
Ahmad-Reza Sadeghi
Person information
- affiliation: University of Darmstadt, Germany
- affiliation: Ruhr University Bochum, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [i72]Thien Duc Nguyen, Phillip Rieger, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni:
FLGUARD: Secure and Private Federated Learning. CoRR abs/2101.02281 (2021) - 2020
- [j41]Patrick Jauernig
, Ahmad-Reza Sadeghi, Emmanuel Stapf:
Trusted Execution Environments: Properties, Applications, and Challenges. IEEE Secur. Priv. 18(2): 56-60 (2020) - [j40]Ghada Dessouky
, Tommaso Frassetto, Patrick Jauernig
, Ahmad-Reza Sadeghi, Emmanuel Stapf:
With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security. IEEE Secur. Priv. 18(5): 57-66 (2020) - [c275]Richard Mitev, Anna Pazii, Markus Miettinen, William Enck, Ahmad-Reza Sadeghi:
LeakyPick: IoT Audio Spy Detector. ACSAC 2020: 694-705 - [c274]Johannes Buchmann, Ghada Dessouky, Tommaso Frassetto, Ágnes Kiss, Ahmad-Reza Sadeghi, Thomas Schneider
, Giulia Traverso, Shaza Zeitouni:
SAFE: A Secure and Efficient Long-Term Distributed Storage System. SBC@AsiaCCS 2020: 8-13 - [c273]Thien Duc Nguyen, Markus Miettinen, Ahmad-Reza Sadeghi:
Long Live Randomization: On Privacy-preserving Contact Tracing in Pandemic. MTD@CCS 2020: 1-9 - [c272]Huili Chen, Siam Umar Hussain, Fabian Boemer, Emmanuel Stapf, Ahmad-Reza Sadeghi, Farinaz Koushanfar, Rosario Cammarota:
Developing Privacy-preserving AI Systems: The Lessons learned. DAC 2020: 1-4 - [c271]Ghada Dessouky, Patrick Jauernig, Nele Mentens, Ahmad-Reza Sadeghi, Emmanuel Stapf:
INVITED: AI Utopia or Dystopia - On Securing AI Platforms. DAC 2020: 1-6 - [c270]Shaza Zeitouni, Emmanuel Stapf, Hossein Fereidooni, Ahmad-Reza Sadeghi:
On the Security of Strong Memristor-based Physically Unclonable Functions. DAC 2020: 1-6 - [c269]Sebastian P. Bayerl, Tommaso Frassetto, Patrick Jauernig, Korbinian Riedhammer, Ahmad-Reza Sadeghi, Thomas Schneider
, Emmanuel Stapf, Christian Weinert:
Offline Model Guard: Secure and Private ML on Mobile Devices. DATE 2020: 460-465 - [c268]Jens Neureither, Alexandra Dmitrienko, David Koisser, Ferdinand Brasser, Ahmad-Reza Sadeghi:
LegIoT: Ledgered Trust Management Platform for IoT. ESORICS (1) 2020: 377-396 - [c267]Sridhar Adepu, Ferdinand Brasser, Luis Garcia
, Michael Rodler, Lucas Davi, Ahmad-Reza Sadeghi, Saman A. Zonouz:
Control Behavior Integrity for Distributed Cyber-Physical Systems. ICCPS 2020: 30-40 - [c266]Ghada Dessouky, Tommaso Frassetto, Ahmad-Reza Sadeghi:
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments. USENIX Security Symposium 2020: 451-468 - [c265]Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, Ahmad-Reza Sadeghi:
V0LTpwn: Attacking x86 Processor Integrity from Software. USENIX Security Symposium 2020: 1445-1461 - [c264]Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, A. Selcuk Uluagac:
Peek-a-boo: i see your smart home activities, even encrypted! WISEC 2020: 207-218 - [i71]Lars Baumgärtner, Alexandra Dmitrienko, Bernd Freisleben, Alexander Gruler, Jonas Höchst, Joshua Kühlberg, Mira Mezini, Markus Miettinen, Anel Muhamedagic, Thien Duc Nguyen, Alvar Penning
