Publications

Publications

Data Acquisition on a Large Darknet Marketplace
Yannikos, York; Heeger, Julian; Steinebach, Martin
International Conference on Availability, Reliability and Security 2022
[Conference Paper]


Fraunhofer SIT at CheckThat! 2022: Semi-Supervised Ensemble Classification for Detecting Check-Worthy Tweets
Frick, Raphael Antonius; Vogel, Inna; Nunes Grieser, Isabella
Conference and Labs of the Evaluation Forum 2022
[Conference Paper]


Fraunhofer SIT at CheckThat! 2022: Ensemble Similarity Estimation for Finding Previously Fact-Checked Claims
Frick, Raphael Antonius; Vogel, Inna
Conference and Labs of the Evaluation Forum 2022
[Conference Paper]


An Unorthodox Approach for Style Change Detection
Graner, Lukas; Ranly, Paul
Conference and Labs of the Evaluation Forum 2022
[Conference Paper]


Recht und Technik - Datenschutz im Diskurs
Grimm, Rüdiger; Hornung, Gerrit; Sorge, Christoph; Spiecker Genannt Doehmann, Indra
Gesellschaft für Informatik (Jahrestagung) 2022
[Conference Paper]


Technologie- und Securityprognose System Bahn - Bedrohungen rechtzeitig erkennen
Heinrich, Markus; Iffländer, Lukas; Scheuermann, Dirk; Katzenbeißer, Stefan; Unger, Simon
[Journal Article]


ML-basierte Unterstützung von Lösch- und Aufbewahrungspflichten
Kunz, Thomas; Waldmann, Ulrich
[Journal Article]


Fraunhofer SIT@SMM4H’22: Learning to Predict Stances and Premises in Tweets related to COVID-19 Health Orders Using Generative Models
Frick, Raphael Antonius; Steinebach, Martin
Workshop on Social Media Mining for Health Applications 2022
[Conference Paper]


IT and more: Anonymisierung unstrukturierter Daten
Steinebach, Martin; Vogel, Inna
[Journal Article]


Behind the Scenes of RPKI
Hlavacek, Tomas; Jeitner, Philipp; Mirdita, Donika; Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security 2022
[Conference Paper]


Poster: Insights into Global Deployment of RPKI Validation
Shulman, Haya; Vogel, Niklas; Waidner, Michael
Conference on Computer and Communications Security 2022
[Conference Paper]


Poster: The Unintended Consequences of Algorithm Agility in DNSSEC
Heftrig, Elias; Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security 2022
[Conference Paper]


Poster: RPKI Kill Switch
Mirdita, Donika; Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security 2022
[Conference Paper]


Poster: DNS in Routers Considered Harmful
Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security 2022
[Conference Paper]


Security code smells in apps: are we getting better?
Arzt, Steven
European Software Engineering Conference 2022
[Conference Paper]


Auswahl cloudbasierter Dienste
Geissler, Ines; Pordesch, Ulrich; Selzer, Annika; Wilmer, Thomas
[Journal Article]


Sicherheits­heraus­forderungen für Smart-City-Infrastrukturen
Zimmermann, Verena; Haunschild, Jasmin; Unden, Marita; Gerber, Paul; Gerber, Nina
Wirtschaftsinformatik & Management, p.119-126
[Journal Article]


Disrupting Continuity of Apple’s Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi
Stute, Milan; Heinrich, Alexander; Lorenz, Jannik; Hollick, Matthias
Proceedings of the 30th USENIX Security Symposium, p.3917-3934
[Conference Proceedings]


DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection
Rieger, Phillip; Nguyen, Thien Duc; Miettinen, Markus; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2022
[Conference Proceedings]


Guest Editorial Preface: Special Issue on IT-Support for Crisis and Continuity Management
Reuter, Christian; Pottebaum, Jens
International Journal of Information Systems for Crisis Response and Management (IJISCRAM), p.v-viii
[Journal Article]


Soziale Medien und Apps in Notsituationen: Eine repräsentative Studie über die Wahrnehmung in Deutschland
Reuter, Christian; Kaufhold, Marc-André; Spielhofer, Thomas; Hahne, Anna Sophie
BBK Bevölkerungsschutz, p.22-24
[Journal Article]


Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps
Reuter, Christian; Kaufhold, Marc-André; Leopold, Inken; Knipp, Hannah
Proceedings of the 25th European Conference on Information Systems (ECIS), p.2187-2201
[Conference Proceedings]


Fake News Perception in Germany: A Representative Study of People's Attitudes and Approaches to Counteract Disinformation
Reuter, Christian; Hartwig, Katrin; Kirchner, Jan; Schlegel, Noah
Tagungsband WI 2019 : Human Practice. Digital Ecologies. Our Future., p.1069-1083
[Conference Proceedings]


FLAME: Taming Backdoors in Federated Learning
Nguyen, Thien Duc; Rieger, Phillip; Chen, Huili; Yalame, Mohammad Hossein; Möllering, Helen; Fereidooni, Hossein; Marchal, Samuel; Miettinen, Markus; Mirhoseini, Azalia; Zeitouni, Shaza; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza; Schneider, Thomas
Proceedings of the 31st USENIX Security Symposium, p.1415-1432
[Conference Proceedings]


112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen
Kaufhold, Marc-André; Rupp, Nicola; Reuter, Christian; Amelunxen, Christoph; Cristaldi, Massimo
Proceedings of the European Conference on Information Systems (ECIS) 2018
[Conference Proceedings]


Business Continuity Management in Micro Enterprises: Perception, Strategies, and Use of ICT
Kaufhold, Marc-André; Riebe, Thea; Reuter, Christian; Hester, Julian; Jeske, Danny; Knüver, Lisa; Richert, Viktoria
International Journal of Information Systems for Crisis Response and Management, p.1-19
[Journal Article]


Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland
Kaufhold, Marc-André; Grinko, Margarita; Reuter, Christian; Schorch, Marén; Langer, Amanda; Skudelny, Sascha; Hollick, Matthias
Tagungsband WI 2019 : Human Practice. Digital Ecologies. Our Future., p.1054-1068
[Conference Proceedings]


SoK: Cryptanalysis of encrypted search with LEAKER - a framework for LEakage AttacK Evaluation on Real-world data
Kamara, Seny; Kat, Abdelkarim; Moataz, Tarik; Schneider, Thomas; Treiber, Amos; Yonli, Michael
7th IEEE European Symposium on Security and Privacy (EuroS&P'22)
[Conference Proceedings]


Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System
Heinrich, Alexander; Stute, Milan; Kornhuber, Tim; Hollick, Matthias
The 21st Privacy Enhancing Technologies Symposium
[Conference Proceedings]


PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Heinrich, Alexander; Hollick, Matthias; Schneider, Thomas; Stute, Milan; Weinert, Christian
Proceedings of the 30th USENIX Security Symposium, p.3577-3594
[Conference Proceedings]