Publications
Publications
Über die Wirksamkeit von Anti-Phishing-Training
Stockhardt, Simon; Reinheimer, Benjamin; Volkamer, Melanie
Usable Security and Privacy Workshop in conjunction with Mensch und Computer 2015, p.647-655
[Conference Proceedings]
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? - Keynote -
Sadeghi, Ahmad-Reza; Davi, Lucas; Larsen, Per
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
[Conference Proceedings]
I know where you are: Proofs of Presence resilient to malicious provers
Miettinen, Markus; Asokan, N.; Koushanfar, Farinaz; Nguyen, Thien Duc; Rios, Jon; Sadeghi, Ahmad-Reza; Sobhani, Majid; Yellapantula, Sudha
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
[Conference Proceedings]
IT-Sicherheit und Datenschutz im vernetzten Fahrzeug
Krauß, Christoph; Waidner, Michael
>Datenschutz und Datensicherheit DuD, p.383-387
[Journal Article]
Time to Rethink: Trust Brokerage using Trusted Execution Environments
Koeberl, Patrick; Phegade, Vinay; Rajan, Anand; Schneider, Thomas; Schulz, Steffen; Zhdanova, Maria
Trust and Trustworthy Computing, p.181-190
[Conference Proceedings]
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax
Geihs, Matthias; Demirel, Denise; Buchmann, Johannes
Codes, Cryptology and Information Security
[Conference Proceedings]
Lattice Basis Reduction Attack against Physically Unclonable Functions
Ganji, Fatemeh; Krämer, Juliane; Seifert, Jean-Pierre; Tajik, Shahin
22nd ACM Conference on Computer and Communications Security (CCS 2015)
[Conference Proceedings]
A Distributed Reputation System for Certification Authority Trust Management
Classen, Jiska; Braun, Johannes; Volk, Florian; Hollick, Matthias; Buchmann, Johannes; Mühlhäuser, Max
14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium)
[Conference Proceedings]
A Guide to End-to-End Privacy Accountability
Butin, Denis; Métayer, Daniel Le
1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015)
[Conference Proceedings]
Real-World Post-Quantum Digital Signatures
Butin, Denis; Gazdag, Stefan-Lukas; Buchmann, Johannes
Cybersecurity & Privacy Innovation Forum (CSP Forum 2015)
[Conference Proceedings]
Zertifizierte Apps
Maseberg, Sönke; Bodden, Eric; Kus, Mehmet; Brucker, Achim; Rasthofer, Siegfried; Berger, Bernhard; Huber, Stephan; Sohr, Karsten; Gerber, Paul; Volkamer, Melanie
Risiken kennen, Herausforderungen annehmen, Lösungen gestalten, Tagungsband zum 14. Deutscher IT-Sicherheitskongress des BSI 2015, p.505-516
[Conference Proceedings]
PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices
Ghiglieri, Marco
IEEE CCNC
[Conference Proceedings]
Augmented Learning with Errors: The Untapped Potential of the Error Term
Bansarkhani, Rachid El; Dagdelen, Özgür; Buchmann, Johannes
Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015, p.20
[Conference Proceedings]
High Performance Lattice-based CCA-secure Encryption
Bansarkhani, Rachid El; Buchmann, Johannes
Cryptology ePrint Archive, p.20
[Journal Article]
Market-driven Code Provisioning to Mobile Secure Hardware
Dmitrienko, Alexandra; Heuser, Stephan; Nguyen, Thien Duc; Ramos, Marcos da Silva; Rein, Andre; Sadeghi, Ahmad-Reza
Financial Cryptography and Data Security
[Conference Proceedings]
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors
Biedermann, Sebastian; Katzenbeisser, Stefan; Szefer, Jakub
Financial Cryptography and Data Security - 19th International Conference, FC 2015, p.5-13
[Journal Article]
Wir müssen die Airbus-Idee für die europäische IT-Sicherheit wiederbeleben
Waidner, Michael
[Report]
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
Herzberg, Amir; Shulman, Haya
Internet Computing, IEEE, p.80-84
[Journal Article]
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy
Gerber, Paul; Volkamer, Melanie; Renaud, Karen
ACM SIGCAS Computers and Society, p.16-21
[Journal Article]
Usability und Privacy im Android Ökosystem
Gerber, Paul; Volkamer, Melanie
Datenschutz und Datensicherheit, p.108 - 113
[Journal Article]
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation
Demmler, Daniel; Schneider, Thomas; Zohner, Michael
22nd Annual Network and Distributed System Security Symposium (NDSS'15)
[Conference Proceedings]
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming
Davi, Lucas; Liebchen, Christopher; Sadeghi, Ahmad-Reza; Snow, Kevin; Monrose, Fabian
22nd Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]
NoPhish App Evaluation: Lab and Retention Study
Canova, Gamze; Volkamer, Melanie; Bergmann, Clemens; Reinheimer, Benjamin
NDSS Workshop on Usable Security 2015
[Conference Proceedings]
Ask The Experts: Cybersecurity
Shannon, Greg; Waidner, Michael; Sonalker, Anuja
[Report]
Hybrid Communication Architecture for Emergency Response - An Implementation in Firefighter’s Use Case
Nguyen, The An Binh; Englert, Frank; Farr, Simon; Gottron, Christian; Böhnstedt, Doreen; Steinmetz, Ralf
2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), p.524-529
[Conference Proceedings]
A Concept for a C2X-based Crossroad Assistant
Burgstahler, D.; Pelzer, Matthias; Lotz, Andreas; Knapp, Fabian; Pu, Hongjun; Rueckelt, Tobias; Steinmetz, Ralf
2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), p.360-364
[Conference Proceedings]
Random-Oracle Uninstantiability from Indistinguishability Obfuscation
Brzuska, Christina; Farshim, Pooya; Mittelbach, Arno
Theory of Cryptography. TCC 2015., p.428-455
[Conference Proceedings]
Evaluation of User Feedback in Smart Home for Situational Context Identification
Alhamoud, Alaa; Xu, Pei; Englert, Frank; Scholl, Philipp; Nguyen, The An Binh; Böhnstedt, Doreen; Steinmetz, Ralf
2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), p.20-25
[Conference Proceedings]
Time-Reversal-Symmetric Single-Photon Wave Packets for Free-Space Quantum Communication
Trautmann, N.; Alber, G.; Agarwal, G. S.; Leuchs, G.
Physical Review Letters
[Journal Article]
TARDIS: Software-Only System-Level Record and Replay in Wireless Sensor Networks
Tancreti, Matthew; Sundaram, Vinaitheerthan; Bagchi, Saurabh; Eugster, Patrick
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, p.286-297
[Conference Proceedings]