Publications

Publications

112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen
Kaufhold, Marc-André; Rupp, Nicola; Reuter, Christian; Amelunxen, Christoph; Cristaldi, Massimo
Proceedings of the European Conference on Information Systems (ECIS) 2018
[Conference Proceedings]


Business Continuity Management in Micro Enterprises: Perception, Strategies, and Use of ICT
Kaufhold, Marc-André; Riebe, Thea; Reuter, Christian; Hester, Julian; Jeske, Danny; Knüver, Lisa; Richert, Viktoria
International Journal of Information Systems for Crisis Response and Management, p.1-19
[Journal Article]


Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland
Kaufhold, Marc-André; Grinko, Margarita; Reuter, Christian; Schorch, Marén; Langer, Amanda; Skudelny, Sascha; Hollick, Matthias
Tagungsband WI 2019 : Human Practice. Digital Ecologies. Our Future., p.1054-1068
[Conference Proceedings]


SoK: Cryptanalysis of encrypted search with LEAKER - a framework for LEakage AttacK Evaluation on Real-world data
Kamara, Seny; Kat, Abdelkarim; Moataz, Tarik; Schneider, Thomas; Treiber, Amos; Yonli, Michael
7th IEEE European Symposium on Security and Privacy (EuroS&P'22)
[Conference Proceedings]


Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System
Heinrich, Alexander; Stute, Milan; Kornhuber, Tim; Hollick, Matthias
The 21st Privacy Enhancing Technologies Symposium
[Conference Proceedings]


PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Heinrich, Alexander; Hollick, Matthias; Schneider, Thomas; Stute, Milan; Weinert, Christian
Proceedings of the 30th USENIX Security Symposium, p.3577-3594
[Conference Proceedings]


TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter
Hartwig, Katrin; Reuter, Christian
Tagungsband WI 2019 : Human Practice. Digital Ecologies. Our Future., p.1844-1855
[Conference Proceedings]


FedCRI: Federated Mobile Cyber-Risk Intelligence
Fereidooni, Hossein; Dmitrienko, Alexandra; Rieger, Phillip; Miettinen, Markus; Sadeghi, Ahmad-Reza; Madlener, Felix
Network and Distributed Systems Security (NDSS) Symposium 2022
[Conference Proceedings]


The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community
Carvalho, Aparecido Fabiano Pinatti de; Saeed, Saqib; Reuter, Christian; Wulf, Volker
International reports on socio-informatics, p.41-47
[Journal Article]


Usability stumm geschaltet? Usable Security und Privacy in Videokonferenzsystemen
Balthasar, Mandy; Gerber, Nina; Schmitt, Hartmut
Mensch und Computer 2021 - Usability Professionals
[Conference Proceedings]


AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices
Heinrich, Alexander; Bittner, Niklas; Hollick, Matthias
WiSec '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.26-38
[Conference Proceedings]


WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens
Jiang, Yan; Ji, Xiaoyu; Wang, Kai; Yan, Chen; Mitev, Richard; Sadeghi, Ahmad-Reza; Xu, Wenyuan
Proceedings: 43rd IEEE Symposium on Security and Privacy (SP 2022), p.984-1001
[Conference Proceedings]


GhostTouch: Targeted Attacks on Touchscreens without Physical Touch
Wang, Kai; Mitev, Richard; Yan, Chen; Ji, Xiaoyu; Sadeghi, Ahmad-Reza; Xu, Wenyuan
Proceedings of the 31st USENIX Security Symposium
[Conference Proceedings]


The Nerd Factor: The Potential of S&P Adepts to Serve as a Social Resource in the User’s Quest for More Secure and Privacy-Preserving Behavior
Gerber, Nina; Marky, Karola
Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), p.57-76
[Conference Proceedings]


Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M
Sadeghi, Ahmad-Reza; Mitev, Richard; Saß, Marvin
25th Black Hat USA
[Conference Proceedings]


An Attack on Facial Soft-biometric Privacy Enhancement
Osorio-Roig, D.; Rathgeb, C.; Drozdowski, P; Terhörst, P.; Štruc, V.; Busch, C.
Trans. on Biometrics, Behavior, and Identity Science (TBIOM)
[Journal Article]


Are Average Faces Master Faces?
Dörsch, André; Rathgeb, Christian; Ibsen, Mathias; Busch, Christoph
Proc. Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]


Towards a maturity model for crypto-agility asessment — long preprint
Hohm, J.; Heinemann, A.; Wiesmaier, A.


$crypto_lib$: Comparing and Selecting Cryptography Libraries (long version of EICC 2022 publication)
Wohlwender, Jan; Huesmann, Rolf; Heinemann, Andreas; Wiesmaier, Alexander


$crypto_lib$: Comparing and Selecting Cryptography Libraries
Wohlwender, Jan; Huesmann, Rolf; Heinemann, Andreas; Wiesmaier, Alexander
Accepted at European Interdisciplinary Cybersecurity Conference (EICC 22)
[Conference Proceedings]


ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering
Zelle, Daniel; Plappert, Christian; Rieke, Roland; Scheuermann, Dirk; Krauß, Christoph
Microprocessors and Microsystems, Vol.90, p.104461
[Journal Article]


Decision Tree-Based Rule Derivation for Intrusion Detection in Safety-Critical Automotive Systems
Buschlinger, Lucas; Rieke, Roland; Sarda, Sanat; Krauß, Christoph
2022 30th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), p.246-254
[Conference Proceedings]


Integrating Privacy into the Electric Vehicle Charging Architecture
Kern, Dustin; Lauser, Timm; Krauß, Christoph
Proceedings on Privacy Enhancing Technologies, Vol.2022, p.140-158
[Journal Article]


On the State of Crypto Agility
Alnahawi, N.; Schmitt, N.; Wiesmaier, A.; Heinemann, A.; Graßmeyer, T.
18. Deutscher IT-Sicherheitskongress, p.103-126
[Conference Proceedings]


Towards a maturity model for crypto-agility assessment
Hohm, Julian; Heinemann, Andreas; Wiesmaier, Alexander
CoRR, Vol.abs/2202.07645
[Journal Article]


Face Morphing Attack Detection Methods
Scherhag, U.; Rathgeb, C.; Busch, C.
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, p.331-349


Future Trends in Digital Face Manipulation and Detection
Tolosana, Ruben; Rathgeb, Christian; Vera-Rodriguez, Ruben; Busch, Christoph; Verdoliva, Luisa; Lyu, Siwei; others
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, p.463-482


Psychophysical Evaluation of Human Performance in Detecting Digital Face Image Manipulations
Nichols, R.; Rathgeb, C.; Drozdowski, P.; Busch, C.
IEEE Access, Vol.10, p.31359-31376
[Journal Article]


Signal-level fusion for indexing and retrieval of facial biometric data
Drozdowski, P.; Stockhardt, F.; Rathgeb, C.; Busch, C.
IET Biometrics, Vol.11, p.1-16
[Journal Article]


Improved Homomorphically Encrypted Biometric Identification Using Coefficient Packing
Bauspieß, P.; Olafsson, J.; Kolberg, J.; Drozdowski, P.; Rathgeb, C.; Busch, C.
Proc. Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]