Return-oriented programming without returns S Checkoway, L Davi, A Dmitrienko, AR Sadeghi, H Shacham, ... Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 828 | 2010 |
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization KZ Snow, F Monrose, L Davi, A Dmitrienko, C Liebchen, AR Sadeghi 2013 IEEE symposium on security and privacy, 574-588, 2013 | 752 | 2013 |
Software grand exposure:{SGX} cache attacks are practical F Brasser, U Müller, A Dmitrienko, K Kostiainen, S Capkun, AR Sadeghi 11th USENIX workshop on offensive technologies (WOOT 17), 2017 | 737 | 2017 |
Privilege escalation attacks on android L Davi, A Dmitrienko, AR Sadeghi, M Winandy Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011 | 682 | 2011 |
Towards Taming Privilege-Escalation Attacks on Android. S Bugiel, L Davi, A Dmitrienko, T Fischer, AR Sadeghi, B Shastry NDSS 17, 19, 2012 | 574 | 2012 |
Xmandroid: A new android evolution to mitigate privilege escalation attacks S Bugiel, L Davi, A Dmitrienko, T Fischer, AR Sadeghi Technische Universität Darmstadt, Technical Report TR-2011-04, 2011 | 414 | 2011 |
Practical and lightweight domain isolation on android S Bugiel, L Davi, A Dmitrienko, S Heuser, AR Sadeghi, B Shastry Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011 | 282 | 2011 |
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones. L Davi, A Dmitrienko, M Egele, T Fischer, T Holz, R Hund, S Nürnberger, ... NDSS 26, 27-40, 2012 | 248 | 2012 |
Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM LV Davi, A Dmitrienko, S Nürnberger, AR Sadeghi Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 151 | 2013 |
chain: How to Forget without Hard Forks I Puddu, A Dmitrienko, S Capkun Cryptology ePrint Archive, 2017 | 123 | 2017 |
On the (in) security of mobile two-factor authentication A Dmitrienko, C Liebchen, C Rossow, AR Sadeghi Financial Cryptography and Data Security: 18th International Conference, FC …, 2014 | 117 | 2014 |
Mind the gap: Security & privacy risks of contact tracing apps L Baumgärtner, A Dmitrienko, B Freisleben, A Gruler, J Höchst, ... 2020 IEEE 19th international conference on trust, security and privacy in …, 2020 | 91 | 2020 |
Method for operating a blockchain I Puddu, A Dmitrienko, G Karame, S Capkun US Patent App. 16/495,436, 2020 | 90 | 2020 |
Receiving a Delegated Token, Issuing a Delegated Token, Authenticating a Delegated User, and Issuing a User-Specific Token for a Resource A Dmitrienko, AR Sadeghi, C Wachsmann US Patent App. 13/912,617, 2014 | 85 | 2014 |
DR. SGX: Automated and adjustable side-channel protection for SGX using data location randomization F Brasser, S Capkun, A Dmitrienko, T Frassetto, K Kostiainen, ... Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 77 | 2019 |
Return-oriented programming without returns on ARM L Davi, A Dmitrienko, AR Sadeghi, M Winandy Technical Report HGI-TR-2010-002, Ruhr-University Bochum, 2010 | 71 | 2010 |
Security analysis of mobile two-factor authentication schemes. A Dmitrienko, C Liebchen, C Rossow, AR Sadeghi Intel Technology Journal 18 (4), 2014 | 64 | 2014 |
Smart keys for cyber-cars: Secure smartphone-based NFC-enabled car immobilizer C Busold, A Taha, C Wachsmann, A Dmitrienko, H Seudié, M Sobhani, ... Proceedings of the third ACM conference on Data and application security and …, 2013 | 61 | 2013 |
Trusted Virtual Domains–design, implementation and lessons learned L Catuogno, A Dmitrienko, K Eriksson, D Kuhlmann, G Ramunno, ... Trusted Systems: First International Conference, INTRUST 2009, Beijing …, 2010 | 55 | 2010 |
Do i know you? efficient and privacy-preserving common friend-finder protocols and applications M Nagy, E De Cristofaro, A Dmitrienko, N Asokan, AR Sadeghi Proceedings of the 29th Annual Computer Security Applications Conference …, 2013 | 53 | 2013 |