Publications

Publications

On the State of Post-Quantum Cryptography Migration
Alnahawi, Nouri; Grasmeyer, Alexander WiesmaierAND Tobias; Geißler, Julian; Zeier, Alexander; Bauspieß, Pia; Heinemann, Andreas
INFORMATIK 2021 —- PQKP-Workshop, p.907-941
[Conference Proceedings]


It is not as simple as that: Playing out password security trainings in order to nudge password changes
Sterk, Fabian; Heinemann, Andreas
EICC 21: European Interdisciplinary Cybersecurity Conference, Virtual Event, Romania, November 10-11, 2021, p.20-25
[Conference Proceedings]


The Exact Security of BIP32 Wallets
Das, Poulami; Erwig, Andreas; Faust, Sebastian; Loss, Julian; Riahi, Siavash
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, p.1020-1042
[Conference Proceedings]


Evaluating a Smart Car Interface in Terms of Usability, User Experience and User Acceptance
Avramidis, Mario; Kellner, Christiane; Staudt, Josephine; Zimmermann, Verena; Gerber, Nina
i-com, p.161-175
[Conference Proceedings]


Taking on driving tasks yourself? That was yesterday! How drivers would like to be supported by assistance systems
Zankel, Lisa Marie; Gerber, Paul; Zimmermann, Verena; Gerber, Nina
Adjunct Proceedings: 13th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, p.71-76
[Conference Proceedings]


Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake
Brendel, Jacqueline; Fiedler, Rune; Günther, Felix; Janson, Christian; Stebila, Douglas
[Report]


On Derandomizing Yao’s Weak-to-Strong OWF Construction
Brzuska, Christina; Couteau, Geoffrey; Karanko, Phila; Rohrbach, Felix
Theory of Cryptography, p.429-456
[Conference Proceedings]


RealSWATT: Remote Software-Based Attestation for Embedded Devices under Realtime Constraints
Surminski, Sebastian; Niesler, Christian; Brasser, Ferdinand; Davi, Lucas; Sadeghi, Ahmad-Reza
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, p.2890-2905
[Conference Proceedings]


IT-Rettung 2017: IT-Unterstützung in Emergency Management & Response
Pottebaum, Jens; Erfurth, Christian; Reuter, Christian
Informatik 2017 : 25.- 29. September 2017 Chemnitz, p.1281-1282
[Conference Proceedings]


Social Media Analytics: Eine Marktstudie im Krisenmanagement
Kaufhold, Marc-André; Reuter, Christian; Ludwig, Thomas; Scholl, Simon
Informatik 2017 : 25.- 29. September 2017 Chemnitz, p.1325-1338
[Conference Proceedings]


User-Centered Design of Visualizations for Software Vulnerability Reports
Reynolds, Steven Lamarr; Mertz, Tobias; Arzt, Steven; Kohlhammer, Jörn
Symposium on Visualization for Cyber Security (VizSec) 18, 2021, Online>
[Conference Paper]


Resilience in Security and Crises through Adaptions and Transitions
Kalle, Timo; Kaufhold, Marc-André; Kuntke, Franz; Reuter, Christian; Rizk, Amr; Steinmetz, Ralf
50 Jahre Gesellschaft für Informatik - Informatik für Gesellschaft : Workshopbeiträge der 49. Jahrestagung der Gesellschaft für Informatik, p.571-584
[Conference Proceedings]


Perception or capability? - An empirical investigation of the factors influencing the adoption of social media and public cloud in German SMEs
Hassan, Sohaib S.; Reuter, Christian; Bzhalava, Levan
International Journal of Innovation Management
[Journal Article]


Python Crypto Misuses in the Wild
Wickert, Anna-Katharina; Baumgärtner, Lars; Breitfelder, Florian; Mezini, Mira
15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM ’21)
[Conference Proceedings]


On Security Guidelines and Policy Compliance: Considering Users’ Need for Autonomy
Olt, Christian M.; große Deters, Fenne
[Conference Proceedings]


SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation
Patra, Arpita; Schneider, Thomas; Suresh, Ajith; Yalame, Mohammad Hossein
IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
[Conference Proceedings]


Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography
Weber, Alexandra; Nikiforov, Oleg; Sauer, Alexander; Schickel, Johannes; Alber, Gernot; Mantel, Heiko; Walther, Thomas
26th European Symposium on Research in Computer Security (ESORICS)
[Conference Proceedings]


Privacy-preserving density-based clustering
Bozdemir, Beyza; Canard, Sebastian; Ermis, Orhan; Möllering, Helen; Önen, Melek; Schneider, Thomas
16th ACM ASIA Conference on Computer and Communications Security (ASIACCS'21)
[Conference Proceedings]


Verifying Post-Quantum Signatures in 8kB of RAM
Gonzalez, Ruben; Hülsing, Andreas; Kannwischer, Matthias; Krämer, Juliane; Lange, Tanja; Stöttinger, Marc; Waitz, Elisabeth; Wiggers, Thom; Yang, Bo-Yin
Post-Quantum Cryptography, p.215-233
[Conference Proceedings]


Quantum Indistinguishability for Public Key Encryption
Gagliardoni, Tommaso; Krämer, Juliane; Struck, Patrick
Post-Quantum Cryptography : 12th International Workshop, PQCrypto 2021 Proceedings
[Conference Proceedings]


FastZIP: faster and more secure zero-interaction pairing
Fomichev, Mikhail; Hesse, Julia; Almon, Lars; Lippert, Timm; Han, Jun; Hollick, Matthias
MobiSys '21: Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services, p.440-452
[Conference Proceedings]


PrivInferVis: Towards Enhancing Transparency over Attribute Inference in Online Social Networks
Simo, Hervais; Shulman, Haya; Schufrin, Marija; Reynolds, Steven Lamarr; Kohlhammer, Jörn
Conference on Computer Communications (INFOCOM) 2021, Online>
[Conference Paper]


Exploring cybersecurity-related emotions and finding that they are challenging to measure
Renaud, Karen; Zimmermann, Verena; Schürmann, Tim; Böhm, Carlos
Humanities and Social Sciences Communications
[Journal Article]


Investigating Simple Privacy Indicators for Supporting Users When Installing New Mobile Apps
Stöver, Alina; Gerber, Nina; Kaushik, Sushma; Mühlhäuser, Max; Marky, Karola
CHI EA'21: Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems
[Conference Proceedings]


OpenHaystack: A Framework for Tracking Personal Bluetooth Devices via Apple's Massive Find My Network
Heinrich, Alexander; Stute, Milan; Hollick, Matthias
WiSec ’21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.374-376
[Conference Proceedings]


AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop
Heinrich, Alexander; Hollick, Matthias; Schneider, Thomas; Stute, Milan; Weinert, Christian
WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.371-373
[Conference Proceedings]


LLVM-based Circuit Compilation for Practical Secure Computation
Heldmann, Tim; Schneider, Thomas; Tkachenko, Oleksandr; Weinert, Christian; Yalame, Mohammad Hossein
Applied Cryptography and Network Security: Proceedings Part II, p.99-121
[Conference Proceedings]


Balancing Quality and Efficiency in Private Clustering with Affinity Propagation
Keller, Hannah; Möllering, Helen; Schneider, Thomas; Yalame, Mohammad Hossein
18th International Conference on Security and Cryptography (SECRYPT'21)
[Conference Proceedings]


RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies
Stute, Milan; Kohnhauser, Florian; Baumgärtner, Lars; Almon, Lars; Hollick, Matthias; Katzenbeisser, Stefan; Freisleben, Bernd
IEEE Transactions on Dependable and Secure Computing
[Journal Article]


Zero-Interaction Security-Towards Sound Experimental Validation
Fomichev, Mikhail; Maass, Max; Hollick, Matthias
GetMobile: Mobile Computing and Communications
[Journal Article]