Down to the Bare Metal: Using Processor Features for Binary Analysis

2012 - Carsten Willems, Ralf Hund, Dennis Felsch, Andreas Fobian, Thorsten Holz

TR-HGI-2012-001, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), November 2012 [pdf]

Lightweight Remote Attestation using Physical Functions (Extended Version)

2011 - Ünal Koçabas, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann

TU Darmstadt, TR-2011-06-01

Trusted embedded System Operating System (TeSOS) - Study and Design

2011 - Ahmad-Reza Sadeghi, Steffen Schulz, Alexandra Dmitrienko, Christian Stüble, Dennis Gessner, Markus Ullmann

Study and evaluation of security in sensor systems, System Security Lab, Sirrix AG, Federal Office for Information Security [project page] [pdf]

XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.

2011 - Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi

Technical Report: TUD-CS-2011-0127 [PDF]

Return-Oriented Programming without Returns on ARM

2010 - Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy

Tech­ni­cal Re­port HGI-TR-2010-002 [PDF]

From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design

2010 - Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider

Cryptology ePrint Archive: Report 2010/079 [PDF]

Schutz­recht "Die­lek­tri­sche An­ten­ne"

2010 - Michael Gerding, Thomas Musch, Nils Pohl

DE102008020036B4 , Micha­el Ger­ding, Tho­mas Musch, Nils Pohl (Er­fin­der), Kroh­ne Meß­tech­nik (An­mel­der), Patent erteilt 01.04.2010

ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks

2010 - Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy

Technical Report HGI-TR-2010-001 [PDF]

A Malware Instruction Set for Behavior-Based Analysis

2009 - Philipp Trinius, Carsten Willems, Thorsten Holz, Konrad Rieck

Technical Report TR-2009-007, University of Mannheim, December 2009 [MADOC Link] [PDF]

Automatic Analysis of Malware Behavior using Machine Learning

2009 - Philipp Trinius, Carsten Willems, Thorsten Holz, Konrad Rieck

Berlin Institute of Technology, Technical Report 18-2009 [PDF]