What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ahmad-Reza Sadeghi
Google Scholar
209
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/host
RLFuzz: Accelerating Hardware Fuzzing with Deep Reinforcement Learning.
Raphael Götz
Christoph Sendner
Nico Ruck
Mohamadreza Rostami
Alexandra Dmitrienko
Ahmad-Reza Sadeghi
2025
conf/ndss
VoiceRadar: Voice Deepfake Detection using Micro-Frequency and Compositional Analysis.
Kavita Kumari
Maryam Abbasihafshejani
Alessandro Pegoraro
Phillip Rieger
Kamyar Arshi
Murtuza Jadliwala
Ahmad-Reza Sadeghi
2025
conf/ndss
SafeSplit: A Novel Defense Against Client-Side Backdoor Attacks in Split Learning.
Phillip Rieger
Alessandro Pegoraro
Kavita Kumari
Tigist Abera
Jonathan Knauer
Ahmad-Reza Sadeghi
2025
conf/uss
LightShed: Defeating Perturbation-based Image Copyright Protections.
Hanna Foerster
Sasha Behrouzi
Phillip Rieger
Murtuza Jadliwala
Ahmad-Reza Sadeghi
2025
conf/uss
GenHuzz: An Efficient Generative Hardware Fuzzer.
Lichao Wu
Mohamadreza Rostami
Huimin Li
Jeyavijayan Rajendran
Ahmad-Reza Sadeghi
2024
conf/ccs
Phantom: Untargeted Poisoning Attacks on Semi-Supervised Learning.
Jonathan Knauer
Phillip Rieger
Hossein Fereidooni
Ahmad-Reza Sadeghi
2024
conf/uss
Orbital Trust and Privacy: SoK on PKI and Location Privacy Challenges in Space Networks.
David Koisser
Richard Mitev
Nikita Yadav
Franziska Vollmer
Ahmad-Reza Sadeghi
2024
conf/uss
Xplain: Analyzing Invisible Correlations in Model Explanation.
Kavita Kumari
Alessandro Pegoraro
Hossein Fereidooni
Ahmad-Reza Sadeghi
2024
conf/uss
WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors.
Pallavi Borkar
Chen Chen
Mohamadreza Rostami
Nikhilesh Singh
Rahul Kande
Ahmad-Reza Sadeghi
Chester Rebeiro
Jeyavijayan Rajendran
2024
conf/uss
DeepEclipse: How to Break White-Box DNN-Watermarking Schemes.
Alessandro Pegoraro
Carlotta Segna
Kavita Kumari
Ahmad-Reza Sadeghi
2024
conf/sp
LayerDBA: Circumventing Similarity-Based Defenses in Federated Learning.
Javor Nikolov
Alessandro Pegoraro
Phillip Rieger
Ahmad-Reza Sadeghi
2024
conf/sp
One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices.
Marco Chilese
Richard Mitev
Meni Orenbach
Robert Thorburn
Ahmad Atamli
Ahmad-Reza Sadeghi
2024
conf/sp
Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users.
David Koisser
Richard Mitev
Marco Chilese
Ahmad-Reza Sadeghi
2024
conf/sp
SoK: A Comprehensive Analysis and Evaluation of Docker Container Attack and Defense Mechanisms.
Md. Sadun Haq
Thien Duc Nguyen
Ali Saman Tosun
Franziska Vollmer
Turgay Korkmaz
Ahmad-Reza Sadeghi
2024
conf/asiaccs
Building Your Own Trusted Execution Environments Using FPGA.
Md. Armanuzzaman
Ahmad-Reza Sadeghi
Ziming Zhao
2024
conf/ndss
CrowdGuard: Federated Backdoor Detection in Federated Learning.
Phillip Rieger
Torsten Krauß
Markus Miettinen
Alexandra Dmitrienko
Ahmad-Reza Sadeghi
2024
conf/ndss
DEMASQ: Unmasking the ChatGPT Wordsmith.
Kavita Kumari
Alessandro Pegoraro
Hossein Fereidooni
Ahmad-Reza Sadeghi
2024
conf/ndss
FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning.
Hossein Fereidooni
Alessandro Pegoraro
Phillip Rieger
Alexandra Dmitrienko
Ahmad-Reza Sadeghi
2023
conf/uss
ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks.
Phillip Rieger
Marco Chilese
Reham Mohamed
Markus Miettinen
Hossein Fereidooni
Ahmad-Reza Sadeghi
2023
conf/uss
HyPFuzz: Formal-Assisted Processor Fuzzing.
Chen Chen
Rahul Kande
Nathan Nguyen
Flemming Andersen
Aakash Tyagi
Ahmad-Reza Sadeghi
Jeyavijayan Rajendran
2023
conf/uss
Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M.
Xhani Marvin Saß
Richard Mitev
Ahmad-Reza Sadeghi
2023
conf/sp
BayBFed: Bayesian Backdoor Defense for Federated Learning.
Kavita Kumari
Phillip Rieger
Hossein Fereidooni
Murtuza Jadliwala
Ahmad-Reza Sadeghi
2023
conf/acns
DMA'n'Play: Practical Remote Attestation Based on Direct Memory Access.
Sebastian Surminski
Christian Niesler
Lucas Davi
Ahmad-Reza Sadeghi
2023
conf/ndss
POSE: Practical Off-chain Smart Contract Execution.
Tommaso Frassetto
Patrick Jauernig
David Koisser
David Kretzler
Benjamin Schlosser
Sebastian Faust
Ahmad-Reza Sadeghi
2023
conf/ndss
DARWIN: Survival of the Fittest Fuzzing Mutators.
Patrick Jauernig
Domagoj Jakobovic
Stjepan Picek
Emmanuel Stapf
Ahmad-Reza Sadeghi
2023
conf/ndss
AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms.
Hossein Fereidooni
Jan König
Phillip Rieger
Marco Chilese
Bora Gökbakan
Moritz Finke
Alexandra Dmitrienko
Ahmad-Reza Sadeghi
2023
conf/ndss
Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning.
Christoph Sendner
Huili Chen
Hossein Fereidooni
Lukas Petzi
Jan König
Jasper Stang
Alexandra Dmitrienko
Ahmad-Reza Sadeghi
Farinaz Koushanfar
2023
conf/acsac
Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats.
Philipp Pütz
Richard Mitev
Markus Miettinen
Ahmad-Reza Sadeghi
2023
conf/acsac
FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks.
Jorge Castillo
Phillip Rieger
Hossein Fereidooni
Qian Chen
Ahmad-Reza Sadeghi
2022
conf/uss
GhostTouch: Targeted Attacks on Touchscreens without Physical Touch.
Kai Wang
Richard Mitev
Chen Yan
Xiaoyu Ji
Ahmad-Reza Sadeghi
Wenyuan Xu
2022
conf/uss
TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities.
Rahul Kande
Addison Crump
Garrett Persyn
Patrick Jauernig
Ahmad-Reza Sadeghi
Aakash Tyagi
Jeyavijayan Rajendran
2022
conf/uss
V'CER: Efficient Certificate Validation in Constrained Networks.
David Koisser
Patrick Jauernig
Gene Tsudik
Ahmad-Reza Sadeghi
2022
conf/uss
FLAME: Taming Backdoors in Federated Learning.
Thien Duc Nguyen
Phillip Rieger
Huili Chen
Hossein Yalame
Helen Möllering
Hossein Fereidooni
Samuel Marchal
Markus Miettinen
Azalia Mirhoseini
Shaza Zeitouni
Farinaz Koushanfar
Ahmad-Reza Sadeghi
Thomas Schneider
2022
conf/sp
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens.
Yan Jiang
Xiaoyu Ji
Kai Wang
Chen Yan
Richard Mitev
Ahmad-Reza Sadeghi
Wenyuan Xu
2022
conf/ndss
FedCRI: Federated Mobile Cyber-Risk Intelligence.
Hossein Fereidooni
Alexandra Dmitrienko
Phillip Rieger
Markus Miettinen
Ahmad-Reza Sadeghi
Felix Madlener
2022
conf/ndss
DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection.
Phillip Rieger
Thien Duc Nguyen
Markus Miettinen
Ahmad-Reza Sadeghi
2022
conf/ndss
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures.
Ghada Dessouky
Emmanuel Stapf
Pouya Mahmoody
Alexander Gruler
Ahmad-Reza Sadeghi
2022
conf/ndss
CFInsight: A Comprehensive Metric for CFI Policies.
Tommaso Frassetto
Patrick Jauernig
David Koisser
Ahmad-Reza Sadeghi
2022
conf/wisec
Wireless and Mobile Security Research and Teaching in the Post-Pandemic World.
Anindya Maiti
Ahmad-Reza Sadeghi
Gabriela Felicia Ciocarlie
Patrick Tague
2021
conf/ccs
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants.
Yanjiao Chen
Yijie Bai
Richard Mitev
Kaibo Wang
Ahmad-Reza Sadeghi
Wenyuan Xu
2021
conf/ccs
RealSWATT: Remote Software-based Attestation for Embedded Devices under Realtime Constraints.
Sebastian Surminski
Christian Niesler
Ferdinand Brasser
Lucas Davi
Ahmad-Reza Sadeghi
2021
conf/uss
CURE: A Security Architecture with CUstomizable and Resilient Enclaves.
Raad Bahmani
Ferdinand Brasser
Ghada Dessouky
Patrick Jauernig
Matthias Klimmek
Ahmad-Reza Sadeghi
Emmanuel Stapf
2021
conf/sp
SAFELearn: Secure Aggregation for private FEderated Learning.
Hossein Fereidooni
Samuel Marchal
Markus Miettinen
Azalia Mirhoseini
Helen Möllering
Thien Duc Nguyen
Phillip Rieger
Ahmad-Reza Sadeghi
Thomas Schneider
Hossein Yalame
Shaza Zeitouni
2021
conf/eurosp
SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities.
Ghada Dessouky
Ahmad-Reza Sadeghi
Shaza Zeitouni
2020
conf/ccs
Long Live Randomization: On Privacy-preserving Contact Tracing in Pandemic.
Thien Duc Nguyen
Markus Miettinen
Ahmad-Reza Sadeghi
2020
conf/uss
V0LTpwn: Attacking x86 Processor Integrity from Software.
Zijo Kenjar
Tommaso Frassetto
David Gens
Michael Franz
Ahmad-Reza Sadeghi
2020
conf/uss
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.
Ghada Dessouky
Tommaso Frassetto
Ahmad-Reza Sadeghi
2020
conf/esorics
LegIoT: Ledgered Trust Management Platform for IoT.
Jens Neureither
Alexandra Dmitrienko
David Koisser
Ferdinand Brasser
Ahmad-Reza Sadeghi
2020
conf/acsac
LeakyPick: IoT Audio Spy Detector.
Richard Mitev
Anna Pazii
Markus Miettinen
William Enck
Ahmad-Reza Sadeghi
2020
conf/wisec
Peek-a-boo: i see your smart home activities, even encrypted!
Abbas Acar
Hossein Fereidooni
Tigist Abera
Amit Kumar Sikder
Markus Miettinen
Hidayet Aksu
Mauro Conti
Ahmad-Reza Sadeghi
A. Selcuk Uluagac
2019
conf/ccs
Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants.
Richard Mitev
Markus Miettinen
Ahmad-Reza Sadeghi
2019
conf/ccs
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
Carsten Bock
Ferdinand Brasser
David Gens
Christopher Liebchen
Ahmad-Reza Sadeghi
2019
conf/uss
HardFails: Insights into Software-Exploitable Hardware Bugs.
Ghada Dessouky
David Gens
Patrick Haney
Garrett Persyn
Arun K. Kanuparthi
Hareesh Khattri
Jason M. Fung
Ahmad-Reza Sadeghi
Jeyavijayan Rajendran
2019
conf/uss
FastKitten: Practical Smart Contracts on Bitcoin.
Poulami Das
Lisa Eckey
Tommaso Frassetto
David Gens
Kristina Hostáková
Patrick Jauernig
Sebastian Faust
Ahmad-Reza Sadeghi
2019
conf/fc
HEALED: HEaling & Attestation for Low-End Embedded Devices.
Ahmad Ibrahim
Ahmad-Reza Sadeghi
Gene Tsudik
2019
conf/ndss
NAUTILUS: Fishing for Deep Bugs with Grammars.
Cornelius Aschermann
Tommaso Frassetto
Thorsten Holz
Patrick Jauernig
Ahmad-Reza Sadeghi
Daniel Teuchert
2019
conf/ndss
SANCTUARY: ARMing TrustZone with User-space Enclaves.
Ferdinand Brasser
David Gens
Patrick Jauernig
Ahmad-Reza Sadeghi
Emmanuel Stapf
2019
conf/ndss
DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems.
Tigist Abera
Raad Bahmani
Ferdinand Brasser
Ahmad Ibrahim
Ahmad-Reza Sadeghi
Matthias Schunter
2019
conf/ndss
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V.
Samuel Weiser
Mario Werner
Ferdinand Brasser
Maja Malenko
Stefan Mangard
Ahmad-Reza Sadeghi
2019
conf/acsac
DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization.
Ferdinand Brasser
Srdjan Capkun
Alexandra Dmitrienko
Tommaso Frassetto
Kari Kostiainen
Ahmad-Reza Sadeghi
2019
conf/wisec
HomeSnitch: behavior transparency and control for smart home IoT devices.
T. J. OConnor
Reham Mohamed
Markus Miettinen
William Enck
Bradley Reaves
Ahmad-Reza Sadeghi
2018
conf/ccs
iOracle: Automated Evaluation of Access Control Policies in iOS.
Luke Deshotels
Razvan Deaconescu
Costin Carabas
Iulia Manda
William Enck
Mihai Chiroiu
Ninghui Li
Ahmad-Reza Sadeghi
2018
conf/uss
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
Andrea Biondo
Mauro Conti
Lucas Davi
Tommaso Frassetto
Ahmad-Reza Sadeghi
2018
conf/uss
IMIX: In-Process Memory Isolation EXtension.
Tommaso Frassetto
Patrick Jauernig
Christopher Liebchen
Ahmad-Reza Sadeghi
2018
conf/esorics
SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices.
Moreno Ambrosin
Mauro Conti
Ahmad Ibrahim
Ahmad-Reza Sadeghi
Matthias Schunter
2018
conf/ndss
K-Miner: Uncovering Memory Corruption in Linux.
David Gens
Simon Schmitt
Lucas Davi
Ahmad-Reza Sadeghi
2017
journals/popets
Toward Practical Secure Stable Matching.
M. Sadegh Riazi
Ebrahim M. Songhori
Ahmad-Reza Sadeghi
Thomas Schneider
Farinaz Koushanfar
2017
journals/popets
Phonion: Practical Protection of Metadata in Telephony Networks.
Stephan Heuser
Bradley Reaves
Praveen Kumar Pendyala
Henry Carter
Alexandra Dmitrienko
William Enck
Negar Kiyavash
Ahmad-Reza Sadeghi
Patrick Traynor
2017
conf/ccs
Moving Targets vs. Moving Adversaries: On the Effectiveness of System Randomization.
Ahmad-Reza Sadeghi
2017
conf/ccs
JITGuard: Hardening Just-in-time Compilers with SGX.
Tommaso Frassetto
David Gens
Christopher Liebchen
Ahmad-Reza Sadeghi
2017
conf/ccs
Hardware-Assisted Security: Promises, Pitfalls and Opportunities.
Ahmad-Reza Sadeghi
2017
conf/uss
CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
Ferdinand Brasser
Lucas Davi
David Gens
Christopher Liebchen
Ahmad-Reza Sadeghi
2017
conf/fc
Secure Multiparty Computation from SGX.
Raad Bahmani
Manuel Barbosa
Ferdinand Brasser
Bernardo Portela
Ahmad-Reza Sadeghi
Guillaume Scerri
Bogdan Warinschi
2017
conf/ndss
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
Robert Rudd
Richard Skowyra
David Bigelow
Veer Dedhia
Thomas Hobson
Stephen Crane
Christopher Liebchen
Per Larsen
Lucas Davi
Michael Franz
Ahmad-Reza Sadeghi
Hamed Okhravi
2017
conf/ndss
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
Ghada Dessouky
Farinaz Koushanfar
Ahmad-Reza Sadeghi
Thomas Schneider
Shaza Zeitouni
Michael Zohner
2017
conf/ndss
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
Luis Garcia
Ferdinand Brasser
Mehmet Hazar Cintuglu
Ahmad-Reza Sadeghi
Osama A. Mohammed
Saman A. Zonouz
2017
conf/ndss
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
Lucas Davi
David Gens
Christopher Liebchen
Ahmad-Reza Sadeghi
2017
conf/wisec
SeED: secure non-interactive attestation for embedded devices.
Ahmad Ibrahim
Ahmad-Reza Sadeghi
Shaza Zeitouni
2016
journals/tifs
Remanence Decay Side-Channel: The PUF Case.
Shaza Zeitouni
Yossef Oren
Christian Wachsmann
Patrick Koeberl
Ahmad-Reza Sadeghi
2016
journals/popets
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
Mauro Conti
Stephen Crane
Tommaso Frassetto
Andrei Homescu
Georg Koppen
Per Larsen
Christopher Liebchen
Mike Perry
Ahmad-Reza Sadeghi
2016
conf/ccs
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
Luke Deshotels
Razvan Deaconescu
Mihai Chiroiu
Lucas Davi
William Enck
Ahmad-Reza Sadeghi
2016
conf/ccs
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
Tigist Abera
N. Asokan
Lucas Davi
Jan-Erik Ekberg
Thomas Nyman
Andrew Paverd
Ahmad-Reza Sadeghi
Gene Tsudik
2016
conf/ccs
SANA: Secure and Scalable Aggregate Network Attestation.
Moreno Ambrosin
Mauro Conti
Ahmad Ibrahim
Gregory Neven
Ahmad-Reza Sadeghi
Matthias Schunter
2016
conf/fc
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper).
Stephan Heuser
Marco Negro
Praveen Kumar Pendyala
Ahmad-Reza Sadeghi
2016
conf/host
CryptoML: Secure outsourcing of big data machine learning applications.
Azalia Mirhoseini
Ahmad-Reza Sadeghi
Farinaz Koushanfar
2016
conf/ndss
Leakage-Resilient Layout Randomization for Mobile Devices.
Kjell Braden
Lucas Davi
Christopher Liebchen
Ahmad-Reza Sadeghi
Stephen Crane
Michael Franz
Per Larsen
2016
conf/ctrsa
Towards a Unified Security Model for Physically Unclonable Functions.
Frederik Armknecht
Daisuke Moriyama
Ahmad-Reza Sadeghi
Moti Yung
2016
conf/wisec
DARPA: Device Attestation Resilient to Physical Attacks.
Ahmad Ibrahim
Ahmad-Reza Sadeghi
Gene Tsudik
Shaza Zeitouni
2016
conf/wisec
POSTER: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
Markus Miettinen
Jialin Huang
Thien Duc Nguyen
N. Asokan
Ahmad-Reza Sadeghi
2016
conf/wisec
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
Ghada Dessouky
Ahmad-Reza Sadeghi
2016
conf/wisec
POSTER: Toward a Secure and Scalable Attestation.
Moreno Ambrosin
Mauro Conti
Ahmad Ibrahim
Gregory Neven
Ahmad-Reza Sadeghi
Matthias Schunter
2015
conf/ccs
It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks.
Stephen J. Crane
Stijn Volckaert
Felix Schuster
Christopher Liebchen
Per Larsen
Lucas Davi
Ahmad-Reza Sadeghi
Thorsten Holz
Bjorn De Sutter
Michael Franz
2015
conf/ccs
I Know Where You are: Proofs of Presence Resilient to Malicious Provers.
Markus Miettinen
N. Asokan
Farinaz Koushanfar
Thien Duc Nguyen
Jon Rios
Ahmad-Reza Sadeghi
Majid Sobhani
Sudha Yellapantula
2015
conf/ccs
Automated Synthesis of Optimized Circuits for Secure Computation.
Daniel Demmler
Ghada Dessouky
Farinaz Koushanfar
Ahmad-Reza Sadeghi
Thomas Schneider
Shaza Zeitouni
2015
conf/ccs
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
Mauro Conti
Stephen Crane
Lucas Davi
Michael Franz
Per Larsen
Marco Negro
Christopher Liebchen
Mohaned Qunaibit
Ahmad-Reza Sadeghi
2015
conf/ccs
XiOS: Extended Application Sandboxing on iOS.
Mihai Bucicoiu
Lucas Davi
Razvan Deaconescu
Ahmad-Reza Sadeghi
2015
conf/ccs
SEDA: Scalable Embedded Device Attestation.
N. Asokan
Ferdinand Brasser
Ahmad Ibrahim
Ahmad-Reza Sadeghi
Matthias Schunter
Gene Tsudik
Christian Wachsmann
2015
conf/ccs
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future?
Ahmad-Reza Sadeghi
Lucas Davi
Per Larsen
2015
conf/fc
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
Christoph Busold
Stephan Heuser
Jon Rios
Ahmad-Reza Sadeghi
N. Asokan
2015
conf/fc
Market-Driven Code Provisioning to Mobile Secure Hardware.
Alexandra Dmitrienko
Stephan Heuser
Thien Duc Nguyen
Marcos da Silva Ramos
Andre Rein
Ahmad-Reza Sadeghi
2015
conf/sp
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
Ebrahim M. Songhori
Siam U. Hussain
Ahmad-Reza Sadeghi
Thomas Schneider
Farinaz Koushanfar
2015
conf/sp
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
Stephen Crane
Christopher Liebchen
Andrei Homescu
Lucas Davi
Per Larsen
Ahmad-Reza Sadeghi
Stefan Brunthaler
Michael Franz
2015
conf/sp
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
Felix Schuster
Thomas Tendyck
Christopher Liebchen
Lucas Davi
Ahmad-Reza Sadeghi
Thorsten Holz
2015
conf/ndss
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
Lucas Davi
Christopher Liebchen
Ahmad-Reza Sadeghi
Kevin Z. Snow
Fabian Monrose
2015
conf/wisec
How far removed are you?: scalable privacy-preserving estimation of social path length with Social PaL.
Marcin Nagy
Thanh Bui
Emiliano De Cristofaro
N. Asokan
Jörg Ott
Ahmad-Reza Sadeghi
2014
journals/tifs
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
Steffen Schulz
Vijay Varadharajan
Ahmad-Reza Sadeghi
2014
conf/ccs
Beasty Memories: The Quest for Practical Defense against Code Reuse Attacks.
Ahmad-Reza Sadeghi
Lucas Davi
2014
conf/ccs
Swap and Play: Live Updating Hypervisors and Its Application to Xen.
Ferdinand Brasser
Mihai Bucicoiu
Ahmad-Reza Sadeghi
2014
conf/ccs
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
Markus Miettinen
N. Asokan
Thien Duc Nguyen
Ahmad-Reza Sadeghi
Majid Sobhani
2014
conf/ccs
ConXsense: automated context classification for context-aware access control.
Markus Miettinen
Stephan Heuser
Wiebke Kronz
Ahmad-Reza Sadeghi
N. Asokan
2014
conf/uss
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Lucas Davi
Ahmad-Reza Sadeghi
Daniel Lehmann
Fabian Monrose
2014
conf/uss
ASM: A Programmable Interface for Extending Android Security.
Stephan Heuser
Adwait Nadkarni
William Enck
Ahmad-Reza Sadeghi
2014
conf/fc
On the (In)Security of Mobile Two-Factor Authentication.
Alexandra Dmitrienko
Christopher Liebchen
Christian Rossow
Ahmad-Reza Sadeghi
2014
conf/fc
On Offline Payments with Bitcoin (Poster Abstract).
Alexandra Dmitrienko
David Noack
Ahmad-Reza Sadeghi
Moti Yung
2014
conf/fc
MoP-2-MoP - Mobile Private Microblogging.
Marius Senftleben
Mihai Bucicoiu
Erik Tews
Frederik Armknecht
Stefan Katzenbeisser
Ahmad-Reza Sadeghi
2014
conf/esorics
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks.
Moreno Ambrosin
Christoph Busold
Mauro Conti
Ahmad-Reza Sadeghi
Matthias Schunter
2014
conf/dsn
You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks.
Hossen Asiful Mustafa
Wenyuan Xu
Ahmad-Reza Sadeghi
Steffen Schulz
2013
conf/ccs
PSiOS: bring your own privacy & security to iOS devices.
Tim Werthmann
Ralf Hund
Lucas Davi
Ahmad-Reza Sadeghi
Thorsten Holz
2013
conf/ccs
Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM.
Lucas Vincenzo Davi
Alexandra Dmitrienko
Stefan Nürnberger
Ahmad-Reza Sadeghi
2013
conf/ccs
CyCAR'2013: first international academic workshop on security, privacy and dependability for cybervehicles.
Arslan Munir
Farinaz Koushanfar
Hervé Seudie
Ahmad-Reza Sadeghi
2013
conf/ccs
A security framework for the analysis and design of software attestation.
Frederik Armknecht
Ahmad-Reza Sadeghi
Steffen Schulz
Christian Wachsmann
2013
conf/uss
Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
Sven Bugiel
Stephan Heuser
Ahmad-Reza Sadeghi
2013
conf/sp
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization.
Kevin Z. Snow
Fabian Monrose
Lucas Davi
Alexandra Dmitrienko
Christopher Liebchen
Ahmad-Reza Sadeghi
2013
conf/acns
Client-Controlled Cryptography-as-a-Service in the Cloud.
Sören Bleikertz
Sven Bugiel
Hugo Ideler
Stefan Nürnberger
Ahmad-Reza Sadeghi
2013
conf/acns
CrowdShare: Secure Mobile Resource Sharing.
N. Asokan
Alexandra Dmitrienko
Marcin Nagy
Elena Reshetova
Ahmad-Reza Sadeghi
Thomas Schneider
Stanislaus Stelle
2013
conf/ches
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs.
Yossef Oren
Ahmad-Reza Sadeghi
Christian Wachsmann
2013
conf/acsac
Do I know you?: efficient and privacy-preserving common friend-finder protocols and applications.
Marcin Nagy
Emiliano De Cristofaro
Alexandra Dmitrienko
N. Asokan
Ahmad-Reza Sadeghi
2012
conf/fc
Softer Smartcards - Usable Cryptographic Tokens with Secure Execution.
Franz Ferdinand Peter Brasser
Sven Bugiel
Atanas Filyanov
Ahmad-Reza Sadeghi
Steffen Schulz
2012
conf/fc
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs.
Anthony Van Herrewege
Stefan Katzenbeisser
Roel Maes
Roel Peeters
Ahmad-Reza Sadeghi
Ingrid Verbauwhede
Christian Wachsmann
2012
conf/fc
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
Junaid Jameel Ahmad
Shujun Li
Ahmad-Reza Sadeghi
Thomas Schneider
2012
conf/esorics
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
Ahmad-Reza Sadeghi
Steffen Schulz
Vijay Varadharajan
2012
conf/ches
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
Stefan Katzenbeisser
Ünal Koçabas
Vladimir Rozic
Ahmad-Reza Sadeghi
Ingrid Verbauwhede
Christian Wachsmann
2012
conf/ndss
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
Lucas Davi
Alexandra Dmitrienko
Manuel Egele
Thomas Fischer
Thorsten Holz
Ralf Hund
Stefan Nürnberger
Ahmad-Reza Sadeghi
2012
conf/ndss
Towards Taming Privilege-Escalation Attacks on Android.
Sven Bugiel
Lucas Davi
Alexandra Dmitrienko
Thomas Fischer
Ahmad-Reza Sadeghi
Bhargava Shastry
2012
conf/wisec
Tetherway: a framework for tethering camouflage.
Steffen Schulz
Ahmad-Reza Sadeghi
Maria Zhdanova
Hossen Asiful Mustafa
Wenyuan Xu
Vijay Varadharajan
2012
conf/wisec
Unsafe exposure analysis of mobile in-app advertisements.
Michael C. Grace
Wu Zhou
Xuxian Jiang
Ahmad-Reza Sadeghi
2011
journals/tifs
Privacy-Preserving ECG Classification With Branching Programs and Neural Networks.
Mauro Barni
Pierluigi Failla
Riccardo Lazzeretti
Ahmad-Reza Sadeghi
Thomas Schneider
2011
conf/ccs
ROPdefender: a detection tool to defend against return-oriented programming attacks.
Lucas Davi
Ahmad-Reza Sadeghi
Marcel Winandy
2011
conf/ccs
Practical and lightweight domain isolation on Android.
Sven Bugiel
Lucas Davi
Alexandra Dmitrienko
Stephan Heuser
Ahmad-Reza Sadeghi
Bhargava Shastry
2011
conf/ccs
Poster: the quest for security against privilege escalation attacks on android.
Sven Bugiel
Lucas Davi
Alexandra Dmitrienko
Thomas Fischer
Ahmad-Reza Sadeghi
Bhargava Shastry
2011
conf/ccs
Poster: practical embedded remote attestation using physically unclonable functions.
Ünal Koçabas
Ahmad-Reza Sadeghi
Christian Wachsmann
Steffen Schulz
2011
conf/ccs
AmazonIA: when elasticity snaps back.
Sven Bugiel
Stefan Nürnberger
Thomas Pöppelmann
Ahmad-Reza Sadeghi
Thomas Schneider
2011
conf/ccs
Poster: control-flow integrity for smartphones.
Lucas Davi
Alexandra Dmitrienko
Manuel Egele
Thomas Fischer
Thorsten Holz
Ralf Hund
Stefan Nürnberger
Ahmad-Reza Sadeghi
2011
conf/fc
hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers.
Shujun Li
Ahmad-Reza Sadeghi
Sören Heisrath
Roland Schmitz
Junaid Jameel Ahmad
2011
conf/sp
A Formalization of the Security Features of Physical Functions.
Frederik Armknecht
Roel Maes
Ahmad-Reza Sadeghi
François-Xavier Standaert
Christian Wachsmann
2011
conf/ches
Recyclable PUFs: Logically Reconfigurable PUFs.
Stefan Katzenbeisser
Ünal Koçabas
Vincent van der Leest
Ahmad-Reza Sadeghi
Geert Jan Schrijen
Heike Schröder
Christian Wachsmann
2011
conf/dsn
Uni-directional trusted path: Transaction confirmation on just one device.
Atanas Filyanov
Jonathan M. McCune
Ahmad-Reza Sadeghi
Marcel Winandy
2011
conf/ctrsa
Secure Set Intersection with Untrusted Hardware Tokens.
Marc Fischlin
Benny Pinkas
Ahmad-Reza Sadeghi
Thomas Schneider
Ivan Visconti
2011
conf/wisec
Short paper: lightweight remote attestation using physical functions.
Steffen Schulz
Ahmad-Reza Sadeghi
Christian Wachsmann
2010
conf/ccs
TASTY: tool for automating secure two-party computations.
Wilko Henecka
Stefan Kögl
Ahmad-Reza Sadeghi
Thomas Schneider
Immo Wehrenberg
2010
conf/ccs
Return-oriented programming without returns.
Stephen Checkoway
Lucas Davi
Alexandra Dmitrienko
Ahmad-Reza Sadeghi
Hovav Shacham
Marcel Winandy
2010
conf/fc
Embedded SFE: Offloading Server and Network Using Hardware Tokens.
Kimmo Järvinen
Vladimir Kolesnikov
Ahmad-Reza Sadeghi
Thomas Schneider
2010
conf/fc
Extending IPsec for Efficient Remote Attestation.
Ahmad-Reza Sadeghi
Steffen Schulz
2010
conf/fc
hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers.
Shujun Li
Ahmad-Reza Sadeghi
Roland Schmitz
2010
conf/acns
On RFID Privacy with Mutual Authentication and Tag Corruption.
Frederik Armknecht
Ahmad-Reza Sadeghi
Ivan Visconti
Christian Wachsmann
2010
conf/ih
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Yali Liu
Dipak Ghosal
Frederik Armknecht
Ahmad-Reza Sadeghi
Steffen Schulz
Stefan Katzenbeisser
2010
conf/esorics
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
José Bacelar Almeida
Endre Bangerter
Manuel Barbosa
Stephan Krenn
Ahmad-Reza Sadeghi
Thomas Schneider
2010
conf/ches
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version).
Kimmo Järvinen
Vladimir Kolesnikov
Ahmad-Reza Sadeghi
Thomas Schneider
2010
conf/acsac
Breaking e-banking CAPTCHAs.
Shujun Li
S. Amier Haider Shah
M. Asad Usman Khan
Syed Ali Khayam
Ahmad-Reza Sadeghi
Roland Schmitz
2010
conf/cans
Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk).
Ahmad-Reza Sadeghi
2009
conf/ccs
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
Lucas Davi
Ahmad-Reza Sadeghi
Marcel Winandy
2009
conf/ccs
TruWallet: trustworthy and migratable wallet-based web authentication.
Sebastian Gajek
Hans Löhr
Ahmad-Reza Sadeghi
Marcel Winandy
2009
conf/ccs
A practical property-based bootstrap architecture.
René Korthaus
Ahmad-Reza Sadeghi
Christian Stüble
Jing Zhan
2009
conf/acns
Practical Secure Evaluation of Semi-private Functions.
Annika Paus
Ahmad-Reza Sadeghi
Thomas Schneider
2009
conf/icisc
Efficient Privacy-Preserving Face Recognition.
Ahmad-Reza Sadeghi
Thomas Schneider
Immo Wehrenberg
2009
conf/esorics
Hide and Seek in Time - Robust Covert Timing Channels.
Yali Liu
Dipak Ghosal
Frederik Armknecht
Ahmad-Reza Sadeghi
Steffen Schulz
Stefan Katzenbeisser
2009
conf/esorics
Location Privacy in RFID Applications.
Ahmad-Reza Sadeghi
Ivan Visconti
Christian Wachsmann
2009
conf/esorics
Secure Evaluation of Private Linear Branching Programs with Medical Applications.
Mauro Barni
Pierluigi Failla
Vladimir Kolesnikov
Riccardo Lazzeretti
Ahmad-Reza Sadeghi
Thomas Schneider
2009
conf/host
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage.
Klaus Kursawe
Ahmad-Reza Sadeghi
Dries Schellekens
Boris Skoric
Pim Tuyls
2009
conf/asiacrypt
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions.
Frederik Armknecht
Roel Maes
Ahmad-Reza Sadeghi
Berk Sunar
Pim Tuyls
2009
conf/acsac
On the Security of PAS (Predicate-Based Authentication Service).
Shujun Li
Hassan Jameel Asghar
Josef Pieprzyk
Ahmad-Reza Sadeghi
Roland Schmitz
Huaxiong Wang
2009
conf/cans
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
Vladimir Kolesnikov
Ahmad-Reza Sadeghi
Thomas Schneider
2009
conf/cans
Anonymizer-Enabled Security and Privacy for RFID.
Ahmad-Reza Sadeghi
Ivan Visconti
Christian Wachsmann
2008
conf/ccs
Flexible and secure enterprise rights management based on trusted virtual domains.
Yacine Gasmi
Ahmad-Reza Sadeghi
Patrick Stewin
Martin Unger
Marcel Winandy
Rani Husseiki
Christian Stüble
2008
conf/ccs
An efficient implementation of trusted channels based on openssl.
Frederik Armknecht
Yacine Gasmi
Ahmad-Reza Sadeghi
Patrick Stewin
Martin Unger
Gianluca Ramunno
Davide Vernizzi
2008
conf/ccs
Provably secure browser-based user-aware mutual authentication over TLS.
Sebastian Gajek
Mark Manulis
Ahmad-Reza Sadeghi
Jörg Schwenk
2008
conf/icisc
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.
Ahmad-Reza Sadeghi
Thomas Schneider
2008
conf/provsec
Universally Composable Security Analysis of TLS.
Sebastian Gajek
Mark Manulis
Olivier Pereira
Ahmad-Reza Sadeghi
Jörg Schwenk
2008
conf/esorics
Improved Security Notions and Protocols for Non-transferable Identification.
Carlo Blundo
Giuseppe Persiano
Ahmad-Reza Sadeghi
Ivan Visconti
2008
conf/esorics
User Privacy in Transport Systems Based on RFID E-Tickets.
Ahmad-Reza Sadeghi
Ivan Visconti
Christian Wachsmann
2008
conf/ches
Efficient Helper Data Key Extractor on FPGAs.
Christoph Bösch
Jorge Guajardo
Ahmad-Reza Sadeghi
Jamshid Shokrollahi
Pim Tuyls
2008
conf/asiacrypt
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
Andy Rupp
Gregor Leander
Endre Bangerter
Alexander W. Dent
Ahmad-Reza Sadeghi
2007
conf/ccs
Beyond secure channels.
Yacine Gasmi
Ahmad-Reza Sadeghi
Patrick Stewin
Martin Unger
N. Asokan
2007
conf/ccs
Reconfigurable trusted computing in hardware.
Thomas Eisenbarth
Tim Güneysu
Christof Paar
Ahmad-Reza Sadeghi
Dries Schellekens
Marko Wolf
2007
conf/fc
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting.
Liqun Chen
Alberto N. Escalante
Hans Löhr
Mark Manulis
Ahmad-Reza Sadeghi
2007
conf/ih
Combining Tardos Fingerprinting Codes and Fingercasting.
Stefan Katzenbeisser
Boris Skoric
Mehmet Utku Celik
Ahmad-Reza Sadeghi
2006
conf/ccs
A protocol for property-based attestation.
Liqun Chen
Rainer Landfermann
Hans Löhr
Markus Rohe
Ahmad-Reza Sadeghi
Christian Stüble
2006
conf/ccs
TCG inside?: a note on TPM specification compliance.
Ahmad-Reza Sadeghi
Marcel Selhorst
Christian Stüble
Christian Wachsmann
Marcel Winandy
2006
conf/acisp
Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages.
André Adelsbach
Ulrich Huber
Ahmad-Reza Sadeghi
2006
conf/acns
Physical Security Bounds Against Tampering.
Kerstin Lemke
Christof Paar
Ahmad-Reza Sadeghi
2006
conf/ih
A Computational Model for Watermark Robustness.
André Adelsbach
Stefan Katzenbeisser
Ahmad-Reza Sadeghi
2006
conf/ches
Challenges for Trusted Computing.
Ahmad-Reza Sadeghi
2006
conf/wisa
E-Passport: The Global Traceability Or How to Feel Like a UPS Package.
Dario Carluccio
Kerstin Lemke-Rust
Christof Paar
Ahmad-Reza Sadeghi
2005
journals/istr
Towards multilaterally secure computing platforms - with open source and trusted computing.
Ahmad-Reza Sadeghi
Christian Stüble
2005
conf/fc
A Privacy-Protecting Coupon System.
Liqun Chen
Matthias Enzmann
Ahmad-Reza Sadeghi
Markus Schneider
Michael Steiner
2005
conf/icisc
Property-Based Broadcast Encryption for Multi-level Security Policies.
André Adelsbach
Ulrich Huber
Ahmad-Reza Sadeghi
2005
conf/esorics
Browser Model for Security Analysis of Browser-Based Protocols.
Thomas Groß
Birgit Pfitzmann
Ahmad-Reza Sadeghi
2005
conf/ches
Secure Data Management in Trusted Computing.
Ulrich Kühn
Klaus Kursawe
Stefan Lucks
Ahmad-Reza Sadeghi
Christian Stüble
2004
conf/nspw
Property-based attestation for computing platforms: caring about properties, not mechanisms.
Ahmad-Reza Sadeghi
Christian Stüble
2003
conf/nspw
Secure object identification: or: solving the Chess Grandmaster Problem.
Ammar Alkassar
Christian Stüble
Ahmad-Reza Sadeghi
2003
conf/wisa
Taming "Trusted Platforms" by Operating System Design.
Ahmad-Reza Sadeghi
Christian Stüble
2001
conf/fse
Optimized Self-Synchronizing Mode of Operation.
Ammar Alkassar
Alexander Geraldy
Birgit Pfitzmann
Ahmad-Reza Sadeghi
2001
conf/ih
How to Break a Semi-anonymous Fingerprinting Scheme.
Ahmad-Reza Sadeghi
2001
conf/ih
Zero-Knowledge Watermark Detection and Proof of Ownership.
André Adelsbach
Ahmad-Reza Sadeghi
2001
conf/eurocrypt
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference.
Ahmad-Reza Sadeghi
Michael Steiner
2000
conf/fc
Self-Escrowed Cash against User Blackmailing.
Birgit Pfitzmann
Ahmad-Reza Sadeghi
2000
conf/asiacrypt
Anonymous Fingerprinting with Direct Non-repudiation.
Birgit Pfitzmann
Ahmad-Reza Sadeghi
1999
conf/ih
Proving Ownership of Digital Content.
André Adelsbach
Birgit Pfitzmann
Ahmad-Reza Sadeghi
1999
conf/eurocrypt
Coin-Based Anonymous Fingerprinting.
Birgit Pfitzmann
Ahmad-Reza Sadeghi
Coauthors
A. Selcuk Uluagac
(1)
Aakash Tyagi
(2)
Abbas Acar
(1)
Addison Crump
(1)
Adwait Nadkarni
(1)
Ahmad Atamli
(1)
Ahmad Ibrahim
(8)
Ahmad-Reza Sadeghi
(209)
Alberto N. Escalante
(1)
Alessandro Pegoraro
(7)
Alexander Geraldy
(1)
Alexander Gruler
(1)
Alexander W. Dent
(1)
Alexandra Dmitrienko
(22)
Ali Saman Tosun
(1)
Amit Kumar Sikder
(1)
Ammar Alkassar
(2)
André Adelsbach
(5)
Andre Rein
(1)
Andrea Biondo
(1)
Andrei Homescu
(2)
Andrew Paverd
(1)
Andy Rupp
(1)
Anindya Maiti
(1)
Anna Pazii
(1)
Annika Paus
(1)
Anthony Van Herrewege
(1)
Arslan Munir
(1)
Arun K. Kanuparthi
(1)
Atanas Filyanov
(2)
Azalia Mirhoseini
(3)
Benjamin Schlosser
(1)
Benny Pinkas
(1)
Berk Sunar
(1)
Bernardo Portela
(1)
Bhargava Shastry
(3)
Birgit Pfitzmann
(6)
Bjorn De Sutter
(1)
Bogdan Warinschi
(1)
Bora Gökbakan
(1)
Boris Skoric
(2)
Bradley Reaves
(2)
Carlo Blundo
(1)
Carlotta Segna
(1)
Carsten Bock
(1)
Chen Chen
(2)
Chen Yan
(2)
Chester Rebeiro
(1)
Christian Niesler
(2)
Christian Rossow
(1)
Christian Stüble
(9)
Christian Wachsmann
(15)
Christof Paar
(3)
Christoph Bösch
(1)
Christoph Busold
(2)
Christoph Sendner
(2)
Christopher Liebchen
(15)
Cornelius Aschermann
(1)
Costin Carabas
(1)
Daisuke Moriyama
(1)
Daniel Demmler
(1)
Daniel Lehmann
(1)
Daniel Teuchert
(1)
Dario Carluccio
(1)
David Bigelow
(1)
David Gens
(9)
David Koisser
(6)
David Kretzler
(1)
David Noack
(1)
Davide Vernizzi
(1)
Dipak Ghosal
(2)
Domagoj Jakobovic
(1)
Dries Schellekens
(2)
Ebrahim M. Songhori
(2)
Elena Reshetova
(1)
Emiliano De Cristofaro
(2)
Emmanuel Stapf
(4)
Endre Bangerter
(2)
Erik Tews
(1)
Fabian Monrose
(3)
Farinaz Koushanfar
(9)
Felix Madlener
(1)
Felix Schuster
(2)
Ferdinand Brasser
(13)
Flemming Andersen
(1)
François-Xavier Standaert
(1)
Franz Ferdinand Peter Brasser
(1)
Franziska Vollmer
(2)
Frederik Armknecht
(9)
Gabriela Felicia Ciocarlie
(1)
Garrett Persyn
(2)
Geert Jan Schrijen
(1)
Gene Tsudik
(5)
Georg Koppen
(1)
Ghada Dessouky
(8)
Gianluca Ramunno
(1)
Giuseppe Persiano
(1)
Gregor Leander
(1)
Gregory Neven
(2)
Guillaume Scerri
(1)
Hamed Okhravi
(1)
Hanna Foerster
(1)
Hans Löhr
(3)
Hareesh Khattri
(1)
Hassan Jameel Asghar
(1)
Heike Schröder
(1)
Helen Möllering
(2)
Henry Carter
(1)
Hervé Seudie
(1)
Hidayet Aksu
(1)
Hossein Fereidooni
(13)
Hossein Yalame
(2)
Hossen Asiful Mustafa
(2)
