What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Tilo Müller
Google Scholar
15
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/eurosp
Conditional Network Availability: Enhancing Connectivity Guarantees for TEE-Based Services.
Jonas Röckl
Christian Lindenmeier
Matti Schulze
Tilo Müller
2024
conf/asiaccs
TeeFilter: High-Assurance Network Filtering Engine for High-End IoT and Edge Devices based on TEEs.
Jonas Röckl
Nils Bernsdorf
Tilo Müller
2022
conf/asiaccs
ReFuzz - Structure Aware Fuzzing of the Resilient File System (ReFS).
Tobias Groß
Tobias Schleier
Tilo Müller
2021
conf/acsac
Advanced System Resiliency Based on Virtualization Techniques for IoT Devices.
Jonas Röckl
Mykolai Protsenko
Monika Huber
Tilo Müller
Felix C. Freiling
2020
conf/acns
On the Evolution of Security Issues in Android App Versions.
Anatoli Kalysch
Joschua Schilling
Tilo Müller
2016
conf/ccs
RamCrypt: Kernel-based Address Space Encryption for User-mode Processes.
Johannes Götzfried
Tilo Müller
Gabor Drescher
Stefan Nürnberger
Michael Backes
2015
journals/compsec
A game of Droid and Mouse: The threat of split-personality malware on Android.
Dominik Christian Maier
Mykola Protsenko
Tilo Müller
2015
journals/istr
Secure garbage collection: Preventing malicious data harvesting from deallocated Java objects inside the Dalvik VM.
Maxim Anikeev
Felix C. Freiling
Johannes Götzfried
Tilo Müller
2015
conf/esorics
A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory.
Maximilian Seitzer
Michael Gruhn
Tilo Müller
2015
conf/acsac
Soteria: Offline Software Protection within Low-cost Embedded Devices.
Johannes Götzfried
Tilo Müller
Ruan de Clercq
Pieter Maene
Felix C. Freiling
Ingrid Verbauwhede
2013
conf/fc
Stark - Tamperproof Authentication to Resist Keylogging.
Tilo Müller
Hans Spath
Richard Mäckl
Felix C. Freiling
2013
conf/acns
FROST - Forensic Recovery of Scrambled Telephones.
Tilo Müller
Michael Spreitzenbarth
2013
conf/acsac
PRIME: private RSA infrastructure for memory-less encryption.
Behrad Garmany
Tilo Müller
2012
conf/acns
TreVisor - OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks.
Tilo Müller
Benjamin Taubmann
Felix C. Freiling
2011
conf/uss
TRESOR Runs Encryption Securely Outside RAM.
Tilo Müller
Felix C. Freiling
Andreas Dewald
Coauthors
Anatoli Kalysch
(1)
Andreas Dewald
(1)
Behrad Garmany
(1)
Benjamin Taubmann
(1)
Christian Lindenmeier
(1)
Dominik Christian Maier
(1)
Felix C. Freiling
(6)
Gabor Drescher
(1)
Hans Spath
(1)
Ingrid Verbauwhede
(1)
Johannes Götzfried
(3)
Jonas Röckl
(3)
Joschua Schilling
(1)
Matti Schulze
(1)
Maxim Anikeev
(1)
Maximilian Seitzer
(1)
Michael Backes
(1)
Michael Gruhn
(1)
Michael Spreitzenbarth
(1)
Monika Huber
(1)
Mykola Protsenko
(1)
Mykolai Protsenko
(1)
Nils Bernsdorf
(1)
Pieter Maene
(1)
Richard Mäckl
(1)
Ruan de Clercq
(1)
Stefan Nürnberger
(1)
Tilo Müller
(15)
Tobias Groß
(1)
Tobias Schleier
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to