Julian Schütte

Orcid: 0000-0002-3007-6538

According to our database1, Julian Schütte authored at least 45 papers between 2007 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Securing Remote Policy Enforcement by a Multi-Enclave based Attestation Architecture.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

2020
cipherPath: Efficient Traversals over Homomorphically Encrypted Paths.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Towards Tracking Data Flows in Cloud Architectures.
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020

2019
liOS: Lifting iOS Apps for Fun and Profit.
Proceedings of the 2019 International Workshop on Secure Internet of Things, 2019

ZKlaims: Privacy-preserving Attribute-based Credentials using Non-interactive Zero-knowledge Techniques.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Annotary: A Concolic Execution System for Developing Secure Smart Contracts.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Der Trusted Connector im Industrial Data Space.
CoRR, 2018

WebEye - Automated Collection of Malicious HTTP Traffic.
CoRR, 2018

LUCON: Data Flow Control for Message-Based IoT Systems.
Proceedings of the 17th IEEE International Conference On Trust, 2018

reclaimID: Secure, Self-Sovereign Identities Using Name Systems and Attribute-Based Encryption.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Practical Decentralized Attribute-Based Delegation Using Secure Name Systems.
Proceedings of the 17th IEEE International Conference On Trust, 2018

BDABE - Blockchain-based Distributed Attribute based Encryption.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

An Ecosystem and IoT Device Architecture for Building Trust in the Industrial Data Space.
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018

Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

A Case for IoT Security Assurance.
Proceedings of the Internet of Everything - Technology, Communications and Computing, 2018

2017
Ordol: Obfuscation-Resilient Detection of Libraries in Android Applications.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Practical Application-Level Dynamic Taint Analysis of Android Apps.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A taxonomy-based approach for security in software-defined networking.
Proceedings of the IEEE International Conference on Communications, 2017

Ariadnima - Android Component Flow Reconstruction and Visualization.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Generating Threat Profiles for Cloud Service Certification Systems.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

A Data Usage Control System Using Dynamic Taint Tracking.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

Test-Based Cloud Service Certification of Opportunistic Providers.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Preventing Library Spoofing on Android.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Apparecium: Revealing Data Flows in Android Applications.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

ConDroid: Targeted Dynamic Analysis of Android Applications.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
NFC? Aber sicher.
Datenschutz und Datensicherheit, 2014

AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
Security policies in pervasive systems: design of a modular security policy framework for semantic, multi-domain, service-oriented pervasive systems.
PhD thesis, 2013

An antivirus API for Android malware recognition.
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013

Native code execution control for attack mitigation on android.
Proceedings of the SPSM'13, 2013

A Configurable and Extensible Security Service Architecture for Smartphones.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Security Policies in Dynamic Service Compositions.
Proceedings of the SECRYPT 2012, 2012

Architecting a security strategy measurement and management system.
Proceedings of the Model-Driven Security Workshop, 2012

Model-Based Security Event Management.
Proceedings of the Computer Network Security, 2012

Goal-Based Policies for Self-Protecting Systems.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

2011
Apollon: Towards a Semantically Extensible Policy Framework.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
Interdomain Policy Conflicts.
IEEE Veh. Technol. Mag., 2010

Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

QoS-Aware Self-adaptation of Communication Protocols in a Pervasive Service Middleware.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

2009
Towards security in decentralized workflows.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

A Genetic Algorithms-Based Approach for Optimized Self-protection in a Pervasive Service Middleware.
Proceedings of the Service-Oriented Computing, 7th International Joint Conference, 2009

2008
Securing Decentralized Workflows in Ambient Environments.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
On Path-Centric Navigation and Search Techniques for Personal Knowledge Stored in Topic Maps.
Proceedings of the Scaling Topic Maps, 2007

Security made easy: Achieving user-friendly communication protection in ad-hoc situations.
Proceedings of the First International Conference on Emerging Security Information, 2007


  Loading...