CROSSING Publications

Additional Attributes

Type

ATRIUM: Runtime Attestation Resilient Under Memory Attacks

Shaza Zeitouni, Ghada Dessouky, Orlando Arias, Dean Sullivan, Ahmad Ibrahim, Yier Jin, Ahmad-Reza Sadeghi
In: 2017 International Conference On Computer Aided Design (ICCAD'17), November 2017
[Inproceedings]

Towards Blockchain-Based Collaborative Intrusion Detection Systems

Nikolaos Alexopoulos, Emmanouil Vasilomanolakis, Natalia Reka Ivanko, Max Mühlhäuser
In: International Conference on Critical Information Infrastructures Security, October 2017
Springer-Verlag
[Online-Edition: http://www.critis2017.org]
[Inproceedings]

LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization

Orlando Arias, David Gens, Yier Jin, Christopher Liebchen, Ahmad-Reza Sadeghi, Dean Sullivan
In: 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017), September 2017
[Inproceedings]

Software Grand Exposure: SGX Cache Attacks Are Practical

Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi
In: 11th USENIX Workshop on Offensive Technologies, August 2017
[Inproceedings]

TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER)

Nikolaos Alexopoulos, Emmanouil Vasilomanolakis, Natalia Reka Ivanko, Tamara Frieß, Max Mühlhäuser
In: USENIX Security Symposium Poster Session, August 2017
[Online-Edition: https://www.usenix.org/conference/usenixsecurity17]
[Misc]

PRF-ODH: Relations, Instantiations, and Impossibility Results

Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson
In: CRYPTO 2017 - 37th International Cryptology Conference, August 2017
Springer
[Online-Edition: https://www.iacr.org/conferences/crypto2017/]
[Inproceedings]

A Formal Treatment of Multi-key Channels

Felix Günther, Sogol Mazaheri
In: CRYPTO 2017 - 37th International Cryptology Conference, August 2017
Springer
[Online-Edition: https://www.iacr.org/conferences/crypto2017/]
[Inproceedings]

CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory

Ferdinand Brasser, Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi
In: 26th USENIX Security Symposium, August 2017
[Inproceedings]

Beyond the Hype: On Using Blockchains in Trust Management for Authentication

Nikolaos Alexopoulos, Jörg Daubert, Max Mühlhäuser, Sheikh Mahbub Habib
In: TrustCom, August 2017
IEEE
[Online-Edition: http://stprp-activity.com/TrustCom2017]
[Inproceedings]

MCMix: Anonymous Messaging via Secure Multiparty Computation

Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias
In: 26th USENIX Security Symposium, August 2017
[Online-Edition: https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/alexopoulos]
[Inproceedings]
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang