Publications

2017

JITGuard: Hardening Just-in-time Compilers with SGX

Tommaso Frassetto, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi
In: 24th ACM Conference on Computer and Communications Security (CCS), November 2017
[Inproceedings]

ATRIUM: Runtime Attestation Resilient Under Memory Attacks

Shaza Zeitouni, Ghada Dessouky, Orlando Arias, Dean Sullivan, Ahmad Ibrahim, Yier Jin, Ahmad-Reza Sadeghi
In: 2017 International Conference On Computer Aided Design (ICCAD'17), November 2017
[Inproceedings]

Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit

Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti
In: Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), September 2017
[Online-Edition: https://arxiv.org/pdf/1706.09165.pdf]
[Inproceedings]

LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization

Orlando Arias, David Gens, Yier Jin, Christopher Liebchen, Ahmad-Reza Sadeghi, Dean Sullivan
In: 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017), September 2017
[Inproceedings]

Software Grand Exposure: SGX Cache Attacks Are Practical

Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi
In: 11th USENIX Workshop on Offensive Technologies, August 2017
[Inproceedings]

CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory

Ferdinand Brasser, Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi
In: 26th USENIX Security Symposium, August 2017
[Inproceedings]

Fitness Trackers: Fit for Health but Unfit for Security and Privacy

Hossein Fereidooni, Tommaso Frassetto, Markus Miettinen, Ahmad-Reza Sadeghi, Mauro Conti
In: The Second IEEE International Workshop on Safe, Energy-Aware, & Reliable Connected Health (CHASE-SEARCH), July 2017
[Inproceedings]

HardIDX: Practical and Secure Index with SGX

Benny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi
In: Conference on Data and Applications Security and Privacy (DBSec), July 2017
[Inproceedings]

SeED: Secure Non-Interactive Attestation for Embedded Devices

Ahmad Ibrahim, Ahmad-Reza Sadeghi, Shaza Zeitouni
In: 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), July 2017
[Inproceedings]

Phonion: Practical Protection of Metadata in Telephony Networks

Stephan Heuser, Bradley Reaves, Praveen Kumar Pendyala, Henry Carter, Alexandra Dmitrienko, Negar Kiyavash, William Enck, Ahmad-Reza Sadeghi, Patrick Traynor
In: Proceedings on Privacy Enhancing Technologies (PoPETs), July 2017
[Inproceedings]

Toward Practical Secure Stable Matching

M. Sadegh Riazi, Ebrahim Songhori, Ahmad-Reza Sadeghi, Thomas Schneider, Farinaz Koushanfar
In: Proceedings on Privacy Enhancing Technologies (PoPETs), July 2017
[Article]

LO-FAT: Low-Overhead Control Flow ATtestation in Hardware

Ghada Dessouky, Shaza Zeitouni, Thomas Nyman, Andrew Paverd, Lucas Davi, Patrick Koeberl, N. Asokan, Ahmad-Reza Sadeghi
In: 54th Design Automation Conference (DAC'17), June 2017
[Inproceedings]

IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT

Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017), June 2017
[Inproceedings]

IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT

Markus Miettinen, Samuel Marchal, Ibbad Hafeez, Tommaso Frassetto, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017), June 2017
IEEE
[Inproceedings]

Secure Multiparty Computation from SGX

Bernardo Portela, Manuel Barbosa, Guillaume Scerri, Bogdan Warinschi, Raad Bahmani, Ferdinand Brasser, Ahmad-Reza Sadeghi
In: Financial Cryptography and Data Security, April 2017
[Inproceedings]

PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables

Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi
In: 24th Annual Network & Distributed System Security Symposium (NDSS), February 2017
[Inproceedings]

Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity

Robert Rudd, Richard Skowyra, David Bigelow, Veer Dedhia, Thomas Hobson, Stephen Crane, Christopher Liebchen, Per Larsen, Lucas Davi, Michael Franz, Ahmad-Reza Sadeghi, Hamed Okhravi
In: 24th Annual Network & Distributed System Security Symposium (NDSS), February 2017
[Inproceedings]

Pushing the communication barrier in secure computation using lookup tables

Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni, Michael Zohner
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17), February 2017
The Internet society
[Inproceedings]

Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit

Luis Garcia, Ferdinand Brasser, Mehmet Cintuglu, Ahmad-Reza Sadeghi, Osama Mohammed, Saman Zonouz
In: 24th Annual Network & Distributed System Security Symposium (NDSS), February 2017
[Inproceedings]

2016

Towards a Policy-Agnostic Control-Flow Integrity Implementation

Dean Sullivan, Orlando Arias, Lucas Davi, Ahmad-Reza Sadeghi, Yier Jin
In: Black Hat Europe, November 2016
[Inproceedings]

User-Centric Security and Dependability in the Cloud of Clouds

Marc Lacoste, Paulo Sousa, Nuno Neves, Markus Miettinen, Fernando Ramos, Marko Vukolic, Fabien Charmet, Reda Yaich, Krzysztof Oborzynski, Gitesh Vernekar
In: IEEE Cloud Computing Special issue on Cloud Security, Vol. 3, p. 64-75, October 2016
[Article]

C-FLAT: Control-Flow Attestation for Embedded Systems Software

Tigist Abera, Nadarajah Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik
In: 23rd ACM Conference on Computer and Communications Security (CCS), October 2016
[Inproceedings]

SANA: Secure and Scalable Aggregate Network Attestation

Ahmad-Reza Sadeghi, Matthias Schunter, Ahmad Ibrahim, Mauro Conti, Gregory Neven
In: 23rd ACM Conference on Computer and Communications Security (CCS) 2016, October 2016
CCS 2016
[Inproceedings]

SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles

Luke Deshotels, Razvan Deaconescu, Mihai Chiroiu, Lucas Davi, William Enck, Ahmad-Reza Sadeghi
In: 23rd ACM Conference on Computer and Communications Security (CCS), October 2016
[Inproceedings]

Selfrando: Securing the Tor Browser against De-anonymization Exploits

Mauro Conti, Stephen Crane, Tommaso Frassetto, Andrei Homescu, Georg Koppen, Per Larsen, Christopher Liebchen, Mike Perry, Ahmad-Reza Sadeghi
In: The annual Privacy Enhancing Technologies Symposium (PETS), July 2016
[Inproceedings]

DARPA: Device Attestation Resilient to Physical Attacks

Ahmad Ibrahim, Ahmad-Reza Sadeghi, Gene Tsudik, Shaza Zeitouni
In: ACM WiSEC 2016, July 2016
[Inproceedings]

POSTER: Toward a Secure and Scalable Attestation

Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter
In: ACM WiSEC 2016, July 2016
[Inproceedings]

POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs

Ahmad-Reza Sadeghi, Ghada Dessouky
In: ACM WiSec 2016, July 2016
[Inproceedings]

GarbledCPU: A MIPS Processor for Secure Computation in Hardware

Ebrahim Songhori, Shaza Zeitouni, Ghada Dessouky, Thomas Schneider, Ahmad-Reza Sadeghi, Farinaz Koushanfar
In: 53rd Design Automation Conference (DAC'16), June 2016
[Inproceedings]

Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity

Dean Sullivan, Orlando Arias, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Yier Jin
In: 53rd Design Automation Conference (DAC), June 2016
[Inproceedings]

Regulating ARM TrustZone Devices in Restricted Spaces

Ferdinand Brasser, Vinod Ganapathy, Liviu Iftode, Daeyoung Kim, Christopher Liebchen, Ahmad-Reza Sadeghi
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), June 2016
[Inproceedings]

Things, Trouble, Trust: On Building Trust in IoT Systems

Tigist Abera, Nadarajah Asokan, Lucas Davi, Farinaz Koushanfar, Andrew Praverd, Gene Tsudik, Ahmad-Reza Sadeghi
In: 53rd Design Automation Conference (DAC), June 2016
[Inproceedings]

Subversive-C: Abusing and Protecting Dynamic Message Dispatch

Julian Lettner, Benjamin Kollenda, Andrei Homescu, Per Larsen, Felix Schuster, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Michael Franz
In: USENIX Annual Technical Conference (ATC), June 2016
[Inproceedings]

Remanence Decay Side-Channel: The PUF Case

Shaza Zeitouni, Yossef Oren, Christian Wachsmann, Patrick Koeberl, Ahmad-Reza Sadeghi
In: IEEE Transactions on Information Forensics and Security, Vol. 99, March 2016
[Article]

The Cybersecurity Landscape in Industrial Control Systems

Stephen McLaughlin, Charalambos Konstantinou, Xueyang Wang, Lucas Davi, Ahmad-Reza Sadeghi, Michail Maniatakos, Ramesh Karri
In: Proceedings of the IEEE, Vol. PP, March 2016
[Online-Edition: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=7434576]
[Article]

Leakage-Resilient Layout Randomization for Mobile Devices

Kjell Braden, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Christopher Liebchen, Ahmad-Reza Sadeghi
In: 23rd Annual Network & Distributed System Security Symposium (NDSS), February 2016
[Inproceedings]

Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android

Stephan Heuser, Marco Negro, Praveen Kumar Pendyala, Ahmad-Reza Sadeghi
January 2016
[Techreport]

DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android

Stephan Heuser, Marco Negro, Praveen Kumar Pendyala, Ahmad-Reza Sadeghi
In: Financial Crypto 2016, January 2016
[Inproceedings]

Towards a Unified Security Model for Physically Unclonable Functions

Ahmad-Reza Sadeghi, Frederik Armknecht
In: CT-RSA - Cryptographers' Track at the RSA Conference, 2016
[Inproceedings]

Remote Attestation for Low-End Embedded Devices: the Prover's Perspective

Ferdinand Brasser, Kasper Rasmussen, Ahmad-Reza Sadeghi, Gene Tsudik
In: Proceedings of the 53nd Annual Design Automation Conference, 2016
ACM
[Inproceedings]

Can IoT be Secured: Emerging Challenges in Connecting the Unconnected

Nancy Cam-Winget, Ahmad-Reza Sadeghi, Yier Jin
In: 53rd Design Automation Conference (DAC), 2016
[Inproceedings]

Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments

Markus Miettinen, Jialin Huang, Thien Duc Nguyen, N. Asokan, Ahmad-Reza Sadeghi
In: Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16), 2016
[Inproceedings]

2015

Building Secure Defenses Against Code-Reuse Attacks

Lucas Davi, Ahmad-Reza Sadeghi
December 2015
Springer International Publishing
[Online-Edition: http://www.springer.com/en/book/9783319255446]
[Book]

Automated Software Diversity

Per Larsen, Stefan Brunthaler, Lucas Davi, Ahmad-Reza Sadeghi, Michael Franz
In: Synthesis Lectures on Information Security, Privacy, and Trust, December 2015
Morgan & Claypool
[Book]

