Publications
Publications
AI-based Anomaly Detection supported by Explainable AI
Wirtz, Marc Christopher
[Paper]
Automated Cephalometric Landmark Localization using a Coupled Shape Model
Wirtz, Andreas; Lam, Julian; Wesarg, Stefan
German Society for Biomedical Engineering (BMT Annual Conference) 2020
[Journal Article]
MPC for securing internet infrastructure
Shrishak, K.; Shulman, H.
International Conference on Dependable Systems and Networks (DSN) 2020
[Conference Paper]
Optimal transport layer for secure computation
Brandt, M.; Orlandi, C.; Shrishak, K.; Shulman, H.
International Conference on Security and Cryptography (SECRYPT) 2020
[Conference Paper]
ASIC Accelerator in 28 nm for the Post-Quantum Digital Signature Scheme XMSS
Mohan, Prashanth; Wang, Wen; Jungk, Bernhard; Niederhagen, Ruben; Szefer, Jakub; Mai, Ken
International Conference on Computer Design (ICCD) 2020
[Conference Paper]
Sicherheit messen! Kennzahlensysteme zur Überwachung der Informationssicherheit
Stöwer, Mechthild; Kraft, Reiner
[Book Article]
Privacy and Robust Hashes. Privacy-Preserving Forensics for Image Re-Identification
Steinebach, Martin; Lutz, Sebastian; Liu, Huajian
[Journal Article]
Black-box caches fingerprinting
Klein, Amit; Heftrig, Elias; Shulman, Haya; Waidner, Michael
International Conference on emerging Networking EXperiments and Technologies (CoNEXT) 2020
[Conference Paper]
IT/OT-Security bei Internet of Railway Things (IoRT)
Arul, Tolga; Cosic, Jasmin; Drodt, Matthias; Friedrich, Marcus; Heinrich, Markus; Kant, Michael; Katzenbeisser, Stefan; Klarer, Helmut; Rauscher, Patrick; Schubert, Max; Still, Gerhard; Wallenhorst, Detlef; Zhdanova, Maria
[Report]
Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors
Bienhaus, Diethelm; Jäger, Lukas; Rieke, Roland; Krauß, Christoph
International Symposium on Intelligent Distributed Computing (IDC) 2019
[Conference Paper]
Desinformation aufdecken und bekämpfen
[Scientific Anthology]
Security Analysis of Automotive Protocols
Lauser, Timm; Zelle, Daniel; Krauß, Christoph
Computer Science in Cars Symposium (CSCS) 2020
[Conference Paper]
White Paper. Einwilligung. Möglichkeiten und Fallstricke aus der Konsumentenperspektive
Roßnagel, Alexander; Bile, Tamer; Nebel, Maxi; Geminn, Christian; Karaboga, Murat; Ebbers, Frank; Bremert, Benjamin; Stapf, Ingrid; Teebken, Mena; Thürmel, Verena; Ochs, Carsten; Uhlmann, Markus; Krämer, Nicole; Meier, Yannic; Kreutzer, Michael; Schreiber, Linda; Simo, Hervais
[Report]
XMSS and Embedded Systems
Wang, Wen; Jungk, Bernhard; Wälde, Julian; Deng, Shuwen; Gupta, Naina; Szefer, Jakub; Niederhagen, Ruben
International Conference on Selected Areas in Cryptography (SAC) 2019
[Conference Paper]
Interface to Network Security Functions (I2NSF) Terminology. Version 08
Hares, Susan; Strassner, John; Lopez, Diego R.; Xia, Liang; Birkholz, Henk
[Report]
Subverting Linux' Integrity Measurement Architecture
Bohling, Felix; Müller, Tobias; Eckel, Michael; Lindemann, Jens
International Conference on Availability, Reliability and Security (ARES) 2020
[Conference Paper]
An Improved Topic Masking Technique for Authorship Analysis
Halvani, Oren; Graner, Lukas; Regev, Roey; Marquardt, Philipp
International Conference on Availability, Reliability and Security (ARES) 2021
[Presentation]
Development and empirical optimization of an electrochemical analysis cell for the visualization of latent fingerprints and their chemical adhesives
Bergmann, Tommy; Gottschall, Sebastian; Fuchs, Enrico; Berlipp, Oliver; Labudde, Dirk
Gesellschaft für Informatik, Special Interest Group on Biometrics and Electronic Signatures (BIOSIG International Conference) 2020
[Conference Paper]
ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V
Alkim, Erdem; Evkan, Hülya; Lahr, Norman; Niederhagen, Ruben; Petri, Richard
[Paper]
Detecting "DeepFakes" in H.264 Video Data Using Compression Ghost Artifacts
Frick, Raphael Antonius; Zmudzinski, Sascha; Steinebach, Martin
Annual Symposium on Electronic Imaging, Science and Technology 2020
[Journal Article]
The structural basis of the genetic code: amino acid recognition by aminoacyl-tRNA synthetases
Kaiser, F.; Krautwurst, S.; Salentin, S.; Haupt, V.J.; Leberecht, C.; Bittrich, S.; Labudde, D.; Schroeder, M.
[Journal Article]
Secure IT without vulnerabilities and back doors
Weber, Arnd; Heiser, Gernot; Kuhlmann, Dirk; Schallbruch, Martin; Chattopadhyay, Anupam; Guilley, Sylvain; Kasper, Michael; Krauß, Christoph; Krüger, Philipp S.; Reith, Steffen; Seifert, Jean-Pierre
[Journal Article]
Recht und Informatik - Voneinander lernen und gemeinsam handeln
Grimm, Rüdiger
[Book Article]
DICE harder: A hardware implementation of the device identifier composition engine
Jäger, Lukas; Petri, Richard
International Conference on Availability, Reliability and Security (ARES) 2020
[Conference Paper]
Detecting Fake News Spreaders on Twitter from a Multilingual Perspective
Vogel, Inna; Meghana, Meghana
International Conference on Data Science and Advanced Analytics (DSAA) 2020
[Conference Paper]
DaVinci: Android App Analysis beyond Frida via Dynamic System Call Instrumentation
Druffel, Alexander; Heid, Kris
International Conference on Applied Cryptography and Network Security (ACNS) 2020
[Conference Paper]
The Impact of DNS Insecurity on Time
Jeitner, P.; Shulman, H.; Waidner, M.
International Conference on Dependable Systems and Networks (DSN) 2020
[Conference Paper]
JAB Code - A Versatile Polychrome 2D Barcode
Berchtold, Waldemar; Liu, Huajian; Steinebach, Martin; Klein, Dominik; Senger, Tobias; Thenee, Nicolas
Annual Symposium on Electronic Imaging, Science and Technology 2020
[Journal Article]
Critical traffic analysis on the tor network
Platzer, Florian; Schäfer, Marcel; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) 2020
[Conference Paper]
Detecting double compression and splicing using benfords first digit law
Frick, Raphael Antonius; Liu, Huajian; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) 2020
[Conference Paper]