Veröffentlichungen

Cross-Architecture Bug Search in Binary Executables

2015 - Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz

36th IEEE Symposium on Security and Privacy (Oakland), San Jose, May 2015 [PDF]

VC3: Trustworthy Data Analytics in the Cloud using SGX

2015 - Felix Schuster, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz , Mark Russinovich

36th IEEE Symposium on Security and Privacy (Oakland), San Jose, May 2015 [PDF]

A Practical Investigation of Identity Theft Vulnerabilities in Eduroam

2015 - Sebastian Brenza, Andre Pawlowski, Christina Pöpper

In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), 2015 [Project Webpage] [PDF]

Retaining Control over SDN Network Services

2015 - Christian Röpke, Thorsten Holz

International Conference on Networked Systems (NetSys), 2015

FPGA Trojans through Detecting and Weakening of Cryptographic Primitives

2015 - Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Chris­tof Paar

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Volume PP Issue 99, February 2015. [DOI] [pdf]

Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones

2015 - Sebastian Uellenbeck, Thomas Hupperich, Christopher Wolf, Thorsten Holz

Financial Cryptography and Data Security 2015 [pdf]

VC3: Trustworthy Data Analytics in the Cloud

2014 - Felix Schuster, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, Mark Russinovich

MSR-TR-2014-39, Microsoft Research, December 2014 [Microsoft Research]

Technical Report: Towards Automated Integrity Protection of C++ Virtual Function Tables in Binary Programs

2014 - Robert Gawlik, Thorsten Holz

TR-HGI-2014-004, Ruhr-Uni­ver­si­tät Bo­chum, Horst Görtz In­sti­tut für IT-Si­cher­heit (HGI), December 2014 [PDF]

Leveraging Semantic Signatures for Bug Search in Binary Programs

2014 - Jannik Pewny, Felix Schuster, Lukas Bernhard, Christian Rossow, Thorsten Holz

An­nual Com­pu­ter Se­cu­ri­ty Ap­p­li­ca­ti­ons Con­fe­rence (ACSAC), New Or­leans, USA, De­cem­ber 2014 [PDF]

Towards Automated Integrity Protection of C++ Virtual Function Tables in Binary Programs

2014 - Robert Gawlik, Thorsten Holz

An­nual Com­pu­ter Se­cu­ri­ty Ap­p­li­ca­ti­ons Con­fe­rence (ACSAC), New Or­leans, USA, De­cem­ber 2014 [PDF]
Seite: