Publications
Publications
Demasq: Unmasking the chatgpt wordsmith
Kumari, Kavita; Pegoraro, Alessandro; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2024
[Conference Proceedings]
MABFuzz: Multi-Armed Bandit Algorithms for Fuzzing Processors
Gohil, Vasudev; Rahul, Kande; Chen, Chen; Sadeghi, Ahmad-Reza; Rajendran, Jeyavijayan
2024 Design, Automation & Test in Europe Conference & Exhibition (DATE): Proceedings
[Conference Proceedings]
DeepEclipse: How to Break White-Box DNN-Watermarking Schemes
Pegoraro, Alessandro; Segna, Carlotta; Kumari, Kavita; Sadeghi, Ahmad-Reza
Proceedings of the 33rd USENIX Security Symposium, p.5287-5304
[Conference Proceedings]
Xplain: Analyzing Invisible Correlations in Model Explanation
Kumari, Kavita; Pegoraro, Alessandro; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
Proceedings of the 33rd USENIX Security Symposium, p.2937-2953
[Conference Proceedings]
Phantom: Untargeted Poisoning Attacks on Semi-Supervised Learning
Knauer, Jonathan; Rieger, Phillip; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.615-629
[Conference Proceedings]
LayerDBA: Circumventing Similarity-Based Defenses in Federated Learning
Nikolov, Javor; Pegoraro, Alessandro; Rieger, Phillip; Sadeghi, Ahmad-Reza
Proceedings: 45th IEEE Symposium on Security and Privacy Workshops: SPW 2024, p.299-305
[Conference Proceedings]
How to Respect Bystanders' Privacy in Smart Homes - A Co-Creation Study
Hahn, Sara; Al-Amrani, Nusaibah; Allagah, Sara; Huang, He Rong; Kircher, Eva; Rehs, Cornelia; Vogt, Joachim; Marky, Karola; Gerber, Nina
NordiCHI '24: Proceedings of the 13th Nordic Conference on Human-Computer Interaction
[Conference Proceedings]
Evaluating leakage attacks against relational encrypted search
Ehrler, Patrick; Kati, Abdelkarim; Schneider, Thomas; Treiber, Amos
Proceedings of the 2024 on Cloud Computing Security Workshop (CCSW '24), p.15-28
[Conference Proceedings]
Investigating Voter Perceptions of Printed Physical Audit Trails for Online Voting
Marky, Karola; Gerber, Nina; Krumb, Henry John; Khamis, Mohamed; Mühlhäuser, Max
2024 IEEE Symposium on Security and Privacy (SP), p.3458-3477
[Conference Proceedings]
Practitioners’ Corner ∙ How Effectively Do Consent Notices Inform Users About the Risks to Their Fundamental Rights?
Grassl, Paul; Gerber, Nina; Max, von Grafenstein
European Data Protection Law Review, p.96-104
[Journal Article]
Of Mothers and Managers – The Effect of Videos Depicting Gender Stereotypes on Women and Men in the Security and Privacy Field
Gerber, Nina; Stöver, Alina; Mayer, Peter
Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), p.547-566
[Conference Proceedings]
Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users
Koisser, David; Mitev, Richard; Chilese, Marco; Sadeghi, Ahmad-Reza
Proceedings: 45th IEEE Symposium on Security and Privacy - SP 2024
[Conference Proceedings]
One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices
Chilese, Marco; Mitev, Richard; Orenbach, Meni; Thorburn, Robert; Atamli, Ahmad; Sadeghi, Ahmad-Reza
Proceedings: 45th IEEE Symposium on Security and Privacy - SP 2024
[Conference Proceedings]
FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning
Fereidooni, Hossein; Pegoraro, Alessandro; Rieger, Phillip; Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2024
[Conference Proceedings]
CrowdGuard: Federated Backdoor Detection in Federated Learning
Rieger, Phillip; Krauß, Torsten; Miettinen, Mark; Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2024
[Conference Proceedings]
The Committing Security of MACs with Applications to Generic Composition
Bhaumik, Ritam; Chakraborty, Bishwajit; Choi, Wonseok; Dutta, Avijit; Govinden, Jérôme; Shen, Yaobin
44th Annual International Cryptology Conference (CRYPTO 2024)
[Conference Proceedings]
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
Fischlin, Marc; Günther, Felix; Janson, Christian
Journal of Cryptology
[Journal Article]
SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields
Degabriele, Jean Paul; Gilcher, Jan; Govinden, Jérôme; Paterson, Kenneth G.
2024 IEEE Symposium on Security and Privacy (SP)
[Conference Proceedings]
A Novel Design Flow for a Security-Driven Synthesis of Side-Channel Hardened Cryptographic Modules
Huss, Sorin; Stein, Oliver
Journal of Low Power Electronics and Applications
[Journal Article]