Lehrstuhl für Informatik 1 (IT-Sicherheitsinfrastrukturen)


The research lab Computer Science 1 performs research in many areas of applied IT security (fundamental and systems research).

The research lab was established in 2010 and consists of a small set of more focussed research groups lead by postdoctoral researchers or professors.

Martensstraße 3
91058 Erlangen

Related Project(s)

Härtungsmaßnahmen: Softwarebasierte Härtungsmaßnahmen für mobile Applikationen
Prof. Dr.-Ing. Felix Freiling; Prof. Dr. Dirk Riehle
(01/11/2016 - 31/10/2019)

Publications (Download BibTeX)

Fürsattel, P., Placht, S., Maier, A., & Rieß, C. (2018). Geometric primitive refinement for structured light cameras. Machine Vision and Applications, 29(2), 313-327. https://dx.doi.org/10.1007/s00138-017-0901-z
Freiling, F., Safferling, C., & Rückert, C. (2018). Quellen-TKÜ und Online-Durchsuchung als neue Maßnahmen für die Strafverfolgung: Rechtliche und technische Herausforderungen. Juristische Rundschau, 1(1), 9-22.
Noorman, J., Van Bulck, J., Muhlberg, J.T., Piessens, F., Maene, P., Preneel, B.,... Freiling, F. (2017). Sancus 2.0: A Low-Cost Security Architecture for IoT Devices. ACM Transactions on Privacy and Security, 20(3). https://dx.doi.org/10.1145/3079763
Morgner, P., Müller, C., Ring, M., Eskofier, B., Rieß, C., Armknecht, F., & Benenson, Z. (2017). Privacy Implications of Room Climate Data. In Proceedings of the 22nd European Symposium on Research in Computer Security (pp. 324-343). Oslo, NO.
Käppler, S., Seifert, M., Horn, F., Pelzer, G., Rieger, J., Michel, T.,... Rieß, C. (2017). Talbot-Lau X-ray phase contrast for tiling-based acquisitions without reference scanning. Medical physics, 44(5), 1886-1898. https://dx.doi.org/10.1002/mp.12200
Drescher, G., Erhardt, C., Freiling, F., Götzfried, J., Lohmann, D., Maene, P.,... Wildermann, S. (2016). Providing security on demand using invasive computing. it - Information Technology, 58(6), 281-295. https://dx.doi.org/10.1515/itit-2016-0032
Weichslgartner, A., Wildermann, S., Götzfried, J., Freiling, F., Glaß, M., & Teich, J. (2016). Design-Time/Run-Time Mapping of Security-Critical Applications in Heterogeneous MPSoCs. In In Proceedings of the 19th International Workshop on Software and Compilers for Embedded Systems (SCOPES) (pp. 153-162). St. Goar, DE.
Würstlein, A., Gernoth, M., Götzfried, J., & Müller, T. (2016). Exzess: Hardware-based RAM encryption against physical memory disclosure. (pp. 60-71). Springer Verlag.
Götzfried, J., Müller, T., Drescher, G., Nürnberger, S., & Backes, M. (2016). RamCrypt: Kernel-based Address Space Encryption for User-mode Processes. In 11th ACM Asia Conference on Computer and Communications Security (pp. -). Xi'an, China, CN: New York: ACM.
Schmitt, J., Seufert, S., Zoubek, C., & Köstler, H. (2015). Potential-Field-Based Unit Behavior Optimization for Balancing in StarCraft II. In ACM (Eds.), Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation (pp. 1481-1482). Madrid.

Last updated on 2017-28-06 at 15:52