Automated Synthesis of Optimized Circuits for Secure Computation

Daniel Demmler, Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni
In: 22nd ACM Conference on Computer and Communications Security (CCS'15), October 2015
[Inproceedings]

Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks

Mauro Conti, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Christopher Liebchen, Marco Negro, Mohaned Qunaibit, Ahmad-Reza Sadeghi
In: 22nd ACM Conference on Computer and Communications Security (CCS), October 2015
[Inproceedings]

It's a TRAP: Table Randomization and Protection against Function Reuse Attacks

Stephen Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Bjorn De Sutter, Michael Franz
In: 22nd ACM Conference on Computer and Communications Security (CCS), October 2015
[Inproceedings]

SEDA: Scalable Embedded Device Attestation

Nadarajah Asokan, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter, Gene Tsudik, Christian Wachsmann
In: 22nd ACM Conference on Computer and Communications Security (CCS), October 2015
[Inproceedings]

Return to Where? You Can't Exploit What You Can't Find

Stephen Crane, Christopher Liebchen, Andrei Homescu, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Stefan Brunthaler, Michael Franz
In: Blackhat USA, August 2015
[Inproceedings]

Capacity and Data Complexity in Multidimensional Linear Attack

Jialin Huang, Serge Vaudenay, Xuejia Lai, Kaisa Nyberg
In: CRYPTO, August 2015
[Inproceedings]

SEDA - Technical Report

Nadarajah Asokan, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter, Gene Tsudik, Christian Wachsmann
August 2015
[Techreport]

A probabilistic kernel method for human mobility prediction with smartphones

Trinh Minh Tri Do, Olivier Dousse, Markus Miettinen, Daniel Gatica-Perez
In: Pervasive and Mobile Computing, Vol. 20, p. 13-28, July 2015
[Article]

TyTAN: Tiny Trust Anchor for Tiny Devices

Ferdinand Brasser, Patrick Koeberl, Brahim El Mahjoub, Ahmad-Reza Sadeghi, Christian Wachsmann
In: 52nd Design Automation Conference (DAC) 2015, June 2015
[Inproceedings]

HAFIX: Hardware-Assisted Flow Integrity Extension

Orlando Arias, Lucas Davi, Matthias Hanreich, Yier Jin, Patrick Koeberl, Debayan Paul, Ahmad-Reza Sadeghi, Dean Sullivan
In: 52nd Design Automation Conference (DAC), June 2015
[Inproceedings]

Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis

Ebrahim Songhori, Ahmad-Reza Sadeghi, Farinaz Koushanfar
In: 52nd Design Automation Conference (DAC), June 2015
[Inproceedings]

Security and Privacy Challenges in Industrial Internet of Things

Ahmad-Reza Sadeghi, Christian Wachsmann, Michael Waidner
In: 52nd Design Automation Conference (DAC) Research, June 2015
[Inproceedings]

How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL

Marcin Nagy, Thanh Bui, Emiliano De Cristofaro, Nadarajah Asokan, Jorg Ott, Ahmad-Reza Sadeghi
In: ACM WiSEC 2015, June 2015
[Inproceedings]

TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits

Ebrahim Songhori, Siam Hussain, Ahmad-Reza Sadeghi, Thomas Schneider, Farinaz Koushanfar
In: 36th IEEE Symposium on Security and Privacy (Oakland), May 2015
[Inproceedings]

Readactor: Practical Code Randomization Resilient to Memory Disclosure

Stephen Crane, Christopher Liebchen, Andrei Homescu, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Stefan Brunthaler, Michael Franz
In: 36th IEEE Symposium on Security and Privacy (Oakland), May 2015
[Inproceedings]

Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications

Felix Schuster, Thomas Tendyck, Christopher Liebchen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz
In: 36th IEEE Symposium on Security and Privacy (Oakland), May 2015
[Inproceedings]

XiOS: Extended Application Sandboxing on iOS

Mihai Bucicoiu, Lucas Davi, Razvan Deaconescu, Ahmad-Reza Sadeghi
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), April 2015
[Inproceedings]

Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming

Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Kevin Snow, Fabian Monrose
In: 22nd Annual Network & Distributed System Security Symposium (NDSS), February 2015
[Inproceedings]

Market-driven Code Provisioning to Mobile Secure Hardware

Alexandra Dmitrienko, Stephan Heuser, Thien Duc Nguyen, Marcos da Silva Ramos, Andre Rein, Ahmad-Reza Sadeghi
In: Financial Cryptography and Data Security, January 2015
[Inproceedings]

Smart and Secure Cross-Device Apps for the Internet of Advanced Things

Christoph Busold, Stephan Heuser, Jon Rios, Ahmad-Reza Sadeghi, Nadarajah Asokan
In: Financial Cryptography and Data Security, January 2015
[Inproceedings]

I know where you are: Proofs of Presence resilient to malicious provers

Markus Miettinen, Nadarajah Asokan, Farinaz Koushanfar, Thien Duc Nguyen, Jon Rios, Ahmad-Reza Sadeghi, Majid Sobhani, Sudha Yellapantula
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), 2015
[Inproceedings]

Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? - Keynote -

Ahmad-Reza Sadeghi, Lucas Davi, Per Larsen
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), 2015
[Inproceedings]

2014

Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions

Christian Wachsmann, Ahmad-Reza Sadeghi
In: Synthesis Lectures on Information Security, Privacy, and Trust, December 2014
Morgan & Claypool Publishers
[Online-Edition: http://dx.doi.org/10.2200/S00622ED1V01Y201412SPT012]
[Book]

Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices

Markus Miettinen, Nadarajah Asokan, Thien Duc Nguyen, Ahmad-Reza Sadeghi, Majid Sobhani
In: Proc. ACM Conference on Computer and Communications Security, November 2014
ACM
[Inproceedings]

Swap and Play: Live Updating Hypervisors and Its Application to Xen

Ahmad-Reza Sadeghi, Ferdinand Brasser
In: CCSW 2014: The ACM Cloud Computing Security Workshop Proceedings, November 2014
[Online-Edition: http://dl.acm.org/citation.cfm?doid=2664168.2664173]
[Inproceedings]

Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks

Moreno Ambrosin, Christoph Busold, Mauro Conti, Ahmad-Reza Sadeghi, Matthias Schunter
In: Computer Security - ESORICS 2014, Vol. 8712, p. 76-93, September 2014
Springer International Publishing
[InCollection]

Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection

Lucas Davi, Daniel Lehmann, Ahmad-Reza Sadeghi, Fabian Monrose
In: 23rd USENIX Security Symposium, August 2014
[Inproceedings]

ASM: A Programmable Interface for Extending Android Security

Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi
In: 23rd USENIX Security Symposium, August 2014
[Inproceedings]

The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques

Lucas Davi, Daniel Lehmann, Ahmad-Reza Sadeghi
In: BlackHat USA, August 2014
[Inproceedings]

Mobile Trusted Computing

N. Asokan, Jan-Erik Ekberg, Kari Kostiainen, Anand Rajan, Carlos Rozas, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann
In: Proceedings of the IEEE, Vol. 102, p. 1189-1206, August 2014
[Article]

Security Analysis of Mobile Two-Factor Authentication Schemes

Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, Ahmad-Reza Sadeghi
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, Vol. 18, July 2014
[Online-Edition: https://noggin.intel.com/system/files/article/Security%20Analysis%20of%20Mobile%20Two-Factor%20Authentication%20Schemes.pdf]
[Article]

ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award)

Markus Miettinen, Stephan Heuser, Wiebke Kronz, Ahmad-Reza Sadeghi, Nadarajah Asokan
In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014) , June 2014
[Inproceedings]

PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs

Joonho Kong, Farinaz Koushanfar, Praveen Pendyala, Ahmad-Reza Sadeghi, Christian Wachsmann
In: Design Automation Conference (DAC) 2014, p. 1-6, June 2014
ACM Press
[Inproceedings]

Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation

Lucas Davi, Patrick Koeberl, Ahmad-Reza Sadeghi
In: 51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing, June 2014
[Inproceedings]

You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks

Hossen Mustafa, Ahmad-Reza Sadeghi, Steffen Schulz, Wenyuan Xu
In: 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2014
[Inproceedings]

TrustLite: A Security Architecture for Tiny Embedded Devices

Patrick Koeberl, Steffen Schulz, Ahmad-Reza Sadeghi, Vijay Varadharajan
In: European Conference on Computer Systems (EuroSys), April 2014
ACM
[Inproceedings]

Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection

Lucas Davi, Daniel Lehmann, Ahmad-Reza Sadeghi, Fabian Monrose
April 2014
[Techreport]

On the (In)Security of Mobile Two-Factor Authentication

Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, Ahmad-Reza Sadeghi
In: Financial Cryptography and Data Security (FC'14), March 2014
Springer
[Inproceedings]

POSTER: On Offline Payments with Bitcoin

Alexandra Dmitrienko, David Noack, Ahmad-Reza Sadeghi, Moti Yung
In: FC'2014: Financial Cryptography and Data Security Conference, March 2014
[Inproceedings]

MoP-2-MoP - Mobile private microblogging

Marius Senftleben, Mihai Bucicoiu, Erik Tews, Frederik Armknecht, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
In: Financial Cryptography and Data Security (FC'14), March 2014
Springer
[Inproceedings]

ASM: A Programmable Interface for Extending Android Security

Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi
March 2014
[Techreport]

Key2Share for Authentication Services

Christoph Busold, Alexandra Dmitrienko, Christian Wachsmann
In: SmartCard Workshop, February 2014
[Inproceedings]

2013

Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications

Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, Nadarajah Asokan, Ahmad-Reza Sadeghi
In: Annual Computer Security Applications Conference (ACSAC 2013), December 2013
[Inproceedings]

From big smartphone data to worldwide research: The Mobile Data Challenge

Juha Laurila, Daniel Gatica-Perez, Imad Aad, Jan Blom, Olivier Bornet, Trinh Minh Tri Do, Olivier Dousse, Julien Eberle, Markus Miettinen
In: Pervasive and Mobile Computing, Vol. 9, p. 752-771, December 2013
[Article]

Mobile Platform Security

Nadarajah Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, Ahmad-Reza Sadeghi
In: Synthesis Lectures on Information Security, Privacy, and Trust, Vol. 4, December 2013
Morgan & Claypool
[Online-Edition: http://www.morganclaypool.com/doi/abs/10.2200/S00555ED1V01Y201312SPT009]
[Book]

A Security Framework for Analysis and Design of Software Attestation

Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann
In: ACM Conference on Computer and Communications Security (CCS), p. 1-12, November 2013
ACM Press
[Online-Edition: http://eprint.iacr.org/2013/083]
[Inproceedings]

Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets

Blaine Stancill, Kevin Snow, Nathan Otterness, Fabian Monrose, Lucas Davi, Ahmad-Reza Sadeghi
In: 16th Research in Attacks, Intrusions and Defenses (RAID) Symposium, October 2013
[Inproceedings]

Trusted and Privacy-Preserving Embedded Systems

Christian Wachsmann
September 2013
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3851/]
[Phdthesis]

Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies

Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi
In: 22nd USENIX Security Symposium (USENIX Security '13), August 2013
USENIX
[Inproceedings]

On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs

Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Vol. 8068, p. 107-125, August 2013
Springer
[Inproceedings]

Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same

Kevin Snow, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Fabian Monrose, Ahmad-Reza Sadeghi
In: BlackHat USA, August 2013
[Inproceedings]

ConXsense – Context Sensing for Adaptive Usable Access Control

Markus Miettinen, Stephan Heuser, Wiebke Kronz, Ahmad-Reza Sadeghi, Nadarajah Asokan
August 2013
[Techreport]

Client-controlled Cryptography-as-a-Service in the Cloud

Sören Bleikertz, Sven Bugiel, Hugo Ideler, Stefan Nürnberger, Ahmad-Reza Sadeghi
In: 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), June 2013
[Inproceedings]

CrowdShare: Secure Mobile Resource Sharing

Nadarajah Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider, Stanislaus Stelle
In: 11th International Conference on Applied Cryptography and Network Security (ACNS'13), Vol. 7954, p. 432-440, June 2013
Springer
[Inproceedings]

Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (Best Student Paper Award)

Kevin Snow, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Fabian Monrose, Ahmad-Reza Sadeghi
In: 34th IEEE Symposium on Security and Privacy (Oakland 2013), May 2013
[Inproceedings]

Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM

Lucas Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013) , May 2013
[Inproceedings]

Vertrauenswürdige Smartphones: Technologien und Lösungen

Ammar Alkassar, Stephan Heuser, Christian Stüble
In: 13. Deutscher IT-Sicherheitskongress, May 2013
[Inproceedings]

Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions

Unal Kocabas, Patrick Koeberl, Ahmad-Reza Sadeghi
In: Conference on Digital Automation and Test Europe (DATE), March 2013
Interactive Presentation
[Inproceedings]

Smashing WEP in a Passive Attack

Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux
In: 20th International Workshop on Fast Software Encryption (FSE), March 2013
[Inproceedings]

A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design

Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
In: Journal of Computer Security, Vol. 21, p. 283-315, February 2013
[Article]

Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer

Christoph Busold, Alexandra Dmitrienko, Hervé Seudié, Ahmed Taha, Majid Sobhani, Christian Wachsmann, Ahmad-Reza Sadeghi
In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, p. 233-242, February 2013
ACM Press
[Inproceedings]

PSiOS: Bring Your Own Privacy & Security to iOS Devices (Distinguished Paper Award)

Tim Werthmann, Ralf Hund, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 2013
[Inproceedings]

2012

Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication

Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Ahmad-Reza Sadeghi
In: BlackHat Abu Dhabi, December 2012
[Inproceedings]

myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android

Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi
November 2012
[Techreport]

Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware

Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi
November 2012
[Techreport]

On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes

Norman Göttert, Thomas Feller, Michael Schneider, Sorin Huss, Johannes Buchmann
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), p. 512-529, September 2012
Springer
[Online-Edition: https://www.cosic.esat.kuleuven.be/ches2012/]
[Inproceedings]

PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon

Stefan Katzenbeisser, Ünal Kocabaş, Vladimir Rožic, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Vol. 7428, p. 283-301, September 2012
Springer
[Inproceedings]

Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling

Aditi Gupta, Markus Miettinen, N. Asokan, Marcin Nagy
In: 2012 International Conference on Privacy, Security, Risk and Trust (PASSAT), and 2012 International Confernece on Social Computing (SocialCom), p. 471 - 480, September 2012
IEEE
[Inproceedings]

XIFER: A Software Diversity Tool Against Code-Reuse Attacks

Lucas Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012), August 2012
[Inproceedings]

The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version)

Ahmad-Reza Sadeghi, Steffen Schulz, Vijay Varadharajan
August 2012
[Techreport]

SmartTokens: Delegable Access Control with NFC-enabled Smartphones

Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar, Christian Wachsmann
In: International Conference on Trust & Trustworthy Computing (TRUST), Vol. 7344, p. 219-238, June 2012
Springer
[Inproceedings]

Converse PUF-Based Authentication

Ahmad-Reza Sadeghi, Ünal Kocabaş, Stefan Katzenbeisser
In: International Conference on Trust & Trustworthy Computing (TRUST), June 2012
Springer
[Inproceedings]

EDA for Secure and Dependable Cybercars: Challenges and Opportunities

Hervé Seudié, Farinaz Koushanfar, Ahmad-Reza Sadeghi
In: ACM/IEEE Design Automation Conference (DAC), May 2012
[Inproceedings]

Unsafe Exposure Analysis of Mobile In-App Advertisements

Xuxian Jiang, Michael Grace, Ahmad-Reza Sadeghi, Wu Zhou
In: to appear at WiSec, April 2012
ACM
[Inproceedings]

Tetherway: A Framework for Tethering Camouflage

Steffen Schulz, Ahmad-Reza Sadeghi, Maria Zhdanova, Wenyuan Xu, Hossen Mustafa, Vijay Varadharajan
In: Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), April 2012
ACM Press
[Inproceedings]

Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions

Christian Wachsmann, Ahmad-Reza Sadeghi, Steffen Schulz
In: Secure Smart Embedded Devices, Platforms and Applications, p. 429-449, April 2012
Springer
[InCollection]

Sicherheitskern(e) für Smartphones: Ansätze und Lösungen

Ammar Alkassar, Steffen Schulz, Christian Stüble
In: Datenschutz und Datensicherheit (DuD), Vol. 2012, p. 175-179, March 2012
[Article]

POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC

Amitabh Das, Ünal Kocabaş, Ahmad-Reza Sadeghi, Ingrid Verbauwhede
In: Conference on Digital Automation and Test Europe (DATE), March 2012
[Inproceedings]

TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures

Alysson Bessani, Imad M. Abbadi, Sven Bugiel, Emanuele Cesena, Mina Deng, Michael Gröne, Ninja Marnau, Stefan Nürnberger, Marcelo Pasin, Norbert Schirmer
In: European Research Activities in Cloud Computing. Chapter 6. , p. 160-186, March 2012
Cambridge Scholars Publishing
[Book]

CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm

Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi, Thomas Schneider
In: Financial Cryptography (FC'12), LNCS, Vol. 7397, p. 299-313, February 2012
Springer
[Inproceedings]

MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones

Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi
In: 19th Annual Network & Distributed System Security Symposium (NDSS), February 2012
[Inproceedings]

Towards Taming Privilege-Escalation Attacks on Android

Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry
In: 19th Annual Network & Distributed System Security Symposium (NDSS), February 2012
[Inproceedings]

Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs

Anthony Van Herrewege, Stefan Katzenbeisser, Roel Maes, Roel Peeters, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann
In: Financial Cryptography (FC) 2012, Vol. 7397, p. 374-389, February 2012
Springer
[Inproceedings]

Softer Smartcards: Usable Cryptographic Tokens with Secure Execution

Steffen Schulz, Ferdinand Brasser, Atanas Filyanov
In: Financial Cryptography and Data Security (FC), February 2012
Springer
[Online-Edition: www.trust.cased.de/research/projects/current-projects/software-smartcards/]
[Inproceedings]

The Mobile Data Challenge: Big Data for Mobile Computing Research

Juha Laurila, Daniel Gatica-Perez, Imad Aad, Jan Blom, Olivier Bornet, Trinh-Minh-Tri Do, Olivier Dousse, Julien Eberle, Markus Miettinen
In: Proceedings of the Workshop on the Nokia Mobile Data Challenge, in Conjunction with the 10th International Conference on Pervasive Computing, 2012
[Online-Edition: https://research.nokia.com/page/12340]
[Inproceedings]

The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs

Ahmad-Reza Sadeghi, Steffen Schulz, Vijay Varadharajan
In: European Symposium on Research in Computer Science (ESORICS), 2012
Springer Verlag
[Inproceedings]

PeerSense: Who is near you?

Aditi Gupta, Markus Miettinen, Marcin Nagy, Nadarajah Asokan, Alexandre Wetzel
In: Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), p. 516-518, 2012
[Inproceedings]

2011

Twin Clouds: Secure Cloud Computing with Low Latency

Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider
In: Communications and Multimedia Security Conference (CMS'11), Vol. 7025, p. 32-44, October 2011
Springer
[Inproceedings]

AmazonIA: When Elasticity Snaps Back

Sven Bugiel, Stefan Nürnberger, Thomas Pöppelmann, Ahmad-Reza Sadeghi, Thomas Schneider
In: 18th ACM Conference on Computer and Communications Security (CCS'11), p. 17-21, October 2011
ACM
[Inproceedings]

POSTER: Control-Flow Integrity for Smartphones

Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi
In: 18th ACM Conference on Computer and Communications Security (CCS'11), October 2011
ACM
[Inproceedings]

POSTER: The Quest for Security against Privilege Escalation Attacks on Android

Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry
In: 18th ACM Conference on Computer and Communications Security (CCS'11), October 2011
ACM
[Inproceedings]

POSTER: Practical Embedded Remote Attestation Using Physically Unclonable Functions

Ünal Kocabaş, Steffen Schulz
In: ACM Conference on Computer and Communications Security (CCS), p. 797-800, October 2011
ACM Press
[Inproceedings]

Scalable Trust Establishment with Software Reputation

Sven Bugiel, Lucas Davi, Steffen Schulz
In: Workshop on Scalable Trusted Computing (STC), October 2011
ACM Press
[Online-Edition: https://freeside.trust.cased.de/apt-sec/]
[Inproceedings]

Trusted Virtual Domains on OKL4: Secure Information Sharing on Smartphones

Lucas Davi, Alexandra Dmitrienko, Christoph Kowalski, Marcel Winandy
In: Proceedings of the 6th ACM Workshop on Scalable Trusted Computing (STC), October 2011
ACM Press
[Inproceedings]

Practical and Lightweight Domain Isolation on Android

Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Ahmad-Reza Sadeghi, Bhargava Shastry
In: Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM), October 2011
ACM Press
[Inproceedings]

Random Sampling for Short Lattice Vectors on Graphics Cards

Michael Schneider, Norman Göttert
In: Workshop on Cryptographic Hardware and Embedded Systems 2011 (CHES 2011), p. 160-175, September 2011
Springer
[Online-Edition: www.iacr.org/workshops/ches/ches2011/]
[Inproceedings]

