Personal information

Activities

Works (19)

FridgeLock: Preventing Data Theft on Suspended Linux with Usable Memory Encryption

Proceedings of the 10th ACM on Conference on Data and Application Security and Privacy
2020 | Conference paper
Source: Self-asserted source
Manuel Huber

The Lazarus Effect: Healing Compromised Devices in the Internet of Small Things

Proceedings of the 2020 ACM Asia Conference on Computer and Communications Security
2020 | Conference paper
Part of ISBN: 9781450367509
Source: Self-asserted source
Manuel Huber

Protecting RESTful IoT Devices from Battery Exhaustion DoS Attacks

2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
2020-08 | Conference paper
Source: Self-asserted source
Manuel Huber

Dominance as a New Trusted Computing Primitive for the Internet of Things

40th IEEE Symposium on Security and Privacy (Oakland 2019)
2019 | Conference paper
Source: Self-asserted source
Manuel Huber

Harzer Roller: Linker-Based Instrumentation for Enhanced Embedded Security Testing

Proceedings of the 3rd Reversing and Offensive-oriented Trends Symposium
2019 | Conference paper
Source: Self-asserted source
Manuel Huber

Freeze and Crypt: Linux kernel support for main memory encryption

Computers & Security
2019-09 | Journal article
Contributors: Manuel Huber; Julian Horsch; Junaid Ali; Sascha Wessel
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

SEVered

Proceedings of the 11th European Workshop on Systems Security - EuroSec'18
2018 | Conference paper
Part of ISBN: 9781450356527
Contributors: Mathias Morbitzer; Manuel Huber; Julian Horsch; Sascha Wessel
Source: Self-asserted source
Manuel Huber via Crossref Metadata Search
grade
Preferred source (of 2)‎

Freeze & crypt: Linux kernel support for main memory encryption

ICETE 2017 - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications
2017 | Conference paper
EID:

2-s2.0-85029446300

Contributors: Huber, M.; Horsch, J.; Ali, J.; Wessel, S.
Source: Self-asserted source
Manuel Huber via Scopus - Elsevier

Protecting Suspended Devices from Memory Attacks

Proceedings of the 10th European Workshop on Systems Security
2017 | Conference paper
Part of ISBN: 978-1-4503-4935-2
Source: Self-asserted source
Manuel Huber
grade
Preferred source (of 2)‎

TransCrypt: Transparent main memory encryption using a minimal ARM hypervisor

Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017
2017 | Conference paper
EID:

2-s2.0-85029409328

Contributors: Horsch, J.; Huber, M.; Wessel, S.
Source: Self-asserted source
Manuel Huber via Scopus - Elsevier

A flexible framework for mobile device forensics based on cold boot attacks

EURASIP Journal on Information Security
2016 | Journal article
Source: Self-asserted source
Manuel Huber
grade
Preferred source (of 2)‎

A secure architecture for operating system-level virtualization on mobile devices

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016 | Book
EID:

2-s2.0-84969135644

Contributors: Huber, M.; Horsch, J.; Velten, M.; Weiss, M.; Wessel, S.
Source: Self-asserted source
Manuel Huber via Scopus - Elsevier

Cryptographically enforced four-eyes principle

Proceedings - 2016 11th International Conference on Availability, Reliability and Security, ARES 2016
2016 | Conference paper
EID:

2-s2.0-85014435752

Contributors: Bilzhause, A.; Huber, M.; Pöhls, H.C.; Samelin, K.
Source: Self-asserted source
Manuel Huber via Scopus - Elsevier

Improving mobile device security with operating system-level virtualization

Computers & Security
2015-07 | Journal article
Contributors: Sascha Wessel; Manuel Huber; Frederic Stumpf; Claudia Eckert
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Grouping queries with SV-Semantics in preference SQL

AAAI Workshop - Technical Report
2014 | Conference paper
EID:

2-s2.0-84974814464

Contributors: Endres, M.; Roocks, P.; Huber, M.; Kiebling, W.
Source: Self-asserted source
Manuel Huber via Scopus - Elsevier

A Lightweight Framework for Cold Boot Based Forensics on Mobile Devices

Source: Self-asserted source
Manuel Huber
grade
Preferred source (of 2)‎

An Ecosystem and IoT Device Architecture for Building Trust in the Industrial Data Space

CPSS '18
Conference paper
Source: Self-asserted source
Manuel Huber

Applying Real-Time Programming to Legacy Embedded Control Software

Source: Self-asserted source
Manuel Huber
grade
Preferred source (of 2)‎

Extracting Secrets from Encrypted Virtual Machines

CODASPY 2019
Conference paper
Source: Self-asserted source
Manuel Huber