Dr.-Ing. Johannes Götzfried


Lehrstuhl für Informatik 1 (IT-Sicherheitsinfrastrukturen)
Sonderforschungsbereich/Transregio 89 Invasives Rechnen

Publications (Download BibTeX)

Noorman, J., Van Bulck, J., Muhlberg, J.T., Piessens, F., Maene, P., Preneel, B.,... Freiling, F. (2017). Sancus 2.0: A Low-Cost Security Architecture for IoT Devices. ACM Transactions on Privacy and Security, 20(3). https://dx.doi.org/10.1145/3079763
Drescher, G., Erhardt, C., Freiling, F., Götzfried, J., Lohmann, D., Maene, P.,... Wildermann, S. (2016). Providing security on demand using invasive computing. it - Information Technology, 58(6), 281-295. https://dx.doi.org/10.1515/itit-2016-0032
Götzfried, J., Müller, T., Drescher, G., Nürnberger, S., & Backes, M. (2016). RamCrypt: Kernel-based Address Space Encryption for User-mode Processes. In 11th ACM Asia Conference on Computer and Communications Security (pp. -). Xi'an, China, CN: New York: ACM.
Weichslgartner, A., Wildermann, S., Götzfried, J., Freiling, F., Glaß, M., & Teich, J. (2016). Design-Time/Run-Time Mapping of Security-Critical Applications in Heterogeneous MPSoCs. In In Proceedings of the 19th International Workshop on Software and Compilers for Embedded Systems (SCOPES) (pp. 153-162). St. Goar, DE.
Würstlein, A., Gernoth, M., Götzfried, J., & Müller, T. (2016). Exzess: Hardware-based RAM encryption against physical memory disclosure. (pp. 60-71). Springer Verlag.

Last updated on 2018-17-05 at 04:31