VC3: Trustworthy data analytics in the cloud using SGX F Schuster, M Costa, C Fournet, C Gkantsidis, M Peinado, G Mainar-Ruiz, ... 2015 IEEE symposium on security and privacy, 38-54, 2015 | 783 | 2015 |
Oblivious multi-party machine learning on trusted processors. O Ohrimenko, F Schuster, C Fournet, A Mehta, S Nowozin, K Vaswani, ... USENIX Security Symposium 16, 10-12, 2016 | 576 | 2016 |
Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications F Schuster, T Tendyck, C Liebchen, L Davi, AR Sadeghi, T Holz 2015 IEEE Symposium on Security and Privacy, 745-762, 2015 | 467 | 2015 |
Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory. D Gruss, J Lettner, F Schuster, O Ohrimenko, I Haller, M Costa USENIX Security Symposium, 217-233, 2017 | 274 | 2017 |
It's a TRaP: Table randomization and protection against function-reuse attacks SJ Crane, S Volckaert, F Schuster, C Liebchen, P Larsen, L Davi, ... Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 163 | 2015 |
Leveraging semantic signatures for bug search in binary programs J Pewny, F Schuster, L Bernhard, T Holz, C Rossow Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 139 | 2014 |
Evaluating the effectiveness of current anti-ROP defenses F Schuster, T Tendyck, J Pewny, A Maaß, M Steegmanns, M Contag, ... Research in Attacks, Intrusions and Defenses: 17th International Symposium …, 2014 | 123 | 2014 |
Scriptless attacks: stealing the pie without touching the sill M Heiderich, M Niemietz, F Schuster, T Holz, J Schwenk Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 121 | 2012 |
CCF: A framework for building confidential verifiable replicated services M Russinovich, E Ashton, C Avanessians, M Castro, A Chamayou, ... Technical report, Microsoft Research and Microsoft Azure, 2019 | 56 | 2019 |
Towards reducing the attack surface of software backdoors F Schuster, T Holz Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 44 | 2013 |
Privacy-preserving machine learning MSDS Costa, CAMC Fournet, A Mehta, S Nowozin, O Ohrimenko, ... US Patent App. 15/245,141, 2017 | 30 | 2017 |
Subversive-C: Abusing and protecting dynamic message dispatch J Lettner, B Kollenda, A Homescu, P Larsen, F Schuster, L Davi, ... 2016 {USENIX} Annual Technical Conference ({USENIX}{ATC} 16), 209-221, 2016 | 29 | 2016 |
Trusted execution within a distributed computing system M Costa, F Schuster, C Fournet, C Gkantsidis, M Peinado, AIT Rowstron US Patent 9,792,427, 2017 | 20 | 2017 |
Trusted execution within a distributed computing system M Costa, F Schuster, C Fournet, C Gkantsidis, M Peinado, AIT Rowstron US Patent 9,792,427, 2017 | 20 | 2017 |
The pyramid scheme: Oblivious RAM for trusted processors M Costa, L Esswood, O Ohrimenko, F Schuster, S Wagh arXiv preprint arXiv:1712.07882, 2017 | 14 | 2017 |
Scriptless attacks: Stealing more pie without touching the sill M Heiderich, M Niemietz, F Schuster, T Holz, J Schwenk Journal of Computer Security 22 (4), 567-599, 2014 | 13 | 2014 |
Chondral ossification centers next to dental primordia in the human mandible: a study of the prenatal development ranging between 68 to 270 mm CRL RJ Radlanski, H Renz, CA Zimmermann, FP Schuster, A Voigt, ... Annals of Anatomy-Anatomischer Anzeiger 208, 49-57, 2016 | 12 | 2016 |
The remodeling pattern of human mandibular alveolar bone during prenatal formation from 19 to 270 mm CRL RJ Radlanski, H Renz, N Tsengelsaikhan, F Schuster, CA Zimmermann Annals of Anatomy-Anatomischer Anzeiger 205, 65-74, 2016 | 6 | 2016 |
SGX-enabled oblivious machine learning O Ohrimenko, M Costa, C Fournet, S Nowozin, A Mehta, F Schuster, ... | 5 | 2016 |
Zur Entwicklung des Kieferknochens im Bereich der Zahnanlagen: histologische und morphologische Untersuchungen an der fetalen Mandibula des Menschen während des Glockenstadiums … FP Schuster | 4 | 2012 |