Publications

Publications

Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet
Hlavacek, Tomas; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
USENIX Security Symposium 2023
[Paper]


Aktive Cyberabwehr
Schulmann, Haya; Waidner, Michael
[Journal Article]


Risk Assessments in Virtual Power Plants with NESCOR Criteria, Practical Application, Advantages and Disadvantages
Gkoktsis, Georgios; Lauer, Hagen; Jäger, Lukas
International Conference on Availability, Reliability and Security 2023
[Conference Paper]


Beyond Limits: How to Disable Validators in Secure Networks
Hlavacek, Tomas; Jeitner, Philipp; Mirdita, Donika; Shulman, Haya; Waidner, Michael
Association for Computing Machinery, Special Interest Group on Data Communication (ACM SIGCOMM Conference) 2023
[Conference Paper]


Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates
Frieß, Jens; Schulmann, Haya; Waidner, Michael
International Conference on Emerging Networking EXperiments and Technologies 2023
[Journal Article]


Einsatz von computergenerierten Missbrauchsabbildungen zur Strafverfolgung im Darknet
Wittmer, Sandra; Steinebach, Martin
[Book Article]


Der richtige Umgang mit KI-generierten Inhalten
Steinebach, Martin


APT Detection: An Incremental Correlation Approach
Daneshgadeh Çakmakçı, Salva; Gkoktsis, Georgios; Buchta, Robin; Detken, Kai Oliver; Heine, Felix; Kleiner, Carsten
International Conference on Intelligent Data Acquisition and Advanced Computing Systems - Technology Applications 2023
[Conference Paper]


Desinformationserkennung anhand von Netzwerkanalysen - ein Instrument zur Durchsetzung der Pflichten des DSA am Beispiel von Telegram
Panahi, Tahireh; Hornung, Gerrit; Schäfer, Karla; Choi, Jeong-Eun; Steinebach, Martin; Vogel, Inna
[Book Article]


Abschreckungseffekte und Überwachungsgefühl im Datenschutzrecht
Büscher, Maximilian; Hornung, Gerrit; Schindler, Stephan; Zurawski, Paul; Gutjahr, Amina; Spiecker gen. Döhmann, Indra; Selzer, Annika; Stummer, Sarah; Wilmer, Thomas
[Journal Article]


Zulässigkeit der Zweckänderung durch Auftragsverarbeiter
Boll, Alina; Gärtner, Tanya; Geissler, Ines; Stummer, Sarah
[Journal Article]


Remote Attestation with Constrained Disclosure
Eckel, Michael; George, Dominik Roy; Grohmann, Björn; Krauß, Christoph
Annual Computer Security Applications Conference 2023
[Conference Paper]


Secure and Lightweight Over-the-Air Software Update Distribution for Connected Vehicles
Plappert, Christian; Fuchs, Andreas
Annual Computer Security Applications Conference 2023
[Conference Paper]


Secure and Lightweight ECU Attestations for Resilient Over-the-Air Updates in Connected Vehicles
Plappert, Christian; Fuchs, Andreas
Annual Computer Security Applications Conference 2023
[Conference Paper]


Populating the Zoo of Rugged Pseudorandom Permutations
Degabriele, Jean Paul; Karadžić, Vukašin
Advances in Cryptology - ASIACRYPT 2023, p.270-300
[Conference Proceedings]


The Indifferentiability of the Duplex and Its Practical Applications
Degabriele, Jean Paul; Fischlin, Marc; Govinden, Jérôme
Advances in Cryptology - ASIACRYPT 2023, p.237-269
[Conference Proceedings]


Towards medhub: A Self-Service Platform for Analysts and Physicians
Höhn, Markus; Lücke-Tieke, Hendrik; Burmeister, Jan; Kohlhammer, Jörn
Workshop on Visual Analytics in Healthcare 2023
[Paper]


Verfahren und System zur Personenverifikation in Porträtgemälden und Computerprogrammprodukt
Terhörst, Philipp; Huber, Marco; Damer, Naser
[Patent]


EIC's Editorial
Stork, Andre


A method for determining a tonal vector for generating a control signal for a printing device, a computer program product and a printing system
Chen, Danwu; Reinhard, Johann; Urban, Philipp
[Patent]


Verfahren, System, Vorrichtung sowie Computerprogrammprodukt zur Bestimmung eines Entspanntheitswertes mindestens eines Nutzers in einem Arbeitsumfeld
Kraft, Dimitri; Bieber, Gerald
[Patent]


Langfristige IT-Sicherheit durch Kryptoagilität
Wolf, Leonie; Kreutzer, Michael


Iterative Next Boundary Detection for Instance Segmentation of Tree Rings in Microscopy Images of Shrub Cross Sections
Gillert, Alexander; Resente, Giulia; Anadon-Rosell, Alba; Wilmking, Martin; Lukas, Uwe Freiherr von
Conference on Computer Vision and Pattern Recognition 2023
[Conference Paper]


SynthASpoof: Developing Face Presentation Attack Detection Based on Privacy-friendly Synthetic Data
Fang, Meiling; Huber, Marco; Damer, Naser
Conference on Computer Vision and Pattern Recognition Workshops 2023
[Conference Paper]


CR-FIQA: Face Image Quality Assessment by Learning Sample Relative Classifiability
Boutros, Fadi; Fang, Meiling; Klemt, Marcel; Fu, Biying; Damer, Naser
Conference on Computer Vision and Pattern Recognition 2023
[Conference Paper]


Identity-driven Three-Player Generative Adversarial Network for Synthetic-based Face Recognition
Kolf, Jan Niklas; Rieber, Tim Jannik; Elliesen, Jurek; Boutros, Fadi; Kuijper, Arjan; Damer, Naser
Conference on Computer Vision and Pattern Recognition Workshops 2023
[Conference Paper]


Queen of Swords at Touché 2023. Intra-Multilingual Multi-Target Stance Classification using BERT
Schäfer, Karla
Conference and Labs of the Evaluation Forum 2023
[Conference Paper]


Fraunhofer SIT at CheckThat! 2023: Enhancing the Detection of Multimodal and Multigenre Check-Worthiness Using Optical Character Recognition and Model Souping
Frick, Raphael; Vogel, Inna; Choi, Jeong-Eun
Conference and Labs of the Evaluation Forum 2023
[Conference Paper]


Transparency in Messengers. A Metadata Analysis Based on the Example of Telegram
Schäfer, Karla; Choi, Jeong-Eun
Conference on Hypertext and Social Media 2023
[Conference Paper]


IDiff-Face: Synthetic-based Face Recognition through Fizzy Identity-Conditioned Diffusion Models
Boutros, Fadi; Grebe, Jonas Henry; Kuijper, Arjan; Damer, Naser
International Conference on Computer Vision 2023
[Paper]