Technical University, Darmstadt

General Info

Rank: #18 Worldwide
#4 in Europe
Papers: 114
Number of Researchers: 106
APA
(average papers per authors):
1.1
Country: GERMANY

Activity Map

Contributors

  • Ahmad-Reza Sadeghi (50 papers)
  • Thomas Schneider (17 papers)
  • Lucas Davi (15 papers)
  • Christopher Liebchen (12 papers)
  • Matthias Hollick (8 papers)
  • Ferdinand Brasser (8 papers)
  • Tommaso Frassetto (8 papers)
  • Patrick Jauernig (8 papers)
  • Sebastian Faust (8 papers)
  • David Gens (7 papers)
  • Michael Zohner (6 papers)
  • Ghada Dessouky (6 papers)
  • Marc Fischlin (5 papers)
  • Stefan Katzenbeisser (5 papers)
  • Michael Waidner (5 papers)
  • Daniel Demmler (4 papers)
  • Cristian-Alexandru Staicu (4 papers)
  • Michael Pradel (4 papers)
  • Markus Miettinen (4 papers)
  • Poulami Das (4 papers)
  • Alexander Heinrich (4 papers)
  • Eric Bodden (3 papers)
  • Shaza Zeitouni (3 papers)
  • Ahmad Ibrahim (3 papers)
  • Emmanuel Stapf (3 papers)
  • Christian Weinert (3 papers)
  • Phillip Rieger (3 papers)
  • Thien Duc Nguyen (3 papers)
  • Christian Wachsmann (3 papers)
  • Felix Gunther (3 papers)
  • Lisa Eckey (3 papers)
  • Andreas Erwig (3 papers)
  • Siavash Riahi (3 papers)
  • Jiska Classen (3 papers)
  • Richard Mitev (3 papers)
  • Milan Stute (3 papers)
  • Stefan Nurnberger (2 papers)
  • Sven Bugiel (2 papers)
  • Siegfried Rasthofer (2 papers)
  • Steven Arzt (2 papers)
  • Tigist Abera (2 papers)
  • Raad Bahmani (2 papers)
  • David Koisser (2 papers)
  • Hossein Fereidooni (2 papers)
  • Erik Tews (2 papers)
  • Neeraj Suri (2 papers)
  • Juliane Kramer (2 papers)
  • Kristina Hostakova (2 papers)
  • Jean Paul Degabriele (2 papers)
  • Donika Mirdita (2 papers)
  • Nikolaos Alexopoulos (2 papers)
  • Hossein Yalame (2 papers)
  • Philipp Jeitner (2 papers)
  • Max Muhlhauser (2 papers)
  • Matthias Schulz (1 papers)
  • Adrian Loch (1 papers)
  • Kjell Braden (1 papers)
  • Marc Miltenberger (1 papers)
  • Simon Schmitt (1 papers)
  • Pouya Mahmoody (1 papers)
  • Alexander Gruler (1 papers)
  • Robert Kunnemann (1 papers)
  • Ben Hermann (1 papers)
  • Johannes Lerch (1 papers)
  • Mira Mezini (1 papers)
  • Samed Duzlu (1 papers)
  • Rune Fiedler (1 papers)
  • Christian Janson (1 papers)
  • Michael Hermann (1 papers)
  • Rene Freidinger (1 papers)
  • Christina Brzuska (1 papers)
  • Dennis Giese (1 papers)
  • Sebastian Biedermann (1 papers)
  • Majid Sobhani (1 papers)
  • Marco Negro (1 papers)
  • Patrick Eugster (1 papers)
  • Alexandre Bartel (1 papers)
  • Niklas Buscher (1 papers)
  • David Kretzmer (1 papers)
  • Nabil Alkeilani Alkadri (1 papers)
  • Patrick Struck (1 papers)
  • Jerome Govinden (1 papers)
  • Stephan Heuser (1 papers)
  • Daniel Lehmann (1 papers)
  • Niklas Buescher (1 papers)
  • Stefan Winter (1 papers)
  • Alex Mariotto (1 papers)
  • David Kreitschmann (1 papers)
  • Markus Zimmermann (1 papers)
  • Matthias Senker (1 papers)
  • Spyros Boukoros (1 papers)
  • Jan Ruge (1 papers)
  • Zijo Kenjar (1 papers)
  • Matthias Klimmek (1 papers)
  • Max Maass (1 papers)
  • Alina Stover (1 papers)
  • Jannik Lorenz (1 papers)
  • Manuel Brack (1 papers)
  • Jan Philipp Wagner (1 papers)
  • Tim Grube (1 papers)
  • Helen Mollering (1 papers)
  • Paul Gerber (1 papers)
  • Sebastian Gunther (1 papers)
  • Maximilian Fries (1 papers)
  • Daniel Gunther (1 papers)
  • Maurice Heymann (1 papers)

Papers

"A PIN-Entry Method Resilient Against Shoulder Surfing"

Rene Freidinger, ... -- CCS 2004

"A Formalization of the Security Features of Physical Functions"

Ahmad-Reza Sadeghi, Christian Wachsmann, ... -- Oakland 2011

"Composability of Bellare-Rogaway Key Exchange Protocols"

Christina Brzuska, Marc Fischlin, ... -- CCS 2011

"AmazonIA: When Elasticity Snaps Back"

Sven Bugiel, Stefan Nurnberger, Thomas Schneider, ... -- CCS 2011

"MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones"

Lucas Davi, Stefan Nurnberger, Ahmad-Reza Sadeghi, ... -- NDSS 2012

"Towards Taming Privilege-Escalation Attacks on Android"

Sven Bugiel, Lucas Davi, Ahmad-Reza Sadeghi, ... -- NDSS 2012

"Secure Two-Party Computations in ANSI C"

Stefan Katzenbeisser, ... -- CCS 2012

"Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization"

Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, ... -- Oakland 2013

"A Security Framework for the Analysis and Design of Software Attestation"

Ahmad-Reza Sadeghi, Christian Wachsmann, ... -- CCS 2013

"Security Analysis of a Widely Deployed Locking System"

Erik Tews, Dennis Giese, ... -- CCS 2013

"More Efficient Oblivious Transfer and Extensions for Faster Secure Computation"

Thomas Schneider, Michael Zohner, ... -- CCS 2013

"PoWerStore: Proofs of Writing for Efficient and Robust Storage"

Neeraj Suri, ... -- CCS 2013

"Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies"

Ahmad-Reza Sadeghi, ... -- Usenix 2013

"Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis"

Eric Bodden, ... -- Usenix 2013

"A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks"

Siegfried Rasthofer, Steven Arzt, Eric Bodden, ... -- NDSS 2014

"Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems"

Matthias Schulz, Adrian Loch, Matthias Hollick, ... -- NDSS 2014

"Automated Analysis of Security Protocols with Global State"

Robert Kunnemann, ... -- Oakland 2014

"Multi-Stage Key Exchange and the Case of Google's QUIC Protoco"

Marc Fischlin, Felix Gunther, ... -- CCS 2014

"From Patches to Honey-Patches: Lightweight Attacker-Misdirection, Deception, and Disinformation"

Sebastian Biedermann, Stefan Katzenbeisser, ... -- CCS 2014

"Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices"

Markus Miettinen, Majid Sobhani, Thien Duc Nguyen, Ahmad-Reza Sadeghi, ... -- CCS 2014

"Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks"

Erik Tews, ... -- Usenix 2014

"Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens"

Daniel Demmler, Thomas Schneider, Michael Zohner, ... -- Usenix 2014

"Faster Private Set Intersection based on OT Extension"

Thomas Schneider, Michael Zohner, ... -- Usenix 2014

"ASM: A Programmable Interface for Extending Android Security"

Stephan Heuser, Ahmad-Reza Sadeghi, ... -- Usenix 2014

"Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection"

Lucas Davi, Daniel Lehmann, Ahmad-Reza Sadeghi, ... -- Usenix 2014

"ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation"

Daniel Demmler, Thomas Schneider, Michael Zohner, ... -- NDSS 2015

"Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming"

Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, ... -- NDSS 2015

"Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications"

Christopher Liebchen, Lucas Davi, Ahmad-Reza Sadeghi, ... -- Oakland 2015

"Readactor: Practical Code Randomization Resilient to Memory Disclosure"

Christopher Liebchen, Lucas Davi, Ahmad-Reza Sadeghi, ... -- Oakland 2015

"TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits"

Ahmad-Reza Sadeghi, Thomas Schneider, ... -- Oakland 2015

"A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates"

Marc Fischlin, Felix Gunther, ... -- CCS 2015

"SEDA: Scalable Embedded Device Attestation"

Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Christian Wachsmann, ... -- CCS 2015

"Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks"

Christopher Liebchen, Marco Negro, Lucas Davi, Ahmad-Reza Sadeghi, ... -- CCS 2015

"Automated Synthesis of Optimized Circuits for Secure Computation"

Daniel Demmler, Ghada Dessouky, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni, ... -- CCS 2015

"It's a TRAP: Table Randomization and Protection against Function Reuse Attacks"

Christopher Liebchen, Lucas Davi, Ahmad-Reza Sadeghi, ... -- CCS 2015

"Lattice Basis Reduction Attack against Physically Unclonable Functions"

Juliane Kramer, ... -- CCS 2015

"Phasing: Private Set Intersection using Permutation-based Hashing"

Thomas Schneider, Michael Zohner, ... -- Usenix 2015

"Faster Secure Computation through Automatic Parallelization"

Niklas Buescher, Stefan Katzenbeisser, ... -- Usenix 2015

"In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services"

Stefan Winter, Neeraj Suri, ... -- Usenix 2015

"Leakage-Resilient Layout Randomization for Mobile Devices"

Kjell Braden, Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, ... -- NDSS 2016

"Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques"

Siegfried Rasthofer, Steven Arzt, Marc Miltenberger, Eric Bodden, ... -- NDSS 2016

"Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3"

Marc Fischlin, Felix Gunther, ... -- Oakland 2016

"Enforcing Least Privilege Memory Views for Multithreaded Applications"

Patrick Eugster, ... -- CCS 2016

"SANA: Secure and Scalable Aggregate Network Attestation"

Ahmad Ibrahim, Ahmad-Reza Sadeghi, ... -- CCS 2016

"SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles"

Lucas Davi, Ahmad-Reza Sadeghi, ... -- CCS 2016

"C-FLAT: Control-FLow ATtestation for Embedded Systems Software"

Tigist Abera, Lucas Davi, Ahmad-Reza Sadeghi, ... -- CCS 2016

"An in-depth Study of More than Ten Years of Java Exploitation"

Alexandre Bartel, ... -- CCS 2016

"Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO"

Thomas Schneider, ... -- NDSS 2017

"Pushing the Communication Barrier in Secure Computation using Lookup Tables"

Ghada Dessouky, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni, Michael Zohner, ... -- NDSS 2017

"PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables"

Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi, ... -- NDSS 2017

"Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit"

Ferdinand Brasser, Ahmad-Reza Sadeghi, ... -- NDSS 2017

"Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity"

Christopher Liebchen, Lucas Davi, Ahmad-Reza Sadeghi, ... -- NDSS 2017

"Hardening Java's Access Control by Abolishing Implicit Privilege Elevation"

Ben Hermann, Johannes Lerch, Mira Mezini, ... -- Oakland 2017

"JITGuard: Hardening Just-in-time Compilers with SGX"

Tommaso Frassetto, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi, ... -- CCS 2017

"Can't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory"

Ferdinand Brasser, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi, ... -- Usenix 2017

"MCMix: Anonymous Messaging via Secure Multiparty Computation"

Nikolaos Alexopoulos, ... -- Usenix 2017

"K-Miner: Uncovering Memory Corruption in Linux."

David Gens, Simon Schmitt, Lucas Davi, Ahmad-Reza Sadeghi, ... -- NDSS 2018

"SYNODE: Understanding and Automatically Preventing Injection Attacks on NODE.JS."

Cristian-Alexandru Staicu, Michael Pradel, ... -- NDSS 2018

"HyCC: Compilation of Hybrid Protocols for Practical Secure Computation"

Niklas Buscher, Daniel Demmler, Stefan Katzenbeisser, David Kretzmer, Thomas Schneider, ... -- CCS 2018

"General State Channel Networks"

Sebastian Faust, Kristina Hostakova, ... -- CCS 2018

"FairSwap: How to fairly exchange digital goods"

Lisa Eckey, Sebastian Faust, ... -- CCS 2018

"IMIX: In-Process Memory Isolation EXtension"

Tommaso Frassetto, Patrick Jauernig, Christopher Liebchen, Ahmad-Reza Sadeghi, ... -- Usenix 2018

"Freezing the Web: A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers"

Cristian-Alexandru Staicu, Michael Pradel, ... -- Usenix 2018

"The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX"

Tommaso Frassetto, Ahmad-Reza Sadeghi, ... -- Usenix 2018

"TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V"

Ferdinand Brasser, Ahmad-Reza Sadeghi, ... -- NDSS 2019

"NAUTILUS: Fishing for Deep Bugs with Grammars"

Tommaso Frassetto, Patrick Jauernig, Ahmad-Reza Sadeghi, ... -- NDSS 2019

"DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems"

Tigist Abera, Raad Bahmani, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, ... -- NDSS 2019

"SANCTUARY: ARMing TrustZone with User-space Enclaves"

Ferdinand Brasser, David Gens, Patrick Jauernig, Ahmad-Reza Sadeghi, Emmanuel Stapf, ... -- NDSS 2019

"PERUN: Virtual Payment Hubs over Cryptographic Currencies"

Lisa Eckey, Sebastian Faust, ... -- Oakland 2019

"A Formal Treatment of Deterministic Wallets"

Poulami Das, Sebastian Faust, ... -- CCS 2019

"A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link"

Milan Stute, Alex Mariotto, Alexander Heinrich, David Kreitschmann, Matthias Hollick, ... -- Usenix 2019

"HardFails: Insights into Software-Exploitable Hardware Bugs"

Ghada Dessouky, David Gens, Ahmad-Reza Sadeghi, ... -- Usenix 2019

"FastKitten: Practical Smart Contracts on Bitcoin"

Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostakova, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi, ... -- Usenix 2019

"Leaky Images: Targeted Privacy Attacks in the Web"

Cristian-Alexandru Staicu, Michael Pradel, ... -- Usenix 2019

"Small World with High Risks: A Study of Security Threats in the npm Ecosystem"

Markus Zimmermann, Cristian-Alexandru Staicu, Michael Pradel, ... -- Usenix 2019

"Mobile Private Contact Discovery at Scale"

Thomas Schneider, Matthias Senker, Christian Weinert, ... -- Usenix 2019

"On (The Lack Of) Location Privacy in Crowdsourcing Applications"

Spyros Boukoros, Stefan Katzenbeisser, ... -- Usenix 2019

"Deterministic Wallets in a Quantum World"

Nabil Alkeilani Alkadri, Poulami Das, Andreas Erwig, Sebastian Faust, Juliane Kramer, Siavash Riahi, Patrick Struck, ... -- CCS 2020

"Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets"

Jan Ruge, Jiska Classen, Matthias Hollick, ... -- Usenix 2020

"HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments"

Ghada Dessouky, Tommaso Frassetto, Ahmad-Reza Sadeghi, ... -- Usenix 2020

"V0LTpwn: Attacking x86 Processor Integrity from Software"

Zijo Kenjar, Tommaso Frassetto, Ahmad-Reza Sadeghi, ... -- Usenix 2020

"All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers"

Christian Weinert, Thomas Schneider, ... -- NDSS 2021

"BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures"

Samed Duzlu, Rune Fiedler, Marc Fischlin, Christian Janson, ... -- Oakland 2021

"Bitcoin-Compatible Virtual Channels"

Andreas Erwig, Sebastian Faust, Siavash Riahi, ... -- Oakland 2021

"Hiding the Lengths of Encrypted Messages via Gaussian Padding"

Jean Paul Degabriele, ... -- CCS 2021

"FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants"

Richard Mitev, Ahmad-Reza Sadeghi, ... -- CCS 2021

"RealSWATT: Remote Software-based Attestation for Embedded Devices under Realtime Constraints"

Ferdinand Brasser, Ahmad-Reza Sadeghi, ... -- CCS 2021

"The Exact Security of BIP32 Wallets"

Poulami Das, Andreas Erwig, Sebastian Faust, Siavash Riahi, ... -- CCS 2021

"The Security of ChaCha20-Poly1305 in the Multi-User Setting"

Jean Paul Degabriele, Jerome Govinden, ... -- CCS 2021

"Let's Downgrade Let's Encrypt"

Michael Waidner, ... -- CCS 2021

"CURE: A Security Architecture with CUstomizable and Resilient Enclaves"

Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, Emmanuel Stapf, ... -- Usenix 2021

"ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation"

Thomas Schneider, Hossein Yalame, ... -- Usenix 2021

"Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support"

Max Maass, Alina Stover, Matthias Hollick, ... -- Usenix 2021

"The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources"

Philipp Jeitner, Michael Waidner, ... -- Usenix 2021

"Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS"

Philipp Jeitner, ... -- Usenix 2021

"PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop"

Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert, ... -- Usenix 2021

"Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi"

Milan Stute, Alexander Heinrich, Jannik Lorenz, Matthias Hollick, ... -- Usenix 2021

"CFInsight: A Comprehensive Metric for CFI Policies"

Tommaso Frassetto, Patrick Jauernig, David Koisser, Ahmad-Reza Sadeghi, ... -- NDSS 2022

"FedCRI: Federated Mobile Cyber-Risk Intelligence"

Hossein Fereidooni, Phillip Rieger, Markus Miettinen, Ahmad-Reza Sadeghi, ... -- NDSS 2022

"Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures"

Ghada Dessouky, Emmanuel Stapf, Pouya Mahmoody, Alexander Gruler, Ahmad-Reza Sadeghi, ... -- NDSS 2022

"DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection"

Phillip Rieger, Thien Duc Nguyen, Markus Miettinen, Ahmad-Reza Sadeghi, ... -- NDSS 2022

"Attacks on Wireless Coexistence"

Jiska Classen, Michael Hermann, Matthias Hollick, ... -- Oakland 2022

"WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens"

Richard Mitev, Ahmad-Reza Sadeghi, ... -- Oakland 2022

"Behind the Scenes of RPKI"

Donika Mirdita, Michael Waidner, ... -- CCS 2022

"How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes"

Nikolaos Alexopoulos, Manuel Brack, Jan Philipp Wagner, Tim Grube, Max Muhlhauser, ... -- Usenix 2022

"GhostTouch: Targeted Attacks on Touchscreens without Physical Touch"

Richard Mitev, Ahmad-Reza Sadeghi, ... -- Usenix 2022

"Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging"

Alexander Heinrich, Matthias Hollick, Jiska Classen, ... -- Usenix 2022

"TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities"

Patrick Jauernig, Ahmad-Reza Sadeghi, ... -- Usenix 2022

"Stalloris: RPKI Downgrade Attack"

Donika Mirdita, Michael Waidner, ... -- Usenix 2022

"V'CER: Efficient Certificate Validation in Constrained Networks"

David Koisser, Patrick Jauernig, Ahmad-Reza Sadeghi, ... -- Usenix 2022

"FLAME: Taming Backdoors in Federated Learning"

Thien Duc Nguyen, Phillip Rieger, Hossein Yalame, Helen Mollering, Hossein Fereidooni, Markus Miettinen, Shaza Zeitouni, Ahmad-Reza Sadeghi, Thomas Schneider, ... -- Usenix 2022

"XDRI Attacks - and - How to Enhance Resilience of Residential Routers"

Michael Waidner, ... -- Usenix 2022

"Investigating State-of-the-Art Practices for Fostering Subjective Trust in Online Voting through Interviews"

Paul Gerber, Sebastian Gunther, Maximilian Fries, Max Muhlhauser, ... -- Usenix 2022

"GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications"

Daniel Gunther, Maurice Heymann, Thomas Schneider, ... -- Usenix 2022