Prof. Dr. Ing. Ahmad-Reza Sadeghi

Professor - System Security Lab

Mornewegstrasse 32
D-64293 Darmstadt
GERMANY

Room:4.1.06
Tel:+49 (0)6151 16 - 25328
Email:

ahmad.sadeghi(a-t)trust.cased.de  PGP-Key  S/MIME Certificate

Website:http://​trust.​cased.​de

 

 

Short CV

 

Ahmad-Reza Sadeghi is a full Professor of Computer Science at the Technische Universität Darmstadt, in Germany, where he heads the System Security Lab of the Center for Advanced Security Research Darmstadt (CASED).  Since January 2012 he is also the Director of Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at TU Darmstadt.

He received his PhD in Computer Science with the focus on privacy protecting cryptographic protocols and systems from the University of Saarland in Saarbrücken, Germany. Prior to academia, he worked in Research and Development of Telecommunications enterprises, amongst others Ericson Telecommunications.  He has been leading and involved in a variety of national and international research and development projects on design and implementation of Trustworthy Computing Platforms and Trusted Computing, Security Hardware, and Applied Cryptography. He has been serving as general or program chair as well as program committee member of major conferences and workshops in Information Security and Privacy. He is Editor-In-Chief of IEEE Security and Privacy Magazine, and on the editorial board of ACM Books. He served 5 years on the editorial board of the ACM Transactions on Information and System Security (TISSEC), and was guest editor of the IEEE Transactions on Computer-Aided Design (Special Issue on Hardware Security and Trust).

Prof. Sadeghi has been awarded with the renowned German prize “Karl Heinz Beckurts” for his research on Trusted and Trustworthy Computing technology and its transfer to industrial practice. The award honors excellent scientific achievements with high impact on industrial innovations in Germany. Further, his group received German IT Security Competition Award 2010. 

 

Book: Towards Hardware-Intrinsic Security 

"This book will prove to be very interesting for professionals in the hardware security field. It covers almost every aspect of this area, with excellent papers written by experts."

Javier Castillo, ACM Computing Reviews, June 2011

Academic Activities

 

ACM Books, Area Editor (Security and Privacy)

General Chair

  • ACM Conference on Computer and Communications Security (ACM CCS) 2013
  • International Conference on Trust and Trustworthy Computing (TRUST) 2010

Program (Co-) Chair

  • Financial Cryptography and Data Security (FC) 2013
  • ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) 2013
  • International Conference on Cryptology and Network Security (CANS) 2012
  • International Workshop on Trustworthy Embedded Devices (TrustED) 2012
  • SecureCloud 2012
  • ACM Workshop on Digital Rights Management (ACM DRM) 2011
  • ACM Workshop on Scalable Trusted Computing (ACM STC) 2011
  • International Conference on Trust and Trustworthy Computing (TRUST) 2011

Program Committee

  • IEEE Workshop on Mobile Security Technologies (MoST), co-located with IEEE S&P, 2013
  • IEEE Symposium on Security & Privacy (IEEE S&P) 2013
  • ACM Conference on Computer and Communications Security (ACM CCS) 2012
  • Network & Distributed System Security Symposium (NDSS) 2013, 2012
  • ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec) 2012
  • European Symposium on Research in Computer Security (ESORICS) 2013, 2012, 2011
  • ACM Symposium on Information, Computer and Communications Security (AsiaCCS) 2013, 2012
  • ACM Conference on Data and Application Security and Privacy (CODASPY) 2013
  • ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (ACM SPSM) 2012
  • ACM Cloud Computing Security Workshop (ACM CCSW) 2012
  • Workshop on RFID Security and Privacy (RFIDSec) 2012
  • Conference on Privacy, Security and Trust (PST) 2012
  • ACM SIGHIT International Health Informatics Symposium (IHI) 2012
  • IEEE International Workshop on Information Forensics and Security (WIFS) 2012
  • IEEE Symposium on Hardware-Oriented Security and Trust (HOST) 2012, 2009
  • Information Hiding Conference (IH) 2012, 2011
  • International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM) 2012, 2011
  • International Multidisciplinary Privacy Award (CPDP MPA) 2012, 2011
  • Smart Card Research and Advanced Application Conference (CARDIS) 2012
  • Financial Cryptography and Data Security (FC) 2011, 2006, 2005
  • Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2011, 2005
  • International Conference on Applied Cryptography and Network Security (ACNS) 2011, 2010
  • International Conference on Information Security and Cryptology (ISISC) 2011
  • Computer & Electronics Security Applications Rendez-vous (C&ESAR) 2011
  • International Conference on Network and System Security (NSS) 2011
  • International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2011
  • International Conference on Trusted Systems (INTRUST) 2011, 2010, 2009
  • International Workshop on Trustworthy Embedded Devices (TrustED) 2011
  • Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications (LightSec) 2011
  • Workshop on Real-Life Cryptographic Protocols and Standardization (RLCPS) 2011, 2010
  • Workshop on Secure Data Management (SDM) 2011
  • International Conference on E-voting and Identity (VoteID) 2009
  • ACM Workshop on Scalable Trusted Computing (ACM STC) 2008, 2006
  • Benelux Workshop on Information and System Security 2006
  • International Conference on Cryptology in India (INDOCRYPT) 2006
  • International Workshop on Digital Watermarking (IWDW) 2006
  • International Workshop on Information Security Applications (WISA) 2006
  • Workshop on Advances in Trusted Computing (WATC) 2006
  • ACM Workshop on Digital Rights Management (ACM DRM) 2005, 2004, 2003
  • Information Security and Hiding (ISH) 2005
  • New Security Paradigm Workshop (NSPW) 2005, 2004
  • SKOLIS Conference on Information Security and Cryptography (CISC) 2005
  • European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS) 2004

Publications

2016

C-FLAT: Control-Flow Attestation for Embedded Systems Software
Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik
In: 23rd ACM Conference on Computer and Communications Security (CCS), October 2016.

Selfrando: Securing the Tor Browser against De-anonymization Exploits
Mauro Conti, Stephen Crane, Tommaso Frassetto, Andrei Homescu, Georg Koppen, Per Larsen, Christopher Liebchen, Mike Perry, Ahmad-Reza Sadeghi
In: The annual Privacy Enhancing Technologies Symposium (PETS), July 2016.

DARPA: Device Attestation Resilient to Physical Attacks
Ahmad Ibrahim, Ahmad-Reza Sadeghi, Gene Tsudik, Shaza Zeitouni
In: ACM WiSEC 2016, July 2016.

POSTER: Toward a Secure and Scalable Attestation
Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi,Matthias Schunter
In: ACM WiSEC 2016: ACM WiSEC 2016, July 2016.

POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs
Ghada Dessouky, Ahmad-Reza Sadeghi
In: ACM WiSec 2016, vol. ACM WiSec 2016, July 2016.

Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments
Markus Miettinen, Jialin Huang, Thien Duc Nguyen, N. Asokan and Ahmad-Reza Sadeghi
In: Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16), July 2016.

Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity
Dean Sullivan, Orlando Arias, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Yier Jin
In: 53rd Design Automation Conference (DAC), June 2016.

Regulating ARM TrustZone Devices in Restricted Spaces
Ferdinand Brasser, Vinod Ganapathy, Liviu Iftode, Daeyoung Kim, Christopher Liebchen, Ahmad-Reza Sadeghi
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), June 2016.

Things, Trouble, Trust: On Building Trust in IoT Systems
Tigist Abera, N. Asokan, Lucas Davi, Farinaz Koushanfar, Andrew Praverd Ahmad-Reza Sadeghi, Gene Tsudik
In: 53rd Design Automation Conference (DAC), June 2016.

Subversive-C: Abusing and Protecting Dynamic Message Dispatch
Julian Lettner, Benjamin Kollenda, Andrei Homescu, Per Larsen, Felix Schuster, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Michael Franz
In: USENIX Annual Technical Conference (ATC), June 2016.

Remanence Decay Side-Channel: The PUF Case
Shaza Zeitouni, Yossef Oren, Christian Wachsmann, Patrick Koeberl, Ahmad-Reza Sadeghi
In: IEEE Transactions on Information Forensics and Security, vol. 99, March 2016. ISSN 1556-6013.

The Cybersecurity Landscape in Industrial Control Systems
Stephen McLaughlin, Charalambos Konstantinou, Xueyang Wang, Lucas Davi, Ahmad-Reza Sadeghi, Michail Maniatakos, Ramesh Karri
In: Proceedings of the IEEE, vol. PP, no. 99, March 2016.
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=7434576.

Leakage-Resilient Layout Randomization for Mobile Devices
Kjell Braden, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Christopher Liebchen, Ahmad-Reza Sadeghi
In: 23rd Annual Network & Distributed System Security Symposium (NDSS), February 2016.

Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android
Stephan Heuser, Marco Negro, Praveen Kumar Pendyala, Ahmad-Reza Sadeghi
January 2016.

DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android
Stephan Heuser, Marco Negro, Praveen Kumar Pendyala and Ahmad-Reza Sadeghi
In: Financial Crypto 2016, January 2016.

Towards a Unified Security Model for Physically Unclonable Functions
F. Armknecht, D. Moriyama, A-R. Sadeghi, M. Yung.
In: CT-RSA - Cryptographers' Track at the RSA Conference, 2016.

GarbledCPU: A MIPS Processor for Secure Computation in Hardware
Ebrahim M. Songhori, Shaza Zeitouni, Ghada Dessouky, Thomas Schneider, Ahmad-Reza Sadeghi, Farinaz Koushanfar
In: 53rd Design Automation Conference (DAC) 2016, 2016.

Remote Attestation for Low-End Embedded Devices: the Prover's Perspective
Ferdinand Brasser, Kasper B. Rasmussen, Ahmad-Reza Sadeghi, Gene Tsudik
In: DAC '16, Proceedings of the 53nd Annual Design Automation Conference, ACM, 2016.

Can IoT be Secured: Emerging Challenges in Connecting the Unconnected
Nancy Cam-Winget, Ahmad-Reza Sadeghi, Yier Jin
In: 53rd Design Automation Conference (DAC), 2016.

2015

Building Secure Defenses Against Code-Reuse Attacks
Lucas Davi, Ahmad-Reza Sadeghi
Springer International Publishing, December 2015. ISBN 978-3-319-25544-6. ISSN 2191-5768.
http://www.springer.com/en/book/9783319255446.

Automated Software Diversity
Per Larsen, Stefan Brunthaler, Lucas Davi, Ahmad-Reza Sadeghi, Michael Franz
In: Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool, December 2015.

Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks
Mauro Conti, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Christopher Liebchen, Marco Negro, Mohaned Qunaibit, Ahmad-Reza Sadeghi
In: 22nd ACM Conference on Computer and Communications Security (CCS), October 2015.

It's a TRAP: Table Randomization and Protection against Function Reuse Attacks
Stephen Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Bjorn De Sutter, Michael Franz
In: 22nd ACM Conference on Computer and Communications Security (CCS), October 2015.

Automated Synthesis of Optimized Circuits for Secure Computation
Daniel Demmler, Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni
In: 22nd ACM Conference on Computer and Communications Security (CCS'15), ACM, October 2015.
www.sigsac.org/ccs/CCS2015/index.html.

SEDA: Scalable Embedded Device Attestation
N. Asokan, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter, Gene Tsudik, Christian Wachsmann
In: 22nd ACM Conference on Computer and Communications Security (CCS), October 2015.

Return to Where? You Can't Exploit What You Can't Find
Stephen Crane, Christopher Liebchen, Andrei Homescu, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Stefan Brunthaler, Michael Franz
In: Blackhat USA, August 2015.

SEDA - Technical Report
N. Asokan, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter, Gene Tsudik, Christian Wachsmann
August 2015.

TyTAN: Tiny Trust Anchor for Tiny Devices
Ferdinand Brasser, Patrick Koeberl, Brahim El Mahjoub, Ahmad-Reza Sadeghi, Christian Wachsmann
In: 52nd Design Automation Conference (DAC) 2015, June 2015.

HAFIX: Hardware-Assisted Flow Integrity Extension
Orlando Arias, Lucas Davi, Matthias Hanreich, Yier Jin, Patrick Koeberl, Debayan Paul, Ahmad-Reza Sadeghi, Dean Sullivan
In: 52nd Design Automation Conference (DAC), June 2015.

Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis
Ebrahim Songhori, Ahmad-Reza Sadeghi, Farinaz Koushanfar
In: 52nd Design Automation Conference (DAC), June 2015.

Security and Privacy Challenges in Industrial Internet of Things
Ahmad-Reza Sadeghi, Christian Wachsmann, Michael Waidner
In: 52nd Design Automation Conference (DAC) Research, June 2015.

How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL
Marcin Nagy, Thanh Bui, Emiliano De Cristofaro, N. Asokan, Jorg Ott, Ahmad-Reza Sadeghi
In: ACM WiSEC 2015, June 2015.

TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits
Ebrahim M. Songhori, Siam U. Hussain, Ahmad-Reza Sadeghi, Thomas Schneider, Farinaz Koushanfar
In: 36th IEEE Symposium on Security and Privacy (Oakland), May 2015.

Readactor: Practical Code Randomization Resilient to Memory Disclosure
Stephen Crane, Christopher Liebchen, Andrei Homescu, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Stefan Brunthaler, Michael Franz
In: 36th IEEE Symposium on Security and Privacy (Oakland), May 2015.

Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications
Felix Schuster, Thomas Tendyck, Christopher Liebchen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz
In: 36th IEEE Symposium on Security and Privacy (Oakland), May 2015.

I know where you are: Proofs of Presence resilient to malicious provers
Markus Miettinen, N. Asokan, Farinaz Koushanfar, Thien Duc Nguyen, Jon Rios, Ahmad-Reza Sadeghi, Majid Sobhani, Sudha Yellapantula
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), April 2015.

XiOS: Extended Application Sandboxing on iOS
Mihai Bucicoiu, Lucas Davi, Razvan Deaconescu, Ahmad-Reza Sadeghi
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), April 2015.

Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? - Keynote -
Ahmad-Reza Sadeghi, Lucas Davi, Per Larsen
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), April 2015.

Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming
Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Kevin Z. Snow, Fabian Monrose
In: 22nd Annual Network & Distributed System Security Symposium (NDSS), February 2015.

Market-driven Code Provisioning to Mobile Secure Hardware
Alexandra Dmitrienko, Stephan Heuser, Thien Duc Nguyen, Marcos da Silva Ramos, Andre Rein, Ahmad-Reza Sadeghi
In: Financial Cryptography and Data Security, January 2015.

Smart and Secure Cross-Device Apps for the Internet of Advanced Things
Christoph Busold, Stephan Heuser, Jon Rios, Ahmad-Reza Sadeghi, N Asokan
In: Financial Cryptography and Data Security, January 2015.

2014

Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions
Christian Wachsmann, Ahmad-Reza Sadeghi
In: Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, December 2014. ISBN 9781627055093.
http://dx.doi.org/10.2200/S00622ED1V01Y201412SPT012.

Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices
Markus Miettinen, N. Asokan, Thien Duc Nguyen, Ahmad-Reza Sadeghi, Majid Sobhani
In: Proc. ACM Conference on Computer and Communications Security, ACM, November 2014.

Swap and Play: Live Updating Hypervisors and Its Application to Xen
Franz Ferdinand Brasser; Mihai Bucicoiu; Ahmad-Reza Sadeghi
In: CCSW 2014: The ACM Cloud Computing Security Workshop Proceedings, November 2014.
http://dl.acm.org/citation.cfm?doid=2664168.2664173.

Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks
Moreno Ambrosin, Christoph Busold, Mauro Conti, Ahmad-Reza Sadeghi, Matthias Schunter
In: Kutyłowski, Mirosław and Vaidya, Jaideep: Lecture Notes in Computer Science, Computer Security - ESORICS 2014, vol. 8712, p. 76-93, Springer International Publishing, September 2014. ISBN 978-3-319-11202-2.

Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection
Lucas Davi, Daniel Lehmann, Ahmad-Reza Sadeghi, Fabian Monrose
In: 23rd USENIX Security Symposium, August 2014.

ASM: A Programmable Interface for Extending Android Security
Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi
In: 23rd USENIX Security Symposium, August 2014.

The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques
Lucas Davi, Daniel Lehmann, Ahmad-Reza Sadeghi
In: BlackHat USA, August 2014.

Mobile Trusted Computing
N. Asokan, Jan-Erik Ekberg, Kari Kostiainen, Anand Rajan, Carlos Rozas, Ahmad-Reza Sadeghi, Steffen Schulz, and Christian Wachsmann
In: Proceedings of the IEEE, vol. 102, no. 8, p. 1189-1206, August 2014.

Security Analysis of Mobile Two-Factor Authentication Schemes
Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, Ahmad-Reza Sadeghi
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, vol. 18, no. 4, July 2014.
https://noggin.intel.com/system/files/article/Security%20Analysis%20of%20Mobile%20Two-Factor%20Authentication%20Schemes.pdf.

ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award)
Markus Miettinen, Stephan Heuser, Wiebke Kronz, Ahmad-Reza Sadeghi, N. Asokan
In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014) , June 2014.

PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs
Joonho Kong, Farinaz Koushanfar, Praveen K. Pendyala, Ahmad-Reza Sadeghi, Christian Wachsmann
In: Design Automation Conference (DAC) 2014, p. 1-6, ACM Press, June 2014.

Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation
Lucas Davi, Patrick Koeberl, Ahmad-Reza Sadeghi
In: 51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing, June 2014.

You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks
Hossen Mustafa, Ahmad-Reza Sadeghi, Steffen Schulz, Wenyuan Xu
In: 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2014.

TrustLite: A Security Architecture for Tiny Embedded Devices
Patrick Koeberl, Steffen Schulz, Ahmad-Reza Sadeghi, Vijay Varadharajan
In: European Conference on Computer Systems (EuroSys), ACM, April 2014.

Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection
Lucas Davi, Daniel Lehmann, Ahmad-Reza Sadeghi, Fabian Monrose
April 2014.

On the (In)Security of Mobile Two-Factor Authentication
Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, Ahmad-Reza Sadeghi
In: Financial Cryptography and Data Security (FC'14), Springer, March 2014.

POSTER: On Offline Payments with Bitcoin
Alexandra Dmitrienko, David Noack, Ahmad-Reza Sadeghi, Moti Yung
In: FC'2014: Financial Cryptography and Data Security Conference, March 2014.

MoP-2-MoP - Mobile private microblogging
Marius Senftleben, Mihai Bucicoiu, Erik Tews, Frederik Armknecht, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
In: Financial Cryptography and Data Security (FC'14), Springer, March 2014.

ASM: A Programmable Interface for Extending Android Security
Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi
no. TUD-CS-2014-0063, March 2014.

2013

Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications
Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi
In: Annual Computer Security Applications Conference (ACSAC 2013), December 2013.

Mobile Platform Security
N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, Ahmad-Reza Sadeghi
In: Synthesis Lectures on Information Security, Privacy, and Trust, vol. 4, no. 3, Morgan & Claypool, December 2013.
http://www.morganclaypool.com/doi/abs/10.2200/S00555ED1V01Y201312SPT009.

A Security Framework for Analysis and Design of Software Attestation
Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann
In: ACM Conference on Computer and Communications Security (CCS), p. 1-12, ACM Press, November 2013.
http://eprint.iacr.org/2013/083.

Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets
Blaine Stancill, Kevin Z. Snow, Nathan Otterness, Fabian Monrose, Lucas Davi, Ahmad-Reza Sadeghi
In: 16th Research in Attacks, Intrusions and Defenses (RAID) Symposium, October 2013.

Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies
Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi
In: 22nd USENIX Security Symposium (USENIX Security '13), USENIX, August 2013.

On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs
Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann
In: Lecture Notes on Computer Science (LNCS), Workshop on Cryptographic Hardware and Embedded Systems (CHES), vol. 8068, p. 107-125, Springer, August 2013.

Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same
Kevin Z. Snow, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Fabian Monrose, Ahmad-Reza Sadeghi
In: BlackHat USA, August 2013.

ConXsense – Context Sensing for Adaptive Usable Access Control
Markus Miettinen, Stephan Heuser, Wiebke Kronz, Ahmad-Reza Sadeghi and N. Asokan
August 2013.

Client-controlled Cryptography-as-a-Service in the Cloud
Sören Bleikertz, Sven Bugiel, Hugo Ideler, Stefan Nürnberger and Ahmad-Reza Sadeghi
In: 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), June 2013.

CrowdShare: Secure Mobile Resource Sharing
N. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider, Stanislaus Stelle
In: 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), June 2013.

PSiOS: Bring Your Own Privacy & Security to iOS Devices (Distinguished Paper Award)
Tim Werthmann, Ralf Hund, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), May 2013.

Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (Best Student Paper Award)
Kevin Z. Snow, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Fabian Monrose, Ahmad-Reza Sadeghi
In: 34th IEEE Symposium on Security and Privacy (Oakland 2013), May 2013.

Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM
Lucas Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013) , May 2013.

Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions
Unal Kocabas, Patrick Koeberl, Ahmad-Reza Sadeghi
In: Conference on Digital Automation and Test Europe (DATE), Interactive Presentation, March 2013.

Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer
Christoph Busold, Alexandra Dmitrienko, Hervé Seudié, Ahmed Taha, Majid Sobhani, Christian Wachsmann, Ahmad-Reza Sadeghi
In: CODASPY '13, Proceedings of the Third ACM Conference on Data and Application Security and Privacy, p. 233-242, ACM Press, February 2013. ISBN 978-1-4503-1890-7.

A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
In: Journal of Computer Security, vol. 21, no. 2, p. 283-315, February 2013.

2012

Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication
Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Ahmad-Reza Sadeghi
In: BlackHat Abu Dhabi, December 2012.

myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android
Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi
no. TUD-CS-2012-0226, November 2012.

Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware
Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi
no. TUD-CS-2012-0231, November 2012.

The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs
Ahmad-Reza Sadeghi, Steffen Schulz, Vijay Varadharajan
In: Sara Foresti, Moti Yung: LNCS, European Symposium on Research in Computer Science (ESORICS), Springer Verlag, October 2012.

PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon
Stefan Katzenbeisser, Ünal Kocabas, Vladimir Rožic, Ahmad-Reza Sadeghi, Ingrid Verbauwhede and Christian Wachsmann
In: Lecture Notes in Computer Science (LNCS), Workshop on Cryptographic Hardware and Embedded Systems (CHES), vol. 7428, p. 283-301, Springer, September 2012.

XIFER: A Software Diversity Tool Against Code-Reuse Attacks
Lucas Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012), August 2012.

The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version)
Ahmad-Reza Sadeghi, Steffen Schulz, Vijay Varadharajan
August 2012.

SmartTokens: Delegable Access Control with NFC-enabled Smartphones
Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar and Christian Wachsmann
In: Lecture Notes in Computer Science (LNCS), International Conference on Trust & Trustworthy Computing (TRUST), vol. 7344, p. 219-238, Springer, June 2012.

Converse PUF-Based Authentication
Ünal Kocabas, Andreas Peter, Stefan Katzenbeisser and Ahmad-Reza Sadeghi
In: International Conference on Trust & Trustworthy Computing (TRUST), Springer, June 2012.

EDA for Secure and Dependable Cybercars: Challenges and Opportunities
Farinaz Koushanfar, Ahmad-Reza Sadeghi and Hervé Seudié
In: ACM/IEEE Design Automation Conference (DAC), May 2012.

Unsafe Exposure Analysis of Mobile In-App Advertisements
Xuxian Jiang, Michael Grace, Ahmad-Reza Sadeghi, Wu Zhou
In: to appear at WiSec, ACM, April 2012.

Tetherway: A Framework for Tethering Camouflage
Steffen Schulz, Ahmad-Reza Sadeghi, Maria Zhdanova, Wenyuan Xu, Hossen Mustafa, Vijay Varadharajan
In: Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), ACM Press, April 2012. ISBN 978-1-4503-1265-3.

Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions
Ahmad-Reza Sadeghi, Steffen Schulz and Christian Wachsmann
In: Secure Smart Embedded Devices, Platforms and Applications, p. 429-449, Springer, April 2012.

POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC
Amitabh Das, Ünal Kocabas, Ahmad-Reza Sadeghi, Ingrid Verbauwhede
In: Conference on Digital Automation and Test Europe (DATE), March 2012.

CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm
Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi, Thomas Schneider
In: Financial Cryptography (FC'12), LNCS, p. 299-313, Springer, February 2012.

MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones
Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi
In: 19th Annual Network & Distributed System Security Symposium (NDSS), February 2012.

Towards Taming Privilege-Escalation Attacks on Android
Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry
In: 19th Annual Network & Distributed System Security Symposium (NDSS), February 2012.

Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs
Anthony van Herrewege, Stefan Katzenbeisser, Roel Maes, Roel Peeters, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, and Christian Wachsmann
In: Lecture Notes in Computer Science (LNCS), Financial Cryptography (FC) 2012, vol. 7397, p. 374-389, Springer, February 2012.

Softer Smartcards: Usable Cryptographic Tokens with Secure Execution
Franz Ferdinand Brasser, Sven Bugiel, Atanas Filyanov, Ahmad-Reza Sadeghi and Steffen Schulz
In: LNCS, Financial Cryptography and Data Security (FC), Springer, February 2012.
www.trust.cased.de/research/projects/current-projects/software-smartcards/.

2011

Twin Clouds: Secure Cloud Computing with Low Latency
Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider
In: Communications and Multimedia Security Conference (CMS'11), p. 32-44, Springer, October 2011.

AmazonIA: When Elasticity Snaps Back
Sven Bugiel, Stefan Nürnberger, Thomas Pöppelmann, Ahmad-Reza Sadeghi, Thomas Schneider
In: 18th ACM Conference on Computer and Communications Security (CCS'11), p. 17-21, ACM, October 2011.

POSTER: Control-Flow Integrity for Smartphones
Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi
In: 18th ACM Conference on Computer and Communications Security (CCS'11), ACM, October 2011.

POSTER: The Quest for Security against Privilege Escalation Attacks on Android
Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry
In: 18th ACM Conference on Computer and Communications Security (CCS'11), ACM, October 2011.

POSTER: Practical Embedded Remote Attestation Using Physically Unclonable Functions
Ünal Kocabas, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann
In: ACM Conference on Computer and Communications Security (CCS), p. 797-800, ACM Press, October 2011.

Scalable Trust Establishment with Software Reputation
Sven Bugiel, Lucas Davi, Steffen Schulz
In: Ahmad-Reza Sadeghi, Xinwen Zhang: Workshop on Scalable Trusted Computing (STC), ACM Press, October 2011.
https://freeside.trust.cased.de/apt-sec/.

Practical and Lightweight Domain Isolation on Android
Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Ahmad-Reza Sadeghi, Bhargava Shastry
In: Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM), ACM Press, October 2011.

Recyclable PUFs: logically reconfigurable PUFs
Stefan Katzenbeisser, Ünal Kocabaş, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert-Jan Schrijen, Christian Wachsmann
In: Journal of Cryptographic Engineering, vol. 1, no. 3, p. 177-186, October 2011.

Recyclable PUFs: Logically Reconfigurable PUFs
Stefan Katzenbeisser, Ünal Kocabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert-Jan Schrijen, Heike Schröder, Christian Wachsmann
In: Lecture Notes in Computer Science (LNCS), Workshop on Cryptographic Hardware and Embedded Systems (CHES), vol. 6917, p. 374-389, Springer, September 2011.

CFI Goes Mobile: Control-Flow Integrity for Smartphones
Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi
In: International Workshop on Trustworthy Embedded Devices (TrustED), September 2011.

Uni-directional Trusted Path: Transaction Confirmation on Just One Device
Atanas Filyanov , Jonathan M. McCune, Ahmad-Reza Sadeghi, Marcel Winandy
In: 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2011), June 2011.

Lightweight Remote Attestation Using Physical Functions
Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann
In: ACM Conference on Wireless Network Security (WiSec), p. 109-114, ACM Press, June 2011.

Privacy-Preserving ECG Classification with Branching Programs and Neural Networks
Mauro Barni, Pierluigi Failla, Riccardo Lazzeretti, Ahmad-Reza Sadeghi and Thomas Schneider
In: IEEE Transactions on Information Forensics and Security (TIFS), vol. 6, Nr. 2, June 2011.

Location Privacy in RFID Systemen
Ahmad-Reza Sadeghi, Christian Wachsmann
In: Digma - Zeitschrift für Datenrecht und Informationssicherheit, vol. 11, no. 2, p. 70-75, June 2011.

Lightweight Remote Attestation using Physical Functions (Extended Version)
Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann
no. TR-2011-06-01, Technical Report, June 2011.

A Formal Foundation for the Security Features of Physical Functions
Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Francois-Xavier Standaert, Christian Wachsmann
In: IEEE Symposium on Security and Privacy (SSP), p. 397-412, IEEE Computer Society, May 2011.

XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks
Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi
no. TR-2011-04, April 2011.

Twin Clouds: An Architecture for Secure Cloud Computing (Extended Abstract)
Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider
In: Workshop on Cryptography and Security in Clouds (CSC'11), March 2011.

ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks
Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy
In: 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), March 2011.

hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers
Shujun Li, Ahmad-Reza Sadeghi, Soeren Heisrath, Roland Schmitz and Junaid Jameel Ahmad
In: 15th International Conference on Financial Cryptography and Data Security (FC), February 2011.
http://ifca.ai/fc11/.

Secure Set Intersection with Untrusted Hardware Tokens
Marc Fischlin, Benny Pinkas, Ahmad-Reza Sadeghi, Thomas Schneider, Ivan Visconti
In: LNCS 6558, 11th Cryptographers' Track at the RSA Conference (CT-RSA'11), p. 1-16, Springer, February 2011.

A Security Architecture for Accessing Health Records on Mobile Phones
Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
In: HEALTHINF'2011: Proceedings of the 4th International Conference on Health Informatics, January 2011.

Securing the Access to Electronic Health Records on Mobile Phones
Alexandra Dmitrienko, Zecir Hadzic, Hans Lhr, Ahmad-Reza Sadeghi, Marcel Winandy
In: Springer-Verlag: Biomedical Engineering Systems and Technologies, 2011.

Trusted embedded System Operating System (TeSOS) - Study and Design
Ahmad-Reza Sadeghi, Steffen Schulz, Alexandra Dmitrienko, Christian Stüble, Dennis Gessner, Markus Ullmann
2011.
http://www.trust.informatik.tu-darmstadt.de/research/projects/finalized-projects/tesos-trusted-embedded-secure-operating-system/.

2010

Machiavelli Confronts 21st Century Digital Technology: Democracy in a Network Society
Ahmad-Reza Sadeghi, Bart Preneel, Andreas Pfitzmann, Tal Moran, Ursula Maier-Rabler, Miroslaw Kutylowski, Marek Klonowski, Seda F. Guerses, George Danezis, Nikita Borisov, Walter S. Baer, et al.
December 2010.
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1521222.

Impossibility Results for RFID Privacy Notions
Frederik Armknecht, Ahmad-Reza Sadeghi, Alessandra Scafuro, Ivan Visconti, Christian Wachsmann
In: LNCS, Transactions on Computational Science IX, vol. 6480, p. 39-63, Springer, December 2010.

Breaking e-Banking CAPTCHAs
Ahmad-Reza Sadeghi, Shujun Li, Syed Amier Haider Shah, Muhammad Asad Usman Khan, Syed Ali Khayam, Roland Schmitz
In: 26th Annual Computer Security Applications Conference (ACSAC 2010), December 2010.
http://www.acsac.org/.

TruWalletM: Secure Web Authentication on Mobile Platforms
Sven Bugiel, Alexandra Dmitrienko, Kari Kostiainen, Ahmad-Reza Sadeghi, Marcel Winandy
In: Proceedings of INTRUST 2010 The Second International Conference on Trusted Systems, December 2010.

Securing the E-Health Cloud
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
In: 1st ACM International Health Informatics Symposium (IHI 2010), November 2010.

Towards Hardware-Intrinsic Security
Ahmad-Reza Sadeghi, David Naccache
In: Information Security and Cryptography, November 2010.
http://www.springer.com/computer/security+and+cryptology/book/978-3-642-14451-6.

Efficient Secure Two-Party Computation with Untrusted Hardware Tokens
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
In: Ahmad-Reza Sadeghi and David Naccache: Information Security and Cryptography, Towards Hardware Intrinsic Security: Foundation and Practice, p. 367-386, Springer Berlin Heidelberg, November 2010. ISBN 978-3-642-14452-3.
http://www.springerlink.com/content/v717986n7r261772.

Video Streaming Forensic - Content Identification with Traffic Snooping
Ahmad-Reza Sadeghi, Biswanath Mukherjee, Dipak Ghosal, Yali Liu
In: 13th Information Security Conference (ISC 2010), October 2010.
http://math.fau.edu/%7Eisc2010.

Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Christian Wachsmann, Johannes Winter
In: LNCS, Information Security Conference (ISC), vol. 6531, p. 84-98, Springer, October 2010.

Return-Oriented Programming without Returns
Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy
In: CCS '10, Proceedings of the 17th ACM conference on Computer and communications security, p. 559--572, ACM, October 2010. ISBN 978-1-4503-0245-6.
http://doi.acm.org/10.1145/1866307.1866370.

Privilege Escalation Attacks on Android
Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy
In: ISC 2010: Proceedings of the 13th Information Security Conference, October 2010.

TASTY: Tool for Automating Secure Two-partY computations
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg
In: 17th ACM Conference on Computer and Communications Security (CCS'10), p. 451-462, ACM, October 2010.

Enhancing RFID Security and Privacy by Physically Unclonable Functions
Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: Information Security and Cryptography, Towards Hardware-Intrinsic Security: Foundations and Practice, p. 281-307, Springer, September 2010.

Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten
Ahmad-Reza Sadeghi, Thomas Schneider
In: LNI, Workshop Innovative und sichere Informationstechnologie für das Gesundheitswesen von morgen (perspeGKtive'10), vol. P-174, p. 11-25, September 2010.
http://www.perspegktive.de.

