scispace - formally typeset
H

Hans P. Reiser

Researcher at University of Passau

Publications -  86
Citations -  813

Hans P. Reiser is an academic researcher from University of Passau. The author has contributed to research in topics: Virtual machine & Replication (computing). The author has an hindex of 14, co-authored 86 publications receiving 651 citations. Previous affiliations of Hans P. Reiser include University of Lisbon & University of Erlangen-Nuremberg.

Papers
More filters
Journal ArticleDOI

A flexible framework for mobile device forensics based on cold boot attacks

TL;DR: This paper presents a novel framework for cold boot-based data acquisition with a minimal bare metal application on a mobile device, and compares its framework to a traditional memory dump-based analysis.
Journal ArticleDOI

DroidKex: Fast extraction of ephemeral TLS keys from the memory of Android apps

TL;DR: DroidKex is introduced, an approach for partially reconstructing the semantics of data structures in order to minimize the overhead required for extracting information from the memory of applications.
Book ChapterDOI

Control-Flow integrity in web applications

TL;DR: The approach is provided, a control-flow monitor that is applicable to legacy as well as newly developed web applications and provides guarantees to the web application concerning the sequence of incoming requests and carried parameters, and induces a negligible overhead.
Journal ArticleDOI

FORMI: Integrating Adaptive Fragmented Objects into Java RMI

TL;DR: The FORMI architecture integrates fragmented objects into Java RMI without requiring internal modifications to the RMI runtime, and the approach for transparently integrating fault-tolerant objects into .NET Remoting is useful for seamlessly integrating fragmented objects.
Book ChapterDOI

Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection

TL;DR: A freely available high-interaction SSH honeypot that provides in-depth tracing of attacks and information about attack and exploitation methods is presented.