Follow
Marcel Winandy
Title
Cited by
Cited by
Year
Return-oriented programming without returns
S Checkoway, L Davi, A Dmitrienko, AR Sadeghi, H Shacham, ...
Proceedings of the 17th ACM conference on Computer and communications …, 2010
7262010
Privilege escalation attacks on android
L Davi, A Dmitrienko, AR Sadeghi, M Winandy
international conference on Information security, 346-360, 2010
6502010
ROPdefender: A detection tool to defend against return-oriented programming attacks
L Davi, AR Sadeghi, M Winandy
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
3822011
Securing the e-health cloud
H Löhr, AR Sadeghi, M Winandy
Proceedings of the 1st acm international health informatics symposium, 220-229, 2010
3372010
Token-based cloud computing
AR Sadeghi, T Schneider, M Winandy
International Conference on Trust and Trustworthy Computing, 417-429, 2010
2432010
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks
L Davi, AR Sadeghi, M Winandy
Proceedings of the 2009 ACM workshop on Scalable trusted computing, 49-54, 2009
2172009
Property-based TPM virtualization
AR Sadeghi, C Stüble, M Winandy
International Conference on Information Security, 1-16, 2008
1282008
TCG inside? A note on TPM specification compliance
AR Sadeghi, M Selhorst, C Stüble, C Wachsmann, M Winandy
Proceedings of the first ACM workshop on Scalable trusted computing, 47-56, 2006
1092006
Compartmented security for browsers-or how to thwart a phisher with trusted computing
S Gajek, AR Sadeghi, C Stuble, M Winandy
The Second International Conference on Availability, Reliability and …, 2007
802007
Return-oriented programming without returns on ARM
L Davi, A Dmitrienko, AR Sadeghi, M Winandy
Technical Report HGI-TR-2010-002, Ruhr-University Bochum, 2010
652010
Trusted Virtual Domains–design, implementation and lessons learned
L Catuogno, A Dmitrienko, K Eriksson, D Kuhlmann, G Ramunno, ...
International Conference on Trusted Systems, 156-179, 2009
552009
Uni-directional trusted path: Transaction confirmation on just one device
A Filyanov, JM McCuney, AR Sadeghiz, M Winandy
2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011
462011
TruWallet: trustworthy and migratable wallet-based web authentication
S Gajek, H Löhr, AR Sadeghi, M Winandy
Proceedings of the 2009 ACM workshop on Scalable trusted computing, 19-28, 2009
462009
Flexible patient-controlled security for electronic health records
T Hupperich, H Löhr, AR Sadeghi, M Winandy
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium …, 2012
432012
Patterns for secure boot and secure storage in computer systems
H Löhr, AR Sadeghi, M Winandy
2010 International Conference on Availability, Reliability and Security, 569-573, 2010
392010
Flexible and secure enterprise rights management based on trusted virtual domains
Y Gasmi, AR Sadeghi, P Stewin, M Unger, M Winandy, R Husseiki, ...
Proceedings of the 3rd ACM workshop on Scalable trusted computing, 71-80, 2008
382008
TruWalletM: Secure web authentication on mobile platforms
S Bugiel, A Dmitrienko, K Kostiainen, AR Sadeghi, M Winandy
International Conference on Trusted Systems, 219-236, 2010
282010
Transparent mobile storage protection in trusted virtual domains
L Catuogno, H Löhr, M Manulis, AR Sadeghi, M Winandy
23rd USENIX Large Installation Systems Administration Conference (LISA 2009 …, 2009
252009
Evaluating analysis tools for android apps: Status quo and robustness against obfuscation
J Hoffmann, T Rytilahti, D Maiorca, M Winandy, G Giacinto, T Holz
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
242016
Modeling trusted computing support in a protection profile for high assurance security kernels
H Löhr, AR Sadeghi, C Stüble, M Weber, M Winandy
International Conference on Trusted Computing, 45-62, 2009
242009
The system can't perform the operation now. Try again later.
Articles 1–20