default search action
Sven Bugiel
Person information
- affiliation: CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c42]Eric Ackermann, Noah Mauthe, Sven Bugiel:
Work-in-Progress: Northcape: Embedded Real-Time Capability-Based Addressing. EuroS&P Workshops 2024: 683-690 - [c41]Alfusainey Jallow, Michael Schilling, Michael Backes, Sven Bugiel:
Measuring the Effects of Stack Overflow Code Snippet Evolution on Open-Source Software Security. SP 2024: 1083-1101 - 2023
- [c40]Dhiman Chakraborty, Michael Schwarz, Sven Bugiel:
TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors. FC (1) 2023: 147-165 - [c39]Sanam Ghorbani Lyastani, Michael Backes, Sven Bugiel:
A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites. NDSS 2023 - [i7]Dhiman Chakraborty, Michael Schwarz, Sven Bugiel:
TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors (Technical Report). CoRR abs/2306.03643 (2023) - 2022
- [i6]Sanam Ghorbani Lyastani, Michael Backes, Sven Bugiel:
A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites (Extended Version). CoRR abs/2210.09373 (2022) - 2021
- [c38]Abdallah Dawoud, Sven Bugiel:
Bringing Balance to the Force: Dynamic Analysis of the Android Application Framework. NDSS 2021 - [c37]Yusra Elbitar, Michael Schilling, Trung Tin Nguyen, Michael Backes, Sven Bugiel:
Explanation Beats Context: The Effect of Timing & Rationales on Users' Runtime Permission Decisions. USENIX Security Symposium 2021: 785-802 - [c36]Jie Huang, Michael Backes, Sven Bugiel:
A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on Android. USENIX Security Symposium 2021: 3631-3648 - [i5]Oliver Schranz, Sebastian Weisgerber, Erik Derr, Michael Backes, Sven Bugiel:
Towards a Principled Approach for Dynamic Analysis of Android's Middleware. CoRR abs/2110.05619 (2021) - 2020
- [c35]Duc Cuong Nguyen, Erik Derr, Michael Backes, Sven Bugiel:
Up2Dep: Android Tool Support to Fix Insecure Code Dependencies. ACSAC 2020: 263-276 - [c34]Sanam Ghorbani Lyastani, Michael Schilling, Michaela Neumayr, Michael Backes, Sven Bugiel:
Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication. SP 2020: 268-285
2010 – 2019
- 2019
- [c33]Dhiman Chakraborty, Sven Bugiel:
simFIDO: FIDO2 User Authentication with simTPM. CCS 2019: 2569-2571 - [c32]Aftab Alam, Katharina Krombholz, Sven Bugiel:
Poster: Let History not Repeat Itself (this Time) - Tackling WebAuthn Developer Issues Early On. CCS 2019: 2669-2671 - [c31]Jie Huang, Nataniel P. Borges Jr., Sven Bugiel, Michael Backes:
Up-To-Crash: Evaluating Third-Party Library Updatability on Android. EuroS&P 2019: 15-30 - [c30]Abdallah Dawoud, Sven Bugiel:
DroidCap: OS Support for Capability-based Permissions in Android. NDSS 2019 - [c29]Dhiman Chakraborty, Christian Hammer, Sven Bugiel:
Secure multi-execution in Android. SAC 2019: 1934-1943 - [c28]Duc Cuong Nguyen, Erik Derr, Michael Backes, Sven Bugiel:
Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy. IEEE Symposium on Security and Privacy 2019: 555-569 - [c27]Dhiman Chakraborty, Lucjan Hanzlik, Sven Bugiel:
simTPM: User-centric TPM for Mobile Devices. USENIX Security Symposium 2019: 533-550 - [i4]Dhiman Chakraborty, Lucjan Hanzlik, Sven Bugiel:
simTPM: User-centric TPM for Mobile Devices (Technical Report). CoRR abs/1905.08164 (2019) - 2018
- [c26]Marten Oltrogge, Erik Derr, Christian Stransky, Yasemin Acar, Sascha Fahl, Christian Rossow, Giancarlo Pellegrino, Sven Bugiel, Michael Backes:
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators. IEEE Symposium on Security and Privacy 2018: 634-647 - [c25]Sanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Michael Backes, Sven Bugiel:
Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse. USENIX Security Symposium 2018: 203-220 - 2017
- [c24]Jie Huang, Oliver Schranz, Sven Bugiel, Michael Backes:
The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android. CCS 2017: 1037-1049 - [c23]Erik Derr, Sven Bugiel, Sascha Fahl, Yasemin Acar, Michael Backes:
Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android. CCS 2017: 2187-2200 - [c22]Michael Backes, Sven Bugiel, Oliver Schranz, Philipp von Styp-Rekowsky, Sebastian Weisgerber:
ARTist: The Android Runtime Instrumentation and Security Toolkit. EuroS&P 2017: 481-495 - [c21]Michael Backes, Sven Bugiel, Philipp von Styp-Rekowsky, Marvin WiBfeld:
Seamless In-App Ad Blocking on Stock Android. IEEE Symposium on Security and Privacy Workshops 2017: 163-168 - [i3]Sanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Sven Bugiel, Michael Backes:
