Ahmad-Reza Sadeghi
Ahmad-Reza Sadeghi
Bestätigte E-Mail-Adresse bei trust.tu-darmstadt.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Security and privacy challenges in industrial internet of things
AR Sadeghi, C Wachsmann, M Waidner
2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2015
5732015
Privilege escalation attacks on android
L Davi, A Dmitrienko, AR Sadeghi, M Winandy
international conference on Information security, 346-360, 2010
5712010
Property-based attestation for computing platforms: caring about properties, not mechanisms
AR Sadeghi, C Stüble
Proceedings of the 2004 workshop on New security paradigms, 67-77, 2004
5482004
Return-oriented programming without returns
S Checkoway, L Davi, A Dmitrienko, AR Sadeghi, H Shacham, ...
Proceedings of the 17th ACM conference on Computer and communications …, 2010
5422010
Unsafe exposure analysis of mobile in-app advertisements
MC Grace, W Zhou, X Jiang, AR Sadeghi
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
5232012
Towards Taming Privilege-Escalation Attacks on Android.
S Bugiel, L Davi, A Dmitrienko, T Fischer, AR Sadeghi, B Shastry
NDSS 17, 19, 2012
4632012
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
KZ Snow, F Monrose, L Davi, A Dmitrienko, C Liebchen, AR Sadeghi
2013 IEEE Symposium on Security and Privacy, 574-588, 2013
4522013
TASTY: tool for automating secure two-party computations
W Henecka, S K ögl, AR Sadeghi, T Schneider, I Wehrenberg
Proceedings of the 17th ACM conference on Computer and communications …, 2010
3882010
Efficient privacy-preserving face recognition
AR Sadeghi, T Schneider, I Wehrenberg
International Conference on Information Security and Cryptology, 229-244, 2009
3462009
Xmandroid: A new android evolution to mitigate privilege escalation attacks
S Bugiel, L Davi, A Dmitrienko, T Fischer, AR Sadeghi
Technische Universität Darmstadt, Technical Report TR-2011-04, 2011
3332011
ROPdefender: A detection tool to defend against return-oriented programming attacks
L Davi, AR Sadeghi, M Winandy
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
3292011
Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection
L Davi, AR Sadeghi, D Lehmann, F Monrose
23rd {USENIX} Security Symposium ({USENIX} Security 14), 401-416, 2014
3192014
Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications
F Schuster, T Tendyck, C Liebchen, L Davi, AR Sadeghi, T Holz
2015 IEEE Symposium on Security and Privacy, 745-762, 2015
3012015
Flexible and fine-grained mandatory access control on android for diverse security and privacy policies
S Bugiel, S Heuser, AR Sadeghi
Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security …, 2013
2882013
Securing the e-health cloud
H Löhr, AR Sadeghi, M Winandy
Proceedings of the 1st acm international health informatics symposium, 220-229, 2010
2792010
A protocol for property-based attestation
L Chen, R Landfermann, H Löhr, M Rohe, AR Sadeghi, C Stüble
Proceedings of the first ACM workshop on Scalable trusted computing, 7-16, 2006
2742006
Efficient helper data key extractor on FPGAs
C Bösch, J Guajardo, AR Sadeghi, J Shokrollahi, P Tuyls
International Workshop on Cryptographic Hardware and Embedded Systems, 181-197, 2008
2722008
Software grand exposure:{SGX} cache attacks are practical
F Brasser, U Müller, A Dmitrienko, K Kostiainen, S Capkun, AR Sadeghi
11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17), 2017
2672017
PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon
S Katzenbeisser, Ü Kocabaş, V Rožić, AR Sadeghi, I Verbauwhede, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 283-301, 2012
2502012
Practical and lightweight domain isolation on android
S Bugiel, L Davi, A Dmitrienko, S Heuser, AR Sadeghi, B Shastry
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
2472011
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20