Publications
Publications
Redactable Graph Hashing, Revisited
Erwig, Andreas; Fischlin, Marc; Hald, Martin; Helm, Dominik; Kiel, Robert; Kübler, Florian; Kümmerlin, Michael; Laenge, Jakob; Rohrbach, Felix
ACISP 2017
[Conference Proceedings]
Just-in-Time Static Analysis
Nguyen Quang Do, Lisa; Ali, Karim; Livshits, Benjamin; Bodden, Eric; Smith, Justin; Murphy-Hill, Emerson
Proceedings of ISSTA ’17, p.447
[Conference Proceedings]
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks
Demmler, Daniel; Holz, Marco; Schneider, Thomas
15. International Conference on Applied Cryptography and Network Security (ACNS'17)
[Conference Proceedings]
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering
Büscher, Niklas; Boukoros, Spyros; Bauregger, Stefan; Katzenbeisser, Stefan
Proceedings on Privacy Enhancing Technologies, p.118-134
[Conference Proceedings]
Long-Term Secure Commitments via Extractable-Binding Commitments
Buldas, Ahto; Geihs, Matthias; Buchmann, Johannes
ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy
[Conference Proceedings]
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications
Anagnostopoulos, Nikolaos Athanasios; Schaller, André; Fan, Yufan; Xiong, Wenjie; Tehranipoor, Fatemeh; Arul, Tolga; Gabmeyer, Sebastian; Szefer, Jakub; Chandy, John A.; Katzenbeisser, Stefan
26th Crypto-Day
[Conference Proceedings]
Compilation for Secure Multi-party Computation
Büscher, Niklas; Katzenbeisser, Stefan
[Book]
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems
Traverso, Giulia; Garcia Cordero, Carlos; Nojoumian, Mehrdad; Azarderakhsh, Reza; Demirel, Denise; Habib, Sheikh Mahbub; Buchmann, Johannes
15th Annual Conference on Privacy, Security and Trust (PST)
[Conference Proceedings]
The Day the Cryptography Dies
Mulholland, John; Mosca, Michele; Braun, Johannes
IEEE Security & Privacy, p.14-21
[Journal Article]
Reliable Behavioural Factors in the Information Security Context
Mayer, Peter; Kunz, Alexandra; Volkamer, Melanie
International Conference on Availability, Reliability and Security
[Conference Proceedings]
Advancing Trust Visualisations for Wider Applicability and User Acceptance
Kulyk, Oksana; Reinheimer, Benjamin; Gerber, Paul; Volk, Florian; Volkamer, Melanie; Mühlhäuser, Max
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), p.562-569
[Conference Proceedings]
Microblogging in a Privacy-Preserving way
Karvelas, Nikolaos; Senftleben, Marius; Katzenbeisser, Stefan
ARES 2017 - 12th International Conference on Availability, Reliability and Security
[Conference Proceedings]
A Formal Treatment of Multi-key Channels
Günther, Felix; Mazaheri, Sogol
CRYPTO 2017 - 37th International Cryptology Conference
[Conference Proceedings]
Hash-Based Signatures: State of Play
Butin, Denis
IEEE Security & Privacy, p.37-43
[Journal Article]
Postquantum Cryptography - State of the Art
Buchmann, Johannes; Lauter, Kristin; Mosca, Michele
IEEE Security & Privacy, p.12-13
[Journal Article]
PRF-ODH: Relations, Instantiations, and Impossibility Results
Brendel, Jacqueline; Fischlin, Marc; Günther, Felix; Janson, Christian
CRYPTO 2017 - 37th International Cryptology Conference, p.651-681
[Conference Proceedings]
Software Grand Exposure: SGX Cache Attacks Are Practical
Brasser, Ferdinand; Müller, Urs; Dmitrienko, Alexandra; Kostiainen, Kari; Capkun, Srdjan; Sadeghi, Ahmad-Reza
11th USENIX Workshop on Offensive Technologies
[Conference Proceedings]
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory
Brasser, Ferdinand; Davi, Lucas; Gens, David; Liebchen, Christopher; Sadeghi, Ahmad-Reza
26th USENIX Security Symposium
[Conference Proceedings]
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme
Bernhard, David; Kulyk, Oksana; Volkamer, Melanie
12th International Conference on Availability, Reliability and Security - ARES 2017, p.1-10
[Conference Proceedings]
MCMix: Anonymous Messaging via Secure Multiparty Computation
Alexopoulos, Nikolaos; Kiayias, Aggelos; Talviste, Riivo; Zacharias, Thomas
26th USENIX Security Symposium, p.1217-1234
[Conference Proceedings]
Beyond the Hype: On Using Blockchains in Trust Management for Authentication
Alexopoulos, Nikolaos; Daubert, Jörg; Mühlhäuser, Max; Habib, Sheikh Mahbub
IEEE Trustcom, p.546-553
[Conference Proceedings]
Promoting secure Email communication and authentication
Zimmermann, Verena; Henhapl, Birgit; Gerber, Nina; Enzmann, Matthias
Mensch und Computer 2017 - Workshopband: Spielend einfach integrieren, p.269-277
[Conference Proceedings]
Formal Analysis of V2X Revocation Protocols
Whitefield, Jorden; Chen, Liqun; Kargl, Frank; Paverd, Andrew; Schneider, Steve; Treharne, Helen; Wesemeyer, Stephan
Security and Trust Management _ 13th International Workshop, STM 2017, Proceedings
[Conference Proceedings]
Using Oblivious RAM in Genomic Studies
Karvelas, Nikolaos; Peter, Andreas; Katzenbeisser, Stefan
DPM 2017 - Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops
[Conference Proceedings]
SensorBuster: On Identifying Sensor Nodes in P2P Botnets
Karuppayah, Shankar; Böck, Leon; Grube, Tim; Manickam, Selvakumar; Mühlhäuser, Max; Fischer, Mathias
International Conference on Availability, Reliability and Security (ARES), p.1-6
[Conference Proceedings]
Cover Traffic: A Trade of Anonymity and Efficiency
Grube, Tim; Thummerer, Markus; Daubert, Jörg; Mühlhäuser, Max
Security and Trust Management. STM 2017., p.213-223
[Conference Proceedings]
Security vs. privacy? User preferences regarding text passwords and biometric authentication.
Gerber, Nina; Zimmermann, Verena
Mensch und Computer 2017 - Workshopband: Spielend einfach integrieren, 10.-13. September 2017, Regensburg, p.279-287
[Conference Proceedings]
Constrained PET Composition for Measuring Enforced Privacy
Funke, Sebastian; Wiesmaier, Alexander; Daubert, Jörg
Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), p.1-10
[Conference Proceedings]
Survey and Systematization of Secure Device Pairing
Fomichev, Mikhail; Álvarez, Flor; Steinmetzer, Daniel; Gardner-Stephen, Paul; Hollick, Matthias
IEEE Communications Surveys & Tutorials, p.517-550
[Journal Article]
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit
Fereidooni, Hossein; Classen, Jiska; Spink, Tom; Patras, Paul; Miettinen, Markus; Sadeghi, Ahmad-Reza; Hollick, Matthias; Conti, Mauro
Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
[Conference Proceedings]