Privacy Preservation Approach in Service Ecosystems

Yiyun Shen, Markus Miettinen, Pirjo Moen, Lea Kutvonen
In: 15th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW), p. 283 - 292 , August 2011
IEEE
[Inproceedings]

Uni-directional Trusted Path: Transaction Confirmation on Just One Device

Atanas Filyanov, Jonathan McCune, Ahmad-Reza Sadeghi, Marcel Winandy
In: 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2011), June 2011
[Inproceedings]

Lightweight Remote Attestation Using Physical Functions

Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann
In: ACM Conference on Wireless Network Security (WiSec), p. 109-114, June 2011
ACM Press
[Inproceedings]

Privacy-Preserving ECG Classification with Branching Programs and Neural Networks

Mauro Barni, Pierluigi Failla, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider
In: IEEE Transactions on Information Forensics and Security (TIFS), Vol. 6, Nr. 2, June 2011
[Article]

Location Privacy in RFID Systemen

Ahmad-Reza Sadeghi, Christian Wachsmann
In: Digma - Zeitschrift für Datenrecht und Informationssicherheit, Vol. 11, p. 70-75, June 2011
[Article]

Lightweight Remote Attestation using Physical Functions (Extended Version)

Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann
June 2011
[Techreport]

Reden ist Silber - Schweigen ist Gold: Datensparsamkeit durch effizientes Rechnen unter Verschlüsselung

Thomas Schneider
In: 12. Deutscher IT-Sicherheitskongress des BSI: Sicher in die digitale Welt von morgen, May 2011
SecuMedia-Verlag
[Inproceedings]

A Formal Foundation for the Security Features of Physical Functions

Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, François-Xavier Standaert, Christian Wachsmann
In: IEEE Symposium on Security and Privacy (SSP), p. 397-412, May 2011
IEEE Computer Society
[Inproceedings]

XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks

Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi
April 2011
[Techreport]

Twin Clouds: An Architecture for Secure Cloud Computing (Extended Abstract)

Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider
In: Workshop on Cryptography and Security in Clouds (CSC'11), March 2011
[Inproceedings]

ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks

Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy
In: 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), March 2011
[Inproceedings]

hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers

Shujun Li, Ahmad-Reza Sadeghi, Soeren Heisrath, Roland Schmitz, Junaid Jameel Ahmad
In: 15th International Conference on Financial Cryptography and Data Security (FC), February 2011
[Online-Edition: http://ifca.ai/fc11/]
[Inproceedings]

Secure Set Intersection with Untrusted Hardware Tokens

Marc Fischlin, Benny Pinkas, Ahmad-Reza Sadeghi, Thomas Schneider, Ivan Visconti
In: 11th Cryptographers' Track at the RSA Conference (CT-RSA'11), Vol. 6558, p. 1-16, February 2011
Springer
[Inproceedings]

Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates

M. Kneževic, K. Kobayashi, J. Ikegami, S. Matsuo, A. Satoh, U. Kocabas, J. Fan, T. Katashita, T. Sugawara, K. Sakiyama, I. Verbauwhede, K. Ohta, N. Homma, T. Aoki
In: IEEE Transactions on VLSI journal, January 2011
[Article]

Re-synchronizing audio watermarking after nonlinear time stretching

Stefan Nürnberger, Martin Steinebach, Sascha Zmudzinski
In: Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII, January 2011
[Inproceedings]

A Security Architecture for Accessing Health Records on Mobile Phones

Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
In: HEALTHINF'2011: Proceedings of the 4th International Conference on Health Informatics, January 2011
[Inproceedings]

Securing the Access to Electronic Health Records on Mobile Phones

Alexandra Dmitrienko, Zecir Hadzic, Hans Lhr, Ahmad-Reza Sadeghi, Marcel Winandy
In: Biomedical Engineering Systems and Technologies, 2011
[Inproceedings]

Recyclable PUFs: Logically Reconfigurable PUFs

Stefan Katzenbeisser, Ünal Kocabaş, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert-Jan Schrijen, Heike Schröder, Christian Wachsmann
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Vol. 6917, p. 374-389, 2011
Springer
[Inproceedings]

Recyclable PUFs: logically reconfigurable PUFs

Stefan Katzenbeisser, Ünal Kocabaş, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert-Jan Schrijen, Christian Wachsmann
In: Journal of Cryptographic Engineering, Vol. 1, p. 177-186, 2011
[Article]

Using context-profiling to aid in access control decisions on mobile devices

Aditi Gupta, Markus Miettinen, N. Asokan
In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), p. 310 - 312, 2011
[Inproceedings]

2010

Impossibility Results for RFID Privacy Notions

Frederik Armknecht, Ahmad-Reza Sadeghi, Alessandra Scafuro, Ivan Visconti, Christian Wachsmann
In: Transactions on Computational Science IX, Vol. 6480, p. 39-63, December 2010
Springer
[Inproceedings]

Breaking e-Banking CAPTCHAs

Ahmad-Reza Sadeghi, Shujun Li, Syed Amier Haider Shah, Muhammad Asad Usman Khan, Syed Ali Khayam, Roland Schmitz
In: 26th Annual Computer Security Applications Conference (ACSAC 2010), December 2010
[Online-Edition: http://www.acsac.org/]
[Inproceedings]

TruWalletM: Secure Web Authentication on Mobile Platforms

Sven Bugiel, Alexandra Dmitrienko, Kari Kostiainen, Ahmad-Reza Sadeghi, Marcel Winandy
In: Proceedings of INTRUST 2010 The Second International Conference on Trusted Systems, December 2010
[Inproceedings]

Securing the E-Health Cloud

Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
In: 1st ACM International Health Informatics Symposium (IHI 2010), November 2010
[Inproceedings]

Efficient Secure Two-Party Computation with Untrusted Hardware Tokens

Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
In: Towards Hardware Intrinsic Security: Foundation and Practice, p. 367-386, November 2010
Springer Berlin Heidelberg
[Online-Edition: http://www.springerlink.com/content/v717986n7r261772]
[InCollection]

Implementing an Application-Specific Credential Platform Using Late-Launched Mobile Trusted Module

Sven Bugiel, Jan-Erik Ekberg
In: 5th Annual Workshop on Scalable Trusted Computing (STC 2010), October 2010
[Inproceedings]

Video Streaming Forensic - Content Identification with Traffic Snooping

Ahmad-Reza Sadeghi, Biswanath Mukherjee, Dipak Ghosal, Yali Liu
In: 13th Information Security Conference (ISC 2010), October 2010
[Online-Edition: http://math.fau.edu/%7Eisc2010]
[Inproceedings]

Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments

Hans Löhr, Thomas Pöppelmann, Johannes Rave, Martin Steegmanns, Marcel Winandy
In: 5th Annual Workshop on Scalable Trusted Computing (STC 2010), October 2010
[Inproceedings]

Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices

Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Christian Wachsmann, Johannes Winter
In: Information Security Conference (ISC), Vol. 6531, p. 84-98, October 2010
Springer
[Inproceedings]

Return-Oriented Programming without Returns

Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy
In: Proceedings of the 17th ACM conference on Computer and communications security, p. 559--572, October 2010
ACM
[Online-Edition: http://doi.acm.org/10.1145/1866307.1866370]
[Inproceedings]

Privilege Escalation Attacks on Android

Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy
In: ISC 2010: Proceedings of the 13th Information Security Conference, October 2010
[Inproceedings]

Enhancing RFID Security and Privacy by Physically Unclonable Functions

Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: Towards Hardware-Intrinsic Security: Foundations and Practice, p. 281-307, September 2010
Springer
[InBook]

Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten

Ahmad-Reza Sadeghi, Thomas Schneider
In: Workshop Innovative und sichere Informationstechnologie für das Gesundheitswesen von morgen (perspeGKtive'10), Vol. P-174, p. 11-25, September 2010
[Online-Edition: http://www.perspegktive.de]
[Inproceedings]

A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols

José Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
In: 15th European Symposium on Research in Computer Security (ESORICS'10), Vol. 6345, p. 151--167, September 2010
Springer
[Online-Edition: http://www.esorics2010.org]
[Inproceedings]

RAY - A Secure Microkernel Architecture

Stefan Nürnberger, Thomas Feller, Sorin Huss
In: IEEE Privacy Security and Trust 2010 (PST2010), August 2010
[Inproceedings]

Trusted Computing

Ahmad-Reza Sadeghi, Christian Wachsmann
In: Handbook of Financial Cryptography and Security, p. 221-256, August 2010
CRC Press
[Inproceedings]

YAZKC: Yet Another Zero-Knowledge Compiler

Endre Bangerter, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
August 2010
[Online-Edition: http://www.usenix.org/events/sec10/poster.html]
[Misc]

Return-Oriented Programming without Returns on ARM

Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy
July 2010
[Techreport]

Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic

Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Stefan Katzenbeisser
In: Information Hiding Conference (IH), June 2010
Springer
[Inproceedings]

On RFID Privacy with Mutual Authentication and Tag Corruption

Frederik Armknecht, Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: International Conference on Applied Cryptography and Network Security (ACNS), Vol. 6123, p. 493-510, June 2010
Springer
[Inproceedings]

Anonymous Authentication with TLS and DAA

Ahmad-Reza Sadeghi, Hans Löhr, Emanuele Cesena, Gianluca Ramunno, Davide Vernizzi
In: TRUST2010, June 2010
[Inproceedings]

Anonymous Authentication for RFID Systems

Frederik Armknecht, Liqun Chen, Ahmad-Reza Sadeghi, Christian Wachsmann
In: Workshop on RFID Security (RFIDSec), Vol. 6370, p. 158-175, June 2010
Springer
[Inproceedings]

Key Attestation from Trusted Execution Environments

Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ekberg, Ahmad-Reza Sadeghi, Nadarajah Asokan
In: TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, p. 30--46, June 2010
[Inproceedings]

Token-Based Cloud Computing -- Secure Outsourcing of Data and Arbitrary Computations with Lower Latency

Ahmad-Reza Sadeghi, Thomas Schneider, Marcel Winandy
In: 3rd International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud, Vol. 6101, p. 417--429, June 2010
Springer
[Online-Edition: http://www.trust2010.org/workshop-cloud.html]
[Inproceedings]

Breaking a Virtual Password System Based on Randomized Linear Generation Functions

Ahmad-Reza Sadeghi, Shujun Li, Syed Ali Khayam, Roland Schmitz
In: IEEE ICC 2010 - Communication and Information System Security Symposium ('ICC'10 CISS'), May 2010
[Online-Edition: http://www.ieee-icc.org/2010/]
[Inproceedings]

Trusted Virtual Domains: Color Your Network

Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
In: Datenschutz und Datensicherheit (DuD), Vol. 5, p. 289-298, May 2010
[Article]

Rethinking The Link Security Approach to Manage Large Scale Ethernet Network

Khan Wahid
In: 17th IEEE Workshop on Local and Metropolitan Area Networks (LANMAN 2010), New Jersey, USA, May 2010. Page(s): 1 - 6, DOI: 10.1109/LANMAN.2010.5507143, IEEE Xplore Digital Library, May 2010
[Inproceedings]

Maximizing Ethernet Security by Switch-based Single Secure Domain

Khan Wahid
In: 7th International Conference on Information Technology: New Generations (ITNG 2010), Las Vegas, USA, April 2010. Page(s): 774 - 778, DOI: 10.1109/ITNG.2010.143, IEEE Xplore Digital Library, May 2010
[Inproceedings]

PUF-Enhanced RFID Security and Privacy

Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: Workshop on Secure Component and System Identification (SECSI), April 2010
[Inproceedings]

ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks

Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy
March 2010
[Techreport]

Patterns for Secure Boot and Secure Storage in Computer Systems

Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
In: 4th International Workshop on Secure systems methodologies using patterns (SPattern 2010),, February 2010
[Inproceedings]

Modular Design of Efficient Secure Function Evaluation Protocols

Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
February 2010
[Online-Edition: http://eprint.iacr.org/2010/079/]
[Misc]

Embedded SFE: Offloading server and network using hardware tokens

Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
In: 14th International Conference on Financial Cryptography and Data Security (FC'10), Vol. 6052, January 2010
Springer
[Inproceedings]

Implementation of Binary Edwards Curves for very-constrained Devices

In: IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP), January 2010
[Article]

Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers

Ahmad-Reza Sadeghi, Christian Stüble, Serdar Cabuk, Chris Dalton, Konrad Eriksson, Dirk Kuhlmann, Hari Govind Ramasamy, Gianluca Ramunnok, Matthias Schunter
In: Journal of Computer Security, Vol. 18, p. 89-121, January 2010
[Article]

Extending IPsec for Efficient Remote Attestation

Steffen Schulz, Ahmad-Reza Sadeghi
In: Financial Cryptography and Data Security (FC), Vol. LNCS, January 2010
Springer
[Inproceedings]

Prototyping Platform for Performance Evaluation of SHA-3 Candidates

K. Kobayashi, J. Ikegami, M. Kneževic, X. Guo, S. Matsuo, S. Huang, L. Nazhandali, U. Kocabas, J. Fan, A. Satoh, I. Verbauwhede, K. Sakiyama, K. Ohta
In: IEEE International Workshop on Hardware-Oriented Security and Trust - HOST 2010, pp. 60-63, 2010
[Inproceedings]

TASTY: Tool for Automating Secure Two-partY computations

Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg
In: 17th ACM Conference on Computer and Communications Security (CCS'10), p. 451-462, 2010
ACM
[Inproceedings]

Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs

Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
In: 12th International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10), Vol. 6225, p. 383-397, 2010
Springer
[Inproceedings]

Towards security policy decisions based on context profiling

Markus Miettinen, N. Asokan
In: Proceedings of the 3rd ACM workshop on Artificial intelligence and security (AISec '10), p. 19-23, 2010
ACM
[Inproceedings]

2009

Improved garbled circuit building blocks and applications to auctions and computing minima

Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
In: 8th International Conference on Cryptology And Network Security (CANS'09), Vol. 5888, December 2009
Springer
[Inproceedings]

Memory Leakage-Resilient Encryption based on Physically Unclonable Functions

Ahmad-Reza Sadeghi, Frederik Armknecht, Roel Maes, Berk Sunar, Pim Tuyls
In: ASIACRYPT'09, December 2009
[Inproceedings]

On the Security of PAS (Predicate-based Authentication Service)

Ahmad-Reza Sadeghi, Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Roland Schmitz, Huaxiong Wang
In: Annual Computer Security Applications Conference (ACSAC’09), 2009. , December 2009
[Inproceedings]

Trusted Virtual Domains - Design, Implementation and Lessons Learned

Luigi Catuogno, Alexandra Dmitrienko, Konrad Eriksson, Dirk Kuhlmann, Gianluca Ramunno, Ahmad-Reza Sadeghi, Steffen Schulz, Matthias Schunter, Marcel Winandy, Jing Zhan
In: International Conference on Trusted Systems (INTRUST), December 2009
Springer
[Inproceedings]

Anonymizer-Enabled Security and Privacy for RFID

Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: International Conference on Cryptology and Network Security (CANS), Vol. 5888, p. 134-153, December 2009
Springer
[Inproceedings]

Secure Two-Party Computation is Practical

Benny Pinkas, Thomas Schneider, Nigel Smart, Stephen Williams
In: 15th Advances in Cryptology - ASIACRYPT 2009, Vol. 5912, p. 250-267, December 2009
Springer
[Online-Edition: http://eprint.iacr.org/2009/314]
[Inproceedings]

Efficient Privacy-Preserving Classification of ECG Signals

Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
In: 1st IEEE International Workshop on Information Forensics and Security (IEEE WIFS'09), p. 91--95, December 2009
IEEE
[Inproceedings]

Security of robust audio hashes

Stefan Thiemert, Stefan Nürnberger, Martin Steinebach, Sascha Zmudzinski
In: IEEE International Workshop on Information Forensics and Security, WIFS 2009, London, UK, December 2009
[Inproceedings]

Efficient Privacy-Preserving Face Recognition

Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg
In: 12th International Conference on Information Security and Cryptology (ICISC'09), Vol. 5984, p. 229-244, December 2009
Springer
[Inproceedings]

Post-Payment Copyright System versus Online Music Shop: Business Model and Privacy

Heikki Kokkinen, Mikko Heikkinen, Markus Miettinen
In: International Journal on Advances in Security, Vol. 2, p. 112-128, December 2009
[Article]

Trust in a Small Package: Minimized MRTM Software Implementation for Mobile Secure Environments

Jan-Erik Ekberg, Sven Bugiel
In: 4th Annual Workshop on Scalable Trusted Computing (STC2009), November 2009
[Inproceedings]

A Practical Property-based Bootstrap Architecture

Ahmad-Reza Sadeghi, Christian Stüble, Jing Zhan, René Korthaus
In: ACMSTC'09, November 2009
[Inproceedings]

Transparent Mobile Storage Protection in Trusted Virtual Domains

Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy
In: 23rd Large Installation System Administration Conference (LISA '09), p. 159-172, November 2009
[Inproceedings]

TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication

Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
In: 4th ACM Workshop on Scalable Trusted Computing, November 2009
[Inproceedings]

On the design and implementation of efficient zero-knowledge proofs of knowledge

Endre Bangerter, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, Joe-Kai Tsay
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09), October 2009
[Inproceedings]

Improved garbled circuit building blocks and applications to auctions and computing minima

Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09), October 2009
[Inproceedings]

Future of Assurance: Ensuring that a System is Trustworthy

Ahmad-Reza Sadeghi, Claire Vishik, Ingrid Verbauwhede
In: ISSE'09, October 2009
[Inproceedings]

Secure evaluation of private linear branching programs with medical applications

Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider
In: 14th European Symposium on Research in Computer Security (ESORICS'09), Vol. 5789, September 2009
Springer
[Inproceedings]

Hide and Seek in Time - Robust Covert Timing Channels

Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Stefan Katzenbeisser
In: European Symposium on Research in Computer Security (ESORICS), p. 120-135, September 2009
Springer
[Inproceedings]

Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification

Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider
In: 1st International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09), September 2009
[Online-Edition: http://www.speedproject.eu/index.php?option=com_content&task=view&id=33&Itemid=68]
[Inproceedings]

How to Combine Homomorphic Encryption and Garbled Circuits - Improved Circuits and Computing the Minimum Distance Efficiently

Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
In: 1st International Workshop on Signal Processing in the Encrypted Domain (SPEED'09), September 2009
[Online-Edition: http://www.speedproject.eu/index.php?option=com_content&task=view&id=33&Itemid=68]
[Inproceedings]

Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks

Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy
In: Proceedings of the 2009 ACM workshop on Scalable trusted computing, p. 49--54, September 2009
ACM
[Online-Edition: http://doi.acm.org/10.1145/1655108.1655117]
[Inproceedings]

Location Privacy in RFID Applications

Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: Privacy in Location-Based Applications: Research Issues and Emerging Trends, Vol. 5599, p. 127-150, August 2009
Springer
[Inproceedings]

A Pattern for Secure Graphical User Interface Systems

Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy
In: 3rd International Workshop on Secure systems methodologies using patterns (SPattern'09), Proceedings of the 20th International Workshop on Database and Expert Systems Applications, p. 186-190, August 2009
IEEE
[Inproceedings]

Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage

Ahmad-Reza Sadeghi, Klaus Kursawe, Dries Schellekens, Boris Skoric, Pim Tuyls
In: 2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), July 2009
[Inproceedings]

Enhancing RFID Security and Privacy by Physically Unclonable Functions (Extended Abstract)

Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: Foundations for Forgery-Resilient Cryptographic Hardware, p. 10-11, July 2009
Schloss Dagstuhl
[Inproceedings]

Efficient RFID Security and Privacy with Anonymizers

Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: Workshop on RFID Security (RFIDSec), June 2009
[Online-Edition: http://www.cosic.esat.kuleuven.be/rfidsec09/]
[Inproceedings]

Einsatz von Sicherheitskernen und Trusted Computing

Ahmad-Reza Sadeghi, Marcel Winandy
In: D-A-CH Security , May 2009
[Inproceedings]

Bringing zero-knowledge proofs of knowledge to practice

Endre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, Joe-Kai Tsay
In: 17th International Workshop on Security Protocols (SPW'09), Vol. 7028, April 2009
Springer
[Inproceedings]

Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing

Hans Löhr, Ahmad-Reza Sadeghi, Claire Vishik, Marcel Winandy
In: 5th Information Security Practice and Experience Conference (ISPEC'09), Vol. 5451, p. 396-407, April 2009
Springer
[Inproceedings]

Physically Unclonable Pseudorandom Functions

Ahmad-Reza Sadeghi, Frederik Armknecht, Pim Tuyls, Roel Maes, Berk Sunar
In: Poster session of Advances in Cryptology - EUROCRYPT, April 2009
[Inproceedings]

Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels

Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy
In: Proceedings of the 2nd International Conference on Trusted Computing, Vol. 5471, p. 45-62, April 2009
Springer
[Inproceedings]

Secure VPNs for Trusted Computing Environments

Ahmad-Reza Sadeghi, Steffen Schulz
In: International Conference on Trusted Computing (TRUST), April 2009
Springer
[Inproceedings]

