Twin clouds: An architecture for secure cloud computing S Bugiel, S Nurnberger, A Sadeghi, T Schneider Workshop on cryptography and security in clouds (WCSC 2011) 1217889, 2011 | 286 | 2011 |
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones. L Davi, A Dmitrienko, M Egele, T Fischer, T Holz, R Hund, S Nürnberger, ... NDSS 26, 27-40, 2012 | 248 | 2012 |
Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing M Backes, S Nürnberger USENIX Security, 2014 | 228 | 2014 |
You can run but you can't read: Preventing disclosure exploits in executable code M Backes, T Holz, B Kollenda, P Koppe, S Nürnberger, J Pewny Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 227 | 2014 |
AmazonIA: when elasticity snaps back S Bugiel, S Nürnberger, T Pöppelmann, AR Sadeghi, T Schneider Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 173 | 2011 |
Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM LV Davi, A Dmitrienko, S Nürnberger, AR Sadeghi Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 149 | 2013 |
Twin Clouds: Secure Cloud Computing with Low Latency: (Full Version) S Bugiel, S Nürnberger, AR Sadeghi, T Schneider Communications and Multimedia Security: 12th IFIP TC 6/TC 11 International …, 2011 | 131 | 2011 |
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization. K Lu, W Lee, S Nürnberger, M Backes NDSS, 2016 | 123 | 2016 |
–vatican–vetted, authenticated can bus S Nürnberger, C Rossow Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016 | 117 | 2016 |
Unleashing use-before-initialization vulnerabilities in the linux kernel using targeted stack spraying K Lu, MT Walter, D Pfaff, S Nürnberger, W Lee, M Backes CISPA, 2017 | 68 | 2017 |
Ramcrypt: Kernel-based address space encryption for user-mode processes J Götzfried, T Müller, G Drescher, S Nürnberger, M Backes Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 36 | 2016 |
Nearly optimal verifiable data streaming J Krupp, D Schröder, M Simkin, D Fiore, G Ateniese, S Nürnberger Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016 | 35 | 2016 |
Client-controlled cryptography-as-a-service in the cloud S Bleikertz, S Bugiel, H Ideler, S Nürnberger, AR Sadeghi Applied Cryptography and Network Security: 11th International Conference …, 2013 | 34 | 2013 |
I know where you parked last summer: Automated reverse engineering and privacy analysis of modern cars D Frassinelli, S Park, S Nürnberger 2020 IEEE Symposium on Security and Privacy (SP), 1401-1415, 2020 | 27 | 2020 |
Autonome Systeme: Autonome Probleme S Nürnberger, S Bugiel Datenschutz und Datensicherheit-DuD 40 (8), 503-506, 2016 | 17 | 2016 |
WebTrust–a comprehensive authenticity and integrity framework for HTTP M Backes, RW Gerling, S Gerling, S Nürnberger, D Schröder, M Simkin Applied Cryptography and Network Security: 12th International Conference …, 2014 | 15 | 2014 |
Xifer: A software diversity tool against code-reuse attacks L Davi, A Dmitrienko, S Nürnberger, AR Sadeghi 4th ACM International Workshop on Wireless of the Students, by the Students …, 2012 | 15 | 2012 |
Implicit sleep mode determination in power management of event-driven deeply embedded systems A Sieber, K Walther, S Nürnberger, J Nolte Wired/Wireless Internet Communications: 7th International Conference, WWIC …, 2009 | 11 | 2009 |
Shared memory in the many-core age S Nürnberger, G Drescher, R Rotta, J Nolte, W Schröder-Preikschat Euro-Par 2014: Parallel Processing Workshops: Euro-Par 2014 International …, 2014 | 6 | 2014 |
Poster: Control-flow integrity for smartphones L Davi, A Dmitrienko, M Egele, T Fischer, T Holz, R Hund, S Nürnberger, ... Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 6 | 2011 |