


default search action
Ahmad-Reza Sadeghi
Person information
- affiliation: University of Darmstadt, Germany
- affiliation: Ruhr University Bochum, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i111]Phillip Rieger, Alessandro Pegoraro, Kavita Kumari, Tigist Abera, Jonathan Knauer, Ahmad-Reza Sadeghi:
SafeSplit: A Novel Defense Against Client-Side Backdoor Attacks in Split Learning. CoRR abs/2501.06650 (2025) - 2024
- [j48]Mohamadreza Rostami
, Chen Chen
, Rahul Kande
, Huimin Li
, Jeyavijayan Rajendran
, Ahmad-Reza Sadeghi
:
Fuzzerfly Effect: Hardware Fuzzing for Memory Safety. IEEE Secur. Priv. 22(4): 76-86 (2024) - [j47]Yan Jiang
, Xiaoyu Ji
, Kai Wang
, Chen Yan
, Richard Mitev
, Ahmad-Reza Sadeghi
, Wenyuan Xu:
Marionette: Manipulate Your Touchscreen via a Charging Cable. IEEE Trans. Dependable Secur. Comput. 21(4): 3309-3323 (2024) - [j46]Kai Wang
, Richard Mitev
, Chen Yan
, Xiaoyu Ji
, Ahmad-Reza Sadeghi
, Wenyuan Xu
:
Analyzing and Defending GhostTouch Attack Against Capacitive Touchscreens. IEEE Trans. Dependable Secur. Comput. 21(5): 4360-4375 (2024) - [j45]Thien Duc Nguyen
, Markus Miettinen
, Alexandra Dmitrienko
, Ahmad-Reza Sadeghi
, Ivan Visconti
:
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges. IEEE Trans. Emerg. Top. Comput. 12(2): 483-495 (2024) - [c331]Md. Armanuzzaman
, Ahmad-Reza Sadeghi
, Ziming Zhao
:
Building Your Own Trusted Execution Environments Using FPGA. AsiaCCS 2024 - [c330]Jonathan Knauer
, Phillip Rieger
, Hossein Fereidooni
, Ahmad-Reza Sadeghi
:
Phantom: Untargeted Poisoning Attacks on Semi-Supervised Learning. CCS 2024: 615-629 - [c329]Mohamadreza Rostami
, Shaza Zeitouni
, Rahul Kande
, Chen Chen
, Pouya Mahmoody
, Jeyavijayan Rajendran
, Ahmad-Reza Sadeghi
:
Lost and Found in Speculation: Hybrid Speculative Vulnerability Detection. DAC 2024: 294:1-294:6 - [c328]Vasudev Gohil, Rahul Kande, Chen Chen, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran:
MABFuzz: Multi-Armed Bandit Algorithms for Fuzzing Processors. DATE 2024: 1-6 - [c327]Mohamadreza Rostami, Marco Chilese, Shaza Zeitouni, Rahul Kande, Jeyavijayan Rajendran, Ahmad-Reza Sadeghi:
Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing. DATE 2024: 1-6 - [c326]Hossein Fereidooni, Alessandro Pegoraro, Phillip Rieger, Alexandra Dmitrienko, Ahmad-Reza Sadeghi:
FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning. NDSS 2024 - [c325]Kavita Kumari, Alessandro Pegoraro, Hossein Fereidooni, Ahmad-Reza Sadeghi:
DEMASQ: Unmasking the ChatGPT Wordsmith. NDSS 2024 - [c324]Phillip Rieger, Torsten Krauß, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi:
CrowdGuard: Federated Backdoor Detection in Federated Learning. NDSS 2024 - [c323]Javor Nikolov, Alessandro Pegoraro, Phillip Rieger, Ahmad-Reza Sadeghi:
LayerDBA: Circumventing Similarity-Based Defenses in Federated Learning. SP (Workshops) 2024: 299-305 - [c322]David Koisser, Richard Mitev, Marco Chilese, Ahmad-Reza Sadeghi:
Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users. SP 2024: 426-444 - [c321]Marco Chilese, Richard Mitev, Meni Orenbach, Robert Thorburn, Ahmad Atamli, Ahmad-Reza Sadeghi:
One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices. SP 2024: 3346-3364 - [c320]Md. Sadun Haq, Thien Duc Nguyen, Ali Saman Tosun, Franziska Vollmer, Turgay Korkmaz, Ahmad-Reza Sadeghi:
SoK: A Comprehensive Analysis and Evaluation of Docker Container Attack and Defense Mechanisms. SP 2024: 4573-4590 - [c319]Pallavi Borkar, Chen Chen, Mohamadreza Rostami, Nikhilesh Singh, Rahul Kande, Ahmad-Reza Sadeghi, Chester Rebeiro, Jeyavijayan Rajendran:
WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors. USENIX Security Symposium 2024 - [c318]David Koisser, Richard Mitev, Nikita Yadav, Franziska Vollmer, Ahmad-Reza Sadeghi:
Orbital Trust and Privacy: SoK on PKI and Location Privacy Challenges in Space Networks. USENIX Security Symposium 2024 - [c317]Kavita Kumari, Alessandro Pegoraro, Hossein Fereidooni, Ahmad-Reza Sadeghi:
Xplain: Analyzing Invisible Correlations in Model Explanation. USENIX Security Symposium 2024 - [c316]Alessandro Pegoraro, Carlotta Segna, Kavita Kumari, Ahmad-Reza Sadeghi:
DeepEclipse: How to Break White-Box DNN-Watermarking Schemes. USENIX Security Symposium 2024 - [i110]Pallavi Borkar, Chen Chen, Mohamadreza Rostami, Nikhilesh Singh, Rahul Kande, Ahmad-Reza Sadeghi, Chester Rebeiro, Jeyavijayan Rajendran:
WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors. CoRR abs/2402.03704 (2024) - [i109]Alessandro Pegoraro, Carlotta Segna, Kavita Kumari, Ahmad-Reza Sadeghi:
DeepEclipse: How to Break White-Box DNN-Watermarking Schemes. CoRR abs/2403.03590 (2024) - [i108]Marco Chilese, Richard Mitev, Meni Orenbach, Robert Thorburn, Ahmad Atamli, Ahmad-Reza Sadeghi:
One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices. CoRR abs/2403.07465 (2024) - [i107]Mohamadreza Rostami, Marco Chilese, Shaza Zeitouni, Rahul Kande, Jeyavijayan Rajendran, Ahmad-Reza Sadeghi:
Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing. CoRR abs/2404.06856 (2024) - [i106]Jonathan Knauer, Phillip Rieger, Hossein Fereidooni, Ahmad-Reza Sadeghi:
Phantom: Untargeted Poisoning Attacks on Semi-Supervised Learning (Full Version). CoRR abs/2409.01470 (2024) - [i105]Mohamadreza Rostami, Shaza Zeitouni, Rahul Kande, Chen Chen, Pouya Mahmoody, Jeyavijayan Rajendran, Ahmad-Reza Sadeghi:
Lost and Found in Speculation: Hybrid Speculative Vulnerability Detection. CoRR abs/2410.22555 (2024) - [i104]Mohamadreza Rostami, Chen Chen, Rahul Kande, Huimin Li, Jeyavijayan Rajendran, Ahmad-Reza Sadeghi:
Fuzzerfly Effect: Hardware Fuzzing for Memory Safety. CoRR abs/2410.22561 (2024) - 2023
- [c315]Sebastian Surminski, Christian Niesler, Lucas Davi, Ahmad-Reza Sadeghi:
DMA'n'Play: Practical Remote Attestation Based on Direct Memory Access. ACNS 2023: 32-61 - [c314]Philipp Pütz
, Richard Mitev
, Markus Miettinen
, Ahmad-Reza Sadeghi
:
Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats. ACSAC 2023: 190-204 - [c313]Jorge Castillo
, Phillip Rieger
, Hossein Fereidooni
, Qian Chen
, Ahmad-Reza Sadeghi
:
FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks. ACSAC 2023: 647-661 - [c312]Huimin Li, Phillip Rieger, Shaza Zeitouni, Stjepan Picek, Ahmad-Reza Sadeghi:
FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning. FPL 2023: 271-276 - [c311]Chen Chen, Vasudev Gohil
, Rahul Kande, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran:
PSOFuzz: Fuzzing Processors with Particle Swarm Optimization. ICCAD 2023: 1-9 - [c310]Hossein Fereidooni, Jan König, Phillip Rieger, Marco Chilese, Bora Gökbakan, Moritz Finke, Alexandra Dmitrienko, Ahmad-Reza Sadeghi:
AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms. NDSS 2023 - [c309]Tommaso Frassetto, Patrick Jauernig, David Koisser, David Kretzler, Benjamin Schlosser, Sebastian Faust, Ahmad-Reza Sadeghi:
POSE: Practical Off-chain Smart Contract Execution. NDSS 2023 - [c308]Patrick Jauernig, Domagoj Jakobovic, Stjepan Picek, Emmanuel Stapf, Ahmad-Reza Sadeghi:
DARWIN: Survival of the Fittest Fuzzing Mutators. NDSS 2023 - [c307]Christoph Sendner, Huili Chen, Hossein Fereidooni, Lukas Petzi, Jan König, Jasper Stang, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Farinaz Koushanfar:
Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning. NDSS 2023 - [c306]Kavita Kumari, Phillip Rieger, Hossein Fereidooni, Murtuza Jadliwala, Ahmad-Reza Sadeghi:
BayBFed: Bayesian Backdoor Defense for Federated Learning. SP 2023: 737-754 - [c305]Chen Chen, Rahul Kande, Nathan Nguyen, Flemming Andersen, Aakash Tyagi, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran:
HyPFuzz: Formal-Assisted Processor Fuzzing. USENIX Security Symposium 2023: 1361-1378 - [c304]Phillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hossein Fereidooni, Ahmad-Reza Sadeghi:
ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks. USENIX Security Symposium 2023: 4301-4318 - [c303]Xhani Marvin Saß, Richard Mitev, Ahmad-Reza Sadeghi:
Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M. USENIX Security Symposium 2023: 6239-6256 - [c302]Pier Paolo Tricomi
, Marco Chilese
, Mauro Conti
, Ahmad-Reza Sadeghi
:
Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms. WebSci 2023: 346-356 - [i103]Pier Paolo Tricomi, Marco Chilese, Mauro Conti, Ahmad-Reza Sadeghi:
Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms. CoRR abs/2301.06815 (2023) - [i102]Kavita Kumari, Phillip Rieger
, Hossein Fereidooni, Murtuza Jadliwala, Ahmad-Reza Sadeghi:
BayBFed: Bayesian Backdoor Defense for Federated Learning. CoRR abs/2301.09508 (2023) - [i101]Hossein Fereidooni, Jan König, Phillip Rieger, Marco Chilese, Bora Gökbakan, Moritz Finke, Alexandra Dmitrienko, Ahmad-Reza Sadeghi:
AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms. CoRR abs/2302.02740 (2023) - [i100]Xhani Marvin Saß, Richard Mitev, Ahmad-Reza Sadeghi:
Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M. CoRR abs/2302.06932 (2023) - [i99]Phillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hossein Fereidooni, Ahmad-Reza Sadeghi:
ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks. CoRR abs/2302.07589 (2023) - [i98]Alessandro Pegoraro, Kavita Kumari, Hossein Fereidooni, Ahmad-Reza Sadeghi:
To ChatGPT, or not to ChatGPT: That is the question! CoRR abs/2304.01487 (2023) - [i97]Chen Chen, Rahul Kande, Nathan Nguyen, Flemming Andersen, Aakash Tyagi, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran:
HyPFuzz: Formal-Assisted Processor Fuzzing. CoRR abs/2304.02485 (2023) - [i96]Chen Chen, Vasudev Gohil, Rahul Kande, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran:
PSOFuzz: Fuzzing Processors with Particle Swarm Optimization. CoRR abs/2307.14480 (2023) - [i95]David Koisser, Richard Mitev, Marco Chilese, Ahmad-Reza Sadeghi:
Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users. CoRR abs/2307.14879 (2023) - [i94]Huimin Li, Phillip Rieger, Shaza Zeitouni, Stjepan Picek, Ahmad-Reza Sadeghi:
FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning. CoRR abs/2308.00553 (2023) - [i93]David Koisser, Ahmad-Reza Sadeghi:
Accountability of Things: Large-Scale Tamper-Evident Logging for Smart Devices. CoRR abs/2308.05557 (2023) - [i92]Philipp Pütz, Richard Mitev, Markus Miettinen, Ahmad-Reza Sadeghi:
Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats. CoRR abs/2308.12072 (2023) - [i91]Jorge Castillo, Phillip Rieger, Hossein Fereidooni, Qian Chen, Ahmad-Reza Sadeghi:
FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks. CoRR abs/2310.02113 (2023) - [i90]Kavita Kumari, Alessandro Pegoraro, Hossein Fereidooni, Ahmad-Reza Sadeghi:
DEMASQ: Unmasking the ChatGPT Wordsmith. CoRR abs/2311.05019 (2023) - [i89]Vasudev Gohil
, Rahul Kande, Chen Chen, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran:
MABFuzz: Multi-Armed Bandit Algorithms for Fuzzing Processors. CoRR abs/2311.14594 (2023) - [i88]Hossein Fereidooni, Alessandro Pegoraro, Phillip Rieger, Alexandra Dmitrienko, Ahmad-Reza Sadeghi:
FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning. CoRR abs/2312.04432 (2023) - 2022
- [j44]Anrin Chakraborti, Reza Curtmola, Jonathan Katz, Jason Nieh, Ahmad-Reza Sadeghi, Radu Sion, Yinqian Zhang:
Cloud Computing Security: Foundations and Research Directions. Found. Trends Priv. Secur. 3(2): 103-213 (2022) - [c301]Jianqiang Wang, Pouya Mahmoody, Ferdinand Brasser, Patrick Jauernig, Ahmad-Reza Sadeghi, Donghui Yu, Dahan Pan, Yuanyuan Zhang:
VirTEE: a full backward-compatible TEE with native live migration and secure I/O. DAC 2022: 241-246 - [c300]Chen Chen, Rahul Kande, Pouya Mahmoody, Ahmad-Reza Sadeghi, J. V. Rajendran:
Trusting the trust anchor: towards detecting cross-layer vulnerabilities with hardware fuzzing. DAC 2022: 1379-1383 - [c299]Martin Schönstedt, Ferdinand Brasser, Patrick Jauernig, Emmanuel Stapf, Ahmad-Reza Sadeghi:
SafeTEE: Combining Safety and Security on ARM-based Microcontrollers. DATE 2022: 520-525 - [c298]Ghada Dessouky, Emmanuel Stapf, Pouya Mahmoody, Alexander Gruler, Ahmad-Reza Sadeghi:
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures. NDSS 2022 - [c297]Hossein Fereidooni, Alexandra Dmitrienko, Phillip Rieger, Markus Miettinen, Ahmad-Reza Sadeghi, Felix Madlener:
FedCRI: Federated Mobile Cyber-Risk Intelligence. NDSS 2022 - [c296]Tommaso Frassetto, Patrick Jauernig, David Koisser, Ahmad-Reza Sadeghi:
CFInsight: A Comprehensive Metric for CFI Policies. NDSS 2022 - [c295]Phillip Rieger, Thien Duc Nguyen, Markus Miettinen
, Ahmad-Reza Sadeghi:
DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection. NDSS 2022 - [c294]Tobias Cloosters, David Paaßen, Jianqiang Wang, Oussama Draissi
, Patrick Jauernig, Emmanuel Stapf, Lucas Davi, Ahmad-Reza Sadeghi:
RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64. RAID 2022: 30-42 - [c293]Yan Jiang
, Xiaoyu Ji, Kai Wang, Chen Yan, Richard Mitev, Ahmad-Reza Sadeghi, Wenyuan Xu:
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens. SP 2022: 984-1001 - [c292]Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider:
FLAME: Taming Backdoors in Federated Learning. USENIX Security Symposium 2022: 1415-1432 - [c291]Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu:
GhostTouch: Targeted Attacks on Touchscreens without Physical Touch. USENIX Security Symposium 2022: 1543-1559 - [c290]Rahul Kande, Addison Crump, Garrett Persyn, Patrick Jauernig, Ahmad-Reza Sadeghi, Aakash Tyagi, Jeyavijayan Rajendran:
TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities. USENIX Security Symposium 2022: 3219-3236 - [c289]David Koisser, Patrick Jauernig, Gene Tsudik, Ahmad-Reza Sadeghi:
V'CER: Efficient Certificate Validation in Constrained Networks. USENIX Security Symposium 2022: 4491-4508 - [c288]Anindya Maiti, Ahmad-Reza Sadeghi, Gabriela Felicia Ciocarlie, Patrick Tague:
Wireless and Mobile Security Research and Teaching in the Post-Pandemic World. WISEC 2022: 4-5 - [i87]Phillip Rieger, Thien Duc Nguyen, Markus Miettinen, Ahmad-Reza Sadeghi:
DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection. CoRR abs/2201.00763 (2022) - [i86]Aakash Tyagi, Addison Crump, Ahmad-Reza Sadeghi, Garrett Persyn, Jeyavijayan Rajendran, Patrick Jauernig, Rahul Kande:
TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities. CoRR abs/2201.09941 (2022) - [i85]Thien Duc Nguyen, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Ivan Visconti:
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges. CoRR abs/2202.06698 (2022) - [i84]David Koisser, Patrick Jauernig, Gene Tsudik, Ahmad-Reza Sadeghi:
V'CER: Efficient Certificate Validation in Constrained Networks. CoRR abs/2205.01973 (2022) - [i83]Ferdinand Brasser, Patrick Jauernig, Frederik Pustelnik, Ahmad-Reza Sadeghi, Emmanuel Stapf:
Trusted Container Extensions for Container-based Confidential Computing. CoRR abs/2205.05747 (2022) - [i82]Tommaso Frassetto, Patrick Jauernig, David Koisser, David Kretzler, Benjamin Schlosser, Sebastian Faust, Ahmad-Reza Sadeghi:
POSE: Practical Off-chain Smart Contract Execution. CoRR abs/2210.07110 (2022) - [i81]Phillip Rieger, Torsten Krauß, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi:
Close the Gate: Detecting Backdoored Models in Federated Learning based on Client-Side Deep Layer Output Analysis. CoRR abs/2210.07714 (2022) - [i80]Patrick Jauernig, Domagoj Jakobovic, Stjepan Picek, Emmanuel Stapf, Ahmad-Reza Sadeghi:
DARWIN: Survival of the Fittest Fuzzing Mutators. CoRR abs/2210.11783 (2022) - [i79]Nele Mentens, Stjepan Picek, Ahmad-Reza Sadeghi:
Intelligent Security: Is "AI for Cybersecurity" a Blessing or a Curse (Dagstuhl Seminar 22412). Dagstuhl Reports 12(10): 106-128 (2022) - [i78]Thien Duc Nguyen, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Ivan Visconti:
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges. IACR Cryptol. ePrint Arch. 2022: 166 (2022) - 2021
- [j43]Ahmad-Reza Sadeghi:
Technical perspective: The real-world dilemma of security and privacy by design. Commun. ACM 64(10): 84 (2021) - [j42]Siddharth Garg, Daniel E. Holcomb
, Jeyavijayan (JV) Rajendran
, Ahmad-Reza Sadeghi:
Guest Editors' Introduction: Competing to Secure SoCs. IEEE Des. Test 38(1): 5-6 (2021) - [c287]Yanjiao Chen, Yijie Bai
, Richard Mitev, Kaibo Wang, Ahmad-Reza Sadeghi, Wenyuan Xu:
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants. CCS 2021: 1861-1883 - [c286]Sebastian Surminski, Christian Niesler, Ferdinand Brasser, Lucas Davi, Ahmad-Reza Sadeghi:
RealSWATT: Remote Software-based Attestation for Embedded Devices under Realtime Constraints. CCS 2021: 2890-2905 - [c285]Lejla Batina, Rosario Cammarota, Nele Mentens, Ahmad-Reza Sadeghi, Johanna Sepúlveda, Shaza Zeitouni:
Invited: Security Beyond Bulk Silicon: Opportunities and Challenges of Emerging Devices. DAC 2021: 1-4 - [c284]Ghada Dessouky, Mihailo Isakov, Michel A. Kinsy, Pouya Mahmoody, Miguel Mark, Ahmad-Reza Sadeghi, Emmanuel Stapf, Shaza Zeitouni:
Distributed Memory Guard: Enabling Secure Enclave Computing in NoC-based Architectures. DAC 2021: 985-990 - [c283]Ghada Dessouky, Ahmad-Reza Sadeghi, Shaza Zeitouni:
SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities. EuroS&P 2021: 487-506 - [c282]Shaza Zeitouni, Jo Vliegen, Tommaso Frassetto, Dirk Koch, Ahmad-Reza Sadeghi, Nele Mentens
:
Trusted Configuration in Cloud FPGAs. FCCM 2021: 233-241 - [c281]Ahmad-Reza Sadeghi, Jeyavijayan Rajendran, Rahul Kande:
Organizing The World's Largest Hardware Security Competition: Challenges, Opportunities, and Lessons Learned. ACM Great Lakes Symposium on VLSI 2021: 95-100 - [c280]Tigist Abera, Ferdinand Brasser, Lachlan J. Gunn, Patrick Jauernig, David Koisser, Ahmad-Reza Sadeghi:
GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks. RAID 2021: 220-234 - [c279]Hossein Fereidooni, Samuel Marchal
, Markus Miettinen, Azalia Mirhoseini, Helen Möllering, Thien Duc Nguyen, Phillip Rieger
, Ahmad-Reza Sadeghi, Thomas Schneider
, Hossein Yalame, Shaza Zeitouni:
SAFELearn: Secure Aggregation for private FEderated Learning. SP (Workshops) 2021: 56-62 - [c278]Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, Emmanuel Stapf:
CURE: A Security Architecture with CUstomizable and Resilient Enclaves. USENIX Security Symposium 2021: 1073-1090 - [c277]Emmanuel Stapf, Patrick Jauernig, Ferdinand Brasser, Ahmad-Reza Sadeghi:
In Hardware We Trust? From TPM to Enclave Computing on RISC-V. VLSI-SoC 2021: 1-6 - [i77]Thien Duc Nguyen, Phillip Rieger, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni:
FLGUARD: Secure and Private Federated Learning. CoRR abs/2101.02281 (2021) - [i76]Oliver Lutz, Huili Chen, Hossein Fereidooni, Christoph Sendner, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Farinaz Koushanfar:
ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning. CoRR abs/2103.12607 (2021) - [i75]Yanjiao Chen, Yijie Bai, Richard Mitev, Kaibo Wang, Ahmad-Reza Sadeghi, Wenyuan Xu:
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants. CoRR abs/2109.09958 (2021) - [i74]Ghada Dessouky, Alexander Gruler, Pouya Mahmoody, Ahmad-Reza Sadeghi, Emmanuel Stapf:
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures. CoRR abs/2110.08139 (2021) - [i73]Thien Duc Nguyen, Phillip Rieger, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni:
FLGUARD: Secure and Private Federated Learning. IACR Cryptol. ePrint Arch. 2021: 25 (2021) - [i72]Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Helen Möllering, Thien Duc Nguyen, Phillip Rieger, Ahmad-Reza Sadeghi, Thomas Schneider, Hossein Yalame, Shaza Zeitouni:
SAFELearn: Secure Aggregation for private FEderated Learning. IACR Cryptol. ePrint Arch. 2021: 386 (2021) - 2020
- [j41]Patrick Jauernig
, Ahmad-Reza Sadeghi, Emmanuel Stapf:
Trusted Execution Environments: Properties, Applications, and Challenges. IEEE Secur. Priv. 18(2): 56-60 (2020) - [j40]Ghada Dessouky
, Tommaso Frassetto, Patrick Jauernig
, Ahmad-Reza Sadeghi, Emmanuel Stapf:
With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security. IEEE Secur. Priv. 18(5): 57-66 (2020) - [c276]Richard Mitev, Anna Pazii, Markus Miettinen, William Enck
, Ahmad-Reza Sadeghi:
LeakyPick: IoT Audio Spy Detector. ACSAC 2020: 694-705 - [c275]Johannes Buchmann, Ghada Dessouky, Tommaso Frassetto, Ágnes Kiss, Ahmad-Reza Sadeghi, Thomas Schneider
, Giulia Traverso, Shaza Zeitouni:
SAFE: A Secure and Efficient Long-Term Distributed Storage System. SBC@AsiaCCS 2020: 8-13 - [c274]Thien Duc Nguyen, Markus Miettinen, Ahmad-Reza Sadeghi:
Long Live Randomization: On Privacy-preserving Contact Tracing in Pandemic. MTD@CCS 2020: 1-9 - [c273]Huili Chen, Siam Umar Hussain, Fabian Boemer, Emmanuel Stapf, Ahmad-Reza Sadeghi, Farinaz Koushanfar
, Rosario Cammarota:
Developing Privacy-preserving AI Systems: The Lessons learned. DAC 2020: 1-4 - [c272]Ghada Dessouky, Patrick Jauernig, Nele Mentens
, Ahmad-Reza Sadeghi, Emmanuel Stapf:
INVITED: AI Utopia or Dystopia - On Securing AI Platforms. DAC 2020: 1-6 - [c271]Shaza Zeitouni, Emmanuel Stapf, Hossein Fereidooni, Ahmad-Reza Sadeghi:
On the Security of Strong Memristor-based Physically Unclonable Functions. DAC 2020: 1-6 - [c270]Sebastian P. Bayerl, Tommaso Frassetto, Patrick Jauernig, Korbinian Riedhammer
, Ahmad-Reza Sadeghi, Thomas Schneider
, Emmanuel Stapf, Christian Weinert
:
Offline Model Guard: Secure and Private ML on Mobile Devices. DATE 2020: 460-465 - [c269]Jens Neureither, Alexandra Dmitrienko, David Koisser, Ferdinand Brasser, Ahmad-Reza Sadeghi:
LegIoT: Ledgered Trust Management Platform for IoT. ESORICS (1) 2020: 377-396 - [c268]Sridhar Adepu, Ferdinand Brasser, Luis Garcia
, Michael Rodler, Lucas Davi, Ahmad-Reza Sadeghi, Saman A. Zonouz:
Control Behavior Integrity for Distributed Cyber-Physical Systems. ICCPS 2020: 30-40 - [c267]Lars Baumgärtner
, Alexandra Dmitrienko, Bernd Freisleben
, Alexander Gruler, Jonas Höchst
, Joshua Kühlberg, Mira Mezini, Richard Mitev, Markus Miettinen, Anel Muhamedagic, Thien Duc Nguyen, Alvar Penning, Dermot Frederik Pustelnik, Filipp Roos, Ahmad-Reza Sadeghi, Michael Schwarz, Christian Uhl
:
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps. TrustCom 2020: 458-467 - [c266]Ghada Dessouky, Tommaso Frassetto, Ahmad-Reza Sadeghi:
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments. USENIX Security Symposium 2020: 451-468 - [c265]Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, Ahmad-Reza Sadeghi:
V0LTpwn: Attacking x86 Processor Integrity from Software. USENIX Security Symposium 2020: 1445-1461 - [c264]Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen
, Hidayet Aksu, Mauro Conti
, Ahmad-Reza Sadeghi, A. Selcuk Uluagac:
Peek-a-boo: i see your smart home activities, even encrypted! WISEC 2020: 207-218 - [i71]Lars Baumgärtner, Alexandra Dmitrienko, Bernd Freisleben, Alexander Gruler, Jonas Höchst, Joshua Kühlberg, Mira Mezini, Markus Miettinen, Anel Muhamedagic, Thien Duc Nguyen, Alvar Penning
, Dermot Frederik Pustelnik, Filipp Roos, Ahmad-Reza Sadeghi, Michael Schwarz, Christian Uhl:
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps. CoRR abs/2006.05914 (2020) - [i70]Richard Mitev, Anna Pazii, Markus Miettinen, William Enck, Ahmad-Reza Sadeghi:
LeakyPick: IoT Audio Spy Detector. CoRR abs/2007.00500 (2020) - [i69]Sebastian P. Bayerl, Tommaso Frassetto, Patrick Jauernig, Korbinian Riedhammer, Ahmad-Reza Sadeghi, Thomas Schneider, Emmanuel Stapf, Christian Weinert:
Offline Model Guard: Secure and Private ML on Mobile Devices. CoRR abs/2007.02351 (2020) - [i68]Rosario Cammarota, Matthias Schunter, Anand Rajan, Fabian Boemer, Ágnes Kiss, Amos Treiber, Christian Weinert, Thomas Schneider, Emmanuel Stapf, Ahmad-Reza Sadeghi, Daniel Demmler
, Huili Chen, Siam Umar Hussain, M. Sadegh Riazi, Farinaz Koushanfar, Saransh Gupta, Tajana Simunic Rosing, Kamalika Chaudhuri, Hamid Nejatollahi, Nikil D. Dutt, Mohsen Imani, Kim Laine, Anuj Dubey, Aydin Aysu, Fateme Sadat Hosseini, Chengmo Yang, Eric Wallace, Pamela Norton:
Trustworthy AI Inference Systems: An Industry Research View. CoRR abs/2008.04449 (2020) - [i67]Shaza Zeitouni, Ghada Dessouky, Ahmad-Reza Sadeghi:
SoK: On the Security Challenges and Risks of Multi-Tenant FPGAs in the Cloud. CoRR abs/2009.13914 (2020) - [i66]Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, Emmanuel Stapf:
CURE: A Security Architecture with CUstomizable and Resilient Enclaves. CoRR abs/2010.15866 (2020) - [i65]Johannes Buchmann, Ghada Dessouky, Tommaso Frassetto, Ágnes Kiss, Ahmad-Reza Sadeghi, Thomas Schneider, Giulia Traverso, Shaza Zeitouni:
SAFE: A Secure and Efficient Long-Term Distributed Storage System. IACR Cryptol. ePrint Arch. 2020: 690 (2020)
2010 – 2019
- 2019
- [j39]Sandip Ray, Ahmad-Reza Sadeghi, Mohammad Abdullah Al Faruque
:
Guest Editors' Introduction: Secure Automotive Systems. IEEE Des. Test 36(6): 5-6 (2019) - [j38]Samuel Marchal
, Markus Miettinen
, Thien Duc Nguyen, Ahmad-Reza Sadeghi, N. Asokan
:
AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication. IEEE J. Sel. Areas Commun. 37(6): 1402-1412 (2019) - [c263]Ferdinand Brasser, Srdjan Capkun, Alexandra Dmitrienko, Tommaso Frassetto, Kari Kostiainen, Ahmad-Reza Sadeghi:
DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization. ACSAC 2019: 788-800 - [c262]Richard Mitev, Markus Miettinen, Ahmad-Reza Sadeghi:
Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants. AsiaCCS 2019: 465-478 - [c261]Carsten Bock, Ferdinand Brasser, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi:
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks. AsiaCCS 2019: 561-572 - [c260]Lejla Batina, Patrick Jauernig, Nele Mentens
, Ahmad-Reza Sadeghi, Emmanuel Stapf:
In Hardware We Trust: Gains and Pains of Hardware-assisted Security. DAC 2019: 44 - [c259]Thomas Nyman
, Ghada Dessouky, Shaza Zeitouni, Aaro Lehikoinen, Andrew Paverd, N. Asokan
, Ahmad-Reza Sadeghi:
HardScope: Hardening Embedded Systems Against Data-Oriented Attacks. DAC 2019: 63 - [c258]Ebrahim M. Songhori, M. Sadegh Riazi, Siam U. Hussain, Ahmad-Reza Sadeghi, Farinaz Koushanfar
:
ARM2GC: Succinct Garbled Processor for Secure Computation. DAC 2019: 112 - [c257]Andrew Paverd, Marcus Völp
, Ferdinand Brasser, Matthias Schunter, N. Asokan
, Ahmad-Reza Sadeghi, Paulo Jorge Esteves Veríssimo, Andreas Steininger
, Thorsten Holz:
Sustainable Security & Safety: Challenges and Opportunities. CERTS 2019: 4:1-4:13 - [c256]Ahmad Ibrahim, Ahmad-Reza Sadeghi, Gene Tsudik:
HEALED: HEaling & Attestation for Low-End Embedded Devices. Financial Cryptography 2019: 627-645 - [c255]Walter Blocher, Ahmad-Reza Sadeghi, Philipp G. Sandner:
Blockchain and the Future of Publishing. GI-Jahrestagung (Workshops) 2019: 587-588 - [c254]Ghada Dessouky, Shaza Zeitouni, Ahmad Ibrahim, Lucas Davi, Ahmad-Reza Sadeghi:
CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems. ICCAD 2019: 1-8 - [c253]Thien Duc Nguyen, Samuel Marchal
, Markus Miettinen
, Hossein Fereidooni, N. Asokan
, Ahmad-Reza Sadeghi:
DÏoT: A Federated Self-learning Anomaly Detection System for IoT. ICDCS 2019: 756-767 - [c252]Ivan De Oliveira Nunes, Ghada Dessouky, Ahmad Ibrahim, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik:
Towards Systematic Design of Collective Remote Attestation Protocols. ICDCS 2019: 1188-1198 - [c251]Tigist Abera, Raad Bahmani, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter:
DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems. NDSS 2019 - [c250]Cornelius Aschermann, Tommaso Frassetto, Thorsten Holz, Patrick Jauernig, Ahmad-Reza Sadeghi, Daniel Teuchert:
NAUTILUS: Fishing for Deep Bugs with Grammars. NDSS 2019 - [c249]Ferdinand Brasser, David Gens, Patrick Jauernig, Ahmad-Reza Sadeghi, Emmanuel Stapf:
SANCTUARY: ARMing TrustZone with User-space Enclaves. NDSS 2019 - [c248]Samuel Weiser, Mario Werner, Ferdinand Brasser, Maja Malenko, Stefan Mangard, Ahmad-Reza Sadeghi:
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V. NDSS 2019 - [c247]Hamid Reza Ghaeini, Matthew Chan, Raad Bahmani, Ferdinand Brasser, Luis Garcia, Jianying Zhou, Ahmad-Reza Sadeghi, Nils Ole Tippenhauer, Saman A. Zonouz:
PAtt: Physics-based Attestation of Control Systems. RAID 2019: 165-180 - [c246]Ghada Dessouky, David Gens, Patrick Haney, Garrett Persyn, Arun K. Kanuparthi, Hareesh Khattri, Jason M. Fung, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran:
HardFails: Insights into Software-Exploitable Hardware Bugs. USENIX Security Symposium 2019: 213-230 - [c245]Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi:
FastKitten: Practical Smart Contracts on Bitcoin. USENIX Security Symposium 2019: 801-818 - [c244]T. J. OConnor, Reham Mohamed, Markus Miettinen, William Enck
, Bradley Reaves, Ahmad-Reza Sadeghi:
HomeSnitch: behavior transparency and control for smart home IoT devices. WiSec 2019: 128-138 - [i64]Ebrahim M. Songhori, M. Sadegh Riazi, Siam U. Hussain, Ahmad-Reza Sadeghi, Farinaz Koushanfar:
ARM2GC: Succinct Garbled Processor for Secure Computation. CoRR abs/1902.02908 (2019) - [i63]Ghada Dessouky, Tommaso Frassetto, Ahmad-Reza Sadeghi:
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments. CoRR abs/1909.09599 (2019) - [i62]Tigist Abera, Ferdinand Brasser, Lachlan J. Gunn, David Koisser, Ahmad-Reza Sadeghi:
SADAN: Scalable Adversary Detection in Autonomous Networks. CoRR abs/1910.05190 (2019) - [i61]Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, Ahmad-Reza Sadeghi:
V0LTpwn: Attacking x86 Processor Integrity from Software. CoRR abs/1912.04870 (2019) - [i60]Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi:
FastKitten: Practical Smart Contracts on Bitcoin. IACR Cryptol. ePrint Arch. 2019: 154 (2019) - 2018
- [j37]Timothy Vidas, Per Larsen, Hamed Okhravi, Ahmad-Reza Sadeghi:
Changing the Game of Software Security. IEEE Secur. Priv. 16(2): 10-11 (2018) - [j36]Omer Tene, Jules Polonetsky, Ahmad-Reza Sadeghi:
Five Freedoms for the Homo Deus. IEEE Secur. Priv. 16(3): 15-17 (2018) - [j35]Andrew Paverd
, Sandeep Tamrakar, Hoang Long Nguyen, Praveen Kumar Pendyala, Thien Duc Nguyen, Elizabeth Stobert, Tommi Grondahl
, N. Asokan
, Ahmad-Reza Sadeghi:
OmniShare: Encrypted Cloud Storage for the Multi-Device Era. IEEE Internet Comput. 22(4): 27-36 (2018) - [j34]Benny Fuhry
, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi:
HardIDX: Practical and secure index with SGX in a malicious environment. J. Comput. Secur. 26(5): 677-706 (2018) - [j33]N. Asokan
, Thomas Nyman
, Norrathep Rattanavipanon
, Ahmad-Reza Sadeghi, Gene Tsudik:
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(11): 2290-2300 (2018) - [j32]Hossen Asiful Mustafa
, Wenyuan Xu, Ahmad-Reza Sadeghi, Steffen Schulz:
End-to-End Detection of Caller ID Spoofing Attacks. IEEE Trans. Dependable Secur. Comput. 15(3): 423-436 (2018) - [c243]Ferdinand Brasser, Lucas Davi, Abhijitt Dhavlle, Tommaso Frassetto, Sai Manoj Pudukotai Dinakarrao, Setareh Rafatirad, Ahmad-Reza Sadeghi, Avesta Sasan, Hossein Sayadi, Shaza Zeitouni, Houman Homayoun:
Advances and throwbacks in hardware-assisted security: special session. CASES 2018: 15:1-15:10 - [c242]Luke Deshotels, Razvan Deaconescu
, Costin Carabas, Iulia Manda, William Enck, Mihai Chiroiu, Ninghui Li, Ahmad-Reza Sadeghi:
iOracle: Automated Evaluation of Access Control Policies in iOS. AsiaCCS 2018: 117-131 - [c241]Markus Miettinen, Ahmad-Reza Sadeghi:
Internet of things or threats?: on building trust in IoT (keynote). CODES+ISSS 2018: 1 - [c240]Markus Miettinen, Thien Duc Nguyen, Ahmad-Reza Sadeghi, N. Asokan:
Revisiting context-based authentication in IoT. DAC 2018: 32:1-32:6 - [c239]Shaza Zeitouni, David Gens, Ahmad-Reza Sadeghi:
It's hammer time: how to attack (rowhammer-based) DRAM-PUFs. DAC 2018: 65:1-65:6 - [c238]Xavier Carpent
, Karim Eldefrawy, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik:
Reconciling remote attestation and safety-critical operation on simple IoT devices. DAC 2018: 90:1-90:6 - [c237]Sibin Mohan
, Mikael Asplund, Gedare Bloom, Ahmad-Reza Sadeghi, Ahmad Ibrahim, Negin Salajageh, Paul Griffioen
, Bruno Sinopoli:
The future of IoT security: special session. EMSOFT 2018: 16:1-16:7 - [c236]Moreno Ambrosin
, Mauro Conti
, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter:
SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices. ESORICS (1) 2018: 595-617 - [c235]Ghada Dessouky, Tigist Abera, Ahmad Ibrahim, Ahmad-Reza Sadeghi:
LiteHAX: lightweight hardware-assisted attestation of program execution. ICCAD 2018: 106 - [c234]Andreas Schaad, Björn Grohmann, Oliver Winzenried, Ferdinand Brasser, Ahmad-Reza Sadeghi:
Towards a Cloud-based System for Software Protection and Licensing. ICETE (2) 2018: 698-702 - [c233]Ferdinand Brasser, Tommaso Frassetto, Korbinian Riedhammer
, Ahmad-Reza Sadeghi, Thomas Schneider
, Christian Weinert
:
VoiceGuard: Secure and Private Speech Processing. INTERSPEECH 2018: 1303-1307 - [c232]David Gens, Simon Schmitt, Lucas Davi, Ahmad-Reza Sadeghi:
K-Miner: Uncovering Memory Corruption in Linux. NDSS 2018 - [c231]Hamid Reza Ghaeini
, Daniele Antonioli, Ferdinand Brasser, Ahmad-Reza Sadeghi, Nils Ole Tippenhauer:
State-aware anomaly detection for industrial control systems. SAC 2018: 1620-1628 - [c230]Ahmad Ibrahim, Ahmad-Reza Sadeghi, Gene Tsudik:
US-AID: Unattended Scalable Attestation of IoT Devices. SRDS 2018: 21-30 - [c229]Tommaso Frassetto, Patrick Jauernig, Christopher Liebchen, Ahmad-Reza Sadeghi:
IMIX: In-Process Memory Isolation EXtension. USENIX Security Symposium 2018: 83-97 - [c228]Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, Ahmad-Reza Sadeghi:
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX. USENIX Security Symposium 2018: 1213-1227 - [p6]Yier Jin, Dean Sullivan, Orlando Arias, Ahmad-Reza Sadeghi, Lucas Davi:
Hardware control flow integrity. The Continuing Arms Race 2018: 181-210 - [e25]Per Larsen, Ahmad-Reza Sadeghi:
The Continuing Arms Race: Code-Reuse Attacks and Defenses. ACM / Morgan & Claypool 2018, ISBN 978-1-97000-183-9 [contents] - [i59]Thien Duc Nguyen, Samuel Marchal, Markus Miettinen, Minh Hoang Dang, N. Asokan, Ahmad-Reza Sadeghi:
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices. CoRR abs/1804.07474 (2018) - [i58]N. Asokan, Thomas Nyman, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik:
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices. CoRR abs/1807.05002 (2018) - [i57]Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, A. Selcuk Uluagac:
Peek-a-Boo: I see your smart home activities, even encrypted! CoRR abs/1808.02741 (2018) - [i56]Markus Miettinen, Paul C. van Oorschot, Ahmad-Reza Sadeghi:
Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management. CoRR abs/1808.03071 (2018) - [i55]Ghada Dessouky, David Gens, Patrick Haney, Garrett Persyn, Arun K. Kanuparthi, Hareesh Khattri, Jason M. Fung, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran:
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs. CoRR abs/1812.00197 (2018) - [i54]Sridhar Adepu, Ferdinand Brasser, Luis Garcia, Michael Rodler, Lucas Davi, Ahmad-Reza Sadeghi, Saman A. Zonouz:
Control Behavior Integrity for Distributed Cyber-Physical Systems. CoRR abs/1812.08310 (2018) - [i53]Ghada Dessouky, Farinaz Koushanfar
, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni, Michael Zohner:
Pushing the Communication Barrier in Secure Computation using Lookup Tables. IACR Cryptol. ePrint Arch. 2018: 486 (2018) - 2017
- [j31]Ahmad-Reza Sadeghi:
Security and Privacy More Crucial than Ever. IEEE Secur. Priv. 15(1): 3-4 (2017) - [j30]Ahmad-Reza Sadeghi, Ghada Dessouky:
Security & Privacy Week Interviews, Part 3. IEEE Secur. Priv. 15(1): 66-74 (2017) - [j29]Ahmad-Reza Sadeghi, Shaza Zeitouni:
ACM CCS 2016 Interviews, Part 1. IEEE Secur. Priv. 15(2): 88-91 (2017) - [j28]Ahmad-Reza Sadeghi, Shaza Zeitouni:
ACM CCS 2016 Interviews, Part 2. IEEE Secur. Priv. 15(3): 70-76 (2017) - [j27]Ahmad-Reza Sadeghi, Shaza Zeitouni:
ACM CCS 2016 Interview, Part 3. IEEE Secur. Priv. 15(4): 58-61 (2017) - [j26]M. Sadegh Riazi, Ebrahim M. Songhori, Ahmad-Reza Sadeghi, Thomas Schneider
, Farinaz Koushanfar
:
Toward Practical Secure Stable Matching. Proc. Priv. Enhancing Technol. 2017(1): 62-78 (2017) - [j25]Stephan Heuser, Bradley Reaves, Praveen Kumar Pendyala, Henry Carter
, Alexandra Dmitrienko, William Enck, Negar Kiyavash, Ahmad-Reza Sadeghi, Patrick Traynor:
Phonion: Practical Protection of Metadata in Telephony Networks. Proc. Priv. Enhancing Technol. 2017(1): 170-187 (2017) - [c227]Ahmad-Reza Sadeghi:
Hardware-Assisted Security: Promises, Pitfalls and Opportunities. ASHES@CCS 2017: 5 - [c226]Ahmad-Reza Sadeghi:
Moving Targets vs. Moving Adversaries: On the Effectiveness of System Randomization. MTD@CCS 2017: 51-52 - [c225]Tommaso Frassetto, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi:
JITGuard: Hardening Just-in-time Compilers with SGX. CCS 2017: 2405-2419 - [c224]Hossein Fereidooni, Tommaso Frassetto, Markus Miettinen, Ahmad-Reza Sadeghi, Mauro Conti
:
Fitness Trackers: Fit for Health but Unfit for Security and Privacy. CHASE 2017: 19-24 - [c223]Ghada Dessouky, Shaza Zeitouni, Thomas Nyman
, Andrew Paverd
, Lucas Davi, Patrick Koeberl, N. Asokan
, Ahmad-Reza Sadeghi:
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware. DAC 2017: 24:1-24:6 - [c222]Benny Fuhry
, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi:
HardIDX: Practical and Secure Index with SGX. DBSec 2017: 386-408 - [c221]Raad Bahmani, Manuel Barbosa
, Ferdinand Brasser, Bernardo Portela
, Ahmad-Reza Sadeghi, Guillaume Scerri, Bogdan Warinschi:
Secure Multiparty Computation from SGX. Financial Cryptography 2017: 477-497 - [c220]Shaza Zeitouni, Ghada Dessouky, Orlando Arias, Dean Sullivan, Ahmad Ibrahim, Yier Jin
, Ahmad-Reza Sadeghi:
ATRIUM: Runtime attestation resilient under memory attacks. ICCAD 2017: 384-391 - [c219]Markus Miettinen
, Samuel Marchal
, Ibbad Hafeez, N. Asokan
, Ahmad-Reza Sadeghi, Sasu Tarkoma
:
IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. ICDCS 2017: 2177-2184 - [c218]Markus Miettinen, Samuel Marchal
, Ibbad Hafeez, Tommaso Frassetto, N. Asokan
, Ahmad-Reza Sadeghi, Sasu Tarkoma
:
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT. ICDCS 2017: 2511-2514 - [c217]Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi:
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables. NDSS 2017 - [c216]Ghada Dessouky, Farinaz Koushanfar
, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni, Michael Zohner:
Pushing the Communication Barrier in Secure Computation using Lookup Tables. NDSS 2017 - [c215]Luis Garcia, Ferdinand Brasser, Mehmet Hazar Cintuglu, Ahmad-Reza Sadeghi, Osama A. Mohammed, Saman A. Zonouz:
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit. NDSS 2017 - [c214]Robert Rudd, Richard Skowyra, David Bigelow, Veer Dedhia, Thomas Hobson, Stephen Crane, Christopher Liebchen, Per Larsen, Lucas Davi, Michael Franz, Ahmad-Reza Sadeghi, Hamed Okhravi:
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity. NDSS 2017 - [c213]Hossein Fereidooni, Jiska Classen, Tom Spink
, Paul Patras
, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti
:
Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit. RAID 2017: 48-69 - [c212]David Gens, Orlando Arias, Dean Sullivan, Christopher Liebchen, Yier Jin
, Ahmad-Reza Sadeghi:
LAZARUS: Practical Side-Channel Resilient Kernel-Space Randomization. RAID 2017: 238-258 - [c211]Ferdinand Brasser, Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi:
CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory. USENIX Security Symposium 2017: 117-130 - [c210]Ahmad Ibrahim, Ahmad-Reza Sadeghi, Shaza Zeitouni:
SeED: secure non-interactive attestation for embedded devices. WISEC 2017: 64-74 - [c209]Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi:
Software Grand Exposure: SGX Cache Attacks Are Practical. WOOT 2017 - [e24]Ramesh Karri
, Ozgur Sinanoglu, Ahmad-Reza Sadeghi, Xun Yi
:
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017. ACM 2017, ISBN 978-1-4503-4944-4 [contents] - [i52]Yansong Gao, Hua Ma, Gefei Li, Shaza Zeitouni, Said F. Al-Sarawi, Derek Abbott, Ahmad-Reza Sadeghi, Damith Chinthana Ranasinghe:
Exploiting PUF Models for Error Free Response Generation. CoRR abs/1701.08241 (2017) - [i51]Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi:
Software Grand Exposure: SGX Cache Attacks Are Practical. CoRR abs/1702.07521 (2017) - [i50]Dean Sullivan, Orlando Arias, David Gens, Lucas Davi, Ahmad-Reza Sadeghi, Yier Jin:
Execution Integrity with In-Place Encryption. CoRR abs/1703.02698 (2017) - [i49]Benny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi:
HardIDX: Practical and Secure Index with SGX. CoRR abs/1703.04583 (2017) - [i48]Thomas Nyman, Ghada Dessouky, Shaza Zeitouni, Aaro Lehikoinen, Andrew Paverd, N. Asokan, Ahmad-Reza Sadeghi:
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement. CoRR abs/1705.10295 (2017) - [i47]Ghada Dessouky, Shaza Zeitouni, Thomas Nyman, Andrew Paverd, Lucas Davi, Patrick Koeberl, N. Asokan, Ahmad-Reza Sadeghi:
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware. CoRR abs/1706.03754 (2017) - [i46]Yansong Gao, Said F. Al-Sarawi, Derek Abbott, Ahmad-Reza Sadeghi, Damith Chinthana Ranasinghe:
Modeling Attack Resilient Reconfigurable Latent Obfuscation Technique for PUF based Lightweight Authentication. CoRR abs/1706.06232 (2017) - [i45]Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti:
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit. CoRR abs/1706.09165 (2017) - [i44]Ferdinand Brasser, Srdjan Capkun, Alexandra Dmitrienko, Tommaso Frassetto, Kari Kostiainen, Urs Müller, Ahmad-Reza Sadeghi:
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization. CoRR abs/1709.09917 (2017) - [i43]Ebrahim M. Songhori, M. Sadegh Riazi, Siam U. Hussain, Ahmad-Reza Sadeghi, Farinaz Koushanfar
:
ARM2GC: Simple and Efficient Garbled Circuit Framework by Skipping. IACR Cryptol. ePrint Arch. 2017: 1157 (2017) - 2016
- [j24]Ahmad-Reza Sadeghi:
Games without Frontiers: Whither Information Security and Privacy? IEEE Secur. Priv. 14(1): 3-5 (2016) - [j23]Ahmad-Reza Sadeghi, Ghada Dessouky:
Security & Privacy Week Interviews, Part 1. IEEE Secur. Priv. 14(5): 58-67 (2016) - [j22]Ahmad-Reza Sadeghi, Ghada Dessouky:
Security & Privacy Week Interviews, Part 2. IEEE Secur. Priv. 14(6): 71-80 (2016) - [j21]Stephen McLaughlin, Charalambos Konstantinou
, Xueyang Wang, Lucas Davi, Ahmad-Reza Sadeghi, Michail Maniatakos
, Ramesh Karri
:
The Cybersecurity Landscape in Industrial Control Systems. Proc. IEEE 104(5): 1039-1057 (2016) - [j20]Mauro Conti
, Stephen Crane, Tommaso Frassetto, Andrei Homescu, Georg Koppen, Per Larsen, Christopher Liebchen, Mike Perry, Ahmad-Reza Sadeghi:
Selfrando: Securing the Tor Browser against De-anonymization Exploits. Proc. Priv. Enhancing Technol. 2016(4): 454-469 (2016) - [j19]Shaza Zeitouni, Yossef Oren
, Christian Wachsmann, Patrick Koeberl, Ahmad-Reza Sadeghi:
Remanence Decay Side-Channel: The PUF Case. IEEE Trans. Inf. Forensics Secur. 11(6): 1106-1116 (2016) - [c208]Jacob Wurm, Khoa Hoang, Orlando Arias, Ahmad-Reza Sadeghi, Yier Jin
:
Security analysis on consumer and industrial IoT devices. ASP-DAC 2016: 519-524 - [c207]Luke Deshotels, Razvan Deaconescu
, Mihai Chiroiu, Lucas Davi, William Enck, Ahmad-Reza Sadeghi:
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles. CCS 2016: 704-716 - [c206]Moreno Ambrosin
, Mauro Conti
, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter:
SANA: Secure and Scalable Aggregate Network Attestation. CCS 2016: 731-742 - [c205]Tigist Abera, N. Asokan
, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman
, Andrew Paverd
, Ahmad-Reza Sadeghi, Gene Tsudik:
C-FLAT: Control-Flow Attestation for Embedded Systems Software. CCS 2016: 743-754 - [c204]Frederik Armknecht
, Daisuke Moriyama, Ahmad-Reza Sadeghi, Moti Yung:
Towards a Unified Security Model for Physically Unclonable Functions. CT-RSA 2016: 271-287 - [c203]Ebrahim M. Songhori, Shaza Zeitouni, Ghada Dessouky, Thomas Schneider
, Ahmad-Reza Sadeghi, Farinaz Koushanfar
:
GarbledCPU: a MIPS processor for secure computation in hardware. DAC 2016: 73:1-73:6 - [c202]Ferdinand Brasser, Kasper Bonne Rasmussen, Ahmad-Reza Sadeghi, Gene Tsudik:
Remote attestation for low-end embedded devices: the prover's perspective. DAC 2016: 91:1-91:6 - [c201]Tigist Abera, N. Asokan
, Lucas Davi, Farinaz Koushanfar
, Andrew Paverd
, Ahmad-Reza Sadeghi, Gene Tsudik:
Invited - Things, trouble, trust: on building trust in IoT systems. DAC 2016: 121:1-121:6 - [c200]Nancy Cam-Winget, Ahmad-Reza Sadeghi, Yier Jin
:
Invited - Can IoT be secured: emerging challenges in connecting the unconnected. DAC 2016: 122:1-122:6 - [c199]Dean Sullivan, Orlando Arias, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Yier Jin
:
Strategy without tactics: policy-agnostic hardware-enhanced control-flow integrity. DAC 2016: 163:1-163:6 - [c198]Stephan Heuser, Marco Negro, Praveen Kumar Pendyala, Ahmad-Reza Sadeghi:
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper). Financial Cryptography 2016: 260-268 - [c197]Azalia Mirhoseini, Ahmad-Reza Sadeghi, Farinaz Koushanfar
:
CryptoML: Secure outsourcing of big data machine learning applications. HOST 2016: 149-154 - [c196]Ferdinand Brasser, Daeyoung Kim, Christopher Liebchen, Vinod Ganapathy, Liviu Iftode, Ahmad-Reza Sadeghi:
Regulating ARM TrustZone Devices in Restricted Spaces. MobiSys 2016: 413-425 - [c195]Kjell Braden, Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Stephen Crane, Michael Franz, Per Larsen:
Leakage-Resilient Layout Randomization for Mobile Devices. NDSS 2016 - [c194]Julian Lettner, Benjamin Kollenda, Andrei Homescu, Per Larsen, Felix Schuster, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Michael Franz:
Subversive-C: Abusing and Protecting Dynamic Message Dispatch. USENIX ATC 2016: 209-221 - [c193]Ahmad Ibrahim, Ahmad-Reza Sadeghi, Gene Tsudik, Shaza Zeitouni:
DARPA: Device Attestation Resilient to Physical Attacks. WISEC 2016: 171-182 - [c192]Ghada Dessouky, Ahmad-Reza Sadeghi:
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs. WISEC 2016: 223-224 - [c191]Markus Miettinen, Jialin Huang, Thien Duc Nguyen, N. Asokan
, Ahmad-Reza Sadeghi:
POSTER: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments. WISEC 2016: 225-226 - [c190]Moreno Ambrosin
, Mauro Conti
, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter:
POSTER: Toward a Secure and Scalable Attestation. WISEC 2016: 229-230 - [e23]Mark Manulis
, Ahmad-Reza Sadeghi, Steve A. Schneider:
Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings. Lecture Notes in Computer Science 9696, Springer 2016, ISBN 978-3-319-39554-8 [contents] - [i42]Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik:
C-FLAT: Control-FLow ATtestation for Embedded Systems Software. CoRR abs/1605.07763 (2016) - [i41]Razvan Deaconescu, Luke Deshotels, Mihai Bucicoiu, William Enck, Lucas Davi, Ahmad-Reza Sadeghi:
SandBlaster: Reversing the Apple Sandbox. CoRR abs/1608.04303 (2016) - [i40]Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma:
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT. CoRR abs/1611.04880 (2016) - [i39]Ferdinand Brasser, Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi:
CAn't Touch This: Practical and Generic Software-only Defenses Against Rowhammer Attacks. CoRR abs/1611.08396 (2016) - [i38]Frederik Armknecht, Daisuke Moriyama, Ahmad-Reza Sadeghi, Moti Yung:
Towards a Unified Security Model for Physically Unclonable Functions. IACR Cryptol. ePrint Arch. 2016: 33 (2016) - [i37]Raad Bahmani, Manuel Barbosa, Ferdinand Brasser, Bernardo Portela, Ahmad-Reza Sadeghi, Guillaume Scerri, Bogdan Warinschi:
Secure Multiparty Computation from SGX. IACR Cryptol. ePrint Arch. 2016: 1057 (2016) - 2015
- [b5]Lucas Davi, Ahmad-Reza Sadeghi:
Building Secure Defenses Against Code-Reuse Attacks. Springer Briefs in Computer Science, Springer 2015, ISBN 978-3-319-25544-6, pp. 1-74 - [b4]Per Larsen, Stefan Brunthaler
, Lucas Davi, Ahmad-Reza Sadeghi, Michael Franz:
Automated Software Diversity. Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers 2015, ISBN 978-3-031-01218-1, pp. 1-88 - [j18]Ramesh Karri
, Farinaz Koushanfar
, Ozgur Sinanoglu
, Yiorgos Makris
, Ken Mai, Ahmad-Reza Sadeghi, Swarup Bhunia
:
Guest Editorial Special Section on Hardware Security and Trust. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(6): 873-874 (2015) - [c189]Mihai Bucicoiu, Lucas Davi, Razvan Deaconescu
, Ahmad-Reza Sadeghi:
XiOS: Extended Application Sandboxing on iOS. AsiaCCS 2015: 43-54 - [c188]Ahmad-Reza Sadeghi, Lucas Davi, Per Larsen:
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? AsiaCCS 2015: 55-61 - [c187]Stephen J. Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz
, Bjorn De Sutter, Michael Franz:
It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks. CCS 2015: 243-255 - [c186]Markus Miettinen, N. Asokan
, Farinaz Koushanfar
, Thien Duc Nguyen, Jon Rios, Ahmad-Reza Sadeghi, Majid Sobhani, Sudha Yellapantula:
I Know Where You are: Proofs of Presence Resilient to Malicious Provers. AsiaCCS 2015: 567-577 - [c185]Mauro Conti
, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Marco Negro, Christopher Liebchen, Mohaned Qunaibit, Ahmad-Reza Sadeghi:
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks. CCS 2015: 952-963 - [c184]N. Asokan
, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter, Gene Tsudik, Christian Wachsmann:
SEDA: Scalable Embedded Device Attestation. CCS 2015: 964-975 - [c183]Daniel Demmler, Ghada Dessouky, Farinaz Koushanfar
, Ahmad-Reza Sadeghi, Thomas Schneider
, Shaza Zeitouni:
Automated Synthesis of Optimized Circuits for Secure Computation. CCS 2015: 1504-1517 - [c182]Ferdinand Brasser, Brahim El Mahjoub, Ahmad-Reza Sadeghi, Christian Wachsmann, Patrick Koeberl:
TyTAN: tiny trust anchor for tiny devices. DAC 2015: 34:1-34:6 - [c181]Ebrahim M. Songhori
, Siam U. Hussain, Ahmad-Reza Sadeghi, Farinaz Koushanfar
:
Compacting privacy-preserving k-nearest neighbor search using logic synthesis. DAC 2015: 36:1-36:6 - [c180]Ahmad-Reza Sadeghi, Christian Wachsmann, Michael Waidner
:
Security and privacy challenges in industrial internet of things. DAC 2015: 54:1-54:6 - [c179]Lucas Davi, Matthias Hanreich, Debayan Paul, Ahmad-Reza Sadeghi, Patrick Koeberl, Dean Sullivan, Orlando Arias, Yier Jin
:
HAFIX: hardware-assisted flow integrity extension. DAC 2015: 74:1-74:6 - [c178]Christoph Busold, Stephan Heuser, Jon Rios, Ahmad-Reza Sadeghi, N. Asokan
:
Smart and Secure Cross-Device Apps for the Internet of Advanced Things. Financial Cryptography 2015: 272-290 - [c177]Alexandra Dmitrienko, Stephan Heuser, Thien Duc Nguyen, Marcos da Silva Ramos, Andre Rein
, Ahmad-Reza Sadeghi:
Market-Driven Code Provisioning to Mobile Secure Hardware. Financial Cryptography 2015: 387-404 - [c176]Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Kevin Z. Snow, Fabian Monrose:
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming. NDSS 2015 - [c175]Ebrahim M. Songhori
, Siam U. Hussain, Ahmad-Reza Sadeghi, Thomas Schneider
, Farinaz Koushanfar
:
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits. IEEE Symposium on Security and Privacy 2015: 411-428 - [c174]Felix Schuster, Thomas Tendyck, Christopher Liebchen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz
:
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications. IEEE Symposium on Security and Privacy 2015: 745-762 - [c173]Stephen Crane, Christopher Liebchen, Andrei Homescu, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Stefan Brunthaler
, Michael Franz:
Readactor: Practical Code Randomization Resilient to Memory Disclosure. IEEE Symposium on Security and Privacy 2015: 763-780 - [c172]Marcin Nagy, Thanh Bui
, Emiliano De Cristofaro, N. Asokan
, Jörg Ott, Ahmad-Reza Sadeghi:
How far removed are you?: scalable privacy-preserving estimation of social path length with Social PaL. WISEC 2015: 18:1-18:12 - [i36]Sandeep Tamrakar, Hoang Long Nguyen, Praveen Kumar Pendyala, Andrew Paverd, N. Asokan, Ahmad-Reza Sadeghi:
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices. CoRR abs/1511.02119 (2015) - [i35]Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann:
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs. IACR Cryptol. ePrint Arch. 2015: 148 (2015) - 2014
- [b3]Christian Wachsmann, Ahmad-Reza Sadeghi:
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions. Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers 2014, ISBN 978-3-031-01216-7, pp. 1-91 - [j17]Luigi Catuogno
, Hans Löhr
, Marcel Winandy, Ahmad-Reza Sadeghi:
A trusted versioning file system for passive mobile storage devices. J. Netw. Comput. Appl. 38: 65-75 (2014) - [j16]N. Asokan
, Jan-Erik Ekberg, Kari Kostiainen, Anand Rajan, Carlos V. Rozas, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann:
Mobile Trusted Computing. Proc. IEEE 102(8): 1189-1206 (2014) - [j15]Steffen Schulz, Vijay Varadharajan
, Ahmad-Reza Sadeghi:
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs. IEEE Trans. Inf. Forensics Secur. 9(2): 221-232 (2014) - [c171]Ahmad-Reza Sadeghi, Lucas Davi:
Beasty Memories: The Quest for Practical Defense against Code Reuse Attacks. TrustED@CCS 2014: 23 - [c170]Ferdinand Brasser, Mihai Bucicoiu, Ahmad-Reza Sadeghi:
Swap and Play: Live Updating Hypervisors and Its Application to Xen. CCSW 2014: 33-44 - [c169]Markus Miettinen, Stephan Heuser, Wiebke Kronz, Ahmad-Reza Sadeghi, N. Asokan
:
ConXsense: automated context classification for context-aware access control. AsiaCCS 2014: 293-304 - [c168]Markus Miettinen, N. Asokan
, Thien Duc Nguyen, Ahmad-Reza Sadeghi, Majid Sobhani:
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices. CCS 2014: 880-891 - [c167]Joonho Kong, Farinaz Koushanfar
, Praveen Kumar Pendyala, Ahmad-Reza Sadeghi, Christian Wachsmann:
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs. DAC 2014: 109:1-109:6 - [c166]Lucas Davi, Patrick Koeberl, Ahmad-Reza Sadeghi:
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation. DAC 2014: 133:1-133:6 - [c165]Hossen Asiful Mustafa
, Wenyuan Xu, Ahmad-Reza Sadeghi, Steffen Schulz:
You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks. DSN 2014: 168-179 - [c164]Moreno Ambrosin
, Christoph Busold, Mauro Conti
, Ahmad-Reza Sadeghi, Matthias Schunter:
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks. ESORICS (1) 2014: 76-93 - [c163]Patrick Koeberl, Steffen Schulz, Ahmad-Reza Sadeghi, Vijay Varadharajan
:
TrustLite: a security architecture for tiny embedded devices. EuroSys 2014: 10:1-10:14 - [c162]Alexandra Dmitrienko, David Noack, Ahmad-Reza Sadeghi, Moti Yung:
On Offline Payments with Bitcoin (Poster Abstract). Financial Cryptography Workshops 2014: 159-160 - [c161]Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, Ahmad-Reza Sadeghi:
On the (In)Security of Mobile Two-Factor Authentication. Financial Cryptography 2014: 365-383 - [c160]Marius Senftleben, Mihai Bucicoiu, Erik Tews, Frederik Armknecht
, Stefan Katzenbeisser, Ahmad-Reza Sadeghi:
MoP-2-MoP - Mobile Private Microblogging. Financial Cryptography 2014: 384-396 - [c159]Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose:
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. USENIX Security Symposium 2014: 401-416 - [c158]Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi:
ASM: A Programmable Interface for Extending Android Security. USENIX Security Symposium 2014: 1005-1019 - [p5]Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann:
Physical Security Primitives - A Survey on Physically Unclonable Functions and PUF-Based Security Solutions. Secure Smart Embedded Devices, Platforms and Applications 2014: 429-449 - [e22]Nitesh Saxena, Ahmad-Reza Sadeghi:
Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8651, Springer 2014, ISBN 978-3-319-13065-1 [contents] - [e21]Gabriel Ghinita, Razvan Rughinis, Ahmad-Reza Sadeghi:
2014 International Workshop on Secure Internet of Things, SIoT 2014, Wroclaw, Poland, September 10, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-7907-3 [contents] - [i34]Marcin Nagy, Thanh Bui, Emiliano De Cristofaro, N. Asokan, Jörg Ott, Ahmad-Reza Sadeghi:
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL. CoRR abs/1412.2433 (2014) - 2013
- [b2]N. Asokan, Lucas Vincenzo Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, Ahmad-Reza Sadeghi:
Mobile Platform Security. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2013, ISBN 978-3-031-01213-6 - [j14]Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
:
A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design. J. Comput. Secur. 21(2): 283-315 (2013) - [c157]Sören Bleikertz, Sven Bugiel, Hugo Ideler, Stefan Nürnberger, Ahmad-Reza Sadeghi:
Client-Controlled Cryptography-as-a-Service in the Cloud. ACNS 2013: 19-36 - [c156]N. Asokan
, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider
, Stanislaus Stelle:
CrowdShare: Secure Mobile Resource Sharing. ACNS 2013: 432-440 - [c155]Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan
, Ahmad-Reza Sadeghi:
Do I know you?: efficient and privacy-preserving common friend-finder protocols and applications. ACSAC 2013: 159-168 - [c154]Frederik Armknecht
, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann:
A security framework for the analysis and design of software attestation. CCS 2013: 1-12 - [c153]Tim Werthmann, Ralf Hund, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz
:
PSiOS: bring your own privacy & security to iOS devices. AsiaCCS 2013: 13-24 - [c152]Lucas Vincenzo Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi:
Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM. AsiaCCS 2013: 299-310 - [c151]Arslan Munir
, Farinaz Koushanfar
, Hervé Seudie, Ahmad-Reza Sadeghi:
CyCAR'2013: first international academic workshop on security, privacy and dependability for cybervehicles. CCS 2013: 1481-1482 - [c150]Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann:
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs. CHES 2013: 107-125 - [c149]Christoph Busold, Ahmed Taha, Christian Wachsmann, Alexandra Dmitrienko, Hervé Seudie, Majid Sobhani, Ahmad-Reza Sadeghi:
Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer. CODASPY 2013: 233-242 - [c148]Patrick Koeberl, Ünal Koçabas, Ahmad-Reza Sadeghi:
Memristor PUFs: a new generation of memory-based physically unclonable functions. DATE 2013: 428-431 - [c147]Blaine Stancill, Kevin Z. Snow, Nathan Otterness, Fabian Monrose, Lucas Davi, Ahmad-Reza Sadeghi:
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets. RAID 2013: 62-81 - [c146]Ahmad-Reza Sadeghi:
Mobile security and privacy: the quest for the mighty access control. SACMAT 2013: 1-2 - [c145]Kevin Z. Snow, Fabian Monrose, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Ahmad-Reza Sadeghi:
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization. IEEE Symposium on Security and Privacy 2013: 574-588 - [c144]Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi:
Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies. USENIX Security Symposium 2013: 131-146 - [e20]Ahmad-Reza Sadeghi, Virgil D. Gligor, Moti Yung:
2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013. ACM 2013, ISBN 978-1-4503-2477-9 [contents] - [e19]Ahmad-Reza Sadeghi, Blaine Nelson, Christos Dimitrakakis, Elaine Shi:
AISec'13, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013. ACM 2013, ISBN 978-1-4503-2488-5 [contents] - [e18]Ahmad-Reza Sadeghi, Cliff Wang, Hervé Seudie:
CyCAR'13, Proceedings of the 2013 ACM Workshop on Security, Privacy and Dependability for CyberVehicles, Co-located with CCS 2013, November 4, 2013, Berlin, Germany. ACM 2013, ISBN 978-1-4503-2487-8 [contents] - [e17]Ahmad-Reza Sadeghi, Frederik Armknecht, Jean-Pierre Seifert:
TrustED'13, Proceedings of the 2013 ACM Workshop on Trustworthy Embedded Devices, Co-located with CCS 2013, November 4, 2013, Berlin, Germany. ACM 2013, ISBN 978-1-4503-2486-1 [contents] - [e16]Ahmad-Reza Sadeghi:
Financial Cryptography and Data Security - 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers. Lecture Notes in Computer Science 7859, Springer 2013, ISBN 978-3-642-39883-4 [contents] - [e15]Levente Buttyán, Ahmad-Reza Sadeghi, Marco Gruteser:
Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013. ACM 2013, ISBN 978-1-4503-1998-0 [contents] - [e14]Ahmad-Reza Sadeghi, Sara Foresti:
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, WPES 2013, Berlin, Germany, November 4, 2013. ACM 2013, ISBN 978-1-4503-2485-4 [contents] - [i33]Markus Miettinen, Stephan Heuser, Wiebke Kronz, Ahmad-Reza Sadeghi, N. Asokan:
ConXsense - Context Sensing for Adaptive Usable Access Control. CoRR abs/1308.2903 (2013) - [i32]Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann:
Towards Provably Secure Software Attestation. IACR Cryptol. ePrint Arch. 2013: 83 (2013) - [i31]Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi:
Do I know you? - Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications. IACR Cryptol. ePrint Arch. 2013: 620 (2013) - 2012
- [c143]Stefan Katzenbeisser, Ünal Koçabas, Vladimir Rozic, Ahmad-Reza Sadeghi, Ingrid Verbauwhede
, Christian Wachsmann:
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon. CHES 2012: 283-301 - [c142]Farinaz Koushanfar
, Ahmad-Reza Sadeghi, Hervé Seudie:
EDA for secure and dependable cybercars: challenges and opportunities. DAC 2012: 220-228 - [c141]Amitabh Das, Ünal Koçabas, Ahmad-Reza Sadeghi, Ingrid Verbauwhede
:
PUF-based secure test wrapper design for cryptographic SoC testing. DATE 2012: 866-869 - [c140]Ahmad-Reza Sadeghi, Steffen Schulz, Vijay Varadharajan
:
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs. ESORICS 2012: 253-270 - [c139]Junaid Jameel Ahmad, Shujun Li
, Ahmad-Reza Sadeghi, Thomas Schneider
:
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm. Financial Cryptography 2012: 299-313 - [c138]Franz Ferdinand Peter Brasser, Sven Bugiel, Atanas Filyanov, Ahmad-Reza Sadeghi, Steffen Schulz:
Softer Smartcards - Usable Cryptographic Tokens with Secure Execution. Financial Cryptography 2012: 329-343 - [c137]Anthony Van Herrewege, Stefan Katzenbeisser, Roel Maes
, Roel Peeters
, Ahmad-Reza Sadeghi, Ingrid Verbauwhede
, Christian Wachsmann:
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs. Financial Cryptography 2012: 374-389 - [c136]Thomas Hupperich
, Hans Löhr
, Ahmad-Reza Sadeghi, Marcel Winandy:
Flexible patient-controlled security for electronic health records. IHI 2012: 727-732 - [c135]Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry:
Towards Taming Privilege-Escalation Attacks on Android. NDSS 2012 - [c134]Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi:
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones. NDSS 2012 - [c133]Ünal Koçabas, Andreas Peter, Stefan Katzenbeisser, Ahmad-Reza Sadeghi:
Converse PUF-Based Authentication. TRUST 2012: 142-158 - [c132]Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar, Christian Wachsmann:
SmartTokens: Delegable Access Control with NFC-Enabled Smartphones. TRUST 2012: 219-238 - [c131]Michael C. Grace, Wu Zhou, Xuxian Jiang, Ahmad-Reza Sadeghi:
Unsafe exposure analysis of mobile in-app advertisements. WISEC 2012: 101-112 - [c130]Steffen Schulz, Ahmad-Reza Sadeghi, Maria Zhdanova
, Hossen Asiful Mustafa
, Wenyuan Xu, Vijay Varadharajan
:
Tetherway: a framework for tethering camouflage. WISEC 2012: 149-160 - [e13]Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis:
Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings. Springer 2012, ISBN 978-3-642-35403-8 [contents] - [i30]Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar, Christian Wachsmann:
SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version). IACR Cryptol. ePrint Arch. 2012: 187 (2012) - [i29]Stefan Katzenbeisser, Ünal Koçabas, Vladimir Rozic, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann:
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version). IACR Cryptol. ePrint Arch. 2012: 557 (2012) - 2011
- [j13]Stefan Katzenbeisser, Ünal Koçabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert Jan Schrijen
, Christian Wachsmann:
Recyclable PUFs: logically reconfigurable PUFs. J. Cryptogr. Eng. 1(3): 177-186 (2011) - [j12]Mauro Barni, Pierluigi Failla, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider
:
Privacy-Preserving ECG Classification With Branching Programs and Neural Networks. IEEE Trans. Inf. Forensics Secur. 6(2): 452-468 (2011) - [c129]Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr, Marcel Winandy, Ahmad-Reza Sadeghi:
A Security Architecture for Accessing Health Records on Mobile Phones. HEALTHINF 2011: 87-96 - [c128]Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy:
Securing the Access to Electronic Health Records on Mobile Phones. BIOSTEC (Selected Papers) 2011: 365-379 - [c127]Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy:
ROPdefender: a detection tool to defend against return-oriented programming attacks. AsiaCCS 2011: 40-51 - [c126]Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Ahmad-Reza Sadeghi, Bhargava Shastry:
Practical and lightweight domain isolation on Android. SPSM@CCS 2011: 51-62 - [c125]Sven Bugiel, Stefan Nürnberger, Thomas Pöppelmann, Ahmad-Reza Sadeghi, Thomas Schneider
:
AmazonIA: when elasticity snaps back. CCS 2011: 389-400 - [c124]Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry:
Poster: the quest for security against privilege escalation attacks on android. CCS 2011: 741-744 - [c123]Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi:
Poster: control-flow integrity for smartphones. CCS 2011: 749-752 - [c122]Ünal Koçabas, Ahmad-Reza Sadeghi, Christian Wachsmann, Steffen Schulz:
Poster: practical embedded remote attestation using physically unclonable functions. CCS 2011: 797-800 - [c121]Stefan Katzenbeisser, Ünal Koçabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert Jan Schrijen
, Heike Schröder, Christian Wachsmann:
Recyclable PUFs: Logically Reconfigurable PUFs. CHES 2011: 374-389 - [c120]Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider
:
Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version). Communications and Multimedia Security 2011: 32-44 - [c119]Marc Fischlin, Benny Pinkas, Ahmad-Reza Sadeghi, Thomas Schneider
, Ivan Visconti:
Secure Set Intersection with Untrusted Hardware Tokens. CT-RSA 2011: 1-16 - [c118]Atanas Filyanov, Jonathan M. McCune, Ahmad-Reza Sadeghi, Marcel Winandy:
Uni-directional trusted path: Transaction confirmation on just one device. DSN 2011: 1-12 - [c117]Shujun Li
, Ahmad-Reza Sadeghi, Sören Heisrath, Roland Schmitz, Junaid Jameel Ahmad:
hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers. Financial Cryptography 2011: 235-249 - [c116]Rüdiger Glott, Elmar Husmann, Ahmad-Reza Sadeghi, Matthias Schunter:
Trustworthy Clouds Underpinning the Future Internet. Future Internet Assembly 2011: 209-222 - [c115]Frederik Armknecht
, Daniel Augot, Ludovic Perret, Ahmad-Reza Sadeghi:
On Constructing Homomorphic Encryption Schemes from Coding Theory. IMACC 2011: 23-40 - [c114]Frederik Armknecht
, Roel Maes
, Ahmad-Reza Sadeghi, François-Xavier Standaert
, Christian Wachsmann:
A Formalization of the Security Features of Physical Functions. IEEE Symposium on Security and Privacy 2011: 397-412 - [c113]Steffen Schulz, Ahmad-Reza Sadeghi, Christian Wachsmann:
Short paper: lightweight remote attestation using physical functions. WISEC 2011: 109-114 - [e12]Yan Chen, Shouhuai Xu, Ahmad-Reza Sadeghi, Xinwen Zhang:
Proceedings of the sixth ACM workshop on Scalable trusted computing, STC@CCS 2011, Chicago, Illinois, USA, October 17, 2011. ACM 2011, ISBN 978-1-4503-1001-7 [contents] - [e11]Yan Chen, Stefan Katzenbeisser, Ahmad-Reza Sadeghi:
Proceedings of the 11th ACM Workshop on Digital Rights Management, Chicago, Illinois, USA, October 21, 2011. ACM 2011, ISBN 978-1-4503-1005-5 [contents] - [e10]Jonathan M. McCune, Boris Balacheff, Adrian Perrig, Ahmad-Reza Sadeghi, M. Angela Sasse, Yolanta Beres:
Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings. Lecture Notes in Computer Science 6740, Springer 2011, ISBN 978-3-642-21598-8 [contents] - [i28]Benny Pinkas, Ahmad-Reza Sadeghi, Nigel P. Smart:
Secure Computing in the Cloud (Dagstuhl Seminar 11491). Dagstuhl Reports 1(12): 1-10 (2011) - [i27]Stefan Katzenbeisser, Klaus Kursawe, Bart Preneel, Ahmad-Reza Sadeghi:
Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 11511). Dagstuhl Reports 1(12): 62-68 (2011) - [i26]Liqun Chen, Kurt Dietrich, Hans Löhr
, Ahmad-Reza Sadeghi, Christian Wachsmann, Johannes Winter:
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. IACR Cryptol. ePrint Arch. 2011: 101 (2011) - [i25]Frederik Armknecht, Daniel Augot, Ludovic Perret, Ahmad-Reza Sadeghi:
On Constructing Homomorphic Encryption Schemes from Coding Theory. IACR Cryptol. ePrint Arch. 2011: 309 (2011) - [i24]Stefan Katzenbeisser, Ünal Koçabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert Jan Schrijen, Heike Schröder, Christian Wachsmann:
Recyclable PUFs: Logically Reconfigurable PUFs. IACR Cryptol. ePrint Arch. 2011: 552 (2011) - [i23]Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi, Thomas Schneider:
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm. IACR Cryptol. ePrint Arch. 2011: 679 (2011) - 2010
- [j11]Luigi Catuogno, Hans Löhr
, Mark Manulis, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy:
Trusted virtual domains: Color your network. Datenschutz und Datensicherheit 34(5): 289-294 (2010) - [j10]Mark Manulis
, Ahmad-Reza Sadeghi:
Key agreement for heterogeneous mobile ad-hoc groups. Int. J. Wirel. Mob. Comput. 4(1): 17-30 (2010) - [j9]Serdar Cabuk, Chris I. Dalton, Konrad Eriksson, Dirk Kuhlmann, HariGovind V. Ramasamy, Gianluca Ramunno, Ahmad-Reza Sadeghi, Matthias Schunter, Christian Stüble:
Towards automated security policy enforcement in multi-tenant virtual data centers. J. Comput. Secur. 18(1): 89-121 (2010) - [j8]Frederik Armknecht
, Ahmad-Reza Sadeghi, Alessandra Scafuro, Ivan Visconti, Christian Wachsmann:
Impossibility Results for RFID Privacy Notions. Trans. Comput. Sci. 11: 39-63 (2010) - [c112]Hans Löhr
, Ahmad-Reza Sadeghi, Marcel Winandy:
Patterns for Secure Boot and Secure Storage in Computer Systems. ARES 2010: 569-573 - [c111]Frederik Armknecht
, Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann:
On RFID Privacy with Mutual Authentication and Tag Corruption. ACNS 2010: 493-510 - [c110]Shujun Li
, S. Amier Haider Shah, M. Asad Usman Khan, Syed Ali Khayam, Ahmad-Reza Sadeghi, Roland Schmitz:
Breaking e-banking CAPTCHAs. ACSAC 2010: 171-180 - [c109]Ahmad-Reza Sadeghi:
Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk). CANS 2010: 199-200 - [c108]Wilko Henecka
, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider
, Immo Wehrenberg:
TASTY: tool for automating secure two-party computations. CCS 2010: 451-462 - [c107]Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy:
Return-oriented programming without returns. CCS 2010: 559-572 - [c106]Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
:
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version). CHES 2010: 383-397 - [c105]José Bacelar Almeida
, Endre Bangerter, Manuel Barbosa
, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
:
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols. ESORICS 2010: 151-167 - [c104]Ahmad-Reza Sadeghi, Steffen Schulz:
Extending IPsec for Efficient Remote Attestation. Financial Cryptography Workshops 2010: 150-165 - [c103]Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
:
