关注
Felicitas Hetzelt
Felicitas Hetzelt
在 sect.tu-berlin.de 的电子邮件经过验证
标题
引用次数
引用次数
年份
Security analysis of encrypted virtual machines
F Hetzelt, R Buhren
ACM SIGPLAN Notices 52 (7), 129-142, 2017
1012017
Periscope: An effective probing and fuzzing framework for the hardware-os boundary
D Song, F Hetzelt, D Das, C Spensky, Y Na, S Volckaert, G Vigna, ...
NDSS, 2019
872019
Agamotto: Accelerating kernel driver fuzzing with lightweight virtual machine checkpoints
D Song, F Hetzelt, J Kim, BB Kang, JP Seifert, M Franz
29th USENIX Security Symposium (USENIX Security 20), 2541-2557, 2020
682020
Taking control of sdn-based cloud systems via the data plane
K Thimmaraju, B Shastry, T Fiebig, F Hetzelt, JP Seifert, A Feldmann, ...
Proceedings of the Symposium on SDN Research, 1-15, 2018
622018
Yeoul Na, Stijn Volckaert, Giovanni Vigna, Christopher Kruegel, Jean-Pierre Seifert, and Michael Franz. Periscope: An effective probing and fuzzing framework for the hardware …
D Song, F Hetzelt, D Das, C Spensky
Network and Distributed System Security Symposium (NDSS) 3 (3.6), 1, 2019
562019
Via: Analyzing device interfaces of protected virtual machines
F Hetzelt, M Radev, R Buhren, M Morbitzer, JP Seifert
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
242021
Secure real-time communication and computing infrastructure for Industry 4.0—challenges and opportunities
E Zielinski, J Schulz-Zander, M Zimmermann, C Schellenberger, ...
2019 international conference on networked systems (NetSys), 1-6, 2019
132019
The vamp attack: Taking control of cloud systems via the unified packet parser
K Thimmaraju, B Shastry, T Fiebig, F Hetzelt, JP Seifert, A Feldmann, ...
Proceedings of the 2017 on Cloud Computing Security Workshop, 11-15, 2017
112017
On the detectability of control flow using memory access patterns
R Buhren, F Hetzelt, N Pirnay
Proceedings of the 3rd Workshop on System Software for Trusted Execution, 48-53, 2018
102018
Reins to the Cloud: Compromising Cloud Systems via the Data Plane
K Thimmaraju, B Shastry, T Fiebig, F Hetzelt, JP Seifert, A Feldmann, ...
arXiv preprint arXiv:1610.08717, 2016
102016
Challenges and solutions for industry-grade secure connectivity
H Klaus, F Hetzelt, P Hofmann, A Blecker, D Schwaiger
2019 International Conference on Networked Systems (NetSys), 1-5, 2019
42019
What you trace is what you get: dynamic stack-layout recovery for binary recompilation
F Parzefall, C Deshpande, F Hetzelt, M Franz
Proceedings of the 29th ACM International Conference on Architectural …, 2024
32024
DFI: An Interprocedural Value-Flow Analysis Framework that Scales to Large Codebases
MY Hsu, F Hetzelt, M Franz
arXiv preprint arXiv:2209.02638, 2022
22022
Polynima: Practical Hybrid Recompilation for Multithreaded Binaries
C Deshpande, F Parzefall, F Hetzelt, M Franz
Proceedings of the Nineteenth European Conference on Computer Systems, 1126-1141, 2024
12024
A Highly Scalable, Hybrid, Cross-Platform Timing Analysis Framework Providing Accurate Differential Throughput Estimation via Instruction-Level Tracing
MY Hsu, F Hetzelt, D Gens, M Maitland, M Franz
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
12023
Polynima-Practical Hybrid Recompilation for Multithreaded Binaries
F Parzefall, C Deshpande, F Hetzelt, M Franz
2024
Security analysis of hardware-OS interfaces in Linux
F Hetzelt
Dissertation, Berlin, Technische Universität Berlin, 2022, 2022
2022
Taking Control of SDN-based Cloud Systems via the Data Plane
B Shastry, T Fiebig, F Hetzelt, JP Seifert, A Feldmann, S Schmid
2018
The vAMP Attack: Compromising Cloud Systems via the Unified Packet Parser
K Thimmaraju, B Shastry, T Fiebig, F Hetzelt, JP Seifert, A Feldmann, ...
2017
First Workshop on Advanced Communication Networks for Indus-trial Applications (AIComNets)
P Engelhard, A Zachlod, J Schulz-Zander, S Du, H Klaus, F Hetzelt, ...
系统目前无法执行此操作,请稍后再试。
文章 1–20