Publications

Publications

Variability Modeling of Cryptographic Components (Clafer Experience Report)
Nadi, Sarah; Krüger, Stefan
Tenth International Workshop on Variability Modelling of Software-intensive Systems
[Conference Proceedings]


On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA
Akleylek, Sedat; Dagdelen, Özgür; Tok, Zaliha Yüce
Cryptography and Information Security in the Balkans, p.155-168
[Conference Proceedings]


NetCo: Reliable Routing with Unreliable Routers
Feldmann, Anja; Heyder, Philipp; Kreutzer, Michael; Schmid, Stefan; Seifert, Jean-Pierre; Shulman, Haya; Thimmaraju, Kashyap; Waidner, Michael; Sieberg, Jens
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops
[Conference Proceedings]


Obfuscation Combiners
Fischlin, Marc; Herzberg, Amir; Noon, Hon Bin; Shulman, Haya
International Cryptology Conference (CRYPTO)
[Conference Proceedings]


Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments
Asokan, N.; Huang, Jialin; Miettinen, Markus; Nguyen, Thien Duc; Sadeghi, Ahmad-Reza
[Conference Proceedings]


LoT: a Reputation-based Trust System for Long-term Archiving
Vigil, Martín; Demirel, Denise; Habib, Sheikh Mahbub; Hauke, Sascha; Buchmann, Johannes; Mühlhäuser, Max
SECURWARE 2016, p.262-270
[Conference Proceedings]


Dissipation-enabled efficient excitation transfer from a single photon to a single quantum emitter
Trautmann, Nils; Alber, Gernot
Physical Review A
[Journal Article]


Towards a Unified Security Model for Physically Unclonable Functions
Sadeghi, Ahmad-Reza; Armknecht, Frederik
CT-RSA - Cryptographers' Track at the RSA Conference
[Conference Proceedings]


ProxiWatch: Enhancing Smartwatch Interaction through Proximity-based Hand Input
Müller, Florian; Günther, Sebastian; Dezfuli, Niloofar; Khalilbeigi, Mohammadreza; Mühlhäuser, Max
CHI EA '16: Proceedings of the 34rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems
[Conference Proceedings]


Can IoT be Secured: Emerging Challenges in Connecting the Unconnected
Cam-Winget, Nancy; Sadeghi, Ahmad-Reza; Jin, Yier
53rd Design Automation Conference (DAC)
[Conference Proceedings]


Remote Attestation for Low-End Embedded Devices: the Prover's Perspective
Brasser, Ferdinand; Rasmussen, Kasper; Sadeghi, Ahmad-Reza; Tsudik, Gene
Proceedings of the 53nd Annual Design Automation Conference
[Conference Proceedings]


Big Data Storage
Strohbach, Martin; Daubert, Jörg; Ravkin, Herman; Lischka, Mario
New Horizons for a Data-Driven Economy - A Roadmap for Usage and Exploitation of Big Data in Europe, p.119-141


DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android
Heuser, Stephan; Negro, Marco; Pendyala, Praveen Kumar; Sadeghi, Ahmad-Reza
[Report]


DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android
Heuser, Stephan; Negro, Marco; Pendyala, Praveen Kumar; Sadeghi, Ahmad-Reza
Financial Crypto 2016
[Conference Proceedings]


On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks
Daubert, Jörg; Grube, Tim; Fischer, Mathias; Mühlhäuser, Max
Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), p.738-744
[Conference Proceedings]


Sicherheitsaspekte und Vergleich der Blockchifren LED und TEA
Appel, Michael; Pauer, Christof; Wiesmaier, Alexander
[Report]


Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques
Rasthofer, Siegfried; Arzt, Steven; Miltenberger, Marc; Bodden, Eric
Network and Distributed System Security Symposium 2016, p.1-15
[Conference Proceedings]


Enhancing the scalability, tractability and memory usage of HashSieve on multi-core CPUs
Mariano, Artur; Bischof, Christian
PDP2016
[Conference Proceedings]


Efficiency Comparison of Various Approaches in E-Voting Protocols
Kulyk, Oksana; Volkamer, Melanie
Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers, p.209-233
[Conference Proceedings]


Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do
Kulyk, Oksana; Gerber, Paul; Reinheimer, Benjamin; Renaud, Karen; Volkamer, Melanie
NDSS Workshop on Usable Security (USEC)
[Conference Proceedings]


Smart-TV und Privatheit - Bedrohungspotenziale und Handlungsmöglichkeiten
Ghiglieri, Marco; Hansen, Marit; Nebel, Maxi; Pörschke, Julia Victoria; Fhom, Hervais Simo
[Report]


Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol
Degabriele, Jean Paul; Fehr, Victoria; Fischlin, Marc; Gagliardoni, Tommaso; Günther, Felix; Marson, Giorgia Azzurra; Mittelbach, Arno; Paterson, Kenneth G.
International Journal of Information Security, p.637-657
[Journal Article]


Parallel Improved Schnorr-Euchner Enumeration SE++ for the CVP and SVP
Correia, Fabio; Mariano, Artur; Proença, Alberto; Bischof, Christian; Agrell, Erik
PDP 2016 - 24th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, p.596-603
[Conference Proceedings]


Leakage-Resilient Layout Randomization for Mobile Devices
Braden, Kjell; Crane, Stephen; Davi, Lucas; Franz, Michael; Larsen, Per; Liebchen, Christopher; Sadeghi, Ahmad-Reza
23rd Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


Remanence Decay Side-Channel: The PUF Case
Zeitouni, Shaza; Oren, Yossef; Wachsmann, Christian; Koeberl, Patrick; Sadeghi, Ahmad-Reza
IEEE Transactions on Information Forensics and Security
[Journal Article]


Security in Industrie 4.0 - Challenges and Solutions for the Fourth Industrial Revolution
Waidner, Michael; Kasper, Michael
DATE 2016 (Design, Automation and Test in Europe)
[Conference Proceedings]


The Cybersecurity Landscape in Industrial Control Systems
McLaughlin, Stephen; Konstantinou, Charalambos; Wang, Xueyang; Davi, Lucas; Sadeghi, Ahmad-Reza; Maniatakos, Michail; Karri, Ramesh
Proceedings of the IEEE, p.1039-1057
[Journal Article]


BASEL (Buffer mAnagement SpEcification Language)
Kogan, Kirill; Menikkumbura, Danushka; Petri, Gustavo; Noh, Youngtae; Nikolenko, Sergey I.; Eugster, Patrick
ANCS '16 Proceedings of the 2016 Symposium on Architectures for Networking and Communications Systems, p.69-74
[Conference Proceedings]


ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology
Gutmann, Andreas; Renaud, Karen; Maguire, Joseph; Mayer, Peter; Volkamer, Melanie; Matsuura, Kanta; Müller-Quade, Jörn
2016 IEEE European Symposium on Security and Privacy (EuroS&P), p.357-371
[Conference Proceedings]


On the Hardness of Proving CCA-Security of Signed ElGamal
Bernhard, David; Fischlin, Marc; Warinschi, Bogdan
Public-Key Cryptography - PKC 2016, p.24
[Conference Proceedings]