What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Felix C. Freiling
Google Scholar
23
publications in security and cryptology related venues
Year
Venue
Title
2021
journals/compsec
Towards GDPR-compliant data processing in modern SIEM systems.
Florian Menges
Tobias Latzo
Manfred Vielberth
Sabine Sobola
Henrich C. Pöhls
Benjamin Taubmann
Johannes Köstler
Alexander Puchta
Felix C. Freiling
Hans P. Reiser
Günther Pernul
2021
conf/acsac
Advanced System Resiliency Based on Virtualization Techniques for IoT Devices.
Jonas Röckl
Mykolai Protsenko
Monika Huber
Tilo Müller
Felix C. Freiling
2020
conf/sp
Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products.
Philipp Morgner
Christoph Mai
Nicole Koschate-Fischer
Felix C. Freiling
Zinaida Benenson
2018
conf/soups
Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently.
Norman Hänsch
Andrea Schankin
Mykolai Protsenko
Felix C. Freiling
Zinaida Benenson
2018
conf/esorics
Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing.
Lamya Abdullah
Felix C. Freiling
Juan Quintero
Zinaida Benenson
2018
conf/wisec
Opinion: Security Lifetime Labels - Overcoming Information Asymmetry in Security of IoT Consumer Products.
Philipp Morgner
Felix C. Freiling
Zinaida Benenson
2016
journals/popets
Fingerprinting Mobile Devices Using Personalized Configurations.
Andreas Kurtz
Hugo Gascon
Tobias Becker
Konrad Rieck
Felix C. Freiling
2016
conf/host
Information leakage behind the curtain: Abusing anti-EMI features for covert communication.
Johannes Bauer
Sebastian Schinzel
Felix C. Freiling
Andreas Dewald
2015
journals/istr
Secure garbage collection: Preventing malicious data harvesting from deallocated Java objects inside the Dalvik VM.
Maxim Anikeev
Felix C. Freiling
Johannes Götzfried
Tilo Müller
2015
conf/acsac
Soteria: Offline Software Protection within Low-cost Embedded Devices.
Johannes Götzfried
Tilo Müller
Ruan de Clercq
Pieter Maene
Felix C. Freiling
Ingrid Verbauwhede
2013
conf/fc
Stark - Tamperproof Authentication to Resist Keylogging.
Tilo Müller
Hans Spath
Richard Mäckl
Felix C. Freiling
2012
conf/acns
TreVisor - OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks.
Tilo Müller
Benjamin Taubmann
Felix C. Freiling
2012
conf/acsac
Using memory management to detect and extract illegitimate code for malware analysis.
Carsten Willems
Felix C. Freiling
Thorsten Holz
2011
conf/uss
TRESOR Runs Encryption Securely Outside RAM.
Tilo Müller
Felix C. Freiling
Andreas Dewald
2011
conf/sec
Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications.
Felix C. Freiling
Sebastian Schinzel
2011
conf/sec
A Case Study in Practical Security of Cable Networks.
Amir Alsbih
Felix C. Freiling
Christian Schindelhauer
2011
conf/sp
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices.
Michael Becher
Felix C. Freiling
Johannes Hoffmann
Thorsten Holz
Sebastian Uellenbeck
Christopher Wolf
2009
conf/uss
Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms.
Ralf Hund
Thorsten Holz
Felix C. Freiling
2009
conf/esorics
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones.
Thorsten Holz
Markus Engelberth
Felix C. Freiling
2008
conf/ndss
Measuring and Detecting Fast-Flux Service Networks.
Thorsten Holz
Christian Gorecki
Konrad Rieck
Felix C. Freiling
2006
conf/sec
Authenticated Query Flooding in Sensor Networks.
Zinaida Benenson
Felix C. Freiling
Ernest Hammerschmidt
Stefan Lucks
Lexi Pimenidis
2006
conf/esorics
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards.
Milan Fort
Felix C. Freiling
Lucia Draque Penso
Zinaida Benenson
Dogan Kesdogan
2005
conf/esorics
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks.
Felix C. Freiling
Thorsten Holz
Georg Wicherski
Coauthors
Alexander Puchta
(1)
Amir Alsbih
(1)
Andrea Schankin
(1)
Andreas Dewald
(2)
Andreas Kurtz
(1)
Benjamin Taubmann
(2)
Carsten Willems
(1)
Christian Gorecki
(1)
Christian Schindelhauer
(1)
Christoph Mai
(1)
Christopher Wolf
(1)
Dogan Kesdogan
(1)
Ernest Hammerschmidt
(1)
Felix C. Freiling
(23)
Florian Menges
(1)
Georg Wicherski
(1)
Günther Pernul
(1)
Hans P. Reiser
(1)
Hans Spath
(1)
Henrich C. Pöhls
(1)
Hugo Gascon
(1)
Ingrid Verbauwhede
(1)
Johannes Bauer
(1)
Johannes Götzfried
(2)
Johannes Hoffmann
(1)
Johannes Köstler
(1)
Jonas Röckl
(1)
Juan Quintero
(1)
Konrad Rieck
(2)
Lamya Abdullah
(1)
Lexi Pimenidis
(1)
Lucia Draque Penso
(1)
Manfred Vielberth
(1)
Markus Engelberth
(1)
Maxim Anikeev
(1)
Michael Becher
(1)
Milan Fort
(1)
Monika Huber
(1)
Mykolai Protsenko
(2)
Nicole Koschate-Fischer
(1)
Norman Hänsch
(1)
Philipp Morgner
(2)
Pieter Maene
(1)
Ralf Hund
(1)
Richard Mäckl
(1)
Ruan de Clercq
(1)
Sabine Sobola
(1)
Sebastian Schinzel
(2)
Sebastian Uellenbeck
(1)
Stefan Lucks
(1)
Thorsten Holz
(6)
Tilo Müller
(6)
Tobias Becker
(1)
Tobias Latzo
(1)
Zinaida Benenson
(6)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to