Publications

Publications

Implementing a Language for Distributed Systems: Choices and Experiences with Type Level and Macro Programming in Scala
Weisenburger, Pascal; Salvaneschi, Guido
The Art, Science, and Engineering of Programming, p.17:1-17:29
[Journal Article]


TRIDEnT: Towards a Decentralized Threat Indicator Marketplace
Alexopoulos, Nikolaos; Vasilomanolakis, Emmanouil; Le Roux, Stephane; Rowe, Steven; Mühlhäuser, Max
35th ACM/SIGAPP Symposium on Applied Computing (SAC'20)
[Conference Proceedings]


Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany
Haunschild, Jasmin; Kaufhold, Marc-André; Reuter, Christian
Proceedings of the International Conference on Wirtschaftsinformatik (WI), p.1545-1560
[Conference Proceedings]


Empirical Insights for Designing Information and Communication Technology for International Disaster Response
Stute, Milan; Maass, Max; Schons, Tom; Kaufhold, Marc-André; Reuter, Christian; Hollick, Matthias
International Journal of Disaster Risk Reduction (IJDRR)
[Journal Article]


Emergency service staff and social media – A comparative empirical study of the attitude by Emergency Services staff in Europe in 2014 and 2017
Reuter, Christian; Kaufhold, Marc-André; Spahr, Fabian; Spielhofer, Thomas; Hahne, Anna Sophie
International Journal of Disaster Risk Reduction (IJDRR)
[Journal Article]


A Programming Model for Semi-implicit Parallelization of Static Analyses
Helm, Dominik; Kübler, Florian; Kölzer, Jan Thomas; Haller, Philipp; Eichberg, Michael; Salvaneschi, Guido; Mezini, Mira
ISSTA '20: 29th SIGSOFT International Symposium on Software Testing and Analysis
[Conference Proceedings]


Firmware Insider: Bluetooth Randomness is Mostly Random
Tillmanns, Jörn; Classen, Jiska; Rohrbach, Felix; Hollick, Matthias
14th USENIX Workshop on Offensive Technologies (WOOT 2020)
[Conference Proceedings]


Trustworthy AI Inference Systems: An Industry Research View
Cammarota, Rosario; Schunter, Matthias; Rajan, Anand; Boemer, Fabian; Kiss, Ágnes; Treiber, Amos; Weinert, Christian; Schneider, Thomas; Stapf, Emmanuel; Sadeghi, Ahmad-Reza; Demmler, Daniel; Chen, Huili; Hussain, Siam Umar; Riazi, M. Sadegh; Koushanfar, Farinaz; Gupta, Saransh; Rosing, Tajan Simunic; Chaudhuri, Kamalika; Nejatollahi, Hamid; Dutt, Nikil; Imani, Mohsen; Laine, Kim; Dubey, Anuj; Aysu, Aydin; Sadat Hosseini, Fateme; Yang, Chengmo; Wallace, Eric; Norton, Pamela
[Report]


MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference
Boemer, Fabian; Cammarota, Rosario; Demmler, Daniel; Schneider, Thomas; Yalame, Mohammad Hossein
2nd Privacy-Preserving Machine Learning Workshop at CRYPTO 2020
[Conference Proceedings]


The Tip of the Iceberg: On the Merits of Finding Security Bugs
Alexopoulos, Nikolaos; Habib, Sheikh Mahbub; Schulz, Steffen; Mühlhäuser, Max
ACM Transactions on Privacy and Security
[Journal Article]


A survey of multitier programming
Salvaneschi, Guido; Wirth, Johannes; Weisenburger, Pascal
ACM Computing Surveys
[Journal Article]


CryptoSPN: Expanding PPML beyond Neural Networks
Treiber, Amos; Molina, Alejandro; Weinert, Christian; Schneider, Thomas; Kersting, Kristian
2nd Privacy-Preserving Machine Learning Workshop at CRYPTO 2020
[Conference Proceedings]


CryptoSPN: Expanding PPML beyond Neural Networks
Treiber, Amos; Molina, Alejandro; Weinert, Christian; Schneider, Thomas; Kersting, Kristian
PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practi, p.9-14
[Conference Proceedings]


Engineering Privacy-Preserving Machine Learning Protocols
Schneider, Thomas
PPMLP ‘20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, p.3-4
[Conference Proceedings]


Modular Collaborative Program Analysis in OPAL
Helm, Dominik; Kübler, Florian; Reif, Michael; Eichberg, Michael; Mezini, Mira
ESEC/FSE 2020 : Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, p.184-196
[Conference Proceedings]


RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies
Stute, Milan; Kohnhäuser, Florian; Baumgärtner, Lars; Almon, Lars; Hollick, Matthias; Katzenbeisser, Stefan; Freisleben, Bernd
Transactions on Dependable and Secure Computing
[Journal Article]


Zur Benutzbarkeit und Verwendung von API-Dokumentationen
Huesmann, Rolf; Zeier, Alexander; Heinemann, Andreas; Wiesmaier, Alexander
Mensch und Computer 2020 - Workshopband
[Conference Proceedings]


Post-Quantum Secure Boot
Kumar, Vinay B. Y.; Gupta, Naina; Chattopadhyay, Anupam; Kasper, Michael; Krauß, Christoph; Niederhagen, Ruben
Design, Automation & Test in Europe Conference & Exhibition, DATE 2020
[Conference Proceedings]


TrustEV: Trustworthy Electric Vehicle Charging and Billing
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
Proceedings of the 35th ACM/SIGAPP Symposium on Applied Computing SAC 2020
[Conference Proceedings]


SEPAD - Security Evaluation Platform for Autonomous Driving
Zelle, Daniel; Rieke, Roland; Plappert, Christian; Krauß, Christoph; Levshun, Dmitry; Chechulin, Andrey
28th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP
[Conference Proceedings]


Post-Quantum TLS on Embedded Systems - Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS
Bürstinghaus-Steinbach, Kevin; Krauß, Christoph; Niederhagen, Ruben; Schneider, Michael
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS, p.841–852
[Conference Proceedings]


Securing Electric Vehicle Charging Systems through Component Binding
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
39th International Conference on Computer Safety, Reliability and Security, SAFECOMP
[Conference Proceedings]


HIP: HSM-based Identities for Plug-and-Charge
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]


HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria; Heddergott, Ronald
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]


Security Analysis of Automotive Protocols
Lauser, Timm; Zelle, Daniel; Krauß, Christoph
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]


Zur Benutzbarkeit und Verwendung von API-Dokumentationen
Huesmann, Rolf; Zeier, Alexander; Heinemann, Andreas; Wiesmaier, Alexander
Mensch & Computer Workshopband
[Conference Proceedings]


SSBC 2020: Sclera Segmentation Benchmarking Competition in the Mobile Environment
Vitek, M.; Das, A.; Pourcenoux, Y.; Missler, A.; Paumier, C.; Das, S.; De Ghosh, I.; Lucio, D. R.; Zanlorensi Jr., L. A.; Menotti, D.; Boutros, F.; Damer, N.; Grebe, J. H.; Kuijper, A.; Hu, J.; He, Y.; Wang, C.; Liu, H.; Wang, Y.; Sun, Z.; Osorio-Roig, D.; Rathgeb, C.; Busch, C.; Tapia, J.; Valenzuela, A.; Zampoukis, G.; Tsochatzidis, L.; Pratikakis, I.; Nathan, S.; Suganya, R.; Mehta, V.; Dhall, A.; Raja, K.; Gupta, G.; Khiarak, J. N.; Akbari-Shahper, M.; Jaryani, F.; Asgari-Chenaghlu, M.; Vyas, R.; Dakshit, S.; Dakshit, S.; Peer, P.; Pal, U.; Struc, V.
Proc. Intl. Joint Conf. on Biometrics (IJCB), p.1-10
[Conference Proceedings]


PRNU-based Detection of Facial Retouching
Rathgeb, C.; Botaljov, A.; Stockhardt, F.; Isadskiy, S.; Debiasi, L.; Uhl, A.; Busch, C.
IET Biometrics, Vol.9, p.154-164
[Journal Article]


Plastic Surgery: An Obstacle for Deep Face Recognition?
Rathgeb, C.; Dogan, D.; Stockhardt, F.; De Marsico, M.; Busch, C.
Proc. 15th IEEE Computer Society Workshop on Biometrics (CVPRW), p.806-807
[Conference Proceedings]


Vulnerability Assessment and Detection of Makeup Presentation Attacks
Rathgeb, C.; Drozdowski, P.; Fischer, D.; Busch, C.
Proc. Int. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]