Prof. Dr.-Ing. Ahmad-Reza Sadeghi

  • Retired or former Chair - Research Group System Security
  • Member - Horst Görtz In­sti­tu­te for IT-Se­cu­ri­ty Horst Görtz Institute for IT-Security
Sadeghi, Ahmad-Reza

Address

Ruhr-University Bochum
Universitätsstraße 150
D - 44801 Bochum
Germany

Location:
Dept. of Electr. Eng. and Information Sciences
Universitätsstr. 150

room
ID 2/141
phone:
(+49)(0)234 / 32 - 24086
Fax:
(+49)(0)234 / 32 - 14956
Email:
ahmad.sadeghi@trust.rub.de
Website:
http://www.trust.rub.de/

Vita

Prof. Dr.-Ing. Ahmad-Reza Sadeghi is the head of the System Security Lab at the Center for Advance Security Research (Technical University Darmstadt) and the Scientific Director of Fraunhofer Institute for Secure Information Systems (SIT) both in Darmstadt, Germany. He is also guest professor at Ruhr-University Bochum (RUB) in Germany. He received his PhD in Computer Science with the focus on privacy protecting cryptographic systems from the University of Saarland in Saarbrücken Germany. Prior to academia, he worked in Research and Development of Telecommunications enterprises, amongst others Ericson Telecommunications. Currently, Prof. Sadeghi leads several international research and development projects on design and implementation of trustworthy computing platforms and trusted computing, security hardware, particularly Physically Unclonable Functions (PUF), Cryptographic Privacy-protecting Systems, and cryptographic compilers (in particular for secure computation). He has been serving as a program chair or committee member for a variety of conferences and workshops on information security, trusted computing and applied cryptography. He is on Editorial Board of the ACM Transactions on Information and System Security. Prof. Sadeghi has been awarded with the renowned German award “Karl Heinz Beckurts” for his research on Trusted Computing technology and its transfer to industrial practice. The award honors excellent scientific achievements that gave visible industrial innovations in Germany. Further, his group received the second prize of German IT Security Competition Award 2010. His main research interests are security architectures, cryptographic protocols and security hardware.

Academic Activities

  • The Second Workshop on Advances in Trusted Computing (WATC'06 Fall)
  • INDOCRYPT 2006
  • First ACM Workshop on Scalable Trusted Computing (STC) 2006
  • First Benelux Workshop on Information and System Security 2006
  • International Workshop on Information Security Applications (WISA) 2006
  • International Workshop on Digital Watermarking (IWDW 2006)
  • Financial Cryptography and Data Security (FC) 2006
  • Financial Cryptography and Data Security (FC) 2005
  • SKOLIS Conference on Information Security and Cryptography (CISC) 2005
  • ACM Workshop for Digital Rights Management (ACMDRM) 2005
  • New Security Paradigm Workshop (NSPW) 2005
  • Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2005
  • Information Security & Hiding (ISH) 2005, at ?The International Conference on Computational Science & Its Applications (ICCSA 2005)?
  • ACM Workshop for Digital Rights Management (ACMDRM) 2004
  • New Security Paradigm Workshop (NSPW) 2004
  • 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS) 2004
  • ACM Workshop for Digital Rights Management (ACMDRM) 2003

Courses

Publications

2014
Mobile Trusted Computing

N. Asokan, Jan-Erik Ekberg, Kari Kostiainen, Anand Rajan, Carlos Rozas, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann - To appear in Proceedings of the IEEE. 2014.

TrustLite: A Security Architecture for Tiny Embedded Devices

Patrick Koeberl, Steffen Schulz, Ahmad-Reza Sadeghi, Vijay Varadharajan - European Conference on Computer Systems (EuroSys), ACM, April 2014.

A Trusted Versioning File System for Passive Mobile Storage Devices

Luigi Catuogno, Hans Löhr, Marcel Winandy, Ahmad-Reza Sadeghi - Journal of Network and Computer Applications, Vol. 38, February 2014, pp. 65-75. http://dx.doi.org/10.1016/j.jnca.2013.05.006

The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs

Steffen Schulz, Vijay Varadharajan, Ahmad-Reza Sadeghi - IEEE Transactions on Information Forensics and Security, Vol. 9, No. 2, Feb. 2014

2013
Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions

Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann - Secure Smart Embedded Devices, Platforms and Applications, ISBN 978-1461479147, Springer, 2014

A Security Framework for the Analysis and Design of Software Attestation

Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann - Conference on Computer and Communications Security (CCS), ACM, 2013

PSiOS: Bring Your Own Privacy & Security to iOS Devices

Tim Werthmann, Ralf Hund, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz - ACM Symposium on Information, Computer and Communications Security (ASIACCS), Hangzhou, China, May 2013 - **Distinguished Paper Award**

2012
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs

Ahmad-Reza Sadeghi, Steffen Schulz, Vijay Varadharajan - Eu­ropean Sym­po­si­um on Re­se­arch in Com­pu­ter Se­cu­ri­ty (ESO­RICS), Springer, 2009

Tetherway: A Framework for Tethering Camouflage

Steffen Schulz, Ahmad-Reza Sadeghi, Maria Zhdanova, Hossen A. Mustafa, Wenyuan Xu, Vijay Varadharajan - Conference on Wireless Network Security (WiSec), pp 149-160, ACM, Apr 16-18, 2012

Softer Smartcards: Usable Cryptographic Tokens with Secure Execution.

Franz Ferdinand Brasser, Sven Bugiel, Atanas Filyanov, Ahmad-Reza Sadeghi, Steffen Schulz - 16th International Conference on Financial Cryptography and Data Security (FC'12), LNCS 7397, pp. 329-343, Springer, 2012.

MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones

Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi - Annual Network & Distributed System Security Symposium (NDSS), San Diego, February 2012

Towards Taming Privilege-Escalation Attacks on Android

Alexandra Dmitrienko, Sven Bugiel, Lucas Davi, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry - To appear in 19th Annual Network & Distributed System Security Symposium (NDSS)

Flexible Patient-Controlled Security for Electronic Health Records

Thomas Hupperich, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy - ACM SIGHIT International Symposium on Health Informatics (IHI), Miami, January 2012

2011
Poster: Practical embedded remote attestation using Physically Unclonable Functions

Ünal Koçabas, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann - Conference on Computer and Communications Security (CCS), ACM, 2011

POSTER: Control-Flow Integrity for Smartphones.

Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Fischer - 18th ACM Conference on Computer and Communications Security (CCS'11)

POSTER: The Quest for Security against Privilege Escalation Attacks on Android

Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry - 18th ACM Conference on Computer and Communications Security (CCS'11)

Uni-directional Trusted Path: Transaction Confirmation on Just One Device

Atanas Filyanov, Jonathan M. McCune, Ahmad-Reza Sadeghi, Marcel Winandy - IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN 2011), pp. 1-12. IEEE Computer Society, 2011.

Lightweight Remote Attestation Using Physical Functions

Ahmad-Reza Sadeghi, Christian Wachsmann, Steffen Schulz - Conference on Wireless Network Security (WiSec), ACM, 2011

Lightweight Remote Attestation using Physical Functions (Extended Version)

Ünal Koçabas, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann - TU Darmstadt, TR-2011-06-01

Trusted embedded System Operating System (TeSOS) - Study and Design

Ahmad-Reza Sadeghi, Steffen Schulz, Alexandra Dmitrienko, Christian Stüble, Dennis Gessner, Markus Ullmann - Study and evaluation of security in sensor systems, System Security Lab, Sirrix AG, Federal Office for Information Security

Securing the Access to Electronic Health Records on Mobile Phones

Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy - Biomedical Engineering Systems and Technologies 2011 - Revised Selected Papers, Springer-Verlag, 2011.

MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data of Patients

Ammar Alkassar, Biljana Cubaleska, Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy - Med-e-Tel - Global Telemedicine and eHealth Updates: Knowledge Resources, Vol 4., pp. 385-389, ISfTeH, Luxembourg, 2011.

XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.

Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi - Technical Report: TUD-CS-2011-0127

ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks

Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy - 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), ACM, 2011.

Twin Clouds: An Architecture for Secure Cloud Computing (Extended Abstract)

Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider - Workshop on Cryptography and Security in Clouds (CSC'11)

Secure Set Intersection with Untrusted Hardware Tokens

Marc Fischlin, Benny Pinkas, Ahmad-Reza Sadeghi, Thomas Schneider, Ivan Visconti - 11th Cryptographers' Track at the RSA Conference (CT-RSA'11)

A Formalization of the Security Features of Physical Functions

Ahmad-Reza Sadeghi, Frederik Armknecht, Christian Wachsmann, Roel Maed, Francois-Xavier Standaert - Accepted for 32nd IEEE Symposium on Security and Privacy (IEEE S&P 2011), IEEE Computer Society, 2011.

A Security Architecture for Accessing Health Records on Mobile Phones.

Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy - Proceedings of the 4th International Conference on Health Informatics (HEALTHINF 2011), pp. 87-96, SciTePress, 2011.

Privacy-Preserving ECG Classification with Branching Programs and Neural Networks

Barni, Mauro, Failla, Pierluigi, Lazzeretti, Riccardo, Ahmad-Reza Sadeghi, Thomas Schneider - Accepted for IEEE Transactions on Information Forensics and Security (TIFS).

2010
TruWalletM: Secure Web Authentication on Mobile Platforms

Sven Bugiel, Alexandra Dmitrienko, Kari Kostiainen, Ahmad-Reza Sadeghi, Marcel Winandy - Trusted Systems, Second International Conference, INTRUST 2010, LNCS 6802/2011, Springer, 2011.

Breaking e-Banking CAPTCHAs

Ahmad-Reza Sadeghi, Shujun Li, Syed Amier Haider Shah, Muhammad Asad Usman Khan, Syed Ali Khayam, Roland Schmitz - Accepted to 26th Annual Computer Security Applications Conference (ACSAC 2010), to be held in Austin, Texas, USA, December 6-10, 2010

Securing the E-Health Cloud

Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy - Proceedings of the 1st ACM International Health Informatics Symposium (IHI 2010), ACM, 2010.

Towards Hardware-Intrinsic Security

Ahmad-Reza Sadeghi, David Naccache

Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices

Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Christian Wachsmann, Johannes Winter - Accepted for the 13th Information Security Conference (ISC 2010), Boca Raton, Florida, USA, October 25-28, 2010.

Privilege Escalation Attacks on Android.

Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy - Information Security, 13th International Conference, ISC 2010, LNCS 6531/2011, pp. 346-360, Springer 2011.

Video Streaming Forensic - Content Identification with Traffic Snooping

Ahmad-Reza Sadeghi, Biswanath Mukherjee, Dipak Ghosal, Yali Liu - Accepted to 13th Information Security Conference (ISC 2010), to be held in Deerfield Beach, Florida, USA, October 25-28, 2010

Impossibility Results for RFID Privacy Notions

Frederik Armknecht, Ahmad-Reza Sadeghi, Alessandra Scafuro, Ivan Visconti, Christian Wachsmann - In Transactions on Computational Science IX, volume 6480 of LNCS, pages 39-63. Springer-Verlag, 2010.

Return-Oriented Programming without Returns

Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy - 17th ACM Conference on Computer and Communications Security (CCS 2010)

TASTY: Tool for Automating Secure Two-partY computations

Wilko Henecka, Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg - 17th ACM Conference on Computer and Communications Security (CCS'10). ACM, October 4-8, Chicago, USA.

Enhancing RFID Security and Privacy by Physically Unclonable Functions

Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann - In Towards Hardware-Intrinsic Security: Foundations and Practice, Information Security and Cryptography, Springer Verlag, September 2010.

A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols

José Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider - 15th European Symposium on Research in Computer Security (ESORICS'10), September 20-22, Athens, Greece.

Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten

Ahmad-Reza Sadeghi, Thomas Schneider - Workshop Innovative und sichere Informationstechnologie für das Gesundheitswesen von morgen (PerspeGKtive'10), September 8, Mannheim, Germany.

Efficient Secure Two-Party Computation with Untrusted Hardware Tokens

Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider - In Towards Hardware-Intrinsic Security: Foundations and Practice, Information Security and Cryptography, Springer-Verlag, September 2010.

Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs

Kimmo Jär­vi­nen, Vla­di­mir Ko­les­ni­kov, Ahmad-Reza Sadeghi, Thomas Schneider - 12th International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10), August 17-20, Santa Barbara, USA.

YAZKC: Yet Another Zero-Knowledge Compiler

Endre Bangerter, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider - 19th USENIX Security Symposium (USENIX'10) Poster Session, August 11-13, Washington DC, USA.

Trusted Computing

Ahmad-Reza Sadeghi, Christian Wachsmann - In Handbook of Financial Cryptography and Security, CRC Press, August 2010.

Return-Oriented Programming without Returns on ARM

Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy - Tech­ni­cal Re­port HGI-TR-2010-002

Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic

Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Stefan Katzenbeisser - Information Hiding Conference (IH), Springer, 2010

On RFID Privacy with Mutual Authentication and Tag Corruption

Frederik Armknecht, Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann - In Proceedings of the 8th International Conference on Applied Cryptography and Network Security (ACNS 2010), Beijing, China, June 22-25, 2010, volume 6123 of LNCS, pages 493-510. Springer Verlag, June 2010.

Anonymous Authentication with TLS and DAA.

Ahmad-Reza Sadeghi, Hans Löhr, Emanuele Cesena, Gianluca Ramunno, Davide Vernizzi - Accepted for TRUST 2010.

Key Attestation from Trusted Execution Environments.

Ahmad-Reza Sadeghi, Alexandra Dmitrienko, Kari Kostiainen, Jan-Erik Ekberg, N. Asokan. - 3rd International Conference on Trust and Trustworthy Computing (TRUST'10)

Token-Based Cloud Computing -- Secure Outsourcing of Data and Arbitrary Computations with Lower Latency

Ahmad-Reza Sadeghi, Thomas Schneider, Marcel Winandy - 3rd International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud, June 22, Berlin, Germany.

Anonymous Authentication for RFID Systems

Frederik Armknecht, Liqun Chen, Ahmad-Reza Sadeghi, Christian Wachsmann - In 6th Workshop on RFID Security (RFIDSec 2010), Istanbul, Turkey, June 7-9, 2010, volume 6370 of LNCS, pages 158-175. Springer Verlag, 2010.

Brea­king a Vir­tu­al Pass­word Sys­tem Based on Ran­do­mi­zed Li­ne­ar Ge­ne­ra­ti­on Func­tions

Ahmad-Reza Sadeghi, Shu­jun Li, Syed Ali Kha­yam, and Ro­land Schmitz - Ac­cep­ted for IEEE ICC 2010 - Com­mu­ni­ca­ti­on and In­for­ma­ti­on Sys­tem Se­cu­ri­ty Sym­po­si­um ('ICC'10 CISS')

Trusted Virtual Domains: Color Your Network

Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy - Datenschutz und Datensicherheit (DuD) 5/2010, p. 289-298.

PUF-Enhanced RFID Security and Privacy

Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann - In 2nd Workshop on Secure Component and System Identification (SECSI 2010), Cologne, Germany, April 26-27, 2010.

From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design

Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider - Cryptology ePrint Archive: Report 2010/079

ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks

Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy - Technical Report HGI-TR-2010-001

Pat­terns for Se­cu­re Boot and Se­cu­re Sto­r­a­ge in Com­pu­ter Sys­tems

Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy - 4th In­ter­na­tio­nal Work­shop on Se­cu­re sys­tems me­tho­do­lo­gies using pat­terns (SPat­tern 2010), In Proceedings of ARES 2010: International Conference on Availability, Reliability and Security, pp.569-573, IEEE Computer Society, 2010

Em­bed­ded SFE: Off­loa­ding Ser­ver and Net­work using Hard­ware To­kens

Kimmo Jär­vi­nen, Vla­di­mir Ko­les­ni­kov, Ahmad-Reza Sadeghi, Thomas Schneider - 14th In­ter­na­tio­nal Con­fe­rence on Fi­nan­ci­al Cryp­to­gra­phy and Data Se­cu­ri­ty (FC'10), Ja­nu­a­ry 25-28, Te­ne­ri­fe, Cana­ry Is­lands, Spain.

Extending IPsec for Efficient Remote Attestation

Ahmad-Reza Sadeghi, Steffen Schulz, - Workshop on Real-Life Cryptographic Protocols (RLCPS) at Fi­nan­ci­al Cryp­to­gra­phy and Data Se­cu­ri­ty (FC), Springer, 2010

Enhancing RFID Security and Privacy by Physically Unclonable Functions (Extended Abstract)

Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann - In Foundations for Forgery-Resilient Cryptographic Hardware, volume 09282 of Dagstuhl Seminar Proceedings, pages 10-11. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2010.

Ma­ch­ia­vel­li Con­fronts 21st Cen­tu­ry Di­gi­tal Tech­no­lo­gy: De­mocra­cy in a Net­work So­cie­ty

Ahmad-Reza Sadeghi, Bart Preneel, An­dre­as Pfitz­mann, Tal Moran, Ur­su­la Mai­er-Ra­bler, Mi­roslaw Ku­ty­low­ski, Marek Klonow­ski, Seda F. Guer­ses, Ge­or­ge Da­ne­zis, Ni­ki­ta Bo­ri­sov, Wal­ter S. Baer, et al.

Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers

Ahmad-Reza Sadeghi, Christian Stüble, Serdar Cabuk, Chris I. Dalton, Konrad Eriksson, Dirk Kuhlmann, Hari Govind V. Ramasamy, Gianluca Ramunnok, Matthias Schunter - Journal of Computer Security, IOS Press, Vlo. 18, Number 1, pp. 89-121, 2010

2009
Trusted virtual domains - design, implementation and lessons learned.

Ahmad-Reza Sadeghi, Gianluca Ramunno, Dirk Kuhlmann, Konrad Eriksson, Luigi Catuogno, Alexandra Dmitrienko, Jing Zhan, Steffen Schulz, Marcel Winandy, Matthias Schunter - International Conference on Trusted Systems (INTRUST) 2009.

Anonymizer-Enabled Security and Privacy for RFID

Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann - In Proceedings of the 8th International Conference on Cryptology and Network Security (CANS 2009), Kanazawa, Japan, December 12-14, 2009, volume 5888 of LNCS, pages 134-153. Springer Verlag, December 2009.

Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.

Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider - 8th International Conference on Cryptology And Network Security (CANS’09), December 12-14, Kanazawa, Ishikawa, Japan.

Efficient Privacy-Preserving Classification of ECG Signals

Mauro Barni, Pierluigi Failla, Vlad Kolesnikov, Riccardo Lazzeretti, Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider - 1st IEEE International Workshop on Information Forensics and Security (WIFS'09), December 6-9, London, UK.

Efficient Privacy-Preserving Face Recognition.

Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg, - 12th International Conference on Information Security and Cryptology (ICISC'09), December 2-4, Seoul, Korea.

Dynamic Integrity Measurement and Attestation: Towards Defense Against Return-Oriented Programming Attacks.

Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy - STC'09: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, p. 49-54, ACM, 2009.

TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.

Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy - STC'09: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, p. 19-28, ACM, 2009.

Software distribution as a malware infection vector

Felix Gröbert, Ahmad-Reza Sadeghi, Marcel Winandy - International Conference for Internet Technology and Secured Transactions (ICITST 2009)

Transparent Mobile Storage Protection in Trusted Virtual Domains

Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy - 23rd Large Installation System Administration Conference (LISA '09), p. 159--172, USENIX Association, 2009.

Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima

Vladimi­r Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider - ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09), October 12-13, Berlin, Germany.

On the Design and Implementation of Efficient Zero-Knowledge Proofs of Knowledge

Endre Bangerter, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, Joe-Kai Tsay - ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09), October 12-13, Berlin, Germany.

Secure Evaluation of Private Linear Branching Programs with Medical Applications

Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider - 14th European Symposium on Research in Computer Security (ESORICS'09), September 21-25, Saint Malo, France.

Hide and Seek in Time - Robust Covert Timing Channels

Ahmad-Reza Sadeghi, Frederik Armknecht, Steffen Schulz, Yali Liu, Dipak Ghosal, Stefan Katzenbeisser - 14th European Symposium on Research in Computer Security (ESORICS 2009), September 21-25, Saint-Malo, France.

Automatic Generation of Sigma-Protocols

Endre Bangerter, Thomas Briner, Wilko Henecka, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider - 6th European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09), September 10-11, Pisa, Italy.

Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification

, Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider - 1st International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09), September 10, Lausanne, Switzerland.

How to Combine Homomorphic Encryption and Garbled Circuits - improved Circuits and Computing the Minimum Distance Efficiently.

Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider - 1st International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09), September 10, Lausanne, Switzerland.

A Pattern for Secure Graphical User Interface Systems.

Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy - 3rd International Workshop on Secure systems methodologies using patterns (SPattern 2009), in DEXA '09: Proceedings of the 20th International Workshop on Database and Expert Systems Application, p.186-190, IEEE Computer Society, 2009.

Location Privacy in RFID Applications

Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann - Privacy in Location-Based Applications: Research Issues and Emerging Trends, volume 5599 of LNCS, pages 127-150. Springer Verlag, August 2009.

Efficient RFID Security and Privacy with Anonymizers

Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann - In 5th Workshop on RFID Security (RFIDSec 2009), Leuven, Belgium, June 30 - July 2, 2009.

Practical Secure Evaluation of Semi-Private Functions

Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider - 7th International Conference on Applied Cryptography and Network Security (ACNS'09), June 2-5, Paris, France.

Einsatz von Sicherheitskernen und Trusted Computing.

Ahmad-Reza Sadeghi, Marcel Winandy, - D-A-CH Security 2009, Bochum, Germany.

Automatic Generation of Sound Zero-Knowledge Protocols

Endre Bangerter, Jan Camenisch, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider - 28th Advances in Cryptology - EUROCRYPT 2009 (Poster Session), April 26-30, Cologne, Germany.

Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.

Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy - TRUST 2009: Proceedings of the 2nd International Conference on Trusted Computing, LNCS 5471, p. 45-62 Springer, 2009.

Secure VPNs for Trusted Computing Environments.

Ahmad-Reza Sadeghi, Steffen Schulz, - Trust 2009, Second International Conference on Trusted Computing, Oxford, UK, April 6-8, 2009

Bringing Zero-Knowledge Proofs of Knowledge to Practice

Endre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, Joe-Kai Tsay - 17th International Workshop on Security Protocols (SPW'09), April 1-3, Cambridge, England.

Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.

Hans Löhr, Ahmad-Reza Sadeghi, Claire Vishik, Marcel Winandy - Proceedings of 5th Information Security Practice and Experience Conference (ISPEC'09), LNCS 5451, p. 396-407, Springer, 2009.

A Practical Property-based Bootstrap Architecture.

Ahmad-Reza Sadeghi, Christian Stüble, Jing Zhan, René Korthaus - Accepted for ACMSTC'09

Future of Assurance: Ensuring that a System is Trustworthy.

Ahmad-Reza Sadeghi, Claire Vishik, Ingrid Verbauwhede - Accepted for ISSE'09.

Memory Leakage-Resilient Encryption based on Physically Unclonable Functions.

Ahmad-Reza Sadeghi, Frederik Armknecht, Roel Maes, Berk Sunar, Pim Tuyls - Accepted for ASIACRYPT'09

On the Security of PAS (Predicate-based Authentication Service).

Ahmad-Reza Sadeghi, ­Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Roland Schmitz, Huaxiong Wang - Accept­ed for Annual Computer Security Applications Conference (ACSAC’09), 2009.

Physically Unclonable Pseudorandom Functions

Ahmad-Reza Sadeghi, Frederik Armknecht, Pim Tuyls, Roel Maes, Berk Sunar - Accepted for Poster session of Advances in Cryptology - EUROCRYPT 2009.

Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage

Ahmad-Reza Sadeghi, Klaus Kursawe, Dries Schellekens, Boris Skoric, Pim Tuyls - Accepted for presentation at 2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), 2009.

Using Compilers to Enhance Cryptographic Product Development

Ahmad-Reza Sadeghi, E. Bangerter, M. Barbosa, D. Bernstein, I. Damgård, D. Page, J. I. Pagter, S. Sovio - Accepted for Information Security Solutions Europe (ISSE) 2009

2008
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems

Andy Rupp, G. Leander, E. Bangerter, A. Dent, Ahmad-Reza Sadeghi - In 14th International Conference on the Theory and Application of Cryptology and Information Security —- ASIACRYPT 2008 (to appear). Melbourne, Australia, Dezember 7-11, 2008.

Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.

Ahmad-Reza Sadeghi, Thomas Schneider, - 11th International Conference on Information Security and Cryptology (ICISC'08), December 3-5, Seoul, South Korea.

Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains

Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Rani Husseiki, Yacine Gasmi, Patrick Stewin, Martin Unger - STC '08: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, p. 71-80, ACM, 2008.

User Privacy in Transport Systems Based on RFID E-Tickets

Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann - In Proceedings of the 1st International Workshop on Privacy in Location-Based Applications (PiLBA), Malaga, Spain, October 9, 2008.

Property-Based Attestation without a Trusted Third Party

Ahmad-Reza Sadeghi, Hans Löhr, Liqun Chen, Mark Manulis, - Information Security Conference (ISC'08), 2008.

Property-Based TPM Virtualization

Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy - Information Security, 11th International Conference, ISC 2008, LNCS 5222, p. 1-16, Springer, 2008.

Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly

Ahmad-Reza Sadeghi, Frederik Armknecht, Hans Löhr, Mark Manulis, Alberto Escalante - Accepted for The 4th Information Security Practice and Experience Conference (ISPEC 2008), 21-23 April 2008, Sydney, Australia.

Securing Peer-to-Peer Distributions for Mobile Devices

Ahmad-Reza Sadeghi, Christian Stüble, André Osterhues, Marko Wolf, N. Asokan - Accepted for The 4th Information Security Practice and Experience Conference (ISPEC 2008), 21-23 April 2008, Sidney, Australia.

Property-Based TPM Virtualization

Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy - Technical Report HGI-TR-2008-001, Horst Görtz Institute for IT-Security, Ruhr-University Bochum, 2008.

Resettable and Non-Transferable Chip Authentication for E-Passports

Ahmad-Reza Sadeghi, Carlo Blundo, Giuseppe Persiano, Ivan Visconti - To be presented at RFIDSec 2008.

A Demonstrative Ad-hoc Attestation System

Ahmad-Reza Sadeghi, Endre Bangerter, Maksim Djackov - Information Security Conference 2008 (ISC'08), 2008.

A Forensic Framework for Tracing Phishers

Ahmad-Reza Sadeghi, Sebastian Gajek, Felix Gröbert, , Dominik Birk - International Federation for Information Processing, to appear in LNCS 6102.

An Efficient Implementation of Trusted Channels Based on OpenSSL

Ahmad-Reza Sadeghi, Frederik Armknecht, Yacine Gasmi, Gianluca Ramunno, Davide Vernizzi, Patrick Stewin, Martin Unger - Accepted for ACMSTC 2008.

Efficient Helper Data Key Extractor on FPGAs

Ahmad-Reza Sadeghi, Jamshid Shokrollahi, Christoph Bösch, Jorge Guajardo, Pim Tuyls - Accepted for CHES 2008.

Identification Protocols Revisited - Episode I: E-Passports

Ahmad-Reza Sadeghi, Carlo Blundo, Giuseppe Persiano, Ivan Visconti - Presented at e-crypt workshop on Secure Component and System Identification (SECSI), 2008.

Improved Security Notions and Protocols for Non-Transferable Identification

Ahmad-Reza Sadeghi, Carlo Blundo, Giuseppe Persiano, Ivan Visconti - To appear in ESORICS 2008.

Provably Secure Browser-Based User-Aware Mutual Authentication over TLS

Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis, - Accepted for ASIACCS'08.

Sufficient Conditions for Intractability in the Generic Model: Providing Lower Bounds for Generalized DL and DH Problems

Ahmad-Reza Sadeghi, Andy Rupp, Endre Bangerter, Alexander W. Dent, Gregor Leander - Accepted for ASIACRYPT 2008.

Trusted Computing—State of the Art and Challenges

Ahmad-Reza Sadeghi, - Invited Talk at SOFSEM 2008, LNCS 4910, 2008

Universally Composable Security Analysis of TLS

Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis, Olivier Pereira - Accepted for the Second Confer­ence on Provable Security (ProvSec), 2008.

2007
Reconfigurable Trusted Computing in Hardware

Ahmad-Reza Sadeghi, Dries Schellekens, Marko Wolf, Thomas Eisenbarth, Tim Güneysu, Chris­tof Paar - In P. Ning, V. Atluri, S. Xu, M. Yung, editors, ACM STC 2007, pages 15-20, Alexandria, VA, USA, November 2, 2007. ACM, New York, NY, USA.

Enhancing Grid Security Using Trusted Virtualization

Ahmad-Reza Sadeghi, Christian Stüble, Hans Löhr, Hari Govind V. Ramasamy, Stefan Schulz, Matthias Schunter - In 4th International Conference on Autonomic and Trusted Computing (ATC 2007), Hong Kong, China, July 11-13, 2007, Proceedings, volume 4610 of Lecture Notes in Computer Science (LNCS), pages 372-384. Springer Verlag, 2007.

Trusted User-Aware Web Authentication

Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Marcel Winandy, - Presented at the Workshop on Trustworthy User Interfaces for Passwords and Personal Information (TIPPI'07), Stanford, USA, June 22, 2007.

Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing

Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy - In Proceedings of the The Second International Conference on Availability, Reliability and Security (ARES 2007), Vienna, Austria, April 10-13, 2007, pages 120-127. IEEE Computer Society, 2007.

A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting

Ahmad-Reza Sadeghi, Hans Löhr, Liqun Chen, Mark Manulis, Alberto Escalante - 11th International Conference on Financial Cryptography and Data Security (FC 2007), Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, volume 4886 of Lecture Notes on Computer Sience (LNCS), pages 29-44. Springer Verlag, 2007.

Combining Tardos Fingerprinting Codes and Fingercasting

Ahmad-Reza Sadeghi, Stefan Katzenbeisser, Boris Skoric, Mehmet Celik - In 9th International Workshop on Information Hiding (IH 2007), Saint Malo, France, June 11-13, 2007, Revised Selected Papers, volume 4567 of Lecture Notes on Computer Sience (LNCS), pages 294-310. Springer Verlag, 2007.

Fingercasting—Joint Fingerprinting and Decryption of Broadcast Messages

Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber, - In Transactions on Data Hiding and Multimedia Security II, volume 4499 of Lecture Notes on Computer Sience (LNCS), pages 1-34. Springer Verlag, 2007.

Phishing Phishers - Observing and Tracing Organized Cybercrime

Ahmad-Reza Sadeghi, Sebastian Gajek, Felix Gröbert, , Dominik Birk - In Proceedings of the Second International Conference on Internet Monitoring and Protection (ICIMP 2007), Silicon Valley, California, July 1-5, 2007, page 3. IEEE Computer Society, 2007.

Beyond Secure Channels

Ahmad-Reza Sadeghi, Yacine Gasmi, Patrick Stewin, Martin Unger, N. Asokan - In Proceedings of the ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), Alexandria, Virginia, USA, November 2, 2007, pages 30-40. ACM Press, 2007.

Browser Models for Usable Authentication Protocols

Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis, - Presented at the Workshop on Web 2.0 Security and Privacy (W2SP 2007) held in conjunction with the IEEE Symposium on Security and Privacy, Oakland, California, May 24, 2007.

Browser Models for Usable Authentication Protocols.

Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis, - In Proceedings of the IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07), Oakland (USA), 2007.

Browser-based Authentication Protocols for Naive Users.

Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis, - accepted for presentation at the Western European Workshop on Research in Cryptology (WEWoRC 2007), Bochum (Germany), 2007.

Compartmented Security for Browsers

Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy - Technical Report HGI-TR-2007-001, Horst Görtz Institute for IT Security, Ruhr-University Bochum, 2007.

Enabling Fairer Digital Rights Management with Trusted Computing

Ahmad-Reza Sadeghi, Christopher Wolf, Christian Stüble, N. Asokan, Jan-Erik Ekberg - In 10th International Conference on Information Security (ISC 2007), Valparaíso, Chile, October 9-12, 2007, Proceedings, volume 4779 of Lecture Notes on Computer Sience (LNCS), pages 53-70. Springer Verlag, 2007.

Phishing Phishers -- Observing and Tracing Organized Cybercrime.

Ahmad-Reza Sadeghi, Sebastian Gajek, Felix Gröbert, , Dominik Birk - In Proceedings of the 2nd IEEE International Conference on Internet Monitoring and Protection (ICIMP'07), Silicon Valley (USA), 2007.

2006
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.

Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy - Workshop on Information and System Security (WISSEC'06), Antwerpen (Belgium), 2006 .

A Protocol for Property-Based Attestation

Ahmad-Reza Sadeghi, Christian Stüble, Hans Löhr, Liquen Chen, Rainer Landfermann, Markus Rohe - Accepted for The First ACM Workshop on Scalable Trusted Computing (STC'06)

TCG Inside? - A Note on TPM Specification Compliance

Ahmad-Reza Sadeghi, Christian Wachsmann, Marcel Selhorst, Christian Stüble, Marcel Winandy - In Proceedings of the first ACM Workshop on Scalable Trusted Computing (ACMSTC), Alexandria, Virginia, USA, November 3, 2006, pages 47-56. ACM Press, 2006.

Security Architecture for Device Encryption and VPN

Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Ammar Alkassar, Michael Scheibel - Accepted for ISSE (Information Security Solution Europe) 2006

Design and Implementation of a Secure Linux Device Encryption Architecture

Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Michael Scheibel - LinuxTag 2006.

A Computational Model for Watermark Robustness

Ahmad-Reza Sadeghi, Andre Adelsbach, Stefan Katzebeisser - Accepted for Information Hiding Workshop, 2006.

A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption

Ahmad-Reza Sadeghi, Ulrich Huber, - Technical Report detailing the ISC 2006 paper below. A preliminary version is available from the authors:

A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption

Ahmad-Reza Sadeghi, Ulrich Huber, - Accepted for 9th Information Security Conference (ISC 2006), Samos, Greece, August 30 - Spetember 2, 2006. Published in Springer's LNCS 4176.

Client Authentication in Federations Using a Security Mode

Ahmad-Reza Sadeghi, Sebastian Gajek, - Accepted to be presented at Toward a More Secure Web - W3C Workshop on Usability and Transparency of Web Authentication.

E-Passport: The Global Traceability or How to Feel Like an UPS Package

Ahmad-Reza Sadeghi, Christof Paar, Dario Carluccio, Kerstin Lemke-Rust - Presented at the Workshop on RFID Security 2006 in Graz.

Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe, - To appear in LNCS Transactions on Data Hiding and Multimedia Security.

Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages

Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber, - Technical Report detailing the ACISP 2006 paper below. A preliminary version is available from the authors:

Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages

Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber, - Accepted for 11th Australasian Conference on Information Security and Privacy (ACISP 2006), Melbourne, Australia, July 3-5, 2006. Published in Springer's LNCS 4058.

Key Agreement for Heterogeneous Ad-Hoc Groups

Ahmad-Reza Sadeghi, Mark Manulis, - to appear in International Journal of Wireless and Mobile Computing (IJWMC), Inderscience.

Key Agreement for Heterogenous Mobile Ad-hoc Groups

Ahmad-Reza Sadeghi, Mark Manulis, - To appear in Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing) Journal.

Linkable Democratic Group Signatures

Jörg Schwenk, Ahmad-Reza Sadeghi, Mark Manulis, - Accepted for 2nd Information Security Practice and Experience Conference (ISPEC 2006), 11.-14. April, Hangzhou, China.

Physical Security Bounds Against Tampering

Ahmad-Reza Sadeghi, Christof Paar, Kerstin Lemke - Accepted for International Conference on Applied Cryptography and Network Security (ACNS 2006).

Play it once again, Sam - Enforcing Stateful Licenses on Open Platforms

Ahmad-Reza Sadeghi, Christian Stüble, Marko Wolf, Michael Scheibel - Accepted to be presented at The Second Workshop on Advances in Trusted Computing (WATC '06 Fall).

Property-based Taming Lying Mobile Nodes

Ahmad-Reza Sadeghi, Mark Manulis, - Accepted for International Workshop on Trusted and Autonomic Computing Systems (TACS 2006) at 20th IEEE International ­Conference on Advanced Information Networking and Applications (AINA 2006), 18.-20. April, Vienna, Austria.

Property-Based Taming of Lying Mobile Nodes.

Ahmad-Reza Sadeghi, Mark Manulis, - in Proceedings of 20th IEEE International Conference on Advanced Information Networking and Applications (AINA 2006), IEEE International Workshop on Trusted and Autonomic Computing Systems (TACS 2006), 18-20 April, Vienna, Austria.

2005
Security Engineering for Zero-knowledge Watermark Detection

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe, - Special Session on Media Security, WIAMIS 2005, 13-15 April 2005, Montreux, Switzerland.

A Privacy-Protecting Coupon System

Ahmad-Reza Sadeghi, Liqun Chen, Matthias Enzmann, Markus Schneider, Michael Steiner - Financial Cryptography 2005.

An Open Approach for Designing Secure Electronic Immobilizers

Ahmad-Reza Sadeghi, Christian Stüble, Kerstin Lemke-Rust, - The First Information Security Practice and Experience Conference (ISPEC 2005).

Anti-theft Protection: Electronic Immobilizers

Ahmad-Reza Sadeghi, Christian Stüble, , Kerstin Lemke-Rust - In: K. Lemke, C. Paar and M. Wolf (eds.): Embedded Security in Cars: Securing Current and Future Automotive IT Applications, pp. 51-67, Springer-Verlag. 2005.

Browser Model for Security Analysis of Browser-Based Protocols

Ahmad-Reza Sadeghi, Thomas Groß, Birgit Pfitzmann - Accepted for for European Symposium for Research in Computer Science (ESORICS), 2005 (see also IBM Technical Report).

Browser Model for Security Analysis of Browser-Based Protocols

Ahmad-Reza Sadeghi, Thomas Groß, Birgit Pfitzmann - IBM Technical Report RZ3600, 2005.­

Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe, - to appear in ACM Multimedia Systems Journal.

Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it.

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe, - ACM Multimedia Systems Journal.

Embedding Trust into Cars—Secure Software Delivery and Installation

Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble, Ulrich Huber, - Third Workshop on Embedded Security in Cars (escar 2005), Cologne, Germany, November 29-30, 2005. Conference presentation

First Summary Report on Asymmetric Watermarking

Ahmad-Reza Sadeghi, Andre Adelsbach, P. Bas, S. Katzenbeisser (Eds.), M. Barni, A. De Rosa - ECRYPT, Network of Excellence in Cryptology, Project Deliverable (D.WVL.3), 2005.

Multilaterally Secure Computing Platforms – in your office, car and at home

Ahmad-Reza Sadeghi, Christian Stüble, - 1th German-Japanese Symposium: Security, Privacy and Safety in the Information Society, International Exchange Centre, Tokyo, Japan, September 2005.

New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy

Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Marcel Selhorst, Oska Senft - DuD Heft 9-05, Trusted Computing News.

Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe, - accepted for 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, 19-21 September 2005, Salzburg, Austria; to appear in LNCS.

Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe - Accepted for 9th IFIP Conference on Communications and Multimedia Security (CMS) 2005, "Best Paper Award".

Property-Based Broadcast Encryption for Multi-level Security Policies

Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble, Ulrich Huber, - Technical Report detailing the ICISC 2005 paper below. A preliminary version is available from the authors

Property-Based Broadcast Encryption for Multi-level Security Policies

Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber, - 8th International Conference on Information Security and Cryptology (ICISC 2005), Seoul, Korea, December 1-2, 2005. Published in Springer's LNCS 3935. Conference presentation

Proving a WS-Federation Passive Requestor Profile with a Browser Model

Ahmad-Reza Sadeghi, Thomas Groß, Birgit Pfitzmann - Accepted for Workshop on Secure Web Services (SWS) 2005.

Secure Data Management in Trusted Computing

Ahmad-Reza Sadeghi, Christian Stüble, Ulrich Kühn, Klaus Kursawe, Stefan Lucks - Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES), LNCS 3659, Pages 324-338, Springer Verlag, 2005.

Secure Software Delivery and Installation in Embedded Systems

Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber, - accepted for the First Information Security Practice and Experience Conference (ISPEC 2005), 11-14 April 2005, Singapore.

Secure Software Delivery and Installation in Embedded Systems

Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber, - In: K. Lemke, C. Paar and M. Wolf (eds.): Embedded Security in Cars: Securing Current and Future Automotive IT Applications, pp. 27-49, Springer-Verlag. 2005.

Secure Software Delivery and Installation in Embedded Systems

Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber, - Technical Report detailing the ISPEC 2005 conference paper below.

Secure Software Delivery and Installation in Embedded Systems

Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber, - Presented at the First Information Security Practice and Experience Conference (ISPEC 2005).Springer, LNCS 3439, pp. 255-267.

Simplified Hardness Proofs in the Generic Group Model

Ahmad-Reza Sadeghi, Andy Rupp, Endre Bangerter - osition paper accepted for Western European Workshop on Research in Cryptology (WEWoRC 2005).

Sokrates - A Compiler Framework for Zero-Knowledge Protocols

Ahmad-Reza Sadeghi, Markus Rohe, Jan Camenisch - Position paper accepted for Western European Workshop on Research in Cryptology (WEWoRC 2005).

Towards Multilateral Secure Digital Rights Distribution Infrastructures

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe, - accepted for ACM DRM Workshop'05, November 7, 2005, Alexandria, Virginia, USA.

Towards Multilateral Secure Digital Rights Distribution Infrastructures

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe, - Accepted for ACM DRM 2005.

Towards Multilateral Security On DRM Platforms

Ahmad-Reza Sadeghi, Christian Stüble, - The First Information Security Practice and Experience Conference (ISPEC 2005).

Towards multilaterally secure computing platforms - with open source and trusted computing

Ahmad-Reza Sadeghi, Christian Stüble, - Information Security Technical Report, Elesevier, Volume 10, Issue 2, 2005, Pages 83-95.

Towards Secure Computing Platforms with Open-Source and Trusted Computing

Ahmad-Reza Sadeghi, Ammar Alkassar, Christian Stüble, Marcel Selhorst - 9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI), Mai 2005.

2004
Enhancing Security of Computing Platforms with TC-Technology

Ahmad-Reza Sadeghi, Christian Stüble, Oliver Altmeyer, Marcel Selhorst - In Sachar Paulus, Norbert Pohlmann, Helmut Reimer (ed.): Information Security Solutions Europe (ISSE 2004), Vieweg Verlag, pp. 346-361., 2004.

European Multilateral Secure Computing Base - Open Trusted Computing for You and Me

Ahmad-Reza Sadeghi, Christian Stüble, Norbert Pohlmann - Datenschutz und Datensicherheit (DUD) 9/2004, Vieweg Verlag, pp. 548-554, 2004.

Overcoming the Obstacles of Zero-Knowledge Watermark Detection.

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe, - ACM Multimedia and Security Workshop 2004, Magdeburg, Germany, pp. 46 - 55, © ACM, 2004.

Property-based Attestation for Computing Platforms: Caring about policies, not mechanisms

Ahmad-Reza Sadeghi, Christian Stüble, - New Security Paradigm Workshop (NSPW), 2004.

Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms

Ahmad-Reza Sadeghi, Christian Stüble, - Panel on Themes and Highlights of the New Security Paradigms Workshop 2004. Presented at 20th Annual Computer Security Applications Conference (ACSAC) December, 2004.

Trusted Computing Platforms: Zur technischen und industriepolitischen Situation und Vorgehensweise

Ahmad-Reza Sadeghi, Dirk Günnewig, Kai Rannenberg, Christian Stüble - Hrsg. von Prof. Dr. iur. Christian Koenig, Andreas Neumann, Tobias Katzschmann: Vertrauenswürdige Systemumgebungen Technik, Recht und gesellschaftspolitische Implikationen des "Trusted Computing", Verlag Recht und Wirtschaft, Heidelberg, 2004.

2003
Advanced Techniques for Dispute Resolving and Authorship Proofs on Digital Works

Ahmad-Reza Sadeghi, Andre Adelsbach, - Security and Watermarking of Multimedia Contents V, SPIE Electronic Imaging 2003.

Bridging the Gap between TCPA/Palladium and Personal Security

Ahmad-Reza Sadeghi, Christian Stüble, - Technical Report, Saarland University, 2003.

Die digitale Signatur

Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Schneider, Christian Stüble - In J. Balfanz, J. Wendenburg (Hrsg.): Digitale Signaturen in der Praxis, AWV Verlag, 2003.

Electronic Payment Systems

Ahmad-Reza Sadeghi, Markus Schneider - In D. Günnewig, E. Becker, W. Buhse, N. Rump (Eds.): Digital Rights Management, Springer Verlag, LNCS 2770, 2003.

Secure Object Identification - or: Solving The Chess Grandmaster Problem

Ahmad-Reza Sadeghi, Ammar Alkassar, Christian Stüble, - Proceedings of the New Security Paradigms Workshop, August 18-21, 2003 in Ascona, Switzerland.

Sinn und Unsinn von TCPA und Palladium

Ahmad-Reza Sadeghi, Christian Stüble, - Appeared in c't 13/2003, Heise-Verlag.

Taming "Trusted Computing" by Operating System Design

Ahmad-Reza Sadeghi, Christian Stüble, - Proceedings of the 4th International Workshop on Information Security Applications (WISA'03), Cheju Island, Korea, August 2003.

The Quest for Security in Integrated Networks

Ahmad-Reza Sadeghi, Ammar Alkassar, - 11th International Conference on Telecommunication Systems, Modeling and Analysis, October 2-5, 2003 in Monterey CA.

Trusted Computing ohne Nebenwirkungen

Ahmad-Reza Sadeghi, Christian Stüble, Dirk Günnewig - Datenschutz und Datensicherheit (DUD) 9/2003, Vieweg Verlag, pp. 556-560.

Watermark Detection with Zero-Knowledge Disclosure

Ahmad-Reza Sadeghi, Andre Adelsbach, Stefan Katzenbeisser - ACM Multimedia Systems Journal, Special Issue on Multimedia Security.

2002
Auctions with Multiple Rounds and Multiple Items

Ahmad-Reza Sadeghi, Matthias Schunter, Sandra Steinbrecher - Int. Workshop on Trust and Privacy in Digital Business (DEXA 2002), 2002.

Cryptography Meets Watermarking: Detecting Watermarks with Minimal- or Zero-Knowledge Disclosure

Ahmad-Reza Sadeghi, Andre Adelsbach, Stefan Katzenbeisser - XI European Signal Processing Conference, Volume I, pp. 446-449.

Final Report on Verification and Assessment

Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble, - MAFTIA Deliverable D22, Project IST-1999-11583, January 2002.

2001
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference

Ahmad-Reza Sadeghi, Michael Steiner - Eurocrypt 2001, LNCS 2045, Springer-Verlag, May 2001, 243-260.

How to Break a Semi-Anonymous Fingerprinting Scheme

Ahmad-Reza Sadeghi, - Information Hiding: Fourth International Workshop, LNCS 2137, Springer-Verlag, Berlin, 2001, pp. 384-394.

Optimized Self-Synchronizing Mode of Operation

Ahmad-Reza Sadeghi, Andre Adelsbach, Alexander Geraldy, Birgit Pfitzmann - 8th International Workshop on Fast Software Encryption, Yokohama, April 2001, LNCS, Springer-Verlag.

Zero-Knowledge Watermark Detection and Proof of Ownership

Ahmad-Reza Sadeghi, Andre Adelsbach, - Information Hiding: Fourth International Workshop, LNCS 2137, Springer-Verlag, Berlin, 2001, pp. 273-288.

2000
Anonymous fingerprinting with direct non-repudiation

Ahmad-Reza Sadeghi, Birgit Pfitzmann - In T. Okamoto, editor, Advances in Cryptology - ASIACRYPT‘2000, volume 1976 of Lecture Notes in Computer Science, pages 401-414, Kyoto, Japan, 2000. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany.

Proving ownership of digital content

Ahmad-Reza Sadeghi, Andre Adelsbach, Birgit Pfitzmann - In Andreas Pfitzmann, editor, Information Hiding - 3rd International Workshop, IH ’99, volume 1768 of Lecture Notes in Computer Science, pages 126-141, Dresden, Germany, October 2000. Springer-Verlag, Berlin Germany.

Self-escrowed cash against user black-mailing

Ahmad-Reza Sadeghi, Birgit Pfitzmann - In Proceedings of the Fourth Conference on Financial Cryptography (FC’00), volume 1962 of Lecture Notes in Computer Science, Anguilla, British West Indies, February 2000. International Financial Cryptography Association (IFCA), Springer-Verlag, Berlin Germany.

1999
Coin-based anonymous fingerprinting

Ahmad-Reza Sadeghi, Birgit Pfitzmann - In Jacques Stern, editor, Advances in Cryptology – EUROCRYPT ’99, volume 1599 of Lecture Notes in Computer Science, pages 1599 of Lecture Notes in Computer Science, pages 150-164: International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1999.

Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen

Ahmad-Reza Sadeghi, Birgit Pfitzmann - In Verlässliche IT-Systeme, GI-Fachtagung VIS 99, pages 35-48: DuD Fachbeiträge, Vieweg, Braunschweig, 1999.