Publications

Publications

Evaluating leakage attacks against relational encrypted search
Schneider, Thomas; Ehrler, Patrick; Kati, Abdelkarim; Treiber, Amos
CCS '24: ACM SIGSAC Conference on Computer and Communications Security
[Conference Proceedings]


Investigating Voter Perceptions of Printed Physical Audit Trails for Online Voting
Marky, Karola; Gerber, Nina; Krumb, Henry John; Khamis, Mohamed; Mühlhäuser, Max
2024 IEEE Symposium on Security and Privacy (SP), p.3458-3477
[Conference Proceedings]


Practitioners’ Corner ∙ How Effectively Do Consent Notices Inform Users About the Risks to Their Fundamental Rights?
Grassl, Paul; Gerber, Nina; Max, von Grafenstein
European Data Protection Law Review, p.96-104
[Journal Article]


Of Mothers and Managers – The Effect of Videos Depicting Gender Stereotypes on Women and Men in the Security and Privacy Field
Gerber, Nina; Stöver, Alina; Mayer, Peter
Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), p.547-566
[Conference Proceedings]


Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users
Koisser, David; Mitev, Richard; Chilese, Marco; Sadeghi, Ahmad-Reza
Proceedings: 45th IEEE Symposium on Security and Privacy - SP 2024
[Conference Proceedings]


One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices
Chilese, Marco; Mitev, Richard; Orenbach, Meni; Thorburn, Robert; Atamli, Ahmad; Sadeghi, Ahmad-Reza
Proceedings: 45th IEEE Symposium on Security and Privacy - SP 2024
[Conference Proceedings]


FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning
Fereidooni, Hossein; Pegoraro, Alessandro; Rieger, Phillip; Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2024
[Conference Proceedings]


CrowdGuard: Federated Backdoor Detection in Federated Learning
Rieger, Phillip; Krauß, Torsten; Miettinen, Mark; Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2024
[Conference Proceedings]


The Committing Security of MACs with Applications to Generic Composition
Bhaumik, Ritam; Chakraborty, Bishwajit; Choi, Wonseok; Dutta, Avijit; Govinden, Jérôme; Shen, Yaobin
44th Annual International Cryptology Conference (CRYPTO 2024)
[Conference Proceedings]


Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
Fischlin, Marc; Günther, Felix; Janson, Christian
Journal of Cryptology
[Journal Article]


SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields
Degabriele, Jean Paul; Gilcher, Jan; Govinden, Jérôme; Paterson, Kenneth G.
2024 IEEE Symposium on Security and Privacy (SP)
[Conference Proceedings]


A Novel Design Flow for a Security-Driven Synthesis of Side-Channel Hardened Cryptographic Modules
Huss, Sorin; Stein, Oliver
Journal of Low Power Electronics and Applications
[Journal Article]


From the Privacy Calculus to Crossing the Rubicon: An Introduction to Theoretical Models of User Privacy Behavior
Gerber, Nina; Stöver, Alina
Human Factors in Privacy Research, p.11-25


FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks
Castillo, Jorge; Rieger, Phillip; Fereidooni, Hossein; Chen, Qian; Sadeghi, Ahmad-Reza
ACSAC '23: Proceedings of the 39th Annual Computer Security Applications Conference
[Conference Proceedings]


Verifiable Verification in Cryptographic Protocols
Fischlin, Marc; Günther, Felix
CCS'23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, p.3239-3253
[Conference Proceedings]


Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3
Fischlin, Marc
CCS'23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, p.2901-2914
[Conference Proceedings]


Searching for ELFs in the Cryptographic Forest
Fischlin, Marc; Rohrbach, Felix
TCC 2023: Theory of Cryptography, p.207-236
[Conference Proceedings]


Hardware-Based Isolation for Advanced Safety and Security in Spacecraft
Koisser, David; Brasser, Ferdinand; Jauernig, Patrick; Stapf, Emmanuel; Wallum, Marcus; Fischer, Daniel; Sadeghi, Ahmad-Reza
17th International Conference on Space Operations (SpaceOps 2023)
[Conference Proceedings]


Populating the Zoo of Rugged Pseudorandom Permutations
Degabriele, Jean Paul; Karadžić, Vukašin
Advances in Cryptology - ASIACRYPT 2023, p.270-300
[Conference Proceedings]


The Indifferentiability of the Duplex and Its Practical Applications
Degabriele, Jean Paul; Fischlin, Marc; Govinden, Jérôme
Advances in Cryptology - ASIACRYPT 2023, p.237-269
[Conference Proceedings]


ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks
Rieger, Phillip; Chilese, Marco; Mohamed, Reham; Miettinen, Markus; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
Proceedings of the 32nd USENIX Security Symposium, p.4301-4318
[Conference Proceedings]


FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning
Li, Huimin; Rieger, Phillip; Zeitouni, Shaza; Picek, Stjepan; Sadeghi, Ahmad-Reza
Proceedings of the 2023 33rd International Conference on Field-Programmable Logic and Applications (FPL)
[Conference Proceedings]


Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M
Saß, Marvin; Mitev, Richard; Sadeghi, Ahmad-Reza
32nd USENIX Security Symposium (USENIX Security 23), p.6239-6256
[Conference Proceedings]


Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats
Pütz, Philipp; Mitev, Richard; Sadeghi, Ahmad-Reza
Annual Computer Security Applications Conference (ACSAC 2023)
[Conference Proceedings]


Griffin: Towards mixed multi-key homomorphic encryption
Schneider, Thomas; Yalame, Hossein; Yonli, Michael
Proceedings of the 20th International Conference on Security and Cryptography - SECRYPT, p.147-158
[Conference Proceedings]


Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires
Nieminen, Raine; Schneider, Thomas
Journal of Cryptology
[Journal Article]


Investigating how Users Imagine their Personal Privacy Assistant
Stöver, Alina; Hahn, Sara; Kretschmer, Felix; Gerber, Nina
Proceedings on Privacy Enhancing Technologies (PoPETs), p.384-402
[Journal Article]


How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Notification Study Reveals Diverse Circumstances and Challenges
Stöver, Alina; Gerber, Nina; Pridöhl, Henning; Maass, Max; Bretthauer, Sebastian; Spiecker gen. Döhmann, Indra; Hollick, Matthias; Herrmann, Dominik
Proceedings on Privacy Enhancing Technologies (PoPETs), p.251-264
[Journal Article]


Human Factors in Privacy Research
[Book]


Safe AND Secure Infrastructures? - Studying Human Aspects of Safety and Security Incidents with Experts from both Domains
Zimmermann, Verena; Haunschild, Jasmin; Stöver, Alina; Gerber, Nina
Mensch und Computer 2023 - Workshopband
[Conference Proceedings]