Publications
Publications
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt
Braun, Kristoffer; Budurushi, Jurlind; Volkamer, Melanie
INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, p.752 - 766
[Conference Proceedings]
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs
Bernhard, David; Neumann, Stephan; Volkamer, Melanie
4th International Conference on e-Voting and Identity (VoteID13), p.176 - 192
[Conference Proceedings]
The Transitivity-of-Trust Problem in Android Application Interaction
Bartsch, Steffen; Berger, Bernhard; Bunke, Michaela; Sohr, Karsten
8th International Conference on Availability, Reliability and Security (ARES 2013), p.291 - 296
[Conference Proceedings]
How to enable Live Cloning of Virtual Machines using the Xen Hypervisor
Tews, Erik
[Report]
Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same
Snow, Kevin; Davi, Lucas; Dmitrienko, Alexandra; Liebchen, Christopher; Monrose, Fabian; Sadeghi, Ahmad-Reza
BlackHat USA
[Conference Proceedings]
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs
Oren, Yossef; Sadeghi, Ahmad-Reza; Wachsmann, Christian
Workshop on Cryptographic Hardware and Embedded Systems (CHES), p.107-125
[Conference Proceedings]
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis
Octeau, Damien; McDaniel, Patrick; Jha, Somesh; Bartel, Alexandre; Bodden, Eric; Klein, Jacques; Le Traon, Yves
Proceedings of the 22nd USENIX Conference on Security, p.543-558
[Conference Proceedings]
ConXsense – Context Sensing for Adaptive Usable Access Control
Miettinen, Markus; Heuser, Stephan; Kronz, Wiebke; Sadeghi, Ahmad-Reza; Asokan, N.
[Report]
Sichere Nutzung von Cloud-Speicherdiensten
Kalabis, Lukas; Wolf, Ruben; Kunz, Thomas
Datenschutz und Datensicherheit, p.512-516
[Journal Article]
Improvement and Efficient Implementation of a Lattice-based Signature Scheme
Bansarkhani, Rachid El; Buchmann, Johannes
Selected Areas in Cryptography 2013 (SAC'13), p.48-67
[Conference Proceedings]
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies
Bugiel, Sven; Heuser, Stephan; Sadeghi, Ahmad-Reza
22nd USENIX Security Symposium (USENIX Security '13)
[Conference Proceedings]
Are Graphical Authentication Mechanisms As Strong As Passwords?
Renaud, Karen; Mayer, Peter; Volkamer, Melanie; Maguire, Joseph
Federated Conference on Computer Science and Information Systems 2013, p.837-844
[Conference Proceedings]
Modeling the German Legal Latitude Principles
Neumann, Stephan; Kahlert, Anna; Henning, Maria; Richter, Philipp; Jonker, Hugo; Volkamer, Melanie
5th International Conference on eParticipation (ePart 2013), p.49-56
[Conference Proceedings]
Limiting MitM to MitE Covert-Channels
Herzberg, Amir; Shulman, Haya
2013 International Conference on Availability, Reliability and Security, p.236-241
[Conference Proceedings]
Personal Information Dashboard: Putting the Individual Back in Control
Buchmann, Johannes; Nebel, Maxi; Roßnagel, Alexander; Shirazi, Fatemeh; Simo, Hervais; Waidner, Michael
Digital Enlightenment Yearbook 2013, p.139-164
[Book]
Revocation & Non-Repudiation: When the first destroys the latter
Braun, Johannes; Kiefer, Franziskus; Hülsing, Andreas
Public Key Infrastructures, Services and Applications - EuroPKI 2013, p.31-46
[Conference Proceedings]
How Long Are You Staying? Predicting Residence Time from Human Mobility Traces
Baumann, Paul; Kleiminger, Wilhelm; Santini, Silvia
The 19th Annual International Conference on Mobile Computing and Networking, p.231-233
[Conference Proceedings]
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions
Bartsch, Steffen; Volkamer, Melanie
RiskKom-Workshop, INFORMATIK 2013, p.1971-1984
[Conference Proceedings]
Code based Identification and Signature Schemes in Software
Yousfi Alaoui, Sidi Mohamed el; Bansarkhani, Rachid El; Cayrel, Pierre-Louis; Hoffmann, Gerhard
Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013
[Conference Proceedings]
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets
Stancill, Blaine; Snow, Kevin; Otterness, Nathan; Monrose, Fabian; Davi, Lucas; Sadeghi, Ahmad-Reza
16th Research in Attacks, Intrusions and Defenses (RAID) Symposium
[Conference Proceedings]
HbbTV: Neue Funktionen mit möglichen Nebenwirkungen
Ghiglieri, Marco; Oswald, Florian; Tews, Erik
FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, p.563-566
[Conference Proceedings]
Mental Models – General Introduction and Review of Their Application to Human-Centred Security
Volkamer, Melanie; Renaud, Karen
Number Theory and Cryptography, p.255-280
Security analysis of a widely deployed locking system
Tews, Erik; Weiner, M.; Massar, M.; Giese, D.; Wieser, W.
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, p.929-940
[Journal Article, Conference Proceedings]
Bita: Coverage-Guided, Automatic Testing of Actor Programs
Tasharofi, Samira; Pradel, Michael; Lin, Yu; Johnson, Ralph
2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE), p.114-124
[Conference Proceedings]
PoWerStore: Proofs of Writing for Efficient and Robust Storage
Dobre, Dan; Karame, Ghassan O.; Li, Wenting; Majuntke, Matthias; Suri, Neeraj; Vukolic, Marko
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, p.285-298
[Conference Proceedings]
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones
Demmler, Daniel; Schneider, Thomas; Zohner, Michael
19th Crypto-Day
[Conference Proceedings]
Schutzmaßnahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglichkeiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps
Bodden, Eric; Rasthofer, Siegfried; Richter, Philipp; Roßnagel, Alexander
Datenschutz und Datensicherheit, p.720 - 725
[Journal Article]
A Security Framework for Analysis and Design of Software Attestation
Armknecht, Frederik; Sadeghi, Ahmad-Reza; Schulz, Steffen; Wachsmann, Christian
ACM Conference on Computer and Communications Security (CCS), p.1-12
[Conference Proceedings]
On the Efficacy of Solving LWE by Reduction to Unique-SVP
Albrecht, Martin; Fitzpatrick, Robert; Göpfert, Florian
ICISC 2013
[Conference Proceedings]
Assured Cloud-Based Data Analysis with ClusterBFT
Stephen, Julian James; Eugster, Patrick
Middleware 2013. ACM/IFIP/USENIX 14th International Middleware Conference. Proceedings, p.82-102
[Conference Proceedings]