Cache attacks on Intel SGX J Götzfried, M Eckert, S Schinzel, T Müller Proceedings of the 10th European Workshop on Systems Security, 1-6, 2017 | 499 | 2017 |
TRESOR Runs Encryption Securely Outside RAM T Müller, FC Freiling, A Dewald Proceedings of the 20th USENIX conference on Security, 17-17, 2011 | 234 | 2011 |
Hardware-based trusted computing architectures for isolation and attestation P Maene, J Götzfried, R De Clercq, T Müller, F Freiling, I Verbauwhede IEEE Transactions on Computers 67 (3), 361-374, 2017 | 221 | 2017 |
Sancus 2.0: A low-cost security architecture for iot devices J Noorman, JV Bulck, JT Mühlberg, F Piessens, P Maene, B Preneel, ... ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-33, 2017 | 172 | 2017 |
FROST: Forensic Recovery of Scrambled Telephones T Müller, M Spreitzenbarth Applied Cryptography and Network Security, 373-388, 2013 | 171 | 2013 |
On the practicability of cold boot attacks M Gruhn, T Müller 2013 International Conference on Availability, Reliability and Security, 390-397, 2013 | 138 | 2013 |
Divide-and-conquer: Why android malware cannot be stopped D Maier, T Müller, M Protsenko 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 100 | 2014 |
AESSE: A Cold-Boot Resistant Implementation of AES T Müller, A Dewald, FC Freiling Proceedings of the Third European Workshop on System Security, 42-47, 2010 | 90 | 2010 |
ARMORED: CPU-bound encryption for Android-driven ARM devices J Götzfried, T Müller 2013 International conference on availability, reliability and security, 161-168, 2013 | 73 | 2013 |
PRIME: private RSA infrastructure for memory-less encryption B Garmany, T Müller Proceedings of the 29th Annual Computer Security Applications Conference …, 2013 | 60 | 2013 |
TreVisor -- OS-Independent Software-Based Full Disk Encryption Secure Against Main Memory Attacks T Müller, B Taubmann, F Freiling Applied Cryptography and Network Security, 66-83, 2012 | 55 | 2012 |
Post-mortem memory analysis of cold-booted android devices C Hilgers, H Macht, T Müller, M Spreitzenbarth 2014 Eighth International Conference on IT Security Incident Management & IT …, 2014 | 53 | 2014 |
ASLR Smack & Laugh Reference T Müller Seminar on Advanced Exploitation Techniques, 2008 | 51 | 2008 |
A game of Droid and Mouse: The threat of split-personality malware on Android D Maier, M Protsenko, T Müller Computers & Security 54, 2-15, 2015 | 43 | 2015 |
Analysing Android's Full Disk Encryption Feature. J Götzfried, T Müller J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5 (1), 84-100, 2014 | 41 | 2014 |
A systematic assessment of the security of full disk encryption T Müller, FC Freiling IEEE Transactions on Dependable and Secure Computing 12 (5), 491-503, 2014 | 40 | 2014 |
VMAttack: Deobfuscating virtualization-based packed binaries A Kalysch, J Götzfried, T Müller Proceedings of the 12th International Conference on Availability …, 2017 | 38 | 2017 |
Ramcrypt: Kernel-based address space encryption for user-mode processes J Götzfried, T Müller, G Drescher, S Nürnberger, M Backes Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 38 | 2016 |
Dynamic self-protection and tamperproofing for android apps using native code M Protsenko, S Kreuter, T Müller 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 35 | 2015 |
Hardware-Based full disk encryption (in) security survey T Müller, T Latzo, F Freiling Tech. rep., Friedrich-Alexander University of Erlangen-Nuremberg, Technical …, 2012 | 35* | 2012 |