Publications
Publications
Post-Quantum TLS on Embedded Systems - Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS
Bürstinghaus-Steinbach, Kevin; Krauß, Christoph; Niederhagen, Ruben; Schneider, Michael
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS, p.841–852
[Conference Proceedings]
Securing Electric Vehicle Charging Systems through Component Binding
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
39th International Conference on Computer Safety, Reliability and Security, SAFECOMP
[Conference Proceedings]
HIP: HSM-based Identities for Plug-and-Charge
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]
HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria; Heddergott, Ronald
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]
Security Analysis of Automotive Protocols
Lauser, Timm; Zelle, Daniel; Krauß, Christoph
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]
Zur Benutzbarkeit und Verwendung von API-Dokumentationen
Huesmann, Rolf; Zeier, Alexander; Heinemann, Andreas; Wiesmaier, Alexander
Mensch & Computer Workshopband
[Conference Proceedings]
SSBC 2020: Sclera Segmentation Benchmarking Competition in the Mobile Environment
Vitek, M.; Das, A.; Pourcenoux, Y.; Missler, A.; Paumier, C.; Das, S.; De Ghosh, I.; Lucio, D. R.; Zanlorensi Jr., L. A.; Menotti, D.; Boutros, F.; Damer, N.; Grebe, J. H.; Kuijper, A.; Hu, J.; He, Y.; Wang, C.; Liu, H.; Wang, Y.; Sun, Z.; Osorio-Roig, D.; Rathgeb, C.; Busch, C.; Tapia, J.; Valenzuela, A.; Zampoukis, G.; Tsochatzidis, L.; Pratikakis, I.; Nathan, S.; Suganya, R.; Mehta, V.; Dhall, A.; Raja, K.; Gupta, G.; Khiarak, J. N.; Akbari-Shahper, M.; Jaryani, F.; Asgari-Chenaghlu, M.; Vyas, R.; Dakshit, S.; Dakshit, S.; Peer, P.; Pal, U.; Struc, V.
Proc. Intl. Joint Conf. on Biometrics (IJCB), p.1-10
[Conference Proceedings]
Plastic Surgery: An Obstacle for Deep Face Recognition?
Rathgeb, C.; Dogan, D.; Stockhardt, F.; De Marsico, M.; Busch, C.
Proc. 15th IEEE Computer Society Workshop on Biometrics (CVPRW), p.806-807
[Conference Proceedings]
Vulnerability Assessment and Detection of Makeup Presentation Attacks
Rathgeb, C.; Drozdowski, P.; Fischer, D.; Busch, C.
Proc. Int. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]
Touchless Fingerprint Sample Quality: Prerequisites for the Applicability of NFIQ2.0
Priesnitz, J.; Rathgeb, C.; Buchmann, N.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]
Simulation of Print-Scan Transformations for Face Images based on Conditional Adversarial Networks
Mitkovski, A.; Merkle, J.; Rathgeb, C.; Tams, B.; Bernardo, K.; Haryanto, N. E.; Busch, C.
Proc. of 2020 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-8
[Conference Proceedings]
Efficiency Analysis of Post-quantum-secure Face Template Protection Schemes based on Homomorphic Encryption
Kolberg, J.; Drozdowski, P.; Gomez-Barrero, M.; Rathgeb, C.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-4
[Conference Proceedings]
Fisher Vector Encoding of Dense-BSIF Features for Unknown Face Presentation Attack Detection
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Busch, C.
Proc. Intl. Conf. of the Special Interest Group on Biometrics (BIOSIG 2020), p.1-11
[Conference Proceedings]
Can Generative Colourisation Help Face Recognition?
Drozdowski, P.; Fischer, D.; Rathgeb, C.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.299-307
[Conference Proceedings]
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection
Bauspieß, P.; Kolberg, J.; Demmler, D.; Krämer, J.; Busch, C.
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
[Conference Proceedings]
Peek-a-Boo: I see your smart home activities, even encrypted!
Acar, Abbas; Fereidooni, Hossein; Abera, Tigist; Sikder, Amit Kumsr; Miettinen, Markus; Aksu, Hidayet; Conti, Mauro; Sadeghi, Ahmad-Reza
WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
[Conference Proceedings]
Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication
Putz, Florentin; Álvarez, Flor; Classen, Jiska
WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.31-41
[Conference Proceedings]
DEMO: BTLEmap: Nmap for Bluetooth Low Energy
Heinrich, Alexander; Stute, Milan; Hollick, Matthias
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and MobileNetworks, p.331-333
[Conference Proceedings]
MPC for Securing Internet Infrastructure
Shrishak, Kris; Shulman, Haya
50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020)
[Conference Proceedings]
Diving into Email Bomb Attack
Schneider, Markus; Shulman, Haya; Sidis, Adi; Sidis, Ravid; Waidner, Michael
DSN 2020-International Conference on Dependable Systems and Networks
[Conference Proceedings]
Secure Consensus Generation with Distributed DoH
Jeitner, Philipp; Shulman, Haya; Waidner, Michael
DSN 2020-International Conference on Dependable Systems and Networks
[Conference Proceedings]
Pitfalls of Provably Secure Systems in Internet - The Case of Chronos-NTP
Jeitner, Philipp; Shulman, Haya; Waidner, Michael
DSN 2020-International Conference on Dependable Systems and Networks
[Conference Proceedings]
The Impact of DNS Insecurity on Time
Jeitner, Philipp; Shulman, Haya; Waidner, Michael
DSN2020 - 50th International Conference on Dependable Systems and Networks
[Conference Proceedings]
DISCO: Sidestepping RPKI's Deployment Barriers
Hlavacek, Tomas; Cunha, Italo; Gilad, Yossi; Herzberg, Amir; Katz-Bassett, Ethan; Schapira, Michael; Shulman, Haya
Network and Distributed Systems Security Symposium (NDSS 2020)
[Conference Proceedings]
INVITED: AI Utopia or Dystopia - On Securing AI Platforms
Dessouky, Ghada; Jauernig, Patrick; Mentens, Nele; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
DAC'20-Design Automation Conference 2020
[Conference Proceedings]
Client-oblivious OPRAM
Davies, Gareth T.; Janson, Christian; Martin, Daniel P.
The 22nd International Conference on Information and Communications Security (ICICS 2020)
[Conference Proceedings]
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC
Dalskov, Anders; Keller, Marcel; Orlandi, Claudio; Shrishak, Kris; Shulman, Haya
ESORICS 2020-The 25th European Symposium on Research in Computer Security
[Conference Proceedings]
Optimal Transport Layer for Secure Computation
Brandt, Markus; Orlandi, Claudio; Shrishak, Kris; Shulman, Haya
SECRYPT 2020-The 17th International Conference on Security and Cryptography
[Conference Proceedings]
TACAI: An Intermediate Representation Based on Abstract Interpretation
Reif, Michael; Kübler, Florian; Helm, Dominik; Hermann, Ben; Eichberg, Michael; Mezini, Mira
SOAP 2020-9th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis
[Conference Proceedings]
Linear-Complexity Private Function Evaluation is Practical
Holz, Marco; Kiss, Ágnes; Rathee, Deevashwer; Schneider, Thomas
25. European Symposium on Research in Computer Security (ESORICS'20)
[Conference Proceedings]