Tilo Müller
Orcid: 0009-0007-0430-1467Affiliations:
- University of Erlangen-Nuremberg, Germany
According to our database1,
Tilo Müller
authored at least 73 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Des. Autom. Embed. Syst., March, 2024
Conditional Network Availability: Enhancing Connectivity Guarantees for TEE-Based Services.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
TeeFilter: High-Assurance Network Filtering Engine for High-End IoT and Edge Devices based on TEEs.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
2022
Digit. Investig., 2022
Proceedings of the XII Brazilian Symposium on Computing Systems Engineering, 2022
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
One key to rule them all: Recovering the master key from RAM to break Android's file-based encryption.
Digit. Investig., 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Unearthing the TrustedCore: A Critical Review on Huawei's Trusted Execution Environment.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020
Proceedings of the Sicherheit 2020, Sicherheit, 2020
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
Proceedings of the 10th IFIP International Conference on New Technologies, 2019
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019
Analyzing Android's File-Based Encryption: Information Leakage through Unencrypted Metadata.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
IEEE Trans. Computers, 2018
Proceedings of the Information Security - 21st International Conference, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
Tackling Androids Native Library Malware with Robust, Efficient and Accurate Similarity Measures.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
ACM Trans. Priv. Secur., 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the 10th European Workshop on Systems Security, 2017
Proceedings of the 4th Workshop on Security in Highly Connected IT Systems, 2017
Proceedings of the 4th Workshop on Security in Highly Connected IT Systems, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Proceedings of the Sicherheit 2016: Sicherheit, 2016
Proceedings of the Sicherheit 2016: Sicherheit, 2016
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Architecture of Computing Systems - ARCS 2016, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
IEEE Trans. Dependable Secur. Comput., 2015
EAI Endorsed Trans. Security Safety, 2015
Secure garbage collection: Preventing malicious data harvesting from deallocated Java objects inside the Dalvik VM.
J. Inf. Secur. Appl., 2015
Comput. Secur., 2015
Proceedings of the Trust, Privacy and Security in Digital Business, 2015
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2015 Conferences, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
ACM Trans. Inf. Syst. Secur., 2014
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the Eighth International Conference on IT Security Incident Management & IT Forensics, 2014
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
On the security off full disk encryption = Zur Sicherheit von Festplattenvollverschüsslungen.
PhD thesis, 2013
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
TreVisor - OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks.
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the First SysSec Workshop 2011, 2011
2010
Proceedings of the Third European Workshop on System Security, 2010