Publications
Publications
Towards Automated Detection and Prevention of Regrettable (Self-) Disclosures on Social Media
Simo Fhom, Hervais-Clemence; Kreutzer, Michael
International Conference on Trust, Security and Privacy in Computing and Communications 2022
[Conference Paper]
CAHOOT: a Context-Aware veHicular intrusiOn detectiOn sysTem
Micale, Davide; Costantino, Gianpiero; Matteucci, Ilaria; Fenzl, Florian; Rieke, Roland; Patanè, Giuseppe
International Conference on Trust, Security and Privacy in Computing and Communications 2022
[Conference Paper]
Design Space Exploration of DICE
Lorych, Dominik; Jäger, Lukas
International Conference on Availability, Reliability and Security 2022
[Conference Paper]
A Resilient Network Node for the Industrial Internet of Things
Jäger, Lukas; Lorych, Dominik; Eckel, Michael
International Conference on Availability, Reliability and Security 2022
[Conference Paper]
The augmentation-speed tradeoff for consistent network updates
Henzinger, Monika; Paz, Ami; Pourdamghani, Arash; Schmid, Stefan
Symposium on SDN Research 2022
[Conference Paper]
Model-Based Insights on the Performance, Fairness, and Stability of BBR
Scherrer, Simon; Legner, Markus; Perrig, Adrian; Schmid, Stefan
Internet Measurement Conference 2022
[Conference Paper]
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
Guo, Qian; Hlauschek, Clemens; Johansson, Thomas; Lahr, Norman; Nilsson, Alexander; Schröder, Robin Leander
[Journal Article]
Complete and Improved FPGA Implementation of Classic McEliece
Chen, Pojen; Chou, Tung; Deshpande, Sanjay; Lahr, Norman; Niederhagen, Ruben; Szefer, Jakub M.; Wang, Wen
[Journal Article]
Optimizing multicast flows in high-bandwidth reconfigurable datacenter networks
Luo, L.; Foerster, K.T.; Schmid, Stefan; Yu, H.
[Journal Article]
Security and Trust in Safety Critical Infrastructures
Zhdanova, Maria
[Thesis]
Bootstrapping Cryptography on the Internet
Brandt, Markus
[Thesis]
Security Implications of Insecure DNS Usage in the Internet
Jeitner, Philipp
[Thesis]
Internet-Wide Evaluations of Security and Vulnerabilities
Dai, Tianxiang
[Thesis]
A Post-Quantum Secure Subscription Concealed Identifier for 6G
Ulitzsch, V.Q.; Park, S.; Marzougui, S.; Seifert, Jean-Pierre
Conference on Security and Privacy in Wireless and Mobile Networks 2022
[Conference Paper]
The Hijackers Guide to the Galaxy: Off-Path Taking Over Internet Resources
Dai, Tianxiang; Jeitner, Philipp; Shulman, Haya; Waidner, Michael
[Paper]
Konsequenzen des § 4 TTDSG für die Praxis von Telekommunikationsanbietern
Diel, Sarah; Selzer, Annika
[Journal Article]
Android Data Storage Locations and What App Developers do with it from a Security and Privacy Perspective
Heid, Kris; Tefke, Tobias; Heider, Jens; Staudemeyer, Ralf C.
International Conference on Information Systems Security and Privacy (ICISSP) 2022
[Conference Paper]
Local Power Grids at Risk
Zhdanova, Maria; Urbansky, Julian; Hagemeier, Anne; Zelle, Daniel; Herrmann, Isabelle Frederike; Höffner, Dorian
Annual Computer Security Applications Conference 2022
[Conference Paper]
Maschinelles Lernen im Jugendschutz
Steinebach, Martin
[Journal Article]
ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering
Zelle, Daniel; Plappert, Christian; Rieke, Roland; Scheuermann, Dirk; Krauß, C.
[Journal Article]
Messung der Datenminimierung für den Beschäftigtendatenschutz am Beispiel von Standortdaten
Schleper, Janine; Kohn, Matthias; Jo Pesch, Paulina; Waldmann, Ulrich; Kunz, Thomas
Gesellschaft für Informatik (Jahrestagung) 2022
[Conference Paper]
Towards Image Hashing Robust Against Cropping and Rotation
Steinebach, Martin; Berwanger, Tiberius; Liu, Huajian
International Conference on Availability, Reliability and Security 2022
[Conference Paper]
Datenschutzrecht. Ein Kommentar für Studium und Praxis
[Scientific Anthology]
Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3
Paul, S.; Kuzovkova, Y.; Lahr, Norman; Niederhagen, R.
Asia Conference on Computer and Communications Security 2022
[Conference Paper]
Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS
Jeitner, Philipp; Shulman, Haya
USENIX Security Symposium 2021
[Paper]
Anwendungsszenarien und Bedenken beim Einsatz Künstlicher Intelligenz in der öffentlichen Verwaltung
Heeremann, Wendy; Abagnale, Giusi
[Journal Article]
Kapitel VII: Zusammenarbeit und Kohärenz (Art. 60-76). Teilkommentierung Art. 68, 69, 70, 71, 72, 73, 74, 75, 76 DSGVO
Schreiber, Linda
[Book Article]
Application layer denial-of-service attacks and defense mechanisms: A survey
Tripathi, N.; Hubballi, N.
[Journal Article]
Recognition of objects from looted excavations by smartphone app and deep learning
Berchtold, Waldemar; Liu, Huajian; Bugert, Simon; Yannikos, York; Wang, Jingcun; Heeger, Julian; Steinebach, Martin; Frühwein, Marco
Conference "Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications" 2022
[Journal Article]
Kapitel 5: Vertretung im Europäischen Datenschutzausschuss, zentrale Anlaufstelle, Zusammenarbeit der Aufsichtsbehörden des Bundes und der Länder in Angelegenheiten der Europäischen Union (§§ 17-19). Teilkommentierung §§ 17, 18, 19 BDSG
Schreiber, Linda
[Book Article]