Publications

Publications

Attack Surface Assessment for Cybersecurity Engineering in the Automotive Domain
Plappert, C.; Zelle, D.; Gadacz, H.; Rieke, R.; Scheuermann, D.; Krauß, C.
International Conference on Parallel, Distributed and Network-Based Processing (PDP) 2021
[Conference Paper]


Machine Learning use case in manufacturing - an evaluation of the model's reliability from an IT security perspective
Cassoli Bretones, Beatriz; Ziegenbein, Amina; Metternich, Joachim; Dukanovic, Sinia; Hachenberger, Julien; Laabs, Martin
Conference on Manufacturing Systems (CMS) 2021
[Journal Article]


Secure Role and Rights Management for Automotive Access and Feature Activation
Plappert, Christian; Jäger, Lukas; Fuchs, Andreas
Asia Conference on Computer and Communications Security (ASIA CCS) 2021
[Conference Paper]


Microgrid Systems: Towards a Technical Performance Assessment Frame
Marchand, Sophie; Monsalve, Cristian; Reimann, Thorsten; Heckmann, Wolfram; Ungerland, Jakob; Lauer, Hagen; Ruhe, Stephan; Krauß, Christoph
[Journal Article]


Special session: Physical attacks through the chip backside: Threats, challenges, and opportunities
Amini, E.; Bartels, K.; Boit, C.; Eggert, M.; Herfurth, N.; Kiyan, T.; Krachenfels, T.; Seifert, J.-P.; Tajik, S.
VLSI Test Symposium (VTS) 2021
[Conference Paper]


Recognition of manual forest work for time on task recording
Dilger, Stefan
Annual Symposium on Electronic Imaging, Science and Technology 2021
[Journal Article]


Injection attacks reloaded: Tunnelling malicious payloads over DNS
Jeitner, Philipp; Shulman, Haya
USENIX Security Symposium 2021
[Conference Paper]


Comparison of Cyber Attacks on Services in the Clearnet and Darknet
Yannikos, York; Dang, Quang Anh; Steinebach, Martin
International Conference on Digital Forensics 2021
[Conference Paper]


Grösser Denken - Die Technologieprognose System Bahn 2050
Iffländer, Lukas; Buder, Thomas; Leining, Michael; Schubert, Max; Heinrich, Markus; Katzenbeißer, Stefan; Unger, Simon; Scheuermann, Dirk
[Journal Article]


Web server circuit, method and computer program for preventing parasite attacks
Shulman, Haya; Waidner, Michael
[Patent]


Improved throughput for All-or-Nothing Multicommodity Flows with Arbitrary Demands
Chaturvedi, Anya; Chekuri, Chandra; Richa, Andrea W.; Rost, Matthias; Schmid, Stefan; Weber, Jamison
International Symposium on Computer Performance, Modeling, Measurements and Evaluation (PERFORMANCE) 2021
[Paper]


Implementing a Security Architecture for Safety-Critical Railway Infrastructure
Eckel, Michael; Kuzhiyelil, Don; Krauß, Christoph; Zhdanova, Maria; Katzenbeisser, Stefan; Cosic, Jasmin; Drodt, Matthias; Pitrolle, Jean-Jacques
International Symposium on Secure and Private Execution Environment Design (SEED) 2021
[Conference Paper]


Principles for Designing Authentication Mechanisms for Young Children: Lessons Learned from KidzPass
Renaud, Karen; Volkamer, Melanie; Mayer, Peter; Grimm, Rüdiger
[Journal Article]


VIA: Analyzing Device Interfaces of Protected Virtual Machines
Hetzelt, Felicitas; Radev, Martin; Buhren, Robert; Morbitzer, Mathias; Seifert, Jean-Pierre
[Paper]


LayoutExOmizer: Interactive Exploration and Optimization of 2D Data Layouts
Schader, Philipp; Beckmann, Raphael; Graner, Lukas; Bernard, Jürgen
International Symposium on Vision, Modeling, and Visualization (VMV) 2021
[Conference Paper]


Rock'n'roll PUFs: Crafting provably secure pufs from less secure ones (extended version)
Ganji, Fatemeh; Tajik, Shahin; Stauss, Pascal; Seifert, Jean-Pierre; Tehranipoor, Mark Mohammad; Forte, Domenic
International Workshop on Security Proofs for Embedded Systems (PROOFS) 2019
[Journal Article]


Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model
Krachenfels, Thilo; Ganji, Fatemeh; Moradi, Amir; Tajik, Shahin; Seifert, Jean-Pierre
Symposium on Security and Privacy (SP) 2021
[Conference Paper]


Privacy-Enhanced Robust Image Hashing with Bloom Filters
Breidenbach, Uwe; Steinebach, Martin; Liu, Huajian
International Conference on Availability, Reliability and Security (ARES) 2020
[Journal Article]


Let's Downgrade Let's Encrypt
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security (CCS) 2021
[Conference Paper]


Tracing Contacts with Mobile Phones to Curb the Pandemic: Topics and Stances in People's Online Comments about the Oficial German Contact-Tracing App
Arzt, Steven; Poller, Andreas; Vallejo, Gisela
Conference on Human Factors in Computing Systems (CHI) 2021
[Conference Paper]


Security and Quality: Two Sides of the Same Coin?
Arzt, Steven
International Workshop on the State Of the Art in Program Analysis (SOAP) 2021
[Conference Paper]


Achieving Facial De-Identification by Taking Advantage of the Latent Space of Generative Adversial Networks
Frick, Raphael Antonius; Steinebach, Martin
Gesellschaft für Informatik (GI Jahrestagung) 2021
[Conference Paper]


Risikobewertung von Schwachstellen
Kreutzer, Michael; Schreiber, Linda
[Book Article]


Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3
Paul, Sebastian; Kuzovkova, Yulia; Lahr, Norman; Niederhagen, Ruben
[Paper]


SSLChecker
Shulman, Haya; Waidner, Michael
Conference on Computer Communications (INFOCOM) 2021
[Conference Paper]


A Close Look at Robust Hash Flip Positions
Steinebach, Martin
International Symposium on Electronic Imaging Science and Technology (IS&T) 2021
[Conference Paper]


Phishing detection on tor hidden services
Steinebach, Martin; Zenglein, Sascha; Brandl, Katharina
European Digital Forensics Research Workshop (DFRWS) 2021
[Journal Article]


An Axiomatic Perspective on the Performance Effects of End-Host Path Selection
Scherrer, Simon; Legner, Markus; Perrig, Adrian; Schmid, Stefan
International Symposium on Computer Performance, Modeling, Measurements and Evaluation (PERFORMANCE) 2021
[Paper]


Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging
Krachenfels, Thilo; Seifert, Jean-Pierre; Tajik, Shahin
Workshop on Attacks and Solutions in Hardware Security (ASHES) 2021
[Conference Paper]


Towards Automatically Generating Security Analyses from Machine-Learned Library Models
Kober, Maria; Arzt, Steven
European Symposium on Research in Computer Security (ESORICS) 2021
[Poster]