Follow
Andrea Höller
Andrea Höller
Other namesAndrea Hölbling
Verified email at infineon.com
Title
Cited by
Cited by
Year
Implementing RLWE-based Schemes Using an RSA Co-Processor
MR Albrecht, C Hanser, A Hoeller, T Pöppelmann, F Virdia, A Wallner
IACR Transactions on Cryptographic Hardware and Embedded Systems, 169-208, 2019
592019
A combined safety-hazards and security-threat analysis method for automotive systems
G Macher, A Höller, H Sporer, E Armengaud, C Kreiner
International Conference on Computer Safety, Reliability, and Security, 237-250, 2015
562015
QEMU-based fault injection for a system-level analysis of software countermeasures against fault attacks
A Höller, A Krieg, T Rauter, J Iber, C Kreiner
Digital System Design (DSD), 2015 Euromicro Conference on, 530-533, 2015
512015
Automotive embedded software: Migration challenges to multi-core computing platforms
G Macher, A Höller, E Armengaud, C Kreiner
2015 IEEE 13th International Conference on Industrial Informatics (INDIN …, 2015
382015
A virtual fault injection framework for reliability-aware software development
A Höller, G Macher, T Rauter, J Iber, C Kreiner
Dependable Systems and Networks Workshops (DSN-W), 2015 IEEE International …, 2015
372015
FIES: a fault injection framework for the evaluation of self-tests for COTS-based safety-critical systems
A Höller, G Schönfelder, N Kajtazovic, T Rauter, C Kreiner
2014 15th International Microprocessor Test and Verification Workshop, 105-110, 2014
342014
Towards Integrated Quantitative Security and Safety Risk Assessment
G Macher
Computer Safety, Reliability, and Security: SAFECOMP 2019 Workshops, ASSURE …, 2019
23*2019
Trusted Platform Modules in Cyber-Physical Systems: On the Interference Between Security and Dependability
A Hoeller, R Toegl
2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2018
212018
Secured and Easy-to-Use NFC-Based Device Configuration for the Internet of Things
T Ulz, T Pieber, A Höller, S Haas, C Steger
IEEE Journal of Radio Frequency Identification, 2017
212017
Hardware/software co-design of elliptic-curve cryptography for resource-constrained applications
A Höller, N Druml, C Kreiner, C Steger, T Felicijan
Proceedings of the 51st Annual Design Automation Conference, 1-6, 2014
212014
Privilege-Based Remote Attestation: Towards Integrity Assurance for Lightweight Clients
T Rauter, A Höller, N Kajtazovic, C Kreiner
Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, 3-9, 2015
172015
Asset-centric security risk assessment of software components
T Rauter, A Höller, J Iber, CJ Kreiner
2nd International Workshop on MILS: Architecture and Assurance for Secure …, 2016
162016
A Comprehensive Safety, Security, and Serviceability Assessment Method
G Macher, A Höller, H Sporer, E Armengaud, C Kreiner
International Conference on Computer Safety, Reliability, and Security, 410-424, 2014
142014
Software-Based Fault Recovery via Adaptive Diversity for COTS Multi-Core Processors
A Höller, T Rauter, J Iber, G Macher, C Kreiner
arXiv preprint arXiv:1511.03528, 2015
132015
Evaluation of Diverse Compiling for Software-Fault Tolerance
A Höller, N Kajtazovic, T Rauter, KU Römer, CJ Kreiner
Design, Automation and Test in Europe Conference and Exhibition, 1-100, 2015
112015
Towards Dynamic Software Diversity for Resilient Redundant Embedded Systems
A Höller, T Rauter, J Iber, C Kreiner
International Workshop on Software Engineering for Resilient Systems, 16-30, 2015
92015
Evaluation of diverse compiling for software-fault detection
A Höller, N Kajtazovic, T Rauter, K Römer, C Kreiner
2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), 531-536, 2015
92015
Towards a Generic Modeling Language for Contract-Based Design.
J Iber, A Höller, T Rauter, C Kreiner
ModComp@ MoDELS, 24-29, 2015
92015
Power consumption-based application classification and malware detection on android using machine-learning techniques
T Zefferer, P Teufl, D Derler, K Potzmader, A Oprisnik, H Gasparitz, ...
Future Computing, 26-31, 2013
92013
Towards Secure Mobile Computing: Employing Power-Consumption Information to Detect Malware on Mobile Devices
T Zefferer, P Teufl, D Derler, K Potzmader, A Oprisnik, H Gasparitz, ...
8*
The system can't perform the operation now. Try again later.
Articles 1–20