Publications

Publications

Signals Are All You Need: Detecting and Mitigating Digital and Real-World Adversarial Patches Using Signal-Based Features
Bunzel, Niklas; Frick, Raphael Antonius; Klause, Gerrit; Schwarte, Aino; Honermann, Jonas
Workshop on Secure and Trustworthy Deep Learning Systems 2024
[Conference Paper]


The Cyber Safe Position: An STPA for Safety, Security, and Resilience Co-Engineering Approach
Gkoktsis, Georgios; Peters, Ludger
International Conference on Availability, Reliability and Security 2024
[Conference Paper]


Tero: Offloading CDN Traffic to Massively Distributed Devices
Vanerio, Juan Martín; Hugerich, Lily; Schmid, Stefan
International Conference on Distributed Computing and Networking 2024
[Conference Paper]


An in-principle super-polynomial quantum advantage for approximating combinatorial optimization problems via computational learning theory
Pirnay, Niklas; Ulitzsch, Vincent Quentin; Wilde, Frederik; Eisert, Jens; Seifert, Jean-Pierre
[Journal Article]


Utility-based performance evaluation of biometric sample quality measures
Henniger, Olaf; Fu, Biying; Kurz, Alexander
[Journal Article]


MixQuantBio: Towards Extreme Face and Periocular Recognition Model Compression with Mixed-precision Quantization
Kolf, Jan Niklas; Elliesen, Jurek; Damer, Naser; Boutros, Fadi
[Journal Article]


The Time Complexity of Consensus Under Oblivious Message Adversaries
Winkler, Kyrill; Paz, Ami; Galeana, Hugo Rincon; Schmid, Stefan; Schmid, Ulrich
[Journal Article]


A context-aware on-board intrusion detection system for smart vehicles
Micale, Davide; Matteucci, Ilaria; Fenzl, Florian; Rieke, Roland; Patanè, Giuseppe
[Journal Article]


ZPredict: ML-Based IPID Side-channel Measurements
Schulmann, Haya; Zhao, Shujie
[Journal Article]


Wie Deutschland zur Cybernation wird
Schulmann, Haya; Waidner, Michael
[Journal Article]


Insights into SAV Implementations in the Internet
Schulmann, Haya; Zhao, Shujie
International Conference on Passive and Active Measurement 2024
[Conference Paper]


Scientific Appearance in Telegram
Choi, Jeong-Eun; Schäfer, Karla; Yannikos, York
International Conference on Web and Social Media 2024
[Conference Paper]


Haven't we met before? - Detecting Device Fingerprinting Activity on Android Apps
Heid, Kris; Heider, Jens
European Interdisciplinary Cybersecurity Conference 2024
[Conference Paper]


LanDscAPe: Exploring LDAP weaknesses and data leaks at Internet scale
Kaspereit, Jonas; Öndarö, Gurur; Luvizotto Cesar, Gustavo; Ebbers, Simon; Ising, Fabian; Saatjohann, Christoph; Jonker, Mattijs; Holz, Ralph; Schinzel, Sebastian
USENIX Security Symposium 2024
[Conference Paper]


Position: How Regulation Will Change Software Security Research
Arzt, Steven; Schreiber, Linda; Appelt, Dominik
International Workshop on Software Engineering in 2030 2024
[Paper]


Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU
Gruza, Olivia; Heftrig, Elias; Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Conference on Offensive Technologies 2024
[Paper]


External Attack-Surface of Modern Organizations
Gelernter, Nethanel; Schulmann, Haya; Waidner, Michael
Asia Conference on Computer and Communications Security 2024
[Conference Paper]


The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Heftrig, Elias; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Conference on Computer and Communications Security 2024
[Paper]


Byzantine-Secure Relying Party for Resilient RPKI
Frieß, Jens; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
[Paper]


Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms
Frieß, Jens; Gattermayer, Tobias; Gelernter, Nethanel; Schulmann, Haya; Waidner, Michael
Symposium on Networked Systems Design and Implementation 2024
[Paper]


Protocol Fixes for KeyTrap Vulnerabilities
Heftrig, Elias; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Applied Networking Research Workshop 2024
[Conference Paper]


Rechtliche Folgen und Risiken der De-Anonymisierung
Stummer, Sarah
[Journal Article]


Die Zukunft der ePrivacy-Verordnung
Selzer, Annika
[Journal Article]


De-Anonymisierung: Beobachtungs- und sonstige Pflichten
Stummer, Sarah
[Journal Article]


The CURE to Vulnerabilities in RPKI Validation
Mirdita, Donika; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Network and Distributed System Security Symposium 2024
[Conference Paper]


Rechtliche und technische Herausforderungen von Privatheit in Big-Data-Verarbeitungssystemen
Hornung, Gerrit; Schaller, Till; Selzer, Annika; Stummer, Sarah
[Journal Article]


Datenschutz und Cybersicherheit gemeinsam angehen
Appelt, Dominik; Enzmann, Matthias; Selzer, Annika; Wolf, Ruben


Hardware Trust Anchor Authentication for Updatable IoT Devices
Lorych, Dominik; Plappert, Christian
International Conference on Availability, Reliability and Security 2024
[Conference Paper]


A Photo and a Few Spoken Words Is All It Needs?! On the Challenges of Targeted Deepfake Attacks and their Detection
Frick, Raphael; Steinebach, Martin
Workshop on the Security Implications of Deepfakes and Cheapfakes 2024
[Conference Paper]


Acceleration of DICE Key Generation using Key Caching
Lorych, Dominik; Jäger, Lukas; Fuchs, Andreas
International Conference on Availability, Reliability and Security 2024
[Conference Paper]