Alexandra Dmitrienko
Alexandra Dmitrienko
Verified email at uni-wuerzburg.de
Title
Cited by
Cited by
Year
Return-oriented programming without returns
S Checkoway, L Davi, A Dmitrienko, AR Sadeghi, H Shacham, ...
Proceedings of the 17th ACM conference on Computer and communications …, 2010
6662010
Privilege escalation attacks on android
L Davi, A Dmitrienko, AR Sadeghi, M Winandy
international conference on Information security, 346-360, 2010
6312010
Privilege escalation attacks on android
L Davi, A Dmitrienko, AR Sadeghi, M Winandy
international conference on Information security, 346-360, 2010
6312010
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
KZ Snow, F Monrose, L Davi, A Dmitrienko, C Liebchen, AR Sadeghi
2013 IEEE Symposium on Security and Privacy, 574-588, 2013
5802013
Towards Taming Privilege-Escalation Attacks on Android.
S Bugiel, L Davi, A Dmitrienko, T Fischer, AR Sadeghi, B Shastry
NDSS 17, 19, 2012
5122012
Software grand exposure:{SGX} cache attacks are practical
F Brasser, U Müller, A Dmitrienko, K Kostiainen, S Capkun, AR Sadeghi
11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17), 2017
4342017
Xmandroid: A new android evolution to mitigate privilege escalation attacks
S Bugiel, L Davi, A Dmitrienko, T Fischer, AR Sadeghi
Technische Universität Darmstadt, Technical Report TR-2011-04, 2011
3652011
Practical and lightweight domain isolation on android
S Bugiel, L Davi, A Dmitrienko, S Heuser, AR Sadeghi, B Shastry
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
2672011
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
L Davi, A Dmitrienko, M Egele, T Fischer, T Holz, R Hund, S Nürnberger, ...
NDSS 26, 27-40, 2012
2132012
Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM
LV Davi, A Dmitrienko, S Nürnberger, AR Sadeghi
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
1172013
Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM
LV Davi, A Dmitrienko, S Nürnberger, AR Sadeghi
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
1172013
On the (in) security of mobile two-factor authentication
A Dmitrienko, C Liebchen, C Rossow, AR Sadeghi
International Conference on Financial Cryptography and Data Security, 365-383, 2014
802014
µchain: How to forget without hard forks
I Puddu, A Dmitrienko, S Capkun
IACR Cryptology ePrint Archive 2017/106, 2017
632017
Return-oriented programming without returns on ARM
L Davi, A Dmitrienko, AR Sadeghi, M Winandy
Technical Report HGI-TR-2010-002, Ruhr-University Bochum, 2010
622010
Trusted Virtual Domains–design, implementation and lessons learned
L Catuogno, A Dmitrienko, K Eriksson, D Kuhlmann, G Ramunno, ...
International Conference on Trusted Systems, 156-179, 2009
552009
Smart keys for cyber-cars: Secure smartphone-based NFC-enabled car immobilizer
C Busold, A Taha, C Wachsmann, A Dmitrienko, H Seudié, M Sobhani, ...
Proceedings of the third ACM conference on Data and application security and …, 2013
522013
SECURITY ANALYSIS OF MOBILE TWO-FACTOR AUTHENTICATION SCHEMES.
A Dmitrienko, C Liebchen, C Rossow, AR Sadeghi
Intel Technology Journal 18 (4), 2014
502014
Do i know you? Efficient and privacy-preserving common friend-finder protocols and applications
M Nagy, E De Cristofaro, A Dmitrienko, N Asokan, AR Sadeghi
Proceedings of the 29th Annual Computer Security Applications Conference …, 2013
482013
SmartTokens: Delegable access control with NFC-enabled smartphones
A Dmitrienko, AR Sadeghi, S Tamrakar, C Wachsmann
International Conference on Trust and Trustworthy Computing, 219-238, 2012
432012
DR. SGX: hardening SGX enclaves against cache attacks with data location randomization
F Brasser, S Capkun, A Dmitrienko, T Frassetto, K Kostiainen, ...
arXiv preprint arXiv:1709.09917, 2017
392017
The system can't perform the operation now. Try again later.
Articles 1–20