Osiris: Hunting for integer bugs in ethereum smart contracts CF Torres, J Schütte, R State Proceedings of the 34th annual computer security applications conference …, 2018 | 343 | 2018 |
Blockchain for education: lifelong learning passport W Gräther, S Kolvenbach, R Ruland, J Schütte, C Torres, F Wendland Proceedings of 1st ERCIM Blockchain workshop 2018, 2018 | 282 | 2018 |
Ids reference architecture model. industrial data space. version 2.0 B Otto, S Lohmann, S Steinbuss, A Teuscher, S Auer, M Boehmer, J Bohn, ... International Data Spaces Association, 2018 | 109 | 2018 |
On the effectiveness of malware protection on android R Fedler, J Schütte, M Kulicke Fraunhofer AISEC 45, 53, 2013 | 87 | 2013 |
Condroid: Targeted dynamic analysis of android applications J Schütte, R Fedler, D Titze 2015 IEEE 29th International Conference on Advanced Information Networking …, 2015 | 65 | 2015 |
Reference architecture model for the industrial data space B Otto, S Lohmann, S Auer, G Brost, J Cirullies, A Eitel, T Ernst, C Haas, ... Fraunhofer-Gesellschaft, 2017 | 54 | 2017 |
reclaimID: Secure, self-sovereign identities using name systems and attribute-based encryption M Schanzenbach, G Bramm, J Schütte 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 49 | 2018 |
LUCON: Data flow control for message-based IoT systems J Schütte, GS Brost 2018 17th IEEE international conference on trust, security and privacy in …, 2018 | 49 | 2018 |
AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking Into Android Apps J Schütte, D Titze, JM de Fuentes | 49 | 2014 |
blockchain und Smart contracts: technologien, Forschungsfragen und Anwendungen J Schütte, G Fridgen, W Prinz, T Rose, N Urbach, T Hoeren, ... | 47 | 2017 |
Blockchain-based distributed attribute based encryption G Bramm, M Gall, J Schütte Proceedings of the 15th International Joint Conference on e-Business and …, 2018 | 38 | 2018 |
An ecosystem and IoT device architecture for building trust in the industrial data space GS Brost, M Huber, M Weiß, M Protsenko, J Schütte, S Wessel Proceedings of the 4th ACM workshop on cyber-physical system security, 39-50, 2018 | 33 | 2018 |
Test-based cloud service certification of opportunistic providers P Stephanow, G Srivastava, J Schütte 2016 IEEE 9th International Conference on Cloud Computing (CLOUD), 843-848, 2016 | 31 | 2016 |
Towards semantic resolution of security in ambient environments A Maña, C Rudolph, M Hoffmann, A Badii, S Engberg, R Nair, D Thiemert, ... Developing Ambient Intelligence: Proceedings of the International Conference …, 2008 | 28 | 2008 |
Blockchain and smart contracts J Schütte, G Fridgen, W Prinz, T Rose, N Urbach, T Hoeren, ... Fraunhofer-Gesellschaft, 2018 | 27* | 2018 |
Native Code Execution Control for Attack Mitigation on Android R Fedler, M Kulicke, J Schütte ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2013 | 26 | 2013 |
Annotary: A concolic execution system for developing secure smart contracts K Weiss, J Schütte Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 25 | 2019 |
An antivirus API for Android malware recognition R Fedler, M Kulicke, J Schütte Malicious and Unwanted Software:" The Americas"(MALWARE), 2013 8th …, 2013 | 25 | 2013 |
simTD security architecture: Deployment of a security and privacy architecture in field operational tests N Bißmeyer, H Stübing, M Mattheß, JP Stotz, J Schütte, M Gerlach, ... | 23 | 2009 |
Zklaims: Privacy-preserving attribute-based credentials using non-interactive zero-knowledge techniques M Schanzenbach, T Kilian, J Schütte, C Banse arXiv preprint arXiv:1907.09579, 2019 | 22 | 2019 |