Dr.-Ing. Tilo Müller


Lehrstuhl für Informatik 1 (IT-Sicherheitsinfrastrukturen)

Mitarbeit in Forschungsprojekten

(Invasives Rechnen):
SFB/TRR 89: Security in Invasive Computing Systems
Prof. Dr.-Ing. Felix Freiling
(01.07.2014 - 30.06.2018)

FORSEC: Bayrischer Forschungsverbund: Sicherheit hochgradig vernetzter IT-Systeme
Prof. Dr.-Ing. Felix Freiling
(01.09.2013 - 31.08.2017)

Publikationen (Download BibTeX)

Go to first page Go to previous page 1 von 3 Go to next page Go to last page

Freiling, F., Groß, T., Latzo, T., Müller, T., & Palutke, R. (2018). Advances in Forensic Data Acquisition. IEEE Design & Test, 35(5), 1-12. https://dx.doi.org/10.1109/MDAT.2018.2862366
Maene, P., Götzfried, J., Müller, T., de Clercq, R., Freiling, F., & Verbauwhede, I. (2018). Atlas: Application Confidentiality in Compromised Embedded Systems. IEEE Transactions on Dependable and Secure Computing. https://dx.doi.org/10.1109/TDSC.2018.2858257
Haupert, V., Maier, D., Schneider, N., Kirsch, J., & Müller, T. (2018). Honey, I Shrunk Your App Security: The State of Android App Hardening. In Giuffrida Cristiano, Bardin Sébastien, Blanc Gregory (Eds.), Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 69-91). Paris, FR: Cham, Switzerland: Springer International Publishing.
Kalysch, A., Bove, D., & Müller, T. (2018). How Android’s UI Security is Undermined by Accessibility. In Proceedings of the 2nd Reversing and Offensive-oriented Trends Symposium (pp. 2:1--2:10). Vienna, AT: New York, NY, USA: ACM International Conference Proceedings Series (ICPS).
Afonso, V., Kalysch, A., Müller, T., Oliveira, D., Grégio, A., & De Geus, P.L. (2018). Lumus: Dynamically Uncovering Evasive Android Applications. In Liqun Chen, Mark Manulis, Steve Schneider (Eds.), Information Security - 21th International Conference (pp. 47-66). Guildford, UK: Guildford, UK: Springer.
Haupert, V., & Müller, T. (2018). On App-based Matrix Code Authentication in Online Banking. In Furnell Steven, Mori Paolo, Camp Olivier (Eds.), Proceedings of the 4th International Conference on Information Systems Security and Privacy (pp. 149-160). Funchal, Madeira, PT: Setúbal: SciTePress.
Übler, D., Götzfried, J., & Müller, T. (2018). Secure Remote Computation using Intel SGX. In Sicherheit 2018 (pp. 195-205). Konstanz: Bonn: Köllen Druck+Verlag GmbH.
Kalysch, A., Milisterfer, O., Protsenko, M., & Müller, T. (2018). Tackling Android's Native Library Malware with Robust, Efficient and Accurate Similarity Measures. In ACM (Eds.), Proceedings of the 13th International Conference on Availability, Reliability and Security (pp. 58:1--58:10). Hamburg, Germany: Hamburg: Association for Computing Machinery.
Lazard, T., Götzfried, J., Müller, T., Santinelli, G., & Lefebvre, V. (2018). TEEshift: Protecting Code Confidentiality by Selectively Shifting Functions into TEEs. In 3rd Workshop on System Software for Trusted Execution. Toronto, ON, Canada: ACM.
Lefebvre, V., Santinelli, G., Müller, T., & Götzfried, J. (2018). Universal Trusted Execution Environments for Securing SDN/NFV Operations. In SBA Research (Eds.), ARES 2018: International Conference on Availability, Reliability and Security. Hamburg, Germany: Hamburg: ACM.

Zuletzt aktualisiert 2016-04-06 um 05:20