Quicklinks
Decorative photo of one of the top-corners of the CISPA building
Portrait of Person: Stefan Nürnberger

Stefan Nürnberger (Faculty)
 
 Campus E9 1 | 66123 Saarbrücken | 2.01

Publications:

Title Date Date Meta
Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying 2017  2017   Kangjie Lu, Marie-Therese Walter, David Pfaff, Stefan Nürnberger, Wenke Lee, Michael Backes  Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17)
VatiCAN - Vetted, Authenticated CAN Bus 2016  2016   Stefan Nürnberger, Christian Rossow  . Conference on Cryptographic Hardware and Embedded Systems (CHES)
RamCrypt: Kernel-based Address Space Encryption for User-mode Processes 2016  2016   Johannes Götzfried, Tilo Müller, Gabor Drescher, Stefan Nürnberger, Michael Backes  ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS)
Nearly Optimal Verifiable Data Streaming 2016  2016   Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nürnberger
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization 2016  2016   Kangjie Lu, Michael Backes, Stefan Nürnberger, Wenke Lee  Proceedings of the 23rd Annual Symposium on Network and Distributed System Security (NDSS '16)
Nearly Optimal Verifiable Data Streaming 2016  2016   Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nürnberger  Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I
Autonome Systeme 2016  2016   Stefan Nürnberger, Sven Bugiel
You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code 2014  2014   Michael Backes, Thorsten Holz, Benjamin Kollenda, Philipp Koppe, Stefan Nürnberger, Jannik Pewny  Proceedings of the 21st ACM conference on Computer and Communications Security (ACM CCS '14)
Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing 2014  2014   Michael Backes, Stefan Nürnberger  Proceedings of the 23rd USENIX Security Symposium (USENIX '14)
WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP 2014  2014   Michael Backes, Rainer W. Gerling, Sebastian Gerling, Stefan Nürnberger, Dominique Schröder, Mark Simkin  12th International Conference on Applied Cryptography and Network Security (ACNS 2014)
Client-controlled Cryptography-as-a-Service in the Cloud 2013  2013   Sören Bleikertz, Sven Bugiel, Hugo Ideler, Stefan Nürnberger, Ahmad-Reza Sadeghi  11th International Conference on Applied Cryptography and Network Security (ACNS'13)
Gadge Me if You Can: Secure and Efficient Ad-Hoc Instruction-Level Randomization for x86 and ARM 2013  2013   Lucas Vincenzo Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi  8th ACM SIGSAC symposium on Information, computer and communications security (ACM ASIACCS 2013)
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones 2012  2012   Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi  Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS '12)
XIFER: A Software Diversity Tool Against Code-Reuse Attacks 2012  2012   Lucas Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi  4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3)
AmazonIA: When Elasticity Snaps Back 2011  2011   Sven Bugiel, Thomas Pöppelmann, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider  Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11)
Twin Clouds: An Architecture for Secure Cloud Computing 2011  2011   Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider  Workshop on Cryptography and Security in Clouds (CSC)
Twin Clouds: Secure Cloud Computing with Low Latency 2011  2011   Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider  Communications and Multimedia Security Conference (CMS'11)
CFI Goes Mobile: Control-Flow Integrity for Smartphones 2011  2011   Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi
Poster: Control-flow Integrity for Smartphones 2011  2011   Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi  18th ACM conference on Computer and communications security (ACM CCS 2012)