Marcel Winandy
Title
Cited by
Cited by
Year
Return-oriented programming without returns
S Checkoway, L Davi, A Dmitrienko, AR Sadeghi, H Shacham, ...
Proceedings of the 17th ACM conference on Computer and communications …, 2010
6212010
Privilege escalation attacks on android
L Davi, A Dmitrienko, AR Sadeghi, M Winandy
international conference on Information security, 346-360, 2010
6032010
ROPdefender: A detection tool to defend against return-oriented programming attacks
L Davi, AR Sadeghi, M Winandy
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
3532011
Securing the e-health cloud
H Löhr, AR Sadeghi, M Winandy
Proceedings of the 1st acm international health informatics symposium, 220-229, 2010
2982010
Token-based cloud computing
AR Sadeghi, T Schneider, M Winandy
International Conference on Trust and Trustworthy Computing, 417-429, 2010
2262010
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks
L Davi, AR Sadeghi, M Winandy
Proceedings of the 2009 ACM workshop on Scalable trusted computing, 49-54, 2009
1962009
Property-based TPM virtualization
AR Sadeghi, C Stüble, M Winandy
International Conference on Information Security, 1-16, 2008
1192008
TCG inside? A note on TPM specification compliance
AR Sadeghi, M Selhorst, C Stüble, C Wachsmann, M Winandy
Proceedings of the first ACM workshop on Scalable trusted computing, 47-56, 2006
1062006
Compartmented security for browsers-or how to thwart a phisher with trusted computing
S Gajek, AR Sadeghi, C Stuble, M Winandy
The Second International Conference on Availability, Reliability and …, 2007
742007
Return-oriented programming without returns on ARM
L Davi, A Dmitrienko, AR Sadeghi, M Winandy
Technical Report HGI-TR-2010-002, Ruhr-University Bochum, 2010
562010
Trusted Virtual Domains–design, implementation and lessons learned
L Catuogno, A Dmitrienko, K Eriksson, D Kuhlmann, G Ramunno, ...
International Conference on Trusted Systems, 156-179, 2009
532009
Uni-directional trusted path: Transaction confirmation on just one device
A Filyanov, JM McCuney, AR Sadeghiz, M Winandy
2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011
432011
Flexible patient-controlled security for electronic health records
T Hupperich, H Löhr, AR Sadeghi, M Winandy
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium …, 2012
402012
TruWallet: trustworthy and migratable wallet-based web authentication
S Gajek, H Löhr, AR Sadeghi, M Winandy
Proceedings of the 2009 ACM workshop on Scalable trusted computing, 19-28, 2009
392009
Flexible and secure enterprise rights management based on trusted virtual domains
Y Gasmi, AR Sadeghi, P Stewin, M Unger, M Winandy, R Husseiki, ...
Proceedings of the 3rd ACM workshop on Scalable trusted computing, 71-80, 2008
372008
Patterns for secure boot and secure storage in computer systems
H Löhr, AR Sadeghi, M Winandy
2010 International Conference on Availability, Reliability and Security, 569-573, 2010
332010
Transparent mobile storage protection in trusted virtual domains
L Catuogno, H Löhr, M Manulis, AR Sadeghi, M Winandy
23rd USENIX Large Installation Systems Administration Conference (LISA 2009 …, 2009
242009
A trusted versioning file system for passive mobile storage devices
L Catuogno, H Löhr, M Winandy, AR Sadeghi
Journal of Network and Computer Applications 38, 65-75, 2014
232014
TruWalletM: Secure web authentication on mobile platforms
S Bugiel, A Dmitrienko, K Kostiainen, AR Sadeghi, M Winandy
International Conference on Trusted Systems, 219-236, 2010
232010
Securing the access to electronic health records on mobile phones
A Dmitrienko, Z Hadzic, H Löhr, AR Sadeghi, M Winandy
International Joint Conference on Biomedical Engineering Systems and …, 2011
192011
The system can't perform the operation now. Try again later.
Articles 1–20