Xnpro: Low-impact hypervisor-based execution prevention on arm J Nordholz, J Vetter, M Peter, M Junker-Petschick, J Danisevskis Proceedings of the 5th International Workshop on Trustworthy Embedded …, 2015 | 31 | 2015 |
Fault attacks on encrypted general purpose compute platforms R Buhren, S Gueron, J Nordholz, JP Seifert, J Vetter Proceedings of the Seventh ACM on Conference on Data and Application …, 2017 | 23 | 2017 |
The threat of virtualization: Hypervisor-based rootkits on the ARM architecture R Buhren, J Vetter, J Nordholz International Conference on Information and Communications Security, 376-391, 2016 | 15 | 2016 |
Real-time performance of L4Linux A Lackorzynski, J Danisevskis, J Nordholz, M Peter Proceedings of the Thirteenth Real-Time Linux Workshop, Prague, Czech 2022, 2011 | 12 | 2011 |
Design of a symbolically executable embedded hypervisor J Nordholz Proceedings of the Fifteenth European Conference on Computer Systems, 1-16, 2020 | 10 | 2020 |
Paravirtualization-based interface for memory management in virtual machines M Peter, J Nordholz, J Danisevskis US Patent App. 14/732,896, 2015 | 10 | 2015 |
Graphical user interface for virtualized mobile handsets J Danisevskis, M Peter, J Nordholz, M Petschick, J Vetter IEEE S&P MoST, 2015 | 8 | 2015 |
Undermining isolation through covert channels in the Fiasco. OC microkernel M Peter, M Petschick, J Vetter, J Nordholz, J Danisevskis, JP Seifert Information Sciences and Systems 2015, 147-156, 2016 | 7 | 2016 |
Disturbed Playing: Another Kind of Educational Security Games. S Koch, J Schneider, J Nordholz CSET, 2012 | 7 | 2012 |
Uncloaking rootkits on mobile devices with a hypervisor-based detector J Vetter, M Junker-Petschick, J Nordholz, M Peter, J Danisevskis ICISC 2015, 262-277, 2015 | 5 | 2015 |
Design and provability of a statically configurable hypervisor J Nordholz | 4 | 2017 |
Efficient Virtualization on Hardware with Limited Virtualization Support JC Nordholz, JP Seifert | 2 | 2011 |
Minimizing Event-Handling Latencies in Secure Virtual Machines J Danisevskis, M Peter, J Nordholz arXiv preprint arXiv:1806.01147, 2018 | 1 | 2018 |
L4android security framework on the samsung galaxy s2 M Lange, S Liebergeld, A Lackorzynski, A Warg, J Danisevskis, ... ACM SIGMOBILE Mobile Computing and Communications Review 16 (4), 28-29, 2013 | 1 | 2013 |
Software Security Frameworks and Rules for Measuring Instruments under Legal Control D Peters, P Scholz, J Nordholz, F Thiel, JP Seifert | 1 | |
Improving Trusted Tickets with State-Bound Keys J Nordholz, R Aigner, P England International Conference on Trust and Trustworthy Computing, 37-46, 2013 | | 2013 |