Follow
Ahmad-Reza Sadeghi
Ahmad-Reza Sadeghi
Verified email at trust.tu-darmstadt.de - Homepage
Title
Cited by
Cited by
Year
Smudge attacks on smartphone touch screens
AJ Aviv, K Gibson, E Mossop, M Blaze, JM Smith
4th USENIX workshop on offensive technologies (WOOT 10), 2010
1579*2010
Security and privacy challenges in industrial internet of things
AR Sadeghi, C Wachsmann, M Waidner
Proceedings of the 52nd annual design automation conference, 1-6, 2015
12652015
Iot sentinel: Automated device-type identification for security enforcement in iot
M Miettinen, S Marchal, I Hafeez, N Asokan, AR Sadeghi, S Tarkoma
2017 IEEE 37th international conference on distributed computing systems …, 2017
8932017
Return-oriented programming without returns
S Checkoway, L Davi, A Dmitrienko, AR Sadeghi, H Shacham, ...
Proceedings of the 17th ACM conference on Computer and communications …, 2010
8482010
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
KZ Snow, F Monrose, L Davi, A Dmitrienko, C Liebchen, AR Sadeghi
2013 IEEE symposium on security and privacy, 574-588, 2013
7852013
Software grand exposure:{SGX} cache attacks are practical
F Brasser, U Müller, A Dmitrienko, K Kostiainen, S Capkun, AR Sadeghi
11th USENIX workshop on offensive technologies (WOOT 17), 2017
7822017
DÏoT: A federated self-learning anomaly detection system for IoT
TD Nguyen, S Marchal, M Miettinen, H Fereidooni, N Asokan, AR Sadeghi
2019 IEEE 39th International conference on distributed computing systems …, 2019
7422019
Unsafe exposure analysis of mobile in-app advertisements
MC Grace, W Zhou, X Jiang, AR Sadeghi
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
7132012
Privilege escalation attacks on android
L Davi, A Dmitrienko, AR Sadeghi, M Winandy
Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011
6942011
Property-based attestation for computing platforms: caring about properties, not mechanisms
AR Sadeghi, C Stüble
Proceedings of the 2004 workshop on New security paradigms, 67-77, 2004
6262004
Towards Taming Privilege-Escalation Attacks on Android.
S Bugiel, L Davi, A Dmitrienko, T Fischer, AR Sadeghi, B Shastry
NDSS 17, 19, 2012
5822012
Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications
F Schuster, T Tendyck, C Liebchen, L Davi, AR Sadeghi, T Holz
2015 IEEE Symposium on Security and Privacy, 745-762, 2015
5422015
TASTY: tool for automating secure two-party computations
W Henecka, S K ögl, AR Sadeghi, T Schneider, I Wehrenberg
Proceedings of the 17th ACM conference on Computer and communications …, 2010
5092010
Efficient privacy-preserving face recognition
AR Sadeghi, T Schneider, I Wehrenberg
International conference on information security and cryptology, 229-244, 2009
4952009
TrustLite: A security architecture for tiny embedded devices
P Koeberl, S Schulz, AR Sadeghi, V Varadharajan
Proceedings of the Ninth European Conference on Computer Systems, 1-14, 2014
4632014
The cybersecurity landscape in industrial control systems
S McLaughlin, C Konstantinou, X Wang, L Davi, AR Sadeghi, ...
Proceedings of the IEEE 104 (5), 1039-1057, 2016
4422016
ROPdefender: A detection tool to defend against return-oriented programming attacks
L Davi, AR Sadeghi, M Winandy
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
4272011
Xmandroid: A new android evolution to mitigate privilege escalation attacks
S Bugiel, L Davi, A Dmitrienko, T Fischer, AR Sadeghi
Technische Universität Darmstadt, Technical Report TR-2011-04, 2011
4192011
Flexible and fine-grained mandatory access control on android for diverse security and privacy policies
S Bugiel, S Heuser, AR Sadeghi
22nd USENIX Security Symposium (USENIX Security 13), 131-146, 2013
4052013
Peek-a-boo: I see your smart home activities, even encrypted!
A Acar, H Fereidooni, T Abera, AK Sikder, M Miettinen, H Aksu, M Conti, ...
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020
3902020
The system can't perform the operation now. Try again later.
Articles 1–20