_49, [Book Section]

Rupp, Andy and Leander, Gregor and Bangerter, Endre and Dent, Alexander and Sadeghi, Ahmad-Reza (2008):
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
In: Advances in Cryptology – ASIACRYPT 2008, [Conference or Workshop Item]

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark and Pereira, Olivier (2008):
Universally Composable Security Analysis of TLS.
In: Second Conference on Provable Security (ProvSec), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Armknecht, Frederik and Gasmi, Yacine and Ramunno, Gianluca and Vernizzi, Davide and Stewin, Patrick and Unger, Martin (2008):
An Efficient Implementation of Trusted Channels Based on OpenSSL.
In: ACMSTC 2008, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Blundo, Carlo and Persiano, Giuseppe and Visconti, Ivan (2008):
Improved Security Notions and Protocols for Non-Transferable Identification.
In: 13th European Symposium on Research in Computer Security (ESORICS), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Visconti, Ivan and Wachsmann, Christian (2008):
User Privacy in Transport Systems Based on RFID E-Tickets.
In: International Workshop on Privacy in Location-Based Applications (PiLBA), Malaga, Spain, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Winandy, Marcel and Stüble, Christian and Husseiki, Rani and Gasmi, Yacine and Stewin, Patrick and Unger, Martin (2008):
Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains.
In: 3rd ACM Workshop on Scalable Trusted Computing, [Conference or Workshop Item]

Armknecht, Frederik and Furukawa, Jun and Kurosawa, Kaoru (2008):
A Universally Composable roup Key Exchange Protocol with Minimum Communication Effort.
In: Sixth Conference on Security and Cryptography for Networks (SCN 2008), [Conference or Workshop Item]

Gasmi, Yacine and Hessmann, Christian and Pittenauer, Martin and Winandy, Marcel (2008):
Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis.
In: LNI, 1, In: INFORMATIK 2008, Beherrschbare Systeme – dank Informatik, Band 1, Beiträge der 38. Jahrestagung der Gesellschaft für Informatik e.V. (GI), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Bangerter, Endre and Djackov, Maksim (2008):
A Demonstrative Ad-hoc Attestation System.
In: Information Security Conference 2008 (ISC'08), Taipei, Taiwan, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Löhr, Hans and Chen, Liqun and Manulis, Mark (2008):
Property-Based Attestation without a Trusted Third Party.
In: Information Security Conference (ISC'08), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2008):
Property-Based TPM Virtualization.
In: LNCS, In: Information Security, 11th International Conference (ISC 2008), pp. 1-16, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Gajek, Sebastian and Gröbert, Felix and Birk, Dominik (2008):
A Forensic Framework for Tracing Phishers.
In: LNCS, Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Shokrollahi, Jamshid and Bösch, Christoph and Guajardo, Jorge and Tuyls, Pim (2008):
Efficient Helper Data Key Extractor on FPGAs.
In: Workshop on Cryptographic Hardware and Embedded Systems 2008 (CHES 2008), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Blundo, Carlo and Persiano, Giuseppe and Visconti, Ivan (2008):
Resettable and Non-Transferable Chip Authentication for E-Passports.
In: RFIDSec 2008, [Conference or Workshop Item]

Armknecht, Frederik and Mirzadeh, Shahab and Tafazolli, Rahim and Pallares, Jordi Jaen and Afifi, Hossam (2008):
CPFP: An efficient key management scheme for large scale personal networks.
In: IEEE ISWPC 2008, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Armknecht, Frederik and Löhr, Hans and Manulis, Mark and Escalante, Alberto (2008):
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
In: 4th Information Security Practice and Experience Conference (ISPEC 2008), Sydney, Australia, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, André and Wolf, Marko and Asokan, N. (2008):
Securing Peer-to-Peer Distributions for Mobile Devices.
4th Information Security Practice and Experience Conference (ISPEC 2008), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Osterhues, André and Wolf, Marko and Asokan, Nadarajah (2008):
Securing Peer-to-Peer Distributions for Mobile Devices.
In: 4th Information Security Practice and Experience Conference (ISPEC 2008), Sydney, Australia, [Conference or Workshop Item]

Armknecht, Frederik and Westhoff, Dirk and Girao, Joao and Hessler, Alban (2008):
A life-time optimized end-to-end encryption scheme for sensor networks allowing in-networking processing.
In: Computer Communications Journal, 31 (4), pp. 734-749. [Article]

Sadeghi, Ahmad-Reza and Blundo, Carlo and Persiano, Giuseppe and Visconti, Ivan (2008):
Identification Protocols Revisited – Episode I: E-Passports.
e-crypt workshop on Secure Component and System Identification (SECSI), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Blundo, Carlo and Persiano, Giuseppe and Visconti, Ivan (2008):
Identification Protocols Revisited – Episode I: E-Passports.
In: e-crypt workshop on Secure Component and System Identification (SECSI), [Conference or Workshop Item]

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark (2008):
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), [Conference or Workshop Item]

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark (2008):
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza (2008):
Trusted Computing—State of the Art and Challenges.
In: LNCS, In: SOFSEM 2008, Springer, [Conference or Workshop Item]

Seitz, Katja (2008):
Sicheres Padding für RSA.
Johann W. Goethe University Frankfurt, [Master Thesis]

Asokan, N. and Gasmi, Yacine and Sadeghi, Ahmad-Reza and Stewin, Patrick and Unger, Martin (2007):
Beyond Secure Channels.
pp. 30-40, ACM Press, ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), [Conference or Workshop Item]

Eisenbarth, Thomas and Güneysu, Tim and Paar, Christof and Sadeghi, Ahmad-Reza and Schellekens, Dries and Wolf, Marko (2007):
Reconfigurable Trusted Computing in Hardware.
pp. 15-25, ACM Press, ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), [Conference or Workshop Item]

Paar, Christof and Sadeghi, Ahmad-Reza and Güneysu, Tim and Eisenbarth, Thomas and Schellekens, Dries and Wolf, Marko (2007):
Reconfigurable Trusted Computing in Hardware.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), pp. 15-25, ACM Press, Alexandria, Virginia, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Gasmi, Yacine and Stewin, Patrick and Unger, Martin and Asokan, Nadarajah (2007):
Beyond Secure Channels.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), pp. 30-40, ACM Press, Alexandria, Virginia, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Wolf, Christopher and Stüble, Christian and Asokan, N. and Ekberg, Jan-Erik (2007):
Enabling Fairer Digital Rights Management with Trusted Computing.
In: LNCS, 4779, In: 10th International Conference on Information Security (ISC 2007), pp. 53-70, Springer Verlag, Valparaíso, Chile, [Conference or Workshop Item]

Battestini, Agathe and Rossow, Christian and Flanagan, Adrian and Miettinen, Markus (2007):
Creating Next Generation Applications and Services for Mobile Devices: Challenges and Opportunities.
In: Proc. IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2007), pp. 1-4,
Athens, ISBN 978-1-4244-1144-3, DOI: 10.1109/PIMRC.2007.4394846, [Conference or Workshop Item]

Celik, Mehmet and Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza and Skoric, Boris (2007):
Combining Tardos Fingerprinting Codes and Fingercasting.
In: LNCS, 4567, pp. 294-310, Springer Verlag, 9th International Workshop on Information Hiding (IH 2007), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Katzenbeisser, Stefan and Skoric, Boris and Celik, Mehmet (2007):
Combining Tardos Fingerprinting Codes and Fingercasting.
In: LNCS, 4567, In: 9th International Workshop on Information Hiding (IH 2007), pp. 294-310, Springer Verlag, Saint Malo, France, [Conference or Workshop Item]

Adelsbach, Andre and Huber, Ulrich and Sadeghi, Ahmad-Reza (2007):
Fingercasting – Joint Fingerprinting and Decryption of Broadcast Messages.
In: LNCS, 4499, pp. 1-34, Springer Verlag, Transactions on Data Hiding and Multimedia Security II, [Conference or Workshop Item]

Birk, Dominik and Gajek, Sebastian and Gröbert, Felix and Sadeghi, Ahmad-Reza (2007):
Phishing Phishers – Observing and Tracing Organized Cybercrime.
p. 3, IEEE Computer Society, Second International Conference on Internet Monitoring and Protection (ICIMP 2007), [Conference or Workshop Item]

Dmitrienko, Alexandra (2007):
Zigbee-to-tcp/ip gateway: New opportunities for ZigBee-based sensor networks.
In: 6th International Workshop on Ambient Intelligence and Embedded Systems,
[Conference or Workshop Item]

Gajek, Sebastian and Manulis, Mark and Sadeghi, Ahmad-Reza and Schwenk, Jörg (2007):
Browser-based Authentication Protocols for Naive Users.
Western European Workshop on Research in Cryptology (WEWoRC 2007), [Conference or Workshop Item]

Gajek, Sebastian and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2007):
Compartmented Security for Browsers.
(HGI-TR-2007-001), [Report]

Gajek, Sebastian and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2007):
Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing.
In: Second International Conference on Availability, Reliability and Security (ARES 2007), pp. 120-127, Vienna, Austria, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Huber, Ulrich (2007):
Fingercasting—Joint Fingerprinting and Decryption of Broadcast Messages.
In: LNCS, 4499, In: Transactions on Data Hiding and Multimedia Security II, pp. 1-34, Springer Verlag, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Gajek, Sebastian and Gröbert, Felix and Birk, Dominik (2007):
Phishing Phishers – Observing and Tracing Organized Cybercrime.
In: Second International Conference on Internet Monitoring and Protection (ICIMP 2007), p. 3, IEEE Computer Society, Silicon Valley, California, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Löhr, Hans and Chen, Liqun and Manulis, Mark and Escalante, Alberto (2007):
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
In: LNCS, 4886, In: 11th International Conference on Financial Cryptography and Data Security (FC 2007), pp. 29-44, Springer Verlag, Scarborough, Trinidad and Tobago, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Löhr, Hans and Ramasamy, Hari Govind and Schulz, Stefan and Schunter, Matthias (2007):
Enhancing Grid Security Using Trusted Virtualization.
In: LNCS, 4610, In: 4th International Conference on Autonomic and Trusted Computing (ATC 2007), pp. 372-384, Springer Verlag, Hong Kong, China, [Conference or Workshop Item]

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark (2007):
Browser Models for Usable Authentication Protocols.
In: IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07), Oakland, USA, [Conference or Workshop Item]

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark (2007):
Browser-based Authentication Protocols for Naive Users.
In: Western European Workshop on Research in Cryptology (WEWoRC 2007), Bochum, Germany, [Conference or Workshop Item]

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Winandy, Marcel (2007):
Trusted User-Aware Web Authentication.
In: Workshop on Trustworthy User Interfaces for Passwords and Personal Information (TIPPI'07),, Stanford, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Selhorst, Marcel and Stüble, Christian and Wachsmann, Christian and Winandy, Marcel (2006):
TCG Inside? – A Note on TPM Specification Compliance.
pp. 47-56, ACM Press, ACM Workshop on Scalable Trusted Computing (ACMSTC), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Wachsmann, Christian and Selhorst, Marcel and Stüble, Christian and Winandy, Marcel (2006):
TCG Inside? – A Note on TPM Specification Compliance.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC), pp. 47-56, ACM Press, Alexandria, Virginia (USA), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Huber, Ulrich (2006):
Fingercasting – Joint Fingerprinting and Decryption of Broadcast Messages.
In: LNCS, 4058, In: 11th Australasian Conference on Information Security and Privacy (ACISP 2006), Springer Verlag, Melbourne, Australia, [Conference or Workshop Item]

Wahid, Khan (2006):
Bluetooth based Login for Windows Servers.
KTH Royal Institute of Technology, [Master Thesis]

Miettinen, Markus and Halonen, Perttu and Hätönen, Kimmo (2006):
Host-based intrusion detection for advanced mobile devices.
2, In: Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), pp. 72-76, IEEE Computer Society, Vienna, ISBN 0-7695-2466-4, DOI: 10.1109/AINA.2006.192, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Manulis, Mark (2006):
Property-based Taming Lying Mobile Node.
In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006), Vienna, Austria, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Manulis, Mark (2006):
Property-based Taming Lying Mobile Nodes.
In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006), Vienna, Austria, [Conference or Workshop Item]

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Manulis, Mark (2006):
Linkable Democratic Group Signatures.
In: 2nd Information Security Practice and Experience Conference (ISPEC 2006), Hangzhou, China, [Conference or Workshop Item]

Adelsbach, Andre and Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza (2006):
A Computational Model for Watermark Robustness.
Information Hiding Workshop, [Conference or Workshop Item]

Adelsbach, Andre and Rohe, Markus and Sadeghi, Ahmad-Reza (2006):
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
Transactions on Data Hiding and Multimedia Security, [Conference or Workshop Item]

Alkassar, Ammar and Sadeghi, Ahmad-Reza and Scheibel, Michael and Stüble, Christian and Winandy, Marcel (2006):
Security Architecture for Device Encryption and VPN.
Information Security Solution Europe (ISSE06), [Conference or Workshop Item]

Carluccio, Dario and Lemke-Rust, Kerstin and Paar, Christof and Sadeghi, Ahmad-Reza (2006):
E-Passport: The Global Traceability or How to Feel Like an UPS Package.
Workshop on RFID Security 2006, [Conference or Workshop Item]

Gajek, Sebastian and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2006):
Towards Multicolored Computing – Compartmented Security to Prevent Phishing Attacks.
Workshop on Information and System Security (WISSEC'06), [Conference or Workshop Item]

Gajek, Sebastian and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2006):
Towards Multicolored Computing – Compartmented Security to Prevent Phishing Attacks.
In: Workshop on Information and System Security (WISSEC'06), Antwerpen, Belgium, [Conference or Workshop Item]

Huber, Ulrich and Sadeghi, Ahmad-Reza (2006):
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
In: LNCS, 4173, Springer, 9th Information Security Conference (ISC 2006), [Conference or Workshop Item]

Hätönen, Kimmo and Klemettinen, Mika and Miettinen, Markus and Boulicaut, Jean-François and Raedt, Luc De and Mannila, Heikki (eds.) (2006):
Constraint-Based Mining and Inductive Databases.
In: LNCS, 3848, In: Constraint-Based Mining and Inductive Databases, pp. 196-215, Springer, ISBN 978-3-540-31331-1, DOI: 10.1007/11615576_10, [Book Section]

Lemke, Kerstin and Paar, Christof and Sadeghi, Ahmad-Reza (2006):
Physical Security Bounds Against Tampering.
International Conference on Applied Cryptography and Network Security (ACNS 2006), [Conference or Workshop Item]

Manulis, Mark and Sadeghi, Ahmad-Reza (2006):
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Huber, Ulrich (2006):
Fingercasting – Joint Fingerprinting and Decryption of Broadcast Messages.[Report]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Katzebeisser, Stefan (2006):
A Computational Model for Watermark Robustness.
In: Information Hiding Workshop, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Rohe, Markus (2006):
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
In: Transactions on Data Hiding and Multimedia Security, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Gajek, Sebastian (2006):
Client Authentication in Federations Using a Security Mode.
In: Toward a More Secure Web – W3C Workshop on Usability and Transparency of Web Authentication., [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Huber, Ulrich (2006):
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
[Report]

Sadeghi, Ahmad-Reza and Huber, Ulrich (2006):
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
In: LNCS, 4173, In: 9th Information Security Conference (ISC 2006), Springer, Samos, Greece, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Manulis, Mark (2006):
Key Agreement for Heterogeneous Ad-Hoc Groups.
In: International Journal of Wireless and Mobile Computing (IJWMC), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Manulis, Mark (2006):
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
In: Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Paar, Christof and Carluccio, Dario and Lemke-Rust, Kerstin (2006):
E-Passport: The Global Traceability or How to Feel Like an UPS Package.
In: Workshop on RFID Security 2006, Graz, Austria, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Paar, Christof and Lemke, Kerstin (2006):
Physical Security Bounds Against Tampering.
In: International Conference on Applied Cryptography and Network Security (ACNS 2006), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Löhr, Hans and Chen, Liquen and Landfermann, Rainer and Rohe, Markus (2006):
A Protocol for Property-Based Attestation.
In: First ACM Workshop on Scalable Trusted Computing (STC'06), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Wolf, Marko and Scheibel, Michael (2006):
Play it once again, Sam – Enforcing Stateful Licenses on Open Platforms.
In: The Second Workshop on Advances in Trusted Computing (WATC '06 Fall), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Winandy, Marcel and Stüble, Christian and Alkassar, Ammar and Scheibel, Michael (2006):
Security Architecture for Device Encryption and VPN.
In: Information Security Solution Europe (ISSE06), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Winandy, Marcel and Stüble, Christian and Scheibel, Michael (2006):
Design and Implementation of a Secure Linux Device Encryption Architecture.
In: LinuxTag, [Conference or Workshop Item]

Greveler, Ulrich and Adelsbach, Andre and Löschner, Sven (2005):
Anonymous Data Broadcasting by Misuse of Satellite ISPs.
In: 22C3 Chaos Computer Club (CCC) Congress, Berlin, Germany, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Huber, Ulrich (2005):
Property-Based Broadcast Encryption for Multi-level Security Policies.
In: LNCS, 3935, Springer Verlag, 8th International Conference on Information Security and Cryptology (ICISC 2005), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Huber, Ulrich (2005):
Property-Based Broadcast Encryption for Multi-level Security Policies.
In: LNCS, 3935, In: 8th International Conference on Information Security and Cryptology (ICISC 2005), Springer Verlag, Seoul, Korea, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Rohe, Markus (2005):
Towards Multilateral Secure Digital Rights Distribution Infrastructures.
In: ACM DRM Workshop'05, Alexandria, Virginia, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Stüble, Christian and Huber, Ulrich (2005):
Embedding Trust into Cars—Secure Software Delivery and Installation.
In: Third Workshop on Embedded Security in Cars (escar 2005), Cologne, Germany, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Rohe, Markus (2005):
Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme.
In: 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Salzburg, Austria, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian (2005):
Multilaterally Secure Computing Platforms – in your office, car and at home.
1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian (2005):
Multilaterally Secure Computing Platforms – in your office, car and at home.
In: 1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society, Tokyo, Japan, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Winandy, Marcel and Stüble, Christian and Selhorst, Marcel and Senft, Oska (2005):
New Aspects on Trusted Computing – New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9, [Article]

Sadeghi, Ahmad-Reza and Winandy, Marcel and Stüble, Christian and Selhorst, Marcel and Senft, Oska (2005):
New Aspects on Trusted Computing – New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9, [Article]

Sadeghi, Ahmad-Reza and Stüble, Christian and Kühn, Ulrich and Kursawe, Klaus and Lucks, Stefan (2005):
Secure Data Management in Trusted Computing.
In: LNCS, 3659, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 324-338,
Springer Verlag, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Ulrich and Kursawe, Klaus and Lucks, Stefan (2005):
Secure Data Management in Trusted Computing.
In: LNCS, 3659, pp. 324-338, Springer Verlag, Workshop on Cryptographic Hardware and Embedded Systems (CHES), [Conference or Workshop Item]

Camenisch, Jan and Rohe, Markus and Sadeghi, Ahmad-Reza (2005):
Sokrates – A Compiler Framework for Zero-Knowledge Protocols.
Western European Workshop on Research in Cryptology (WEWoRC 2005), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Rohe, Markus and Camenisch, Jan (2005):
Sokrates – A Compiler Framework for Zero-Knowledge Protocols.
In: Western European Workshop on Research in Cryptology (WEWoRC 2005), Leuven, Belgium, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Rupp, Andy and Bangerter, Endre (2005):
Simplified Hardness Proofs in the Generic Group Model.
In: Western European Workshop on Research in Cryptology (WEWoRC 2005), Leuven, Belgium, [Conference or Workshop Item]

Alkassar, Ammar and Sadeghi, Ahmad-Reza and Selhorst, Marcel and Stüble, Christian (2005):
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Alkassar, Ammar and Stüble, Christian and Selhorst, Marcel (2005):
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
In: 9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI), [Conference or Workshop Item]

Schwenk, Jörg and Greveler, Ulrich and Adelsbach, Andre (2005):
Fair DRM – Ermöglichen von Privatkopien und Schutz digitaler Waren.
In: 9. Deutscher IT-Sicherheitskongress des BSI, [Conference or Workshop Item]

Greveler, Ulrich and Adelsbach, Andre (2005):
Satellite Communication without Privacy – Attacker's Paradise.
In: LNI, In: GI Fachtagung “Sicherheit 2005”, pp. 257-268,
Springer Verlag, Regensburg, Germany, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Huber, Ulrich (2005):
Secure Software Delivery and Installation in Embedded Systems.
In: First Information Security Practice and Experience Conference (ISPEC 2005), Singapore, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Rohe, Markus (2005):
Security Engineering for Zero-knowledge Watermark Detection.
In: Special Session on Media Security (WIAMIS 2005), Montreux, Switzerland, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian (2005):
Towards Multilateral Security On DRM Platforms.
In: First Information Security Practice and Experience Conference (ISPEC 2005), [Conference or Workshop Item]

Greveler, Ulrich and Adelsbach, Andre (2005):
Datenschutzverletzungen bei Internetzugängen via Satellit.
In: Datenschutznachrichten, 1, pp. 4-7. [Article]

Sadeghi, Ahmad-Reza and Stüble, Christian (2005):
Towards multilaterally secure computing platforms – with open source and trusted computing.
In: Information Security Technical Report, 10 (2), pp. 83-95. [Article]

Sadeghi, Ahmad-Reza and Stüble, Christian (2005):
Towards multilaterally secure computing platforms – with open source and trusted computing.
In: Information Security Technical Report, 10 (2), pp. 83-95. [Article]

Greveler, Ulrich and Adelsbach, Andre (2005):
A Broadcast Encryption Scheme with Free-Riders but Unconditional Security.
In: First International Conference on Digital Rights Management, Sydney, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza (2005):
Trusted Computing: Whom do we trust? Building Open Multilateral Secure Platforms Based On Trusted Computing.
DRM Conference, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza (2005):
Trusted Computing: Whom do we trust? Building Open Multilateral Secure Platforms Based On Trusted Computing.
In: DRM Conference, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Bas, Patrick and Barni, Mauro and Rosa, Alessia De and Katzenbeisser, Stefan (ed.) (2005):
First Summary Report on Asymmetric Watermarking.
In: ECRYPT, Network of Excellence in Cryptology, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Huber, Ulrich (2005):
Secure Software Delivery and Installation in Embedded Systems.
[Report]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Huber, Ulrich and Lemke, Kerstin (ed.) (2005):
Secure Software Delivery and Installation in Embedded Systems.
In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications, pp. 27-49, Springer-Verlag, [Book Section]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Rohe, Markus (2005):
Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it.
In: ACM Multimedia Systems, 11 (2), pp. 143-158. [Article]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Rohe, Markus (2005):
Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it.
In: ACM Multimedia Systems, [Article]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Stüble, Christian and Huber, Ulrich (2005):
Property-Based Broadcast Encryption for Multi-level Security Policies.
[Book]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Stüble, Christian and Huber, Ulrich (2005):
Property-Based Broadcast Encryption for Multi-level Security Policies.
[Report]

Sadeghi, Ahmad-Reza and Chen, Liqun and Enzmann, Matthias and Schneider, Markus and Steiner, Michael (2005):
A Privacy-Protecting Coupon System.
In: Financial Cryptography, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Groß, Thomas and Pfitzmann, Birgit (2005):
Browser Model for Security Analysis of Browser-Based Protocols.
European Symposium for Research in Computer Science (ESORICS), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Groß, Thomas and Pfitzmann, Birgit (2005):
Browser Model for Security Analysis of Browser-Based Protocols.
[Book]

Sadeghi, Ahmad-Reza and Groß, Thomas and Pfitzmann, Birgit (2005):
Browser Model for Security Analysis of Browser-Based Protocols.
In: European Symposium for Research in Computer Science (ESORICS), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Groß, Thomas and Pfitzmann, Birgit (2005):
Browser Model for Security Analysis of Browser-Based Protocols.
(RZ3600), [Report]

Sadeghi, Ahmad-Reza and Groß, Thomas and Pfitzmann, Birgit (2005):
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
Workshop on Secure Web Services (SWS), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Groß, Thomas and Pfitzmann, Birgit (2005):
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
In: Workshop on Secure Web Services (SWS), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Lemke-Rust, Kerstin (2005):
An Open Approach for Designing Secure Electronic Immobilizers.
In: First Information Security Practice and Experience Conference (ISPEC 2005), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Lemke-Rust, Kerstin and Lemke, Kerstin and Wolf, Marko and Paar, Christof (eds.) (2005):
Anti-theft Protection: Electronic Immobilizers.
pp. 51-67, Springer Verlag, Embedded Security in Cars: Securing Current and Future Automotive IT Applications., [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Lemke-Rust, Kerstin and Lemke, Kerstin and Wolf, Marko and Paar, Christof (eds.) (2005):
Anti-theft Protection: Electronic Immobilizers.
In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications., pp. 51-67, Springer Verlag, [Conference or Workshop Item]

Schwenk, Jörg and Gajek, Sebastian and Adelsbach, Andre (2005):
Phishing – Die Täuschung des Benutzers zur Preisgabe geheimer Benutzerdaten.
In: 9. Deutscher IT-Sicherheitskongress des BSI, [Conference or Workshop Item]

Schwenk, Jörg and Gajek, Sebastian and Adelsbach, Andre (2005):
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures.
In: LNCS, 3439, In: First Information Security Practice and Experience Conference (ISPEC 2005), pp. 204-217, Springer-Verlag, [Conference or Workshop Item]

Spalka, Adrian and Cremers, Armin and Winandy, Marcel (2005):
Multilateral Security Considerations for Adaptive Mobile Applications.
In: 2nd International Conference on E-Business and Telecommunication Networks (ICETE 2005), pp. 133-137, INSTICC, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian (2004):
Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms.
In: 20th Annual Computer Security Applications Conference (ACSAC), Tucson, Arizona, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian (2004):
Property-based Attestation for Computing Platforms: Caring about policies, not mechanisms.
In: New Security Paradigm Workshop (NSPW), White Point Beach Resort, Nova Scotia, Canada, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Pohlmann, Norbert (2004):
European Multilateral Secure Computing Base – Open Trusted Computing for You and Me.
In: Datenschutz und Datensicherheit (DUD), 9, pp. 548-554. [Article]

Altmeyer, Oliver and Sadeghi, Ahmad-Reza and Selhorst, Marcel and Stüble, Christian and Paulus, Sachar and Pohlmann, Norbert and Reimer, Helmut (eds.) (2004):
Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004), pp. 346-361, Vieweg Verlag, [Book Section]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Rohe, Markus (2004):
Overcoming the Obstacles of Zero-Knowledge Watermark Detection.
pp. pp. 46 – 55, ACM Press, ACM Multimedia and Security Workshop, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Rohe, Markus (2004):
Overcoming the Obstacles of Zero-Knowledge Watermark Detection.
In: ACM Multimedia and Security Workshop, pp. pp. 46 – 55, ACM Press, Magdeburg, Germany, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Günnewig, Dirk and Rannenberg, Kai and Stüble, Christian and Koenig, Christian and Neu­mann, An­dre­as and Katz­sch­mann, To­bi­as (eds.) (2004):
Trusted Computing Platforms: Zur technischen und industriepolitischen Situation und Vorgehensweise.
In: Vertrauenswürdige Systemumgebungen Technik, Recht und gesellschaftspolitische Implikationen des “Trusted Computing”, Verlag Recht und Wirtschaft, [Book Section]

Sadeghi, Ahmad-Reza and Stüble, Christian and Altmeyer, Oliver and Selhorst, Marcel and Paulus, Sachar and Pohlmann, Norbert and Reimer, Helmut (eds.) (2004):
Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004), pp. 346-361, Vieweg Verlag, [Book Section]

Schwenk, Jörg and Adelsbach, Andre (2004):
Key-Assignment Strategies for CPPM.
In: ACM Multimedia and Security Workshop, pp. 107 – 115,
ACM Press, Magdeburg, Germany, [Conference or Workshop Item]

Stüble, Christian and Himmelein, Gerald (2003):
Vertrauensfragen – IBMs Antworten auf die TCPA-Fragen des Chaos Computer Club.
In: c't, 15, [Article]

Alkassar, Ammar and Stüble, Christian (2003):
A Security Framework for Integrated Networks.
In: MILCOM 2003 IEEE Military Communications Conference, Boston, USA, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Alkassar, Ammar (2003):
The Quest for Security in Integrated Networks.
11th International Conference on Telecommunication Systems, Modeling and Analysis, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Alkassar, Ammar (2003):
The Quest for Security in Integrated Networks.
In: 11th International Conference on Telecommunication Systems, Modeling and Analysis, Monterey, USA, [Conference or Workshop Item]

Adelsbach, Andre and Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza (2003):
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, 9 (3), pp. 266-278. [Article]

Hätönen, Kimmo and Boulicaut, Jean-François and Klemettinen, Mika and Miettinen, Markus and Masson, Cyrille and Kambayashi, Y. and Mohania, M. K. and Wöss, W. (eds.) (2003):
Comprehensive log compression with frequent patterns.
In: LNCS, 2734, In: Proceedings of the 5th International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2003), pp. 360-370, Springer, http://liris.cnrs.fr/~jboulica/dawak03.pdf, [Conference or Workshop Item]

Hätönen, Kimmo and Halonen, Perttu and Klemettinen, Mika and Miettinen, Markus and Boulicaut, J.-F. and Dzeroski, S. (eds.) (2003):
Queryable Lossless Log Database Compression.
In: Proceedings of the Second International Workshop on Knowledge Discovery in Inductive Databases (KDID), pp. 70-79, ISBN 953-6690-34-9, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Katzenbeisser, Stefan (2003):
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, 9 (3), pp. 266-278. [Article]

Sadeghi, Ahmad-Reza and Stüble, Christian (2003):
Taming “Trusted Computing” by Operating System Design.
In: 4th International Workshop on Information Security Applications (WISA'03), Springer-Verlag, Cheju Island, Korea, [Conference or Workshop Item]

Stüble, Christian and Kursawe, Klaus (2003):
Improving End-user Security and Trustworthiness of TCG Platforms.
In: 33. GI-Fachtagung, Frankfurt, Germany, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Alkassar, Ammar and Stüble, Christian (2003):
Secure Object Identification – or: Solving The Chess Grandmaster Problem.
In: New Security Paradigms Workshop, Ascona, Switzerland, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre (2003):
Advanced Techniques for Dispute Resolving and Authorship Proofs on Digital Works.
In: Security and Watermarking of Multimedia Contents V, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Schneider, Markus and Stüble, Christian (2003):
Die digitale Signatur.
In: Digitale Signaturen in der Praxis, AWV Verlag, [Book Section]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Schneider, Markus and Stüble, Christian (2003):
Die digitale Signatur.
In: Digitale Signaturen in der Praxis, AWV Verlag, [Book Section]

Sadeghi, Ahmad-Reza and Schneider, Markus (2003):
Electronic Payment Systems.
In: LNCS, 2770, In: Digital Rights Management, pp. 113-137, Springer Verlag, [Book Section]

Sadeghi, Ahmad-Reza and Schneider, Markus (2003):
Electronic Payment Systems.
In: LNCS, 2770, In: Digital Rights Management, pp. 113-137, Springer Verlag, [Book Section]

Sadeghi, Ahmad-Reza and Stüble, Christian (2003):
Bridging the Gap between TCPA/Palladium and Personal Security.
[Report]

Sadeghi, Ahmad-Reza and Stüble, Christian (2003):
Sinn und Unsinn von TCPA und Palladium.
In: c't, 13, [Article]

Sadeghi, Ahmad-Reza and Stüble, Christian (2003):
Sinn und Unsinn von TCPA und Palladium.
In: c't, 13, [Article]

Sadeghi, Ahmad-Reza and Stüble, Christian and Günnewig, Dirk (2003):
Trusted Computing ohne Nebenwirkungen.
9, In: Datenschutz und Datensicherheit (DUD), pp. 556-560, Vieweg Verlag, [Book Section]

Sadeghi, Ahmad-Reza and Stüble, Dirk (2003):
Trusted Computing ohne Nebenwirkungen.
9, In: Datenschutz und Datensicherheit (DUD), pp. 556-560, Vieweg Verlag, [Book Section]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Katzenbeisser, Stefan (2002):
Cryptography Meets Watermarking: Detecting Watermarks with Minimal- or Zero-Knowledge Disclosure.
1, In: XI European Signal Processing Conference, pp. 446-449, [Conference or Workshop Item]

Adelsbach, Andre and Stüble, Christian and Creese, Sadie and Pfitzmann, Birgit and Ryan, Peter Y. A. and Simmonds, William and Steinbrechner, Sandra and Steiner, Michael and Waidner, Michael (2002):
Cryptographic Semantics For The Algebraic Models.
(MAF­TIA De­li­ver­a­ble D), [Report]

