His scientific interests lie mostly in Computer security, Embedded system, Cryptography, Software and Exploit. In his work, Access control and Internet privacy is strongly intertwined with Android, which is a subfield of Computer security. Ahmad-Reza Sadeghi combines subjects such as Scalability, Industrial control system, Isolation, Hardware security module and Enterprise information security architecture with his study of Embedded system.
The various areas that Ahmad-Reza Sadeghi examines in his Cryptography study include Physical unclonable function and Encryption. His Software research includes themes of Code injection, Scheme, Protocol and Direct Anonymous Attestation. Ahmad-Reza Sadeghi has researched Exploit in several fields, including Control flow, Mobile device and Code reuse.
His primary areas of study are Computer security, Cryptography, Software, Embedded system and Computer network. As part of his studies on Computer security, Ahmad-Reza Sadeghi frequently links adjacent subjects like Internet privacy. His work deals with themes such as Theoretical computer science and Encryption, which intersect with Cryptography.
As part of his studies on Software, Ahmad-Reza Sadeghi often connects relevant areas like Exploit. His Trusted Computing study frequently draws connections between adjacent fields such as Trusted Platform Module. Access control and Android are frequently intertwined in his study.
Ahmad-Reza Sadeghi mainly focuses on Computer security, Software, Computer network, Malware and Home automation. His Computer security study frequently links to adjacent areas such as Botnet. The Software study combines topics in areas such as Computer hardware, Threat model, State, Embedded system and Server.
The Cache research Ahmad-Reza Sadeghi does as part of his general Computer network study is frequently linked to other disciplines of science, such as Service provider, therefore creating a link between diverse domains of science. His Malware study also includes
His primary scientific interests are in Computer security, Software, Malware, Home automation and Embedded system. The study incorporates disciplines such as User space, Variety and Profiling in addition to Computer security. His Software research is multidisciplinary, relying on both Overhead, Guard, Code, Hardware security module and Firmware.
The concepts of his Malware study are interwoven with issues in Security service, Scalability, Software deployment, Anomaly detection and Intrusion detection system. His research in Home automation intersects with topics in Proprietary protocol and Encryption. His Embedded system research incorporates elements of Dram, Cryptographic protocol, Denial-of-service attack and State.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Security and privacy challenges in industrial internet of things
Ahmad-Reza Sadeghi;Christian Wachsmann;Michael Waidner.
design automation conference (2015)
Privilege escalation attacks on android
Lucas Davi;Alexandra Dmitrienko;Ahmad-Reza Sadeghi;Marcel Winandy.
international conference on information security (2010)
Return-oriented programming without returns
Stephen Checkoway;Lucas Davi;Alexandra Dmitrienko;Ahmad-Reza Sadeghi.
computer and communications security (2010)
Property-based attestation for computing platforms: caring about properties, not mechanisms
Ahmad-Reza Sadeghi;Christian Stüble.
new security paradigms workshop (2004)
Unsafe exposure analysis of mobile in-app advertisements
Michael C. Grace;Wu Zhou;Xuxian Jiang;Ahmad-Reza Sadeghi.
wireless network security (2012)
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization
K. Z. Snow;F. Monrose;L. Davi;A. Dmitrienko.
ieee symposium on security and privacy (2013)
Towards Taming Privilege-Escalation Attacks on Android
Sven Bugiel;Lucas Davi;Alexandra Dmitrienko;Thomas Fischer.
network and distributed system security symposium (2012)
TASTY: tool for automating secure two-party computations
Wilko Henecka;Stefan K ögl;Ahmad-Reza Sadeghi;Thomas Schneider.
computer and communications security (2010)
Efficient privacy-preserving face recognition
Ahmad-Reza Sadeghi;Thomas Schneider;Immo Wehrenberg.
international conference on information security and cryptology (2009)
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks
Sven Bugiel;Lucas Davi;Alexandra Dmitrienko;Thomas Fischer.
(2011)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
TU Darmstadt
University of Duisburg-Essen
University of Waterloo
University of Passau
Georgia Institute of Technology
University of California, San Diego
University of Kent
Intel (United States)
IBM (United States)
University of California, Irvine
Imperial College London
Ritsumeikan University
Xi'an Jiaotong University
Aalborg University
University of California, Santa Barbara
Carl von Ossietzky University of Oldenburg
Roskilde University
University of Sydney
Leidos (United States)
Burnet Institute
University of Pittsburgh
University of Milan
Goddard Space Flight Center
University College London
New York University
University of Manchester