Hovav Shacham
(1)
Huaxiong Wang
(1)
Hugo Ideler
(1)
Huili Chen
(2)
Huimin Li
(1)
Immo Wehrenberg
(2)
Ingrid Verbauwhede
(2)
Iulia Manda
(1)
Ivan Visconti
(6)
Jamshid Shokrollahi
(1)
Jan König
(2)
Jan-Erik Ekberg
(1)
Jason M. Fung
(1)
Jasper Stang
(1)
Javor Nikolov
(1)
Jens Neureither
(1)
Jeyavijayan Rajendran
(5)
Jialin Huang
(1)
Jing Zhan
(1)
Jon Rios
(2)
Jonathan Knauer
(2)
Jonathan M. McCune
(1)
Jörg Ott
(1)
Jörg Schwenk
(2)
Jorge Castillo
(1)
Jorge Guajardo
(1)
José Bacelar Almeida
(1)
Josef Pieprzyk
(1)
Junaid Jameel Ahmad
(2)
Kai Wang
(2)
Kaibo Wang
(1)
Kamyar Arshi
(1)
Kari Kostiainen
(1)
Kavita Kumari
(6)
Kerstin Lemke
(1)
Kerstin Lemke-Rust
(1)
Kevin Z. Snow
(2)
Kimmo Järvinen
(2)
Kjell Braden
(1)
Klaus Kursawe
(2)
Kristina Hostáková
(1)
Lichao Wu
(1)
Liqun Chen
(3)
Lisa Eckey
(1)
Lucas Davi
(29)
Lucas Vincenzo Davi
(1)
Luis Garcia
(1)
Lukas Petzi
(1)
Luke Deshotels
(2)
M. Asad Usman Khan
(1)
M. Sadegh Riazi
(1)
Maja Malenko
(1)
Majid Sobhani
(2)
Manuel Barbosa
(2)
Manuel Egele
(2)
Marc Fischlin
(1)
Marcel Selhorst
(1)
Marcel Winandy
(7)
Marcin Nagy
(3)
Marco Chilese
(4)
Marco Negro
(2)
Marcos da Silva Ramos
(1)
Maria Zhdanova
(1)
Mario Werner
(1)
Marius Senftleben
(1)
Mark Manulis
(3)
Marko Wolf
(1)
Markus Miettinen
(16)
Markus Rohe
(1)
Markus Schneider
(1)
Martin Unger
(3)
Maryam Abbasihafshejani
(1)
Matthias Enzmann
(1)
Matthias Klimmek
(1)
Matthias Schunter
(6)
Mauro Barni
(2)
Mauro Conti
(8)
Md. Armanuzzaman
(1)
Md. Sadun Haq
(1)
Mehmet Hazar Cintuglu
(1)
Mehmet Utku Celik
(1)
Meni Orenbach
(1)
Michael C. Grace
(1)
Michael Franz
(6)
Michael Steiner
(2)
Michael Zohner
(1)
Mihai Bucicoiu
(3)
Mihai Chiroiu
(2)
Mike Perry
(1)
Mohamadreza Rostami
(3)
Mohaned Qunaibit
(1)
Moreno Ambrosin
(4)
Moritz Finke
(1)
Moti Yung
(2)
Murtuza Jadliwala
(3)
N. Asokan
(11)
Nathan Nguyen
(1)
Negar Kiyavash
(1)
Nico Ruck
(1)
Nikhilesh Singh
(1)
Nikita Yadav
(1)
Ninghui Li
(1)
Olivier Pereira
(1)
Osama A. Mohammed
(1)
Pallavi Borkar
(1)
Patrick Haney
(1)
Patrick Jauernig
(10)
Patrick Koeberl
(1)
Patrick Stewin
(3)
Patrick Tague
(1)
Patrick Traynor
(1)
Per Larsen
(7)
Philipp Pütz
(1)
Phillip Rieger
(15)
Pierluigi Failla
(2)
Pim Tuyls
(3)
Poulami Das
(1)
Pouya Mahmoody
(1)
Praveen Kumar Pendyala
(2)
Qian Chen
(1)
Raad Bahmani
(3)
Rahul Kande
(3)
Rainer Landfermann
(1)
Ralf Hund
(3)
Rani Husseiki
(1)
Raphael Götz
(1)
Razvan Deaconescu
(3)
Reham Mohamed
(2)
René Korthaus
(1)
Riccardo Lazzeretti
(2)
Richard Mitev
(10)
Richard Skowyra
(1)
Robert Rudd
(1)
Robert Thorburn
(1)
Roel Maes
(3)
Roel Peeters
(1)
Roland Schmitz
(4)
S. Amier Haider Shah
(1)
Saman A. Zonouz
(1)
Samuel Marchal
(2)
Samuel Weiser
(1)
Sasha Behrouzi
(1)
Sebastian Faust
(2)
Sebastian Gajek
(3)
Sebastian Surminski
(2)
Shaza Zeitouni
(8)
Shujun Li
(5)
Siam U. Hussain
(1)
Simon Schmitt
(1)
Sören Bleikertz
(1)
Sören Heisrath
(1)
Srdjan Capkun
(1)
Stanislaus Stelle
(1)
Stefan Brunthaler
(1)
Stefan Katzenbeisser
(8)
Stefan Kögl
(1)
Stefan Lucks
(1)
Stefan Mangard
(1)
Stefan Nürnberger
(5)
Steffen Schulz
(11)
Stephan Heuser
(8)
Stephan Krenn
(1)
Stephen Checkoway
(1)
Stephen Crane
(5)
Stephen J. Crane
(1)
Stijn Volckaert
(1)
Stjepan Picek
(1)
Sudha Yellapantula
(1)
Sven Bugiel
(7)
Syed Ali Khayam
(1)
T. J. OConnor
(1)
Thanh Bui
(1)
Thien Duc Nguyen
(9)
Thomas Eisenbarth
(1)
Thomas Fischer
(4)
Thomas Groß
(1)
Thomas Hobson
(1)
Thomas Nyman
(1)
Thomas Pöppelmann
(1)
Thomas Schneider
(20)
Thomas Tendyck
(1)
Thorsten Holz
(6)
Tigist Abera
(4)
Tim Güneysu
(1)
Tim Werthmann
(1)
Tommaso Frassetto
(11)
Torsten Krauß
(1)
Turgay Korkmaz
(1)
Ulrich Huber
(2)
Ulrich Kühn
(1)
Ünal Koçabas
(3)
Veer Dedhia
(1)
Vijay Varadharajan
(3)
Vincent van der Leest
(1)
Vladimir Kolesnikov
(4)
Vladimir Rozic
(1)
Wenyuan Xu
(5)
Wiebke Kronz
(1)
Wilko Henecka
(1)
William Enck
(6)
Wu Zhou
(1)
Xhani Marvin Saß
(1)
Xiaoyu Ji
(2)
Xuxian Jiang
(1)
Yacine Gasmi
(3)
Yali Liu
(2)
Yan Jiang
(1)
Yanjiao Chen
(1)
Yijie Bai
(1)
Yossef Oren
(2)
Zijo Kenjar
(1)
Ziming Zhao
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to