Publications
Publications
Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge
Fischlin, Marc; Rohrbach, Felix
Public-Key Cryptography - PKC 2021, p.205-234
[Conference Proceedings]
HERA: Hotpatching of Embedded Real-time Applications
Niesler, Christian; Surminski, Sebastian; Davi, Lucas
Proc. of 28th Network and Distributed System Security Symposium (NDSS 2021)
[Conference Proceedings]
The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions
Zimmermann, Verena; Renaud, Karen
ACM Transactions on Computer-Human Interaction, p.7:1-7:45
[Journal Article]
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation
Patra, Arpita; Schneider, Thomas; Suresh, Ajith; Yalame, Mohammad Hossein
30th USENIX Security Symposium (USENIX Security 21), p.2165-2182
[Conference Proceedings]
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers
Hagen, Christoph; Weinert, Christian; Sendner, Christoph; Dmitrienko, Alexandra; Schneider, Thomas
28. Annual Network and Distributed System Security Symposium (NDSS'21)
[Conference Proceedings]
Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK
Oesch, Sean; Abu-Salma, Ruba; Krämer, Juliane; Wu, Justin; Diallo, Oumar; Ruoti, Scott
Annual Computer Security Applications Conference (ACSAC 2020)
[Conference Proceedings]
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation
Mantel, Heiko; Scheidel, Lukas; Schneider, Thomas; Weber, Alexandra; Weinert, Christian; Weißmantel, Tim
19. International Conference on Cryptology And Network Security (CANS'20)
[Conference Proceedings]
CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs
Krüger, Stefan; Ali, Karim; Bodden, Eric
International Symposium on Code Generation and Optimization
[Conference Proceedings]
V0LTpwn: Attacking x86 Processor Integrity from Software
Kenjar, Zijo; Frassetto, Tommaso; Gens, David; Franz, Michael; Sadeghi, Ahmad-Reza
arXiv
[Conference Proceedings]
Fuzzy Asymmetric Password-Authenticated Key Exchange
Erwig, Andreas; Hesse, Julia; Orlt, Maximilian; Riahi, Siavash
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020)
[Conference Proceedings]
CryptoSPN: Privacy-preserving Sum-Product Network Inference
Treiber, Amos; Molina, Alejandro; Weinert, Christian; Schneider, Thomas; Kersting, Kristian
24th European Conference on Artificial Intelligence (ECAI'20)
[Conference Proceedings]
Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications
Javadi, Mohammad; Yalame, Mohammad Hossein; Mahdiani, Hamid Reza
Transactions on Computers
[Journal Article]
Enclave Computing on RISC-V: A Brighter Future for Security?
Dessouky, Ghada; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020
[Conference Proceedings]
Efficient and Scalable Universal Circuits
Alhassan, Masaud Y.; Günther, Daniel; Kiss, Ágnes; Schneider, Thomas
Journal of Cryptology (JoC)
[Journal Article]
Secure Two-Party Computation in a Quantum world
Büscher, Niklas; Demmler, Daniel; Karvelas, Nikolaos; Katzenbeisser, Stefan; Krämer, Juliane; Rathee, Deevashwer; Schneider, Thomas; Struck, Patrick
18th International Conference on Applied Cryptography and Network Security (ACNS'20)
[Conference Proceedings]
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference
Boemer, Fabian; Cammarota, Rosario; Demmler, Daniel; Schneider, Thomas; Yalame, Hossein
PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, p.43-45
[Conference Proceedings]
Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming
Alber, Gernot; Sauer, Alexander
Cryptography
[Journal Article]
Mobile Resilience: Designing Mobile Interactive Systems for Societal and Technical Resilience
Reuter, Christian; Kaufhold, Marc-André; Comes, Tina; Knodt, Michèle; Mühlhäuser, Max
Mobile HCI 2020: Expanding the Horizon of Mobile Interaction
[Conference Proceedings]
Towards Secure Urban Infrastructures: Cyber Security Challenges to Information and Communication Technology in Smart Cities
Reuter, Christian; Haunschild, Jasmin; Hollick, Matthias; Mühlhäuser, Max; Vogt, Joachim; Kreutzer, Michael
Mensch und Computer 2020 - Workshopband
[Conference Proceedings]
Security and Privacy Awareness in Smart Environments – A Cross-Country Investigation
Kulyk, Oksana; Reinheimer, Benjamin; Aldag, Lukas; Mayer, Peter; Gerber, Nina; Volkamer, Melanie
Financial Cryptography and Data Security, p.84-101
[Conference Proceedings]
Signatures from Sequential-OR Proofs
Fischlin, Marc; Harasser, Patrick; Janson, Christian
Advances in Cryptology - EUROCRYPT 2020, p.212-244
[Conference Proceedings]
IoT Dataset Generation Framework for Evaluating Anomaly Detection Mechanisms
Meyer-Berg, Andreas; Egert, Rolf; Böck, Leon; Mühlhäuser, Max
ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and Security
[Conference Proceedings]
Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources
Nikolopoulos, Georgios M.; Fischlin, Marc
Cryptography
[Journal Article]
Security Reductions for White-Box Key-Storage in Mobile Payments
Bock, Estuardo Alpirez; Brzuska, Chris; Fischlin, Marc; Janson, Christian; Michiels, Wil
Advances in Cryptology - ASIACRYPT 2020, p.221-252
[Conference Proceedings]
An Overview of the Botnet Simulation Framework
Böck, Leon; Shankar, Karuppayah; Mühlhäuser, Max; Emmanouil, Vasilomanolakis
The Journal on Cybercrime & Digital Investigations, p.1-10
[Journal Article]
Control Behavior Integrity for Distributed Cyber-Physical Systems
Adepu, Sridhar; Brasser, Ferdinand; Garcia, Luis; Rodler, Michael; Davi, Lucas; Sadeghi, Ahmad-Reza; Zonouz, Saman A.
2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS), p.1-15
[Conference Proceedings]
Benefits of formalized computational modeling for understanding user behavior in online privacy research
Schürmann, Tim; Gerber, Nina; Gerber, Paul
Journal of Intellectual Capital, p.431-458
[Journal Article]
Has the GDPR hype affected users’ reaction to cookie disclaimers?
Kulyk, Oksana; Gerber, Nina; Hilt, Annika; Volkamer, Melanie
Journal of Cybersecurity
[Journal Article]
LegIoT: Ledgered Trust Management Platform for IoT
Neureither, Jens; Dmitrienko, Alexandra; Koisser, David; Brasser, Ferdinand; Sadeghi, Ahmad-Reza
Computer Security - ESORICS 2020, p.377-396
[Conference Proceedings]