direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Inhalt des Dokuments

Tobias Pfeffer, M. Sc.

Veröffentlichungen

2019

Pfeffer, T., Göthel, T. and Glesner, S. (2019). Automatic Analysis of Critical Sections for Efficient Secure Multi-Execution. 2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS), 318-325.

Link zur Publikation Link zur Originalpublikation

Scherer, K., Pfeffer, T. and Glesner, S. (2019). I/O Interaction Analysis of Binary Code. VSC Track on Validation of Safety critical Collaboration systems at the IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2019), 225-230.

Link zur Publikation Link zur Originalpublikation

Pfeffer, T. and Glesner, S. (2019). Timing-Sensitive Synchronization for Efficient Secure Multi-Execution. Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop. ACM, 153–164.

Link zur Publikation Link zur Originalpublikation

Pfeffer, T., Göthel, T. and Glesner, S. (2019). Efficient and Precise Information Flow Control for Machine Code through Demand-Driven Secure Multi-Execution. Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy. ACM, 197–208.

Link zur Publikation Link zur Originalpublikation

2018

Pfeffer, T., Herber, P., Druschke, L. and Glesner, S. (2018). Efficient and Safe Control Flow Recovery Using a Restricted Intermediate Language. VSC Track on Validation of Safety critical Collaboration systems at the IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2018). IEEE Computer Society, 235 - 240.

Link zur Originalpublikation

2017

Fellmuth, J., Herber, P., Pfeffer, T. F. and Glesner, S. (2017). Securing Real-Time Cyber-Physical Systems using WCET-Aware Artificial Diversity. 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing (DASC'17), 454-461.

Link zur Originalpublikation

2016

Pfeffer, T., Sydow, S., Fellmuth, J. and Herber, P. (2016). Protecting Legacy Code against Control Hijacking via Execution Location Equivalence Checking. IEEE International Conference on Software Quality, Reliability & Security (QRS'16). IEEE.

Link zur Originalpublikation

2014

Pfeffer, T., Herber, P. and Schneider, J. (2014). Reverse Engineering of ARM Binaries Using Formal Transformations. International Conference on Security of Information and Networks (SIN'14). ACM, 345-351.

Link zur Originalpublikation

Zusatzinformationen / Extras

Direktzugang

Schnellnavigation zur Seite über Nummerneingabe