Personensuche
Personensuche
Es wurde 1 Person gefunden.
Informatik / SE
Anschrift
Gerlingstr. 16
45127 Essen
45127 Essen
Raum
S - GW 212
Telefon
E-Mail
Webseite
Funktionen
-
Gruppe der Hochschullehrerinnen und Hochschullehrer, Fakultätsrat
-
Stellv. Vorsitz, Promotionsausschuss
-
Universitätsprofessor/in, Systemsicherheit
Aktuelle Veranstaltungen
-
WiSe 2025
Vergangene Veranstaltungen (max. 10)
-
SoSe 2025
- Sicherheit in Kryptowährungen und Blockchain Technologien (Übung)
- Sicherheit in Kryptowährungen und Blockchain Technologien
- Bachelorprojekt Systemsicherheit
- Seminar Systemsicherheit
- Cybersicherheit
- Sicherheit in Kryptowährungen und Blockchain Technologien
- Vorträge - Fakultät für Informatik
- Cybersicherheit
-
WiSe 2024
Die folgenden Publikationen sind in der Online-Universitätsbibliographie der Universität Duisburg-Essen verzeichnet. Weitere Informationen finden Sie gegebenenfalls auch auf den persönlichen Webseiten der Person.
-
Building trust in remote attestation through transparency : A qualitative user study on observable attestationIn: Behaviour & Information Technology (BIT), Jg. 44, 2024, Nr. 9, S. 1766 – 1786DOI (Open Access)
-
Memory Corruption at the Border of Trusted ExecutionIn: IEEE Security & Privacy: (M-S&P), Jg. 22, 2024, Nr. 4, S. 87 – 96DOI, Online Volltext (Open Access)
-
The Cybersecurity Landscape in Industrial Control SystemsIn: Proceedings of the IEEE (PROC), Jg. 104, 2016, Nr. 5, S. 1039 – 1057
-
Poster: Automated Evaluation of Fuzzers
26th Annual Network and Distributed System Security Symposium (NDSS); February 24-27, 2019; San Diego, USA,2019Online Volltext (Open Access) -
KINTSUGI : Secure Hotpatching for Code-Shadowing Real-Time Embedded SystemsIn: Proceedings of the 34th USENIX Security Symposium / 34th USENIX Security Symposium; August 13–15, 2025: Seattle, USA. Berkeley: USENIX Association, 2025, S. 1847 – 1866
-
Space RADSIM : Binary-Agnostic Fault Injection to Evaluate Cosmic Radiation Impact on Exploit Mitigation Techniques in SpaceIn: 2025 IEEE Symposium on Security and Privacy / 2025 IEEE Symposium on Security and Privacy (SP), 12-15 May 2025, San Francisco, CA, USA. Piscataway: Institute of Electrical and Electronics Engineers Inc., 2025, S. 1047 – 1063
-
Defying the Odds : Solana’s Unexpected Resilience in Spite of the Security Challenges Faced by DevelopersIn: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security / CCS '24: ACM SIGSAC Conference on Computer and Communications Security, Salt Lake City, UT, USA, October 14 - 18, 2024. New York: Association for Computing Machinery, Inc, 2024, S. 4226 – 4240DOI (Open Access)
-
NVM-Flip : Non-Volatile-Memory BitFlips on the System LevelIn: Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems / CODASPY '24: Fourteenth ACM Conference on Data and Application Security and Privacy, Porto, Portugal, 21 June 2024 / Gupta, Maanak (Hrsg.). New York: Association for Computing Machinery, Inc, 2024, S. 11 – 20DOI (Open Access)
-
DMA’n’Play : Practical Remote Attestation Based on Direct Memory AccessIn: Applied Cryptography and Network Security: Proceedings, Part II / 21st International Conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023 / Tibouchi, Mehdi; Wang, XiaoFeng (Hrsg.). Berlin: Springer, 2023, S. 32 – 61
-
EF↯CF : High Performance Smart Contract Fuzzing for Exploit GenerationIn: 8th IEEE European Symposium on Security and Privacy: EUROS&P 2023 ; Proceedings / 8th IEEE European Symposium on Security and Privacy ; EUROS&P 2023 ; July 3 to July 7, 2023, Delft, The Nederlands. Piscataway: Institute of Electrical and Electronics Engineers, 2023, S. 449 – 471DOI, Online Volltext (Open Access)
-
Fuzz on the Beach : Fuzzing Solana Smart ContractsIn: CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security / CCS '23: ACM SIGSAC Conference on Computer and Communications Security, Copenhagen, Denmark, November 26 - 30, 2023. New York: Association for Computing Machinery, Inc, 2023, S. 1197 – 1211DOI, Online Volltext (Open Access)
-
SCAtt-man: Side-Channel-Based Remote Attestation for Embedded Devices that Users UnderstandIn: Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy / CODASPY '23: Thirteenth ACM Conference on Data and Application Security and Privacy, April 24 - 26, 2023, Charlotte NC USA / Shehab, Mohamed (Hrsg.). New York: Association for Computing Machinery, 2023, S. 225 – 236DOI (Open Access)
-
RiscyROP : Automated Return-Oriented Programming Attacks on RISC-V and ARM64In: Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses / RAID 2022: 25th International Symposium on Research in Attacks, Intrusions and Defenses Limassol, 26.-28.10.2022, Cyprus. New York: Association for Computing Machinery, 2022, S. 30 – 42
-
SGXFUZZ : Efficiently Synthesizing Nested Structures for SGX Enclave FuzzingIn: Proceedings of the 31st USENIX Security Symposium (Security 2022) / 31st USENIX Security Symposium (Security 2022): Boston, USA; 10 -12 August 2022. Berkeley: USENIX Association, 2022, S. 3147 – 3164
-
Salsa : SGX Attestation for Live Streaming ApplicationsIn: 2022 IEEE Secure Development Conference: SecDev 2022 ; Atlanta, Georgia, 18-20 October 2022 ; proceedings / 7th IEEE Secure Development Conference ; SecDev 2022 ; 18-20 October 2022, Atlanta, Ga., USA / IEEE Computer Society (Hrsg.). Los Alamitos: IEEE, 2022, S. 45 – 51
-
Tutorial : Analyzing, Exploiting, and Patching Smart Contracts in EthereumIn: 2022 IEEE Secure Development Conference: SecDev 2022 ; Atlanta, Georgia, 18-20 October 2022 ; proceedings / 7th IEEE Secure Development Conference ; SecDev 2022 ; 18-20 October 2022, Atlanta, Ga., USA / IEEE Computer Society (Hrsg.). Los Alamitos: IEEE, 2022, S. 3 – 4
-
EVMPatch: Timely and automated patching of ethereum smart contractsIn: Proceedings of the 30th USENIX Security Symposium: August 11-13, 2021 / 30th USENIX Security Symposium; August 11-13, 2021; Online / USENIX Association (Hrsg.): USENIX Association, 2021, S. 1289 – 1306(Open Access)
-
HERA: Hotpatching of Embedded Real-time ApplicationsIn: Network and Distributed Systems Security (NDSS) Symposium 2021 / NDSS Symposium 2021; 21-25 February 2021; Virtual: dblp, 2021, S. 1 – 16DOI, Online Volltext (Open Access)
-
My Fuzzer Beats Them All! Developing a Framework for Fair Evaluation and Comparison of FuzzersIn: Computer Security – ESORICS 2021 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021: Proceedings, Part I / 26th European Symposium on Research in Computer Security (ESORICS), 4 - 8.10.2021, Darmstadt, Virtual, 2021 / Bertino, Elisa; Shulman, Haya; Waidner, Michael (Hrsg.). Cham: Springer, 2021, S. 173 – 193DOI, Online Volltext (Open Access)
-
Nano Security: From Nano-Electronics to Secure SystemsIn: Proceedings of the 2021 Design, Automation & Test in Europe (DATE 2021) / 24 Design, Automation & Test in Europe Conference & Exhibition ; 01-05 February 2021; Online. Piscataway: Institute of Electrical and Electronics Engineers, 2021, S. 1334 – 1339
-
RealSWATT : Remote Software-based Attestation for Embedded Devices under Realtime ConstraintsIn: CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security / CCS 2021, 15 - 19 November 2021, Virtual, Online. New York: Association for Computing Machinery (ACM), 2021, S. 2890 – 2905DOI, Online Volltext (Open Access)
-
Control behavior integrity for distributed cyber-physical systemsIn: 2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems: Proceedings / International Conference on Cyber-Physical Systems ; 21-24 April 2020, Sydney / Maggio, Martina; Weimer, James (Hrsg.). Piscataway: IEEE, 2020, S. 30 – 40DOI, Online Volltext (Open Access)
-
TEEREX: Discovery and exploitation of memory corruption vulnerabilities in SGX enclavesIn: Proceedings of the 29th USENIX Security Symposium: August 12-14, 2020 / 29th USENIX Security Symposium, 12.-14.08.2020. [Berkeley, CA]: USENIX Association, 2020, S. 841 – 858
-
CHASE : A configurable hardware-assisted security extension for real-time systemsIn: 2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD): digest of technical papers : November 4-7, 2019, Westin Westminster, CO / 38th IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 04.-07.11.2019; Westin Westminster. Piscataway: Institute of Electrical and Electronics Engineers, 2019
-
Combining safety and security in autonomous cars using blockchain technologiesIn: Computer Safety, Reliability, and Security: Proceedings / SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, 10.09.2019, Turku, Finland / Romanovsky, Alexander; Troubitsyna, Elena; Gashi, Ilir; Schoitsch, Erwin; Bitsch, Friedemann (Hrsg.). Cham: Springer, 2019, S. 223 – 234
-
Sereum: Protecting Existing Smart Contracts Against Re-Entrancy AttacksIn: Proceedings 2019 Network and Distributed System Security Symposium / 26th Annual Network and Distributed System Security Symposium (NDSS); February 24-27, 2019; San Diego, USA: Internet Society, 2019DOI (Open Access)
-
Hardware control flow integrityIn: The Continuing Arms Race: Code-Reuse Attacks and Defenses / Larsen, Per; Sadeghi, Ahmad-Reza (Hrsg.): ACM, 2018, S. 181 – 210
-
K-Miner: Uncovering Memory Corruption in LinuxIn: Proceedings 2018 Network and Distributed System Security Symposium / Network and Distributed Systems Security (NDSS) Symposium; 18-21 February 2018; San Diego, USA: Internet Society, 2018DOI (Open Access)
-
Special Session : Advances and Throwbacks in Hardware-Assisted SecurityIn: 2018 International Conference on Compilers, Architecture and Synthesis for Embedded Systems / CASES 2018, International Conference on Compilers, Architecture and Synthesis for Embedded Systems, September 30-October 5, 2018, Torino Incontra Congress Center, Turin, Italy; Henkel, Jörg. Piscataway: Institute of Electrical and Electronics Engineers Inc., 2018
-
The Guard's Dilemma : Efficient code-reuse attacks against intel SGXIn: Proceedings of the 27th USENIX Security Symposium / USENIX Security Symposium ; August 15-17, 2018, Baltimore: USENIX Association, 2018, S. 1213 – 1227
-
Address Oblivious Code Reuse : On the Effectiveness of Leakage-Resilient DiversityIn: Proceedings 2017 Network and Distributed System Security Symposium / 24th Annual Network & Distributed System Security Symposium (NDSS); February 26 - March 1, 2017; San Diego; USA: Internet Society, 2017DOI (Open Access)
-
Breaking and fixing destructive code read defensesIn: Proceedings of the 33rd Annual Computer Security Applications Conference / ACSAC 2017, Orlando, FL, USA, December 04 - 08, 2017. New York: ACM, 2017, S. 55 – 67DOI, Online Volltext (Open Access)
-
CFI CaRE : Hardware-Supported Call and, Return Enforcement for Commercial MicrocontrollersIn: Research in Attacks, Intrusions, and Defenses: Proceedings / 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017 / Dacier, Marc; Bailey, Michael; Polychronakis, Michalis; Antonakakis, Manos (Hrsg.). Berlin: Springer Verlag, 2017, S. 259 – 284
-
Can’t touch this : Software-only mitigation against rowhammer attacks targeting kernel memoryIn: Proceedings of the 26th USENIX Security Symposium / 26th USENIX Security Symposium : August 16-18, 2017, Vancouver, BC, Canada. Berkeley: USENIX Association, 2017, S. 117 – 130
-
LO-FAT : Low-Overhead Control Flow ATtestation in HardwareIn: Proceedings of the 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC) / Bertacco, Valeria; ACM/EDAC/IEEE Design Automation Conference, Austin, Texas, 2017.06.18-22 / Institute of Electrical and Electronics Engineers (Hrsg.). Piscataway: IEEE, 2017DOI, Online Volltext (Open Access)
-
PT-Rand: Practical Mitigation of Data-only Attacks against Page TablesIn: Proceedings 2017 Network and Distributed System Security Symposium / 24th Annual Network & Distributed System Security Symposium (NDSS); February 26 - March 1, 2017; San Diego; USA (Hrsg.): Internet Society, 2017DOI (Open Access)
-
C-FLAT: Control-flow attestation for embedded systems softwareIn: Proceedings of the ACM Conference on Computer and Communications Security / Weippl, Edgar; CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security; October 24 - 28, 2016; Vienna, Austria. New York: Association for Computing Machinery, 2016, S. 743 – 754DOI (Open Access)
-
Invited - Things, trouble, trust : On building trust in IoT systemsIn: Proceedings of the 53rd Annual Design Automation Conference / DAC '16: The 53rd Annual Design Automation Conference; June 5 - 9, 2016; Austin, USA. New York: Institute of Electrical and Electronics Engineers, 2016, 121
-
Leakage-Resilient Layout Randomization for Mobile DevicesIn: Proceedings 2016 Network and Distributed System Security Symposium / 23rd Annual Network and Distributed System Security Symposium (NDSS), February 21-24, 2016; San Diego, USA: Internet Society, 2016
-
SandScout: Automatic detection of flaws in iOS sandbox profilesIn: Proceedings of the ACM Conference on Computer and Communications Security / Weippl, Edgar; CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security; October 24 - 28, 2016; Vienna, Austria. New York: Association for Computing Machinery, 2016, S. 704 – 716DOI (Open Access)
-
Strategy without tactics : Policy-agnostic hardware-enhanced control-flow integrityIn: Proceedings of the 53rd Annual Design Automation Conference / DAC '16: The 53rd Annual Design Automation Conference; June 5 - 9, 2016; Austin, USA. New York: Institute of Electrical and Electronics Engineers, 2016, 163
-
Subversive-C: Abusing and protecting dynamic message dispatchIn: Proceedings of USENIX ATC ’16, 2016 USENIX Annual Technical Conference: June 22-24, 2016, Denver, CO, USA / 2016 USENIX Annual Technical Conference (USENIX ATC); June 22–24, 2016 ; Denver, USA: USENIX Association, 2016, S. 209 – 221(Open Access)
-
Building Secure Defenses Against Code-Reuse AttacksSpringer2015(SpringerBriefs in Computer Science)
-
Towards a Policy-Agnostic Control-Flow Integrity Implementation
Black Hat Europe; November; 1-6 2016; London, UK,2016