Publications
Publications
Leakage-Resilient Layout Randomization for Mobile Devices
Braden, Kjell; Crane, Stephen; Davi, Lucas; Franz, Michael; Larsen, Per; Liebchen, Christopher; Sadeghi, Ahmad-Reza
23rd Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]
Remanence Decay Side-Channel: The PUF Case
Zeitouni, Shaza; Oren, Yossef; Wachsmann, Christian; Koeberl, Patrick; Sadeghi, Ahmad-Reza
IEEE Transactions on Information Forensics and Security
[Journal Article]
Security in Industrie 4.0 - Challenges and Solutions for the Fourth Industrial Revolution
Waidner, Michael; Kasper, Michael
DATE 2016 (Design, Automation and Test in Europe)
[Conference Proceedings]
The Cybersecurity Landscape in Industrial Control Systems
McLaughlin, Stephen; Konstantinou, Charalambos; Wang, Xueyang; Davi, Lucas; Sadeghi, Ahmad-Reza; Maniatakos, Michail; Karri, Ramesh
Proceedings of the IEEE, p.1039-1057
[Journal Article]
BASEL (Buffer mAnagement SpEcification Language)
Kogan, Kirill; Menikkumbura, Danushka; Petri, Gustavo; Noh, Youngtae; Nikolenko, Sergey I.; Eugster, Patrick
ANCS '16 Proceedings of the 2016 Symposium on Architectures for Networking and Communications Systems, p.69-74
[Conference Proceedings]
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology
Gutmann, Andreas; Renaud, Karen; Maguire, Joseph; Mayer, Peter; Volkamer, Melanie; Matsuura, Kanta; Müller-Quade, Jörn
2016 IEEE European Symposium on Security and Privacy (EuroS&P), p.357-371
[Conference Proceedings]
On the Hardness of Proving CCA-Security of Signed ElGamal
Bernhard, David; Fischlin, Marc; Warinschi, Bogdan
Public-Key Cryptography - PKC 2016, p.24
[Conference Proceedings]
Quantum simulation of the dynamical Casimir effect with trapped ions
Trautmann, Nils; Hauke, Philipp
New Journal of Physics
[Journal Article]
An Analysis of OpenSSL's Random Number Generator
Strenzke, Falko
Advances in Cryptology – EUROCRYPT 2016. 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, p.644-669
[Conference Proceedings]
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Ray-tracing
Steinmetzer, Daniel; Classen, Jiska; Hollick, Matthias
Millimeter-wave Networking Workshop (mmNet 2016)
[Journal Article]
Exploring Millimeter-Wave Network Scenarios with Ray-tracing based Simulations in mmTrace
Steinmetzer, Daniel; Classen, Jiska; Hollick, Matthias
IEEE Infocom 2016 Poster Presentation (Infocom'16 Posters)
[Conference Proceedings]
Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure
Shulman, Haya; Waidner, Michael
In Traffic Monitoring and Analysis (TMA)
[Conference Proceedings]
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT
Rauzy, Pablo; Kiss, Ágnes; Krämer, Juliane; Seifert, Jean-Pierre
Constructive Side-Channel Analysis and Secure Design - 7. International Workshop (COSADE'16), p.111-129
[Conference Proceedings]
Privacy Friendly Apps-Making Developers Aware of Privacy Violations
Marky, Karola; Gutmann, Andreas; Rack, Philipp; Volkamer, Melanie
1st International Workshop on Innovations in Mobile Privacy and Security, p.46-48
[Conference Proceedings]
An Investigation into the Usability of Electronic Voting Systems for Complex Elections
Budurushi, Jurlind; Reanaud, Karen; Volkamer, Melanie; Woide, Marcel
Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, p.309-322
[Journal Article]
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack
Buchmann, Johannes; Göpfert, Florian; Player, Rachel; Wunderer, Thomas
International Conference on Cryptology AFRICACRYPT 2016
[Conference Proceedings]
Privately and Publicly Verifiable Computing Techniques
Buchmann, Johannes; Demirel, Denise; Schabhüser, Lucas
[Book]
Cooperative quantum electrodynamical processes in an ellipsoidal cavity
Alber, Gernot; Trautmann, Nils
Journal of Physics: Conference Series
[Journal Article]
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation
Akleylek, Sedat; Bindel, Nina; Buchmann, Johannes; Krämer, Juliane; Marson, Giorgia Azzurra
International Conference on Cryptology AFRICACRYPT 2016, p.10
[Conference Proceedings]
Identifying and Utilizing Dependencies Across Cloud Security Services
Taha, Ahmed; Metzler, Patrick; Trapero, Ruben; Luna, Jesus; Suri, Neeraj
ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, p.329-340
[Conference Proceedings]
Performance issues and optimizations in JavaScript: an empirical study
Selakovic, Marija; Pradel, Michael
ICSE '16 Proceedings of the 38th International Conference on Software Engineering, p.61-72
[Conference Proceedings]
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung
Schochlow, Verena; Neumann, Stephan; Braun, Kristoffer; Volkamer, Melanie
Datenschutz und Datensicherheit, p.295-299
[Conference Proceedings]
Liquido: Embedding Liquids into 3D Printed Objects to Sense Tilting and Motion
Schmitz, Martin; Leister, Andreas; Dezfuli, Niloofar; Riemann, Jan; Müller, Florian; Mühlhäuser, Max
Proceedings of the 34rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, p.2688-2696
[Conference Proceedings]
Debugging for reactive programming
Salvaneschi, Guido; Mezini, Mira
ICSE '16 Proceedings of the 38th International Conference on Software Engineering, p.796-807
[Conference Proceedings]
Jumping through hoops: why do Java developers struggle with cryptography APIs?
Nadi, Sarah; Krüger, Stefan; Mezini, Mira; Bodden, Eric
ICSE '16 Proceedings of the 38th International Conference on Software Engineering, p.935-946
[Conference Proceedings]
"Jumping Through Hoops" Why do Java Developers Struggle With Cryptography APIs?
Nadi, Sarah; Krüger, Stefan; Mezini, Mira; Bodden, Eric
International Conference on Software Engineering
[Conference Proceedings]
Nomen est Omen: Exploring and Exploiting Similarities between Argument and Parameter Names
Liu, Hui; Liu, Qiurong; Staicu, Cristian-Alexandru; Pradel, Michael; Luo, Yue
ICSE '16 Proceedings of the 38th International Conference on Software Engineering, p.1063-1073
[Conference Proceedings]
Valiant's Universal Circuit is Practical
Kiss, Ágnes; Schneider, Thomas
35. Advances in Cryptology -- EUROCRYPT 2016, p.699-728
[Conference Proceedings]
BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets
Karuppayah, Shankar; Vasilomanolakis, Emmanouil; Haas, Steffen; Fischer, Mathias; Mühlhäuser, Max
2016 IEEE International Conference on Communications
[Conference Proceedings]
HbbTV Security and Privacy: Issues and Challenges
Ghiglieri, Marco; Waidner, Michael
>IEEE Security & Privacy, p.pp. 61-67
[Journal Article]