Analyse verbreiteter Anwendungen zum Lesen von elektronischen Büchern Z Benenson, F Berger, A Cherepantsev, S Datsevich, L Do, M Eckert, ... | 6 | 2019 |
{EL3XIR}: Fuzzing {COTS} Secure Monitors C Lindenmeier, M Payer, M Busch 33rd USENIX Security Symposium (USENIX Security 24), 5395-5412, 2024 | 3 | 2024 |
Key extraction-based lawful access to encrypted data: Taxonomy and survey C Lindenmeier, A Hammer, J Gruber, J Röckl, F Freiling Forensic Science International: Digital Investigation 50, 301796, 2024 | 1 | 2024 |
SyncEmu: Enabling Dynamic Analysis of Stateful Trusted Applications C Lindenmeier, M Schulze, J Röckl, M Busch 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2024 | | 2024 |
Conditional Network Availability: Enhancing Connectivity Guarantees for TEE-Based Services J Röckl, C Lindenmeier, M Schulze, T Müller 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2024 | | 2024 |
BarriCCAde: Isolating Closed-Source Drivers with ARM CCA M Schulze, C Lindenmeier, J Röckl 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2024 | | 2024 |
InvesTEE: A TEE-supported Framework for Lawful Remote Forensic Investigations C Lindenmeier, J Gruber, F Freiling Digital Threats: Research and Practice, 2024 | | 2024 |