Publications

Publications

Stratum Filtering: Cloud-Based Detection of Attack Sources
Herzberg, Amir; Shulman, Haya; Waidner, Michael
ACM Cloud Computing Security Workshop (CCSW)
[Conference Proceedings]


SecureScala: Scala embedding of secure computations
Hauck, Markus; Savvides, Savvas; Eugster, Patrick; Mezini, Mira; Salvaneschi, Guido
Proceedings of the 2016 7th ACM SIGPLAN Symposium on Scala
[Conference Proceedings]


SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles
Deshotels, Luke; Deaconescu, Razvan; Chiroiu, Mihai; Davi, Lucas; Enck, William; Sadeghi, Ahmad-Reza
23rd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer
Classen, Jiska; Steinmetzer, Daniel; Hollick, Matthias
3rd ACM Workshop on Visible Light Communication Systems
[Journal Article]


Disguised Chromium Browser: Robust browser, Flash and Canvas Fingerprinting Protection
Baumann, Peter; Katzenbeisser, Stefan; Stopczynski, Martin; Tews, Erik
WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, p.37-46
[Conference Proceedings]


C-FLAT: Control-Flow Attestation for Embedded Systems Software
Abera, Tigist; Asokan, N.; Davi, Lucas; Ekberg, Jan-Erik; Nyman, Thomas; Paverd, Andrew; Sadeghi, Ahmad-Reza; Tsudik, Gene
23rd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


WebRanz: web page randomization for better advertisement delivery and web-bot prevention
Wang, Weihang; Zheng, Yunhui; Xing, Xinyu; Kwon, Yonghwi; Zhang, Xiangyu; Eugster, Patrick
FSE 2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, p.205-216
[Conference Proceedings]


Reconciling Task Assignment and Scheduling in Mobile Edge Clouds
Wang, Lin; Jiao, Lei; Kliazovich, Dzmitry; Bouvry, Pascal
2016 IEEE 24th International Conference on Network Protocols (ICNP), p.1-6
[Conference Proceedings]


Towards a Policy-Agnostic Control-Flow Integrity Implementation
Sullivan, Dean; Arias, Orlando; Davi, Lucas; Sadeghi, Ahmad-Reza; Jin, Yier
Black Hat Europe
[Conference Proceedings]


SliM: Enabling Efficient, Seamless NFV State Migration (Poster Paper)
Nobach, Leonhard; Rimac, I.; Hilt, V.; Hausheer, David
2016 IEEE 24th International Conference on Network Protocols (ICNP), p.1-2
[Conference Proceedings]


FIB efficiency in distributed platforms
Kogan, Kirill; Nikolenko, Sergey I.; Eugster, Patrick; Shalimov, Alexander; Rottenstreich, Ori
2016 IEEE 24th International Conference on Network Protocols (ICNP), p.1-10
[Conference Proceedings]


An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins
Bansarkhani, Rachid El; Sturm, Jan
15th International Conference on Cryptology and Network Security - CANS 2016
[Conference Proceedings]


DNSSEC Misconfigurations in Popular Domains
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
Cryptology and Network Security. CANS 2016
[Conference Proceedings]


Scalable Secure Computation from ANSI-C
Buescher, Niklas; Kretzmer, David; Jindal, Arnav; Katzenbeisser, Stefan
WIFS - IEEE International Workshop on Information Forensics and Security
[Conference Proceedings]


AS³: Adaptive Social Secret Sharing for Distributed Storage Systems
Traverso, Giulia; Demirel, Denise; Habib, Sheikh Mahbub; Buchmann, Johannes
2016 Privacy, Security and Trust Conference
[Conference Proceedings]


Programming Scalable Cloud Services with AEON
Sang, Bo; Petri, Gustavo; Ardekani, Masoud Saeida; Ravi, Srivatsan; Eugster, Patrick
Middleware '16 Proceedings of the 17th International Middleware Conference, p.16:1
[Conference Proceedings]


Enabling Automatic Password Change in Password Managers Through Crowdsourcing
Mayer, Peter; Berket, Hermann; Volkamer, Melanie
International Conference on Passwords
[Conference Proceedings]


The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions
Gerber, Paul; Renaud, Karen; Volkamer, Melanie
>Journal of Information Security and Applications, p.8-26
[Journal Article]


A security analysis of techniques for long-term integrity protection
Geihs, Matthias; Demirel, Denise; Buchmann, Johannes
2016 Privacy, Security and Trust Conference
[Conference Proceedings]


Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks
Garcia Cordero, Carlos; Hauke, Sascha; Mühlhäuser, Max; Fischer, Mathias
Privacy, Security and Trust Conference, p.317 - 324
[Conference Proceedings]


Efficient Proactive Secret Sharing
Brendel, Jacqueline; Demirel, Denise
2016 Privacy, Security and Trust Conference
[Conference Proceedings]


Stream ciphers in the IoT: Grain and Trivium
L. Diedrich and L. Murati and A. Wiesmaier
[Report]


Comparing Lightweight Hash Functions – PHOTON & Quark
L. Schmidt and T. Meuser and A. Wiesmaier
[Report]


Block ciphers PRESENT and SEA in comparison
T. Kußmaul and J. Löffer and A. Wiesmaier
[Report]


IoT: Challenges, Projects, Architectures
V. Gazis and M. Görtz and M. Huber and A. Leonardi and K. Mathioudakis and A. Wiesmaier and F. Zeiger
18th International Conference on Intelligence in Next Generation Networks (ICIN), p.145–147
[Conference Proceedings]


Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey
M. Vigil and J. Buchmann and D. Cabarcas and C. Weinert and A. Wiesmaier
Computer & Security (Journal), Vol.50, p.16–32
[Journal Article]


Security Perspectives for Collaborative Data Acquisition in the Internet of Things
V. Gazis and C. Garcia Cordero and E. Vasilomanolakis and P. Kikiras and A. Wiesmaier
Internet of Things. IoT Infrastructures – IoT360 / SaSeIoT 2014, p.271-282


A View on Privacy & Trust in IoT
J. Daubert and A. Wiesmaier and P. Kikiras
IEEE ICC 2015 – First Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (SPIC), p.2665–2670
[Conference Proceedings]


A Survey of Technologies for the Internet of Things
V. Gazis and M. Görtz and M. Huber and A. Leonardi and K. Mathioudakis and A. Wiesmaier and F. Zeiger and E. Vasilomanolakis
2015 International Wireless Communications & Mobile Computing Conference (IWCMC), p.1090–1095
[Conference Proceedings]


End-2-End Privacy Architecture for IoT
S. Funke and J. Daubert and A. Wiesmaier and P. Kikiras and M. Mühlhäuser
Third IEEE Conference on Communications and Network Security (CNS 2015), p.705–706
[Conference Proceedings]