Author image not provided
 Ralf Hund

Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article19.33
Citation Count174
Publication count9
Publication years2008-2013
Available for download4
Average downloads per article454.25
Downloads (cumulative)1,817
Downloads (12 Months)143
Downloads (6 Weeks)10
Arrow RightAuthor only

See all colleagues of this author

See all subject areas


9 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 9 of 9
Sort by:

1 published by ACM
December 2013 ACM Transactions on Information and System Security (TISSEC): Volume 16 Issue 3, November 2013
Publisher: ACM
Citation Count: 3
Downloads (6 Weeks): 3,   Downloads (12 Months): 28,   Downloads (Overall): 317

Full text available: PDFPDF
General-purpose communication systems such as GSM and UMTS have been in the focus of security researchers for over a decade now. Recently also technologies that are only used under more specific circumstances have come into the spotlight of academic research and the hacker scene alike. A striking example of this ...
Keywords: Mobile security, cryptanalysis, satellite phone systems, stream cipher, binary analysis, real-world attack

May 2013 SP '13: Proceedings of the 2013 IEEE Symposium on Security and Privacy
Publisher: IEEE Computer Society
Citation Count: 32

Due to the prevalence of control-flow hijacking attacks, a wide variety of defense methods to protect both user space and kernel space code have been developed in the past years. A few examples that have received widespread adoption include stack canaries, non-executable memory, and Address Space Layout Randomization (ASLR). When ...
Keywords: Address Space Layout Randomization, Timing Attacks, Kernel Vulnerabilities, Exploit Mitigation

3 published by ACM
May 2013 ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Publisher: ACM
Citation Count: 8
Downloads (6 Weeks): 7,   Downloads (12 Months): 88,   Downloads (Overall): 1,056

Full text available: PDFPDF
Apple iOS is one of the most popular mobile operating systems. As its core security technology, iOS provides application sandboxing but assigns a generic sandboxing profile to every third-party application. However, recent attacks and incidents with benign applications demonstrate that this design decision is vulnerable to crucial privacy and security ...
Keywords: ios, application sandboxing, software security

4 published by ACM
December 2012 ACSAC '12: Proceedings of the 28th Annual Computer Security Applications Conference
Publisher: ACM
Citation Count: 8
Downloads (6 Weeks): 0,   Downloads (12 Months): 11,   Downloads (Overall): 196

Full text available: PDFPDF
A detailed understanding of the behavior of exploits and malicious software is necessary to obtain a comprehensive overview of vulnerabilities in operating systems or client applications, and to develop protection techniques and tools. To this end, a lot of research has been done in the last few years on binary ...

May 2012 SP '12: Proceedings of the 2012 IEEE Symposium on Security and Privacy
Publisher: IEEE Computer Society
Citation Count: 6

There is a rich body of work related to the security aspects of cellular mobile phones, in particular with respect to the GSM and UMTS systems. To the best of our knowledge, however, there has been no investigation of the security of satellite phones (abbr. sat phones). Even though a ...
Keywords: Mobile Security, Satellite Phone Systems, Cryptanalysis, Binary Analysis

6 published by ACM
October 2011 CCS '11: Proceedings of the 18th ACM conference on Computer and communications security
Publisher: ACM
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 16,   Downloads (Overall): 248

Full text available: PDFPDF
Despite extensive research over the last two decades, runtime attacks on software are still prevalent. Recently, smartphones, of which millions are in use today, have become an attractive target for adversaries. However, existing solutions are either ad-hoc or limited in their effectiveness. In this poster, we present a general countermeasure ...
Keywords: control-flow integrity, arm, software security

August 2011 SEC'11: Proceedings of the 20th USENIX conference on Security
Publisher: USENIX Association
Citation Count: 21

A distinguishing characteristic of bots is their ability to establish a command and control (C&C) channel. The typical approach to build detection models for C&C traffic and to identify C&C endpoints (IP addresses and domains of C&C servers) is to execute a bot in a controlled environment and monitor its ...

August 2009 SSYM'09: Proceedings of the 18th conference on USENIX security symposium
Publisher: USENIX Association
Citation Count: 79

Protecting the kernel of an operating system against attacks, especially injection of malicious code, is an important factor for implementing secure operating systems. Several kernel integrity protection mechanism were proposed recently that all have a particular shortcoming: They cannot protect against attacks in which the attacker re-uses existing code within ...

December 2008 EC2ND '08: Proceedings of the 2008 European Conference on Computer Network Defense
Publisher: IEEE Computer Society
Citation Count: 9

In this paper, we introduce the design of an advanced bot called Rambot that is based on the weaknesses we found when tracking a diverse set of botnets over a period of several months. The main features of this bot are peer-to-peer communication, strong cryptography, a credit-point system to build ...
Keywords: Botnet, Malicious Code, Network Security

The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us