direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Inhalt des Dokuments

2015

  • E. Carmon, J.-P. Seifert, A. Wool, " Simple Photonic Emission Attack with Reduced Data Complexity", Cryptology ePrint Archive, Report 2015/1206, Link
  • A. Mikityuk, M. Platschek, O. Friedrich, „On Virtualization of Red-button Signaling in Hybrid TV“, IEEE ISM2015, Miami, USA, December 14-16, 2015
  • D. Livshits, A. Mikityuk, S. Pham, A. Shabtai, „Towards Security of Native DRM Execution in HTML5“, IEEE ISM2015, Miami, USA, December 14-16, 2015
  • F. Ganji, S. Tajik, J.-P. Seifert, "Let Me Prove it to You: RO PUFs are Provably Learnable", ICISC 2015, Seoul, Korea, November 25-27, 2015
  • J. Vetter, M. Petschik-Junker, J. Nordholz, M. Peter; J. Danisevskis, "Uncloaking rootkits on mobile devices with a hypervisor-based detector", ICISC 2015, Seoul, Korea, November 25-27, 2015
  • J. Krämer, "Why Cryptography Should Not Rely on Physical Attack Complexity", Springer, T-Labs Series in Telecommunication Services, ISBN: 978-981-287-786-4, 2015
  • H. Decke and J.-P. Seifert, "Designing and Optimizing a Security Requirements Engineering Methodology with the Security Engineering System Model Core", accepted for escar, Cologne, Germany, November 11-12, 2015
  • J.-P. Seifert, C. Bayer, "Trojan-Resilient Circuits", Securing Cyber-Physical Systems, CRC Press, ISBN 9781498700986, October 19, 2015
  • H. Decke, J.-P. Seifert, "Checking and Verifying Security Requirements With the Security Engineering System Model Core", accepted for VEHICULAR, St. Julians, Malta, October 11-16, 2015
  • A. Mikityuk, S. Pham, S. Kaiser, O. Friedrich, S. Arbanowski, "Content Protection in HTML5 TV Platforms: towards Browser-agnostic DRM and Cloud UI environments", CCS TrustED, Denver, Colorado, USA, October 16, 2015.
  • J. Nordholz, J. Vetter, M. Peter, M.Petschick and J. Danisevskis, "XNPro: Low-Impact Hypervisor-Based Execution Prevention on ARM", accepted for CCS TrustED, Denver, Colorado, USA, October 16, 2015.
  • F. Ganji, J. Krämer, J. -P. Seifert, S. Tajik, "Lattice Basis Reduction Attack against Physically Unclonable Functions", ACM CCS 2015, Denver, Colorado, USA, October 12-16, 2015.
  • M. Peter, M. Petschick, J. Vetter, J. Nordholz, J. Danisevskis, J.-P. Seifert, "Undermining Isolation through Covert Channels in the Fiasco.OC Microkernel", accepted for ISCIS, London, UK, September 21-25, 2015
  • S. Tajik, H. Lohrke, F. Ganji, J. -P. Seifert, C. Boit, "Laser Fault Attack on Physically Unclonable Functions", FDTC 2015, Saint Malo, France, September 13, 2015.
  • A. Mikityuk, O. Friedrich, R. Skupin, Y. Sánchez, T. Schierl, "Compositing without Transcoding for H.265/HEVC in Cloud IPTV and VoD services", accepted for IEEE ICCE, Berlin, Germany, September 6, 2015
  • F. Ganji, S. Tajik, J. -P. Seifert, "Why Attackers Win: On the Learnability of XOR Arbiter PUFs", TRUST 2015, Heraklion, Crete, Greece, August 2015.
  • A. Mikityuk, O. Friedrich, R. Nikutta: "HbbTV goes Cloud: Decoupling Application Signaling and Application Execution in Hybrid TV", accepted for ACM TVX Work-in-Progress, Brussels, Belgium, June 3-5, 2015
  • J. Danisevskis, M. Peter, J. Nordholz, M. Petschick, J. Vetter, "Graphical User Interface for Virtualized Mobile Handsets", accepted for S&P MoST Workshop, San Jose, CA, May 21, 2015
  • L. Kraus, T. Fiebig, V. Miruchna, S. Möller, A. Shabtai, "Analyzing End-Users’ Knowledge and Feelings Surrounding Smartphone Security and Privacy", accepted for S&P MoST Workshop, San Jose, CA, May 21, 2015
  • M. Piekarska, Y. Zhou, D. Strohmeier, A. Raake, "Because we care: Privacy Dashboard on Firefox OS", accepted for Web 2.0 Security and Privacy workshop co-located with IEEE Security and Privacy Symposium, San Jose, CA, May 18-21, 2015
  • D. Peters, F. Thiel, M. Peter, J.-P. Seifert, "A Secure Software Framework for Measuring Instruments in Legal Metrology", accepted for IEEE International Instrumentation and Measurement Technology Conference (I2MTC), Pisa, Italy, May 11-14, 2015
  • D. Peters, M. Peter, J.-P. Seifert, F. Thiel: "A Secure System Architecture for Measuring Instruments in Legal Metrology", Computers Vol. 4, pages 61-86, March, 2015
  • P. Stewin, "Detecting Peripheral-based Attacks on the Host Memory", T-Labs Series in Telecommunication Services, Springer International Publishing, Heidelberg, Germany, 2015

2014

  • M. Peter, M. Petschick, J. Vetter, J. Nordholz, J. Danisevskis, J.-P. Seifert, "Undermining Isolation through Covert Channels in the Fiasco.OC Microkernel", Cryptology ePrint Archive, Report 2014/984, Link
  • F. Ganji, Ł. Budzisz, F. Debele, N. Li, M. Meo, M. Ricca, Y. Zhang, A. Wolisz, "Greening campus WLANs: energy-relevant usage and mobility patterns", "Computer Networks - Special Issue on Green Communications", Elsevier, November 25, 2014
  • P. Stewin, "Forschungsbericht: Enhanced BARM - Authentic Reporting to External Platforms", TU Berlin, Berlin, Germany, September, 2014, Link
  • C. Mulliner, R. Borgaonkar, P. Stewin, J.-P. Seifert, "Forschungsbericht: SMS-based One-Time Passwords: Attacks and Defense", TU Berlin, Berlin, Germany, September, 2014, Link
  • A. Mikityuk, B. Zachey, O. Friedrich, "Digital Rights Management and its evolution in the context of IPTV platforms in the Web domain", accepted for IEEE ICCCC, Shanghai, China, October 13-15, 2014
  • F. Ganji, S. Tajik and J.-P. Seifert, "PAC Learning of Arbiter PUFs", PROOFS: Security Proofs for Embedded Systems, Busan, Korea, 27 September, 2014
  • M. Suraev, "Implementing an affordable and effective GSM IMSI catcher with 3G authentication", accepted for SecureComm: 10th International Conference on Security and Privacy in Communication Networks, Beijing, China, 25 September, 2014
  • J. Blömer, R. Gomes da Silva, P. Günther, J. Krämer, J.-P. Seifert, "A Practical Second‐Order Fault Attack against a Real‐World Pairing Implementation", accepted for FDTC, Busan, Korea, 23 September, 2014
  • T. Fiebig, J. Krissler and R. Hänsch, "Security Impact of HighResolution Smartphone Cameras", accepted for WOOT, San Diego, CA, USA, August 18, 2014
  • S.Tajik,  D. Nedospasov, C. Helfmeier, J.-P Seifert, C. Boit,"Emission Analysis of Hardware Implementations", accepted for EUROMICRO DSD, Verona Italy, August 27-29, 2014
  • C. Horn, L. Hempel, M. Chemnitz, P. Stewin, J. Krüger, "STEUERUNG: Advanced Information Security for Critical Infrastructures", accepted for 9th SECURITY RESEARCH CONFERENCE "Future Security", Berlin, Germany, 16-18 September, 2014
  • D. Peters, U. Grottker, F. Thiel, M. Peter, J.-P. Seifert, "Achieving Software Security for Measuring Instruments under Legal Control", accepted for EAIS, Warsaw, Poland, 7-10 September, 2014. Paper
  • T. Fiebig, J. Danisevskis and M. Piekarska, "A Metric for the Evaluation and Comparison of Keylogger Performance", accepted for CSET, San Diego, CA, USA, August 18, 2014
  • S. Tajik, E. Dietz, J.-P. Seifert, D. Nedospasov, S. Frohmann, C. Helfmeier, H. Dittrich, C. Boit, "Physical Characterization of Arbiter PUFs", accepted for CHES, Busan, South Korea, September 23-26, 2014
  • M. Piekarska, B. Shastry and R. Borgaonkar, "What does the Fox Say? On the Security Architecture of Firefox OS", accepted for ARES 2014
  • F. Ganji, A. Zubow, L. Budzisz, A. Wolisz, "On detecting WLAN users communication attempts", accepted for 7th IFIP Wireless and Mobile Networking Conference, 2014
  • M. Roshandel, A. Munjal, P. Moghadam, S. Tajik and H. Ketabdar, "Multi-sensor Finger Ring for Authentication Based on 3D Signatures", accepted for Human-Computer Interaction (HCI) International 2014
  • A. Mikityuk, "Securing Virtual Service Generation on the Network: Adapting Digital Rights Management to cloud-Delivered Media", CyberSecurity, Stanford, CA, USA, 27-31 May, 2014
  • A. Cherkaoui, L. Bossuet, L. Seitz, G. Selander and R. Borgaonkar, "New Paradigms for Access Control in Constrained Environnements", ReCoSoC, Montpellier, France, 26 - 28 May, 2014
  • D. Defreez, B. Shastry, H. Chen and J.-P. Seifert, "A First Look at Firefox OS Security", Mobile Security Technologies (MoST), San Jose, CA, USA, 17 May, 2014. Paper
  • M. Piekarska, "Hide me if you can. Location Blurring on Firefox OS", IEEE S&P Poster Session, San Jose, CA, USA, 18-21 May, 2014
  • C. Helfmeier, D. Nedospasov, S. Tajik, C. Boit, J.-P. Seifert, "Physical Vulnerabilities of Physically Unclonable Functions", Design, Automation & Test in Eruope (DATE), Dresden, Germany, 24-28 March, 2014
  • X. Zhang, J.-P. Seifert, O. Aciicmez, "Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms", IEEE Transactions on Mobile Computing, Jan. 2014. IEEE computer Society Digital Library. IEEE Computer Society. Abstract
  • R. Borgaonkar, S. Liebergeld and M. Lange: "Cellpot: A Concept for Next Generation Cellular Network Honeypots", NDSS Workshop on Security of Emerging Networking Technologies (SENT), San Diego, 23-26 February, 2014
  • J.-P. Seifert, "Sicherheitsanalyse von kommerziell verfügbaren PUFs", SmartCard Workshop, Darmstadt, Germany, 5-6 February, 2014
  • J. Krämer, "Anwendungen von identitätsbasierter Kryptographie", SmartCard Workshop, Darmstadt, Germany, 5-6 February, 2014
  • J. Krämer, M. Kasper, J.-P. Seifert, "The role of photons in cryptanalysis", ASP-DAC Singapore, 20-23 January, 2014
  • B. Michéle, Andrew Karpow, "Watch and be Watched: Compromising All Smart TV Generations", IEEE CCNC, Las Vegas, USA, 10-13 January, 2014
  • A. Mikityuk, O. Friedrich, J.-P. Seifert: "Paradigm Shift in IPTV Service Generation: Comparision between locally- and Cloud-rendered IPTV UI", IEEE CCNC, Las Vegas, USA, 10-13 January, 2014

2013

  • M. Lange, S. Liebergeld: "Crossover: Secure and Usable User Interface for Mobile Devices with Multiple Isolated OS Personalities", ACSAC, Louisiana, USA, 9-13 Dec, 2013
  • Janis Danisevskis, Marta Piekarska, Jean-Pierre Seifert, "Dark Side of the Shader: Advanced GPU-aided Payload Delivery", ICISC, Seoul, Korea, 27-29 Nov, 2013
  • C. Boit, C. Helfmeier, D. Nedospasov, "Feasibly clonable functions", TrustED '13 Proceedings of the 3rd international workshop on Trustworthy embedded devices, pp. 73-74, ACM New York, USA 2013, ISBN: 978-1-4503-2486-1
  • C. Helfmeier, D. Nedospasov, C. Tarnovsky, J. Krissler, C. Boit, J-P. Seifert, "Breaking and Entering through the Silicon", ACM CCS, Berlin, Germany, November 4-8, 2013
  • Frederik Armknecht, Jean-Pierre Seifert: "Third international workshop on trustworthy embedded devices (TrustED 2013)". ACM Conference on Computer and Communications Security 2013: P. 1479-1480
  • Gelenbe, Gorbil, Tzovaras, Liebergeld, Garcia, Baltatu, Lyberopoulos "NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem", ISCIS, London, October 28-29, 2013
  • Patrick Stewin, "A Primitive for Revealing Stealthy Peripheral-based Attacks on the Computing Platform's Main Memory", RAID, St. Lucia, USA, October 23-25, 2013
  • Alexandra Mikityuk, Oliver Friedrich, Jean-Pierre Seifert: "The Virtual Set-Top Box: On the Shift of IPTV Service Execution, Service & UI Composition Into the Cloud", ICIN, Venice, October 15-16, 2013
  • Christoph Bayer, Jean-Pierre Seifert, "Trojan-Resilient Circuits", PROOFS Workshop, Santa Babara, USA,24 August, 2013 (Slides)
  • Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit, "Invasive PUF Analysis", FDTC, Santa Barbara, CA, USA, 20 August, 2013
  • Nico Golde, Kevin Redon, and Jean-Pierre Seifert, "Let Me Answer That for You: Exploiting Broadcast Information in Cellular Networks", 22nd USENIX Security Symposium, Washington, D.C., USA, August 14–16, 2013
  • Jingfei Kong, Onur Aciicmez, Jean-Pierre Seifert,  Huiyang Zhou: "Architecting against Software Cache-Based Side-Channel Attacks", IEEE Transactions on Computers, vol. 62, no. 7, pp. 1276-1288, July, 2013
  • Konrad Rieck, Patrick Stewin, Jean-Pierre Seifert (eds.), Proceedings of the Conference on Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013, Revised Selected Papers. Lecture Notes in Computer Science 7697, Springer 2013, ISBN 978-3-642-39234-4
  • C. Mulliner, R. Borgaonkar, P. Stewin, J.-P. Seifert, "SMS-based One-Time Passwords: Attacks and Defense", Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Berlin, Germany, 17-19 July, 2013
  • Gelenbe, Gorbil, Tzovaras, Liebergeld, Garcia, Baltatu, Lyberopoulos"Security for Smart Mobile Networks: The NEMESYS Approach", PRISMS, New Jersey, June 24-27, 2013
  • Nordholz, Aigner, England, "Improving Trusted Tickets with State-Bound Keys", 6th International Conference on Trust & Trustworthy Computing (TRUST 2013), London, June 17-19, 2013
  • Helfmeier, Nedospasov, Boit, Seifert, "Cloning Physically Unclonable Functions", IEEE Symposium on Hardware-Oriented Security and Trust (HOST), Austin TX, June 2-3, 2013
  • Schlösser, Nedospasov, Krämer, Orlic, Seifert, "Simple Photonic Emission Analysis of AES", Journal of Cryptographic Engineering, Springer-Verlag, 2013
  • Liebergeld, Lange, Mulliner, "Nomadic Honeypots: A Novel Concept for Smartphone Honeypots", Workshop on Mobile Security Technology (MoST), in conjunction with the 34th IEEE Symposium on Security and Privacy, May 2013
  • Matthias Lange, "Securing Two-factor Authentication for Smartphones in a Usable Way by Adding a Connected Token", TinyToCS Vol. 2, Tiny Transactions on Computer Systems, 2013
  • Krämer, Nedospasov, Schlösser, Seifert, "Differential Photonic Emission Analysis", COSADE 2013, Paris, France, March 7-8, 2013

Nach oben

2012

  • M. Arapinis, L. Mancini, E. Ritter, M. Ryan, Nico Golde, Kevin Redon and Ravishankar Borgaonkar "New privacy issues in mobile telephony: fix and verification" to be appear in 19th ACM Conference on Computer and Communications Security (CCS 2012), Raleigh, NC, USA, Oct. 2012 Paper (PDF, 324,3 KB)
  • Alexander Schlösser, Dmitry Nedospasov, Juliane Krämer, Susanna Orlic and Jean-Pierre Seifert: Simple Photonic Emission Analysis of AES. Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), Leuven, Belgium, September 2012
  • Collin Mulliner, Benjamin Michéle: "Read It Twice! A mass-storage-based TOCTTOU attack", In the Proceedings of the 6th USENIX Workshop on Offensive Technologies (WOOT) Bellevue, WA, USA August 2012
  • Patrick Stewin and Iurii Bystrov: Understanding DMA Malware, Proceedings of the 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 26-27th, 2012, Heraklion, Crete, Greece [PDF]
  • Christoph Bayer: Hardware Trojans. In Patrick Stewin and Collin Mulliner, editors, Proceedings of the Seventh GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING). Technical Report SR-2012-01, page 11. GI FG SIDAR, Berlin, Juli 2012.
  • Patrick Stewin and Collin Mulliner (eds.), Proceedings of the 7th GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), Technical Report SR-2012-01, ISSN 2190-846X, Berlin, Germany, July 5-6, 2012
  • Collin Mulliner, Steffen Liebergeld, Matthias Lange, and Jean-Pierre Seifert: Taming Mr Hayes: Mitigating Signaling Based Attacks on Smartphones to appear in the Proceedings of the IEEE/IFIP 41st International Conference on Dependable Systems Networks (DSN) Boston, MA, USA 25-28 June 2012
  • Dmitry Nedospasov, Alexander Schlösser, Jean-Pierre Seifert, Susanna Orlic: Functional integrated circuit analysis. IEEE HOST 2012, San Francisco, June 2012: pp. 102-107
  • Benjamin Michéle, Juliane Krämer and Jean-Pierre Seifert: Structure-Based RSA Fault Attacks. 8th International Conference on Information Security Practice and Experience (ISPEC 2012), Hangzhou, China, April 2012
  • Jingfei Kong, Onur Aciicmez, Jean-Pierre Seifert, Huiyang Zhou, "Architecting Against Software Cache-based Side Channel Attacks," IEEE Transactions on Computers, 28 March 2012. IEEE computer Society Digital Library. IEEE Computer Society, Abstract
  • Collin Mulliner: Persönliche Datenspuren bei der mobilen Internetnutzung Datenschutz und Datensicherheit (DuD) Issue 3/2012, pages 180-184 Germany March 2012
  • Wenjuan Xu, Xinwen Zhang, Hongxin Hu, Gail-Joon Ahn, Jean-Pierre Seifert: Remote Attestation with Domain-Based Integrity Model and Policy Analysis. IEEE Trans. Dependable Sec. Comput. 9(3): 429-442 (2012). Abstract
  • Nico Golde, Kevin Redon and Ravishankar Borgaonkar " Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications " to be appear in 19th Annual Network and Distributed System Security Symposium, (NDSS 2012), San Diego, February 2012

Nach oben

2011

  • Juliane Krämer, Dmitry Nedospasov and Jean-Pierre Seifert: Weaknesses in Current RSA Signature Schemes. Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea
  • Steffen Liebergeld, Matthias Lange, Adam Lackorzynski, Alexander Warg: "Hochsichere Smartphones mit L4Android". In "Smart Mobile Apps", ISBN 978-3-642-22258-0, Hrsg Verclas, Stephan und Linnhoff-Popien, Claudia.
  • Ravishankar Borgaonkar, Kevin Redon and Jean-Pierre Seifert. "Security Analysis of a Femtocell device". To be published in the 4th ACM International Conference on Security of Information and Networks (SIN), Sydney, Australia, November 14-19, 2011.
  • Patrick Stewin, Jean-Pierre Seifert and Collin Mulliner (2011). "Poster: Towards Detecting DMA Malware." to be published in CCS '11: Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM.
  • Jean-Pierre Seifert: "Security in Telecommunications", in PIK - Praxis der Informationsverarbeitung und Kommunikation, Volume 34, pp. 160-162, 2011.
  • Matthias Lange, Steffen Liebergeld, Adam Lackorzynski, Alexander Warg, Michael Peter: "L4Android: A Generic Operating System Framework for Secure Smartphones", In proceedings of the 2011 ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, Chicago, IL, USA, OCT 17-21 2011 PDF
  • Collin Mulliner, Nico Golde, and Jean-Pierre Seifert: SMS of Death: from analyzing to attacking mobile phones on a large scale, In the Proceedings of the 20th USENIX Security Symposium San Francisco, CA, USA 10-12 August 2011 PDF, BibTeX entry, Slides (acceptance rate 35/204=17.2%)
  • Patrick Stewin: "Evaluating "Ring -3" Rootkits", In Sebastian Uellenbeck, editor, Proceedings of the Sixth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING). Technical Report SR-2011-01, page 7. GI FG SIDAR, Bochum, March 2011. (abstract)
  • Matthias Lange: "OS Agnostic Sandboxing Using Virtual CPUs", In Sebastian Uellenbeck, editor, Proceedings of the Sixth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING). Technical Report SR-2011-01, page 8. GI FG SIDAR, Bochum, March 2011. (abstract)

Nach oben

2010

  • Juliane Krämer and Benjamin Michéle, "Erfolgreiche Faktorisierungsangriffe gegen RSA in der Praxis", Tagungsband des 13. Kryptotags (p. 8), Workshop der Fachgruppe "Angewandte Kryptographie" der "Gesellschaft für Informatik e.V.", Darmstadt, 14 December, 2010
  • Xinwen Zhang, Jean-Pierre Seifert, and Onur Aciicmez. SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms. In the 12th International Conference on Information and Communications Security (ICICS), 2010, PDF
  • Wenjuan Xu, Gail-Joon Ahn, Hongxin Hu, Xinwen Zhang, and Jean-Pierre Seifert. DR@FT: Efficient Remote Attestation Framework for Dynamics Systems. In the 15th European Symposium on Research in Computer Security (ESORICS), 2010, PDF
  • Mohammad Nauman, Sohail Khan, Xinwen Zhang, and Jean-Pierre Seifert. Beyond Kernel-level Integrity Measurement: Enabling Remote Attestation for the Android Platform. In the 3rd International Conference on Trust and Trustworthy Computing (TRUST), 2010, PDF
  • Ravishankar Borgaonkar and Kevin Redon and Jean-Pierre Seifert "Experimental Analysis of the Femtocell Location Verification Techniques" In the Proceedings of the 15th Nordic Conference in Secure IT Systems (NordSec) Helsinki, Finland 27-30 October, 2010 PDF (PDF, 124,0 KB)
  • Collin Mulliner and Jean-Pierre Seifert "Rise of the iBots: 0wning a telco network" In the Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software (Malware) Nancy, France 19-20 October, 2010 PDF, BibTeX entry, Slides
  • Collin Mulliner "Privacy Leaks in Mobile Phone Internet Access" In the Proceedings of the 14th International Conference on Intelligence in Next Generation Networks (ICIN) Berlin, Germany 11-14 October, 2010 PDF, BibTeX entry, Slides Best Paper
  • Sachin Agarwal, Christoph Peylo, Ravishankar Borgaonkar and Jean-Pierre Seifert "Operator Based Over-the-air M2M Wirelss Sensor Network Security" In the Proceedings of the 14th International Conference on Intelligence in Next Generation Networks (ICIN) Berlin, Germany 11-14 October, 2010 PDF (PDF, 214,7 KB)
  • Patrick Stewin and Jean-Pierre Seifert: "In God We Trust All Others We Monitor - Extended Abstract", Accepted for Poster/Demo Session at the 17th ACM Conference on Computer and Communications Security, October 5, 2010, Chicago, Illinois, USA (abstract)
  • Ravishankar Borgaonkar " An Analysis of Asprox Botnet" In the prodeedings of the Fourth International Conference on Emerging Security Information, Systems and Technologies (Securware) 2010,  18-25 July, Venice, Italy PDF (PDF, 236,5 KB) BibTex entry (BIB, 425,0 B).
  • Patrick Stewin: "Learning from Rootkits", In Sebastian Schmerl, Simon Hunke, editors, Proceedings of the Fifth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), Technical Report SR-2010-01, page 12, GI FG SIDAR, Bonn, July 2010 (abstract)
  • Jean-Pierre Seifert, Xie Liang, Zhang Xinwen, Zhu Sencun. pBMDS: A Behavior-based Malware Detection System for Cellphone Devices. In the proceedings of 3rd ACM conference on wireless network security (WiSec), March 2010, NY, USA.

Nach oben

2009

  • Jean-Pierre Seifert, Jingfei Kong, Onur Aciiçmez and Huiyang Zhou. Hardware-software integrated approaches to defend against software cache-based side channel attacks. In the proceedings of 15th International Conference on High-Performance Computer Architecture (HPCA-15 2009), 14-18 February 2009, Raleigh, North Carolina, USA.
  • Collin Mulliner and Charlie Miller "Injecting SMS Messages into Smart Phones for Security Analysis" In the Proceedings of the 3rd USENIX Workshop on Offensive Technologies (WOOT) Montreal, Canada August 2009 PDF, BibTeX entry, Slides
  • Jean-Pierre Seifert, Xinwen Zhang, Onur Aciiçmez. Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms. pp 71-82, MobiSec 2009.
  • Jean-Pierre Seifert, Onur Aciiçmez, Xinwen Zhang. A secure DVB set-top box via trusting computing technologies. In the proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, 2009, Las Vegas, NV, USA.
  • Jean-Pierre Seifert and Shay Gueron. Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009.

Nach oben

Zusatzinformationen / Extras

Direktzugang

Schnellnavigation zur Seite über Nummerneingabe

Postal Address

Technische Universität Berlin - An-Institut Telekom Innovation Laboratories
Fakultät IV
Sekr. TEL17
Ernst-Reuter-Platz 7
10587 Berlin

Assistant

Claudia Petzsch
+49 - 30 - 8353 58 681
TEL
Raum TEL17