Flexible and fine-grained mandatory access control on android for diverse security and privacy policies. S Bugiel, S Heuser, AR Sadeghi USENIX Security Symposium, 131-146, 2013 | 382 | 2013 |
Practical and lightweight domain isolation on android S Bugiel, L Davi, A Dmitrienko, S Heuser, AR Sadeghi, B Shastry Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011 | 276 | 2011 |
ASM: A Programmable Interface for Extending Android Security S Heuser, A Nadkarni, W Enck, AR Sadeghi 23rd USENIX Security Symposium, 2014 | 153 | 2014 |
ConXsense: automated context classification for context-aware access control M Miettinen, S Heuser, W Kronz, AR Sadeghi, N Asokan Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 90 | 2014 |
ConXsense: automated context classification for context-aware access control M Miettinen, S Heuser, W Kronz, AR Sadeghi, N Asokan Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 90 | 2014 |
Mobile platform security N Asokan, L Davi, A Dmitrienko, S Heuser, K Kostiainen, E Reshetova, ... Synthesis Lectures on Information Security, Privacy, & Trust 4 (3), 1-108, 2014 | 38 | 2014 |
ConXsense-Automated Context Classification for Context-Aware Access Control M Miettinen, S Heuser, W Kronz, AR Sadeghi, N Asokan arXiv preprint arXiv:1308.2903, 2013 | 32 | 2013 |
DroidAuditor: forensic analysis of application-layer privilege escalation attacks on android (Short paper) S Heuser, M Negro, PK Pendyala, AR Sadeghi Financial Cryptography and Data Security: 20th International Conference, FC …, 2017 | 31 | 2017 |
Towards Permission-Based Attestation for the Android Platform: (Short Paper) I Bente, G Dreo, B Hellmann, S Heuser, J Vieweg, J von Helden, ... Trust and Trustworthy Computing: 4th International Conference, TRUST 2011 …, 2011 | 26 | 2011 |
Smart and secure cross-device apps for the internet of advanced things C Busold, S Heuser, J Rios, AR Sadeghi, N Asokan Financial Cryptography and Data Security: 19th International Conference, FC …, 2015 | 24 | 2015 |
mytunes: Semantically linked and user-centric fine-grained privacy control on android S Bugiel, S Heuser, AR Sadeghi Technical Report TUD-CS-2012-0226, Center for Advanced Security Research …, 2012 | 20 | 2012 |
Towards a framework for android security modules: Extending se android type enforcement to android middleware S Bugiel, S Heuser, AR Sadeghi Intel Collaborative Research Institute for Secure Computing, 1-35, 2012 | 18 | 2012 |
Phonion: Practical Protection of Metadata in Telephony Networks. S Heuser, B Reaves, PK Pendyala, H Carter, A Dmitrienko, W Enck, ... Proc. Priv. Enhancing Technol. 2017 (1), 170-187, 2017 | 15 | 2017 |
Programmable interface for extending security of application-based operating system WH Enck, AP Nadkarni, AR Sadeghi, S Heuser US Patent 9,916,475, 2018 | 14 | 2018 |
Mobile Platform Security–Synthesis Lectures on Information Security, Privacy, and Trust N Asokan, L Davi, A Dmitrienko, S Heuser, K Kostiainen, E Reshetova, ... Morgan & Claypool Publishers, 2013 | 7 | 2013 |
Market-driven code provisioning to mobile secure hardware A Dmitrienko, S Heuser, TD Nguyen, M da Silva Ramos, A Rein, ... Financial Cryptography and Data Security: 19th International Conference, FC …, 2015 | 6 | 2015 |
Sichere Plattform zur Smartphone-Anbindung auf Basis von TNC KO Detken, G Diederich, S Heuser DACH Security, 2011 | 5 | 2011 |
Conxsense-context sensing for adaptive usable access control M Miettinen, S Heuser, W Kronz, A Sadeghi, N Asokan CoRR, abs/1308.2903, 2013 | 4 | 2013 |
Towards modular and flexible access control on smart mobile devices S Heuser Technische Universität Darmstadt, 2016 | 1 | 2016 |
Auctions for secure multi-party policy negotiation in ambient intelligence J Schütte, S Heuser 2011 IEEE Workshops of International Conference on Advanced Information …, 2011 | 1 | 2011 |