Embedded SFE: Offloading Server and Network Using Hardware Tokens. Financial Cryptography 2010: 207-221 - [c102]Shujun Li
, Ahmad-Reza Sadeghi, Roland Schmitz:
hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers. Financial Cryptography 2010: 429 - [c101]Shujun Li
, Syed Ali Khayam, Ahmad-Reza Sadeghi, Roland Schmitz:
Breaking Randomized Linear Generation Functions Based Virtual Password System. ICC 2010: 1-6 - [c100]Yali Liu, Dipak Ghosal, Frederik Armknecht
, Ahmad-Reza Sadeghi, Steffen Schulz, Stefan Katzenbeisser:
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic. Information Hiding 2010: 193-207 - [c99]Hans Löhr
, Ahmad-Reza Sadeghi, Marcel Winandy:
Securing the e-health cloud. IHI 2010: 220-229 - [c98]Sven Bugiel, Alexandra Dmitrienko, Kari Kostiainen, Ahmad-Reza Sadeghi, Marcel Winandy:
TruWalletM: Secure Web Authentication on Mobile Platforms. INTRUST 2010: 219-236 - [c97]Christian Wachsmann, Liqun Chen
, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Johannes Winter:
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. ISC 2010: 84-98 - [c96]Yali Liu, Ahmad-Reza Sadeghi, Dipak Ghosal, Biswanath Mukherjee:
Video Streaming Forensic - Content Identification with Traffic Snooping. ISC 2010: 129-135 - [c95]Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy:
Privilege Escalation Attacks on Android. ISC 2010: 346-360 - [c94]Ahmad-Reza Sadeghi, Thomas Schneider:
Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten. perspeGKtive 2010: 11-25 - [c93]Frederik Armknecht
, Liqun Chen
, Ahmad-Reza Sadeghi, Christian Wachsmann:
Anonymous Authentication for RFID Systems. RFIDSec 2010: 158-175 - [c92]Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ekberg, Ahmad-Reza Sadeghi, N. Asokan
:
Key Attestation from Trusted Execution Environments. TRUST 2010: 30-46 - [c91]Emanuele Cesena, Hans Löhr, Gianluca Ramunno, Ahmad-Reza Sadeghi, Davide Vernizzi:
Anonymous Authentication with TLS and DAA. TRUST 2010: 47-62 - [c90]Ahmad-Reza Sadeghi, Thomas Schneider
, Marcel Winandy:
Token-Based Cloud Computing. TRUST 2010: 417-429 - [p4]Frederik Armknecht
, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls:
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. Towards Hardware-Intrinsic Security 2010: 135-164 - [p3]Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann:
Enhancing RFID Security and Privacy by Physically Unclonable Functions. Towards Hardware-Intrinsic Security 2010: 281-305 - [p2]Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
:
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version). Towards Hardware-Intrinsic Security 2010: 367-386 - [e9]Shouhuai Xu, N. Asokan, Ahmad-Reza Sadeghi:
Proceedings of the fifth ACM workshop on Scalable trusted computing, STC@CCS 2010, Chicago, IL, USA, October 4, 2010. ACM 2010, ISBN 978-1-4503-0095-7 [contents] - [e8]Yang Xiang, Pierangela Samarati, Jiankun Hu, Wanlei Zhou, Ahmad-Reza Sadeghi:
Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010. IEEE Computer Society 2010, ISBN 978-1-4244-8484-3 [contents] - [e7]Alessandro Acquisti, Sean W. Smith, Ahmad-Reza Sadeghi:
Trust and Trustworthy Computing, Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings. Lecture Notes in Computer Science 6101, Springer 2010, ISBN 978-3-642-13868-3 [contents] - [e6]Ahmad-Reza Sadeghi, David Naccache:
Towards Hardware-Intrinsic Security - Foundations and Practice. Information Security and Cryptography, Springer 2010, ISBN 978-3-642-14451-6 [contents] - [r1]Ahmad-Reza Sadeghi, Christian Wachsmann:
Trusted Computing. Handbook of Financial Cryptography and Security 2010: 221-256 - [i22]Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider:
From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design. IACR Cryptol. ePrint Arch. 2010: 79 (2010) - [i21]Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider:
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs. IACR Cryptol. ePrint Arch. 2010: 276 (2010) - [i20]José Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider:
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols. IACR Cryptol. ePrint Arch. 2010: 339 (2010) - [i19]Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg:
TASTY: Tool for Automating Secure Two-partY computations. IACR Cryptol. ePrint Arch. 2010: 365 (2010)
2000 – 2009
- 2009
- [c89]Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
:
Practical Secure Evaluation of Semi-private Functions. ACNS 2009: 89-106 - [c88]Shujun Li
, Hassan Jameel Asghar
, Josef Pieprzyk
, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang:
On the Security of PAS (Predicate-Based Authentication Service). ACSAC 2009: 209-218 - [c87]Frederik Armknecht
, Roel Maes
, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls:
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. ASIACRYPT 2009: 685-702 - [c86]Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
:
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. CANS 2009: 1-20 - [c85]Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann:
Anonymizer-Enabled Security and Privacy for RFID. CANS 2009: 134-153 - [c84]Sebastian Gajek, Hans Löhr
, Ahmad-Reza Sadeghi, Marcel Winandy:
TruWallet: trustworthy and migratable wallet-based web authentication. STC 2009: 19-28 - [c83]René Korthaus, Ahmad-Reza Sadeghi, Christian Stüble, Jing Zhan:
A practical property-based bootstrap architecture. STC 2009: 29-38 - [c82]Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy:
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. STC 2009: 49-54 - [c81]Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy:
A Pattern for Secure Graphical User Interface Systems. DEXA Workshops 2009: 186-190 - [c80]Yali Liu, Dipak Ghosal, Frederik Armknecht
, Ahmad-Reza Sadeghi, Steffen Schulz, Stefan Katzenbeisser:
Hide and Seek in Time - Robust Covert Timing Channels. ESORICS 2009: 120-135 - [c79]Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann:
Location Privacy in RFID Applications. Privacy in Location-Based Applications 2009: 127-150 - [c78]Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider
:
Secure Evaluation of Private Linear Branching Programs with Medical Applications. ESORICS 2009: 424-439 - [c77]Endre Bangerter, Thomas Briner, Wilko Henecka
, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
:
Automatic Generation of Sigma-Protocols. EuroPKI 2009: 67-82 - [c76]Klaus Kursawe, Ahmad-Reza Sadeghi, Dries Schellekens, Boris Skoric, Pim Tuyls:
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage. HOST 2009: 22-29 - [c75]Ahmad-Reza Sadeghi, Thomas Schneider
, Immo Wehrenberg:
Efficient Privacy-Preserving Face Recognition. ICISC 2009: 229-244 - [c74]Felix Gröbert, Ahmad-Reza Sadeghi, Marcel Winandy:
Software distribution as a malware infection vector. ICITST 2009: 1-6 - [c73]Luigi Catuogno
, Alexandra Dmitrienko, Konrad Eriksson, Dirk Kuhlmann, Gianluca Ramunno, Ahmad-Reza Sadeghi, Steffen Schulz, Matthias Schunter, Marcel Winandy, Jing Zhan:
Trusted Virtual Domains - Design, Implementation and Lessons Learned. INTRUST 2009: 156-179 - [c72]Hans Löhr, Ahmad-Reza Sadeghi, Claire Vishik, Marcel Winandy:
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing. ISPEC 2009: 396-407 - [c71]Endre Bangerter, Manuel Barbosa
, Daniel J. Bernstein, Ivan Damgård, Daniel Page, Jakob Illeborg Pagter, Ahmad-Reza Sadeghi, Sampo Sovio:
Using Compilers to Enhance Cryptographic Product Development. ISSE 2009: 291-301 - [c70]Ahmad-Reza Sadeghi, Ingrid Verbauwhede
, Claire Vishik:
Future of Assurance: Ensuring that a System is Trustworthy. ISSE 2009: 339-348 - [c69]Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy:
Transparent Mobile Storage Protection in Trusted Virtual Domains. LISA 2009: 159-172 - [c68]Endre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
, Joe-Kai Tsay:
Bringing Zero-Knowledge Proofs of Knowledge to Practice. Security Protocols Workshop 2009: 51-62 - [c67]Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy:
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels. TRUST 2009: 45-62 - [c66]Steffen Schulz, Ahmad-Reza Sadeghi:
Secure VPNs for Trusted Computing Environments. TRUST 2009: 197-216 - [c65]Mauro Barni, Pierluigi Failla, Riccardo Lazzeretti, Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
, Vladimir Kolesnikov:
Efficient privacy-preserving classification of ECG signals. WIFS 2009: 91-95 - [e5]Jorge Guajardo, Bart Preneel, Ahmad-Reza Sadeghi, Pim Tuyls:
Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009. Dagstuhl Seminar Proceedings 09282, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2009 [contents] - [e4]Stefan Katzenbeisser, Ahmad-Reza Sadeghi:
Information Hiding, 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers. Lecture Notes in Computer Science 5806, Springer 2009, ISBN 978-3-642-04430-4 [contents] - [i18]Jorge Guajardo, Bart Preneel, Ahmad-Reza Sadeghi, Pim Tuyls:
09282 Executive Summary - Foundations for Forgery-Resilient Cryptographic Hardware. Foundations for Forgery-Resilient Cryptographic Hardware 2009 - [i17]Jorge Guajardo, Bart Preneel, Pim Tuyls, Ahmad-Reza Sadeghi:
09282 Abstracts Collection - Foundations for Forgery-Resilient Cryptographic Hardware. Foundations for Forgery-Resilient Cryptographic Hardware 2009 - [i16]Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider:
Practical Secure Evaluation of Semi-Private Functions. IACR Cryptol. ePrint Arch. 2009: 124 (2009) - [i15]Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider:
Secure Evaluation of Private Linear Branching Programs with Medical Applications. IACR Cryptol. ePrint Arch. 2009: 195 (2009) - [i14]Endre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, Joe-Kai Tsay:
Bringing Zero-Knowledge Proofs of Knowledge to Practice. IACR Cryptol. ePrint Arch. 2009: 211 (2009) - [i13]Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider:
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. IACR Cryptol. ePrint Arch. 2009: 411 (2009) - [i12]Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang:
On the Security of PAS (Predicate-based Authentication Service). IACR Cryptol. ePrint Arch. 2009: 476 (2009) - [i11]Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg:
Efficient Privacy-Preserving Face Recognition. IACR Cryptol. ePrint Arch. 2009: 507 (2009) - [i10]Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider:
Embedded SFE: Offloading Server and Network using Hardware Tokens. IACR Cryptol. ePrint Arch. 2009: 591 (2009) - 2008
- [c64]Andy Rupp, Gregor Leander
, Endre Bangerter, Alexander W. Dent, Ahmad-Reza Sadeghi:
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems. ASIACRYPT 2008: 489-505 - [c63]Frederik Armknecht
, Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Gianluca Ramunno, Davide Vernizzi:
An efficient implementation of trusted channels based on openssl. STC 2008: 41-50 - [c62]Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Marcel Winandy, Rani Husseiki, Christian Stüble:
Flexible and secure enterprise rights management based on trusted virtual domains. STC 2008: 71-80 - [c61]Sebastian Gajek, Mark Manulis
, Ahmad-Reza Sadeghi, Jörg Schwenk:
Provably secure browser-based user-aware mutual authentication over TLS. AsiaCCS 2008: 300-311 - [c60]Christoph Bösch, Jorge Guajardo, Ahmad-Reza Sadeghi, Jamshid Shokrollahi, Pim Tuyls:
Efficient Helper Data Key Extractor on FPGAs. CHES 2008: 181-197 - [c59]Carlo Blundo, Giuseppe Persiano, Ahmad-Reza Sadeghi, Ivan Visconti:
Improved Security Notions and Protocols for Non-transferable Identification. ESORICS 2008: 364-378 - [c58]Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann:
User Privacy in Transport Systems Based on RFID E-Tickets. PiLBA 2008 - [c57]Ahmad-Reza Sadeghi, Thomas Schneider
:
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification. ICISC 2008: 336-353 - [c56]Frederik Armknecht
, Alberto N. Escalante, Hans Löhr, Mark Manulis
, Ahmad-Reza Sadeghi:
