Citations and Statistics
All the publications below can also be found on my Google Scholar profile -- including statistics, citations and references.
Peer-Reviewed Proceedings

2017

Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying [BibTex][PDF]
Kangjie Lu, Marie-Therese Walter, David Pfaff, Stefan Nürnberger, Wenke Lee, Michael Backes.
24th Annular Symposium on Network and Distributed System Security (NDSS 2017), 2017.

2016

RamCrypt: Kernel-based Address Space Encryption for User-mode Processes [BibTex][PDF]
Johannes Götzfried, Tilo Müller, Gabor Drescher, Stefan Nürnberger, Michael Backes.
ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS), 2016.

VatiCAN - Vetted, Authenticated CAN Bus [BibTex][PDF]
Stefan Nürnberger, Christian Rossow.
Conference on Cryptographic Hardware and Embedded Systems (CHES), 2016.

Nearly Optimal Verifiable Data Streaming [BibTex][PDF]
Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nürnberger.
IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC), 2016.

2015

How to Make ASLR Win the Clone Wars: Runtime Re-Randomization [BibTex][PDF]
Kangjie Lu, Stefan Nürnberger, Michael Backes, Wenke Lee.
23rd Annual Symposium on Network and Distributed System Security (NDSS 2016), 2015.

2014

You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code [BibTex][PDF]
Michael Backes, Thorsten Holz, Benjamin Kollenda, Philipp Koppe, Stefan Nürnberger, Jannik Pewny.
Proceedings of the 21st ACM conference on Computer and communications security (ACM CCS 2014), 2014.

Oxymoron - Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing [BibTex][PDF]
Michael Backes, Stefan Nürnberger.
USENIX Security Symposium, 2014.

WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP [BibTex][PDF]
Michael Backes, Rainer W Gerling, Sebastian Gerling, Stefan Nürnberger, Dominique Schröder, Mark Simkin.
12th International Conference on Applied Cryptography and Network Security, 2014.

2013

Client-controlled Cryptography-as-a-Service in the Cloud [BibTex][PDF]
Sören Bleikertz, Sven Bugiel, Hugo Ideler, Stefan Nürnberger, Ahmad-Reza Sadeghi.
11th International Conference on Applied Cryptography and Network Security (ACNS'13), 2013.

Gadge Me if You Can: Secure and Efficient Ad-Hoc Instruction-Level Randomization for x86 and ARM [BibTex][PDF]
Lucas Vincenzo Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi.
8th ACM SIGSAC symposium on Information, computer and communications security (ACM ASIACCS 2013), 2013.

2012

XIFER: A Software Diversity Tool Against Code-Reuse Attacks [BibTex][PDF]
Lucas Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi.
4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012), 2012.

MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones [BibTex][PDF]
Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi.
19th Annual Symposium on Network and Distributed System Security (NDSS 2012), 2012.

2011

Twin Clouds: An Architecture for Secure Cloud Computing [BibTex][PDF]
Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider.
Workshop on Cryptography and Security in Clouds (CSC 2011), 2011.

Re-synchronizing Audio Watermarking after Non-linear Time Stretching [BibTex][PDF]
Stefan Nürnberger Martin Steinebach Sascha Zmudzinski.
Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII, 2011.

CFI Goes Mobile: Control-Flow Integrity for Smartphones [BibTex]
Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi.
International Workshop on Trustworthy Embedded Devices (TrustED), 2011.

AmazonIA: When Elasticity Snaps Back [BibTex][PDF]
Sven Bugiel, Stefan Nürnberger, Thomas Pöppelmann, Ahmad-Reza Sadeghi, Thomas Schneider.
Proceedings of the 18th ACM conference on Computer and communications security (ACM CCS 2011), 2011.

Poster: Control-flow Integrity for Smartphones [BibTex][PDF]
Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi.
18th ACM conference on Computer and communications security (ACM CCS 2012), 2011.

Twin Clouds: Secure Cloud Computing with Low Latency [BibTex][PDF]
Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider.
Communications and Multimedia Security (CMS 2011), 2011.

2010

Ray - A Secure Microkernel Architecture [BibTex][PDF]
Stefan Nürnberger, Thomas Feller, Sorin A Huss.
Eighth Annual International Conference on Privacy Security and Trust (IEEE PST 2010), 2010.

2009

Security of Robust Audio Hashes [BibTex][PDF]
Stefan Thiemert, Stefan Nürnberger, Martin Steinebach, Sascha Zmudzinski.
First IEEE International Workshop on Information Forensics and Security (WIFS 2009), 2009.

Book Chapters

2012

TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures [BibTex]
Alysson Bessani, Imad M Abbadi, Sven Bugiel, Emanuele Cesena, Mina Deng, Michael Gröne, Ninja Marnau, Stefan Nürnberger, Marcelo Pasin, Norbert Schirmer.
European Research Activities in Cloud Computing. Chapter 6, 2012.

Theses

2010

A Secure Microkernel with Behaviour Deviation Detection [BibTex]
Stefan Nürnberger.
Technische Universität Darmstadt, 2010.

2008

Security of Robust Audio Hashes [BibTex]
Stefan Nürnberger.
Technische Universität Darmstadt, 2008.