Ahmad-Reza Sadeghi
Ahmad-Reza Sadeghi
Bestätigte E-Mail-Adresse bei trust.tu-darmstadt.de - Startseite
TitelZitiert vonJahr
Property-based attestation for computing platforms: caring about properties, not mechanisms
AR Sadeghi, C Stüble
Proceedings of the 2004 workshop on New security paradigms, 67-77, 2004
5332004
Privilege escalation attacks on android
L Davi, A Dmitrienko, AR Sadeghi, M Winandy
international conference on Information security, 346-360, 2010
5312010
Return-oriented programming without returns
S Checkoway, L Davi, A Dmitrienko, AR Sadeghi, H Shacham, ...
Proceedings of the 17th ACM conference on Computer and communications …, 2010
4892010
Unsafe exposure analysis of mobile in-app advertisements
MC Grace, W Zhou, X Jiang, AR Sadeghi
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
4742012
Towards Taming Privilege-Escalation Attacks on Android.
S Bugiel, L Davi, A Dmitrienko, T Fischer, AR Sadeghi, B Shastry
NDSS 17, 19, 2012
4442012
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
KZ Snow, F Monrose, L Davi, A Dmitrienko, C Liebchen, AR Sadeghi
2013 IEEE Symposium on Security and Privacy, 574-588, 2013
3942013
Security and privacy challenges in industrial internet of things
AR Sadeghi, C Wachsmann, M Waidner
2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2015
3912015
TASTY: tool for automating secure two-party computations
W Henecka, AR Sadeghi, T Schneider, I Wehrenberg
Proceedings of the 17th ACM conference on Computer and communications …, 2010
3652010
Efficient privacy-preserving face recognition
AR Sadeghi, T Schneider, I Wehrenberg
International Conference on Information Security and Cryptology, 229-244, 2009
3162009
Xmandroid: A new android evolution to mitigate privilege escalation attacks
S Bugiel, L Davi, A Dmitrienko, T Fischer, AR Sadeghi
Technische Universität Darmstadt, Technical Report TR-2011-04, 2011
3072011
ROPdefender: A detection tool to defend against return-oriented programming attacks
L Davi, AR Sadeghi, M Winandy
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
2922011
Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection
L Davi, AR Sadeghi, D Lehmann, F Monrose
23rd {USENIX} Security Symposium ({USENIX} Security 14), 401-416, 2014
2762014
Flexible and fine-grained mandatory access control on android for diverse security and privacy policies
S Bugiel, S Heuser, AR Sadeghi
Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security …, 2013
2672013
A protocol for property-based attestation
L Chen, R Landfermann, H Löhr, M Rohe, AR Sadeghi, C Stüble
Proceedings of the first ACM workshop on Scalable trusted computing, 7-16, 2006
2662006
Efficient helper data key extractor on FPGAs
C Bösch, J Guajardo, AR Sadeghi, J Shokrollahi, P Tuyls
International Workshop on Cryptographic Hardware and Embedded Systems, 181-197, 2008
2592008
Securing the e-health cloud
H Löhr, AR Sadeghi, M Winandy
Proceedings of the 1st acm international health informatics symposium, 220-229, 2010
2512010
Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications
F Schuster, T Tendyck, C Liebchen, L Davi, AR Sadeghi, T Holz
2015 IEEE Symposium on Security and Privacy, 745-762, 2015
2482015
Practical and lightweight domain isolation on android
S Bugiel, L Davi, A Dmitrienko, S Heuser, AR Sadeghi, B Shastry
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
2372011
PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon
S Katzenbeisser, Ü Kocabaş, V Rožić, AR Sadeghi, I Verbauwhede, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 283-301, 2012
2322012
Improved garbled circuit building blocks and applications to auctions and computing minima
V Kolesnikov, AR Sadeghi, T Schneider
International Conference on Cryptology and Network Security, 1-20, 2009
2202009
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20