A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols
José Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
In: LNCS, 15th European Symposium on Research in Computer Security (ESORICS'10), vol. 6345, p. 151--167, Springer, September 2010.
http://www.esorics2010.org.

Trusted Computing
Ahmad-Reza Sadeghi, Christian Wachsmann
In: Handbook of Financial Cryptography and Security, p. 221-256, CRC Press, August 2010.

YAZKC: Yet Another Zero-Knowledge Compiler
Endre Bangerter, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
19th USENIX Security Symposium (Security'10) Poster Session, August 2010.
http://www.usenix.org/events/sec10/poster.html.

Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
In: LNCS, 12th International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10), vol. 6225, p. 383-397, Springer, August 2010.

Return-Oriented Programming without Returns on ARM
Lucas Davi, Alexandra Dmitrienko Ahmad-Reza Sadeghi, Marcel Winandy
no. HGI-TR-2010-002, July 2010.

Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic
Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Stefan Katzenbeisser
In: Information Hiding Conference (IH), Springer, June 2010.

On RFID Privacy with Mutual Authentication and Tag Corruption
Frederik Armknecht, Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: LNCS, International Conference on Applied Cryptography and Network Security (ACNS), vol. 6123, p. 493-510, Springer, June 2010.

Anonymous Authentication with TLS and DAA
Ahmad-Reza Sadeghi, Hans Löhr, Emanuele Cesena, Gianluca Ramunno, Davide Vernizzi
In: TRUST2010, June 2010.

Anonymous Authentication for RFID Systems
Frederik Armknecht, Liqun Chen, Ahmad-Reza Sadeghi, Christian Wachsmann
In: LNCS, Workshop on RFID Security (RFIDSec), vol. 6370, p. 158-175, Springer, June 2010.

Key Attestation from Trusted Execution Environments
Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ekberg, Ahmad-Reza Sadeghi, Nadarajah Asokan
In: TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, p. 30--46, June 2010.

Token-Based Cloud Computing -- Secure Outsourcing of Data and Arbitrary Computations with Lower Latency
Ahmad-Reza Sadeghi, Thomas Schneider, Marcel Winandy
In: LNCS, 3rd International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud, vol. 6101, p. 417--429, Springer, June 2010.
http://www.trust2010.org/workshop-cloud.html.

Breaking a Virtual Password System Based on Randomized Linear Generation Functions
Ahmad-Reza Sadeghi, Shujun Li, Syed Ali Khayam, Roland Schmitz
In: IEEE ICC 2010 - Communication and Information System Security Symposium ('ICC'10 CISS'), May 2010.
http://www.ieee-icc.org/2010/.

Trusted Virtual Domains: Color Your Network
Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
In: Datenschutz und Datensicherheit (DuD), vol. 5, p. 289-298, May 2010.

PUF-Enhanced RFID Security and Privacy
Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: Workshop on Secure Component and System Identification (SECSI), April 2010.

ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks
Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy
no. HGI-TR-2010-001, March 2010.

From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
February 2010.

Patterns for Secure Boot and Secure Storage in Computer Systems
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
In: 4th International Workshop on Secure systems methodologies using patterns (SPattern 2010),, February 2010.

Modular Design of Efficient Secure Function Evaluation Protocols
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
Cryptology ePrint Archive, Report 2010/079, February 2010.
http://eprint.iacr.org/2010/079/.

Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers
Ahmad-Reza Sadeghi, Christian Stüble, Serdar Cabuk, Chris I. Dalton, Konrad Eriksson, Dirk Kuhlmann, Hari Govind V. Ramasamy, Gianluca Ramunnok, Matthias Schunter
In: Journal of Computer Security, vol. 18, no. 1, p. 89-121, January 2010.

Extending IPsec for Efficient Remote Attestation
Steffen Schulz and Ahmad-Reza Sadeghi
In: Financial Cryptography and Data Security (FC), vol. LNCS, no. 6052, Springer, January 2010.

Embedded SFE: Offloading Server and Network using Hardware Tokens
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
In: LNCS, 14th International Conference on Financial Cryptography and Data Security (FC'10), vol. 6052, p. 207--221, Springer, January 2010.
http://eprint.iacr.org/2009/591.

2009

Memory Leakage-Resilient Encryption based on Physically Unclonable Functions
Ahmad-Reza Sadeghi, Frederik Armknecht, Roel Maes, Berk Sunar, Pim Tuyls
In: ASIACRYPT'09, December 2009.

On the Security of PAS (Predicate-based Authentication Service)
Ahmad-Reza Sadeghi, Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Roland Schmitz, Huaxiong Wang
In: Annual Computer Security Applications Conference (ACSAC’09), 2009. , December 2009.

Trusted Virtual Domains - Design, Implementation and Lessons Learned
Luigi Catuogno, Alexandra Dmitrienko, Konrad Eriksson, Dirk Kuhlmann, Gianluca Ramunno, Ahmad-Reza Sadeghi, Steffen Schulz, Matthias Schunter, Marcel Winandy and Jing Zhan
In: International Conference on Trusted Systems (INTRUST), Springer, December 2009.

Anonymizer-Enabled Security and Privacy for RFID
Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: LNCS, International Conference on Cryptology and Network Security (CANS), vol. 5888, p. 134-153, Springer, December 2009.

Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
In: LNCS, 8th International Conference on Cryptology And Network Security (CANS'09), vol. 5888, p. 1--20, Springer, December 2009.
http://eprint.iacr.org/2009/411.

Efficient Privacy-Preserving Classification of ECG Signals
Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
In: 1st IEEE International Workshop on Information Forensics and Security (IEEE WIFS'09), p. 91--95, IEEE, December 2009.

Efficient Privacy-Preserving Face Recognition
Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg
In: LNCS, 12th International Conference on Information Security and Cryptology (ICISC'09), vol. 5984, p. 229-244, Springer, December 2009.

A Practical Property-based Bootstrap Architecture
Ahmad-Reza Sadeghi, Christian Stüble, Jing Zhan, René Korthaus
In: ACMSTC'09, November 2009.

Transparent Mobile Storage Protection in Trusted Virtual Domains
Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy
In: 23rd Large Installation System Administration Conference (LISA '09), p. 159-172, November 2009.

TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
In: 4th ACM Workshop on Scalable Trusted Computing, November 2009.

Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics
Ahmad-Reza Sadeghi, Thomas Schneider
Section Days of Ruhr-University Bochum Research School, November 2009.
http://www.research-school.rub.de/section_days.html.

Future of Assurance: Ensuring that a System is Trustworthy
Ahmad-Reza Sadeghi, Claire Vishik, Ingrid Verbauwhede
In: ISSE'09, October 2009.

Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09), October 2009.
http://www.hyperelliptic.org/SPEED/.

On the Design and Implementation of Efficient Zero-Knowledge Proofs of Knowledge
Endre Bangerter, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, Joe-Kai Tsay
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09), October 2009.
http://www.hyperelliptic.org/SPEED/.

Hide and Seek in Time - Robust Covert Timing Channels
Yali Liu and Dipak Ghosal and Frederik Armknecht and Ahmad-Reza Sadeghi and Steffen Schulz and Stefan Katzenbeisser
In: LNCS, European Symposium on Research in Computer Security (ESORICS), no. 5789, p. 120-135, Springer, September 2009. ISBN 978-3-642-04443-4.

Secure Evaluation of Private Linear Branching Programs with Medical Applications
Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider
In: LNCS, 14th European Symposium on Research in Computer Security (ESORICS'09), vol. 5789, p. 424--439, Springer, September 2009.
http://conferences.telecom-bretagne.eu/esorics2009/EN/home.php.

Automatic Generation of Sigma-Protocols
Endre Bangerter, Thomas Briner, Wilko Henecka, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
In: LNCS, 6th European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09), vol. 6391, p. 67--82, Springer, September 2009.
http://www.iit.cnr.it/EUROPKI09/.

Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification
Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider
In: 1st International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09), September 2009.
http://www.speedproject.eu/index.php?option=com_content&task=view&id=33&Itemid=68.

How to Combine Homomorphic Encryption and Garbled Circuits - Improved Circuits and Computing the Minimum Distance Efficiently
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
In: 1st International Workshop on Signal Processing in the Encrypted Domain (SPEED2009), September 2009.
http://www.speedproject.eu/index.php?option=com_content&task=view&id=33&Itemid=68.

Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks
Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy
In: STC '09, Proceedings of the 2009 ACM workshop on Scalable trusted computing, p. 49--54, ACM, September 2009. ISBN 978-1-60558-788-2.
http://doi.acm.org/10.1145/1655108.1655117.

