Stefan Nürnberger
Stefan Nürnberger
CISPA, Saarland University, Saarland Informatics Campus
Verifierad e-postadress på cispa.saarland - Startsida
Titel
Citeras av
Citeras av
År
Twin clouds: An architecture for secure cloud computing
S Bugiel, S Nurnberger, A Sadeghi, T Schneider
Workshop on cryptography and security in clouds (WCSC 2011) 1217889, 2011
2422011
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
L Davi, A Dmitrienko, M Egele, T Fischer, T Holz, R Hund, S Nürnberger, ...
NDSS 26, 27-40, 2012
2012012
You can run but you can't read: Preventing disclosure exploits in executable code
M Backes, T Holz, B Kollenda, P Koppe, S Nürnberger, J Pewny
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1752014
Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing
M Backes, S Nürnberger
USENIX Security, 2014
1722014
AmazonIA: when elasticity snaps back
S Bugiel, S Nürnberger, T Pöppelmann, AR Sadeghi, T Schneider
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1492011
Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM
LV Davi, A Dmitrienko, S Nürnberger, AR Sadeghi
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
1082013
Twin clouds: Secure cloud computing with low latency
S Bugiel, S Nürnberger, AR Sadeghi, T Schneider
IFIP International Conference on Communications and Multimedia Security, 32-44, 2011
1042011
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.
K Lu, W Lee, S Nürnberger, M Backes
NDSS, 2016
732016
–vatican–vetted, authenticated can bus
S Nürnberger, C Rossow
International Conference on Cryptographic Hardware and Embedded Systems, 106-124, 2016
562016
Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying.
K Lu, MT Walter, D Pfaff, S Nümberger, W Lee, M Backes
NDSS, 2017
372017
Client-controlled cryptography-as-a-service in the cloud
S Bleikertz, S Bugiel, H Ideler, S Nürnberger, AR Sadeghi
International Conference on Applied Cryptography and Network Security, 19-36, 2013
272013
Ramcrypt: Kernel-based address space encryption for user-mode processes
J Götzfried, T Müller, G Drescher, S Nürnberger, M Backes
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
242016
Nearly optimal verifiable data streaming
J Krupp, D Schröder, M Simkin, D Fiore, G Ateniese, S Nuernberger
Public-Key Cryptography–PKC 2016, 417-445, 2016
172016
Single Reflection Spatial Voting: A novel method for discovering reflective surfaces using indoor positioning systems
RK Harle, A Ward, A Hopper
Proceedings of the 1st international conference on Mobile systems …, 2003
132003
Webtrust–a comprehensive authenticity and integrity framework for HTTP
M Backes, RW Gerling, S Gerling, S Nürnberger, D Schröder, M Simkin
International Conference on Applied Cryptography and Network Security, 401-418, 2014
122014
Xifer: A software diversity tool against code-reuse attacks
L Davi, A Dmitrienko, S Nürnberger, AR Sadeghi
4th ACM International Workshop on Wireless of the Students, by the Students …, 2012
122012
Autonome Systeme
S Nürnberger, S Bugiel
Datenschutz und Datensicherheit-DuD 40 (8), 503-506, 2016
82016
Poster: Control-flow integrity for smartphones
L Davi, A Dmitrienko, M Egele, T Fischer, T Holz, R Hund, S Nürnberger, ...
Proceedings of the 18th ACM conference on Computer and communications …, 2011
52011
TClouds: Privacy and Resilience for Internet− scale Critical Infrastructures
A Bessani, IM Abbadi, S Bugiel, E Cesena, M Deng, M Gr, N Marnau, ...
42012
Security of robust audio hashes
S Thiemert, S Nürnberger, M Steinebach, S Zmudzinski
2009 First IEEE International Workshop on Information Forensics and Security …, 2009
42009
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20