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly. ISPEC 2008: 29-44 - [c55]André Osterhues, Ahmad-Reza Sadeghi, Marko Wolf
, Christian Stüble, N. Asokan
:
Securing Peer-to-Peer Distributions for Mobile Devices. ISPEC 2008: 161-175 - [c54]Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy:
Property-Based TPM Virtualization. ISC 2008: 1-16 - [c53]Endre Bangerter, Maksim Djackov, Ahmad-Reza Sadeghi:
A Demonstrative Ad Hoc Attestation System. ISC 2008: 17-30 - [c52]Liqun Chen
, Hans Löhr, Mark Manulis
, Ahmad-Reza Sadeghi:
Property-Based Attestation without a Trusted Third Party. ISC 2008: 31-46 - [c51]Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk:
Universally Composable Security Analysis of TLS. ProvSec 2008: 313-327 - [c50]Ahmad-Reza Sadeghi:
Trusted Computing - Special Aspects and Challenges. SOFSEM 2008: 98-117 - [e3]Peter Lipp, Ahmad-Reza Sadeghi, Klaus-Michael Koch:
Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings. Lecture Notes in Computer Science 4968, Springer 2008, ISBN 978-3-540-68978-2 [contents] - [e2]Stefan Lucks, Ahmad-Reza Sadeghi, Christopher Wolf:
Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4945, Springer 2008, ISBN 978-3-540-88352-4 [contents] - [i9]Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk:
Universally Composable Security Analysis of TLS - Secure Sessions with Handshake and Record Layer Protocols. IACR Cryptol. ePrint Arch. 2008: 251 (2008) - [i8]Frederik Armknecht, Ahmad-Reza Sadeghi:
A New Approach for Algebraically Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2008: 422 (2008) - [i7]Ahmad-Reza Sadeghi, Thomas Schneider:
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification. IACR Cryptol. ePrint Arch. 2008: 453 (2008) - [i6]Endre Bangerter, Jan Camenisch, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider:
Automatic Generation of Sound Zero-Knowledge Protocols. IACR Cryptol. ePrint Arch. 2008: 471 (2008) - 2007
- [j7]Christof Paar, Ahmad-Reza Sadeghi, Jörg Schwenk, Christoph Wegener:
Studieren mit Sicherheit in Bochum - Die Studiengänge zum Thema IT-Sicherheit. Datenschutz und Datensicherheit 31(5): 338-342 (2007) - [j6]André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi:
Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. Trans. Data Hiding Multim. Secur. 2: 1-34 (2007) - [c49]Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy:
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. ARES 2007: 120-127 - [c48]Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza Sadeghi, Stefan Schulz, Matthias Schunter, Christian Stüble:
Enhancing Grid Security Using Trusted Virtualization. ATC 2007: 372-384 - [c47]Thomas Eisenbarth
, Tim Güneysu
, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, Marko Wolf
:
Reconfigurable trusted computing in hardware. STC 2007: 15-20 - [c46]Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, N. Asokan
:
Beyond secure channels. STC 2007: 30-40 - [c45]Liqun Chen
, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi:
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting. Financial Cryptography 2007: 29-44 - [c44]Thomas Eisenbarth
, Tim Güneysu
, Christof Paar, Ahmad-Reza Sadeghi, Marko Wolf
, Russell Tessier:
Establishing Chain of Trust in Reconfigurable Hardware. FCCM 2007: 289-290 - [c43]Alberto N. Escalante, Hans Löhr
, Ahmad-Reza Sadeghi:
A Non-Sequential Unsplittable Privacy-Protecting Multi-Coupon Scheme. GI Jahrestagung (2) 2007: 184-188 - [c42]Sebastian Gajek, Ahmad-Reza Sadeghi:
A Forensic Framework for Tracing Phishers. FIDIS 2007: 23-35 - [c41]Stefan Katzenbeisser, Boris Skoric, Mehmet Utku Celik
, Ahmad-Reza Sadeghi:
Combining Tardos Fingerprinting Codes and Fingercasting. Information Hiding 2007: 294-310 - [c40]Ahmad-Reza Sadeghi, Marko Wolf
, Christian Stüble, N. Asokan, Jan-Erik Ekberg:
Enabling Fairer Digital Rights Management with Trusted Computing. ISC 2007: 53-70 - [c39]Ahmad-Reza Sadeghi:
The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and Detection. IWDW 2007: 2-18 - [e1]Moti Yung, Aggelos Kiayias, Ahmad-Reza Sadeghi:
Proceedings of the Seventh ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007. ACM 2007, ISBN 978-1-59593-884-8 [contents] - [i5]Andy Rupp
, Gregor Leander, Endre Bangerter, Ahmad-Reza Sadeghi, Alexander W. Dent:
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems. IACR Cryptol. ePrint Arch. 2007: 360 (2007) - 2006
- [j5]André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi:
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data. Trans. Data Hiding Multim. Secur. 1: 73-103 (2006) - [c38]André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi:
Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. ACISP 2006: 136-147 - [c37]Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi:
Physical Security Bounds Against Tampering. ACNS 2006: 253-267 - [c36]Mark Manulis
, Ahmad-Reza Sadeghi:
Property-Based Taming of Lying Mobile Nodes. AINA (2) 2006: 476-480 - [c35]Liqun Chen
, Rainer Landfermann, Hans Löhr
, Markus Rohe, Ahmad-Reza Sadeghi, Christian Stüble:
A protocol for property-based attestation. STC 2006: 7-16 - [c34]Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble, Christian Wachsmann, Marcel Winandy:
TCG inside?: a note on TPM specification compliance. STC 2006: 47-56 - [c33]Ahmad-Reza Sadeghi:
Challenges for Trusted Computing. CHES 2006: 414 - [c32]André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi:
A Computational Model for Watermark Robustness. Information Hiding 2006: 145-160 - [c31]Mark Manulis
, Ahmad-Reza Sadeghi, Jörg Schwenk:
Linkable Democratic Group Signatures. ISPEC 2006: 187-201 - [c30]Ammar Alkassar, Michael Scheibel, Michael Stübel, Ahmad-Reza Sadeghi, Marcel Winandy:
Security Architecture for Device Encryption and VPN. ISSE 2006: 54-63 - [c29]Ulrich Huber, Ahmad-Reza Sadeghi:
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption. ISC 2006: 270-285 - [c28]Dario Carluccio, Kerstin Lemke-Rust, Christof Paar, Ahmad-Reza Sadeghi:
E-Passport: The Global Traceability Or How to Feel Like a UPS Package. WISA 2006: 391-404 - [i4]Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk:
Linkable Democratic Group Signatures. IACR Cryptol. ePrint Arch. 2006: 40 (2006) - 2005
- [j4]Ahmad-Reza Sadeghi, Christian Stüble:
Towards multilaterally secure computing platforms - with open source and trusted computing. Inf. Secur. Tech. Rep. 10(2): 83-95 (2005) - [j3]André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi:
Complementing zero-knowledge watermark detection: Proving properties of embedded information without revealing it. Multim. Syst. 11(2): 143-158 (2005) - [c27]Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahmad-Reza Sadeghi, Christian Stüble:
Secure Data Management in Trusted Computing. CHES 2005: 324-338 - [c26]André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi:
Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme. Communications and Multimedia Security 2005: 129-139 - [c25]André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi:
Towards multilateral secure digital rights distribution infrastructures. Digital Rights Management Workshop 2005: 45-54 - [c24]Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Browser Model for Security Analysis of Browser-Based Protocols. ESORICS 2005: 489-508 - [c23]Liqun Chen
, Matthias Enzmann, Ahmad-Reza Sadeghi, Markus Schneider, Michael Steiner:
A Privacy-Protecting Coupon System. Financial Cryptography 2005: 93-108 - [c22]André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi:
Property-Based Broadcast Encryption for Multi-level Security Policies. ICISC 2005: 15-31 - [c21]Kerstin Lemke, Ahmad-Reza Sadeghi, Christian Stüble:
An Open Approach for Designing Secure Electronic Immobilizers. ISPEC 2005: 230-242 - [c20]André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi:
Secure Software Delivery and Installation in Embedded Systems. ISPEC 2005: 255-267 - [c19]Ahmad-Reza Sadeghi, Christian Stüble:
Towards Multilateral-Secure DRM Platforms. ISPEC 2005: 326-337 - [c18]Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Proving a WS-federation passive requestor profile with a browser model. SWS 2005: 54-64 - [i3]Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Browser Model for Security Analysis of Browser-Based Protocols. IACR Cryptol. ePrint Arch. 2005: 127 (2005) - 2004
- [c17]Oliver Altmeyer, Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble:
Enhancing Security of Computing Platforms with TC-Technology. ISSE 2004: 346-361 - [c16]André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi:
Overcoming the obstacles of zero-knowledge watermark detection. MM&Sec 2004: 46-55 - [c15]Ahmad-Reza Sadeghi, Christian Stüble:
Property-based attestation for computing platforms: caring about properties, not mechanisms. NSPW 2004: 67-77 - 2003
- [b1]Ahmad-Reza Sadeghi:
Secure fingerprinting on sound foundations. Saarland University, Saarbrücken, Germany, 2003, pp. 1-302 - [j2]Dirk Günnewig, Ahmad-Reza Sadeghi, Christian Stüble:
Trusted Computing ohne Nebenwirkungen - Spezifikationen der Trusted Computing Group sinnvoll nutzen. Datenschutz und Datensicherheit 27(9) (2003) - [j1]André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi:
Watermark detection with zero-knowledge disclosure. Multim. Syst. 9(3): 266-278 (2003) - [c14]André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi:
On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving. IWDW 2003: 355-369 - [c13]Ammar Alkassar, Christian Stüble, Ahmad-Reza Sadeghi:
Secure object identification: or: solving the Chess Grandmaster Problem. NSPW 2003: 77-85 - [c12]André Adelsbach, Ahmad-Reza Sadeghi:
Advanced techniques for dispute resolving and authorship proofs on digital works. Security and Watermarking of Multimedia Contents 2003: 677-688 - [c11]Ahmad-Reza Sadeghi, Christian Stüble:
Taming "Trusted Platforms" by Operating System Design. WISA 2003: 286-302 - [p1]Ahmad-Reza Sadeghi, Markus Schneider:
Electronic Payment Systems. Digital Rights Management 2003: 113-137 - 2002
- [c10]Ahmad-Reza Sadeghi, Matthias Schunter, Sandra Steinbrecher:
Private Auctions with Multiple Rounds and Multiple Items. DEXA Workshops 2002: 423-427 - [c9]André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi:
Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure. EUSIPCO 2002: 1-4 - [i2]Ahmad-Reza Sadeghi, Michael Steiner:
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference. IACR Cryptol. ePrint Arch. 2002: 126 (2002) - 2001
- [c8]Ahmad-Reza Sadeghi, Michael Steiner:
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference. EUROCRYPT 2001: 244-261 - [c7]Ammar Alkassar, Alexander Geraldy, Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Optimized Self-Synchronizing Mode of Operation. FSE 2001: 78-91 - [c6]André Adelsbach, Ahmad-Reza Sadeghi:
Zero-Knowledge Watermark Detection and Proof of Ownership. Information Hiding 2001: 273-288 - [c5]Ahmad-Reza Sadeghi:
How to Break a Semi-anonymous Fingerprinting Scheme. Information Hiding 2001: 384-394 - 2000
- [c4]Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Anonymous Fingerprinting with Direct Non-repudiation. ASIACRYPT 2000: 401-414 - [c3]Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Self-Escrowed Cash against User Blackmailing. Financial Cryptography 2000: 42-52 - [i1]Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Anonymous Fingerprinting with Direct Non-Repudiation. IACR Cryptol. ePrint Arch. 2000: 32 (2000)
1990 – 1999
- 1999
- [c2]Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Coin-Based Anonymous Fingerprinting. EUROCRYPT 1999: 150-164 - [c1]André Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Proving Ownership of Digital Content. Information Hiding 1999: 117-133
Coauthor Index
aka: Franz Ferdinand Peter Brasser
aka: Lucas Vincenzo Davi

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-20 20:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint