P
Patrick Stewin
Researcher at Technical University of Berlin
Publications - 13
Citations - 498
Patrick Stewin is an academic researcher from Technical University of Berlin. The author has contributed to research in topics: Host (network) & Rootkit. The author has an hindex of 9, co-authored 13 publications receiving 472 citations. Previous affiliations of Patrick Stewin include Ruhr University Bochum.
Papers
More filters
Book ChapterDOI
Understanding DMA malware
Patrick Stewin,Iurii Bystrov +1 more
TL;DR: This work introduces DMA malware, i.e., malware executed on dedicated hardware to launch stealthy attacks against the host using DMA, and implemented DAGGER, a keylogger that attacks Linux and Windows platforms.
Proceedings ArticleDOI
Beyond secure channels
TL;DR: This paper describes secure and flexible mechanisms to establish and maintain Trusted Channels which do not have the deficiencies of previous proposals, and presents a concrete implementation proposal based on Transport Layer Security protocol, and Trusted Computing technology.
Book ChapterDOI
SMS-based one-time passwords: attacks and defense
TL;DR: This work analyzed the security architecture of SMS OTP systems and study attacks that pose a threat to Internet-based authentication and authorization services and proposes mechanisms to secure SMSOTPs against common attacks and specifically against smartphone Trojans.
Proceedings ArticleDOI
An efficient implementation of trusted channels based on openssl
Frederik Armknecht,Yacine Gasmi,Ahmad-Reza Sadeghi,Patrick Stewin,Martin Unger,Gianluca Ramunno,Davide Vernizzi +6 more
TL;DR: This paper presents an implementation of a security architecture for establishing Trusted Channels based on OpenSSL that provides the possibility to convey reliable integrity information of the involved endpoints and offers the high security standards of former approaches while being flexible, scalable and efficient to enable widespread deployment.
SMS-Based One-Time Passwords: Attacks and Defense - (Short Paper).
TL;DR: In this article, the authors analyzed the security architecture of SMS OTP systems and study attacks that pose a threat to Internet-based authentication and authorization services and proposed mechanisms to secure SMS-based OTPs against common attacks and specifically against smartphone Trojans.