Google Scholar

2020

  • ≪ I Know Where You Parked Last Summer ≫ Automated Reverse Engineering and Privacy Analysis of Modern Cars.
    Daniel Frassinelli, Sohyeon Park, Stefan Nürnberger.
    IEEE Symposium on Security and Privacy (S&P 2020)

2019

  • The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding.
    Alfonso Iacovazzi, Daniel Frassinelli, Yuval Elovici
    22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019).
  • Protected Control Data
    Marie-Therese Walter, David Pfaff, Stefan Nürnberger, Michael Backes.
    arXiv preprint arXiv:1909.03758

2018

  • DRiVERSITY - Synthetic Torture Testing to Find Limits of Autonomous Driving Algorithms.
    Daniel Frassinelli, Alessio Gambi, Stefan Nürnberger, Sohyeon Park.
    ACM Computer Science in Cars Conference (CSCS 2018)
  • Datenverarbeitung im (vernetzten) Fahrzeug.
    Stefan Nürnberger.
    Datenschutz und Datensicherheit-DuD 42 (2), 79-82
  • DropWat: An Invisible Network Flow Watermark for Data Exfiltration Traceback
    A. Iacovazzi, S. Sarda, D. Frassinelli and Y. Elovici
    IEEE Transactions on Information Forensics and Security, vol. 13, no. 5, pp. 1139-1154.
  • On packet loss modeling: An empirical assessment A. Iacovazzi, D. Frassinelli and Y. Elovici.
    8th International Conference on the Network of the Future (NOF), pp. 33-39.

2017

  • Mitigating the imposition of malicious behaviour on code.
    Stefan Nürnberger. PhD Thesis, Saarland University
  • Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying
    Kangjie Lu, Marie-Therese Walter, David Pfaff, Stefan Nürnberger, Wenke Lee, Michael Backes.
    24th Annular Symposium on Network and Distributed System Security (NDSS 2017), 2017.
  • Neue Verfahren gegen das Aufoktroyieren von Verhaltensveränderungen in Software.
    Stefan Nürnberger. Ausgezeichnete Informatikdissertationen, Gesellschaft der Informatik

2016

  • RamCrypt: Kernel-based Address Space Encryption for User-mode Processes
    Johannes Götzfried, Tilo Müller, Gabor Drescher, Stefan Nürnberger, Michael Backes.
    ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS), 2016.
  • VatiCAN - Vetted, Authenticated CAN Bus
    Stefan Nürnberger, Christian Rossow.
    Conference on Cryptographic Hardware and Embedded Systems (CHES), 2016.
  • Nearly Optimal Verifiable Data Streaming
    Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nürnberger.
    IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC), 2016.

2015

  • How to Make ASLR Win the Clone Wars: Runtime Re-Randomization
    Kangjie Lu, Stefan Nürnberger, Michael Backes, Wenke Lee.
    23rd Annual Symposium on Network and Distributed System Security (NDSS 2016), 2015.

2014

  • You Can Run but You Can’t Read: Preventing Disclosure Exploits in Executable Code
    Michael Backes, Thorsten Holz, Benjamin Kollenda, Philipp Koppe, Stefan Nürnberger, Jannik Pewny.
    Proceedings of the 21st ACM conference on Computer and communications security (ACM CCS 2014), 2014.
  • Oxymoron - Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing
    Michael Backes, Stefan Nürnberger.
    USENIX Security Symposium, 2014.
  • WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP
    Michael Backes, Rainer W Gerling, Sebastian Gerling, Stefan Nürnberger, Dominique Schröder, Mark Simkin.
    12th International Conference on Applied Cryptography and Network Security, 2014.

2013

  • Client-controlled Cryptography-as-a-Service in the Cloud
    Sören Bleikertz, Sven Bugiel, Hugo Ideler, Stefan Nürnberger, Ahmad-Reza Sadeghi.
    11th International Conference on Applied Cryptography and Network Security (ACNS’13), 2013.
  • Gadge Me if You Can: Secure and Efficient Ad-Hoc Instruction-Level Randomization for x86 and ARM
    Lucas Vincenzo Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi.
    8th ACM SIGSAC symposium on Information, computer and communications security (ACM ASIACCS 2013), 2013.

2012

  • XIFER: A Software Diversity Tool Against Code-Reuse Attacks
    Lucas Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi.
    4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012), 2012.
  • MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones
    Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi.
    19th Annual Symposium on Network and Distributed System Security (NDSS 2012), 2012.

2011

  • Twin Clouds: An Architecture for Secure Cloud Computing
    Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider.
    Workshop on Cryptography and Security in Clouds (CSC 2011), 2011.
  • Re-synchronizing Audio Watermarking after Non-linear Time Stretching
    Stefan Nürnberger Martin Steinebach Sascha Zmudzinski.
    Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII, 2011.
  • CFI Goes Mobile: Control-Flow Integrity for Smartphones
    Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi.
    International Workshop on Trustworthy Embedded Devices (TrustED), 2011.
  • AmazonIA: When Elasticity Snaps Back
    Sven Bugiel, Stefan Nürnberger, Thomas Pöppelmann, Ahmad-Reza Sadeghi, Thomas Schneider.
    Proceedings of the 18th ACM conference on Computer and communications security (ACM CCS 2011), 2011.
  • Poster: Control-flow Integrity for Smartphones
    Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi.
    18th ACM conference on Computer and communications security (ACM CCS 2012), 2011.
  • Twin Clouds: Secure Cloud Computing with Low Latency
    Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider.
    Communications and Multimedia Security (CMS 2011), 2011.

2010

  • Ray - A Secure Microkernel Architecture
    Stefan Nürnberger, Thomas Feller, Sorin A Huss.
    Eighth Annual International Conference on Privacy Security and Trust (IEEE PST 2010), 2010.
  • Security of Robust Audio Hashes
    Stefan Thiemert, Stefan Nürnberger, Martin Steinebach, Sascha Zmudzinski.
    First IEEE International Workshop on Information Forensics and Security (WIFS 2009), 2009.
  • TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures
    Alysson Bessani, Imad M Abbadi, Sven Bugiel, Emanuele Cesena, Mina Deng, Michael Gröne, Ninja Marnau, Stefan Nürnberger, Marcelo Pasin, Norbert Schirmer.
    European Research Activities in Cloud Computing. Chapter 6, 2012.
  • A Secure Microkernel with Behaviour Deviation Detection
    Stefan Nürnberger.
    Master Thesis, Technische Universität Darmstadt, 2010.
  • Security of Robust Audio Hashes
    Stefan Nürnberger.
    Bachelor Tehsis, Technische Universität Darmstadt, 2008.