Publications
Publications
Securing DNSSEC Keys via Threshold ECDSA from Generic MPC
Dalskov, Anders; Orlandi, Claudio; Keller, Marcel; Shrishak, Kris; Shulman, Haya
European Symposium on Research in Computer Security (ESORICS) 2020
[Conference Paper]
Data Mining zur Erfassung extremistischer Aktivitäten in Online-Netzwerken
Hamachers, Annika; Gundlach, Julia; Heereman, Wendy; Selzer, Annika; Yannikos, York
[Book Article]
Analyzing Linguistic Features of German Fake News: Characterization, Detection, and Discussion
Vogel, Inna
Sommerakademie der Zivilen Sicherheitsforschung 2020
[Conference Paper]
Vorhersage von Gruppendynamiken auf der Grundlage von Daten aus Sozialen Netzwerken
Spranger, Michael; Labudde, Dirk
[Book Article]
IT-Sicherheit aus technischer Sicht
Grimm, Rüdiger; Waidner, Michael
[Book Article]
Securing Electric Vehicle Charging Systems through Component Binding
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
International Conference on Computer Safety, Reliability, and Security (SAFECOMP) 2020
[Conference Paper]
30. ID: SMART Workshop 2020
ID:SMART Workshop 2020
[Conference Proceeding]
Non-blind steganalysis
Bunzel, Niklas; Steinebach, Martin; Liu, Huajian
International Conference on Availability, Reliability and Security (ARES) 2020
[Conference Paper]
Uploadfilter - Funktionsweisen, Einsatzmöglichkeiten und Parametrisierung
Raue, Benjamin; Steinebach, Martin
Symposium "FILTER(N) oder nicht? Der Einsatz von Filtertechnologien im Urheber- und Medienrecht" 2020
[Journal Article]
Handlungsempfehlungen
Jansen, Carolin; Johannes, Christopher; Krämer, Nicole; Kreutzer, Michael; Löber, Lena Isabell; Rinsdorf, Lars; Roßnagel, Alexander; Schaewitz, Leonie
[Book Article]
A Step Towards Interpretable Authorship Verification
Halvani, Oren; Graner, Lukas; Regev, Roey
International Conference on Availability, Reliability and Security (ARES) 2020
[Presentation]
Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models
Fenzl, Florian; Rieke, Roland; Chevalier, Y.; Dominik, A.; Kotenko, I.
[Journal Article]
Datenschutzrechtliche Zulässigkeit von Cloud-Computing-Services und deren teilautomatisierte Überprüfbarkeit
Selzer, Annika
[Book]
File-Sharing and the Darknet
Steinebach, Martin
[Book Article]
Polynomial Multiplication in NTRU Prime: Comparison of Optimization Strategies on Cortex-M4
Alkim, Erdem; Cheng, Dean Yun-Li; Chung, Chi-Ming Marvin; Evkan, Hülya; Huang, Leo Wei-Lun; Hwang, Vincent; Li, Ching-Lin Trista; Niederhagen, Ruben; Shih, Cheng-Jhih; Wälde, Julian; Yang, Bo-Yin
[Journal Article]
Checking the Integrity of Images with Signed Thumbnail Images
Steinebach, Martin; Jörg, Sebastian; Liu, Huajian
Annual Symposium on Electronic Imaging, Science and Technology 2020
[Journal Article]
Fake News Detection by Image Montage Recognition
Steinebach, Martin; Liu, Huajian; Gotkowski, Karol
[Journal Article]
HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria; Heddergott, Ronald
Computer Science in Cars Symposium (CSCS) 2020
[Conference Paper]
HIP: HSM-Based Identities for Plug-and-Charge
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
International Conference on Availability, Reliability and Security (ARES) 2020
[Conference Paper]
Datenschutz und Datensicherheit im Digital Public Health
Kunz, Thomas; Lange, Benjamin; Selzer, Annika
[Journal Article]
Raising Security Awareness on Mobile Systems through Gamification
Heid, Kris; Heider, Jens; Qasempour, Kasra
European Interdisciplinary Cybersecurity Conference (EICC) 2020
[Conference Paper]
ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection
Chevalier, Yannick; Rieke, Roland; Fenzl, Florian; Chechulin, Andrey; Kotenko, Igor
International Symposium on Intelligent Distributed Computing (IDC) 2019
[Conference Paper]
IT-Sicherheit in Industrie 4.0. Mit Bedrohungen und Risiken umgehen
Selzer, Annika; Schöning, Harald; Laabs, Martin; Dukanovic, Sinisa; Henkel, Thorsten
[Book]
Cross-Domain Authorship Verification Based on Topic Agnostic Features
Halvani, Oren; Graner, Lukas; Regev, Roey
Conference and Labs of the Evaluation Forum (CLEF) 2020
[Conference Paper]
Performance penalties of resilient SDN infrastructures
Senf, Daniel; Shulman, Haya; Waidner, Michael
International Conference on emerging Networking EXperiments and Technologies (CoNEXT) 2020
[Conference Paper]
Privacy-enhanced robust image hashing with bloom filters
Breidenbach, Uwe; Steinebach, Martin; Liu, Huajian
International Conference on Availability, Reliability and Security (ARES) 2020
[Conference Paper]
DISCO: Sidestepping RPKI's Deployment Barriers
Hlavacek, Tomas; Cunha, Italo; Gilad, Yossi; Herzberg, Amir; Katz-Bassett, Ethan; Schapira, Michael; Shulman, Haya
Network and Distributed Systems Security Symposium (NDSS) 2020
[Conference Paper]
Diving into Email Bomb Attack
Schneider, M.; Shulman, H.; Sidis, A.; Sidis, R.; Waidner, M.
International Conference on Dependable Systems and Networks (DSN) 2020
[Conference Paper]
Blocking Email Bombs with EmailGlass
Schneider, Markus; Shulman, Haya; Waidner, Michael
Global Communications Conference (GLOBECOM) 2020
[Conference Paper]
Decision support for mobile app selection via automated privacy assessment
Wettlaufer, J.; Simo, H.
Summer School on Privacy and Identity Management "Data for Better Living - Artificial Intelligence and Privacy" 2019
[Conference Paper]