Studying the Impact of Managers on Password Strength and Reuse. CoRR abs/1712.08940 (2017) - 2016
- [b1]Sven Bugiel:
Establishing mandatory access control on Android OS. Saarland University, 2016 - [j2]Stefan Nürnberger, Sven Bugiel:
Autonome Systeme. Datenschutz und Datensicherheit 40(8): 503-506 (2016) - [j1]Michael Backes, Sven Bugiel, Oliver Schranz, Philipp von Styp-Rekowsky:
Boxify: Bringing Full-Fledged App Sandboxing to Stock Android. login Usenix Mag. 41(2) (2016) - [c20]Michael Backes, Sven Bugiel, Erik Derr, Sebastian Gerling, Christian Hammer:
R-Droid: Leveraging Android App Analysis with Static Slice Optimization. AsiaCCS 2016: 129-140 - [c19]Michael Backes, Sven Bugiel, Erik Derr:
Reliable Third-Party Library Detection in Android and its Security Applications. CCS 2016: 356-367 - [c18]Michael Backes, Sven Bugiel, Jie Huang, Oliver Schranz:
POSTER: The ART of App Compartmentalization. CCS 2016: 1811-1813 - [c17]Yasemin Acar, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick D. McDaniel, Matthew Smith:
SoK: Lessons Learned from Android Security Research for Appified Software Platforms. IEEE Symposium on Security and Privacy 2016: 433-451 - [c16]Michael Backes, Sven Bugiel, Erik Derr, Patrick D. McDaniel, Damien Octeau, Sebastian Weisgerber:
On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis. USENIX Security Symposium 2016: 1101-1118 - [i2]Michael Backes, Sven Bugiel, Oliver Schranz, Philipp von Styp-Rekowsky, Sebastian Weisgerber:
ARTist: The Android Runtime Instrumentation and Security Toolkit. CoRR abs/1607.06619 (2016) - 2015
- [c15]Michael Backes, Sven Bugiel, Christian Hammer, Oliver Schranz, Philipp von Styp-Rekowsky:
Boxify: Full-fledged App Sandboxing for Stock Android. USENIX Security Symposium 2015: 691-706 - 2014
- [c14]Michael Backes, Sven Bugiel, Sebastian Gerling:
Scippa: system-centric IPC provenance on Android. ACSAC 2014: 36-45 - [c13]Michael Backes, Sven Bugiel, Sebastian Gerling, Philipp von Styp-Rekowsky:
Android security framework: extensible multi-layered access control on Android. ACSAC 2014: 46-55 - [i1]Michael Backes, Sven Bugiel, Sebastian Gerling, Philipp von Styp-Rekowsky:
Android Security Framework: Enabling Generic and Extensible Access Control on Android. CoRR abs/1404.1395 (2014) - 2013
- [c12]Sören Bleikertz, Sven Bugiel, Hugo Ideler, Stefan Nürnberger, Ahmad-Reza Sadeghi:
Client-Controlled Cryptography-as-a-Service in the Cloud. ACNS 2013: 19-36 - [c11]Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi:
Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies. USENIX Security Symposium 2013: 131-146 - 2012
- [c10]Franz Ferdinand Peter Brasser, Sven Bugiel, Atanas Filyanov, Ahmad-Reza Sadeghi, Steffen Schulz:
Softer Smartcards - Usable Cryptographic Tokens with Secure Execution. Financial Cryptography 2012: 329-343 - [c9]Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry:
Towards Taming Privilege-Escalation Attacks on Android. NDSS 2012 - 2011
- [c8]Sven Bugiel, Lucas Vincenzo Davi, Steffen Schulz:
Scalable trust establishment with software reputation. STC@CCS 2011: 15-24 - [c7]Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Ahmad-Reza Sadeghi, Bhargava Shastry:
Practical and lightweight domain isolation on Android. SPSM@CCS 2011: 51-62 - [c6]Sven Bugiel, Stefan Nürnberger, Thomas Pöppelmann, Ahmad-Reza Sadeghi, Thomas Schneider:
AmazonIA: when elasticity snaps back. CCS 2011: 389-400 - [c5]Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry:
Poster: the quest for security against privilege escalation attacks on android. CCS 2011: 741-744 - [c4]Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider:
Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version). Communications and Multimedia Security 2011: 32-44 - 2010
- [c3]Sven Bugiel, Jan-Erik Ekberg:
Implementing an application-specific credential platform using late-launched mobile trusted module. STC@CCS 2010: 21-30 - [c2]Sven Bugiel, Alexandra Dmitrienko, Kari Kostiainen, Ahmad-Reza Sadeghi, Marcel Winandy:
TruWalletM: Secure Web Authentication on Mobile Platforms. INTRUST 2010: 219-236
2000 – 2009
- 2009
- [c1]Jan-Erik Ekberg, Sven Bugiel:
Trust in a small package: minimized MRTM software implementation for mobile secure environments. STC 2009: 9-18
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint