Security analysis of encrypted virtual machines F Hetzelt, R Buhren ACM SIGPLAN Notices 52 (7), 129-142, 2017 | 101 | 2017 |
Periscope: An effective probing and fuzzing framework for the hardware-os boundary D Song, F Hetzelt, D Das, C Spensky, Y Na, S Volckaert, G Vigna, ... NDSS, 2019 | 87 | 2019 |
Agamotto: Accelerating kernel driver fuzzing with lightweight virtual machine checkpoints D Song, F Hetzelt, J Kim, BB Kang, JP Seifert, M Franz 29th USENIX Security Symposium (USENIX Security 20), 2541-2557, 2020 | 68 | 2020 |
Taking control of sdn-based cloud systems via the data plane K Thimmaraju, B Shastry, T Fiebig, F Hetzelt, JP Seifert, A Feldmann, ... Proceedings of the Symposium on SDN Research, 1-15, 2018 | 62 | 2018 |
Yeoul Na, Stijn Volckaert, Giovanni Vigna, Christopher Kruegel, Jean-Pierre Seifert, and Michael Franz. Periscope: An effective probing and fuzzing framework for the hardware … D Song, F Hetzelt, D Das, C Spensky Network and Distributed System Security Symposium (NDSS) 3 (3.6), 1, 2019 | 56 | 2019 |
Via: Analyzing device interfaces of protected virtual machines F Hetzelt, M Radev, R Buhren, M Morbitzer, JP Seifert Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 24 | 2021 |
Secure real-time communication and computing infrastructure for Industry 4.0—challenges and opportunities E Zielinski, J Schulz-Zander, M Zimmermann, C Schellenberger, ... 2019 international conference on networked systems (NetSys), 1-6, 2019 | 13 | 2019 |
The vamp attack: Taking control of cloud systems via the unified packet parser K Thimmaraju, B Shastry, T Fiebig, F Hetzelt, JP Seifert, A Feldmann, ... Proceedings of the 2017 on Cloud Computing Security Workshop, 11-15, 2017 | 11 | 2017 |
On the detectability of control flow using memory access patterns R Buhren, F Hetzelt, N Pirnay Proceedings of the 3rd Workshop on System Software for Trusted Execution, 48-53, 2018 | 10 | 2018 |
Reins to the Cloud: Compromising Cloud Systems via the Data Plane K Thimmaraju, B Shastry, T Fiebig, F Hetzelt, JP Seifert, A Feldmann, ... arXiv preprint arXiv:1610.08717, 2016 | 10 | 2016 |
Challenges and solutions for industry-grade secure connectivity H Klaus, F Hetzelt, P Hofmann, A Blecker, D Schwaiger 2019 International Conference on Networked Systems (NetSys), 1-5, 2019 | 4 | 2019 |
What you trace is what you get: dynamic stack-layout recovery for binary recompilation F Parzefall, C Deshpande, F Hetzelt, M Franz Proceedings of the 29th ACM International Conference on Architectural …, 2024 | 3 | 2024 |
DFI: An Interprocedural Value-Flow Analysis Framework that Scales to Large Codebases MY Hsu, F Hetzelt, M Franz arXiv preprint arXiv:2209.02638, 2022 | 2 | 2022 |
Polynima: Practical Hybrid Recompilation for Multithreaded Binaries C Deshpande, F Parzefall, F Hetzelt, M Franz Proceedings of the Nineteenth European Conference on Computer Systems, 1126-1141, 2024 | 1 | 2024 |
A Highly Scalable, Hybrid, Cross-Platform Timing Analysis Framework Providing Accurate Differential Throughput Estimation via Instruction-Level Tracing MY Hsu, F Hetzelt, D Gens, M Maitland, M Franz Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023 | 1 | 2023 |
Polynima-Practical Hybrid Recompilation for Multithreaded Binaries F Parzefall, C Deshpande, F Hetzelt, M Franz | | 2024 |
Security analysis of hardware-OS interfaces in Linux F Hetzelt Dissertation, Berlin, Technische Universität Berlin, 2022, 2022 | | 2022 |
Taking Control of SDN-based Cloud Systems via the Data Plane B Shastry, T Fiebig, F Hetzelt, JP Seifert, A Feldmann, S Schmid | | 2018 |
The vAMP Attack: Compromising Cloud Systems via the Unified Packet Parser K Thimmaraju, B Shastry, T Fiebig, F Hetzelt, JP Seifert, A Feldmann, ... | | 2017 |
First Workshop on Advanced Communication Networks for Indus-trial Applications (AIComNets) P Engelhard, A Zachlod, J Schulz-Zander, S Du, H Klaus, F Hetzelt, ... | | |