Using Compilers to Enhance Cryptographic Product Development

Ahmad-Reza Sadeghi, Endre Bangerter, Manuel Barbosa, Daniel Bernstein, Ivan Damgård, Dan Page, Jakob Pagter, Sampo Sovio
In: Information Security Solutions Europe (ISSE), January 2009
[Inproceedings]

Tiny Public-Key Security Processor

Y. K. Lee, L. Batina, J. Fan, D. Karaklajic, M. Kneževic, U. Kocabas, V. Rožic, I. Verbauwhede
In: ISSCC09 Student Forum, January 2009
[Article]

Automatic Generation of Sigma-Protocols

Endre Bangerter, Thomas Briner, Wilko Henecka, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
In: 6th European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09), Vol. 6391, p. 67--82, 2009
Springer
[Online-Edition: http://www.iit.cnr.it/EUROPKI09/]
[Inproceedings]

Practical Secure Evaluation of Semi-Private Functions

Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
In: 7th International Conference on Applied Cryptography and Network Security (ACNS'09), Vol. 5536, p. 89--106, 2009
Springer
[Inproceedings]

Automatic Generation of Sound Zero-Knowledge Protocols

Endre Bangerter, Jan Camenisch, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
2009
[Misc]

Computer Log Anomaly Detection Using Frequent Episodes

Perttu Halonen, Markus Miettinen, Kimmo Hätönen
In: Artificial Intelligence Applications and Innovations III, Vol. 296, p. 417-422, 2009
Springer US
[InCollection]

2008

Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems

Andy Rupp, Gregor Leander, Endre Bangerter, Alexander Dent, Ahmad-Reza Sadeghi
In: Advances in Cryptology - ASIACRYPT 2008, December 2008
[Inproceedings]

Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification

Ahmad-Reza Sadeghi, Thomas Schneider
In: 11th International Conference on Information Security and Cryptology (ICISC'08), Vol. 5461, p. 336--353, December 2008
Springer
[Inproceedings]

Universally Composable Security Analysis of TLS

Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis, Olivier Pereira
In: Second Conference on Provable Security (ProvSec), November 2008
[Inproceedings]

Improved Security Notions and Protocols for Non-Transferable Identification

Ahmad-Reza Sadeghi, Carlo Blundo, Giuseppe Persiano, Ivan Visconti
In: 13th European Symposium on Research in Computer Security (ESORICS), October 2008
[Inproceedings]

An Efficient Implementation of Trusted Channels Based on OpenSSL

Ahmad-Reza Sadeghi, Frederik Armknecht, Yacine Gasmi, Gianluca Ramunno, Davide Vernizzi, Patrick Stewin, Martin Unger
In: ACMSTC 2008, October 2008
[Inproceedings]

User Privacy in Transport Systems Based on RFID E-Tickets

Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: International Workshop on Privacy in Location-Based Applications (PiLBA), October 2008
[Inproceedings]

Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains

Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Rani Husseiki, Yacine Gasmi, Patrick Stewin, Martin Unger
In: 3rd ACM Workshop on Scalable Trusted Computing, October 2008
[Inproceedings]

A Universally Composable roup Key Exchange Protocol with Minimum Communication Effort

Frederik Armknecht, Jun Furukawa, Kaoru Kurosawa
In: Sixth Conference on Security and Cryptography for Networks (SCN 2008), September 2008
[Inproceedings]

A Demonstrative Ad-hoc Attestation System

Ahmad-Reza Sadeghi, Endre Bangerter, Maksim Djackov
In: Information Security Conference 2008 (ISC'08), September 2008
[Inproceedings]

Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis

Yacine Gasmi, Christian Hessmann, Martin Pittenauer, Marcel Winandy
In: INFORMATIK 2008, Beherrschbare Systeme - dank Informatik, Band 1, Beiträge der 38. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Vol. 1, September 2008
[Inproceedings]

Property-Based Attestation without a Trusted Third Party

Ahmad-Reza Sadeghi, Hans Löhr, Liqun Chen, Mark Manulis
In: Information Security Conference (ISC'08), September 2008
[Inproceedings]

Property-Based TPM Virtualization

Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
In: Information Security, 11th International Conference (ISC 2008), p. 1-16, September 2008
[Inproceedings]

Efficient Helper Data Key Extractor on FPGAs

Ahmad-Reza Sadeghi, Jamshid Shokrollahi, Christoph Bösch, Jorge Guajardo, Pim Tuyls
In: Workshop on Cryptographic Hardware and Embedded Systems 2008 (CHES 2008), August 2008
[Inproceedings]

Resettable and Non-Transferable Chip Authentication for E-Passports

Ahmad-Reza Sadeghi, Carlo Blundo, Giuseppe Persiano, Ivan Visconti
In: RFIDSec 2008, July 2008
[Inproceedings]

Universal circuit for secure function evaluation

Vladimir Kolesnikov, Thomas Schneider
July 2008
[Patent]

Improved Garbled Circuit: Free XOR Gates and Applications

Vladimir Kolesnikov, Thomas Schneider
In: 35th International Colloquium on Automata, Languages and Programming (ICALP'08), Vol. 5126, p. 486-498, July 2008
Springer
[Inproceedings]

CPFP: An efficient key management scheme for large scale personal networks

Frederik Armknecht, Shahab Mirzadeh, Rahim Tafazolli, Jordi Jaen Pallares, Hossam Afifi
In: IEEE ISWPC 2008, May 2008
[Online-Edition: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4556309]
[Inproceedings]

Securing Peer-to-Peer Distributions for Mobile Devices

Ahmad-Reza Sadeghi, Christian Stüble, André Osterhues, Marko Wolf, Nadarajah Asokan
In: 4th Information Security Practice and Experience Conference (ISPEC 2008), April 2008
[Inproceedings]

Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly

Ahmad-Reza Sadeghi, Frederik Armknecht, Hans Löhr, Mark Manulis, Alberto Escalante
In: 4th Information Security Practice and Experience Conference (ISPEC 2008), April 2008
[Inproceedings]

A life-time optimized end-to-end encryption scheme for sensor networks allowing in-networking processing

Frederik Armknecht, Dirk Westhoff, Joao Girao, Alban Hessler
In: Computer Communications Journal, Vol. 31, p. 734-749, March 2008
[Article]

Provably Secure Browser-Based User-Aware Mutual Authentication over TLS

Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis
In: ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), March 2008
[Inproceedings]

Identification Protocols Revisited - Episode I: E-Passports

Ahmad-Reza Sadeghi, Carlo Blundo, Giuseppe Persiano, Ivan Visconti
In: e-crypt workshop on Secure Component and System Identification (SECSI), March 2008
[Inproceedings]

Trusted Computing—State of the Art and Challenges

Ahmad-Reza Sadeghi
In: SOFSEM 2008, 2008
Springer
[Inproceedings]

Sicheres Padding für RSA

Katja Seitz
2008
[Thesis (Master, Bachelor, Diploma)]

2007

Beyond Secure Channels

Ahmad-Reza Sadeghi, Yacine Gasmi, Patrick Stewin, Martin Unger, Nadarajah Asokan
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), p. 30-40, November 2007
ACM Press
[Inproceedings]

Reconfigurable Trusted Computing in Hardware

Christof Paar, Ahmad-Reza Sadeghi, Tim Güneysu, Thomas Eisenbarth, Dries Schellekens, Marko Wolf
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), p. 15-25, November 2007
ACM Press
[Inproceedings]

Enabling Fairer Digital Rights Management with Trusted Computing

Ahmad-Reza Sadeghi, Christopher Wolf, Christian Stüble, Nadarajah Asokan, Jan-Erik Ekberg
In: 10th International Conference on Information Security (ISC 2007), Vol. 4779, p. 53-70, October 2007
Springer Verlag
[Inproceedings]

Creating Next Generation Applications and Services for Mobile Devices: Challenges and Opportunities

Agathe Battestini, Christian Rossow, Adrian Flanagan, Markus Miettinen
In: Proc. IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2007), p. 1-4, September 2007
[Inproceedings]

Combining Tardos Fingerprinting Codes and Fingercasting

Ahmad-Reza Sadeghi, Stefan Katzenbeisser, Boris Skoric, Mehmet Celik
In: 9th International Workshop on Information Hiding (IH 2007), Vol. 4567, p. 294-310, June 2007
Springer Verlag
[Online-Edition: http://www.springerlink.com/content/j5547520ux28g151/]
[Inproceedings]

Browser Models for Usable Authentication Protocols

Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis
In: IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07), 2007
[Inproceedings]

Phishing Phishers - Observing and Tracing Organized Cybercrime

Ahmad-Reza Sadeghi, Sebastian Gajek, Felix Gröbert, Dominik Birk
In: Second International Conference on Internet Monitoring and Protection (ICIMP 2007), p. 3, 2007
IEEE Computer Society
[Online-Edition: http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4271749]
[Inproceedings]

Fingercasting—Joint Fingerprinting and Decryption of Broadcast Messages

Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber
In: Transactions on Data Hiding and Multimedia Security II, Vol. 4499, p. 1-34, 2007
Springer Verlag
[Inproceedings]

Browser-based Authentication Protocols for Naive Users

Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis
In: Western European Workshop on Research in Cryptology (WEWoRC 2007), 2007
[Inproceedings]

Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing

Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
In: Second International Conference on Availability, Reliability and Security (ARES 2007), p. 120-127, 2007
[Inproceedings]

A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting

Ahmad-Reza Sadeghi, Hans Löhr, Liqun Chen, Mark Manulis, Alberto Escalante
In: 11th International Conference on Financial Cryptography and Data Security (FC 2007), Vol. 4886, p. 29-44, 2007
Springer Verlag
[Inproceedings]

Compartmented Security for Browsers

Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
2007
[Techreport]

Zigbee-to-tcp/ip gateway: New opportunities for ZigBee-based sensor networks

Alexandra Dmitrienko
In: 6th International Workshop on Ambient Intelligence and Embedded Systems, 2007
[Inproceedings]

Enhancing Grid Security Using Trusted Virtualization

Ahmad-Reza Sadeghi, Christian Stüble, Hans Löhr, Hari Govind Ramasamy, Stefan Schulz, Matthias Schunter
In: 4th International Conference on Autonomic and Trusted Computing (ATC 2007), Vol. 4610, p. 372-384, 2007
Springer Verlag
[Inproceedings]

Trusted User-Aware Web Authentication

Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Marcel Winandy
In: Workshop on Trustworthy User Interfaces for Passwords and Personal Information (TIPPI'07),, 2007
[Inproceedings]

2006

TCG Inside? - A Note on TPM Specification Compliance

Ahmad-Reza Sadeghi, Christian Wachsmann, Marcel Selhorst, Christian Stüble, Marcel Winandy
In: ACM Workshop on Scalable Trusted Computing (ACMSTC), p. 47-56, November 2006
ACM Press
[Inproceedings]

Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages

Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber
In: 11th Australasian Conference on Information Security and Privacy (ACISP 2006), Vol. 4058, July 2006
Springer Verlag
[Online-Edition: http://www.springerlink.com/content/0g182383389750g5/]
[Inproceedings]

Bluetooth based Login for Windows Servers

Khan Wahid
May 2006
[Thesis (Master, Bachelor, Diploma)]

Property-based Taming Lying Mobile Nodes

Ahmad-Reza Sadeghi, Mark Manulis
In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006), April 2006
[Online-Edition: http://doi.ieeecomputersociety.org/10.1109/AINA.2006.276]
[Inproceedings]

Property-based Taming Lying Mobile Node

Ahmad-Reza Sadeghi, Mark Manulis
In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006) , April 2006
[Online-Edition: http://doi.ieeecomputersociety.org/10.1109/AINA.2006.276]
[Inproceedings]

Linkable Democratic Group Signatures

Jörg Schwenk, Ahmad-Reza Sadeghi, Mark Manulis
In: 2nd Information Security Practice and Experience Conference (ISPEC 2006), April 2006
[Inproceedings]

Host-based intrusion detection for advanced mobile devices

Markus Miettinen, Perttu Halonen, Kimmo Hätönen
In: Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), Vol. 2, p. 72-76, April 2006
IEEE Computer Society
[Inproceedings]

Play it once again, Sam - Enforcing Stateful Licenses on Open Platforms

Ahmad-Reza Sadeghi, Christian Stüble, Marko Wolf, Michael Scheibel
In: The Second Workshop on Advances in Trusted Computing (WATC '06 Fall), 2006
[Inproceedings]

Key Agreement for Heterogeneous Ad-Hoc Groups

Ahmad-Reza Sadeghi, Mark Manulis
In: International Journal of Wireless and Mobile Computing (IJWMC), 2006
[Inproceedings]

Key Agreement for Heterogenous Mobile Ad-hoc Groups

Ahmad-Reza Sadeghi, Mark Manulis
In: Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing), 2006
[Online-Edition: http://portal.acm.org/citation.cfm?id=1091715]
[Inproceedings]

Physical Security Bounds Against Tampering

Ahmad-Reza Sadeghi, Christof Paar, Kerstin Lemke
In: International Conference on Applied Cryptography and Network Security (ACNS 2006), 2006
[Online-Edition: http://www.springerlink.com/content/q26016rj663v2428/]
[Inproceedings]

E-Passport: The Global Traceability or How to Feel Like an UPS Package

Ahmad-Reza Sadeghi, Christof Paar, Dario Carluccio, Kerstin Lemke-Rust
In: Workshop on RFID Security 2006, 2006
[Online-Edition: http://www.springerlink.com/content/pg22v52027263222/]
[Inproceedings]

Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe
In: Transactions on Data Hiding and Multimedia Security, 2006
[Online-Edition: http://www.springerlink.com/content/j1775q68rkh33038/]
[Inproceedings]

Design and Implementation of a Secure Linux Device Encryption Architecture

Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Michael Scheibel
In: LinuxTag, 2006
[Inproceedings]

A Computational Model for Watermark Robustness

Ahmad-Reza Sadeghi, Andre Adelsbach, Stefan Katzebeisser
In: Information Hiding Workshop, 2006
[Inproceedings]

A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption

Ahmad-Reza Sadeghi, Ulrich Huber
2006
[Techreport]

A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption

Ahmad-Reza Sadeghi, Ulrich Huber
In: 9th Information Security Conference (ISC 2006), Vol. 4173, 2006
Springer
[Online-Edition: http://www.springerlink.com/content/50023w6877036027/]
[Inproceedings]

Client Authentication in Federations Using a Security Mode

Ahmad-Reza Sadeghi, Sebastian Gajek
In: Toward a More Secure Web - W3C Workshop on Usability and Transparency of Web Authentication., 2006
[Inproceedings]

Security Architecture for Device Encryption and VPN

Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Ammar Alkassar, Michael Scheibel
In: Information Security Solution Europe (ISSE06), 2006
[Online-Edition: http://www.springerlink.com/content/g6g7126v3k0njh8q/]
[Inproceedings]

A Protocol for Property-Based Attestation

Ahmad-Reza Sadeghi, Christian Stüble, Hans Löhr, Liquen Chen, Rainer Landfermann, Markus Rohe
In: First ACM Workshop on Scalable Trusted Computing (STC'06), 2006
[Inproceedings]

Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks

Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
In: Workshop on Information and System Security (WISSEC'06), 2006
[Inproceedings]

Constraint-Based Mining and Inductive Databases

Kimmo Hätönen, Mika Klemettinen, Markus Miettinen
In: LNCS, Vol. 3848, p. 196-215, 2006
Springer
[InBook]

2005

Property-Based Broadcast Encryption for Multi-level Security Policies

Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber
In: 8th International Conference on Information Security and Cryptology (ICISC 2005), Vol. 3935, December 2005
Springer Verlag
[Online-Edition: http://www.springerlink.com/content/3q330w4400157t2g/]
[Inproceedings]

Anonymous Data Broadcasting by Misuse of Satellite ISPs

Ulrich Greveler, Andre Adelsbach, Sven Löschner
In: 22C3 Chaos Computer Club (CCC) Congress, December 2005
[Inproceedings]

Towards Multilateral Secure Digital Rights Distribution Infrastructures

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe
In: ACM DRM Workshop'05, November 2005
[Inproceedings]

Embedding Trust into Cars—Secure Software Delivery and Installation

Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble, Ulrich Huber
In: Third Workshop on Embedded Security in Cars (escar 2005), November 2005
[Inproceedings]

Multilaterally Secure Computing Platforms – in your office, car and at home

Ahmad-Reza Sadeghi, Christian Stüble
In: 1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society, September 2005
[Inproceedings]

New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy

Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Marcel Selhorst, Oska Senft
In: Datenschutz und Datensicherheit, Vol. 9, September 2005
[Article]

Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe
In: 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, September 2005
[Inproceedings]

Secure Data Management in Trusted Computing

Ahmad-Reza Sadeghi, Christian Stüble, Ulrich Kühn, Klaus Kursawe, Stefan Lucks
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Vol. 3659, p. 324-338, August 2005
Springer Verlag
[Online-Edition: http://www.springerlink.com/content/4elbfgqmvvh5qugp/]
[Inproceedings]

Simplified Hardness Proofs in the Generic Group Model

Ahmad-Reza Sadeghi, Andy Rupp, Endre Bangerter
In: Western European Workshop on Research in Cryptology (WEWoRC 2005), July 2005
[Inproceedings]

Sokrates - A Compiler Framework for Zero-Knowledge Protocols

Ahmad-Reza Sadeghi, Markus Rohe, Jan Camenisch
In: Western European Workshop on Research in Cryptology (WEWoRC 2005), July 2005
[Inproceedings]

Towards Secure Computing Platforms with Open-Source and Trusted Computing

Ahmad-Reza Sadeghi, Ammar Alkassar, Christian Stüble, Marcel Selhorst
In: 9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI), May 2005
[Inproceedings]

Fair DRM - Ermöglichen von Privatkopien und Schutz digitaler Waren

Jörg Schwenk, Ulrich Greveler, Andre Adelsbach
In: 9. Deutscher IT-Sicherheitskongress des BSI, May 2005
[Inproceedings]

Towards Multilateral Security On DRM Platforms

Ahmad-Reza Sadeghi, Christian Stüble
In: First Information Security Practice and Experience Conference (ISPEC 2005), April 2005
[Online-Edition: http://www.springerlink.com/content/hwbrd3crg2l2ral8/]
[Inproceedings]

Secure Software Delivery and Installation in Embedded Systems

Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber
In: First Information Security Practice and Experience Conference (ISPEC 2005), April 2005
[Inproceedings]

Satellite Communication without Privacy - Attacker's Paradise

Ulrich Greveler, Andre Adelsbach
In: GI Fachtagung "Sicherheit 2005", p. 257-268, April 2005
Springer Verlag
[Inproceedings]

Security Engineering for Zero-knowledge Watermark Detection

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe
In: Special Session on Media Security (WIAMIS 2005), April 2005
[Inproceedings]

Towards multilaterally secure computing platforms - with open source and trusted computing

Ahmad-Reza Sadeghi, Christian Stüble
In: Information Security Technical Report, Vol. 10, p. 83-95, January 2005
[Article]

Datenschutzverletzungen bei Internetzugängen via Satellit

Ulrich Greveler, Andre Adelsbach
In: Datenschutznachrichten, Vol. 1, p. 4-7, January 2005
[Online-Edition: da­ten­schutz­ver­let­zun­gen, in­ter­net, sa­tel­lit]
[Article]

Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures

Jörg Schwenk, Sebastian Gajek, Andre Adelsbach
In: First Information Security Practice and Experience Conference (ISPEC 2005), Vol. 3439, p. 204-217, 2005
Springer-Verlag
[Inproceedings]

Secure Software Delivery and Installation in Embedded Systems

Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber
In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications, p. 27-49, 2005
Springer-Verlag
[Online-Edition: http://www.springerlink.com/content/lfv77rfp7tj4wtj2/]
[InBook]

Property-Based Broadcast Encryption for Multi-level Security Policies

Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble, Ulrich Huber
2005
[Techreport]

Proving a WS-Federation Passive Requestor Profile with a Browser Model

Ahmad-Reza Sadeghi, Thomas Groß, Birgit Pfitzmann
In: Workshop on Secure Web Services (SWS), 2005
[Online-Edition: http://portal.acm.org/citation.cfm?id=1103034]
[Inproceedings]

First Summary Report on Asymmetric Watermarking

Ahmad-Reza Sadeghi, Andre Adelsbach, Patrick Bas, Mauro Barni, Alessia De Rosa
In: ECRYPT, Network of Excellence in Cryptology, 2005
[Inproceedings]

Phishing - Die Täuschung des Benutzers zur Preisgabe geheimer Benutzerdaten

Jörg Schwenk, Sebastian Gajek, Andre Adelsbach
In: 9. Deutscher IT-Sicherheitskongress des BSI, 2005
[Inproceedings]

Anti-theft Protection: Electronic Immobilizers

Ahmad-Reza Sadeghi, Christian Stüble, Kerstin Lemke-Rust
In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications., p. 51-67, 2005
Springer Verlag
[Online-Edition: http://www.springerlink.com/content/rj4052547n61v84n/]
[Inproceedings]

Browser Model for Security Analysis of Browser-Based Protocols

Ahmad-Reza Sadeghi, Thomas Groß, Birgit Pfitzmann
In: European Symposium for Research in Computer Science (ESORICS), 2005
[Inproceedings]

Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe
In: ACM Multimedia Systems, 2005
[Article]

A Privacy-Protecting Coupon System

Ahmad-Reza Sadeghi, Liqun Chen, Matthias Enzmann, Markus Schneider, Michael Steiner
In: Financial Cryptography, 2005
[Inproceedings]

An Open Approach for Designing Secure Electronic Immobilizers

Ahmad-Reza Sadeghi, Christian Stüble, Kerstin Lemke-Rust
In: First Information Security Practice and Experience Conference (ISPEC 2005), 2005
[Online-Edition: http://www.springerlink.com/content/y8mmy4gvdmjny2lc/]
[Inproceedings]

A Broadcast Encryption Scheme with Free-Riders but Unconditional Security

Ulrich Greveler, Andre Adelsbach
In: First International Conference on Digital Rights Management, 2005
[Inproceedings]

Multilateral Security Considerations for Adaptive Mobile Applications

Adrian Spalka, Armin Cremers, Marcel Winandy
In: 2nd International Conference on E-Business and Telecommunication Networks (ICETE 2005), p. 133-137, 2005
INSTICC
[Inproceedings]

2004

Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms

Ahmad-Reza Sadeghi, Christian Stüble
In: 20th Annual Computer Security Applications Conference (ACSAC), December 2004
[Inproceedings]

Property-based Attestation for Computing Platforms: Caring about policies, not mechanisms

Ahmad-Reza Sadeghi, Christian Stüble
In: New Security Paradigm Workshop (NSPW), September 2004
[Inproceedings]

European Multilateral Secure Computing Base - Open Trusted Computing for You and Me

Ahmad-Reza Sadeghi, Christian Stüble, Norbert Pohlmann
In: Datenschutz und Datensicherheit (DUD) , Vol. 9, p. 548-554, September 2004
[Article]

Overcoming the Obstacles of Zero-Knowledge Watermark Detection

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe
In: ACM Multimedia and Security Workshop, p. pp. 46 - 55, 2004
ACM Press
[Inproceedings]

Trusted Computing Platforms: Zur technischen und industriepolitischen Situation und Vorgehensweise

Ahmad-Reza Sadeghi, Dirk Günnewig, Kai Rannenberg, Christian Stüble
In: Vertrauenswürdige Systemumgebungen Technik, Recht und gesellschaftspolitische Implikationen des "Trusted Computing", 2004
Verlag Recht und Wirtschaft
[InCollection]

Enhancing Security of Computing Platforms with TC-Technology

Ahmad-Reza Sadeghi, Christian Stüble, Oliver Altmeyer, Marcel Selhorst
In: Information Security Solutions Europe (ISSE 2004), p. 346-361, 2004
Vieweg Verlag
[InCollection]

Key-Assignment Strategies for CPPM

Jörg Schwenk, Andre Adelsbach
In: ACM Multimedia and Security Workshop, p. 107 - 115, 2004
ACM Press
[Inproceedings]

2003

Vertrauensfragen - IBMs Antworten auf die TCPA-Fragen des Chaos Computer Club

Christian Stüble, Gerald Himmelein
In: c't, Vol. 15, November 2003
[Article]

The Quest for Security in Integrated Networks

Ahmad-Reza Sadeghi, Ammar Alkassar
In: 11th International Conference on Telecommunication Systems, Modeling and Analysis, October 2003
[Inproceedings]

A Security Framework for Integrated Networks

Ammar Alkassar, Christian Stüble
In: MILCOM 2003 IEEE Military Communications Conference, October 2003
[Inproceedings]

Watermark Detection with Zero-Knowledge Disclosure

Ahmad-Reza Sadeghi, Andre Adelsbach, Stefan Katzenbeisser
In: ACM Multimedia Systems Journal, Vol. 9, p. 266-278, September 2003
[Online-Edition: http://www.springerlink.com/content/475ve9fx69trvqr0/]
[Article]

Taming "Trusted Computing" by Operating System Design

Ahmad-Reza Sadeghi, Christian Stüble
In: 4th International Workshop on Information Security Applications (WISA'03), September 2003
Springer-Verlag
[Online-Edition: http://www.springerlink.com/content/qkwrtdmlxclg8wff/]
[Inproceedings]

Improving End-user Security and Trustworthiness of TCG Platforms

Christian Stüble, Klaus Kursawe
In: 33. GI-Fachtagung, September 2003
[Inproceedings]

Queryable Lossless Log Database Compression

Kimmo Hätönen, Perttu Halonen, Mika Klemettinen, Markus Miettinen
In: Proceedings of the Second International Workshop on Knowledge Discovery in Inductive Databases (KDID), p. 70-79, September 2003
[Inproceedings]

Comprehensive log compression with frequent patterns

Kimmo Hätönen, Jean-François Boulicaut, Mika Klemettinen, Markus Miettinen, Cyrille Masson
In: Proceedings of the 5th International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2003), Vol. 2734, p. 360-370, September 2003
Springer
[Inproceedings]

Secure Object Identification - or: Solving The Chess Grandmaster Problem

Ahmad-Reza Sadeghi, Ammar Alkassar, Christian Stüble
In: New Security Paradigms Workshop, August 2003
[Inproceedings]

Trusted Computing ohne Nebenwirkungen

Ahmad-Reza Sadeghi, Christian Stüble, Dirk Günnewig
In: Datenschutz und Datensicherheit (DUD), Vol. 9, p. 556-560, 2003
Vieweg Verlag
[InCollection]

Sinn und Unsinn von TCPA und Palladium

Ahmad-Reza Sadeghi, Christian Stüble
In: c't, Vol. 13, 2003
[Article]

Die digitale Signatur

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Schneider, Christian Stüble
In: Digitale Signaturen in der Praxis, 2003
AWV Verlag
[InCollection]

Electronic Payment Systems

Ahmad-Reza Sadeghi, Markus Schneider
In: Digital Rights Management, Vol. 2770, p. 113-137, 2003
Springer Verlag
[Online-Edition: http://www.springerlink.com/content/9qarwwxkfkwtqgv4/]
[InCollection]

Advanced Techniques for Dispute Resolving and Authorship Proofs on Digital Works

Ahmad-Reza Sadeghi, Andre Adelsbach
In: Security and Watermarking of Multimedia Contents V, 2003
[Inproceedings]

Bridging the Gap between TCPA/Palladium and Personal Security

Ahmad-Reza Sadeghi, Christian Stüble
2003
[Techreport]

2002

Cryptography Meets Watermarking: Detecting Watermarks with Minimal- or Zero-Knowledge Disclosure

Ahmad-Reza Sadeghi, Andre Adelsbach, Stefan Katzenbeisser
In: XI European Signal Processing Conference, Vol. 1, p. 446-449, September 2002
[Inproceedings]

Towards Secure IFF: Preventing Mafia Fraud Attacks

Ammar Alkassar, Christian Stüble
In: MILCOM 2002, IEEE Military Communication Conference, 2002
[Online-Edition: http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1179638]
[Inproceedings]

Auctions with Multiple Rounds and Multiple Items

Ahmad-Reza Sadeghi, Matthias Schunter, Sandra Steinbrecher
In: Int. Workshop on Trust and Privacy in Digital Business (DEXA 2002), 2002
[Inproceedings]

Common Criteria Protection Profiles - Discretionary Information Flow Control (DiC)

Christian Stüble, Steffen Lange, Andreas Nonnengart, Roland Vogt
In: 3rd International Common Criteria Conference, 2002
[Inproceedings]

2001

Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference

Ahmad-Reza Sadeghi, Michael Steiner
In: Eurocrypt, Vol. 2045, p. 243-260, May 2001
Springer-Verlag
[Inproceedings]

Optimized Self-Synchronizing Mode of Operation

Ahmad-Reza Sadeghi, Andre Adelsbach, Alexander Geraldy, Birgit Pfitzmann
In: 8th International Workshop on Fast Software Encryption, April 2001
[Inproceedings]

How to Break a Semi-Anonymous Fingerprinting Scheme

Ahmad-Reza Sadeghi
In: Information Hiding: Fourth International Workshop, Vol. 2137, p. 384-394, 2001
Springer-Verlag
[Online-Edition: http://www.springerlink.com/content/9gbhnwf945kmuv80/]
[Inproceedings]

PERSEUS: A Quick Open-source Path to Secure Signatures

Christian Stüble, Birgit Pfitzmann
In: 2nd Workshop on Microkernel-based Systems, 2001
[Inproceedings]

The PERSEUS System Architecture

Christian Stüble, Birgit Pfitzmann, James Riordan, Michael Waidner, Arnd Weber
In: Verlässliche Informationssysteme (VIS) '01, DuD Fachbeiträge, p. 1-18, 2001
Vieweg Verlag
[Online-Edition: http://www.perseus-os.org/]
[InCollection]

Zero-Knowledge Watermark Detection and Proof of Ownership

Ahmad-Reza Sadeghi, Andre Adelsbach
In: Information Hiding: Fourth International Workshop, Vol. 2137, p. 273-288, 2001
Springer-Verlag
[Online-Edition: http://www.springerlink.com/content/xqpm659cvp9g0unt/]
[Inproceedings]

2000

Proving ownership of digital content

Ahmad-Reza Sadeghi, Andre Adelsbach, Birgit Pfitzmann
In: 3rd International Workshop, IH ’99,, Vol. 1768, p. 126-141, October 2000
Springer-Verlag
[Inproceedings]

Self-escrowed cash against user black-mailing

Ahmad-Reza Sadeghi, Birgit Pfitzmann
In: Fourth Conference on Financial Cryptography (FC’00),, Vol. 1962, February 2000
Springer-Verlag
[Inproceedings]

From Security Instruments to Secure End-User Systems

Christian Stüble, Arnd Weber
In: World Markets Series - Wireless Technology 2000, p. 207-209, January 2000
[Article]

Anonymous fingerprinting with direct non-repudiation

Andre Adelsbach
In: Advances in Cryptology - ASIACRYPT‘2000, Vol. 1976, p. 401-414, 2000
Springer-Verlag
[Inproceedings]

1999

Coin-based anonymous fingerprinting

Ahmad-Reza Sadeghi, Birgit Pfitzmann
In: EUROCRYPT ’99, Vol. 1599, p. 150-164, 1999
Springer-Verlag
[Inproceedings]

Effiziente Implementierung von kryptographischen Datenaustauschformaten am Beispiel OpenPGP und S/MIME v.3

Christian Stüble
In: Sicherheitsinfrastrukturen: DuD Fachbeiträge, p. 272-284, 1999
Vieweg Verlag
[InCollection]

Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen

Ahmad-Reza Sadeghi, Birgit Pfitzmann
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99, p. 35-48, 1999
Vieweg Verlag
[InCollection]
A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang