Publications

Publications

Evaluation of User Feedback in Smart Home for Situational Context Identification
Alhamoud, Alaa; Xu, Pei; Englert, Frank; Scholl, Philipp; Nguyen, The An Binh; Böhnstedt, Doreen; Steinmetz, Ralf
2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), p.20-25
[Conference Proceedings]


Time-Reversal-Symmetric Single-Photon Wave Packets for Free-Space Quantum Communication
Trautmann, N.; Alber, G.; Agarwal, G. S.; Leuchs, G.
Physical Review Letters
[Journal Article]


TARDIS: Software-Only System-Level Record and Replay in Wireless Sensor Networks
Tancreti, Matthew; Sundaram, Vinaitheerthan; Bagchi, Saurabh; Eugster, Patrick
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, p.286-297
[Conference Proceedings]


An Investigation of the Android/BadAccents Malware which Exploits a new Android Tapjacking Attack
Rasthofer, Siegfried; Asrar, Irfan; Huber, Stephan; Bodden, Eric
[Report]


Selective dynamical decoupling for quantum state transfer
Frydrych, H.; Hoskovec, A.; Jex, I.; Alber, G.
Journal of Physics B: Atomic, Molecular and Optical Physics
[Journal Article]


XiOS: Extended Application Sandboxing on iOS
Bucicoiu, Mihai; Davi, Lucas; Deaconescu, Razvan; Sadeghi, Ahmad-Reza
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
[Conference Proceedings]


More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
Asharov, Gilad; Lindell, Yehuda; Schneider, Thomas; Zohner, Michael
Advances in Cryptology – EUROCRYPT 2015, p.673-701
[Conference Proceedings]


Ciphers for MPC and FHE
Albrecht, Martin; Rechberger, Christian; Schneider, Thomas; Tiessen, Tyge; Zohner, Michael
Advances in Cryptology – EUROCRYPT 2015, p.430-454
[Conference Proceedings]


Extracting Configuration Knowledge from Build Files with Symbolic Analysis
Zhou, Shurui; Al-Kofahi, Jafar; Nguyen, Tien; Kaestner, Christian; Nadi, Sarah
3rd International Workshop on Release Engineering, p.4
[Conference Proceedings]


GRINDER: On Reusability of Fault Injection Tools
Winter, Stefan; Piper, Thorsten; Schwahn, Oliver; Natella, Roberto; Suri, Neeraj; Cotroneo, Domenico
Proceedings of the ICSE/AST, 23.05.-24.05.2015, Florenz
[Conference Proceedings]


Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey
Vigil, Martín; Buchmann, Johannes; Cabarcas, Daniel; Weinert, Christian; Wiesmaier, Alexander
Computers & Security, p.16-32
[Journal Article]


TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits
Songhori, Ebrahim; Hussain, Siam; Sadeghi, Ahmad-Reza; Schneider, Thomas; Koushanfar, Farinaz
36. IEEE Symposium on Security and Privacy (IEEE S&P'15)
[Conference Proceedings]


Tor Experimentation Tools
Shirazi, Fatemeh; Goehring, Matthias; Diaz, Claudia
International Workshop on Privacy Engineering – IWPE'15, co-located with 36th IEEE symposium on Security and Privacy
[Conference Proceedings]


Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications
Schuster, Felix; Tendyck, Thomas; Liebchen, Christopher; Davi, Lucas; Sadeghi, Ahmad-Reza; Holz, Thorsten
36th IEEE Symposium on Security and Privacy (Oakland)
[Conference Proceedings]


TypeDevil: dynamic type inconsistency analysis for JavaScript
Pradel, Michael; Schuh, Parker; Sen, Koushik
Proceedings of the 37th International Conference on Software Engineering, p.314-324
[Conference Proceedings]


SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client
Ghiglieri, Marco; Oswald, Florian
14. Deutscher IT-Sicherheitskongress
[Conference Proceedings]


Da­ten­schutz­freund­liche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten
Ghiglieri, Marco; Müller, Jan
14. Deutscher IT-Sicherheitskongress
[Conference Proceedings]


Readactor: Practical Code Randomization Resilient to Memory Disclosure
Crane, Stephen; Liebchen, Christopher; Homescu, Andrei; Davi, Lucas; Larsen, Per; Sadeghi, Ahmad-Reza; Brunthaler, Stefan; Franz, Michael
36th IEEE Symposium on Security and Privacy (Oakland)
[Conference Proceedings]


Learn To Spot Phishing URLs with the Android NoPhish App
Canova, Gamze; Volkamer, Melanie; Bergmann, Clemens; Borza, Roland; Reinheimer, Benjamin; Stockhardt, Simon; Tenberg, Ralf
Information Security Education Across the Curriculum - 9th (IFIP), p.87-100
[Conference Proceedings]


EnvDASH: An Environment-Aware Dynamic Adaptive Streaming over HTTP System
Wilk, Stefan; Schönherr, Sophie; Stohr, Denny; Effelsberg, Wolfgang
Proceedings of the ACM International Conference on Interactive Experiences for TV and Online Video, p.113-118
[Conference Proceedings]


Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief
Steinmetzer, Daniel; Schulz, Matthias; Hollick, Matthias
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec)
[Conference Proceedings]


Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis
Songhori, Ebrahim; Sadeghi, Ahmad-Reza; Koushanfar, Farinaz
52nd Design Automation Conference (DAC)
[Conference Proceedings]


Universal Threshold Calculation for Fingerprinting Decoders using Mixture Models
Schäfer, Marcel; Mair, Sebastian; Berchtold, Waldemar; Steinebach, Martin
IH&MMSec '15 Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, p.109-114
[Conference Proceedings]


Security and Privacy Challenges in Industrial Internet of Things
Sadeghi, Ahmad-Reza; Wachsmann, Christian; Waidner, Michael
52nd Design Automation Conference (DAC) Research
[Conference Proceedings]


Phasing: Private Set Intersection using Permutation-based Hashing
Pinkas, Benny; Schneider, Thomas; Segev, Gil; Zohner, Michael
24. USENIX Security Symposium (USENIX Security'15)
[Conference Proceedings]


How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL
Nagy, Marcin; Bui, Thanh Phong; Cristofaro, Emiliano De; Asokan, N.; Ott, Jörg; Sadeghi, Ahmad-Reza
ACM WiSEC 2015
[Conference Proceedings]


Computational trust methods for security quantification in the cloud ecosystem
Habib, Sheikh Mahbub; Volk, Florian; Hauke, Sascha; Mühlhäuser, Max
The Cloud Security Ecosystem, p.463-493
[Journal Article]


Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
Günther, Felix; Poettering, Bertram
20th Australasian Conference on Information Security and Privacy (ACISP 2015), p.195-212
[Conference Proceedings]


Nudging Bank Account Holders Towards More Secure PIN Management
Gutmann, Andreas; Renaud, Karen; Volkamer, Melanie
Journal of Internet Technology and Secured Transaction (JITST), p.380 - 386
[Conference Proceedings]


How to Securely Prolong the Computational Bindingness of Pedersen Commitments
Demirel, Denise; Lancrenon, Jean
[Report]