default search action
Julian Schütte
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c39]Hendrik Meyer zum Felde, Mathias Morbitzer, Julian Schütte:
Securing Remote Policy Enforcement by a Multi-Enclave based Attestation Architecture. EUC 2021: 102-108 - 2020
- [c38]Immanuel Kunz, Valentina Casola, Angelika Schneider, Christian Banse, Julian Schütte:
Towards Tracking Data Flows in Cloud Architectures. CLOUD 2020: 445-452 - [c37]Georg Bramm, Julian Schütte:
cipherPath: Efficient Traversals over Homomorphically Encrypted Paths. ICETE (2) 2020: 271-278 - [i9]Julian Schütte, Dennis Titze:
liOS: Lifting iOS apps for fun and profit. CoRR abs/2003.12901 (2020) - [i8]Immanuel Kunz, Valentina Casola, Angelika Schneider, Christian Banse, Julian Schütte:
Towards Tracking Data Flows in Cloud Architectures. CoRR abs/2007.05212 (2020)
2010 – 2019
- 2019
- [c36]Konrad Weiss, Julian Schütte:
Annotary: A Concolic Execution System for Developing Secure Smart Contracts. ESORICS (1) 2019: 747-766 - [c35]Martin Schanzenbach, Thomas Kilian, Julian Schütte, Christian Banse:
ZKlaims: Privacy-preserving Attribute-based Credentials using Non-interactive Zero-knowledge Techniques. ICETE (2) 2019: 325-332 - [c34]Julian Schütte, Dennis Titze:
liOS: Lifting iOS Apps for Fun and Profit. SIoT 2019: 1-10 - [i7]Konrad Weiss, Julian Schütte:
Annotary: A Concolic Execution System for Developing Secure Smart Contracts. CoRR abs/1907.03868 (2019) - [i6]Martin Schanzenbach, Thomas Kilian, Julian Schütte, Christian Banse:
ZKlaims: Privacy-preserving Attribute-based Credentials using Non-interactive Zero-knowledge Techniques. CoRR abs/1907.09579 (2019) - 2018
- [c33]Christof Ferreira Torres, Julian Schütte, Radu State:
Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts. ACSAC 2018: 664-676 - [c32]Gerd Stefan Brost, Manuel Huber, Michael Weiß, Mykolai Protsenko, Julian Schütte, Sascha Wessel:
An Ecosystem and IoT Device Architecture for Building Trust in the Industrial Data Space. CPSS@AsiaCCS 2018: 39-50 - [c31]Georg Bramm, Mark Gall, Julian Schütte:
BDABE - Blockchain-based Distributed Attribute based Encryption. ICETE (2) 2018: 265-276 - [c30]Martin Schanzenbach, Christian Banse, Julian Schütte:
Practical Decentralized Attribute-Based Delegation Using Secure Name Systems. TrustCom/BigDataSE 2018: 244-251 - [c29]Julian Schütte, Gerd Stefan Brost:
LUCON: Data Flow Control for Message-Based IoT Systems. TrustCom/BigDataSE 2018: 289-299 - [c28]Martin Schanzenbach, Georg Bramm, Julian Schütte:
reclaimID: Secure, Self-Sovereign Identities Using Name Systems and Attribute-Based Encryption. TrustCom/BigDataSE 2018: 946-957 - [p1]Claudio A. Ardagna, Ernesto Damiani, Julian Schütte, Philipp Stephanow:
A Case for IoT Security Assurance. Internet of Everything 2018: 175-192 - [i5]Johann Vierthaler, Roman Kruszelnicki, Julian Schütte:
WebEye - Automated Collection of Malicious HTTP Traffic. CoRR abs/1802.06012 (2018) - [i4]Julian Schütte, Gerd Stefan Brost, Sascha Wessel:
Der Trusted Connector im Industrial Data Space. CoRR abs/1804.09442 (2018) - [i3]Julian Schütte, Gerd Stefan Brost:
LUCON: Data Flow Control for Message-Based IoT Systems. CoRR abs/1805.05887 (2018) - [i2]Martin Schanzenbach, Georg Bramm, Julian Schütte:
reclaimID: Secure, Self-Sovereign Identities using Name Systems and Attribute-Based Encryption. CoRR abs/1805.06253 (2018) - [i1]Martin Schanzenbach, Christian Banse, Julian Schütte:
Practical Decentralized Attribute-Based Delegation using Secure Name Systems. CoRR abs/1805.06398 (2018) - 2017
- [c27]Dennis Titze, Konrad Weiss, Julian Schütte:
Ariadnima - Android Component Flow Reconstruction and Visualization. AINA 2017: 336-341 - [c26]Christian Banse, Julian Schütte:
A taxonomy-based approach for security in software-defined networking. ICC 2017: 1-6 - [c25]Julian Schütte, Alexander Küchler, Dennis Titze:
Practical Application-Level Dynamic Taint Analysis of Android Apps. TrustCom/BigDataSE/ICESS 2017: 17-24 - [c24]Dennis Titze, Michael Lux, Julian Schütte:
Ordol: Obfuscation-Resilient Detection of Libraries in Android Applications. TrustCom/BigDataSE/ICESS 2017: 618-625 - 2016
- [c23]Philipp Stephanow, Gaurav Srivastava, Julian Schütte:
Test-Based Cloud Service Certification of Opportunistic Providers. CLOUD 2016: 843-848 - [c22]Julian Schütte, Gerd Stefan Brost:
A Data Usage Control System Using Dynamic Taint Tracking. AINA 2016: 909-916 - [c21]Philipp Stephanow, Christian Banse, Julian Schütte:
Generating Threat Profiles for Cloud Service Certification Systems. HASE 2016: 260-267 - 2015
- [c20]Julian Schütte, Rafael Fedler, Dennis Titze:
ConDroid: Targeted Dynamic Analysis of Android Applications. AINA 2015: 571-578 - [c19]Dennis Titze, Julian Schütte:
Apparecium: Revealing Data Flows in Android Applications. AINA 2015: 579-586 - [c18]Dennis Titze, Julian Schütte:
Preventing Library Spoofing on Android. TrustCom/BigDataSE/ISPA (1) 2015: 1136-1141 - 2014
- [j2]Julian Schütte:
NFC? Aber sicher. Datenschutz und Datensicherheit 38(1): 20-24 (2014) - [c17]Julian Schütte, Dennis Titze, José María de Fuentes:
AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps. TrustCom 2014: 370-379 - 2013
- [b1]Julian Schütte:
Security policies in pervasive systems: design of a modular security policy framework for semantic, multi-domain, service-oriented pervasive systems. Technical University Munich, 2013, pp. 1-210 - [c16]Dennis Titze, Philipp Stephanow, Julian Schütte:
A Configurable and Extensible Security Service Architecture for Smartphones. AINA Workshops 2013: 1056-1062 - [c15]Rafael Fedler, Marcel Kulicke, Julian Schütte:
Native code execution control for attack mitigation on android. SPSM@CCS 2013: 15-20 - [c14]Rafael Fedler, Marcel Kulicke, Julian Schütte:
An antivirus API for Android malware recognition. MALWARE 2013: 77-84 - 2012
- [c13]Julian Schütte:
Goal-Based Policies for Self-Protecting Systems. AINA 2012: 360-367 - [c12]Julian Schütte, Roland Rieke, Timo Winkelvos:
Model-Based Security Event Management. MMM-ACNS 2012: 181-190 - [c11]Roland Rieke, Julian Schütte, Andrew Hutchison:
Architecting a security strategy measurement and management system. MDsec@MoDELS 2012: 2 - [c10]Julian Schütte, Hervais Simo Fhom, Mark Gall:
Security Policies in Dynamic Service Compositions. SECRYPT 2012: 233-238 - 2011
- [c9]Julian Schütte, Stephan Heuser:
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence. AINA Workshops 2011: 417-423 - [c8]Julian Schütte:
Apollon: Towards a Semantically Extensible Policy Framework. SECRYPT 2011: 391-395 - 2010
- [j1]Julian Schütte, Tobias Wahl:
Interdomain Policy Conflicts. IEEE Veh. Technol. Mag. 5(3): 68-74 (2010) - [c7]Weishan Zhang, Klaus Marius Hansen, João Fernandes, Julian Schütte, Francisco Milagro Lardies:
QoS-Aware Self-adaptation of Communication Protocols in a Pervasive Service Middleware. GreenCom/CPSCom 2010: 17-26 - [c6]Julian Schütte, Nicolai Kuntze, Andreas Fuchs, Atta Badii:
Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems. SEC 2010: 90-102
2000 – 2009
- 2009
- [c5]Weishan Zhang, Julian Schütte, Mads Ingstrup, Klaus Marius Hansen:
A Genetic Algorithms-Based Approach for Optimized Self-protection in a Pervasive Service Middleware. ICSOC/ServiceWave 2009: 404-419 - [c4]Zaharina Velikova, Julian Schütte, Nicolai Kuntze:
Towards security in decentralized workflows. ICUMT 2009: 1-6 - 2008
- [c3]Nicolai Kuntze, Julian Schütte:
Securing Decentralized Workflows in Ambient Environments. EUC (2) 2008: 361-366 - 2007
- [c2]Jens Heider, Julian Schütte:
Security made easy: Achieving user-friendly communication protection in ad-hoc situations. SECURWARE 2007: 139-144 - [c1]Jens Heider, Julian Schütte:
On Path-Centric Navigation and Search Techniques for Personal Knowledge Stored in Topic Maps. TMRA 2007: 214-225
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint