Personensuche
Personensuche
Es wurde 1 Person gefunden.
Informatik / SE
Anschrift
Gerlingstr. 16
45127 Essen
45127 Essen
Raum
S - GW 212
Telefon
E-Mail
Webseite
Funktionen
-
Gruppe der Hochschullehrerinnen und Hochschullehrer, Fakultätsrat
-
Universitätsprofessor/in, Systemsicherheit
-
Stellv. Vorsitz, Promotionsausschuss
-
Universitätsprofessor/in, Systemsicherheit
Aktuelle Veranstaltungen
-
2024 WS
Vergangene Veranstaltungen (max. 10)
-
2024 SS
- Bachelorprojekt Sichere Software Systeme
- Sicherheit in Kryptowährungen und Blockchain Technologien (Übung)
- Cybersicherheit
- Projektgruppe Sichere Software Systeme (MA-Projekt I-III)
- Sicherheit in Kryptowährungen und Blockchain Technologien
- Seminar Sichere Software Systeme
- Sicherheit in Kryptowährungen
- Cybersicherheit
-
2023 WS
Die folgenden Publikationen sind in der Online-Universitätsbibliographie der Universität Duisburg-Essen verzeichnet. Weitere Informationen finden Sie gegebenenfalls auch auf den persönlichen Webseiten der Person.
-
Building trust in remote attestation through transparency : A qualitative user study on observable attestationIn: Behaviour & Information Technology (BIT) (2024) in pressOnline Volltext: dx.doi.org/ (Open Access)
-
Memory Corruption at the Border of Trusted ExecutionIn: IEEE Security & Privacy: (M-S&P) Jg. 22 (2024) Nr. 4, S. 87 - 96Online Volltext: dx.doi.org/ (Open Access)
-
The Cybersecurity Landscape in Industrial Control SystemsIn: Proceedings of the IEEE (PROC) Jg. 104 (2016) Nr. 5, S. 1039 - 1057Online Volltext: dx.doi.org/
-
Poster: Automated Evaluation of Fuzzers
26th Annual Network and Distributed System Security Symposium (NDSS); February 24-27, 2019; San Diego, USA,(2019)Online Volltext (Open Access) -
NVM-Flip : Non-Volatile-Memory BitFlips on the System LevelIn: Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems / CODASPY '24: Fourteenth ACM Conference on Data and Application Security and Privacy, Porto, Portugal, 21 June 2024 / Gupta, Maanak (Hrsg.) 2024, S. 11 - 20Online Volltext: dx.doi.org/ (Open Access)
-
DMA’n’Play : Practical Remote Attestation Based on Direct Memory AccessIn: Applied Cryptography and Network Security: Proceedings, Part II / 21st International Conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023 / Tibouchi, Mehdi; Wang, XiaoFeng (Hrsg.) 2023, S. 32 - 61Online Volltext: dx.doi.org/
-
EF↯CF : High Performance Smart Contract Fuzzing for Exploit GenerationIn: 8th IEEE European Symposium on Security and Privacy: EUROS&P 2023 ; Proceedings / 8th IEEE European Symposium on Security and Privacy ; EUROS&P 2023 ; July 3 to July 7, 2023, Delft, The Nederlands 2023, S. 449 - 471Online Volltext: dx.doi.org/ (Open Access)
-
Fuzz on the Beach : Fuzzing Solana Smart ContractsIn: CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security / CCS '23: ACM SIGSAC Conference on Computer and Communications Security, Copenhagen, Denmark, November 26 - 30, 2023 2023, S. 1197 - 1211Online Volltext: dx.doi.org/ (Open Access)
-
SCAtt-man: Side-Channel-Based Remote Attestation for Embedded Devices that Users UnderstandIn: Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy / CODASPY '23: Thirteenth ACM Conference on Data and Application Security and Privacy, April 24 - 26, 2023, Charlotte NC USA / Shehab, Mohamed (Hrsg.) 2023, S. 225 - 236Online Volltext: dx.doi.org/ (Open Access)
-
RiscyROP : Automated Return-Oriented Programming Attacks on RISC-V and ARM64In: Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses / RAID 2022: 25th International Symposium on Research in Attacks, Intrusions and Defenses Limassol, 26.-28.10.2022, Cyprus 2022, S. 30 - 42Online Volltext: dx.doi.org/
-
SGXFUZZ : Efficiently Synthesizing Nested Structures for SGX Enclave FuzzingIn: Proceedings of the 31st USENIX Security Symposium (Security 2022) / 31st USENIX Security Symposium (Security 2022): Boston, USA; 10 -12 August 2022 2022, S. 3147 - 3164
-
Salsa : SGX Attestation for Live Streaming ApplicationsIn: 2022 IEEE Secure Development Conference: SecDev 2022 ; Atlanta, Georgia, 18-20 October 2022 ; proceedings / 7th IEEE Secure Development Conference ; SecDev 2022 ; 18-20 October 2022, Atlanta, Ga., USA / IEEE Computer Society (Hrsg.) 2022, S. 45 - 51Online Volltext: dx.doi.org/
-
Tutorial : Analyzing, Exploiting, and Patching Smart Contracts in EthereumIn: 2022 IEEE Secure Development Conference: SecDev 2022 ; Atlanta, Georgia, 18-20 October 2022 ; proceedings / 7th IEEE Secure Development Conference ; SecDev 2022 ; 18-20 October 2022, Atlanta, Ga., USA / IEEE Computer Society (Hrsg.) 2022, S. 3 - 4Online Volltext: dx.doi.org/
-
EVMPatch: Timely and automated patching of ethereum smart contractsIn: Proceedings of the 30th USENIX Security Symposium: August 11-13, 2021 / 30th USENIX Security Symposium; August 11-13, 2021; Online / USENIX Association (Hrsg.) 2021, S. 1289 - 1306(Open Access)
-
HERA: Hotpatching of Embedded Real-time ApplicationsIn: Network and Distributed Systems Security (NDSS) Symposium 2021 / NDSS Symposium 2021; 21-25 February 2021; Virtual 2021, S. 1 - 16Online Volltext: dx.doi.org/ Online Volltext (Open Access)
-
My Fuzzer Beats Them All! Developing a Framework for Fair Evaluation and Comparison of FuzzersIn: Computer Security – ESORICS 2021 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021: Proceedings, Part I / 26th European Symposium on Research in Computer Security (ESORICS), 4 - 8.10.2021, Darmstadt, Virtual, 2021 / Bertino, Elisa; Shulman, Haya; Waidner, Michael (Hrsg.) 2021, S. 173 - 193Online Volltext: dx.doi.org/ (Open Access)
-
Nano Security: From Nano-Electronics to Secure SystemsIn: Proceedings of the 2021 Design, Automation & Test in Europe (DATE 2021) / 24 Design, Automation & Test in Europe Conference & Exhibition ; 01-05 February 2021; Online 2021, S. 1334 - 1339Online Volltext: dx.doi.org/
-
RealSWATT : Remote Software-based Attestation for Embedded Devices under Realtime ConstraintsIn: CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security / CCS 2021, 15 - 19 November 2021, Virtual, Online 2021, S. 2890 - 2905Online Volltext: dx.doi.org/ Online Volltext (Open Access)
-
Control behavior integrity for distributed cyber-physical systemsIn: 2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems: Proceedings / International Conference on Cyber-Physical Systems ; 21-24 April 2020, Sydney / Maggio, Martina; Weimer, James (Hrsg.) 2020, S. 30 - 40Online Volltext: dx.doi.org/ (Open Access)
-
TEEREX: Discovery and exploitation of memory corruption vulnerabilities in SGX enclavesIn: Proceedings of the 29th USENIX Security Symposium: August 12-14, 2020 / 29th USENIX Security Symposium, 12.-14.08.2020 2020, S. 841 - 858
-
CHASE : A configurable hardware-assisted security extension for real-time systemsIn: 2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD): digest of technical papers : November 4-7, 2019, Westin Westminster, CO / 38th IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 04.-07.11.2019; Westin Westminster 2019Online Volltext: dx.doi.org/
-
Combining safety and security in autonomous cars using blockchain technologiesIn: Computer Safety, Reliability, and Security: Proceedings / SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, 10.09.2019, Turku, Finland / Romanovsky, Alexander; Troubitsyna, Elena; Gashi, Ilir; Schoitsch, Erwin; Bitsch, Friedemann (Hrsg.) 2019, S. 223 - 234Online Volltext: dx.doi.org/
-
Sereum: Protecting Existing Smart Contracts Against Re-Entrancy AttacksIn: Proceedings 2019 Network and Distributed System Security Symposium / 26th Annual Network and Distributed System Security Symposium (NDSS); February 24-27, 2019; San Diego, USA 2019Online Volltext: dx.doi.org/ (Open Access)
-
Hardware control flow integrityIn: The Continuing Arms Race: Code-Reuse Attacks and Defenses / Larsen, Per; Sadeghi, Ahmad-Reza (Hrsg.) 2018, S. 181 - 210Online Volltext: dx.doi.org/
-
K-Miner: Uncovering Memory Corruption in LinuxIn: Proceedings 2018 Network and Distributed System Security Symposium / Network and Distributed Systems Security (NDSS) Symposium; 18-21 February 2018; San Diego, USA 2018Online Volltext: dx.doi.org/ (Open Access)
-
Special Session : Advances and Throwbacks in Hardware-Assisted SecurityIn: 2018 International Conference on Compilers, Architecture and Synthesis for Embedded Systems / CASES 2018, International Conference on Compilers, Architecture and Synthesis for Embedded Systems, September 30-October 5, 2018, Torino Incontra Congress Center, Turin, Italy; Henkel, Jörg 2018Online Volltext: dx.doi.org/
-
The Guard's Dilemma : Efficient code-reuse attacks against intel SGXIn: Proceedings of the 27th USENIX Security Symposium / USENIX Security Symposium ; August 15-17, 2018, Baltimore 2018, S. 1213 - 1227
-
Address Oblivious Code Reuse : On the Effectiveness of Leakage-Resilient DiversityIn: Proceedings 2017 Network and Distributed System Security Symposium / 24th Annual Network & Distributed System Security Symposium (NDSS); February 26 - March 1, 2017; San Diego; USA 2017Online Volltext: dx.doi.org/ (Open Access)
-
Breaking and fixing destructive code read defensesIn: Proceedings of the 33rd Annual Computer Security Applications Conference / ACSAC 2017, Orlando, FL, USA, December 04 - 08, 2017 2017, S. 55 - 67Online Volltext: dx.doi.org/ (Open Access)
-
CFI CaRE : Hardware-Supported Call and, Return Enforcement for Commercial MicrocontrollersIn: Research in Attacks, Intrusions, and Defenses: Proceedings / 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017 / Dacier, Marc; Bailey, Michael; Polychronakis, Michalis; Antonakakis, Manos (Hrsg.) 2017, S. 259 - 284Online Volltext: dx.doi.org/
-
Can’t touch this : Software-only mitigation against rowhammer attacks targeting kernel memoryIn: Proceedings of the 26th USENIX Security Symposium / 26th USENIX Security Symposium : August 16-18, 2017, Vancouver, BC, Canada 2017, S. 117 - 130
-
LO-FAT : Low-Overhead Control Flow ATtestation in HardwareIn: Proceedings of the 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC) / Bertacco, Valeria; ACM/EDAC/IEEE Design Automation Conference, Austin, Texas, 2017.06.18-22 / Institute of Electrical and Electronics Engineers (Hrsg.) 2017Online Volltext: dx.doi.org/ (Open Access)
-
PT-Rand: Practical Mitigation of Data-only Attacks against Page TablesIn: Proceedings 2017 Network and Distributed System Security Symposium / 24th Annual Network & Distributed System Security Symposium (NDSS); February 26 - March 1, 2017; San Diego; USA (Hrsg.) 2017Online Volltext: dx.doi.org/ (Open Access)
-
C-FLAT: Control-flow attestation for embedded systems softwareIn: Proceedings of the ACM Conference on Computer and Communications Security / Weippl, Edgar; CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security; October 24 - 28, 2016; Vienna, Austria 2016, S. 743 - 754Online Volltext: dx.doi.org/ (Open Access)
-
Invited - Things, trouble, trust : On building trust in IoT systemsIn: Proceedings of the 53rd Annual Design Automation Conference / DAC '16: The 53rd Annual Design Automation Conference; June 5 - 9, 2016; Austin, USA 2016 121Online Volltext: dx.doi.org/
-
Leakage-Resilient Layout Randomization for Mobile DevicesIn: Proceedings 2016 Network and Distributed System Security Symposium / 23rd Annual Network and Distributed System Security Symposium (NDSS), February 21-24, 2016; San Diego, USA 2016Online Volltext: dx.doi.org/
-
SandScout: Automatic detection of flaws in iOS sandbox profilesIn: Proceedings of the ACM Conference on Computer and Communications Security / Weippl, Edgar; CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security; October 24 - 28, 2016; Vienna, Austria 2016, S. 704 - 716Online Volltext: dx.doi.org/ (Open Access)
-
Strategy without tactics : Policy-agnostic hardware-enhanced control-flow integrityIn: Proceedings of the 53rd Annual Design Automation Conference / DAC '16: The 53rd Annual Design Automation Conference; June 5 - 9, 2016; Austin, USA 2016 163Online Volltext: dx.doi.org/
-
Subversive-C: Abusing and protecting dynamic message dispatchIn: Proceedings of USENIX ATC ’16, 2016 USENIX Annual Technical Conference: June 22-24, 2016, Denver, CO, USA / 2016 USENIX Annual Technical Conference (USENIX ATC); June 22–24, 2016 ; Denver, USA 2016, S. 209 - 221(Open Access)
-
Building Secure Defenses Against Code-Reuse AttacksIn: SpringerBriefs in Computer Science (2015)Online Volltext: dx.doi.org/
-
Towards a Policy-Agnostic Control-Flow Integrity Implementation
Black Hat Europe; November; 1-6 2016; London, UK,(2016)