Folgen
Marcel Winandy
Marcel Winandy
Senior Expert Cyber Security Architect at E.ON
Bestätigte E-Mail-Adresse bei eon.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Return-oriented programming without returns
S Checkoway, L Davi, A Dmitrienko, AR Sadeghi, H Shacham, ...
Proceedings of the 17th ACM conference on Computer and communications …, 2010
8002010
Privilege escalation attacks on android
L Davi, A Dmitrienko, AR Sadeghi, M Winandy
Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011
6712011
ROPdefender: A detection tool to defend against return-oriented programming attacks
L Davi, AR Sadeghi, M Winandy
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
4052011
Securing the e-health cloud
H Löhr, AR Sadeghi, M Winandy
Proceedings of the 1st acm international health informatics symposium, 220-229, 2010
3722010
Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency
AR Sadeghi, T Schneider, M Winandy
Trust and Trustworthy Computing: Third International Conference, TRUST 2010 …, 2010
2542010
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks
L Davi, AR Sadeghi, M Winandy
Proceedings of the 2009 ACM workshop on Scalable trusted computing, 49-54, 2009
2312009
Property-based TPM virtualization
AR Sadeghi, C Stüble, M Winandy
International Conference on Information Security, 1-16, 2008
1312008
TCG inside? A note on TPM specification compliance
AR Sadeghi, M Selhorst, C Stüble, C Wachsmann, M Winandy
Proceedings of the first ACM workshop on Scalable trusted computing, 47-56, 2006
1112006
Compartmented security for browsers-or how to thwart a phisher with trusted computing
S Gajek, AR Sadeghi, C Stuble, M Winandy
The Second International Conference on Availability, Reliability and …, 2007
802007
Return-oriented programming without returns on ARM
L Davi, A Dmitrienko, AR Sadeghi, M Winandy
Technical Report HGI-TR-2010-002, Ruhr-University Bochum, 2010
672010
Trusted Virtual Domains–design, implementation and lessons learned
L Catuogno, A Dmitrienko, K Eriksson, D Kuhlmann, G Ramunno, ...
Trusted Systems: First International Conference, INTRUST 2009, Beijing …, 2010
552010
TruWallet: trustworthy and migratable wallet-based web authentication
S Gajek, H Löhr, AR Sadeghi, M Winandy
Proceedings of the 2009 ACM workshop on Scalable trusted computing, 19-28, 2009
502009
Flexible patient-controlled security for electronic health records
T Hupperich, H Löhr, AR Sadeghi, M Winandy
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium …, 2012
482012
Uni-directional trusted path: Transaction confirmation on just one device
A Filyanov, JM McCuney, AR Sadeghiz, M Winandy
2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011
472011
Patterns for secure boot and secure storage in computer systems
H Löhr, AR Sadeghi, M Winandy
2010 International Conference on Availability, Reliability and Security, 569-573, 2010
472010
Flexible and secure enterprise rights management based on trusted virtual domains
Y Gasmi, AR Sadeghi, P Stewin, M Unger, M Winandy, R Husseiki, ...
Proceedings of the 3rd ACM workshop on Scalable trusted computing, 71-80, 2008
432008
Evaluating analysis tools for android apps: Status quo and robustness against obfuscation
J Hoffmann, T Rytilahti, D Maiorca, M Winandy, G Giacinto, T Holz
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
312016
TruWalletM: Secure web authentication on mobile platforms
S Bugiel, A Dmitrienko, K Kostiainen, AR Sadeghi, M Winandy
Trusted Systems: Second International Conference, INTRUST 2010, Beijing …, 2011
282011
Transparent mobile storage protection in trusted virtual domains
L Catuogno, H Löhr, M Manulis, AR Sadeghi, M Winandy
23rd USENIX Large Installation Systems Administration Conference (LISA 2009 …, 2009
252009
A trusted versioning file system for passive mobile storage devices
L Catuogno, H Löhr, M Winandy, AR Sadeghi
Journal of Network and Computer Applications 38, 65-75, 2014
242014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20