Publications
Publications
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations
Schabhüser, Lucas; Demirel, Denise; Buchmann, Johannes
IACR - Cryptology ePrint Archive
[Journal Article]
SecIVo: a quantitative security evaluation framework for internet voting schemes
Neumann, Stephan; Volkamer, Melanie; Budurushi, Jurlind; Prandini, Marco
>Annals of Telecommunications, p.1-16
[Journal Article]
A vectorized, cache efficient LLL implementation
Mariano, Artur; Correia, Fabio; Bischof, Christian
VECPAR 2016 - 12th International Meeting on High Performance Computing for Computational Science
[Conference Proceedings]
Subversive-C: Abusing and Protecting Dynamic Message Dispatch
Lettner, Julian; Kollenda, Benjamin; Homescu, Andrei; Larsen, Per; Schuster, Felix; Davi, Lucas; Sadeghi, Ahmad-Reza; Holz, Thorsten; Franz, Michael
USENIX Annual Technical Conference (ATC)
[Conference Proceedings]
Coercion-resistant Proxy Voting
Kulyk, Oksana; Neumann, Stephan; Marky, Karola; Budurushi, Jurlind; Volkamer, Melanie
31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, p.3-16
[Conference Proceedings]
Survey of Software Protection with Minimal Hardware
Herzberg, Amir; Shulman, Haya; Waidner, Michael
International Conference on Software Science, Technology and Engineering (SWSTE)
[Conference Proceedings]
Regulating ARM TrustZone Devices in Restricted Spaces
Brasser, Ferdinand; Ganapathy, Vinod; Iftode, Liviu; Kim, Daeyoung; Liebchen, Christopher; Sadeghi, Ahmad-Reza
14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
[Conference Proceedings]
Towards Automated Measurements of Internets Naming Infrastructure
Borgwart, Andreas; Shulman, Haya; Waidner, Michael
International Conference on Software Science, Technology and Engineering (SWSTE)
[Conference Proceedings]
Things, Trouble, Trust: On Building Trust in IoT Systems
Abera, Tigist; Asokan, N.; Davi, Lucas; Koushanfar, Farinaz; Praverd, Andrew; Tsudik, Gene; Sadeghi, Ahmad-Reza
53rd Design Automation Conference (DAC)
[Conference Proceedings]
Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding
Zheng, Yao; Schulz, Matthias; Lou, Wenjing; Hou, Thomas; Hollick, Matthias
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), p.21-30
[Conference Proceedings]
SyncProf: detecting, localizing, and optimizing synchronization bottlenecks
Yu, Tingting; Pradel, Michael
ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis, p.389-400
[Conference Proceedings]
ARROW: automated repair of races on client-side web pages
Wang, Weihang; Zheng, Yunhui; Liu, Peng; Xu, Lei; Zhang, Xiangyu; Eugster, Patrick
ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis, p.201-212
[Conference Proceedings]
Boomerang: Demand-Driven Flow-Sensitive, Field-Sensitive, and Context-Sensitive Pointer Analysis
Späth, Johannes; Nguyen, Lisa; Ali, Karim; Bodden, Eric
European Conference on Object-Oriented Programming, p.25
[Conference Proceedings]
Boomerang: Demand-Driven Flow-Sensitive, Field-Sensitive, and Context-Sensitive Pointer Analysis
Späth, Johannes; Nguyen Quang Do, Lisa; Ali, Karim; Bodden, Eric
30th European Conference on Object-Oriented Programming (ECOOP 2016), p.22:1
[Conference Proceedings]
DEMO: Using NexMon, the C-based WiFi firmware modification framework
Schulz, Matthias; Wegemer, Daniel; Hollick, Matthias
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), p.213-215
[Conference Proceedings]
DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems
Schulz, Matthias; Loch, Adrian; Hollick, Matthias
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), p.201-203
[Conference Proceedings]
Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet
Schulz, Matthias; Klapper, Patrick; Hollick, Matthias; Tews, Erik
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), p.43-48
[Conference Proceedings]
Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices (Demo)
Schultes, Tobias; Grau, Markus; Steinmetzer, Daniel; Hollick, Matthias
ACM Conference on Security and Privacy in Wireless and Mobile Networks 2016 (ACM WiSec'16)
[Conference Proceedings]
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs
Sadeghi, Ahmad-Reza; Dessouky, Ghada
ACM WiSec 2016
[Conference Proceedings]
Supporting Decision Makers in Choosing Suitable Authentication Schemes
Mayer, Peter; Neumann, Stephan; Storck, Daniel; Volkamer, Melanie
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), p.67-77
[Conference Proceedings]
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks
Kunz, Alexandra; Volkamer, Melanie; Stockhardt, Simon; Palberg, Sven; Lottermann, Tessa; Piegert, Eric
Jahrestagung der Gesellschaft für Informatik, p.509--518
[Conference Proceedings]
DARPA: Device Attestation Resilient to Physical Attacks
Ibrahim, Ahmad; Sadeghi, Ahmad-Reza; Tsudik, Gene; Zeitouni, Shaza
ACM WiSEC 2016
[Conference Proceedings]
Password Requirements Markup Language
Horsch, Moritz; Schlipf, Mario; Braun, Johannes; Buchmann, Johannes
ACISP 2016 - 21st Australasian Conference on Information Security and Privacy
[Conference Proceedings]
Memorable And Secure: How Do You Choose Your PIN?
Gutmann, Andreas; Volkamer, Melanie; Renaud, Karen
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), p.156-166
[Conference Proceedings]
Understanding information security compliance - Why goal setting and rewards might be a bad idea
Gerber, Nina; McDermott, Ronja; Volkamer, Melanie; Vogt, Joachim
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), p.145-155
[Conference Proceedings]
Semantic Security and Indistinguishability in the Quantum World
Gagliardoni, Tommaso; Hülsing, Andreas; Schaffner, Christian
Advances in Cryptology – CRYPTO 2016, p.60-89
[Conference Proceedings]
NetCo: Reliable Routing with Unreliable Routers
Feldmann, Anja; Heyder, Philipp; Kreutzer, Michael; Schmid, Stefan; Seifert, Jean-Pierre; Shulman, Haya; Thimmaraju, Kashyap; Waidner, Michael; Sieberg, Jens
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops
[Conference Proceedings]
Monkey see, monkey do: effective generation of GUI tests with inferred macro events
Ermuth, Markus; Pradel, Michael
ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis, p.82-93
[Conference Proceedings]
Selfrando: Securing the Tor Browser against De-anonymization Exploits
Conti, Mauro; Crane, Stephen; Frassetto, Tommaso; Homescu, Andrei; Koppen, Georg; Larsen, Per; Liebchen, Christopher; Perry, Mike; Sadeghi, Ahmad-Reza
The annual Privacy Enhancing Technologies Symposium (PETS)
[Conference Proceedings]
Towards Securing Internet eXchange Points Against Curious onlooKers
Chiesa, Marco; Demmler, Daniel; Canini, Marco; Schapira, Michael; Schneider, Thomas
ANRW '16: Proceedings of the 2016 Applied Networking Research Workshop, p.32-34
[Conference Proceedings]