Publications

Publications

Datenschutzmetriken im Beschäftigungsverhältnis. Verifikation der datenschutzkonformen Einwilligung
Diel, Sarah; Kohn, Matthias; Schleper, Janine; Selzer, Annika
[Journal Article]


Efficient Network Monitoring Applications in the Kernel with eBPF and XDP
Abranches, Marcelo; Michel, Oliver; Keller, Eric; Schmid, Stefan
Conference on Network Functions Virtualization and Software-Defined Networking (NFV-SDN) 2021
[Conference Paper]


Machine Learning Analysis of IP ID Applications
Shulman, Haya; Zhao, Shujie
International Conference on Dependable Systems and Networks (DSN) 2021
[Conference Paper]


Critical Traffic Analysis on the Tor Network
Platzer, Florian; Schäfer, Marcel; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) 2020
[Journal Article]


Not all Conflicts are Created Equal: Automated Error Resolution in RPKI Deployments
Hlavacek, Tomas; Shulman, Haya; Waidner, Michael
Conference on Computer Communications (INFOCOM) 2021
[Conference Paper]


On the Timing Leakage of the Deterministic Re-encryption in HQC KEM
Hlauschek, Clemens; Lahr, Norman; Schröder, Robin Leander
[Paper]


Userspace Software Integrity Measurement
Eckel, Michael; Riemann, Tim
International Conference on Availability, Reliability and Security (ARES) 2021
[Conference Paper]


DNS-over-TCP considered vulnerable
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
Applied Networking Research Workshop (ANRW) 2021
[Conference Paper]


LOKI: Development of an interface for task-based, privacy-friendly smart home control through LOCal Information Processing
Gerber, Paul; Heidinger, Marvin; Stiegelmayer, Julia; Gerber, Nina
Mensch und Computer 2021, p.578-581
[Conference Proceedings]


Towards Resilient Critical Infrastructures – Motivating Users to Contribute to Smart Grid Resilience
Egert, Rolf; Gerber, Nina; Haunschild, Jasmin; Kuehn, Philipp; Zimmermann, Verena
i-com, p.161-175
[Journal Article]


Evaluating a Smart Car Interface in Terms of Usability, User Experience and User Acceptance
Avramidis, Mario; Kellner, Christiane; Staudt, Josefine; Zimmermann, Verena; Gerber, Nina
Mensch und Computer 2021 - Workshopband
[Conference Proceedings]


Exploring energy grid resilience: The impact of data, prosumer awareness, and action
Egert, Rolf; Daubert, Jörg; Marsh, Stephen; Mühlhäuser, Max
Patterns
[Journal Article]


Holonic System Model for Resilient Energy Grid Operation
Egert, Rolf; Grube, Tim; Volk, Florian; Mühlhäuser, Max
Energies
[Journal Article]


PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Heinrich, Alexander; Hollick, Matthias; Schneider, Thomas; Stute, Milan; Weinert, Christian
30th USENIX Security Symposium
[Conference Proceedings]


BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures
Cremers, Cas; Düzlü, Samed; Fiedler, Rune; Fischlin, Marc; Janson, Christian
Proceedings: 2021 IEEE Symposium on Security and Privacy (SP 2021), p.1696-1714
[Conference Proceedings]


Towards Resilient Critical Infrastructures - Motivating Users to Contribute to Smart Grid Resilience
Egert, Rolf; Gerber, Nina; Haunschild, Jasmin; Kuehn, Philipp; Zimmermann, Verena
i-com: Journal of Interactive Media, p.161-175
[Journal Article]


A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas
Journal of Cryptology
[Journal Article]


Multipath TLS 1.3
Fischlin, Marc; Müller, Sven-Andre; Münch, Jean-Pierre; Porth, Lars
Computer Security - ESORICS 2021, p.86-105
[Conference Proceedings]


Revisiting Hybrid Private Information Retrieval
Günther, Daniel; Schneider, Thomas; Wiegand, Felix
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, p.2408-2410
[Conference Proceedings]


A Generic Hybrid 2PC Framework with Application to Private Inference of Unmodified Neural Networks (Extended Abstract)
Braun, Lennart; Cammarota, Rosario; Schneider, Thomas
Privacy in Machine Learning Workshop at 35th Conference on Neural Information Processing Systems
[Conference Proceedings]


Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite
Fischlin, Marc; Sanina, Olga
Advances in Cryptology - ASIACRYPT 2021, p.696-725
[Conference Proceedings]


On PQC Migration and Crypto-Agility
Wiesmaier, A.; Alnahawi, N.; Graßmeyer, T.; Geißler, J.; Zeier, A.; Bauspieß, P.; Heinemann, A.


On Message-based Consensus and Network Coding
Braun, M.; Wiesmaier, A.; Alnahawi, N.; Geißler, J.
NoF 2021 —- 12th International Conference on Network of the Future
[Conference Proceedings]


On the State of Post-Quantum Cryptography Migration
Alnahawi, N.; Wiesmaier, A.; Graßmeyer, T.; Geißler, J.; Zeier, A.; Bauspieß, P.; Heinemann, A.
INFORMATIK 21 —- PQKP-Workshop, p.907-941
[Conference Proceedings]


Microgrid Systems: Towards a Technical Performance Assessment Frame
Marchand, Sophie; Monsalve, Cristian; Reimann, Thorsten; Heckmann, Wolfram; Ungerland, Jakob; Lauer, Hagen; Ruhe, Stephan; Krauß, Christoph
Energies, Vol.14, p.23
[Journal Article]


Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods
Zelle, Daniel; Lauser, Timm; Kern, Dustin; Krauß, Christoph
The 16th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]


Cyberattack detection in vehicles using characteristic functions, artificial neural networks, and visual analysis
Chevalier, Yannick; Fenzl, Florian; Kolomeets, Maxim; Rieke, Roland; Chechulin, Andrey; Krauß, Christoph
Informatics and Automation, Vol.20, p.845-868
[Journal Article]


Implementing a Security Architecture for Safety-Critical Railway Infrastructure
Eckel, Michael; Kuzhiyelil, Don; Krauß, Christoph; Zhdanova, Maria; Katzenbeisser, Stefan; Cosic, Jasmin; Drodt, Matthias; Pitrolle, Jean-Jacques
International Symposium on Secure and Private Execution Environment Design (SEED), p.215-226
[Conference Proceedings]


Analysis of E-Mobility-Based Threats to Power Grid Resilience
Kern, Dustin; Krauß, Christoph
Computer Science in Cars Symposium
[Conference Proceedings]


Hornung/Schallbruch (Hrsg.): IT-Sicherheitsrecht. Praxishandbuch.
Margraf, Marian; Heinemann, Andreas
[Book Article]