Location Privacy in RFID Applications
Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: Springer Verlag: LNCS, Privacy in Location-Based Applications: Research Issues and Emerging Trends, vol. 5599, p. 127-150, Springer, August 2009.

A Pattern for Secure Graphical User Interface Systems
Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy
In: IEEE Computer Society: 3rd International Workshop on Secure systems methodologies using patterns (SPattern'09), Proceedings of the 20th International Workshop on Database and Expert Systems Applications, p. 186-190, August 2009.

Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage
Ahmad-Reza Sadeghi, Klaus Kursawe, Dries Schellekens, Boris Skoric, Pim Tuyls
In: 2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), July 2009.

Enhancing RFID Security and Privacy by Physically Unclonable Functions (Extended Abstract)
Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: Dagstuhl Seminar Proceedings, Foundations for Forgery-Resilient Cryptographic Hardware, no. 09282, p. 10-11, Schloss Dagstuhl, July 2009.

Efficient RFID Security and Privacy with Anonymizers
Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: Workshop on RFID Security (RFIDSec), June 2009.
http://www.cosic.esat.kuleuven.be/rfidsec09/.

Practical Secure Evaluation of Semi-Private Functions
Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
In: LNCS, 7th International Conference on Applied Cryptography and Network Security (ACNS'09), vol. 5536, p. 89--106, Springer, June 2009.

Einsatz von Sicherheitskernen und Trusted Computing
Ahmad-Reza Sadeghi, Marcel Winandy
In: D-A-CH Security , May 2009.

Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing
Hans Löhr, Ahmad-Reza Sadeghi, Claire Vishik, Marcel Winandy
In: Springer Verlag: LNCS, 5th Information Security Practice and Experience Conference (ISPEC'09), vol. 5451, p. 396-407, April 2009.

Physically Unclonable Pseudorandom Functions
Ahmad-Reza Sadeghi, Frederik Armknecht, Pim Tuyls, Roel Maes, Berk Sunar
In: Poster session of Advances in Cryptology - EUROCRYPT, April 2009.

Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels
Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy
In: Springer Verlag: LNCS, Proceedings of the 2nd International Conference on Trusted Computing, vol. 5471, p. 45-62, April 2009.

Automatic Generation of Sound Zero-Knowledge Protocols
Endre Bangerter, Jan Camenisch, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
28th Advances in Cryptology -- EUROCRYPT 2009 Poster Session, April 2009.

Secure VPNs for Trusted Computing Environments
Ahmad-Reza Sadeghi, Steffen Schulz
In: International Conference on Trusted Computing (TRUST), Springer, April 2009.

Bringing Zero-Knowledge Proofs of Knowledge to Practice
Endre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, Joe-Kai Tsay
In: LNCS, 17th International Workshop on Security Protocols (SPW'09), no. 7028, p. 51-62, Springer, March 2009. ISBN 978-3-642-36212-5.
http://spw.feis.herts.ac.uk.

Using Compilers to Enhance Cryptographic Product Development
Ahmad-Reza Sadeghi, Endre Bangerter, Manuel Barbosa, Daniel Bernstein, Ivan Damgård, Dan Page, Jakob I. Pagter, Sampo Sovio
In: Information Security Solutions Europe (ISSE), January 2009.

2008

Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems
Andy Rupp, Gregor Leander, Eendre Bangerter, Alexander Dent, Ahmad-Reza Sadeghi
In: Advances in Cryptology - ASIACRYPT 2008, December 2008.

Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Ahmad-Reza Sadeghi, Thomas Schneider
In: LNCS, 11th International Conference on Information Security and Cryptology (ICISC'08), vol. 5461, p. 336--353, Springer, December 2008.

Universally Composable Security Analysis of TLS
Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis, Olivier Pereira
In: Second Conference on Provable Security (ProvSec), November 2008.

Improved Security Notions and Protocols for Non-Transferable Identification
Ahmad-Reza Sadeghi, Carlo Blundo, Giuseppe Persiano, Ivan Visconti
In: 13th European Symposium on Research in Computer Security (ESORICS), October 2008.

An Efficient Implementation of Trusted Channels Based on OpenSSL
Ahmad-Reza Sadeghi, Frederik Armknecht, Yacine Gasmi, Gianluca Ramunno, Davide Vernizzi, Patrick Stewin, Martin Unger
In: ACMSTC 2008, October 2008.

User Privacy in Transport Systems Based on RFID E-Tickets
Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
In: International Workshop on Privacy in Location-Based Applications (PiLBA), October 2008.

Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains
Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Rani Husseiki, Yacine Gasmi, Patrick Stewin, Martin Unger
In: 3rd ACM Workshop on Scalable Trusted Computing, October 2008.

A Demonstrative Ad-hoc Attestation System
Ahmad-Reza Sadeghi, Endre Bangerter, Maksim Djackov
In: Information Security Conference 2008 (ISC'08), September 2008.

Property-Based Attestation without a Trusted Third Party
Ahmad-Reza Sadeghi, Hans Löhr, Liqun Chen, Mark Manulis
In: Information Security Conference (ISC'08), September 2008.

Property-Based TPM Virtualization
Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
In: Springer: LNCS, Information Security, 11th International Conference (ISC 2008), no. 5222, p. 1-16, September 2008.

Efficient Helper Data Key Extractor on FPGAs
Ahmad-Reza Sadeghi, Jamshid Shokrollahi, Christoph Bösch, Jorge Guajardo, Pim Tuyls
In: Workshop on Cryptographic Hardware and Embedded Systems 2008 (CHES 2008), August 2008.

A Forensic Framework for Tracing Phishers
Ahmad-Reza Sadeghi, Sebastian Gajek, Felix Gröbert, Dominik Birk
In: LNCS, no. 6102, Springer, August 2008.

Resettable and Non-Transferable Chip Authentication for E-Passports
Ahmad-Reza Sadeghi, Carlo Blundo, Giuseppe Persiano, Ivan Visconti
In: RFIDSec 2008, July 2008.

Securing Peer-to-Peer Distributions for Mobile Devices
Ahmad-Reza Sadeghi, Christian Stüble, André Osterhues, Marko Wolf, Nadarajah Asokan
In: 4th Information Security Practice and Experience Conference (ISPEC 2008), April 2008.

Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly
Ahmad-Reza Sadeghi, Frederik Armknecht, Hans Löhr, Mark Manulis, Alberto Escalante
In: 4th Information Security Practice and Experience Conference (ISPEC 2008), April 2008.

Provably Secure Browser-Based User-Aware Mutual Authentication over TLS
Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis
In: ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), March 2008.

Identification Protocols Revisited - Episode I: E-Passports
Ahmad-Reza Sadeghi, Carlo Blundo, Giuseppe Persiano, Ivan Visconti
In: e-crypt workshop on Secure Component and System Identification (SECSI), March 2008.

Trusted Computing—State of the Art and Challenges
Ahmad-Reza Sadeghi
In: LNCS, SOFSEM 2008, no. 4910, Springer, January 2008.

2007

Beyond Secure Channels
Ahmad-Reza Sadeghi, Yacine Gasmi, Patrick Stewin, Martin Unger, Nadarajah Asokan
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), p. 30-40, ACM Press, November 2007.

Reconfigurable Trusted Computing in Hardware
Christof Paar, Ahmad-Reza Sadeghi, Tim Güneysu, Thomas Eisenbarth, Dries Schellekens, Marko Wolf
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), p. 15-25, ACM Press, November 2007.

Enabling Fairer Digital Rights Management with Trusted Computing
Ahmad-Reza Sadeghi, Christopher Wolf, Christian Stüble, Nadarajah Asokan, Jan-Erik Ekberg
In: LNCS, 10th International Conference on Information Security (ISC 2007), vol. 4779, p. 53-70, Springer Verlag, October 2007.

Combining Tardos Fingerprinting Codes and Fingercasting
Ahmad-Reza Sadeghi, Stefan Katzenbeisser, Boris Skoric, Mehmet Celik
In: LNCS, 9th International Workshop on Information Hiding (IH 2007), vol. 4567, p. 294-310, Springer Verlag, June 2007.
http://www.springerlink.com/content/j5547520ux28g151/.

Browser Models for Usable Authentication Protocols
Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis
In: IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07), 2007.

Phishing Phishers - Observing and Tracing Organized Cybercrime
Ahmad-Reza Sadeghi, Sebastian Gajek, Felix Gröbert, Dominik Birk
In: Second International Conference on Internet Monitoring and Protection (ICIMP 2007), p. 3, IEEE Computer Society, 2007.
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4271749.

Fingercasting—Joint Fingerprinting and Decryption of Broadcast Messages
Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber
In: LNCS, Transactions on Data Hiding and Multimedia Security II, vol. 4499, p. 1-34, Springer Verlag, 2007.

Browser-based Authentication Protocols for Naive Users
Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis
In: Western European Workshop on Research in Cryptology (WEWoRC 2007), 2007.

Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
In: Second International Conference on Availability, Reliability and Security (ARES 2007), p. 120-127, 2007.

A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting
Ahmad-Reza Sadeghi, Hans Löhr, Liqun Chen, Mark Manulis, Alberto Escalante
In: LNCS, 11th International Conference on Financial Cryptography and Data Security (FC 2007), vol. 4886, p. 29-44, Springer Verlag, 2007.

Compartmented Security for Browsers
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
no. HGI-TR-2007-001, 2007.

Enhancing Grid Security Using Trusted Virtualization
Ahmad-Reza Sadeghi, Christian Stüble, Hans Löhr, Hari Govind V. Ramasamy, Stefan Schulz, Matthias Schunter
In: LNCS, 4th International Conference on Autonomic and Trusted Computing (ATC 2007), vol. 4610, p. 372-384, Springer Verlag, 2007.

Trusted User-Aware Web Authentication
Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Marcel Winandy
In: Workshop on Trustworthy User Interfaces for Passwords and Personal Information (TIPPI'07),, 2007.

2006

TCG Inside? - A Note on TPM Specification Compliance
Ahmad-Reza Sadeghi, Christian Wachsmann, Marcel Selhorst, Christian Stüble, Marcel Winandy
In: ACM Workshop on Scalable Trusted Computing (ACMSTC), p. 47-56, ACM Press, November 2006.

Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages
Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber
In: LNCS, 11th Australasian Conference on Information Security and Privacy (ACISP 2006), vol. 4058, Springer Verlag, July 2006.
http://www.springerlink.com/content/0g182383389750g5/.

Property-based Taming Lying Mobile Nodes
Ahmad-Reza Sadeghi, Mark Manulis
In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006), April 2006.
http://doi.ieeecomputersociety.org/10.1109/AINA.2006.276.

Property-based Taming Lying Mobile Node
Ahmad-Reza Sadeghi, Mark Manulis
In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006) , April 2006.
http://doi.ieeecomputersociety.org/10.1109/AINA.2006.276.

Linkable Democratic Group Signatures
Jörg Schwenk, Ahmad-Reza Sadeghi, Mark Manulis
In: 2nd Information Security Practice and Experience Conference (ISPEC 2006), April 2006.

Play it once again, Sam - Enforcing Stateful Licenses on Open Platforms
Ahmad-Reza Sadeghi, Christian Stüble, Marko Wolf, Michael Scheibel
In: The Second Workshop on Advances in Trusted Computing (WATC '06 Fall), 2006.

Key Agreement for Heterogeneous Ad-Hoc Groups
Ahmad-Reza Sadeghi, Mark Manulis
In: International Journal of Wireless and Mobile Computing (IJWMC), 2006.

Key Agreement for Heterogenous Mobile Ad-hoc Groups
Ahmad-Reza Sadeghi, Mark Manulis
In: Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing), 2006.
http://portal.acm.org/citation.cfm?id=1091715.

Physical Security Bounds Against Tampering
Ahmad-Reza Sadeghi, Christof Paar, Kerstin Lemke
In: International Conference on Applied Cryptography and Network Security (ACNS 2006), 2006.
http://www.springerlink.com/content/q26016rj663v2428/.

E-Passport: The Global Traceability or How to Feel Like an UPS Package
Ahmad-Reza Sadeghi, Christof Paar, Dario Carluccio, Kerstin Lemke-Rust
In: Workshop on RFID Security 2006, 2006.
http://www.springerlink.com/content/pg22v52027263222/.

Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data
Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe
In: Transactions on Data Hiding and Multimedia Security, 2006.
http://www.springerlink.com/content/j1775q68rkh33038/.

Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages
Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber
2006.

Design and Implementation of a Secure Linux Device Encryption Architecture
Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Michael Scheibel
In: LinuxTag, 2006.

A Computational Model for Watermark Robustness
Ahmad-Reza Sadeghi, Andre Adelsbach, Stefan Katzebeisser
In: Information Hiding Workshop, 2006.

A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption
Ahmad-Reza Sadeghi, Ulrich Huber
2006.

A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption
Ahmad-Reza Sadeghi, Ulrich Huber
In: Springer Verlag: LNCS, 9th Information Security Conference (ISC 2006), vol. 4173, 2006.
http://www.springerlink.com/content/50023w6877036027/.

Client Authentication in Federations Using a Security Mode
Ahmad-Reza Sadeghi, Sebastian Gajek
In: Toward a More Secure Web - W3C Workshop on Usability and Transparency of Web Authentication., 2006.

Security Architecture for Device Encryption and VPN
Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Ammar Alkassar, Michael Scheibel
In: Information Security Solution Europe (ISSE06), 2006.
http://www.springerlink.com/content/g6g7126v3k0njh8q/.

A Protocol for Property-Based Attestation
Ahmad-Reza Sadeghi, Christian Stüble, Hans Löhr, Liquen Chen, Rainer Landfermann, Markus Rohe
In: First ACM Workshop on Scalable Trusted Computing (STC'06), 2006.

Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
In: Workshop on Information and System Security (WISSEC'06), 2006.

2005

Property-Based Broadcast Encryption for Multi-level Security Policies
Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber
In: LNCS, 8th International Conference on Information Security and Cryptology (ICISC 2005), vol. 3935, Springer Verlag, December 2005.
http://www.springerlink.com/content/3q330w4400157t2g/.

Towards Multilateral Secure Digital Rights Distribution Infrastructures
Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe
In: ACM DRM Workshop'05, November 2005.

Embedding Trust into Cars—Secure Software Delivery and Installation
Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble, Ulrich Huber
In: Third Workshop on Embedded Security in Cars (escar 2005), November 2005.

Multilaterally Secure Computing Platforms – in your office, car and at home
Ahmad-Reza Sadeghi, Christian Stüble
In: 1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society, September 2005.

New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy
Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Marcel Selhorst, Oska Senft
In: Datenschutz und Datensicherheit, vol. 9, September 2005.

Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme
Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe
In: 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, September 2005.

Secure Data Management in Trusted Computing
Ahmad-Reza Sadeghi, Christian Stüble, Ulrich Kühn, Klaus Kursawe, Stefan Lucks
In: LNCS, Workshop on Cryptographic Hardware and Embedded Systems (CHES), vol. 3659, p. 324-338, Springer Verlag, August 2005.
http://www.springerlink.com/content/4elbfgqmvvh5qugp/.

Simplified Hardness Proofs in the Generic Group Model
Ahmad-Reza Sadeghi, Andy Rupp, Endre Bangerter
In: Western European Workshop on Research in Cryptology (WEWoRC 2005), July 2005.

Sokrates - A Compiler Framework for Zero-Knowledge Protocols
Ahmad-Reza Sadeghi, Markus Rohe, Jan Camenisch
In: Western European Workshop on Research in Cryptology (WEWoRC 2005), July 2005.

Towards Secure Computing Platforms with Open-Source and Trusted Computing
Ahmad-Reza Sadeghi, Ammar Alkassar, Christian Stüble, Marcel Selhorst
In: 9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI), May 2005.

Towards Multilateral Security On DRM Platforms
Ahmad-Reza Sadeghi, Christian Stüble
In: First Information Security Practice and Experience Conference (ISPEC 2005), April 2005.
http://www.springerlink.com/content/hwbrd3crg2l2ral8/.

Secure Software Delivery and Installation in Embedded Systems
Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber
In: First Information Security Practice and Experience Conference (ISPEC 2005), April 2005.

Security Engineering for Zero-knowledge Watermark Detection
Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe
In: Special Session on Media Security (WIAMIS 2005), April 2005.

Towards multilaterally secure computing platforms - with open source and trusted computing
Ahmad-Reza Sadeghi, Christian Stüble
In: Information Security Technical Report, vol. 10, no. 2, p. 83-95, January 2005.

Trusted Computing: Whom do we trust? Building Open Multilateral Secure Platforms Based On Trusted Computing
Ahmad-Reza Sadeghi
In: DRM Conference, 2005.

Secure Software Delivery and Installation in Embedded Systems
Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber
2005.

Secure Software Delivery and Installation in Embedded Systems
Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber
In: K. Lemke, C. Paar and M. Wolf: Embedded Security in Cars: Securing Current and Future Automotive IT Applications, p. 27-49, Springer-Verlag, 2005.
http://www.springerlink.com/content/lfv77rfp7tj4wtj2/.

Property-Based Broadcast Encryption for Multi-level Security Policies
Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble, Ulrich Huber
2005.

Proving a WS-Federation Passive Requestor Profile with a Browser Model
Ahmad-Reza Sadeghi, Thomas Groß, Birgit Pfitzmann
In: Workshop on Secure Web Services (SWS), 2005.
http://portal.acm.org/citation.cfm?id=1103034.

First Summary Report on Asymmetric Watermarking
Ahmad-Reza Sadeghi, Andre Adelsbach, Patrick Bas, Stefan Katzenbeisser (Eds.), Mauro Barni, Alessia De Rosa
In: ECRYPT, Network of Excellence in Cryptology, 2005.

Anti-theft Protection: Electronic Immobilizers
Ahmad-Reza Sadeghi, Christian Stüble, Kerstin Lemke-Rust
In: K. Lemke, C. Paar and M. Wolf (eds.): Embedded Security in Cars: Securing Current and Future Automotive IT Applications., p. 51-67, Springer Verlag, 2005.
http://www.springerlink.com/content/rj4052547n61v84n/.

Browser Model for Security Analysis of Browser-Based Protocols
Ahmad-Reza Sadeghi, Thomas Groß, Birgit Pfitzmann
In: European Symposium for Research in Computer Science (ESORICS), 2005.

Browser Model for Security Analysis of Browser-Based Protocols
Ahmad-Reza Sadeghi, Thomas Groß, Birgit Pfitzmann
no. RZ3600, 2005.
http://domino.research.ibm.com/library/cyberdig.nsf/1e4115aea78b6e7c85256b360066f0d4/abc70675375b9adb85256ff600428dc5?OpenDocument&Highlight=0,rz3600.

Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it
Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe
In: ACM Multimedia Systems, 2005.

A Privacy-Protecting Coupon System
Ahmad-Reza Sadeghi, Liqun Chen, Matthias Enzmann, Markus Schneider, Michael Steiner
In: Financial Cryptography, 2005.

An Open Approach for Designing Secure Electronic Immobilizers
Ahmad-Reza Sadeghi, Christian Stüble, Kerstin Lemke-Rust
In: First Information Security Practice and Experience Conference (ISPEC 2005), 2005.
http://www.springerlink.com/content/y8mmy4gvdmjny2lc/.

2004

Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms
Ahmad-Reza Sadeghi, Christian Stüble
In: 20th Annual Computer Security Applications Conference (ACSAC), December 2004.

Property-based Attestation for Computing Platforms: Caring about policies, not mechanisms
Ahmad-Reza Sadeghi, Christian Stüble
In: New Security Paradigm Workshop (NSPW), September 2004.

European Multilateral Secure Computing Base - Open Trusted Computing for You and Me
Ahmad-Reza Sadeghi, Christian Stüble, Norbert Pohlmann
In: Datenschutz und Datensicherheit (DUD) , vol. 9, p. 548-554, September 2004.

Overcoming the Obstacles of Zero-Knowledge Watermark Detection
Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe
In: ACM Multimedia and Security Workshop, p. pp. 46 - 55, ACM Press, 2004.

Trusted Computing Platforms: Zur technischen und industriepolitischen Situation und Vorgehensweise
Ahmad-Reza Sadeghi, Dirk Günnewig, Kai Rannenberg, Christian Stüble
In: Prof. Dr. iur. Chris­ti­an Koenig, An­dre­as Neu­mann, To­bi­as Katz­sch­mann: Vertrauenswürdige Systemumgebungen Technik, Recht und gesellschaftspolitische Implikationen des "Trusted Computing", Verlag Recht und Wirtschaft, 2004.

Enhancing Security of Computing Platforms with TC-Technology
Ahmad-Reza Sadeghi, Christian Stüble, Oliver Altmeyer, Marcel Selhorst
In: Sachar Pau­lus, Nor­bert Pohl­mann, Hel­mut Rei­mer: Information Security Solutions Europe (ISSE 2004), p. 346-361, Vieweg Verlag, 2004.

2003

The Quest for Security in Integrated Networks
Ahmad-Reza Sadeghi, Ammar Alkassa
In: 11th International Conference on Telecommunication Systems, Modeling and Analysis, October 2003.

Watermark Detection with Zero-Knowledge Disclosure
Ahmad-Reza Sadeghi, Andre Adelsbach, Stefan Katzenbeisser
In: ACM Multimedia Systems Journal, vol. 9, no. 3, p. 266-278, September 2003.
http://www.springerlink.com/content/475ve9fx69trvqr0/.

Taming "Trusted Computing" by Operating System Design
Ahmad-Reza Sadeghi, Christian Stüble
In: 4th International Workshop on Information Security Applications (WISA'03), Springer-Verlag, September 2003.
http://www.springerlink.com/content/qkwrtdmlxclg8wff/.

Secure Object Identification - or: Solving The Chess Grandmaster Problem
Ahmad-Reza Sadeghi, Ammar Alkassar, Christian Stüble
In: New Security Paradigms Workshop, August 2003.

Trusted Computing ohne Nebenwirkungen
Ahmad-Reza Sadeghi, Christian Stüble, Dirk Günnewig
In: Datenschutz und Datensicherheit (DUD), vol. 9, p. 556-560, Vieweg Verlag, 2003.

Sinn und Unsinn von TCPA und Palladium
Ahmad-Reza Sadeghi, Christian Stüble
In: c't, vol. 13, 2003.

Die digitale Signatur
Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Schneider, Christian Stüble
In: J. Bal­f­anz, J. Wen­den­burg: Digitale Signaturen in der Praxis, AWV Verlag, 2003.

Electronic Payment Systems
Ahmad-Reza Sadeghi, Markus Schneider
In: D. Gün­ne­wig, E. Be­cker, W. Buhse, N. Rump: LNCS, Digital Rights Management, vol. 2770, p. 113-137, Springer Verlag, 2003.
http://www.springerlink.com/content/9qarwwxkfkwtqgv4/.

Advanced Techniques for Dispute Resolving and Authorship Proofs on Digital Works
Ahmad-Reza Sadeghi, Andre Adelsbach
In: Security and Watermarking of Multimedia Contents V, 2003.

Bridging the Gap between TCPA/Palladium and Personal Security
Ahmad-Reza Sadeghi, Christian Stüble
2003.

2002

Cryptography Meets Watermarking: Detecting Watermarks with Minimal- or Zero-Knowledge Disclosure
Ahmad-Reza Sadeghi, Andre Adelsbach, Stefan Katzenbeisser
In: XI European Signal Processing Conference, XI European Signal Processing Conference, vol. 1, p. 446-449, September 2002.

Final Report on Verification and Assessment
Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble
no. MAF­TIA De­li­ver­a­ble D22, January 2002.

Auctions with Multiple Rounds and Multiple Items
Ahmad-Reza Sadeghi, Matthias Schunter, Sandra Steinbrecher
In: Int. Workshop on Trust and Privacy in Digital Business (DEXA 2002), 2002.

2001

Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference
Ahmad-Reza Sadeghi, Michael Steiner
In: LNCS, Eurocrypt, vol. 2045, p. 243-260, Springer-Verlag, May 2001.

Optimized Self-Synchronizing Mode of Operation
Ahmad-Reza Sadeghi, Andre Adelsbach, Alexander Geraldy, Birgit Pfitzmann
In: 8th International Workshop on Fast Software Encryption, April 2001.

How to Break a Semi-Anonymous Fingerprinting Scheme
Ahmad-Reza Sadeghi
In: LNCS, Information Hiding: Fourth International Workshop, vol. 2137, p. 384-394, Springer-Verlag, 2001.
http://www.springerlink.com/content/9gbhnwf945kmuv80/.

Zero-Knowledge Watermark Detection and Proof of Ownership
Ahmad-Reza Sadeghi, Andre Adelsbach
In: LNCS, Information Hiding: Fourth International Workshop, vol. 2137, p. 273-288, Springer-Verlag, 2001.
http://www.springerlink.com/content/xqpm659cvp9g0unt/.

2000

Proving ownership of digital content
Ahmad-Reza Sadeghi, Andre Adelsbach, Birgit Pfitzmann
In: LNCS, 3rd International Workshop, IH ’99,, vol. 1768, p. 126-141, Springer-Verlag, October 2000.

Self-escrowed cash against user black-mailing
Ahmad-Reza Sadeghi, Birgit Pfitzmann
In: LNCS, Fourth Conference on Financial Cryptography (FC’00),, vol. 1962, Springer-Verlag, February 2000.

1999

Coin-based anonymous fingerprinting
Ahmad-Reza Sadeghi, Birgit Pfitzmann
In: LNCS, EUROCRYPT ’99, vol. 1599, p. 150-164, Springer-Verlag, 1999.

Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen
Ahmad-Reza Sadeghi, Birgit Pfitzmann
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99, p. 35-48, Vieweg Verlag, 1999.

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang