R
Ralf Hund
Researcher at Ruhr University Bochum
Publications - 18
Citations - 1496
Ralf Hund is an academic researcher from Ruhr University Bochum. The author has contributed to research in topics: Encryption & Android (operating system). The author has an hindex of 12, co-authored 18 publications receiving 1409 citations. Previous affiliations of Ralf Hund include University of Mannheim.
Papers
More filters
Proceedings ArticleDOI
Practical Timing Side Channel Attacks against Kernel Space ASLR
TL;DR: This paper shows that an adversary can implement a generic side channel attack against the memory management system to deduce information about the privileged address space layout and can successfully circumvent kernel space ASLR on current operating systems.
Proceedings Article
Practical Timing Side Channel Attacks Against Kernel Space ASLR.
TL;DR: In this paper, a generic side channel attack against the memory management system to deduce information about the privileged address space layout is proposed, based on the intrinsic property that the different caches are shared resources on computer systems.
Proceedings Article
Return-oriented rootkits: bypassing kernel code integrity protection mechanisms
TL;DR: The design and implementation of a system that fully automates the process of constructing instruction sequences that can be used by an attacker for malicious computations are presented and a practical attack that can bypass existing kernel integrity protection mechanisms is described.
Proceedings Article
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones
Lucas Davi,Alexandra Dmitrienko,Manuel Egele,Thomas Fischer,Thorsten Holz,Ralf Hund,Stefan Nürnberger,Ahmad-Reza Sadeghi +7 more
TL;DR: A novel framework, MoCFI (Mobile CFI), that provides a general countermeasure against control-flow attacks on smartphone platforms by enforcing CFI, and shows that CFI on typical smartphone platforms powered by an ARM processor is technically involved due to architectural differences between ARM and Intel x86, as well as the specifics of smartphone OSes.
Proceedings Article
JACKSTRAWS: picking command and control connections from bot traffic
TL;DR: The results show that JACKSTRAWS can accurately detect C&C connections, even for novel bot families that were not used for template generation, and automatically extract and generalize graph templates that capture the core of different types of C& C activity.