Johannes Götzfried
Dr.-Ing. Johannes Götzfried
Publications
2019
- Palutke, R., Neubaum, A., & Götzfried, J. (2019). SEVGuard: Protecting User Mode Applications using Secure Encrypted Virtualization. In SecureComm 2019 Proceedings. Orlando, US: New York City, United States of America: Springer.
2018
- Götzfried, J. (2018). RAM-Schranke: RAM-Verschlüsselung bei AMD und Intel. Hannover: Heise Medien GmbH & Co. KG.
URL: https://heise.de/-4028190 - Götzfried, J. (2018). Trusted Systems in Untrusted Environments: Protecting against Strong Attackers (Dissertation).
URL: https://nbn-resolving.org/urn:nbn:de:bvb:29-opus4-91150 - Lazard, T., Götzfried, J., Müller, T., Santinelli, G., & Lefebvre, V. (2018). TEEshift: Protecting Code Confidentiality by Selectively Shifting Functions into TEEs. In 3rd Workshop on System Software for Trusted Execution. Toronto, ON, Canada: ACM.
URL: https://www1.cs.fau.de/teeshift - Lefebvre, V., Santinelli, G., Müller, T., & Götzfried, J. (2018). Universal Trusted Execution Environments for Securing SDN/NFV Operations. In SBA Research (Eds.), ARES 2018: International Conference on Availability, Reliability and Security. Hamburg, Germany: Hamburg: ACM.
- Maene, P., Götzfried, J., Müller, T., de Clercq, R., Freiling, F., & Verbauwhede, I. (2018). Atlas: Application Confidentiality in Compromised Embedded Systems. IEEE Transactions on Dependable and Secure Computing. https://doi.org/10.1109/TDSC.2018.2858257
- Übler, D., Götzfried, J., & Müller, T. (2018). Secure Remote Computation using Intel SGX. In Sicherheit 2018 (pp. 195-205). Konstanz: Bonn: Köllen Druck+Verlag GmbH.
2017
- Götzfried, J., Eckert, M., Schinzel, S., & Müller, T. (2017). Cache Attacks on Intel SGX. In Proceedings of the Tenth European Workshop on System Security. Belgrade, Serbia.
URL: https://www1.cs.fau.de/sgx-timing - Kalysch, A., Götzfried, J., & Müller, T. (2017). VMAttack: Deobfuscating Virtualization-Based Packed Binaries. In 12th International Conference on Availability, Reliability and Security (pp. 2:1--2:10). Reggio Calabria, Italy: ACM.
URL: https://dl.acm.org/citation.cfm?doid=3098954.3098995 - Maene, P., Götzfried, J., de Clercq, R., Müller, T., Freiling, F., & Verbauwhede, I. (2017). Hardware-Based Trusted Computing Architectures for Isolation and Attestation. IEEE Transactions on Computers, 99. https://doi.org/10.1109/TC.2017.2647955
- Noorman, J., Van Bulck, J., Muhlberg, J.T., Piessens, F., Maene, P., Preneel, B.,... Freiling, F. (2017). Sancus 2.0: A Low-Cost Security Architecture for IoT Devices. ACM Transactions on Privacy and Security, 20(3). https://doi.org/10.1145/3079763
URL: http://doi.acm.org/10.1145/3079763 - de Clercq, R., Götzfried, J., Übler, D., Maene, P., & Verbauwhede, I. (2017). SOFIA: Software and Control Flow Integrity Architecture. Computers & Security, 68, 16-35. https://doi.org/10.1016/j.cose.2017.03.013
2016
- Drescher, G., Erhardt, C., Freiling, F., Götzfried, J., Lohmann, D., Maene, P.,... Wildermann, S. (2016). Providing security on demand using invasive computing. it - Information Technology, 58(6), 281-295. https://doi.org/10.1515/itit-2016-0032
- Götzfried, J., Dörr, N., Palutke, R., & Müller, T. (2016). HyperCrypt: Hypervisor-based Encryption of Kernel and User Space. In 11th International Conference on Availability, Reliability and Security (pp. 79-87). Salzburg, Austria: Institute of Electrical and Electronics Engineers Inc..
URL: https://www1.cs.fau.de/hypercrypt - Götzfried, J., Müller, T., Drescher, G., Nürnberger, S., & Backes, M. (2016). RamCrypt: Kernel-based Address Space Encryption for User-mode Processes. In 11th ACM Asia Conference on Computer and Communications Security. Xi'an, China, CN: New York: ACM.
URL: https://www1.cs.fau.de/ramcrypt - Richter, L., Götzfried, J., & Müller, T. (2016). Isolating Operating System Components with Intel SGX. In 1st Workshop on System Software for Trusted Execution. Trento, Italy.
URL: https://www1.cs.fau.de/sgx-kernel - Weichslgartner, A., Wildermann, S., Götzfried, J., Freiling, F., Glaß, M., & Teich, J. (2016). Design-Time/Run-Time Mapping of Security-Critical Applications in Heterogeneous MPSoCs. In In Proceedings of the 19th International Workshop on Software and Compilers for Embedded Systems (SCOPES) (pp. 153-162). St. Goar, DE.
- Würstlein, A., Gernoth, M., Götzfried, J., & Müller, T. (2016). Exzess: Hardware-based RAM encryption against physical memory disclosure. In Proceedings of the 29th International Conference on Architecture of Computing Systems, ARCS 2016 (pp. 60-71). Springer Verlag.
URL: https://www4.cs.fau.de/~arw/exzess
2015
- Anikeev, M., Freiling, F., Götzfried, J., & Müller, T. (2015). Secure garbage collection: Preventing malicious data harvesting from deallocated Java objects inside the Dalvik VM. In Journal of Information Security and Applications. Amsterdam: Elsevier.
- Götzfried, J., Hampel, J., & Müller, T. (2015). Physically Secure Code and Data Storage in Autonomously Booting Systems (Short Paper). In 10th International Conference on Availability, Reliability and Security. Toulouse, France, FR.
- Götzfried, J., Müller, T., de Clercq, R., Maene, P., Freiling, F., & Verbauwhede, I. (2015). Soteria: Offline Software Protection within Low-cost Embedded Devices. In Proceedings of the 31th Annual Computer Security Applications Conference. Los Angeles, California, USA.
URL: https://www1.cs.fau.de/soteria
2014
- Götzfried, J., & Müller, T. (2014). Analysing Android's Full Disk Encryption Feature. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 5, 84-100.
- Götzfried, J., & Müller, T. (2014). Mutual Authentication and Trust Bootstrapping towards Secure Disk Encryption. ACM Transactions on Information and System Security, 17. https://doi.org/10.1145/2663348
URL: https://www1.cs.fau.de/mark
2013
- Götzfried, J., & Müller, T. (2013). ARMORED: CPU-bound Encryption for Android-driven ARM Devices. In Proceedings of the 8th International Conference on Availability, Reliability and Security (pp. 161-168). Regensburg.
URL: https://www1.cs.fau.de/armored - Götzfried, J., & Müller, T. (2013). Fast Software Encryption with SIMD (How to speed up symmetric block ciphers with the AVX/AVX2 instruction set). In Proceedings of the Third European Workshop on System Security. Prag.
URL: https://www1.cs.fau.de/avx.crypto