, Dermot Frederik Pustelnik, Filipp Roos, Ahmad-Reza Sadeghi, Michael Schwarz, Christian Uhl:
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps. CoRR abs/2006.05914 (2020) - [i70]Richard Mitev, Anna Pazii, Markus Miettinen, William Enck, Ahmad-Reza Sadeghi:
LeakyPick: IoT Audio Spy Detector. CoRR abs/2007.00500 (2020) - [i69]Sebastian P. Bayerl, Tommaso Frassetto, Patrick Jauernig, Korbinian Riedhammer, Ahmad-Reza Sadeghi, Thomas Schneider, Emmanuel Stapf, Christian Weinert:
Offline Model Guard: Secure and Private ML on Mobile Devices. CoRR abs/2007.02351 (2020) - [i68]Rosario Cammarota, Matthias Schunter, Anand Rajan, Fabian Boemer, Ágnes Kiss, Amos Treiber, Christian Weinert, Thomas Schneider, Emmanuel Stapf, Ahmad-Reza Sadeghi, Daniel Demmler
, Huili Chen, Siam Umar Hussain, M. Sadegh Riazi, Farinaz Koushanfar, Saransh Gupta, Tajana Simunic Rosing, Kamalika Chaudhuri, Hamid Nejatollahi, Nikil D. Dutt, Mohsen Imani, Kim Laine, Anuj Dubey, Aydin Aysu, Fateme Sadat Hosseini, Chengmo Yang, Eric Wallace, Pamela Norton:
Trustworthy AI Inference Systems: An Industry Research View. CoRR abs/2008.04449 (2020) - [i67]Shaza Zeitouni, Ghada Dessouky, Ahmad-Reza Sadeghi:
SoK: On the Security Challenges and Risks of Multi-Tenant FPGAs in the Cloud. CoRR abs/2009.13914 (2020) - [i66]Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, Emmanuel Stapf:
CURE: A Security Architecture with CUstomizable and Resilient Enclaves. CoRR abs/2010.15866 (2020) - [i65]Johannes Buchmann, Ghada Dessouky, Tommaso Frassetto, Ágnes Kiss, Ahmad-Reza Sadeghi, Thomas Schneider, Giulia Traverso, Shaza Zeitouni:
SAFE: A Secure and Efficient Long-Term Distributed Storage System. IACR Cryptol. ePrint Arch. 2020: 690 (2020)
2010 – 2019
- 2019
- [j39]Sandip Ray, Ahmad-Reza Sadeghi, Mohammad Al Faruque
:
Guest Editors' Introduction: Secure Automotive Systems. IEEE Des. Test 36(6): 5-6 (2019) - [j38]Samuel Marchal
, Markus Miettinen
, Thien Duc Nguyen, Ahmad-Reza Sadeghi, N. Asokan
:
AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication. IEEE J. Sel. Areas Commun. 37(6): 1402-1412 (2019) - [c263]Ferdinand Brasser, Srdjan Capkun, Alexandra Dmitrienko, Tommaso Frassetto, Kari Kostiainen, Ahmad-Reza Sadeghi:
DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization. ACSAC 2019: 788-800 - [c262]Richard Mitev, Markus Miettinen, Ahmad-Reza Sadeghi:
Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants. AsiaCCS 2019: 465-478 - [c261]Carsten Bock, Ferdinand Brasser, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi:
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks. AsiaCCS 2019: 561-572 - [c260]Lejla Batina, Patrick Jauernig, Nele Mentens, Ahmad-Reza Sadeghi, Emmanuel Stapf:
In Hardware We Trust: Gains and Pains of Hardware-assisted Security. DAC 2019: 44 - [c259]Thomas Nyman, Ghada Dessouky, Shaza Zeitouni, Aaro Lehikoinen, Andrew Paverd, N. Asokan, Ahmad-Reza Sadeghi:
HardScope: Hardening Embedded Systems Against Data-Oriented Attacks. DAC 2019: 63 - [c258]Ebrahim M. Songhori, M. Sadegh Riazi, Siam U. Hussain, Ahmad-Reza Sadeghi, Farinaz Koushanfar:
ARM2GC: Succinct Garbled Processor for Secure Computation. DAC 2019: 112 - [c257]Andrew Paverd, Marcus Völp, Ferdinand Brasser, Matthias Schunter, N. Asokan, Ahmad-Reza Sadeghi, Paulo Jorge Esteves Veríssimo, Andreas Steininger, Thorsten Holz:
Sustainable Security & Safety: Challenges and Opportunities. CERTS 2019: 4:1-4:13 - [c256]Ahmad Ibrahim, Ahmad-Reza Sadeghi, Gene Tsudik:
HEALED: HEaling & Attestation for Low-End Embedded Devices. Financial Cryptography 2019: 627-645 - [c255]Walter Blocher, Ahmad-Reza Sadeghi, Philipp G. Sandner:
Blockchain and the Future of Publishing. GI-Jahrestagung (Workshops) 2019: 587-588 - [c254]Ghada Dessouky, Shaza Zeitouni, Ahmad Ibrahim, Lucas Davi, Ahmad-Reza Sadeghi:
CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems. ICCAD 2019: 1-8 - [c253]Thien Duc Nguyen, Samuel Marchal, Markus Miettinen, Hossein Fereidooni, N. Asokan, Ahmad-Reza Sadeghi:
DÏoT: A Federated Self-learning Anomaly Detection System for IoT. ICDCS 2019: 756-767 - [c252]Ivan De Oliveira Nunes, Ghada Dessouky, Ahmad Ibrahim, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik:
Towards Systematic Design of Collective Remote Attestation Protocols. ICDCS 2019: 1188-1198 - [c251]Tigist Abera, Raad Bahmani, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter:
DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems. NDSS 2019 - [c250]Cornelius Aschermann, Tommaso Frassetto, Thorsten Holz, Patrick Jauernig, Ahmad-Reza Sadeghi, Daniel Teuchert:
NAUTILUS: Fishing for Deep Bugs with Grammars. NDSS 2019 - [c249]Ferdinand Brasser, David Gens, Patrick Jauernig, Ahmad-Reza Sadeghi, Emmanuel Stapf:
SANCTUARY: ARMing TrustZone with User-space Enclaves. NDSS 2019 - [c248]Samuel Weiser, Mario Werner, Ferdinand Brasser, Maja Malenko, Stefan Mangard, Ahmad-Reza Sadeghi:
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V. NDSS 2019 - [c247]Hamid Reza Ghaeini, Matthew Chan, Raad Bahmani, Ferdinand Brasser, Luis Garcia, Jianying Zhou, Ahmad-Reza Sadeghi, Nils Ole Tippenhauer, Saman A. Zonouz:
PAtt: Physics-based Attestation of Control Systems. RAID 2019: 165-180 - [c246]Ghada Dessouky, David Gens, Patrick Haney, Garrett Persyn, Arun K. Kanuparthi, Hareesh Khattri, Jason M. Fung, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran:
HardFails: Insights into Software-Exploitable Hardware Bugs. USENIX Security Symposium 2019: 213-230 - [c245]Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi:
FastKitten: Practical Smart Contracts on Bitcoin. USENIX Security Symposium 2019: 801-818 - [c244]T. J. OConnor, Reham Mohamed, Markus Miettinen, William Enck, Bradley Reaves, Ahmad-Reza Sadeghi:
HomeSnitch: behavior transparency and control for smart home IoT devices. WiSec 2019: 128-138 - [i64]Ebrahim M. Songhori, M. Sadegh Riazi, Siam U. Hussain, Ahmad-Reza Sadeghi, Farinaz Koushanfar:
ARM2GC: Succinct Garbled Processor for Secure Computation. CoRR abs/1902.02908 (2019) - [i63]Ghada Dessouky, Tommaso Frassetto, Ahmad-Reza Sadeghi:
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments. CoRR abs/1909.09599 (2019) - [i62]Tigist Abera, Ferdinand Brasser, Lachlan J. Gunn, David Koisser, Ahmad-Reza Sadeghi:
SADAN: Scalable Adversary Detection in Autonomous Networks. CoRR abs/1910.05190 (2019) - [i61]Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, Ahmad-Reza Sadeghi:
