Publications

Publications

Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks
Kohnhäuser, Florian; Büscher, Niklas; Gabmeyer, Sebastian; Katzenbeisser, Stefan
[Journal Article, Report]


Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
Grube, Tim; Hauke, Sascha; Daubert, Jörg; Mühlhäuser, Max
2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), p.337-340
[Conference Proceedings]


Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications
Ankele, Robin; Kucuk, Kubilay A.; Martin, Andrew; Simpson, Andrew; Paverd, Andrew
13th IEEE International Conference on Advanced and Trusted Computing, p.414-422
[Conference Proceedings]


User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn
Volkamer, Melanie; Renaud, Karen; Reinheimer, Benjamin; Kunz, Alexandra
>Computers & Security, p.100-113
[Journal Article]


Towards Enhancing the Visual Analysis of Interdomain Routing
Ulmer, Alex; Kohlhammer, Jörn; Shulman, Haya
VISIGRAPP 2017 : 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications
[Conference Proceedings]


Will a Decaying Atom Feel a Friction Force?
Trautmann, Nils; Sonnleitner, Matthias; Barnett, Stephen
Physical Review Letters
[Journal Article]


Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security
Schaller, André; Xiong, Wenjie; Anagnostopoulos, Nikolaos Athanasios; Saleem, Umair; Gabmeyer, Sebastian; Katzenbeisser, Stefan; Szefer, Jakub
2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
[Conference Proceedings]


Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity
Rudd, Robert; Skowyra, Richard; Bigelow, David; Dedhia, Veer; Hobson, Thomas; Crane, Stephen; Liebchen, Christopher; Larsen, Per; Davi, Lucas; Franz, Michael; Sadeghi, Ahmad-Reza; Okhravi, Hamed
24th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO
Nielsen, Jesper Buus; Schneider, Thomas; Trifiletti, Roberto
24. Annual Network and Distributed System Security Symposium (NDSS'17)
[Conference Proceedings]


Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit
Garcia, Luis; Brasser, Ferdinand; Cintuglu, Mehmet H.; Sadeghi, Ahmad-Reza; Mohammed, Osama; Zonouz, Saman A.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


Pushing the Communication Barrier in Secure Computation using Lookup Tables
Dessouky, Ghada; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza; Schneider, Thomas; Zeitouni, Shaza; Zohner, Michael
24. Annual Network and Distributed System Security Symposium (NDSS'17)
[Conference Proceedings]


PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables
Davi, Lucas; Gens, David; Liebchen, Christopher; Sadeghi, Ahmad-Reza
24th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


Are We There Yet? On RPKIs Deployment and Security
Cohen, Avichai; Gilad, Yossi; Herzberg, Amir; Schapira, Michael; Shulman, Haya
Network and Distributed Systems Security (NDSS)
[Conference Proceedings]


Privacy-Preserving Interdomain Routing at Internet Scale
Asharov, Gilad; Demmler, Daniel; Schapira, Michael; Schneider, Thomas; Segev, Gil; Shenker, Scott; Zohner, Michael
Proceedings on Privacy Enhancing Technologies (PoPETs), p.143-163
[Journal Article]


One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in Signed Domains
Shulman, Haya; Waidner, Michael
The 14th USENIX Symposium on Networked SystemsDesign and Implementation (NSDI)
[Conference Proceedings]


Slow TCAM Exhaustion DDoS Attack
Pascoal, Túlio A.; Dantas, Yuri Gil; Fonseca, Iguatemi E.; Nigam, Vivek
IFIP SEC 2017 - 32nd International Conference on ICT Systems Security and Privacy Protection, p.17-31
[Conference Proceedings]


Ant Colonies for Efficient and Anonymous Group Communication Systems
Grube, Tim; Hauke, Sascha; Daubert, Jörg; Mühlhäuser, Max
2017 International Conference on Networked Systems (NetSys), p.1-8
[Conference Proceedings]


An Experimental Study of a Bucketing Approach
Dantas, Yuri Gil; Hamann, Tobias; Mantel, Heiko; Schickel, Johannes
Quantitative Aspects of Programming Languages and Systems
[Conference Proceedings]


Ende-zu-Ende sichere E-Mail-Kommunikation
Zimmermann, Verena; Volkamer, Melanie; Vogt, Joachim; Henhapl, Birgit
>Datenschutz und Datensicherheit - DUD, p.308-313
[Journal Article]


MoPS: A Modular Protection Scheme for Long-Term Storage
Weinert, Christian; Demirel, Denise; Vigil, Martín; Geihs, Matthias; Buchmann, Johannes
ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, p.436-448
[Conference Proceedings]


The Circle Game: Scalable Private Membership Test Using Trusted Hardware
Tamrakar, Sandeep; Liu, Jian; Paverd, Andrew; Ekberg, Jan-Erik; Pinkas, Benny; Asokan, N.
ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, p.31-44
[Conference Proceedings]


Secure Multiparty Computation from SGX
Portela, Bernardo; Barbosa, Manuel; Scerri, Guillaume; Warinschi, Bogdan; Bahmani, Raad; Brasser, Ferdinand; Sadeghi, Ahmad-Reza
Financial Cryptography and Data Security
[Conference Proceedings]


A Practical Multivariate Blind Signature Scheme
Petzoldt, Albrecht; Szepieniec, Alan; Mohamed, Mohamed Saied Emam
Financial Cryptography and Data Security 2017
[Conference Proceedings]


Poster: Secure Storage of Masked Passwords
Mayer, Peter; Volkamer, Melanie
IEEE European Symposium on Security and Privacy Posters
[Conference Proceedings]


Security Notions for Bidirectional Channels
Marson, Giorgia Azzurra; Poettering, Bertram
IACR Transactions on Symmetric Cryptology, p.405-426
[Journal Article]


Enabling Vote Delegation in Boardroom Voting
Kulyk, Oksana; Neumann, Stephan; Marky, Karola; Volkamer, Melanie
Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017, p.419-433
[Conference Proceedings]


0-RTT Key Exchange with Full Forward Secrecy
Günther, Felix; Hale, Britta; Jager, Tibor; Lauer, Sebastian
Eurocrypt 2017 - 36th International Conference on the Theory and Applications of Cryptographic Techniques
[Conference Proceedings]


Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates
Fischlin, Marc; Günther, Felix
2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017)
[Conference Proceedings]


Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability
Buchmann, Johannes; Demirel, Denise; Schabhüser, Lucas; Struck, Patrick
C2SI 2017 - Codes, Cryptology and Information Security - Second International Conference in honor of Professor Claude Carlet, p.142-160
[Conference Proceedings]


SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality
Braun, Johannes; Buchmann, Johannes; Demirel, Denise; Fujiwara, Mikio; Geihs, Matthias; Moriai, Shiho; Sasaki, Masahide; Waseda, Atsushi
ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, p.461-468
[Conference Proceedings]