copyright reference: Thomas Ott / TU Darmstadt

Publications

Additional Attributes

Type

POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs

Ahmad-Reza Sadeghi, Ghada Dessouky
In: ACM WiSec 2016, July 2016
[Inproceedings]

GarbledCPU: A MIPS Processor for Secure Computation in Hardware

Ebrahim Songhori, Shaza Zeitouni, Ghada Dessouky, Thomas Schneider, Ahmad-Reza Sadeghi, Farinaz Koushanfar
In: 53rd Design Automation Conference (DAC'16), June 2016
[Inproceedings]

Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity

Dean Sullivan, Orlando Arias, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Yier Jin
In: 53rd Design Automation Conference (DAC), June 2016
[Inproceedings]

Regulating ARM TrustZone Devices in Restricted Spaces

Ferdinand Brasser, Vinod Ganapathy, Liviu Iftode, Daeyoung Kim, Christopher Liebchen, Ahmad-Reza Sadeghi
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), June 2016
[Inproceedings]

Things, Trouble, Trust: On Building Trust in IoT Systems

Tigist Abera, Nadarajah Asokan, Lucas Davi, Farinaz Koushanfar, Andrew Praverd, Gene Tsudik, Ahmad-Reza Sadeghi
In: 53rd Design Automation Conference (DAC), June 2016
[Inproceedings]

Subversive-C: Abusing and Protecting Dynamic Message Dispatch

Julian Lettner, Benjamin Kollenda, Andrei Homescu, Per Larsen, Felix Schuster, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Michael Franz
In: USENIX Annual Technical Conference (ATC), June 2016
[Inproceedings]

Remanence Decay Side-Channel: The PUF Case

Shaza Zeitouni, Yossef Oren, Christian Wachsmann, Patrick Koeberl, Ahmad-Reza Sadeghi
In: IEEE Transactions on Information Forensics and Security, Vol. 99, March 2016
[Article]

The Cybersecurity Landscape in Industrial Control Systems

Stephen McLaughlin, Charalambos Konstantinou, Xueyang Wang, Lucas Davi, Ahmad-Reza Sadeghi, Michail Maniatakos, Ramesh Karri
In: Proceedings of the IEEE, Vol. PP, March 2016
[Online-Edition: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=7434576]
[Article]

Leakage-Resilient Layout Randomization for Mobile Devices

Kjell Braden, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Christopher Liebchen, Ahmad-Reza Sadeghi
In: 23rd Annual Network & Distributed System Security Symposium (NDSS), February 2016
[Inproceedings]

Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android

Stephan Heuser, Marco Negro, Praveen Kumar Pendyala, Ahmad-Reza Sadeghi
January 2016
[Techreport]