V0LTpwn: Attacking x86 Processor Integrity from Software. CoRR abs/1912.04870 (2019) - [i60]Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi:
FastKitten: Practical Smart Contracts on Bitcoin. IACR Cryptol. ePrint Arch. 2019: 154 (2019) - 2018
- [j37]Timothy Vidas, Per Larsen, Hamed Okhravi, Ahmad-Reza Sadeghi:
Changing the Game of Software Security. IEEE Secur. Priv. 16(2): 10-11 (2018) - [j36]Omer Tene, Jules Polonetsky, Ahmad-Reza Sadeghi:
Five Freedoms for the Homo Deus. IEEE Secur. Priv. 16(3): 15-17 (2018) - [j35]Andrew Paverd
, Sandeep Tamrakar, Hoang Long Nguyen, Praveen Kumar Pendyala, Thien Duc Nguyen, Elizabeth Stobert, Tommi Grondahl, N. Asokan, Ahmad-Reza Sadeghi:
OmniShare: Encrypted Cloud Storage for the Multi-Device Era. IEEE Internet Comput. 22(4): 27-36 (2018) - [j34]Benny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi:
HardIDX: Practical and secure index with SGX in a malicious environment. J. Comput. Secur. 26(5): 677-706 (2018) - [j33]N. Asokan
, Thomas Nyman
, Norrathep Rattanavipanon
, Ahmad-Reza Sadeghi, Gene Tsudik:
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(11): 2290-2300 (2018) - [j32]Hossen A. Mustafa
, Wenyuan Xu, Ahmad-Reza Sadeghi, Steffen Schulz:
End-to-End Detection of Caller ID Spoofing Attacks. IEEE Trans. Dependable Secur. Comput. 15(3): 423-436 (2018) - [c243]Ferdinand Brasser, Lucas Davi, Abhijitt Dhavlle, Tommaso Frassetto, Sai Manoj Pudukotai Dinakarrao, Setareh Rafatirad, Ahmad-Reza Sadeghi, Avesta Sasan, Hossein Sayadi, Shaza Zeitouni, Houman Homayoun:
Advances and throwbacks in hardware-assisted security: special session. CASES 2018: 15:1-15:10 - [c242]Luke Deshotels, Razvan Deaconescu, Costin Carabas, Iulia Manda, William Enck, Mihai Chiroiu, Ninghui Li, Ahmad-Reza Sadeghi:
iOracle: Automated Evaluation of Access Control Policies in iOS. AsiaCCS 2018: 117-131 - [c241]Markus Miettinen, Ahmad-Reza Sadeghi:
Internet of things or threats?: on building trust in IoT (keynote). CODES+ISSS 2018: 1 - [c240]Markus Miettinen, Thien Duc Nguyen, Ahmad-Reza Sadeghi, N. Asokan:
Revisiting context-based authentication in IoT. DAC 2018: 32:1-32:6 - [c239]Shaza Zeitouni, David Gens, Ahmad-Reza Sadeghi:
It's hammer time: how to attack (rowhammer-based) DRAM-PUFs. DAC 2018: 65:1-65:6 - [c238]Xavier Carpent
, Karim Eldefrawy, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik:
Reconciling remote attestation and safety-critical operation on simple IoT devices. DAC 2018: 90:1-90:6 - [c237]Sibin Mohan, Mikael Asplund, Gedare Bloom, Ahmad-Reza Sadeghi, Ahmad Ibrahim, Negin Salajageh, Paul Griffioen, Bruno Sinopoli:
The future of IoT security: special session. EMSOFT 2018: 16:1-16:7 - [c236]Moreno Ambrosin
, Mauro Conti
, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter:
SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices. ESORICS (1) 2018: 595-617 - [c235]Ghada Dessouky, Tigist Abera, Ahmad Ibrahim, Ahmad-Reza Sadeghi:
LiteHAX: lightweight hardware-assisted attestation of program execution. ICCAD 2018: 106 - [c234]Andreas Schaad, Björn Grohmann, Oliver Winzenried, Ferdinand Brasser, Ahmad-Reza Sadeghi:
Towards a Cloud-based System for Software Protection and Licensing. ICETE (2) 2018: 698-702 - [c233]Ferdinand Brasser, Tommaso Frassetto, Korbinian Riedhammer
, Ahmad-Reza Sadeghi, Thomas Schneider
, Christian Weinert:
VoiceGuard: Secure and Private Speech Processing. INTERSPEECH 2018: 1303-1307 - [c232]David Gens, Simon Schmitt, Lucas Davi, Ahmad-Reza Sadeghi:
K-Miner: Uncovering Memory Corruption in Linux. NDSS 2018 - [c231]Hamid Reza Ghaeini
, Daniele Antonioli, Ferdinand Brasser, Ahmad-Reza Sadeghi, Nils Ole Tippenhauer:
State-aware anomaly detection for industrial control systems. SAC 2018: 1620-1628 - [c230]Ahmad Ibrahim, Ahmad-Reza Sadeghi, Gene Tsudik:
US-AID: Unattended Scalable Attestation of IoT Devices. SRDS 2018: 21-30 - [c229]Tommaso Frassetto, Patrick Jauernig, Christopher Liebchen, Ahmad-Reza Sadeghi:
IMIX: In-Process Memory Isolation EXtension. USENIX Security Symposium 2018: 83-97 - [c228]Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, Ahmad-Reza Sadeghi:
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX. USENIX Security Symposium 2018: 1213-1227 - [p6]Yier Jin, Dean Sullivan, Orlando Arias, Ahmad-Reza Sadeghi, Lucas Davi:
Hardware control flow integrity. The Continuing Arms Race 2018: 181-210 - [e25]Per Larsen, Ahmad-Reza Sadeghi:
The Continuing Arms Race: Code-Reuse Attacks and Defenses. ACM / Morgan & Claypool 2018, ISBN 978-1-97000-183-9 [contents] - [i59]Thien Duc Nguyen, Samuel Marchal, Markus Miettinen, Minh Hoang Dang, N. Asokan, Ahmad-Reza Sadeghi:
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices. CoRR abs/1804.07474 (2018) - [i58]N. Asokan, Thomas Nyman, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik:
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices. CoRR abs/1807.05002 (2018) - [i57]Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, A. Selcuk Uluagac:
Peek-a-Boo: I see your smart home activities, even encrypted! CoRR abs/1808.02741 (2018) - [i56]Markus Miettinen, Paul C. van Oorschot, Ahmad-Reza Sadeghi:
Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management. CoRR abs/1808.03071 (2018) - [i55]Ghada Dessouky, David Gens, Patrick Haney, Garrett Persyn, Arun K. Kanuparthi, Hareesh Khattri, Jason M. Fung, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran:
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs. CoRR abs/1812.00197 (2018) - [i54]Sridhar Adepu, Ferdinand Brasser, Luis Garcia, Michael Rodler, Lucas Davi, Ahmad-Reza Sadeghi, Saman A. Zonouz:
Control Behavior Integrity for Distributed Cyber-Physical Systems. CoRR abs/1812.08310 (2018) - [i53]Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni, Michael Zohner:
Pushing the Communication Barrier in Secure Computation using Lookup Tables. IACR Cryptol. ePrint Arch. 2018: 486 (2018) - 2017
- [j31]Ahmad-Reza Sadeghi:
Security and Privacy More Crucial than Ever. IEEE Secur. Priv. 15(1): 3-4 (2017) - [j30]Ahmad-Reza Sadeghi, Ghada Dessouky:
Security & Privacy Week Interviews, Part 3. IEEE Secur. Priv. 15(1): 66-74 (2017) - [j29]Ahmad-Reza Sadeghi, Shaza Zeitouni:
ACM CCS 2016 Interviews, Part 1. IEEE Secur. Priv. 15(2): 88-91 (2017) - [j28]Ahmad-Reza Sadeghi, Shaza Zeitouni:
ACM CCS 2016 Interviews, Part 2. IEEE Secur. Priv. 15(3): 70-76 (2017) - [j27]Ahmad-Reza Sadeghi, Shaza Zeitouni:
ACM CCS 2016 Interview, Part 3. IEEE Secur. Priv. 15(4): 58-61 (2017) - [j26]M. Sadegh Riazi, Ebrahim M. Songhori, Ahmad-Reza Sadeghi, Thomas Schneider
, Farinaz Koushanfar:
Toward Practical Secure Stable Matching. Proc. Priv. Enhancing Technol. 2017(1): 62-78 (2017) - [j25]Stephan Heuser, Bradley Reaves, Praveen Kumar Pendyala, Henry Carter
, Alexandra Dmitrienko, William Enck, Negar Kiyavash, Ahmad-Reza Sadeghi, Patrick Traynor:
Phonion: Practical Protection of Metadata in Telephony Networks. Proc. Priv. Enhancing Technol. 2017(1): 170-187 (2017) - [c227]Ahmad-Reza Sadeghi:
Hardware-Assisted Security: Promises, Pitfalls and Opportunities. ASHES@CCS 2017: 5 - [c226]Ahmad-Reza Sadeghi:
Moving Targets vs. Moving Adversaries: On the Effectiveness of System Randomization. MTD@CCS 2017: 51-52 - [c225]Tommaso Frassetto, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi:
JITGuard: Hardening Just-in-time Compilers with SGX. CCS 2017: 2405-2419 - [c224]Hossein Fereidooni, Tommaso Frassetto, Markus Miettinen, Ahmad-Reza Sadeghi, Mauro Conti:
Fitness Trackers: Fit for Health but Unfit for Security and Privacy. CHASE 2017: 19-24 - [c223]Ghada Dessouky, Shaza Zeitouni, Thomas Nyman, Andrew Paverd
, Lucas Davi, Patrick Koeberl, N. Asokan
, Ahmad-Reza Sadeghi:
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware. DAC 2017: 24:1-24:6 - [c222]Benny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi:
HardIDX: Practical and Secure Index with SGX. DBSec 2017: 386-408 - [c221]Raad Bahmani, Manuel Barbosa
, Ferdinand Brasser, Bernardo Portela
, Ahmad-Reza Sadeghi, Guillaume Scerri, Bogdan Warinschi:
Secure Multiparty Computation from SGX. Financial Cryptography 2017: 477-497 - [c220]Shaza Zeitouni, Ghada Dessouky, Orlando Arias, Dean Sullivan, Ahmad Ibrahim, Yier Jin, Ahmad-Reza Sadeghi:
ATRIUM: Runtime attestation resilient under memory attacks. ICCAD 2017: 384-391 - [c219]Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N. Asokan
, Ahmad-Reza Sadeghi, Sasu Tarkoma
:
IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. ICDCS 2017: 2177-2184 - [c218]Markus Miettinen, Samuel Marchal, Ibbad Hafeez, Tommaso Frassetto, N. Asokan
, Ahmad-Reza Sadeghi, Sasu Tarkoma
:
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT. ICDCS 2017: 2511-2514 - [c217]Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi:
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables. NDSS 2017 - [c216]Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni, Michael Zohner:
Pushing the Communication Barrier in Secure Computation using Lookup Tables. NDSS 2017 - [c215]Luis Garcia, Ferdinand Brasser, Mehmet Hazar Cintuglu, Ahmad-Reza Sadeghi, Osama A. Mohammed, Saman A. Zonouz:
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit. NDSS 2017 - [c214]Robert Rudd, Richard Skowyra, David Bigelow, Veer Dedhia, Thomas Hobson, Stephen Crane, Christopher Liebchen, Per Larsen, Lucas Davi, Michael Franz, Ahmad-Reza Sadeghi, Hamed Okhravi:
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity. NDSS 2017 - [c213]Hossein Fereidooni, Jiska Classen, Tom Spink
, Paul Patras
, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti:
Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit. RAID 2017: 48-69 - [c212]David Gens, Orlando Arias, Dean Sullivan, Christopher Liebchen, Yier Jin, Ahmad-Reza Sadeghi:
LAZARUS: Practical Side-Channel Resilient Kernel-Space Randomization. RAID 2017: 238-258 - [c211]Ferdinand Brasser, Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi:
CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory. USENIX Security Symposium 2017: 117-130 - [c210]Ahmad Ibrahim, Ahmad-Reza Sadeghi, Shaza Zeitouni:
SeED: secure non-interactive attestation for embedded devices. WISEC 2017: 64-74 - [c209]Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi:
Software Grand Exposure: SGX Cache Attacks Are Practical. WOOT 2017 - [e24]Ramesh Karri, Ozgur Sinanoglu, Ahmad-Reza Sadeghi, Xun Yi
:
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017. ACM 2017, ISBN 978-1-4503-4944-4 [contents] - [i52]Yansong Gao, Hua Ma, Gefei Li, Shaza Zeitouni, Said F. Al-Sarawi, Derek Abbott, Ahmad-Reza Sadeghi, Damith Chinthana Ranasinghe:
Exploiting PUF Models for Error Free Response Generation. CoRR abs/1701.08241 (2017) - [i51]Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi:
Software Grand Exposure: SGX Cache Attacks Are Practical. CoRR abs/1702.07521 (2017) - [i50]Dean Sullivan, Orlando Arias, David Gens, Lucas Davi, Ahmad-Reza Sadeghi, Yier Jin:
Execution Integrity with In-Place Encryption. CoRR abs/1703.02698 (2017) - [i49]Benny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi:
HardIDX: Practical and Secure Index with SGX. CoRR abs/1703.04583 (2017) - [i48]Thomas Nyman, Ghada Dessouky, Shaza Zeitouni, Aaro Lehikoinen, Andrew Paverd, N. Asokan, Ahmad-Reza Sadeghi:
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement. CoRR abs/1705.10295 (2017) - [i47]Ghada Dessouky, Shaza Zeitouni, Thomas Nyman, Andrew Paverd, Lucas Davi, Patrick Koeberl, N. Asokan, Ahmad-Reza Sadeghi:
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware. CoRR abs/1706.03754 (2017) - [i46]Yansong Gao, Said F. Al-Sarawi, Derek Abbott, Ahmad-Reza Sadeghi, Damith Chinthana Ranasinghe:
Modeling Attack Resilient Reconfigurable Latent Obfuscation Technique for PUF based Lightweight Authentication. CoRR abs/1706.06232 (2017) - [i45]Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti:
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit. CoRR abs/1706.09165 (2017) - [i44]Ferdinand Brasser, Srdjan Capkun, Alexandra Dmitrienko, Tommaso Frassetto, Kari Kostiainen, Urs Müller, Ahmad-Reza Sadeghi:
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization. CoRR abs/1709.09917 (2017) - [i43]Ebrahim M. Songhori, M. Sadegh Riazi, Siam U. Hussain, Ahmad-Reza Sadeghi, Farinaz Koushanfar:
ARM2GC: Simple and Efficient Garbled Circuit Framework by Skipping. IACR Cryptol. ePrint Arch. 2017: 1157 (2017) - 2016
- [j24]Ahmad-Reza Sadeghi:
Games without Frontiers: Whither Information Security and Privacy? IEEE Secur. Priv. 14(1): 3-5 (2016) - [j23]Ahmad-Reza Sadeghi, Ghada Dessouky:
Security & Privacy Week Interviews, Part 1. IEEE Secur. Priv. 14