direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Page Content

Tobias Pfeffer, M. Sc.

Publications

2019

Pfeffer, T., Göthel, T. and Glesner, S. (2019). Automatic Analysis of Critical Sections for Efficient Secure Multi-Execution. 2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS), 318-325.

Link to publication Link to original publication

Scherer, K., Pfeffer, T. and Glesner, S. (2019). I/O Interaction Analysis of Binary Code. VSC Track on Validation of Safety critical Collaboration systems at the IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2019), 225-230.

Link to publication Link to original publication

Pfeffer, T. and Glesner, S. (2019). Timing-Sensitive Synchronization for Efficient Secure Multi-Execution. Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop. ACM, 153–164.

Link to publication Link to original publication

Pfeffer, T., Göthel, T. and Glesner, S. (2019). Efficient and Precise Information Flow Control for Machine Code through Demand-Driven Secure Multi-Execution. Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy. ACM, 197–208.

Link to publication Link to original publication

2018

Pfeffer, T., Herber, P., Druschke, L. and Glesner, S. (2018). Efficient and Safe Control Flow Recovery Using a Restricted Intermediate Language. VSC Track on Validation of Safety critical Collaboration systems at the IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2018). IEEE Computer Society, 235 - 240.

Link to original publication

2017

Fellmuth, J., Herber, P., Pfeffer, T. F. and Glesner, S. (2017). Securing Real-Time Cyber-Physical Systems using WCET-Aware Artificial Diversity. 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing (DASC'17), 454-461.

Link to original publication

2016

Pfeffer, T., Sydow, S., Fellmuth, J. and Herber, P. (2016). Protecting Legacy Code against Control Hijacking via Execution Location Equivalence Checking. IEEE International Conference on Software Quality, Reliability & Security (QRS'16). IEEE.

Link to original publication

2014

Pfeffer, T., Herber, P. and Schneider, J. (2014). Reverse Engineering of ARM Binaries Using Formal Transformations. International Conference on Security of Information and Networks (SIN'14). ACM, 345-351.

Link to original publication

Zusatzinformationen / Extras

Quick Access:

Schnellnavigation zur Seite über Nummerneingabe