Smudge attacks on smartphone touch screens AJ Aviv, K Gibson, E Mossop, M Blaze, JM Smith 4th USENIX workshop on offensive technologies (WOOT 10), 2010 | 1569* | 2010 |
Security and privacy challenges in industrial internet of things AR Sadeghi, C Wachsmann, M Waidner Proceedings of the 52nd annual design automation conference, 1-6, 2015 | 1227 | 2015 |
Iot sentinel: Automated device-type identification for security enforcement in iot M Miettinen, S Marchal, I Hafeez, N Asokan, AR Sadeghi, S Tarkoma 2017 IEEE 37th international conference on distributed computing systems …, 2017 | 870 | 2017 |
Return-oriented programming without returns S Checkoway, L Davi, A Dmitrienko, AR Sadeghi, H Shacham, ... Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 845 | 2010 |
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization KZ Snow, F Monrose, L Davi, A Dmitrienko, C Liebchen, AR Sadeghi 2013 IEEE symposium on security and privacy, 574-588, 2013 | 771 | 2013 |
Software grand exposure:{SGX} cache attacks are practical F Brasser, U Müller, A Dmitrienko, K Kostiainen, S Capkun, AR Sadeghi 11th USENIX workshop on offensive technologies (WOOT 17), 2017 | 760 | 2017 |
DÏoT: A federated self-learning anomaly detection system for IoT TD Nguyen, S Marchal, M Miettinen, H Fereidooni, N Asokan, AR Sadeghi 2019 IEEE 39th International conference on distributed computing systems …, 2019 | 713 | 2019 |
Unsafe exposure analysis of mobile in-app advertisements MC Grace, W Zhou, X Jiang, AR Sadeghi Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012 | 710 | 2012 |
Privilege escalation attacks on android L Davi, A Dmitrienko, AR Sadeghi, M Winandy Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011 | 689 | 2011 |
Property-based attestation for computing platforms: caring about properties, not mechanisms AR Sadeghi, C Stüble Proceedings of the 2004 workshop on New security paradigms, 67-77, 2004 | 625 | 2004 |
Towards Taming Privilege-Escalation Attacks on Android. S Bugiel, L Davi, A Dmitrienko, T Fischer, AR Sadeghi, B Shastry NDSS 17, 19, 2012 | 581 | 2012 |
Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications F Schuster, T Tendyck, C Liebchen, L Davi, AR Sadeghi, T Holz 2015 IEEE Symposium on Security and Privacy, 745-762, 2015 | 534 | 2015 |
TASTY: tool for automating secure two-party computations W Henecka, S K ögl, AR Sadeghi, T Schneider, I Wehrenberg Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 502 | 2010 |
Efficient privacy-preserving face recognition AR Sadeghi, T Schneider, I Wehrenberg International conference on information security and cryptology, 229-244, 2009 | 492 | 2009 |
TrustLite: A security architecture for tiny embedded devices P Koeberl, S Schulz, AR Sadeghi, V Varadharajan Proceedings of the Ninth European Conference on Computer Systems, 1-14, 2014 | 458 | 2014 |
The cybersecurity landscape in industrial control systems S McLaughlin, C Konstantinou, X Wang, L Davi, AR Sadeghi, ... Proceedings of the IEEE 104 (5), 1039-1057, 2016 | 437 | 2016 |
ROPdefender: A detection tool to defend against return-oriented programming attacks L Davi, AR Sadeghi, M Winandy Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 423 | 2011 |
Xmandroid: A new android evolution to mitigate privilege escalation attacks S Bugiel, L Davi, A Dmitrienko, T Fischer, AR Sadeghi Technische Universität Darmstadt, Technical Report TR-2011-04, 2011 | 416 | 2011 |
Flexible and fine-grained mandatory access control on android for diverse security and privacy policies S Bugiel, S Heuser, AR Sadeghi 22nd USENIX Security Symposium (USENIX Security 13), 131-146, 2013 | 404 | 2013 |
Securing the e-health cloud H Löhr, AR Sadeghi, M Winandy Proceedings of the 1st acm international health informatics symposium, 220-229, 2010 | 381 | 2010 |