Understanding DMA malware

P Stewin, I Bystrov�- Detection of Intrusions and Malware, and Vulnerability�…, 2013 - Springer
Attackers constantly explore ways to camouflage illicit activities against computer platforms.
Stealthy attacks are required in industrial espionage and also by criminals stealing banking …

[BOOK][B] Detecting peripheral-based attacks on the host memory

P Stewin - 2015 - Springer
Adversaries can deploy rootkit techniques on the target platform to persistently attack computer
systems in a stealthy manner. Industrial and political espionage, surveillance of users as …

SMS-Based One-Time Passwords: Attacks and Defense: (Short Paper)

C Mulliner, R Borgaonkar, P Stewin…�- Detection of Intrusions and�…, 2013 - Springer
SMS-based One-Time Passwords (SMS OTP) were introduced to counter phishing and other
attacks against Internet services such as online banking. Today, SMS OTPs are commonly …

Beyond secure channels

Y Gasmi, AR Sadeghi, P Stewin, M Unger…�- Proceedings of the 2007�…, 2007 - dl.acm.org
A Trusted Channel is a secure communication channel which is cryptographically bound to
the state of the hardware and software configurations of the endpoints. In this paper, we …

A primitive for revealing stealthy peripheral-based attacks on the computing platform's main memory

P Stewin�- Research in Attacks, Intrusions, and Defenses: 16th�…, 2013 - Springer
Computer platform peripherals such as network and management controller can be used to
attack the host computer via direct memory access (DMA). DMA-based attacks launched …

An efficient implementation of trusted channels based on OpenSSL

F Armknecht, Y Gasmi, AR Sadeghi, P Stewin…�- Proceedings of the 3rd�…, 2008 - dl.acm.org
Security breaches on the Internet rarely involve compromising secure channels - typically
based on protocols like Transport Layer Security (TLS) or Internet Protocol Security (IPsec) - …

[BOOK][B] Detection of Intrusions and Malware, and Vulnerability Assessment

K Rieck, P Stewin, JP Seifert - 2013 - Springer
On behalf of the Program Committee, it is our pleasure to present to you the proceedings of
the 10th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (…

In God we trust all others we monitor

P Stewin, JP Seifert�- Proceedings of the 17th ACM conference on�…, 2010 - dl.acm.org
Modern x86 platforms offer stealth capabilities, that are exploited by rootkits to hide malicious
code as shown by the rootkit evolution. Recently, security researchers discovered a very …

Flexible and secure enterprise rights management based on trusted virtual domains

Y Gasmi, AR Sadeghi, P Stewin, M Unger…�- Proceedings of the 3rd�…, 2008 - dl.acm.org
The requirements for secure document workflows in enterprises become increasingly
sophisticated, with employees performing different tasks under different roles using the same …

Poster: Towards detecting DMA malware

P Stewin, JP Seifert, C Mulliner�- …�of the 18th ACM conference on�…, 2011 - dl.acm.org
Malware residing in dedicated isolated hardware containing an auxiliary processor such as
present in network, video, and CPU chipsets is an emerging security threat. To attack the …