Login / Signup
Ralf Hund
Publication Activity (10 Years)
Years Active: 2009-2013
Publications (10 Years): 0
Top Topics
Kernel Space
Mutual Authentication
Security Analysis
Hyperplane
Top Venues
NDSS
IEEE Symposium on Security and Privacy
AsiaCCS
NEW PROLAMAT
</>
Publications
</>
Bernhard Müller
,
Ralf Hund
,
Roland Malek
,
Nancy Gerth
Laser Beam Melting for Tooling Applications - New Perspectives for Resource-Efficient Metal Forming and Die Casting Processes.
NEW PROLAMAT
(2013)
Tim Werthmann
,
Ralf Hund
,
Lucas Davi
,
Ahmad-Reza Sadeghi
,
Thorsten Holz
PSiOS: bring your own privacy & security to iOS devices.
AsiaCCS
(2013)
Benedikt Driessen
,
Ralf Hund
,
Carsten Willems
,
Christof Paar
,
Thorsten Holz
An experimental security analysis of two satphone standards.
ACM Trans. Inf. Syst. Secur.
16 (3) (2013)
Ralf Hund
,
Carsten Willems
,
Thorsten Holz
Practical Timing Side Channel Attacks against Kernel Space ASLR.
IEEE Symposium on Security and Privacy
(2013)
Ralf Hund
,
Carsten Willems
,
Thorsten Holz
Practical Timing Side Channel Attacks Against Kernel Space ASLR.
NDSS
(2013)
Benedikt Driessen
,
Ralf Hund
,
Carsten Willems
,
Christof Paar
,
Thorsten Holz
Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards.
IEEE Symposium on Security and Privacy
(2012)
Carsten Willems
,
Ralf Hund
,
Andreas Fobian
,
Dennis Felsch
,
Thorsten Holz
,
Amit Vasudevan
Down to the bare metal: using processor features for binary analysis.
ACSAC
(2012)
Lucas Davi
,
Alexandra Dmitrienko
,
Manuel Egele
,
Thomas Fischer
,
Thorsten Holz
,
Ralf Hund
,
Stefan Nürnberger
,
Ahmad-Reza Sadeghi
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
NDSS
(2012)
Lucas Davi
,
Alexandra Dmitrienko
,
Manuel Egele
,
Thomas Fischer
,
Thorsten Holz
,
Ralf Hund
,
Stefan Nürnberger
,
Ahmad-Reza Sadeghi
Poster: control-flow integrity for smartphones.
CCS
(2011)
Grégoire Jacob
,
Ralf Hund
,
Christopher Kruegel
,
Thorsten Holz
JACKSTRAWS: Picking Command and Control Connections from Bot Traffic.
USENIX Security Symposium
(2011)
Markus Engelberth
,
Felix C. Freiling
,
Jan Göbel
,
Christian Gorecki
,
Thorsten Holz
,
Ralf Hund
,
Philipp Trinius
,
Carsten Willems
Das Internet-Malware-Analyse-System (InMAS) - Ein System zur großflächigen Sammlung und Analyse von Schadsoftware im Internet.
Datenschutz und Datensicherheit
35 (4) (2011)
Ralf Hund
,
Thorsten Holz
,
Felix C. Freiling
Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms.
USENIX Security Symposium
(2009)