Unearthing the TrustedCore: A Critical Review on Huawei’s Trusted Execution Environment M Busch, J Westphal, T Mueller 14th USENIX Workshop on Offensive Technologies (WOOT 20), 2020 | 25 | 2020 |
Memory corruption attacks within Android TEEs: a case study based on OP-TEE F Fleischer, M Busch, P Kuhrt Proceedings of the 15th International Conference on Availability …, 2020 | 14 | 2020 |
Teezz: Fuzzing trusted applications on cots android devices M Busch, A Machiry, C Spensky, G Vigna, C Kruegel, M Payer 2023 IEEE Symposium on Security and Privacy (SP), 1204-1219, 2023 | 10 | 2023 |
One key to rule them all: Recovering the master key from RAM to break Android's file-based encryption T Groß, M Busch, T Müller Forensic Science International: Digital Investigation 36, 301113, 2021 | 10 | 2021 |
Finding 1-day vulnerabilities in trusted applications using selective symbolic execution M Busch, K Dirsch Proceedings of the 27th Annual Network and Distributed System Security …, 2020 | 6 | 2020 |
TRUST. IO: protecting physical interfaces on cyber-physical systems C Spensky, A Machiry, M Busch, K Leach, R Housley, C Kruegel, G Vigna 2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020 | 5 | 2020 |
A cloud-based compilation and hardening platform for android apps M Busch, M Protsenko, T Müller Proceedings of the 12th International Conference on Availability …, 2017 | 5 | 2017 |
Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations M Busch, F Nicolai, F Fleischer, C Rückert, C Safferling, F Freiling Digital Forensics and Cyber Crime: 11th EAI International Conference, ICDF2C …, 2021 | 4 | 2021 |
TEEMo: trusted peripheral monitoring for optical networks and beyond M Busch, R Schlenk, H Heckel Proceedings of the 4th Workshop on System Software for Trusted Execution, 1-6, 2019 | 4 | 2019 |
On the Security of ARM TrustZone-Based Trusted Execution Environments M Busch Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), 2021 | | 2021 |
Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations C Rückert, M Busch, F Nicolai, F Fleischer, C Safferling, F Freiling | | 2020 |
SURGEON: Performant, Flexible, and Accurate Re-Hosting via Transplantation F Hofhammer, M Busch, Q Wang, M Egele, M Payer | | |