Folgen
Sven Bugiel
Sven Bugiel
CISPA Helmholtz Center for Information Security
Bestätigte E-Mail-Adresse bei cispa.saarland - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Towards Taming Privilege-Escalation Attacks on Android
S Bugiel, L Davi, A Dmitrienko, T Fischer, AR Sadeghi, B Shastry
Proceedings of the 19th Annual Network & Distributed System Security …, 2012
5232012
XManDroid: A new Android evolution to mitigate privilege escalation attacks
S Bugiel, L Davi, A Dmitrienko, T Fischer, AR Sadeghi
Technical Report TR-2011-04, Technische Universität Darmstadt, 2011
3822011
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies
S Bugiel, S Heuser, AR Sadeghi
22nd USENIX Security Symposium (USENIX Security’13). USENIX, 2013
3682013
Reliable Third-Party Library Detection in Android and its Security Applications
M Backes, S Bugiel, E Derr
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2802016
Practical and lightweight domain isolation on android
S Bugiel, L Davi, A Dmitrienko, S Heuser, AR Sadeghi, B Shastry
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
2752011
Twin Clouds: An architecture for secure cloud computing
S Bugiel, S Nürnberger, AR Sadeghi, T Schneider
Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011
2642011
AmazonIA: when elasticity snaps back
S Bugiel, S Nürnberger, T Pöppelmann, AR Sadeghi, T Schneider
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1582011
Boxify: Full-fledged app sandboxing for stock Android
M Backes, S Bugiel, C Hammer, O Schranz, P von Styp-Rekowsky
24th USENIX Security Symposium (USENIX Security 15), 691-706, 2015
1472015
On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis
M Backes, S Bugiel, E Derr, P McDaniel, D Octeau, S Weisgerber
Poster Session of IEEE EuroS&P, 2016
1362016
Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android
E Derr, S Bugiel, S Fahl, Y Acar, M Backes
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1322017
Twin clouds: Secure cloud computing with low latency
S Bugiel, S Nürnberger, AR Sadeghi, T Schneider
IFIP International Conference on Communications and Multimedia Security, 32-44, 2011
1112011
SoK: Lessons learned from Android security research for appified software platforms
Y Acar, M Backes, S Bugiel, S Fahl, P McDaniel, M Smith
Security and Privacy (SP), 2016 IEEE Symposium on, 433-451, 2016
1102016
Android Security Framework: Extensible multi-layered access control on Android
M Backes, S Bugiel, S Gerling, P von Styp-Rekowsky
Proceedings of the 30th Annual Computer Security Applications Conference, 46-55, 2014
802014
ARTist: The Android runtime instrumentation and security toolkit
M Backes, S Bugiel, O Schranz, P von Styp-Rekowsky, S Weisgerber
Security and Privacy (EuroS&P), 2017 IEEE European Symposium on, 481-495, 2017
602017
Scippa: system-centric IPC provenance on Android
M Backes, S Bugiel, S Gerling
Proceedings of the 30th Annual Computer Security Applications Conference, 36-45, 2014
512014
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators
M Oltrogge, E Derr, C Stransky, Y Acar, S Fahl, C Rossow, G Pellegrino, ...
2018 IEEE Symposium on Security and Privacy (SP), 634-647, 2018
442018
R-Droid: Leveraging Android App Analysis with Static Slice Optimization
M Backes, S Bugiel, E Derr, S Gerling, C Hammer
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
392016
Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication
SG Lyastani, M Schilling, M Neumayr, M Backes, S Bugiel
2020 IEEE Symposium on Security and Privacy (SP), 268-285, 2020
382020
Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy
DC Nguyen, E Derr, M Backes, S Bugiel
40th IEEE Symposium on Security and Privacy, 2019
372019
Trust in a small package: minimized MRTM software implementation for mobile secure environments
JE Ekberg, S Bugiel
Proceedings of the 2009 ACM workshop on Scalable trusted computing, 9-18, 2009
342009
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20