Dr.-Ing. Felix Schuster

  • Ehemalige/r Mitarbeiter/in - Lehrstuhl Systemsicherheit
Schuster, Felix
E-Mail:
felix.schuster@rub.de PGP Schlüssel

Forschung

  • Automatisierte Erkennung und Eliminierung von Hintertüren in Software
  • Automatisierte Analyse und Erkennung von Schadsoftware

Projekte

  • ITES: Innovative Trustworthy Endpoint Security

Lehrveranstaltungen

Veröffentlichungen

2016
Subversive-C: Abusing and Protecting Dynamic Message Dispatch

Julian Lettner, Benjamin Kollenda, Andrei Homescu, Per Larsen, Felix Schuster, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Michael Franz - 2016 USENIX Annual Technical Conference (USENIX ATC '16), Denver, USA, June 2016

2015
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks

Stephen Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Bjorn De Sutter, Michael Franz - 22nd ACM Conference on Computer and Communications Security (CCS), Denver, October 2015

Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications

Felix Schuster, Thomas Tendyck, Christopher Liebchen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz - 36th IEEE Symposium on Security and Privacy (Oakland), San Jose, May 2015

VC3: Trustworthy Data Analytics in the Cloud using SGX

Felix Schuster, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz , Mark Russinovich - 36th IEEE Symposium on Security and Privacy (Oakland), San Jose, May 2015

2014
VC3: Trustworthy Data Analytics in the Cloud

Felix Schuster, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, Mark Russinovich - MSR-TR-2014-39, Microsoft Research, December 2014

Leveraging Semantic Signatures for Bug Search in Binary Programs

Jannik Pewny, Felix Schuster, Lukas Bernhard, Christian Rossow, Thorsten Holz - An­nual Com­pu­ter Se­cu­ri­ty Ap­p­li­ca­ti­ons Con­fe­rence (ACSAC), New Or­leans, USA, De­cem­ber 2014

Evaluating the Effectiveness of Current Anti-ROP Defenses

Felix Schuster, Thomas Tendyck, Jannik Pewny, Andreas Maaß, Martin Steegmanns, Moritz Contag, Thorsten Holz - Re­se­arch in At­tacks, In­tru­si­ons and De­fen­ses (RAID) Sym­po­si­um, Gothenburg, Sweden, September 2014

Technical Report: Evaluating the Effectiveness of Current Anti-ROP Defenses

Felix Schuster, Thomas Tendyck, Jannik Pewny, Andreas Maaß, Martin Steegmanns, Moritz Contag, Thorsten Holz - TR-HGI-2014-001, Ruhr-Uni­ver­si­tät Bo­chum, Horst Görtz In­sti­tut für IT-Si­cher­heit (HGI), May 2014

Scriptless attacks: Stealing more pie without touching the sill

Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk - Journal of Computer Security, Volume 22, Number 4 / 2014, Web Application Security – Web @ 25

2013
Towards Reducing the Attack Surface of Software Backdoors

Felix Schuster, Thorsten Holz - 20th ACM Conference on Computer and Communications Security (CCS), Berlin, November 2013

Preventing Backdoors In Server Applications With A Separated Software Architecture (Short Paper)

Felix Schuster, Stefan Rüster, Thorsten Holz - 10th Con­fe­rence on De­tec­tion of In­tru­si­ons and Mal­wa­re & Vul­nerabi­li­ty As­sess­ment (DIMVA), Berlin, July 2013

2012
Scriptless Attacks – Stealing the Pie Without Touching the Sill

Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk - 19th ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, October 2012