Follow
Jan Nordholz
Title
Cited by
Cited by
Year
Xnpro: Low-impact hypervisor-based execution prevention on arm
J Nordholz, J Vetter, M Peter, M Junker-Petschick, J Danisevskis
Proceedings of the 5th International Workshop on Trustworthy Embedded …, 2015
312015
Fault attacks on encrypted general purpose compute platforms
R Buhren, S Gueron, J Nordholz, JP Seifert, J Vetter
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
232017
The threat of virtualization: Hypervisor-based rootkits on the ARM architecture
R Buhren, J Vetter, J Nordholz
International Conference on Information and Communications Security, 376-391, 2016
152016
Real-time performance of L4Linux
A Lackorzynski, J Danisevskis, J Nordholz, M Peter
Proceedings of the Thirteenth Real-Time Linux Workshop, Prague, Czech 2022, 2011
122011
Design of a symbolically executable embedded hypervisor
J Nordholz
Proceedings of the Fifteenth European Conference on Computer Systems, 1-16, 2020
102020
Paravirtualization-based interface for memory management in virtual machines
M Peter, J Nordholz, J Danisevskis
US Patent App. 14/732,896, 2015
102015
Graphical user interface for virtualized mobile handsets
J Danisevskis, M Peter, J Nordholz, M Petschick, J Vetter
IEEE S&P MoST, 2015
82015
Undermining isolation through covert channels in the Fiasco. OC microkernel
M Peter, M Petschick, J Vetter, J Nordholz, J Danisevskis, JP Seifert
Information Sciences and Systems 2015, 147-156, 2016
72016
Disturbed Playing: Another Kind of Educational Security Games.
S Koch, J Schneider, J Nordholz
CSET, 2012
72012
Uncloaking rootkits on mobile devices with a hypervisor-based detector
J Vetter, M Junker-Petschick, J Nordholz, M Peter, J Danisevskis
ICISC 2015, 262-277, 2015
52015
Design and provability of a statically configurable hypervisor
J Nordholz
42017
Efficient Virtualization on Hardware with Limited Virtualization Support
JC Nordholz, JP Seifert
22011
Minimizing Event-Handling Latencies in Secure Virtual Machines
J Danisevskis, M Peter, J Nordholz
arXiv preprint arXiv:1806.01147, 2018
12018
L4android security framework on the samsung galaxy s2
M Lange, S Liebergeld, A Lackorzynski, A Warg, J Danisevskis, ...
ACM SIGMOBILE Mobile Computing and Communications Review 16 (4), 28-29, 2013
12013
Software Security Frameworks and Rules for Measuring Instruments under Legal Control
D Peters, P Scholz, J Nordholz, F Thiel, JP Seifert
1
Improving Trusted Tickets with State-Bound Keys
J Nordholz, R Aigner, P England
International Conference on Trust and Trustworthy Computing, 37-46, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–16