Publications
Publications
Creating Visual Persona Profiles in Telegram using NLP
Choi, Jeong-Eun; Schäfer, Karla; Steinebach, Martin
International Symposium for Electronic Imaging 2024
[Journal Article]
IT and more: Ansatzpunkte für den Einsatz von KI in der Geldwäscheerkennung
Battis, Verena; Steinebach, Martin; Granerc, Lukas
[Journal Article]
MaLeFiz: Forschungsverbund zur Bekämpfung der Geldwäsche mit Hilfe von maschinellen Lernverfahren
Battis, Verena; Sommerer, Lucia; Leffer, Lena; Hauler, Timo; Kluth, Lisa Marie
[Journal Article]
Adapter fusion for check-worthiness detection - combining a task adapter with a NER adapter
Vogel, Inna; Möhle, Pauline; Meghana, Meghana; Steinebach, Martin
Workshop on Reducing Online Misinformation through Credible Information Retrieval 2024
[Conference Paper]
Improved identification of check-worthiness in social media data through multimodal analyses
Frick, Raphael Antonius; Steinebach, Martin
Workshop on Reducing Online Misinformation through Credible Information Retrieval 2024
[Conference Paper]
KI-generierte Abbildungen von Kindesmissbrauch
Steinebach, Martin
[Journal Article]
Comparing Attitudes Toward Different Consent Mediums: Semistructured Qualitative Study
Doan, Xengie; Rossi, Arianna; Botes, Marietjie; Selzer, Annika
[Journal Article]
UN-Cybercrime-Konvention: Ein Schritt vor, zwei Schritte zurück?
Gärtner, Tanya
Authorship Verification based on the Likelihood Ratio of Grammar Models
Nini, Andrea; Halvani, Oren; Graner, Lukas; Gherardi, Valerio; Ishihara, Shunichi
[Paper]
Chatkontrolle: Methoden, Chancen und Risiken
Steinebach, Martin
Hamburger Sicherheitsrechtstag 2023
[Conference Paper]
Positionspapier zur zweiten DSGVO-Evaluation (2024)
Selzer, Annika; Stummer, Sarah; Boll, Alina
[Paper]
Der EU Cyber Resilience Act: Ein Überblick aus rechtlicher Sicht
Arzt, Steven; Fischer, Leonie; Kreutzer, Michael; Scheel, Kirstin; Schneider, Markus; Schreiber, Linda; Selzer, Annika
[Paper]
KIM: Kaos In der Medizin
Ising, Fabian; Saatjohann, Christoph; Schinzel, Sebastian
Gesellschaft für Informatik, Fachbereich Sicherheit (GI Jahrestagung) 2024
[Conference Paper]
Virtuelles Weiterleben. Rechtmäßigkeit der Datenverarbeitung und Umsetzung von Informationspflichten
Geissler, Ines
[Journal Article]
Datenschutz-Vorsorge. Anwendbarkeit jenseits der Forschung und Einbettung in das geltende Datenschutzrecht
Boll, Alina; Stummer, Sarah; Selzer, Annika
[Journal Article]
Die Datenschutz-Vorsorge (DS-V)
Boll, Alina; Selzer, Annika
[Journal Article]
Erste Schritte im Rahmen der Datenschutz-Vorsorge
Boll, Alina; Stummer, Sarah
[Journal Article]
Robustness and Collision-Resistance of PhotoDNA
Steinebach, Martin
[Journal Article]
Datenschutzsensibilisierung - Mit Kindern spielerisch ins Gespräch über die Wichtigkeit des Datenschutzes kommen
Appelt, Dominik; Geissler, Ines
[Journal Article]
Precisely Extracting Complex Variable Values from Android Apps
Miltenberger, Marc; Arzt, Steven
[Journal Article]
Erste Schritte im Rahmen der Datenschutz-Vorsorge
Boll, Alina; Stummer, Sarah
[Journal Article]
A Systematic Review on Security Attacks and Countermeasures in Automotive Ethernet
Vincenzi, Marco de; Costantino, Gianpiero; Matteucci, Ilaria; Fenzl, Florian; Plappert, Christian; Rieke, Roland; Zelle, Daniel
[Journal Article]
SCATMAN: A Framework for Enhancing Trustworthiness in Digital Supply Chains
Eckel, Michael; Basu, Anirban; Kai, Satoshi; Simo Fhom, Hervais-Clemence; Dukanovic, Sinisa; Birkholz, Henk; Hane, Shingo; Lieske, Matthias
International Conference on Trust, Security and Privacy in Computing and Communications 2023
[Conference Paper]
Breaking the Quadratic Barrier: Quantum Cryptanalysis of Milenage, Telecommunications’ Cryptographic Backbone
Ulitzsch, Vincent Quentin; Seifert, Jean-Pierre
International Workshop on Post-Quantum Cryptography 2023
[Conference Paper]
faulTPM: Exposing AMD fTPMs' Deepest Secrets
Jacob, Hans Christian; Werling, Christian; Buhren, Robert; Seifert, Jean-Pierre
[Paper]
LAT-UP: Exposing Layout-Level Analog Hardware Trojans Using Contactless Optical Probing
Parvin, Sajjad; Goli, Mehran; Krachenfels, Thilo; Tajik, Shahin; Seifert, Jean-Pierre; Sill Torres, Frank; Drechsler, Rolf
IEEE Computer Society Annual Symposium on VLSI 2023
[Conference Paper]
Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted Analysis
Saß, Xhani Marvin; Krachenfels, Thilo; Dermot Pustelnik, Frederik; Seifert, Jean-Pierre; Altmann, Frank
Workshop on Attacks and Solutions in Hardware Security 2023
[Conference Paper]
Poster: Longitudinal Analysis of DoS Attacks
Schulmann, Haya; Waidner, Michael; Kaiser, Fabian
Conference on Computer and Communications Security 2023
[Conference Paper]
Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP
Ulitzsch, Vincent Quentin; Marzougui, Soundes; Bagia, Alexis; Tibouchi, Mehdi; Seifert, Jean-Pierre
[Journal Article]
Content-type: multipart/oracle - tapping into format oracles in email end-to-end encryption
Ising, Fabian; Poddebniak, Damian; Kappert, Tobias; Saatjohann, Christoph; Schinzel, Sebastian
USENIX Security Symposium 2023
[Conference Paper]