Publications

Publications

Evaluating an Open-Source Hardware Approach from HDL to GDS for a Security Chip Design - a Review of the Final Stage of Project HEP
Henkes, Tim; Reith, Steffen; Stöttinger, Marc; Herfurth, Norbert; Panic, Goran; Wälde, Julian; Buschkowski, Fabian; Sasdrich, Pascal; Lüth, Christoph; Funck, Milan; Kiyan, Tuba; Weber, Arnd; Boeck, Detlef; Rathfelder, René; Grawunder, Torsten
Design, Automation & Test in Europe Conference & Exhibition 2024
[Conference Paper]


ValBench: Benchmarking Exact Value Analysis
Arzt, Steven; Miltenberger, Marc
International Workshop on the State Of the Art in Program Analysis 2024
[Conference Paper]


Introduction to Audio Deepfake Generation: Academic Insights for Non-Experts
Choi, Jeong-Eun; Schäfer, Karla; Zmudzinski, Sascha
International Workshop on Multimedia AI against Disinformation 2024
[Conference Paper]


Explore the World of Audio Deepfakes: A Guide to Detection Techniques for Non-Experts
Schäfer, Karla; Choi, Jeong-Eun; Zmudzinski, Sascha
International Workshop on Multimedia AI against Disinformation 2024
[Conference Paper]


Creating Visual Persona Profiles in Telegram using NLP
Choi, Jeong-Eun; Schäfer, Karla; Steinebach, Martin
International Symposium for Electronic Imaging 2024
[Journal Article]


IT and more: Ansatzpunkte für den Einsatz von KI in der Geldwäscheerkennung
Battis, Verena; Steinebach, Martin; Granerc, Lukas
[Journal Article]


MaLeFiz: Forschungsverbund zur Bekämpfung der Geldwäsche mit Hilfe von maschinellen Lernverfahren
Battis, Verena; Sommerer, Lucia; Leffer, Lena; Hauler, Timo; Kluth, Lisa Marie
[Journal Article]


Adapter fusion for check-worthiness detection - combining a task adapter with a NER adapter
Vogel, Inna; Möhle, Pauline; Meghana, Meghana; Steinebach, Martin
Workshop on Reducing Online Misinformation through Credible Information Retrieval 2024
[Conference Paper]


Improved identification of check-worthiness in social media data through multimodal analyses
Frick, Raphael Antonius; Steinebach, Martin
Workshop on Reducing Online Misinformation through Credible Information Retrieval 2024
[Conference Paper]


KI-generierte Abbildungen von Kindesmissbrauch
Steinebach, Martin
[Journal Article]


Comparing Attitudes Toward Different Consent Mediums: Semistructured Qualitative Study
Doan, Xengie; Rossi, Arianna; Botes, Marietjie; Selzer, Annika
[Journal Article]


UN-Cybercrime-Konvention: Ein Schritt vor, zwei Schritte zurück?
Gärtner, Tanya


Authorship Verification based on the Likelihood Ratio of Grammar Models
Nini, Andrea; Halvani, Oren; Graner, Lukas; Gherardi, Valerio; Ishihara, Shunichi
[Paper]


Chatkontrolle: Methoden, Chancen und Risiken
Steinebach, Martin
Hamburger Sicherheitsrechtstag 2023
[Conference Paper]


Positionspapier zur zweiten DSGVO-Evaluation (2024)
Selzer, Annika; Stummer, Sarah; Boll, Alina
[Paper]


Der EU Cyber Resilience Act: Ein Überblick aus rechtlicher Sicht
Arzt, Steven; Fischer, Leonie; Kreutzer, Michael; Scheel, Kirstin; Schneider, Markus; Schreiber, Linda; Selzer, Annika
[Paper]


KIM: Kaos In der Medizin
Ising, Fabian; Saatjohann, Christoph; Schinzel, Sebastian
Gesellschaft für Informatik, Fachbereich Sicherheit (GI Jahrestagung) 2024
[Conference Paper]


Virtuelles Weiterleben. Rechtmäßigkeit der Da­ten­verarbeitung und Umsetzung von Informationspflichten
Geissler, Ines
[Journal Article]


Datenschutz-Vorsorge. Anwendbarkeit jenseits der Forschung und Einbettung in das geltende Datenschutzrecht
Boll, Alina; Stummer, Sarah; Selzer, Annika
[Journal Article]


Die Datenschutz-Vorsorge (DS-V)
Boll, Alina; Selzer, Annika
[Journal Article]


Erste Schritte im Rahmen der Datenschutz-Vorsorge
Boll, Alina; Stummer, Sarah
[Journal Article]


Robustness and Collision-Resistance of PhotoDNA
Steinebach, Martin
[Journal Article]


Datenschutzsensibilisierung - Mit Kindern spielerisch ins Gespräch über die Wichtigkeit des Datenschutzes kommen
Appelt, Dominik; Geissler, Ines
[Journal Article]


Precisely Extracting Complex Variable Values from Android Apps
Miltenberger, Marc; Arzt, Steven
[Journal Article]


Erste Schritte im Rahmen der Datenschutz-Vorsorge
Boll, Alina; Stummer, Sarah
[Journal Article]


A Systematic Review on Security Attacks and Countermeasures in Automotive Ethernet
Vincenzi, Marco de; Costantino, Gianpiero; Matteucci, Ilaria; Fenzl, Florian; Plappert, Christian; Rieke, Roland; Zelle, Daniel
[Journal Article]


SCATMAN: A Framework for Enhancing Trustworthiness in Digital Supply Chains
Eckel, Michael; Basu, Anirban; Kai, Satoshi; Simo Fhom, Hervais-Clemence; Dukanovic, Sinisa; Birkholz, Henk; Hane, Shingo; Lieske, Matthias
International Conference on Trust, Security and Privacy in Computing and Communications 2023
[Conference Paper]


Breaking the Quadratic Barrier: Quantum Cryptanalysis of Milenage, Telecommunications’ Cryptographic Backbone
Ulitzsch, Vincent Quentin; Seifert, Jean-Pierre
International Workshop on Post-Quantum Cryptography 2023
[Conference Paper]


faulTPM: Exposing AMD fTPMs' Deepest Secrets
Jacob, Hans Christian; Werling, Christian; Buhren, Robert; Seifert, Jean-Pierre
[Paper]


LAT-UP: Exposing Layout-Level Analog Hardware Trojans Using Contactless Optical Probing
Parvin, Sajjad; Goli, Mehran; Krachenfels, Thilo; Tajik, Shahin; Seifert, Jean-Pierre; Sill Torres, Frank; Drechsler, Rolf
IEEE Computer Society Annual Symposium on VLSI 2023
[Conference Paper]