Prof. Dr. Ing. Ahmad-Reza Sadeghi

Professor - System Security Lab

Mornewegstrasse 32
D-64293 Darmstadt
GERMANY

Room:4.1.06
Tel:+49 (0)6151 16 - 25328
Email:

ahmad.sadeghi(a-t)trust.tu-darmstadt.de  PGP-Key  S/MIME Certificate

Website:http://​trust.​tu-darmstadt.​de

 

 

Short CV

Ahmad-Reza Sadeghi is a full Professor of Computer Science at the Technische Universität Darmstadt, in Germany, where he heads the System Security Lab.  Since January 2012 he is also the Director of Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at TU Darmstadt. He is a member of the profile area CYSEC of TU Darmstadt.

He received his PhD in Computer Science with the focus on privacy protecting cryptographic protocols and systems from the University of Saarland in Saarbrücken, Germany. Prior to academia, he worked in Research and Development of Telecommunications enterprises, amongst others Ericson Telecommunications.  He has been leading and involved in a variety of national and international research and development projects on design and implementation of Trustworthy Computing Platforms and Trusted Computing, Security Hardware, and Applied Cryptography. He has been serving as general or program chair as well as program committee member of major conferences and workshops in Information Security and Privacy. He is Editor-In-Chief of IEEE Security and Privacy Magazine, and on the editorial board of ACM Books. He served 5 years on the editorial board of the ACM Transactions on Information and System Security (TISSEC), and was guest editor of the IEEE Transactions on Computer-Aided Design (Special Issue on Hardware Security and Trust).

Prof. Sadeghi has been awarded with the renowned German prize “Karl Heinz Beckurts” for his research on Trusted and Trustworthy Computing technology and its transfer to industrial practice. The award honors excellent scientific achievements with high impact on industrial innovations in Germany. Further, his group received German IT Security Competition Award 2010. 

 

Book: Towards Hardware-Intrinsic Security 

"This book will prove to be very interesting for professionals in the hardware security field. It covers almost every aspect of this area, with excellent papers written by experts."

Javier Castillo, ACM Computing Reviews, June 2011

Academic Activities

 

ACM Books, Area Editor (Security and Privacy)

General Chair

  • ACM Conference on Computer and Communications Security (ACM CCS) 2013
  • International Conference on Trust and Trustworthy Computing (TRUST) 2010

Program (Co-) Chair

  • Financial Cryptography and Data Security (FC) 2013
  • ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) 2013
  • International Conference on Cryptology and Network Security (CANS) 2012
  • International Workshop on Trustworthy Embedded Devices (TrustED) 2012
  • SecureCloud 2012
  • ACM Workshop on Digital Rights Management (ACM DRM) 2011
  • ACM Workshop on Scalable Trusted Computing (ACM STC) 2011
  • International Conference on Trust and Trustworthy Computing (TRUST) 2011

Program Committee

  • IEEE Workshop on Mobile Security Technologies (MoST), co-located with IEEE S&P, 2013
  • IEEE Symposium on Security & Privacy (IEEE S&P) 2013
  • ACM Conference on Computer and Communications Security (ACM CCS) 2012
  • Network & Distributed System Security Symposium (NDSS) 2013, 2012
  • ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec) 2012
  • European Symposium on Research in Computer Security (ESORICS) 2013, 2012, 2011
  • ACM Symposium on Information, Computer and Communications Security (AsiaCCS) 2013, 2012
  • ACM Conference on Data and Application Security and Privacy (CODASPY) 2013
  • ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (ACM SPSM) 2012
  • ACM Cloud Computing Security Workshop (ACM CCSW) 2012
  • Workshop on RFID Security and Privacy (RFIDSec) 2012
  • Conference on Privacy, Security and Trust (PST) 2012
  • ACM SIGHIT International Health Informatics Symposium (IHI) 2012
  • IEEE International Workshop on Information Forensics and Security (WIFS) 2012
  • IEEE Symposium on Hardware-Oriented Security and Trust (HOST) 2012, 2009
  • Information Hiding Conference (IH) 2012, 2011
  • International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM) 2012, 2011
  • International Multidisciplinary Privacy Award (CPDP MPA) 2012, 2011
  • Smart Card Research and Advanced Application Conference (CARDIS) 2012
  • Financial Cryptography and Data Security (FC) 2011, 2006, 2005
  • Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2011, 2005
  • International Conference on Applied Cryptography and Network Security (ACNS) 2011, 2010
  • International Conference on Information Security and Cryptology (ISISC) 2011
  • Computer & Electronics Security Applications Rendez-vous (C&ESAR) 2011
  • International Conference on Network and System Security (NSS) 2011
  • International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2011
  • International Conference on Trusted Systems (INTRUST) 2011, 2010, 2009
  • International Workshop on Trustworthy Embedded Devices (TrustED) 2011
  • Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications (LightSec) 2011
  • Workshop on Real-Life Cryptographic Protocols and Standardization (RLCPS) 2011, 2010
  • Workshop on Secure Data Management (SDM) 2011
  • International Conference on E-voting and Identity (VoteID) 2009
  • ACM Workshop on Scalable Trusted Computing (ACM STC) 2008, 2006
  • Benelux Workshop on Information and System Security 2006
  • International Conference on Cryptology in India (INDOCRYPT) 2006
  • International Workshop on Digital Watermarking (IWDW) 2006
  • International Workshop on Information Security Applications (WISA) 2006
  • Workshop on Advances in Trusted Computing (WATC) 2006
  • ACM Workshop on Digital Rights Management (ACM DRM) 2005, 2004, 2003
  • Information Security and Hiding (ISH) 2005
  • New Security Paradigm Workshop (NSPW) 2005, 2004
  • SKOLIS Conference on Information Security and Cryptography (CISC) 2005
  • European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS) 2004

Publications

2017

Phonion: Practical Protection of Metadata in Telephony Networks

Stephan Heuser, Bradley Reaves, Praveen Kumar Pendyala, Henry Carter, Alexandra Dmitrienko, Negar Negar, William Enck, Ahmad-Reza Sadeghi, Patrick Traynor
In: Proceedings on Privacy Enhancing Technologies (PoPETs), July 2017
[Inproceedings]

Toward Practical Secure Stable Matching

M. Sadegh Riazi, Ebrahim Songhori, Ahmad-Reza Sadeghi, Thomas Schneider, Farinaz Koushanfar
In: Proceedings on Privacy Enhancing Technologies (PoPETs), July 2017
[Inproceedings]

2016

Towards a Policy-Agnostic Control-Flow Integrity Implementation

Dean Sullivan, Orlando Arias, Lucas Davi, Ahmad-Reza Sadeghi, Yier Jin
In: Black Hat Europe, November 2016
[Inproceedings]

C-FLAT: Control-Flow Attestation for Embedded Systems Software

Tigist Abera, Nadarajah Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik
In: 23rd ACM Conference on Computer and Communications Security (CCS), October 2016
[Inproceedings]

SANA: Secure and Scalable Aggregate Network Attestation

Ahmad-Reza Sadeghi, Matthias Schunter, Ahmad Ibrahim, Mauro Conti, Gregory Neven
In: 23rd ACM Conference on Computer and Communications Security (CCS) 2016, October 2016
CCS 2016
[Inproceedings]

SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles

Luke Deshotels, Razvan Deaconescu, Mihai Chiroiu, Lucas Davi, William Enck, Ahmad-Reza Sadeghi
In: 23rd ACM Conference on Computer and Communications Security (CCS), October 2016
[Inproceedings]

Selfrando: Securing the Tor Browser against De-anonymization Exploits

Mauro Conti, Stephen Crane, Tommaso Frassetto, Andrei Homescu, Georg Koppen, Per Larsen, Christopher Liebchen, Mike Perry, Ahmad-Reza Sadeghi
In: The annual Privacy Enhancing Technologies Symposium (PETS), July 2016
[Inproceedings]

DARPA: Device Attestation Resilient to Physical Attacks

Ahmad Ibrahim, Ahmad-Reza Sadeghi, Gene Tsudik, Shaza Zeitouni
In: ACM WiSEC 2016, July 2016
[Inproceedings]

POSTER: Toward a Secure and Scalable Attestation

Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter
In: ACM WiSEC 2016, July 2016
[Inproceedings]

POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs

Ahmad-Reza Sadeghi, Ghada Dessouky
In: ACM WiSec 2016, July 2016
[Inproceedings]

Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity

Dean Sullivan, Orlando Arias, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Yier Jin
In: 53rd Design Automation Conference (DAC), June 2016
[Inproceedings]

Regulating ARM TrustZone Devices in Restricted Spaces

Ferdinand Brasser, Vinod Ganapathy, Liviu Iftode, Daeyoung Kim, Christopher Liebchen, Ahmad-Reza Sadeghi
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), June 2016
[Inproceedings]

Things, Trouble, Trust: On Building Trust in IoT Systems

Tigist Abera, Nadarajah Asokan, Lucas Davi, Farinaz Koushanfar, Andrew Praverd, Gene Tsudik, Ahmad-Reza Sadeghi
In: 53rd Design Automation Conference (DAC), June 2016
[Inproceedings]

Subversive-C: Abusing and Protecting Dynamic Message Dispatch

Julian Lettner, Benjamin Kollenda, Andrei Homescu, Per Larsen, Felix Schuster, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Michael Franz
In: USENIX Annual Technical Conference (ATC), June 2016
[Inproceedings]

Remanence Decay Side-Channel: The PUF Case

Shaza Zeitouni, Yossef Oren, Christian Wachsmann, Patrick Koeberl, Ahmad-Reza Sadeghi
In: IEEE Transactions on Information Forensics and Security, Vol. 99, March 2016
[Article]

The Cybersecurity Landscape in Industrial Control Systems

Stephen McLaughlin, Charalambos Konstantinou, Xueyang Wang, Lucas Davi, Ahmad-Reza Sadeghi, Michail Maniatakos, Ramesh Karri
In: Proceedings of the IEEE, Vol. PP, March 2016
[Online-Edition: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=7434576]
[Article]

Leakage-Resilient Layout Randomization for Mobile Devices

Kjell Braden, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Christopher Liebchen, Ahmad-Reza Sadeghi
In: 23rd Annual Network & Distributed System Security Symposium (NDSS), February 2016
[Inproceedings]

Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android

Stephan Heuser, Marco Negro, Praveen Kumar Pendyala, Ahmad-Reza Sadeghi
January 2016
[Techreport]

DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android

Praveen Kumar Pendyala Stephan Heuser, Ahmad-Reza Sadeghi
In: Financial Crypto 2016, January 2016
[Inproceedings]

Towards a Unified Security Model for Physically Unclonable Functions

Ahmad-Reza Sadeghi, Frederik Armknecht
In: CT-RSA - Cryptographers' Track at the RSA Conference, 2016
[Inproceedings]

GarbledCPU: A MIPS Processor for Secure Computation in Hardware

Ebrahim Songhori, Shaza Zeitouni, Ghada Dessouky, Thomas Schneider, Ahmad-Reza Sadeghi, Farinaz Koushanfar
In: 53rd Design Automation Conference (DAC) 2016, 2016
[Inproceedings]

Remote Attestation for Low-End Embedded Devices: the Prover's Perspective

Ferdinand Brasser, Kasper Rasmussen, Ahmad-Reza Sadeghi, Gene Tsudik
In: Proceedings of the 53nd Annual Design Automation Conference, 2016
ACM
[Inproceedings]

Can IoT be Secured: Emerging Challenges in Connecting the Unconnected

Nancy Cam-Winget, Ahmad-Reza Sadeghi, Yier Jin
In: 53rd Design Automation Conference (DAC), 2016
[Inproceedings]

Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments

Thien Duc Nguyen Markus Miettinen, Ahmad-Reza Sadeghi
In: Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16), 2016
[Inproceedings]

2015

Building Secure Defenses Against Code-Reuse Attacks

Lucas Davi, Ahmad-Reza Sadeghi
December 2015
Springer International Publishing
[Online-Edition: http://www.springer.com/en/book/9783319255446]
[Book]

Automated Software Diversity

Per Larsen, Stefan Brunthaler, Lucas Davi, Ahmad-Reza Sadeghi, Michael Franz
In: Synthesis Lectures on Information Security, Privacy, and Trust, December 2015
Morgan & Claypool
[Book]

Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks

Mauro Conti, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Christopher Liebchen, Marco Negro, Mohaned Qunaibit, Ahmad-Reza Sadeghi
In: 22nd ACM Conference on Computer and Communications Security (CCS), October 2015
[Inproceedings]

It's a TRAP: Table Randomization and Protection against Function Reuse Attacks

Stephen Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Bjorn De Sutter, Michael Franz
In: 22nd ACM Conference on Computer and Communications Security (CCS), October 2015
[Inproceedings]

SEDA: Scalable Embedded Device Attestation

Nadarajah Asokan, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter, Gene Tsudik, Christian Wachsmann
In: 22nd ACM Conference on Computer and Communications Security (CCS), October 2015
[Inproceedings]

Return to Where? You Can't Exploit What You Can't Find

Stephen Crane, Christopher Liebchen, Andrei Homescu, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Stefan Brunthaler, Michael Franz
In: Blackhat USA, August 2015
[Inproceedings]

SEDA - Technical Report

Nadarajah Asokan, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter, Gene Tsudik, Christian Wachsmann
August 2015
[Techreport]

TyTAN: Tiny Trust Anchor for Tiny Devices

Ferdinand Brasser, Patrick Koeberl, Brahim El Mahjoub, Ahmad-Reza Sadeghi, Christian Wachsmann
In: 52nd Design Automation Conference (DAC) 2015, June 2015
[Inproceedings]

HAFIX: Hardware-Assisted Flow Integrity Extension

Orlando Arias, Lucas Davi, Matthias Hanreich, Yier Jin, Patrick Koeberl, Debayan Paul, Ahmad-Reza Sadeghi, Dean Sullivan
In: 52nd Design Automation Conference (DAC), June 2015
[Inproceedings]

Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis

Ebrahim Songhori, Ahmad-Reza Sadeghi, Farinaz Koushanfar
In: 52nd Design Automation Conference (DAC), June 2015
[Inproceedings]

Security and Privacy Challenges in Industrial Internet of Things

Ahmad-Reza Sadeghi, Christian Wachsmann, Michael Waidner
In: 52nd Design Automation Conference (DAC) Research, June 2015
[Inproceedings]

How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL

Marcin Nagy, Thanh Bui, Emiliano De Cristofaro, Nadarajah Asokan, Jorg Ott, Ahmad-Reza Sadeghi
In: ACM WiSEC 2015, June 2015
[Inproceedings]

TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits

Ebrahim Songhori, Siam Hussain, Ahmad-Reza Sadeghi, Thomas Schneider, Farinaz Koushanfar
In: 36th IEEE Symposium on Security and Privacy (Oakland), May 2015
[Inproceedings]

Readactor: Practical Code Randomization Resilient to Memory Disclosure

Stephen Crane, Christopher Liebchen, Andrei Homescu, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Stefan Brunthaler, Michael Franz
In: 36th IEEE Symposium on Security and Privacy (Oakland), May 2015
[Inproceedings]

Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications

Felix Schuster, Thomas Tendyck, Christopher Liebchen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz
In: 36th IEEE Symposium on Security and Privacy (Oakland), May 2015
[Inproceedings]

XiOS: Extended Application Sandboxing on iOS

Mihai Bucicoiu, Lucas Davi, Razvan Deaconescu, Ahmad-Reza Sadeghi
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), April 2015
[Inproceedings]

Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming

Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Kevin Snow, Fabian Monrose
In: 22nd Annual Network & Distributed System Security Symposium (NDSS), February 2015
[Inproceedings]

Market-driven Code Provisioning to Mobile Secure Hardware

Alexandra Dmitrienko, Stephan Heuser, Thien Duc Nguyen, Marcos Silva Ramos, Andre Rein, Ahmad-Reza Sadeghi
In: Financial Cryptography and Data Security, January 2015
[Inproceedings]

Smart and Secure Cross-Device Apps for the Internet of Advanced Things

Christoph Busold, Stephan Heuser, Jon Rios, Ahmad-Reza Sadeghi, Nadarajah Asokan
In: Financial Cryptography and Data Security, January 2015
[Inproceedings]

I know where you are: Proofs of Presence resilient to malicious provers

Markus Miettinen, Nadarajah Asokan, Farinaz Koushanfar, Thien Duc Nguyen, Jon Rios, Ahmad-Reza Sadeghi, Majid Sobhani, Sudha Yellapantula
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), 2015
[Inproceedings]

Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? - Keynote -

Ahmad-Reza Sadeghi, Lucas Davi, Per Larsen
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), 2015
[Inproceedings]

2014

Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions

Christian Wachsmann, Ahmad-Reza Sadeghi
In: Synthesis Lectures on Information Security, Privacy, and Trust, December 2014
Morgan & Claypool Publishers
[Online-Edition: http://dx.doi.org/10.2200/S00622ED1V01Y201412SPT012]
[Book]

Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices

Markus Miettinen, Nadarajah Asokan, Thien Duc Nguyen, Ahmad-Reza Sadeghi, Majid Sobhani
In: Proc. ACM Conference on Computer and Communications Security, November 2014
ACM
[Inproceedings]

Swap and Play: Live Updating Hypervisors and Its Application to Xen

Ahmad-Reza Sadeghi, Ferdinand Brasser
In: CCSW 2014: The ACM Cloud Computing Security Workshop Proceedings, November 2014
[Online-Edition: http://dl.acm.org/citation.cfm?doid=2664168.2664173]
[Inproceedings]

Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks

Moreno Ambrosin, Christoph Busold, Mauro Conti, Ahmad-Reza Sadeghi, Matthias Schunter
In: Computer Security - ESORICS 2014, Vol. 8712, p. 76-93, September 2014
Springer International Publishing
[InCollection]

Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection

Lucas Davi, Daniel Lehmann, Ahmad-Reza Sadeghi, Fabian Monrose
In: 23rd USENIX Security Symposium, August 2014
[Inproceedings]

ASM: A Programmable Interface for Extending Android Security

Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi
In: 23rd USENIX Security Symposium, August 2014
[Inproceedings]

The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques

Lucas Davi, Daniel Lehmann, Ahmad-Reza Sadeghi
In: BlackHat USA, August 2014
[Inproceedings]

Security Analysis of Mobile Two-Factor Authentication Schemes

Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, Ahmad-Reza Sadeghi
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, Vol. 18, July 2014
[Online-Edition: https://noggin.intel.com/system/files/article/Security%20Analysis%20of%20Mobile%20Two-Factor%20Authentication%20Schemes.pdf]
[Article]

ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award)

Markus Miettinen, Stephan Heuser, Wiebke Kronz, Ahmad-Reza Sadeghi, Nadarajah Asokan
In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014) , June 2014
[Inproceedings]

PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs

Joonho Kong, Farinaz Koushanfar, Praveen Pendyala, Ahmad-Reza Sadeghi, Christian Wachsmann
In: Design Automation Conference (DAC) 2014, p. 1-6, June 2014
ACM Press
[Inproceedings]

Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation

Lucas Davi, Patrick Koeberl, Ahmad-Reza Sadeghi
In: 51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing, June 2014
[Inproceedings]

You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks

Hossen Mustafa, Ahmad-Reza Sadeghi, Steffen Schulz, Wenyuan Xu
In: 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2014
[Inproceedings]

TrustLite: A Security Architecture for Tiny Embedded Devices

Patrick Koeberl, Steffen Schulz, Ahmad-Reza Sadeghi, Vijay Varadharajan
In: European Conference on Computer Systems (EuroSys), April 2014
ACM
[Inproceedings]

Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection

Lucas Davi, Daniel Lehmann, Ahmad-Reza Sadeghi, Fabian Monrose
April 2014
[Techreport]

On the (In)Security of Mobile Two-Factor Authentication

Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, Ahmad-Reza Sadeghi
In: Financial Cryptography and Data Security (FC'14), March 2014
Springer
[Inproceedings]

POSTER: On Offline Payments with Bitcoin

Alexandra Dmitrienko, David Noack, Ahmad-Reza Sadeghi, Moti Yung
In: FC'2014: Financial Cryptography and Data Security Conference, March 2014
[Inproceedings]

MoP-2-MoP - Mobile private microblogging

Marius Senftleben, Mihai Bucicoiu, Erik Tews, Frederik Armknecht, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
In: Financial Cryptography and Data Security (FC'14), March 2014
Springer
[Inproceedings]

ASM: A Programmable Interface for Extending Android Security

Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi
March 2014
[Techreport]

2013

Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications

Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, Nadarajah Asokan, Ahmad-Reza Sadeghi
In: Annual Computer Security Applications Conference (ACSAC 2013), December 2013
[Inproceedings]

Mobile Platform Security

Nadarajah Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, Ahmad-Reza Sadeghi
In: Synthesis Lectures on Information Security, Privacy, and Trust, Vol. 4, December 2013
Morgan & Claypool
[Online-Edition: http://www.morganclaypool.com/doi/abs/10.2200/S00555ED1V01Y201312SPT009]
[Book]

A Security Framework for Analysis and Design of Software Attestation

Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann
In: ACM Conference on Computer and Communications Security (CCS), p. 1-12, November 2013
ACM Press
[Online-Edition: http://eprint.iacr.org/2013/083]
[Inproceedings]

Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets

Blaine Stancill, Kevin Snow, Nathan Otterness, Fabian Monrose, Lucas Davi, Ahmad-Reza Sadeghi
In: 16th Research in Attacks, Intrusions and Defenses (RAID) Symposium, October 2013
[Inproceedings]

Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies

Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi
In: 22nd USENIX Security Symposium (USENIX Security '13), August 2013
USENIX
[Inproceedings]

On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs

Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Vol. 8068, p. 107-125, August 2013
Springer
[Inproceedings]

Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same

Kevin Snow, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Fabian Monrose, Ahmad-Reza Sadeghi
In: BlackHat USA, August 2013
[Inproceedings]

Client-controlled Cryptography-as-a-Service in the Cloud

Hugo Ideler Sören Bleikertz, Ahmad-Reza Sadeghi
In: 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), June 2013
[Inproceedings]

CrowdShare: Secure Mobile Resource Sharing

Nadarajah Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider, Stanislaus Stelle
In: 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), June 2013
[Article]

Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (Best Student Paper Award)

Kevin Snow, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Fabian Monrose, Ahmad-Reza Sadeghi
In: 34th IEEE Symposium on Security and Privacy (Oakland 2013), May 2013
[Inproceedings]

Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM

Lucas Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013) , May 2013
[Inproceedings]

Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy

Johannes Buchmann, Denise Demirel, Jeroen Graaf
In: Financial Cryptography and Data Security: 17th International Conference, 2013, p. 197-204, May 2013
Springer
[Inproceedings]

Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions

Unal Kocabas, Patrick Koeberl, Ahmad-Reza Sadeghi
In: Conference on Digital Automation and Test Europe (DATE), March 2013
Interactive Presentation
[Inproceedings]

A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design

Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
In: Journal of Computer Security, Vol. 21, p. 283-315, February 2013
[Article]

Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer

Christoph Busold, Alexandra Dmitrienko, Hervé Seudié, Ahmed Taha, Majid Sobhani, Christian Wachsmann, Ahmad-Reza Sadeghi
In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, p. 233-242, February 2013
ACM Press
[Inproceedings]

PSiOS: Bring Your Own Privacy & Security to iOS Devices (Distinguished Paper Award)

Tim Werthmann, Ralf Hund, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 2013
[Inproceedings]

2012

Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication

Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Ahmad-Reza Sadeghi
In: BlackHat Abu Dhabi, December 2012
[Inproceedings]

myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android

Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi
November 2012
[Techreport]

Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware

Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi
November 2012
[Techreport]

XIFER: A Software Diversity Tool Against Code-Reuse Attacks

Lucas Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012), August 2012
[Inproceedings]

The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version)

Ahmad-Reza Sadeghi, Steffen Schulz, Vijay Varadharajan
August 2012
[Techreport]

Converse PUF-Based Authentication

Ahmad-Reza Sadeghi, Ünal Kocabaş, Stefan Katzenbeisser
In: International Conference on Trust & Trustworthy Computing (TRUST), June 2012
Springer
[Inproceedings]

EDA for Secure and Dependable Cybercars: Challenges and Opportunities

Hervé Seudié, Farinaz Koushanfar, Ahmad-Reza Sadeghi
In: ACM/IEEE Design Automation Conference (DAC), May 2012
[Inproceedings]

Unsafe Exposure Analysis of Mobile In-App Advertisements

Xuxian Jiang, Michael Grace, Ahmad-Reza Sadeghi, Wu Zhou
In: to appear at WiSec, April 2012
ACM
[Inproceedings]

Tetherway: A Framework for Tethering Camouflage

Steffen Schulz, Ahmad-Reza Sadeghi, Maria Zhdanova, Wenyuan Xu, Hossen Mustafa, Vijay Varadharajan
In: Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), April 2012
ACM Press
[Inproceedings]

Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions

Christian Wachsmann, Ahmad-Reza Sadeghi, Steffen Schulz
In: Secure Smart Embedded Devices, Platforms and Applications, p. 429-449, April 2012
Springer
[InCollection]

POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC

Amitabh Das, Ünal Kocabaş, Ahmad-Reza Sadeghi, Ingrid Verbauwhede
In: Conference on Digital Automation and Test Europe (DATE), March 2012
[Inproceedings]

CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm

Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi, Thomas Schneider
In: Financial Cryptography (FC'12), LNCS, p. 299-313, February 2012
Springer
[Inproceedings]

MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones

Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi
In: 19th Annual Network & Distributed System Security Symposium (NDSS), February 2012
[Inproceedings]

Towards Taming Privilege-Escalation Attacks on Android

Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry
In: 19th Annual Network & Distributed System Security Symposium (NDSS), February 2012
[Inproceedings]

The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs

Ahmad-Reza Sadeghi, Steffen Schulz, Vijay Varadharajan
In: European Symposium on Research in Computer Science (ESORICS), 2012
Springer Verlag
[Inproceedings]

2011

POSTER: Control-Flow Integrity for Smartphones

Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi
In: 18th ACM Conference on Computer and Communications Security (CCS'11), October 2011
ACM
[Inproceedings]

POSTER: The Quest for Security against Privilege Escalation Attacks on Android

Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry
In: 18th ACM Conference on Computer and Communications Security (CCS'11), October 2011
ACM
[Inproceedings]

Scalable Trust Establishment with Software Reputation

Sven Bugiel, Lucas Davi, Steffen Schulz
In: Workshop on Scalable Trusted Computing (STC), October 2011
ACM Press
[Online-Edition: https://freeside.trust.cased.de/apt-sec/]
[Inproceedings]

Practical and Lightweight Domain Isolation on Android

Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Ahmad-Reza Sadeghi, Bhargava Shastry
In: Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM), October 2011
ACM Press
[Inproceedings]

Uni-directional Trusted Path: Transaction Confirmation on Just One Device

Atanas Filyanov, Jonathan McCune, Ahmad-Reza Sadeghi, Marcel Winandy
In: 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2011), June 2011
[Inproceedings]

Lightweight Remote Attestation Using Physical Functions

Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann
In: ACM Conference on Wireless Network Security (WiSec), p. 109-114, June 2011
ACM Press
[Inproceedings]

Location Privacy in RFID Systemen

Ahmad-Reza Sadeghi, Christian Wachsmann
In: Digma - Zeitschrift für Datenrecht und Informationssicherheit, Vol. 11, p. 70-75, June 2011
[Article]

Lightweight Remote Attestation using Physical Functions (Extended Version)

Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann
June 2011
[Techreport]

A Formal Foundation for the Security Features of Physical Functions

Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Francois-Xavier Standaert, Christian Wachsmann
In: IEEE Symposium on Security and Privacy (SSP), p. 397-412, May 2011
IEEE Computer Society
[Inproceedings]

XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks

Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi
April 2011
[Techreport]

Twin Clouds: An Architecture for Secure Cloud Computing (Extended Abstract)

Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider
In: Workshop on Cryptography and Security in Clouds (CSC'11), March 2011
[Inproceedings]

ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks

Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy
In: 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), March 2011
[Inproceedings]

A Security Architecture for Accessing Health Records on Mobile Phones

Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
In: HEALTHINF'2011: Proceedings of the 4th International Conference on Health Informatics, January 2011
[Inproceedings]

Securing the Access to Electronic Health Records on Mobile Phones

Alexandra Dmitrienko, Zecir Hadzic, Hans Lhr, Ahmad-Reza Sadeghi, Marcel Winandy
In: Biomedical Engineering Systems and Technologies, 2011
[Inproceedings]

Twin Clouds: Secure Cloud Computing with Low Latency

Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider
In: Communications and Multimedia Security Conference (CMS'11), p. 32-44, 2011
Springer
[Inproceedings]

Recyclable PUFs: Logically Reconfigurable PUFs

Stefan Katzenbeisser, Ünal Kocabaş, Vincent Leest, Ahmad-Reza Sadeghi, Geert-Jan Schrijen, Heike Schröder, Christian Wachsmann
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Vol. 6917, p. 374-389, 2011
Springer
[Inproceedings]

Secure Set Intersection with Untrusted Hardware Tokens

Marc Fischlin, Benny Pinkas, Ahmad-Reza Sadeghi, Thomas Schneider, Ivan Visconti
In: 11th Cryptographers' Track at the RSA Conference (CT-RSA'11), p. 1-16, 2011
Springer
[Inproceedings]

AmazonIA: When Elasticity Snaps Back

Sven Bugiel, Stefan Nürnberger, Thomas Pöppelmann, Ahmad-Reza Sadeghi, Thomas Schneider
In: 18th ACM Conference on Computer and Communications Security (CCS'11), p. 17-21, 2011
ACM
[Inproceedings]

Recyclable PUFs: logically reconfigurable PUFs

Stefan Katzenbeisser, Ünal Kocabaş, Vincent Leest, Ahmad-Reza Sadeghi, Geert-Jan Schrijen, Christian Wachsmann
In: Journal of Cryptographic Engineering, Vol. 1, p. 177-186, 2011
[Article]

2010

Impossibility Results for RFID Privacy Notions

Frederik Armknecht, Ahmad-Reza Sadeghi, Alessandra Scafuro, Ivan Visconti, Christian Wachsmann
In: Transactions on Computational Science IX, Vol. 6480, p. 39-63, December 2010
Springer
[Inproceedings]

Breaking e-Banking CAPTCHAs

Ahmad-Reza Sadeghi, Shujun Li, Syed Amier Haider Shah, Muhammad Asad Usman Khan, Syed Ali Khayam, Roland Schmitz
In: 26th Annual Computer Security Applications Conference (ACSAC 2010), December 2010
[Online-Edition: http://www.acsac.org/]
[Inproceedings]

TruWalletM: Secure Web Authentication on Mobile Platforms

Sven Bugiel, Alexandra Dmitrienko, Kari Kostiainen, Ahmad-Reza Sadeghi, Marcel Winandy
In: Proceedings of INTRUST 2010 The Second International Conference on Trusted Systems, December 2010
[Inproceedings]

Securing the E-Health Cloud

Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
In: 1st ACM International Health Informatics Symposium (IHI 2010), November 2010
[Inproceedings]

Efficient Secure Two-Party Computation with Untrusted Hardware Tokens

Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
In: Towards Hardware Intrinsic Security: Foundation and Practice, p. 367-386, November 2010
Springer Berlin Heidelberg
[Online-Edition: http://www.springerlink.com/content/v717986n7r261772]
[InCollection]

Video Streaming Forensic - Content Identification with Traffic Snooping

Ahmad-Reza Sadeghi, Biswanath Mukherjee, Dipak Ghosal, Yali Liu
In: 13th Information Security Conference (ISC 2010), October 2010
[Online-Edition: http://math.fau.edu/%7Eisc2010]
[Inproceedings]

Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices

Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Christian Wachsmann, Johannes Winter
In: Information Security Conference (ISC), Vol. 6531, p. 84-98, October 2010
Springer
[Inproceedings]

Return-Oriented Programming without Returns

Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy
In: Proceedings of the 17th ACM conference on Computer and communications security, p. 559--572, October 2010
ACM
[Online-Edition: http://doi.acm.org/10.1145/1866307.1866370]
[Inproceedings]

Privilege Escalation Attacks on Android

Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy
In: ISC 2010: Proceedings of the 13th Information Security Conference, October 2010
[Inproceedings]

Enhancing RFID Security and Privacy by Physically Unclonable Functions

Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: Towards Hardware-Intrinsic Security: Foundations and Practice, p. 281-307, September 2010
Springer
[InBook]

Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten

Ahmad-Reza Sadeghi, Thomas Schneider
In: Workshop Innovative und sichere Informationstechnologie für das Gesundheitswesen von morgen (perspeGKtive'10), Vol. P-174, p. 11-25, September 2010
[Online-Edition: http://www.perspegktive.de]
[Inproceedings]

Trusted Computing

Ahmad-Reza Sadeghi, Christian Wachsmann
In: Handbook of Financial Cryptography and Security, p. 221-256, August 2010
CRC Press
[Inproceedings]

YAZKC: Yet Another Zero-Knowledge Compiler

Endre Bangerter, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
August 2010
[Online-Edition: http://www.usenix.org/events/sec10/poster.html]
[Misc]

Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic

Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Stefan Katzenbeisser
In: Information Hiding Conference (IH), June 2010
Springer
[Inproceedings]

On RFID Privacy with Mutual Authentication and Tag Corruption

Frederik Armknecht, Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: International Conference on Applied Cryptography and Network Security (ACNS), Vol. 6123, p. 493-510, June 2010
Springer
[Inproceedings]

Anonymous Authentication with TLS and DAA

Ahmad-Reza Sadeghi, Hans Löhr, Emanuele Cesena, Gianluca Ramunno, Davide Vernizzi
In: TRUST2010, June 2010
[Inproceedings]

Anonymous Authentication for RFID Systems

Frederik Armknecht, Liqun Chen, Ahmad-Reza Sadeghi, Christian Wachsmann
In: Workshop on RFID Security (RFIDSec), Vol. 6370, p. 158-175, June 2010
Springer
[Inproceedings]

Key Attestation from Trusted Execution Environments

Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ekberg, Ahmad-Reza Sadeghi, Nadarajah Asokan
In: TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, p. 30--46, June 2010
[Inproceedings]

Token-Based Cloud Computing -- Secure Outsourcing of Data and Arbitrary Computations with Lower Latency

Ahmad-Reza Sadeghi, Thomas Schneider, Marcel Winandy
In: 3rd International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud, Vol. 6101, p. 417--429, June 2010
Springer
[Online-Edition: http://www.trust2010.org/workshop-cloud.html]
[Inproceedings]

Breaking a Virtual Password System Based on Randomized Linear Generation Functions

Ahmad-Reza Sadeghi, Shujun Li, Syed Ali Khayam, Roland Schmitz
In: IEEE ICC 2010 - Communication and Information System Security Symposium ('ICC'10 CISS'), May 2010
[Online-Edition: http://www.ieee-icc.org/2010/]
[Inproceedings]

Trusted Virtual Domains: Color Your Network

Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
In: Datenschutz und Datensicherheit (DuD), Vol. 5, p. 289-298, May 2010
[Article]

Key Agreement for Heterogeneous Mobile Ad-Hoc Groups

Mark Manulis, Ahmad-Reza Sadeghi
In: Int. J. of Wireless and Mobile Computing (IJWMC), Vol. 4, p. 17-30, April 2010
[Article]

PUF-Enhanced RFID Security and Privacy

Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: Workshop on Secure Component and System Identification (SECSI), April 2010
[Inproceedings]

Trusted Virtual Domains: Color Your Network

Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
In: Datenschutz und Datensicherheit (DuD), Vol. 34, p. 289-294, March 2010
[Article]

ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks

Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy
March 2010
[Techreport]

Patterns for Secure Boot and Secure Storage in Computer Systems

Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
In: 4th International Workshop on Secure systems methodologies using patterns (SPattern 2010),, February 2010
[Inproceedings]

Modular Design of Efficient Secure Function Evaluation Protocols

Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
February 2010
[Online-Edition: http://eprint.iacr.org/2010/079/]
[Misc]

Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers

Ahmad-Reza Sadeghi, Christian Stüble, Serdar Cabuk, Chris Dalton, Konrad Eriksson, Dirk Kuhlmann, Hari Govind Ramasamy, Gianluca Ramunnok, Matthias Schunter
In: Journal of Computer Security, Vol. 18, p. 89-121, January 2010
[Article]

Extending IPsec for Efficient Remote Attestation

Steffen Schulz, Ahmad-Reza Sadeghi
In: Financial Cryptography and Data Security (FC), Vol. LNCS, January 2010
Springer
[Inproceedings]

TASTY: Tool for Automating Secure Two-partY computations

Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg
In: 17th ACM Conference on Computer and Communications Security (CCS'10), p. 451-462, 2010
ACM
[Inproceedings]

A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols

José Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
In: 15th European Symposium on Research in Computer Security (ESORICS'10), Vol. 6345, p. 151--167, 2010
Springer
[Online-Edition: http://www.esorics2010.org]
[Inproceedings]

Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs

Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
In: 12th International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10), Vol. 6225, p. 383-397, 2010
Springer
[Inproceedings]

2009

Memory Leakage-Resilient Encryption based on Physically Unclonable Functions

Ahmad-Reza Sadeghi, Frederik Armknecht, Roel Maes, Berk Sunar, Pim Tuyls
In: ASIACRYPT'09, December 2009
[Inproceedings]

On the Security of PAS (Predicate-based Authentication Service)

Ahmad-Reza Sadeghi, Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Roland Schmitz, Huaxiong Wang
In: Annual Computer Security Applications Conference (ACSAC’09), 2009. , December 2009
[Inproceedings]

Anonymizer-Enabled Security and Privacy for RFID

Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: International Conference on Cryptology and Network Security (CANS), Vol. 5888, p. 134-153, December 2009
Springer
[Inproceedings]

Efficient Privacy-Preserving Classification of {ECG} Signals

Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
In: 1st IEEE International Workshop on Information Forensics and Security (IEEE WIFS'09), p. 91--95, December 2009
IEEE
[Inproceedings]

Efficient Privacy-Preserving Face Recognition

Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg
In: 12th International Conference on Information Security and Cryptology (ICISC'09), Vol. 5984, p. 229-244, December 2009
Springer
[Inproceedings]

Transparent Mobile Storage Protection in Trusted Virtual Domains

Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy
In: USENIX LISA 2009, November 2009
USENIX
[Inproceedings]

A Practical Property-based Bootstrap Architecture

Ahmad-Reza Sadeghi, Christian Stüble, Jing Zhan, René Korthaus
In: ACMSTC'09, November 2009
[Inproceedings]

Transparent Mobile Storage Protection in Trusted Virtual Domains

Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy
In: 23rd Large Installation System Administration Conference (LISA '09), p. 159-172, November 2009
[Inproceedings]

TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication

Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
In: 4th ACM Workshop on Scalable Trusted Computing, November 2009
[Inproceedings]

Future of Assurance: Ensuring that a System is Trustworthy

Ahmad-Reza Sadeghi, Claire Vishik, Ingrid Verbauwhede
In: ISSE'09, October 2009
[Inproceedings]

Hide and Seek in Time - Robust Covert Timing Channels

Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Stefan Katzenbeisser
In: European Symposium on Research in Computer Security (ESORICS), p. 120-135, September 2009
Springer
[Inproceedings]

Combining Signal Processing and Cryptographic Protocol Design for Efficient {ECG} Classification

Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider
In: 1st International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09), September 2009
[Online-Edition: http://www.speedproject.eu/index.php?option=com_content&task=view&id=33&Itemid=68]
[Inproceedings]

How to Combine Homomorphic Encryption and Garbled Circuits - Improved Circuits and Computing the Minimum Distance Efficiently

Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
In: 1st International Workshop on Signal Processing in the Encrypted Domain (SPEED2009), September 2009
[Online-Edition: http://www.speedproject.eu/index.php?option=com_content&task=view&id=33&Itemid=68]
[Inproceedings]

Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks

Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy
In: Proceedings of the 2009 ACM workshop on Scalable trusted computing, p. 49--54, September 2009
ACM
[Online-Edition: http://doi.acm.org/10.1145/1655108.1655117]
[Inproceedings]

Location Privacy in RFID Applications

Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: Privacy in Location-Based Applications: Research Issues and Emerging Trends, Vol. 5599, p. 127-150, August 2009
Springer
[Inproceedings]

A Pattern for Secure Graphical User Interface Systems

Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy
In: 3rd International Workshop on Secure systems methodologies using patterns (SPattern'09), Proceedings of the 20th International Workshop on Database and Expert Systems Applications, p. 186-190, August 2009
[Inproceedings]

Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage

Ahmad-Reza Sadeghi, Klaus Kursawe, Dries Schellekens, Boris Skoric, Pim Tuyls
In: 2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), July 2009
[Inproceedings]

Enhancing RFID Security and Privacy by Physically Unclonable Functions (Extended Abstract)

Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: Foundations for Forgery-Resilient Cryptographic Hardware, p. 10-11, July 2009
Schloss Dagstuhl
[Inproceedings]

Efficient RFID Security and Privacy with Anonymizers

Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: Workshop on RFID Security (RFIDSec), June 2009
[Online-Edition: http://www.cosic.esat.kuleuven.be/rfidsec09/]
[Inproceedings]

Einsatz von Sicherheitskernen und Trusted Computing

Ahmad-Reza Sadeghi, Marcel Winandy
In: D-A-CH Security , May 2009
[Inproceedings]

Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing

Hans Löhr, Ahmad-Reza Sadeghi, Claire Vishik, Marcel Winandy
In: 5th Information Security Practice and Experience Conference (ISPEC'09), Vol. 5451, p. 396-407, April 2009
[Inproceedings]

Physically Unclonable Pseudorandom Functions

Ahmad-Reza Sadeghi, Frederik Armknecht, Pim Tuyls, Roel Maes, Berk Sunar
In: Poster session of Advances in Cryptology - EUROCRYPT, April 2009
[Inproceedings]

Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels

Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy
In: Proceedings of the 2nd International Conference on Trusted Computing, Vol. 5471, p. 45-62, April 2009
[Inproceedings]

Secure VPNs for Trusted Computing Environments

Ahmad-Reza Sadeghi, Steffen Schulz
In: International Conference on Trusted Computing (TRUST), April 2009
Springer
[Inproceedings]

Using Compilers to Enhance Cryptographic Product Development

Ahmad-Reza Sadeghi, Endre Bangerter, Manuel Barbosa, Daniel Bernstein, Ivan Damgård, Dan Page, Jakob Pagter, Sampo Sovio
In: Information Security Solutions Europe (ISSE), January 2009
[Inproceedings]

Automatic Generation of Sigma-Protocols

Eendre Bangerter, Thomas Briner, Wilko Henecka, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
In: 6th European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09), Vol. 6391, p. 67--82, 2009
Springer
[Online-Edition: http://www.iit.cnr.it/EUROPKI09/]
[Inproceedings]

Practical Secure Evaluation of Semi-Private Functions

Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
In: 7th International Conference on Applied Cryptography and Network Security (ACNS'09), Vol. 5536, p. 89--106, 2009
Springer
[Inproceedings]

Automatic Generation of Sound Zero-Knowledge Protocols

Eendre Bangerter, Jan Camenisch, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
2009
[Misc]

2008

Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems

Andy Rupp, Gregor Leander, Eendre Bangerter, Alexander Dent, Ahmad-Reza Sadeghi
In: Advances in Cryptology - ASIACRYPT 2008, December 2008
[Inproceedings]

Universally Composable Security Analysis of TLS

Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis, Olivier Pereira
In: Second Conference on Provable Security (ProvSec), November 2008
[Inproceedings]

Improved Security Notions and Protocols for Non-Transferable Identification

Ahmad-Reza Sadeghi, Carlo Blundo, Giuseppe Persiano, Ivan Visconti
In: 13th European Symposium on Research in Computer Security (ESORICS), October 2008
[Inproceedings]

An Efficient Implementation of Trusted Channels Based on OpenSSL

Ahmad-Reza Sadeghi, Frederik Armknecht, Yacine Gasmi, Gianluca Ramunno, Davide Vernizzi, Patrick Stewin, Martin Unger
In: ACMSTC 2008, October 2008
[Inproceedings]

User Privacy in Transport Systems Based on RFID E-Tickets

Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: International Workshop on Privacy in Location-Based Applications (PiLBA), October 2008
[Inproceedings]

Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains

Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Rani Husseiki, Yacine Gasmi, Patrick Stewin, Martin Unger
In: 3rd ACM Workshop on Scalable Trusted Computing, October 2008
[Inproceedings]

A Demonstrative Ad-hoc Attestation System

Ahmad-Reza Sadeghi, Endre Bangerter, Maksim Djackov
In: Information Security Conference 2008 (ISC'08), September 2008
[Inproceedings]

Property-Based Attestation without a Trusted Third Party

Ahmad-Reza Sadeghi, Hans Löhr, Liqun Chen, Mark Manulis
In: Information Security Conference (ISC'08), September 2008
[Inproceedings]

Property-Based TPM Virtualization

Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
In: Information Security, 11th International Conference (ISC 2008), p. 1-16, September 2008
[Inproceedings]

Efficient Helper Data Key Extractor on FPGAs

Ahmad-Reza Sadeghi, Jamshid Shokrollahi, Christoph Bösch, Jorge Guajardo, Pim Tuyls
In: Workshop on Cryptographic Hardware and Embedded Systems 2008 (CHES 2008), August 2008
[Inproceedings]

Resettable and Non-Transferable Chip Authentication for E-Passports

Ahmad-Reza Sadeghi, Carlo Blundo, Giuseppe Persiano, Ivan Visconti
In: RFIDSec 2008, July 2008
[Inproceedings]

Securing Peer-to-Peer Distributions for Mobile Devices

Ahmad-Reza Sadeghi, Christian Stüble, André Osterhues, Marko Wolf, Nadarajah Asokan
In: 4th Information Security Practice and Experience Conference (ISPEC 2008), April 2008
[Inproceedings]

Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly

Ahmad-Reza Sadeghi, Frederik Armknecht, Hans Löhr, Mark Manulis, Alberto Escalante
In: 4th Information Security Practice and Experience Conference (ISPEC 2008), April 2008
[Inproceedings]

Provably Secure Browser-Based User-Aware Mutual Authentication over TLS

Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis
In: ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), March 2008
[Inproceedings]

Identification Protocols Revisited - Episode I: E-Passports

Ahmad-Reza Sadeghi, Carlo Blundo, Giuseppe Persiano, Ivan Visconti
In: e-crypt workshop on Secure Component and System Identification (SECSI), March 2008
[Inproceedings]

Trusted Computing—State of the Art and Challenges

Ahmad-Reza Sadeghi
In: SOFSEM 2008, 2008
Springer
[Inproceedings]

Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly

Frederik Armknecht, Alberto Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi
In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Vol. 4991, p. 29--44, 2008
Springer
[Inproceedings]

A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting

Liqun Chen, Alberto Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi
In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, Vol. 4886, p. 29--44, 2008
Springer-Verlag
[Inproceedings]

Property-Based Attestation without a Trusted Third Party

Liqun Chen, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi
In: Information Security, 11th International Conference, ISC 2008, Vol. 5222, p. 31--46, 2008
Springer
[Inproceedings]

Universally Composable Security Analysis of TLS.

Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk
In: Proceedings of the 2nd International Conference on Provable Security (ProvSec 2008), Vol. 5324, p. 313--327, 2008
Springer
[Inproceedings]

Provably Secure Browser-Based User-Aware Mutual Authentication over TLS

Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk
In: Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), p. 300--311, 2008
ACM Press
[Inproceedings]

Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification

Ahmad-Reza Sadeghi, Thomas Schneider
In: 11th International Conference on Information Security and Cryptology (ICISC'08), Vol. 5461, p. 336--353, 2008
Springer
[Inproceedings]

2007

Beyond Secure Channels

Ahmad-Reza Sadeghi, Yacine Gasmi, Patrick Stewin, Martin Unger, Nadarajah Asokan
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), p. 30-40, November 2007
ACM Press
[Inproceedings]

Reconfigurable Trusted Computing in Hardware

Christof Paar, Ahmad-Reza Sadeghi, Tim Güneysu, Thomas Eisenbarth, Dries Schellekens, Marko Wolf
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), p. 15-25, November 2007
ACM Press
[Inproceedings]

Enabling Fairer Digital Rights Management with Trusted Computing

Ahmad-Reza Sadeghi, Christopher Wolf, Christian Stüble, Nadarajah Asokan, Jan-Erik Ekberg
In: 10th International Conference on Information Security (ISC 2007), Vol. 4779, p. 53-70, October 2007
Springer Verlag
[Inproceedings]

Combining Tardos Fingerprinting Codes and Fingercasting

Ahmad-Reza Sadeghi, Stefan Katzenbeisser, Boris Skoric, Mehmet Celik
In: 9th International Workshop on Information Hiding (IH 2007), Vol. 4567, p. 294-310, June 2007
Springer Verlag
[Online-Edition: http://www.springerlink.com/content/j5547520ux28g151/]
[Inproceedings]

Provably Secure Group Key Exchange

Mark Manulis
In: IT Security, Vol. 5, 2007
Europäischer Universitätsverlag
[Book]

Browser Models for Usable Authentication Protocols

Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis
In: IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07), 2007
[Inproceedings]

Phishing Phishers - Observing and Tracing Organized Cybercrime

Ahmad-Reza Sadeghi, Sebastian Gajek, Felix Gröbert, Dominik Birk
In: Second International Conference on Internet Monitoring and Protection (ICIMP 2007), p. 3, 2007
IEEE Computer Society
[Online-Edition: http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4271749]
[Inproceedings]

Fingercasting—Joint Fingerprinting and Decryption of Broadcast Messages

Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber
In: Transactions on Data Hiding and Multimedia Security II, Vol. 4499, p. 1-34, 2007
Springer Verlag
[Inproceedings]

Browser-based Authentication Protocols for Naive Users

Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis
In: Western European Workshop on Research in Cryptology (WEWoRC 2007), 2007
[Inproceedings]

Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing

Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
In: Second International Conference on Availability, Reliability and Security (ARES 2007), p. 120-127, 2007
[Inproceedings]

A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting

Ahmad-Reza Sadeghi, Hans Löhr, Liqun Chen, Mark Manulis, Alberto Escalante
In: 11th International Conference on Financial Cryptography and Data Security (FC 2007), Vol. 4886, p. 29-44, 2007
Springer Verlag
[Inproceedings]

Compartmented Security for Browsers

Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
2007
[Techreport]

Enhancing Grid Security Using Trusted Virtualization

Ahmad-Reza Sadeghi, Christian Stüble, Hans Löhr, Hari Govind Ramasamy, Stefan Schulz, Matthias Schunter
In: 4th International Conference on Autonomic and Trusted Computing (ATC 2007), Vol. 4610, p. 372-384, 2007
Springer Verlag
[Inproceedings]

Trusted User-Aware Web Authentication

Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Marcel Winandy
In: Workshop on Trustworthy User Interfaces for Passwords and Personal Information (TIPPI'07),, 2007
[Inproceedings]

2006

TCG Inside? - A Note on TPM Specification Compliance

Ahmad-Reza Sadeghi, Christian Wachsmann, Marcel Selhorst, Christian Stüble, Marcel Winandy
In: ACM Workshop on Scalable Trusted Computing (ACMSTC), p. 47-56, November 2006
ACM Press
[Inproceedings]

Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages

Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber
In: 11th Australasian Conference on Information Security and Privacy (ACISP 2006), Vol. 4058, July 2006
Springer Verlag
[Online-Edition: http://www.springerlink.com/content/0g182383389750g5/]
[Inproceedings]

Property-based Taming Lying Mobile Nodes

Ahmad-Reza Sadeghi, Mark Manulis
In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006), April 2006
[Online-Edition: http://doi.ieeecomputersociety.org/10.1109/AINA.2006.276]
[Inproceedings]

Property-based Taming Lying Mobile Node

Ahmad-Reza Sadeghi, Mark Manulis
In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006) , April 2006
[Online-Edition: http://doi.ieeecomputersociety.org/10.1109/AINA.2006.276]
[Inproceedings]

Linkable Democratic Group Signatures

Jörg Schwenk, Ahmad-Reza Sadeghi, Mark Manulis
In: 2nd Information Security Practice and Experience Conference (ISPEC 2006), April 2006
[Inproceedings]

Property-Based Taming of Lying Mobile Nodes

Mark Manulis, Ahmad-Reza Sadeghi
In: Proceedings of 20th International Conference on Advanced Information Networking and Applications (AINA 2006) Volume 2 IEEE International Workshop on Trusted and Autonomic Computing Systems (TACS 2006), p. 476--480, 2006
IEEE Computer Society
[Inproceedings]

Linkable Democratic Group Signatures

Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk
In: Proceedings of the 2nd Information Security Practice and Experience Conference (ISPEC 2006), Vol. 3903, p. 187--201, 2006
Springer-Verlag
[Inproceedings]

Play it once again, Sam - Enforcing Stateful Licenses on Open Platforms

Ahmad-Reza Sadeghi, Christian Stüble, Marko Wolf, Michael Scheibel
In: The Second Workshop on Advances in Trusted Computing (WATC '06 Fall), 2006
[Inproceedings]

Key Agreement for Heterogeneous Ad-Hoc Groups

Ahmad-Reza Sadeghi, Mark Manulis
In: International Journal of Wireless and Mobile Computing (IJWMC), 2006
[Inproceedings]

Key Agreement for Heterogenous Mobile Ad-hoc Groups

Ahmad-Reza Sadeghi, Mark Manulis
In: Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing), 2006
[Online-Edition: http://portal.acm.org/citation.cfm?id=1091715]
[Inproceedings]

Physical Security Bounds Against Tampering

Ahmad-Reza Sadeghi, Christof Paar, Kerstin Lemke-Rust
In: International Conference on Applied Cryptography and Network Security (ACNS 2006), 2006
[Online-Edition: http://www.springerlink.com/content/q26016rj663v2428/]
[Inproceedings]

E-Passport: The Global Traceability or How to Feel Like an UPS Package

Ahmad-Reza Sadeghi, Christof Paar, Dario Carluccio, Kerstin Lemke-Rust
In: Workshop on RFID Security 2006, 2006
[Online-Edition: http://www.springerlink.com/content/pg22v52027263222/]
[Inproceedings]

Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe
In: Transactions on Data Hiding and Multimedia Security, 2006
[Online-Edition: http://www.springerlink.com/content/j1775q68rkh33038/]
[Inproceedings]

Design and Implementation of a Secure Linux Device Encryption Architecture

Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Michael Scheibel
In: LinuxTag, 2006
[Inproceedings]

A Computational Model for Watermark Robustness

Ahmad-Reza Sadeghi, Andre Adelsbach, Stefan Katzebeisser
In: Information Hiding Workshop, 2006
[Inproceedings]

A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption

Ahmad-Reza Sadeghi, Ulrich Huber
2006
[Techreport]

A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption

Ahmad-Reza Sadeghi, Ulrich Huber
In: 9th Information Security Conference (ISC 2006), Vol. 4173, 2006
[Online-Edition: http://www.springerlink.com/content/50023w6877036027/]
[Inproceedings]

Client Authentication in Federations Using a Security Mode

Ahmad-Reza Sadeghi, Sebastian Gajek
In: Toward a More Secure Web - W3C Workshop on Usability and Transparency of Web Authentication., 2006
[Inproceedings]

Security Architecture for Device Encryption and VPN

Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Ammar Alkassar, Michael Scheibel
In: Information Security Solution Europe (ISSE06), 2006
[Online-Edition: http://www.springerlink.com/content/g6g7126v3k0njh8q/]
[Inproceedings]

A Protocol for Property-Based Attestation

Ahmad-Reza Sadeghi, Christian Stüble, Hans Löhr, Liquen Chen, Rainer Landfermann, Markus Rohe
In: First ACM Workshop on Scalable Trusted Computing (STC'06), 2006
[Inproceedings]

Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks

Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
In: Workshop on Information and System Security (WISSEC'06), 2006
[Inproceedings]

2005

Property-Based Broadcast Encryption for Multi-level Security Policies

Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber
In: 8th International Conference on Information Security and Cryptology (ICISC 2005), Vol. 3935, December 2005
Springer Verlag
[Online-Edition: http://www.springerlink.com/content/3q330w4400157t2g/]
[Inproceedings]

Towards Multilateral Secure Digital Rights Distribution Infrastructures

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe
In: ACM DRM Workshop'05, November 2005
[Inproceedings]

Embedding Trust into Cars—Secure Software Delivery and Installation

Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble, Ulrich Huber
In: Third Workshop on Embedded Security in Cars (escar 2005), November 2005
[Inproceedings]

Multilaterally Secure Computing Platforms – in your office, car and at home

Ahmad-Reza Sadeghi, Christian Stüble
In: 1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society, September 2005
[Inproceedings]

New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy

Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Marcel Selhorst, Oska Senft
In: Datenschutz und Datensicherheit, Vol. 9, September 2005
[Article]

Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe
In: 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, September 2005
[Inproceedings]

Secure Data Management in Trusted Computing

Ahmad-Reza Sadeghi, Christian Stüble, Ulrich Kühn, Klaus Kursawe, Stefan Lucks
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Vol. 3659, p. 324-338, August 2005
Springer Verlag
[Online-Edition: http://www.springerlink.com/content/4elbfgqmvvh5qugp/]
[Inproceedings]

Simplified Hardness Proofs in the Generic Group Model

Ahmad-Reza Sadeghi, Andy Rupp, Endre Bangerter
In: Western European Workshop on Research in Cryptology (WEWoRC 2005), July 2005
[Inproceedings]

Sokrates - A Compiler Framework for Zero-Knowledge Protocols

Ahmad-Reza Sadeghi, Markus Rohe, Jan Camenisch
In: Western European Workshop on Research in Cryptology (WEWoRC 2005), July 2005
[Inproceedings]

Towards Secure Computing Platforms with Open-Source and Trusted Computing

Ahmad-Reza Sadeghi, Ammar Alkassar, Christian Stüble, Marcel Selhorst
In: 9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI), May 2005
[Inproceedings]

Towards Multilateral Security On DRM Platforms

Ahmad-Reza Sadeghi, Christian Stüble
In: First Information Security Practice and Experience Conference (ISPEC 2005), April 2005
[Online-Edition: http://www.springerlink.com/content/hwbrd3crg2l2ral8/]
[Inproceedings]

Secure Software Delivery and Installation in Embedded Systems

Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber
In: First Information Security Practice and Experience Conference (ISPEC 2005), April 2005
[Inproceedings]

Security Engineering for Zero-knowledge Watermark Detection

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe
In: Special Session on Media Security (WIAMIS 2005), April 2005
[Inproceedings]

Towards multilaterally secure computing platforms - with open source and trusted computing

Ahmad-Reza Sadeghi, Christian Stüble
In: Information Security Technical Report, Vol. 10, p. 83-95, January 2005
[Article]

Secure Software Delivery and Installation in Embedded Systems

Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber
In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications, p. 27-49, 2005
Springer-Verlag
[Online-Edition: http://www.springerlink.com/content/lfv77rfp7tj4wtj2/]
[InBook]

Property-Based Broadcast Encryption for Multi-level Security Policies

Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble, Ulrich Huber
2005
[Techreport]

Proving a WS-Federation Passive Requestor Profile with a Browser Model

Ahmad-Reza Sadeghi, Thomas Groß, Birgit Pfitzmann
In: Workshop on Secure Web Services (SWS), 2005
[Online-Edition: http://portal.acm.org/citation.cfm?id=1103034]
[Inproceedings]

First Summary Report on Asymmetric Watermarking

Ahmad-Reza Sadeghi, Andre Adelsbach, Patrick Bas, Mauro Barni, Alessia De Rosa
In: ECRYPT, Network of Excellence in Cryptology, 2005
[Inproceedings]

Anti-theft Protection: Electronic Immobilizers

Ahmad-Reza Sadeghi, Christian Stüble, Kerstin Lemke-Rust
In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications., p. 51-67, 2005
Springer Verlag
[Online-Edition: http://www.springerlink.com/content/rj4052547n61v84n/]
[Inproceedings]

Browser Model for Security Analysis of Browser-Based Protocols

Ahmad-Reza Sadeghi, Thomas Groß, Birgit Pfitzmann
In: European Symposium for Research in Computer Science (ESORICS), 2005
[Inproceedings]

Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe
In: ACM Multimedia Systems, 2005
[Article]

A Privacy-Protecting Coupon System

Ahmad-Reza Sadeghi, Liqun Chen, Matthias Enzmann, Markus Schneider, Michael Steiner
In: Financial Cryptography, 2005
[Inproceedings]

An Open Approach for Designing Secure Electronic Immobilizers

Ahmad-Reza Sadeghi, Christian Stüble, Kerstin Lemke-Rust
In: First Information Security Practice and Experience Conference (ISPEC 2005), 2005
[Online-Edition: http://www.springerlink.com/content/y8mmy4gvdmjny2lc/]
[Inproceedings]

2004

Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms

Ahmad-Reza Sadeghi, Christian Stüble
In: 20th Annual Computer Security Applications Conference (ACSAC), December 2004
[Inproceedings]

Property-based Attestation for Computing Platforms: Caring about policies, not mechanisms

Ahmad-Reza Sadeghi, Christian Stüble
In: New Security Paradigm Workshop (NSPW), September 2004
[Inproceedings]

European Multilateral Secure Computing Base - Open Trusted Computing for You and Me

Ahmad-Reza Sadeghi, Christian Stüble, Norbert Pohlmann
In: Datenschutz und Datensicherheit (DUD) , Vol. 9, p. 548-554, September 2004
[Article]

Overcoming the Obstacles of Zero-Knowledge Watermark Detection

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe
In: ACM Multimedia and Security Workshop, p. pp. 46 - 55, 2004
ACM Press
[Inproceedings]

Trusted Computing Platforms: Zur technischen und industriepolitischen Situation und Vorgehensweise

Ahmad-Reza Sadeghi, Dirk Günnewig, Kai Rannenberg, Christian Stüble
In: Vertrauenswürdige Systemumgebungen Technik, Recht und gesellschaftspolitische Implikationen des "Trusted Computing", 2004
Verlag Recht und Wirtschaft
[InCollection]

Enhancing Security of Computing Platforms with TC-Technology

Ahmad-Reza Sadeghi, Christian Stüble, Oliver Altmeyer, Marcel Selhorst
In: Information Security Solutions Europe (ISSE 2004), p. 346-361, 2004
Vieweg Verlag
[InCollection]

2003

The Quest for Security in Integrated Networks

Ahmad-Reza Sadeghi, Ammar Alkassar
In: 11th International Conference on Telecommunication Systems, Modeling and Analysis, October 2003
[Inproceedings]

Watermark Detection with Zero-Knowledge Disclosure

Ahmad-Reza Sadeghi, Andre Adelsbach, Stefan Katzenbeisser
In: ACM Multimedia Systems Journal, Vol. 9, p. 266-278, September 2003
[Online-Edition: http://www.springerlink.com/content/475ve9fx69trvqr0/]
[Article]

Taming "Trusted Computing" by Operating System Design

Ahmad-Reza Sadeghi, Christian Stüble
In: 4th International Workshop on Information Security Applications (WISA'03), September 2003
Springer-Verlag
[Online-Edition: http://www.springerlink.com/content/qkwrtdmlxclg8wff/]
[Inproceedings]

Secure Object Identification - or: Solving The Chess Grandmaster Problem

Ahmad-Reza Sadeghi, Ammar Alkassar, Christian Stüble
In: New Security Paradigms Workshop, August 2003
[Inproceedings]

Trusted Computing ohne Nebenwirkungen

Ahmad-Reza Sadeghi, Christian Stüble, Dirk Günnewig
In: Datenschutz und Datensicherheit (DUD), Vol. 9, p. 556-560, 2003
Vieweg Verlag
[InCollection]

Sinn und Unsinn von TCPA und Palladium

Ahmad-Reza Sadeghi, Christian Stüble
In: c't, Vol. 13, 2003
[Article]

Die digitale Signatur

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Schneider, Christian Stüble
In: Digitale Signaturen in der Praxis, 2003
AWV Verlag
[InCollection]

Electronic Payment Systems

Ahmad-Reza Sadeghi, Markus Schneider
In: Digital Rights Management, Vol. 2770, p. 113-137, 2003
Springer Verlag
[Online-Edition: http://www.springerlink.com/content/9qarwwxkfkwtqgv4/]
[InCollection]

Advanced Techniques for Dispute Resolving and Authorship Proofs on Digital Works

Ahmad-Reza Sadeghi, Andre Adelsbach
In: Security and Watermarking of Multimedia Contents V, 2003
[Inproceedings]

Bridging the Gap between TCPA/Palladium and Personal Security

Ahmad-Reza Sadeghi, Christian Stüble
2003
[Techreport]

2002

Cryptography Meets Watermarking: Detecting Watermarks with Minimal- or Zero-Knowledge Disclosure

Ahmad-Reza Sadeghi, Andre Adelsbach, Stefan Katzenbeisser
In: XI European Signal Processing Conference, Vol. 1, p. 446-449, September 2002
[Inproceedings]

Auctions with Multiple Rounds and Multiple Items

Ahmad-Reza Sadeghi, Matthias Schunter, Sandra Steinbrecher
In: Int. Workshop on Trust and Privacy in Digital Business (DEXA 2002), 2002
[Inproceedings]

2001

Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference

Ahmad-Reza Sadeghi, Michael Steiner
In: Eurocrypt, Vol. 2045, p. 243-260, May 2001
Springer-Verlag
[Inproceedings]

Optimized Self-Synchronizing Mode of Operation

Ahmad-Reza Sadeghi, Andre Adelsbach, Alexander Geraldy, Birgit Pfitzmann
In: 8th International Workshop on Fast Software Encryption, April 2001
[Inproceedings]

How to Break a Semi-Anonymous Fingerprinting Scheme

Ahmad-Reza Sadeghi
In: Information Hiding: Fourth International Workshop, Vol. 2137, p. 384-394, 2001
Springer-Verlag
[Online-Edition: http://www.springerlink.com/content/9gbhnwf945kmuv80/]
[Inproceedings]

Zero-Knowledge Watermark Detection and Proof of Ownership

Ahmad-Reza Sadeghi, Andre Adelsbach
In: Information Hiding: Fourth International Workshop, Vol. 2137, p. 273-288, 2001
Springer-Verlag
[Online-Edition: http://www.springerlink.com/content/xqpm659cvp9g0unt/]
[Inproceedings]

2000

Proving ownership of digital content

Ahmad-Reza Sadeghi, Andre Adelsbach, Birgit Pfitzmann
In: 3rd International Workshop, IH ’99,, Vol. 1768, p. 126-141, October 2000
Springer-Verlag
[Inproceedings]

Self-escrowed cash against user black-mailing

Ahmad-Reza Sadeghi, Birgit Pfitzmann
In: Fourth Conference on Financial Cryptography (FC’00),, Vol. 1962, February 2000
Springer-Verlag
[Inproceedings]

1999

Coin-based anonymous fingerprinting

Ahmad-Reza Sadeghi, Birgit Pfitzmann
In: EUROCRYPT ’99, Vol. 1599, p. 150-164, 1999
Springer-Verlag
[Inproceedings]

Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen

Ahmad-Reza Sadeghi, Birgit Pfitzmann
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99, p. 35-48, 1999
Vieweg Verlag
[InCollection]
A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang