BibTeX records: Marcel Winandy

download as .bib file

@inproceedings{DBLP:conf/cscloud/LiguoriSW19,
  author       = {Angelo Liguori and
                  Peter Schoo and
                  Marcel Winandy},
  editor       = {Meikang Qiu},
  title        = {Mind the Shift: Secure Migration of Containerized Processes in Edge
                  Computing},
  booktitle    = {6th {IEEE} International Conference on Cyber Security and Cloud Computing,
                  CSCloud 2019 / 5th {IEEE} International Conference on Edge Computing
                  and Scalable Cloud, EdgeCom 2019, Paris, France, June 21-23, 2019},
  pages        = {204--209},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSCloud/EdgeCom.2019.00027},
  doi          = {10.1109/CSCLOUD/EDGECOM.2019.00027},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cscloud/LiguoriSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/HoffmannRMWGH16,
  author       = {Johannes Hoffmann and
                  Teemu Rytilahti and
                  Davide Maiorca and
                  Marcel Winandy and
                  Giorgio Giacinto and
                  Thorsten Holz},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Evaluating Analysis Tools for Android Apps: Status Quo and Robustness
                  Against Obfuscation},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {139--141},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857737},
  doi          = {10.1145/2857705.2857737},
  timestamp    = {Tue, 09 Feb 2021 08:50:28 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/HoffmannRMWGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/CatuognoLWS14,
  author       = {Luigi Catuogno and
                  Hans L{\"{o}}hr and
                  Marcel Winandy and
                  Ahmad{-}Reza Sadeghi},
  title        = {A trusted versioning file system for passive mobile storage devices},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {38},
  pages        = {65--75},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jnca.2013.05.006},
  doi          = {10.1016/J.JNCA.2013.05.006},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/CatuognoLWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2013wash,
  editor       = {John Lyle and
                  Shamal Faily and
                  Marcel Winandy},
  title        = {Proceedings of the Workshop on Web Applications and Secure Hardware
                  (WASH'13), Co-located with the 6th International Conference on Trust
                  and Trustworthy Computing {(TRUST} 2013), London, United Kingdom,
                  June 20, 2013},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1011},
  publisher    = {CEUR-WS.org},
  year         = {2013},
  url          = {https://ceur-ws.org/Vol-1011},
  urn          = {urn:nbn:de:0074-1011-6},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/2013wash.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Winandy12,
  author       = {Marcel Winandy},
  title        = {Security and trust architectures for protecting sensitive data on
                  commodity computing platforms},
  school       = {Ruhr University Bochum},
  year         = {2012},
  url          = {https://nbn-resolving.org/urn:nbn:de:101:1-201503013170},
  urn          = {urn:nbn:de:101:1-201503013170},
  isbn         = {978-3-8440-1315-3},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Winandy12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Winandy12,
  author       = {Marcel Winandy},
  title        = {Informationssicherheit in der Arztpraxis - Aktuelle Herausforderungen
                  und L{\"{o}}sungsans{\"{a}}tze},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {6},
  pages        = {419--424},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0151-1},
  doi          = {10.1007/S11623-012-0151-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Winandy12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ihi/HupperichLSW12,
  author       = {Thomas Hupperich and
                  Hans L{\"{o}}hr and
                  Ahmad{-}Reza Sadeghi and
                  Marcel Winandy},
  editor       = {Gang Luo and
                  Jiming Liu and
                  Christopher C. Yang},
  title        = {Flexible patient-controlled security for electronic health records},
  booktitle    = {{ACM} International Health Informatics Symposium, {IHI} '12, Miami,
                  FL, USA, January 28-30, 2012},
  pages        = {727--732},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2110363.2110448},
  doi          = {10.1145/2110363.2110448},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ihi/HupperichLSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/GroneW12,
  author       = {Michael Gr{\"{o}}ne and
                  Marcel Winandy},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Applying a Security Kernel Framework to Smart Meter Gateways},
  booktitle    = {{ISSE} 2012 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2012 Conference, Brussels,
                  Belgium, October 23-24, 2012},
  pages        = {252--259},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-658-00333-3\_24},
  doi          = {10.1007/978-3-658-00333-3\_24},
  timestamp    = {Wed, 24 Apr 2019 16:36:13 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/GroneW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biostec/DmitrienkoHLWS11,
  author       = {Alexandra Dmitrienko and
                  Zecir Hadzic and
                  Hans L{\"{o}}hr and
                  Marcel Winandy and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Vicente Traver and
                  Ana L. N. Fred and
                  Joaquim Filipe and
                  Hugo Gamboa},
  title        = {A Security Architecture for Accessing Health Records on Mobile Phones},
  booktitle    = {{HEALTHINF} 2011 - Proceedings of the International Conference on
                  Health Informatics, Rome, Italy, 26-29 January, 2011},
  pages        = {87--96},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Tue, 18 Oct 2022 21:16:17 +0200},
  biburl       = {https://dblp.org/rec/conf/biostec/DmitrienkoHLWS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biostec/DmitrienkoHLSW11,
  author       = {Alexandra Dmitrienko and
                  Zecir Hadzic and
                  Hans L{\"{o}}hr and
                  Ahmad{-}Reza Sadeghi and
                  Marcel Winandy},
  editor       = {Ana L. N. Fred and
                  Joaquim Filipe and
                  Hugo Gamboa},
  title        = {Securing the Access to Electronic Health Records on Mobile Phones},
  booktitle    = {Biomedical Engineering Systems and Technologies - 4th International
                  Joint Conference, {BIOSTEC} 2011, Rome, Italy, January 26-29, 2011,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {273},
  pages        = {365--379},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29752-6\_27},
  doi          = {10.1007/978-3-642-29752-6\_27},
  timestamp    = {Sat, 19 Oct 2019 20:01:11 +0200},
  biburl       = {https://dblp.org/rec/conf/biostec/DmitrienkoHLSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DaviSW11,
  author       = {Lucas Davi and
                  Ahmad{-}Reza Sadeghi and
                  Marcel Winandy},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {ROPdefender: a detection tool to defend against return-oriented programming
                  attacks},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {40--51},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966920},
  doi          = {10.1145/1966913.1966920},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DaviSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DaviDKW11,
  author       = {Lucas Davi and
                  Alexandra Dmitrienko and
                  Christoph Kowalski and
                  Marcel Winandy},
  editor       = {Yan Chen and
                  Shouhuai Xu and
                  Ahmad{-}Reza Sadeghi and
                  Xinwen Zhang},
  title        = {Trusted virtual domains on {OKL4:} secure information sharing on smartphones},
  booktitle    = {Proceedings of the sixth {ACM} workshop on Scalable trusted computing,
                  STC@CCS 2011, Chicago, Illinois, USA, October 17, 2011},
  pages        = {49--58},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046582.2046592},
  doi          = {10.1145/2046582.2046592},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DaviDKW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/FilyanovMSW11,
  author       = {Atanas Filyanov and
                  Jonathan M. McCune and
                  Ahmad{-}Reza Sadeghi and
                  Marcel Winandy},
  title        = {Uni-directional trusted path: Transaction confirmation on just one
                  device},
  booktitle    = {Proceedings of the 2011 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2011, Hong Kong, China, June 27-30 2011},
  pages        = {1--12},
  publisher    = {{IEEE} Compute Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/DSN.2011.5958202},
  doi          = {10.1109/DSN.2011.5958202},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/FilyanovMSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/CatuognoLMSSW10,
  author       = {Luigi Catuogno and
                  Hans L{\"{o}}hr and
                  Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Christian St{\"{u}}ble and
                  Marcel Winandy},
  title        = {Trusted virtual domains: Color your network},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {5},
  pages        = {289--294},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0089-0},
  doi          = {10.1007/S11623-010-0089-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/CatuognoLMSSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LohrSW10,
  author       = {Hans L{\"{o}}hr and
                  Ahmad{-}Reza Sadeghi and
                  Marcel Winandy},
  title        = {Patterns for Secure Boot and Secure Storage in Computer Systems},
  booktitle    = {{ARES} 2010, Fifth International Conference on Availability, Reliability
                  and Security, 15-18 February 2010, Krakow, Poland},
  pages        = {569--573},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ARES.2010.110},
  doi          = {10.1109/ARES.2010.110},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/LohrSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LohrPRSW10,
  author       = {Hans L{\"{o}}hr and
                  Thomas P{\"{o}}ppelmann and
                  Johannes Rave and
                  Martin Steegmanns and
                  Marcel Winandy},
  editor       = {Shouhuai Xu and
                  N. Asokan and
                  Ahmad{-}Reza Sadeghi},
  title        = {Trusted virtual domains on OpenSolaris: usable secure desktop environments},
  booktitle    = {Proceedings of the fifth {ACM} workshop on Scalable trusted computing,
                  STC@CCS 2010, Chicago, IL, USA, October 4, 2010},
  pages        = {91--96},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {http://dl.acm.org/citation.cfm?id=1867650},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LohrPRSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CheckowayDDSSW10,
  author       = {Stephen Checkoway and
                  Lucas Davi and
                  Alexandra Dmitrienko and
                  Ahmad{-}Reza Sadeghi and
                  Hovav Shacham and
                  Marcel Winandy},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Return-oriented programming without returns},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {559--572},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866370},
  doi          = {10.1145/1866307.1866370},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CheckowayDDSSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ehealth/Winandy10,
  author       = {Marcel Winandy},
  editor       = {Martin Szomszor and
                  Patty Kostkova},
  title        = {A Note on the Security in the Card Management System of the German
                  E-Health Card},
  booktitle    = {Electronic Healthcare - Third International Conference, eHealth 2010,
                  Casablanca, Morocco, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {69},
  pages        = {196--203},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23635-8\_25},
  doi          = {10.1007/978-3-642-23635-8\_25},
  timestamp    = {Fri, 02 Jun 2017 20:50:08 +0200},
  biburl       = {https://dblp.org/rec/conf/ehealth/Winandy10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ihi/LohrSW10,
  author       = {Hans L{\"{o}}hr and
                  Ahmad{-}Reza Sadeghi and
                  Marcel Winandy},
  editor       = {Tiffany C. Veinot and
                  {\"{U}}mit V. {\c{C}}ataly{\"{u}}rek and
                  Gang Luo and
                  Henrique Andrade and
                  Neil R. Smalheiser},
  title        = {Securing the e-health cloud},
  booktitle    = {{ACM} International Health Informatics Symposium, {IHI} 2010, Arlington,
                  VA, USA, November 11 - 12, 2010, Proceedings},
  pages        = {220--229},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1882992.1883024},
  doi          = {10.1145/1882992.1883024},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ihi/LohrSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/BugielDKSW10,
  author       = {Sven Bugiel and
                  Alexandra Dmitrienko and
                  Kari Kostiainen and
                  Ahmad{-}Reza Sadeghi and
                  Marcel Winandy},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {TruWalletM: Secure Web Authentication on Mobile Platforms},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {219--236},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_15},
  doi          = {10.1007/978-3-642-25283-9\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/BugielDKSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DaviDSW10,
  author       = {Lucas Davi and
                  Alexandra Dmitrienko and
                  Ahmad{-}Reza Sadeghi and
                  Marcel Winandy},
  editor       = {Mike Burmester and
                  Gene Tsudik and
                  Spyros S. Magliveras and
                  Ivana Ilic},
  title        = {Privilege Escalation Attacks on Android},
  booktitle    = {Information Security - 13th International Conference, {ISC} 2010,
                  Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6531},
  pages        = {346--360},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18178-8\_30},
  doi          = {10.1007/978-3-642-18178-8\_30},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/DaviDSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SadeghiSW10,
  author       = {Ahmad{-}Reza Sadeghi and
                  Thomas Schneider and
                  Marcel Winandy},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Token-Based Cloud Computing},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {417--429},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_30},
  doi          = {10.1007/978-3-642-13869-0\_30},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/SadeghiSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GajekLSW09,
  author       = {Sebastian Gajek and
                  Hans L{\"{o}}hr and
                  Ahmad{-}Reza Sadeghi and
                  Marcel Winandy},
  editor       = {Shouhuai Xu and
                  N. Asokan and
                  Cristina Nita{-}Rotaru and
                  Jean{-}Pierre Seifert},
  title        = {TruWallet: trustworthy and migratable wallet-based web authentication},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Scalable Trusted Computing,
                  {STC} 2009, Chicago, Illinois, USA, November 13, 2009},
  pages        = {19--28},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655108.1655112},
  doi          = {10.1145/1655108.1655112},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GajekLSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DaviSW09,
  author       = {Lucas Davi and
                  Ahmad{-}Reza Sadeghi and
                  Marcel Winandy},
  editor       = {Shouhuai Xu and
                  N. Asokan and
                  Cristina Nita{-}Rotaru and
                  Jean{-}Pierre Seifert},
  title        = {Dynamic integrity measurement and attestation: towards defense against
                  return-oriented programming attacks},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Scalable Trusted Computing,
                  {STC} 2009, Chicago, Illinois, USA, November 13, 2009},
  pages        = {49--54},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655108.1655117},
  doi          = {10.1145/1655108.1655117},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DaviSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/FischerSW09,
  author       = {Thomas Fischer and
                  Ahmad{-}Reza Sadeghi and
                  Marcel Winandy},
  editor       = {A Min Tjoa and
                  Roland R. Wagner},
  title        = {A Pattern for Secure Graphical User Interface Systems},
  booktitle    = {Database and Expert Systems Applications, DEXA, International Workshops,
                  Linz, Austria, August 31-September 4, 2009, Proceedings},
  pages        = {186--190},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DEXA.2009.76},
  doi          = {10.1109/DEXA.2009.76},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/FischerSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GrobertSW09,
  author       = {Felix Gr{\"{o}}bert and
                  Ahmad{-}Reza Sadeghi and
                  Marcel Winandy},
  title        = {Software distribution as a malware infection vector},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402538},
  doi          = {10.1109/ICITST.2009.5402538},
  timestamp    = {Mon, 09 Aug 2021 17:01:45 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GrobertSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/CatuognoDEKRSSSWZ09,
  author       = {Luigi Catuogno and
                  Alexandra Dmitrienko and
                  Konrad Eriksson and
                  Dirk Kuhlmann and
                  Gianluca Ramunno and
                  Ahmad{-}Reza Sadeghi and
                  Steffen Schulz and
                  Matthias Schunter and
                  Marcel Winandy and
                  Jing Zhan},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Trusted Virtual Domains - Design, Implementation and Lessons Learned},
  booktitle    = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  pages        = {156--179},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14597-1\_10},
  doi          = {10.1007/978-3-642-14597-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/CatuognoDEKRSSSWZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LohrSVW09,
  author       = {Hans L{\"{o}}hr and
                  Ahmad{-}Reza Sadeghi and
                  Claire Vishik and
                  Marcel Winandy},
  editor       = {Feng Bao and
                  Hui Li and
                  Guilin Wang},
  title        = {Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting
                  Information Sharing},
  booktitle    = {Information Security Practice and Experience, 5th International Conference,
                  {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5451},
  pages        = {396--407},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00843-6\_34},
  doi          = {10.1007/978-3-642-00843-6\_34},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LohrSVW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/CatuognoLMSW09,
  author       = {Luigi Catuogno and
                  Hans L{\"{o}}hr and
                  Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Marcel Winandy},
  editor       = {Adam Moskowitz},
  title        = {Transparent Mobile Storage Protection in Trusted Virtual Domains},
  booktitle    = {Proceedings of the 23rd Large Installation System Administration Conference,
                  November 1-6, 2009, Baltimore, MD, {USA}},
  pages        = {159--172},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {http://www.usenix.org/events/lisa09/tech/full\_papers/catuogno.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lisa/CatuognoLMSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/LohrSSWW09,
  author       = {Hans L{\"{o}}hr and
                  Ahmad{-}Reza Sadeghi and
                  Christian St{\"{u}}ble and
                  Marion Weber and
                  Marcel Winandy},
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Andrew P. Martin},
  title        = {Modeling Trusted Computing Support in a Protection Profile for High
                  Assurance Security Kernels},
  booktitle    = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
                  UK, April 6-8, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5471},
  pages        = {45--62},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00587-9\_4},
  doi          = {10.1007/978-3-642-00587-9\_4},
  timestamp    = {Sat, 28 Aug 2021 16:06:55 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/LohrSSWW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GasmiSSUWHS08,
  author       = {Yacine Gasmi and
                  Ahmad{-}Reza Sadeghi and
                  Patrick Stewin and
                  Martin Unger and
                  Marcel Winandy and
                  Rani Husseiki and
                  Christian St{\"{u}}ble},
  editor       = {Shouhuai Xu and
                  Cristina Nita{-}Rotaru and
                  Jean{-}Pierre Seifert},
  title        = {Flexible and secure enterprise rights management based on trusted
                  virtual domains},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Scalable Trusted Computing,
                  {STC} 2008, Alexandria, VA, USA, October 31, 2008},
  pages        = {71--80},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456455.1456467},
  doi          = {10.1145/1456455.1456467},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GasmiSSUWHS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/GasmiHPW07,
  author       = {Yacine Gasmi and
                  Christian Hessmann and
                  Martin Pittenauer and
                  Marcel Winandy},
  editor       = {Heinz{-}Gerd Hegering and
                  Axel Lehmann and
                  Hans J{\"{u}}rgen Ohlbach and
                  Christian Scheideler},
  title        = {Sicherheitsprobleme elektronischer Wahlausz{\"{a}}hlungssysteme
                  in der Praxis},
  booktitle    = {38. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Beherrschbare
                  Systeme - dank Informatik, {INFORMATIK} 2008, Munich, Germany, September
                  8-13, 2008, Band 1},
  series       = {{LNI}},
  volume       = {{P-133}},
  pages        = {411--416},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21400},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/GasmiHPW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/SadeghiSW08,
  author       = {Ahmad{-}Reza Sadeghi and
                  Christian St{\"{u}}ble and
                  Marcel Winandy},
  editor       = {Tzong{-}Chen Wu and
                  Chin{-}Laung Lei and
                  Vincent Rijmen and
                  Der{-}Tsai Lee},
  title        = {Property-Based {TPM} Virtualization},
  booktitle    = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
                  Taiwan, September 15-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5222},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85886-7\_1},
  doi          = {10.1007/978-3-540-85886-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/SadeghiSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GajekSSW07,
  author       = {Sebastian Gajek and
                  Ahmad{-}Reza Sadeghi and
                  Christian St{\"{u}}ble and
                  Marcel Winandy},
  title        = {Compartmented Security for Browsers - Or How to Thwart a Phisher with
                  Trusted Computing},
  booktitle    = {Proceedings of the The Second International Conference on Availability,
                  Reliability and Security, {ARES} 2007, The International Dependability
                  Conference - Bridging Theory and Practice, April 10-13 2007, Vienna,
                  Austria},
  pages        = {120--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ARES.2007.59},
  doi          = {10.1109/ARES.2007.59},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/GajekSSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SadeghiSSWW06,
  author       = {Ahmad{-}Reza Sadeghi and
                  Marcel Selhorst and
                  Christian St{\"{u}}ble and
                  Christian Wachsmann and
                  Marcel Winandy},
  editor       = {Ari Juels and
                  Gene Tsudik and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {{TCG} inside?: a note on {TPM} specification compliance},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Scalable Trusted Computing,
                  {STC} 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {47--56},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179474.1179487},
  doi          = {10.1145/1179474.1179487},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SadeghiSSWW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/AlkassarSSSW06,
  author       = {Ammar Alkassar and
                  Michael Scheibel and
                  Michael St{\"{u}}bel and
                  Ahmad{-}Reza Sadeghi and
                  Marcel Winandy},
  editor       = {Sachar Paulus and
                  Norbert Pohlmann and
                  Helmut Reimer},
  title        = {Security Architecture for Device Encryption and {VPN}},
  booktitle    = {{ISSE} 2006 - Securing Electronic Busines Processes, Highlights of
                  the Information Security Solutions Europe 2006 Conference, 10-12 October
                  2006, Rome, Italy},
  pages        = {54--63},
  publisher    = {Vieweg},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-8348-9195-2\_7},
  doi          = {10.1007/978-3-8348-9195-2\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/AlkassarSSSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ewsa/MuggeRWWCCE05,
  author       = {Holger M{\"{u}}gge and
                  Tobias Rho and
                  Marcel Winandy and
                  Markus Won and
                  Armin B. Cremers and
                  Pascal Costanza and
                  Roman Englert},
  editor       = {Ronald Morrison and
                  Fl{\'{a}}vio Oquendo},
  title        = {Towards Context-Sensitive Intelligence},
  booktitle    = {Software Architecture, 2nd European Workshop, {EWSA} 2005, Pisa, Italy,
                  June 13-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3527},
  pages        = {231--238},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11494713\_16},
  doi          = {10.1007/11494713\_16},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ewsa/MuggeRWWCCE05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/SpalkaCW05,
  author       = {Adrian Spalka and
                  Armin B. Cremers and
                  Marcel Winandy},
  editor       = {Joaquim Filipe and
                  Luminita Vasiu},
  title        = {Multilateral security considerations for adaptive mobile applications},
  booktitle    = {{ICETE} 2005 - Proceedings of the Second International Conference
                  on e-Business and Telecommunication Networks, Reading, UK, October
                  3-7, 2005},
  pages        = {133--137},
  publisher    = {{INSTICC} Press},
  year         = {2005},
  timestamp    = {Tue, 07 Nov 2006 14:13:57 +0100},
  biburl       = {https://dblp.org/rec/conf/icete/SpalkaCW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/SpalkaW03,
  author       = {Adrian Spalka and
                  Marcel Winandy},
  title        = {A Protection Environment for Administrators of Windows 2000/XP Against
                  Malicious Program Attacks},
  booktitle    = {27th International Computer Software and Applications Conference {(COMPSAC}
                  2003): Design and Assessment of Trustworthy Software-Based Systems,
                  3-6 November 2003, Dallas, TX, USA, Proceedings},
  pages        = {158--163},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CMPSAC.2003.1245336},
  doi          = {10.1109/CMPSAC.2003.1245336},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/SpalkaW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tc11-5/WinandyCLS02,
  author       = {Marcel Winandy and
                  Armin B. Cremers and
                  Hanno Langweg and
                  Adrian Spalka},
  editor       = {Michael Gertz},
  title        = {Protecting Java Component Integrity Against Trojan Horse Programs},
  booktitle    = {Integrity and Internal Control in Information Systems V, {IFIP} {TC11/WG11.5}
                  Fifth Working Conference on Integrity and Internal Control in Information
                  Systems (IICIS), November 11-12, 2002, Bonn, Germany},
  series       = {{IFIP} Conference Proceedings},
  volume       = {251},
  pages        = {99--113},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Mon, 07 Dec 2020 17:16:29 +0100},
  biburl       = {https://dblp.org/rec/conf/tc11-5/WinandyCLS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics