Felix Schuster
Felix Schuster
Email confirmado em rub.de
Título
Citado por
Citado por
Ano
VC3: Trustworthy data analytics in the cloud using SGX
F Schuster, M Costa, C Fournet, C Gkantsidis, M Peinado, G Mainar-Ruiz, ...
2015 IEEE Symposium on Security and Privacy, 38-54, 2015
6172015
Oblivious multi-party machine learning on trusted processors
O Ohrimenko, F Schuster, C Fournet, A Mehta, S Nowozin, K Vaswani, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 619-636, 2016
3882016
Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications
F Schuster, T Tendyck, C Liebchen, L Davi, AR Sadeghi, T Holz
2015 IEEE Symposium on Security and Privacy, 745-762, 2015
3732015
Strong and efficient cache side-channel protection using hardware transactional memory
D Gruss, J Lettner, F Schuster, O Ohrimenko, I Haller, M Costa
26th {USENIX} Security Symposium ({USENIX} Security 17), 217-233, 2017
1812017
It's a TRaP: Table randomization and protection against function-reuse attacks
SJ Crane, S Volckaert, F Schuster, C Liebchen, P Larsen, L Davi, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1392015
Evaluating the effectiveness of current anti-ROP defenses
F Schuster, T Tendyck, J Pewny, A Maaß, M Steegmanns, M Contag, ...
International Workshop on Recent Advances in Intrusion Detection, 88-108, 2014
1112014
Scriptless attacks: stealing the pie without touching the sill
M Heiderich, M Niemietz, F Schuster, T Holz, J Schwenk
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1082012
Leveraging semantic signatures for bug search in binary programs
J Pewny, F Schuster, L Bernhard, T Holz, C Rossow
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
862014
Towards reducing the attack surface of software backdoors
F Schuster, T Holz
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
362013
Subversive-C: Abusing and protecting dynamic message dispatch
J Lettner, B Kollenda, A Homescu, P Larsen, F Schuster, L Davi, ...
2016 {USENIX} Annual Technical Conference ({USENIX}{ATC} 16), 209-221, 2016
252016
CCF: A framework for building confidential verifiable replicated services
M Russinovich, E Ashton, C Avanessians, M Castro, A Chamayou, ...
Technical Report MSR-TR-2019-16, Microsoft, Tech. Rep., 2019
222019
Trusted execution within a distributed computing system
M Costa, F Schuster, C Fournet, C Gkantsidis, M Peinado, AIT Rowstron
US Patent 9,792,427, 2017
132017
Trusted execution within a distributed computing system
M Costa, F Schuster, C Fournet, C Gkantsidis, M Peinado, AIT Rowstron
US Patent 9,792,427, 2017
132017
Scriptless attacks: Stealing more pie without touching the sill
M Heiderich, M Niemietz, F Schuster, T Holz, J Schwenk
Journal of Computer Security 22 (4), 567-599, 2014
102014
The pyramid scheme: Oblivious RAM for trusted processors
M Costa, L Esswood, O Ohrimenko, F Schuster, S Wagh
arXiv preprint arXiv:1712.07882, 2017
92017
Privacy-preserving machine learning
MSDS Costa, CAMC Fournet, A Mehta, S Nowozin, O Ohrimenko, ...
US Patent App. 15/245,141, 2017
42017
SGX-enabled oblivious machine learning
O Ohrimenko, M Costa, C Fournet, S Nowozin, A Mehta, F Schuster, ...
42016
Securing application software in modern adversarial settings
F Schuster
Ruhr-Universität Bochum, 2016
12016
Preventing backdoors in server applications with a separated software architecture
F Schuster, S Rüster, T Holz
International Conference on Detection of Intrusions and Malware, and …, 2013
12013
Side-channel protection
A Shamis, SW Clebsch, F Schuster
US Patent App. 16/246,434, 2020
2020
O sistema não pode efectuar a operação agora. Tente novamente mais tarde.
Artigos 1–20