default search action
Stefan Nürnberger
Person information
- affiliation: CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
- affiliation (PhD 2017): Saarland University, Saarbrücken, Germany
- affiliation: Fraunhofer Institute for Secure Information Technology (SIT), Darmstadt, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2017
- [b1]Stefan Nürnberger:
Mitigating the imposition of malicious behaviour on code. Saarland University, Saarbrücken, Germany, 2017
Journal Articles
- 2018
- [j2]Stefan Nürnberger:
Datenverarbeitung im (vernetzten) Fahrzeug. Datenschutz und Datensicherheit 42(2): 79-82 (2018) - 2016
- [j1]Stefan Nürnberger, Sven Bugiel:
Autonome Systeme. Datenschutz und Datensicherheit 40(8): 503-506 (2016)
Conference and Workshop Papers
- 2020
- [c21]Daniel Frassinelli, Sohyeon Park, Stefan Nürnberger:
I Know Where You Parked Last Summer : Automated Reverse Engineering and Privacy Analysis of Modern Cars. SP 2020: 1401-1415 - 2016
- [c20]Johannes Götzfried, Tilo Müller, Gabor Drescher, Stefan Nürnberger, Michael Backes:
RamCrypt: Kernel-based Address Space Encryption for User-mode Processes. AsiaCCS 2016: 919-924 - [c19]Stefan Nürnberger, Christian Rossow:
- vatiCAN - Vetted, Authenticated CAN Bus. CHES 2016: 106-124 - [c18]Kangjie Lu, Wenke Lee, Stefan Nürnberger, Michael Backes:
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization. NDSS 2016 - [c17]Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nürnberger:
Nearly Optimal Verifiable Data Streaming. Public Key Cryptography (1) 2016: 417-445 - 2015
- [c16]Stefan Nürnberger, Randolf Rotta, Gabor Drescher, Daniel Danner, Jörg Nolte:
Diamond Rings: Acknowledged Event Propagation in Many-Core Processors. Euro-Par Workshops 2015: 722-733 - 2014
- [c15]Michael Backes, Rainer W. Gerling, Sebastian Gerling, Stefan Nürnberger, Dominique Schröder, Mark Simkin:
WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP. ACNS 2014: 401-418 - [c14]Michael Backes, Thorsten Holz, Benjamin Kollenda, Philipp Koppe, Stefan Nürnberger, Jannik Pewny:
You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code. CCS 2014: 1342-1353 - [c13]Stefan Nürnberger, Gabor Drescher, Randolf Rotta, Jörg Nolte, Wolfgang Schröder-Preikschat:
Shared Memory in the Many-Core Age. Euro-Par Workshops (2) 2014: 351-362 - [c12]Michael Backes, Stefan Nürnberger:
Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing. USENIX Security Symposium 2014: 433-447 - 2013
- [c11]Sören Bleikertz, Sven Bugiel, Hugo Ideler, Stefan Nürnberger, Ahmad-Reza Sadeghi:
Client-Controlled Cryptography-as-a-Service in the Cloud. ACNS 2013: 19-36 - [c10]Lucas Vincenzo Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi:
Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM. AsiaCCS 2013: 299-310 - 2012
- [c9]Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi:
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones. NDSS 2012 - 2011
- [c8]Sven Bugiel, Stefan Nürnberger, Thomas Pöppelmann, Ahmad-Reza Sadeghi, Thomas Schneider:
AmazonIA: when elasticity snaps back. CCS 2011: 389-400 - [c7]Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi:
Poster: control-flow integrity for smartphones. CCS 2011: 749-752 - [c6]Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider:
Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version). Communications and Multimedia Security 2011: 32-44 - [c5]Martin Steinebach, Sascha Zmudzinski, Stefan Nürnberger:
Re-synchronizing audio watermarking after non-linear time stretching. Media Forensics and Security 2011: 78800I - 2010
- [c4]Stefan Nürnberger, Reinhardt Karnapke, Jörg Nolte:
Sensorium - An Active Monitoring System for Neighborhood Relations in Wireless Sensor Networks. ADHOCNETS 2010: 34-47 - [c3]Stefan Nürnberger, Thomas Feller, Sorin A. Huss:
Ray - a secure micro kernel architecture. PST 2010: 3-6 - 2009
- [c2]Stefan Thiemert, Stefan Nürnberger, Martin Steinebach, Sascha Zmudzinski:
Security of robust audio hashes. WIFS 2009: 126-130 - [c1]André Sieber, Karsten Walther, Stefan Nürnberger, Jörg Nolte:
Implicit Sleep Mode Determination in Power Management of Event-Driven Deeply Embedded Systems. WWIC 2009: 13-23
Parts in Books or Collections
- 2017
- [p1]Stefan Nürnberger:
Neue Verfahren gegen das Aufoktroyieren von Verhaltensveränderungen in Software. Ausgezeichnete Informatikdissertationen 2017: 181-190
Informal and Other Publications
- 2019
- [i2]Marie-Therese Walter, David Pfaff, Stefan Nürnberger, Michael Backes:
Proconda - Protected Control Data. CoRR abs/1909.03758 (2019) - 2015
- [i1]Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nürnberger:
Nearly Optimal Verifiable Data Streaming (Full Version). IACR Cryptol. ePrint Arch. 2015: 333 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-26 18:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint