Skip to main content Skip to main navigation

Publikationen

Seite 1 von 2.

  1. Kangjie Lu; Marie-Therese Walter; David Pfaff; Stefan Nürnberger; Wenke Lee; Michael Backes

    Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying

    In: 24th Annular Symposium on Network and Distributed System Security (NDSS 2017). Symposium on Network and Distributed System Security (NDSS), …

  2. Johannes Götzfried; Tilo Müller; Gabor Drescher; Stefan Nürnberger; Michael Backes

    RamCrypt: Kernel-based Address Space Encryption for User-mode Processes

    In: Proceedings of the 11th ACM Symposium on Information, Computer and Communications Security. ACM Symposium on Information, Computer and …

  3. Johannes Krupp; Dominique Schröder; Mark Simkin; Dario Fiore; Giuseppe Ateniese; Stefan Nürnberger

    Nearly Optimal Verifiable Data Streaming

    In: Chen-Mou Cheng; Kai-Min Chung; Giuseppe Persiano; Bo-Yin Yang (Hrsg.). 19th IACR International Conference on Practice and Theory in Public-Key …

  4. Kangjie Lu; Stefan Nürnberger; Michael Backes; Wenke Lee

    How to make ASLR win the Clone Wars: Runtime Re-Randomization

    In: Kangjie Lu; Stefan Nürnberger; Michael Backes; Wenke Lee (Hrsg.). Network and Distributed System Security Symposium. Symposium on Network and …

  5. Michael Backes; Rainer W. Gerling; Sebastian Gerling; Stefan Nürnberger; Dominique Schröder; Mark Simkin

    WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP

    In: ACNS. International Conference on Applied Cryptography and Network Security (ACNS-2014), June 10-13, Lausanne, Switzerland, Pages 401-418, Lecture …

  6. Michael Backes; Stefan Nürnberger

    Oxymoron - Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing

    In: Proceedings of the 23rd USENIX Security Symposium. USENIX Security Symposium (USENIX-2014), August 20-22, San Diego, CA, USA, ISBN …

  7. Michael Backes; Thorsten Holz; Benjamin Kollenda; Philipp Koppe; Stefan Nürnberger; Jannik Pewny

    You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code

    In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM Conference on Computer and Communications Security …

  8. Sören Bleikertz; Sven Bugiel; Hugo Ideler; Stefan Nürnberger; Ahmad-Reza Sadeghi

    Client-controlled Cryptography-as-a-Service in the Cloud

    In: Proceedings of the 11th International Conference on Applied Cryptography and Network Security 2013. International Conference on Applied …

  9. Lucas Davi; Alexandra Dmitrienko; Stefan Nürnberger; Ahmad-Reza Sadeghi

    Gadge Me if You Can: Secure and Efficient Ad-Hoc Instruction-Level Randomization for x86 and ARM

    In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. ACM Symposium on Information, Computer and …

  10. Lucas Davi; Alexandra Dmitrienko; Manuel Egele; Thomas Fischer; Thorsten Holz; Ralf Hund; Stefan Nürnberger; Ahmad-Reza Sadeghi

    MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones

    In: Proceedings of the 19th Annual Network & Distributed System Security Symposium. Symposium on Network and Distributed System Security (NDSS-2012), …