Follow
Stephan Heuser
Stephan Heuser
Intel
Verified email at heuser.ws
Title
Cited by
Cited by
Year
Flexible and fine-grained mandatory access control on android for diverse security and privacy policies
S Bugiel, S Heuser, AR Sadeghi
22nd USENIX Security Symposium (USENIX Security 13), 131-146, 2013
4042013
Practical and lightweight domain isolation on android
S Bugiel, L Davi, A Dmitrienko, S Heuser, AR Sadeghi, B Shastry
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
2822011
ASM: A Programmable Interface for Extending Android Security
S Heuser, A Nadkarni, W Enck, AR Sadeghi
23rd USENIX Security Symposium, 2014
1642014
Conxsense: automated context classification for context-aware access control
M Miettinen, S Heuser, W Kronz, AR Sadeghi, N Asokan
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
1162014
Mobile platform security
N Asokan, L Davi, A Dmitrienko, S Heuser, K Kostiainen, E Reshetova, ...
Morgan & Claypool, 2014
382014
DroidAuditor: forensic analysis of application-layer privilege escalation attacks on android (Short paper)
S Heuser, M Negro, PK Pendyala, AR Sadeghi
Financial Cryptography and Data Security: 20th International Conference, FC …, 2017
362017
Smart and secure cross-device apps for the internet of advanced things
C Busold, S Heuser, J Rios, AR Sadeghi, N Asokan
Financial Cryptography and Data Security: 19th International Conference, FC …, 2015
262015
Towards Permission-Based Attestation for the Android Platform: (Short Paper)
I Bente, G Dreo, B Hellmann, S Heuser, J Vieweg, J von Helden, ...
Trust and Trustworthy Computing: 4th International Conference, TRUST 2011 …, 2011
262011
Towards a framework for android security modules: Extending se android type enforcement to android middleware
S Bugiel, S Heuser, AR Sadeghi, TU Darmstadt
Intel Collaborative Research Institute for Secure Computing, 1-35, 2012
192012
mytunes: Semantically linked and user-centric fine-grained privacy control on android
S Bugiel, S Heuser, AR Sadeghi
Technical Report TUD-CS-2012-0226, Center for Advanced Security Research …, 2012
192012
Phonion: Practical protection of metadata in telephony networks
S Heuser, B Reaves, PK Pendyala, H Carter, A Dmitrienko, W Enck, ...
Proceedings on Privacy Enhancing Technologies, 2017
172017
Programmable interface for extending security of application-based operating system
WH Enck, AP Nadkarni, AR Sadeghi, S Heuser
US Patent 9,916,475, 2018
162018
Mobile Platform Security–Synthesis Lectures on Information Security, Privacy, and Trust
N Asokan, L Davi, A Dmitrienko, S Heuser, K Kostiainen, E Reshetova, ...
Morgan & Claypool Publishers, 2013
72013
Unveiling the kinetics of CO2 reduction in aprotic electrolyte: The critical role of adsorption
N Oppel, P Röse, S Heuser, M Prokein, UP Apfel, U Krewer
Electrochimica Acta 490, 144270, 2024
62024
Market-driven code provisioning to mobile secure hardware
A Dmitrienko, S Heuser, TD Nguyen, M da Silva Ramos, A Rein, ...
Financial Cryptography and Data Security: 19th International Conference, FC …, 2015
62015
Sichere Plattform zur Smartphone-Anbindung auf Basis von TNC
KO Detken, G Diederich, S Heuser
DACH Security, 2011
52011
Conxsense-context sensing for adaptive usable access control
M Miettinen, S Heuser, W Kronz, A Sadeghi, N Asokan
CoRR, abs/1308.2903, 2013
42013
Water Management as a Key Parameter for Scaling up a CO2 Electrolyzer
L Hoof, K Pellumbi, S Heuser, D Siegmund, K junge Puring, UP Apfel
Chemie Ingenieur Technik 95 (5), 668-674, 2023
32023
Towards modular and flexible access control on smart mobile devices
S Heuser
Technische Universität Darmstadt, 2016
12016
Auctions for secure multi-party policy negotiation in ambient intelligence
J Schütte, S Heuser
2011 IEEE Workshops of International Conference on Advanced Information …, 2011
12011
The system can't perform the operation now. Try again later.
Articles 1–20