scispace - formally typeset
R

Ralf Hund

Researcher at Ruhr University Bochum

Publications -  18
Citations -  1496

Ralf Hund is an academic researcher from Ruhr University Bochum. The author has contributed to research in topics: Encryption & Android (operating system). The author has an hindex of 12, co-authored 18 publications receiving 1409 citations. Previous affiliations of Ralf Hund include University of Mannheim.

Papers
More filters
Proceedings ArticleDOI

Practical Timing Side Channel Attacks against Kernel Space ASLR

TL;DR: This paper shows that an adversary can implement a generic side channel attack against the memory management system to deduce information about the privileged address space layout and can successfully circumvent kernel space ASLR on current operating systems.
Proceedings Article

Practical Timing Side Channel Attacks Against Kernel Space ASLR.

TL;DR: In this paper, a generic side channel attack against the memory management system to deduce information about the privileged address space layout is proposed, based on the intrinsic property that the different caches are shared resources on computer systems.
Proceedings Article

Return-oriented rootkits: bypassing kernel code integrity protection mechanisms

TL;DR: The design and implementation of a system that fully automates the process of constructing instruction sequences that can be used by an attacker for malicious computations are presented and a practical attack that can bypass existing kernel integrity protection mechanisms is described.
Proceedings Article

MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones

TL;DR: A novel framework, MoCFI (Mobile CFI), that provides a general countermeasure against control-flow attacks on smartphone platforms by enforcing CFI, and shows that CFI on typical smartphone platforms powered by an ARM processor is technically involved due to architectural differences between ARM and Intel x86, as well as the specifics of smartphone OSes.
Proceedings Article

JACKSTRAWS: picking command and control connections from bot traffic

TL;DR: The results show that JACKSTRAWS can accurately detect C&C connections, even for novel bot families that were not used for template generation, and automatically extract and generalize graph templates that capture the core of different types of C& C activity.