Alkassar, Ammar and Stüble, Christian (2002):
Towards Secure IFF: Preventing Mafia Fraud Attacks.
In: MILCOM 2002, IEEE Military Communication Conference, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Stüble, Christian (2002):
Final Report on Verification and Assessment.
[Book]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Stüble, Christian (2002):
Final Report on Verification and Assessment.
(MAF­TIA De­li­ver­a­ble D), [Report]

Sadeghi, Ahmad-Reza and Schunter, Matthias and Steinbrecher, Sandra (2002):
Auctions with Multiple Rounds and Multiple Items.
In: Int. Workshop on Trust and Privacy in Digital Business (DEXA 2002), [Conference or Workshop Item]

Stüble, Christian and Lange, Steffen and Nonnengart, Andreas and Vogt, Roland (2002):
Common Criteria Protection Profiles – Discretionary Information Flow Control (DiC).
In: 3rd International Common Criteria Conference, Ottawa, Canada, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Steiner, Michael (2001):
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference.
In: LNCS, 2045, In: Eurocrypt, pp. 243-260, Springer-Verlag, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Geraldy, Alexander and Pfitzmann, Birgit (2001):
Optimized Self-Synchronizing Mode of Operation.
In: 8th International Workshop on Fast Software Encryption, Yokohama, Japan, [Conference or Workshop Item]

Adelsbach, Andre and Sadeghi, Ahmad-Reza (2001):
Zero-Knowledge Watermark Detection and Proof of Ownership.
In: LNCS, 2137, pp. 273-288, Springer-Verlag, Information Hiding: Fourth International Workshop, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza (2001):
How to Break a Semi-Anonymous Fingerprinting Scheme.
In: LNCS, 2137, pp. 384-394, Springer-Verlag, Information Hiding: Fourth International Workshop, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza (2001):
How to Break a Semi-Anonymous Fingerprinting Scheme.
In: LNCS, 2137, In: Information Hiding: Fourth International Workshop, pp. 384-394, Springer-Verlag, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Adelsbach, Andre (2001):
Zero-Knowledge Watermark Detection and Proof of Ownership.
In: LNCS, 2137, In: Information Hiding: Fourth International Workshop, pp. 273-288, Springer-Verlag, Berlin, Germany, [Conference or Workshop Item]

Stüble, Christian and Pfitzmann, Birgit (2001):
PERSEUS: A Quick Open-source Path to Secure Signatures.
In: 2nd Workshop on Microkernel-based Systems, Banff, Canada, [Conference or Workshop Item]

Stüble, Christian and Pfitzmann, Birgit and Riordan, James and Waidner, Michael and Weber, Arnd (2001):
The PERSEUS System Architecture.
In: Verlässliche Informationssysteme (VIS) '01, DuD Fachbeiträge, pp. 1-18, Vieweg Verlag, [Book Section]

Adelsbach, Andre and Pfitzmann, Birgit and Sadeghi, Ahmad-Reza (2000):
Proving ownership of digital content.
In: LNCS, 1768, pp. 126-141, Springer-Verlag, 3rd International Workshop on Information Hiding, IH 1999, [Conference or Workshop Item]

Pfitzmann, Birgit and Sadeghi, Ahmad-Reza (2000):
Self-escrowed cash against user black-mailing.
In: LNCS, 1962, Springer-Verlag, Fourth Conference on Financial Cryptography (FC 2000 Anguilla), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Pfitzmann, Birgit (2000):
Self-escrowed cash against user black-mailing.
In: LNCS, 1962, In: Fourth Conference on Financial Cryptography (FC’00),, Springer-Verlag, Anguilla, British West Indies, [Conference or Workshop Item]

Stüble, Christian and Weber, Arnd (2000):
From Security Instruments to Secure End-User Systems.
In: World Markets Series – Wireless Technology 2000, pp. 207-209. [Article]

Adelsbach, Andre (2000):
Anonymous fingerprinting with direct non-repudiation.
In: LNCS, 1976, In: Advances in Cryptology – ASIACRYPT‘2000, pp. 401-414, Springer-Verlag, Kyoto, Japan, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Pfitzmann, Birgit (1999):
Coin-based anonymous fingerprinting.
In: LNCS, 1599, In: EUROCRYPT ’99, pp. 150-164, Springer-Verlag, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Pfitzmann, Birgit (1999):
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99, pp. 35-48, Vieweg Verlag, [Book Section]

Sadeghi, Ahmad-Reza and Pfitzmann, Birgit (1999):
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99, pp. 35-48, Vieweg Verlag, [Book Section]

Stüble, Christian (1999):
Effiziente Implementierung von kryptographischen Datenaustauschformaten am Beispiel OpenPGP und S/MIME v.3.
In: Sicherheitsinfrastrukturen: DuD Fachbeiträge, pp. 272-284, Vieweg Verlag, [Book Section]