Publications

Publications

TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter
Hartwig, Katrin; Reuter, Christian
Proceedings of the International Conference on Wirtschaftsinformatik (WI)
[Conference Proceedings]


Hybride Dienst­leis­tun­gen in digi­tali­sierten Kooperationen in der Landwirtschaft
Bernardi, Ansgar; Reuter, Christian; Schneider, Wolfgang; Linsner, Sebastian; Kaufhold, Marc-André
38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?
[Conference Proceedings]


A Holistic View on Organizational IT Security: The Influence of Contextual Aspects During IT Security Decisions
Heidt, Margareta; Gerlach, Jin; Buxmann, Peter
Hawaii International Conference on System Sciences (HICSS)
[Conference Proceedings]


Resilient Smart Farming (RSF) – Nutzung digitaler Tech­no­logien in krisensicherer Infrastruktur
Reuter, Christian; Schneider, Wolfgang; Eberz, Daniel
Informatik in der Land-, Forst- und Ernährungswirtschaft : Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen – ein Widerspruch in sich? Referate der 39. GIL-Jahrestagung, p.177-182
[Conference Proceedings]


SANCTUARY: ARMing TrustZone with User-space Enclaves
Brasser, Ferdinand; Gens, David; Jauernig, Patrick; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
26th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V
Weiser, Samuel; Werner, Mario; Brasser, Ferdinand; Malenko, Maja; Mangard, Stefan; Sadeghi, Ahmad-Reza
26th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


Nautilus: Fishing for Deep Bugs with Grammars
Aschermann, Cornelius; Frassetto, Tommaso; Holz, Thorsten; Jauernig, Patrick; Sadeghi, Ahmad-Reza; Teuchert, Daniel
26th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


Perun: Virtual Payment Hubs over Cryptocurrencies
Dziembowski, Stefan; Eckey, Lisa; Faust, Sebastian; Malinowski, Daniel
39th IEEE Symposium on Security and Privacy
[Conference Proceedings]


What can a single minutia tell about gender?
Terhörst, Philipp; Damer, Naser; Braun, Andreas; Kuijper, Arjan
International Workshop on Biometrics and Forensics (IWBF) 2018
[Conference Paper]


Deep and multi-algorithmic gender classification of single fingerprint minutiae
Terhörst, Philipp; Damer, Naser; Braun, Andreas; Kuijper, Arjan
International Conference on Information Fusion (FUSION) 2018
[Conference Paper]


Fingerprint and iris multi-biometric data indexing and retrieval
Damer, Naser; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan
International Conference on Information Fusion (FUSION) 2018
[Conference Paper]


MorGAN: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Generative Adversarial Network
Damer, Naser; Moseguí Saladié, Alexandra; Braun, Andreas; Kuijper, Arjan
International Conference on Biometrics - Theory, Applications and Systems (BTAS) 2018
[Conference Paper]


Visual-Interactive Identification of Anomalous IP-Block Behavior Using Geo-IP Data
Ulmer, Alex; Schufrin, Marija; Sessler, David; Kohlhammer, Jörn
Symposium on Visualization for Cyber Security (VizSec) 2018
[Conference Paper]


Deep learning-based face recognition and the robustness to perspective distortion
Damer, Naser; Wainakh, Yaza; Henniger, Olaf; Croll, Christian; Berthe, Benoit; Braun, Andreas; Kuijper, Arjan
International Conference on Pattern Recognition (ICPR) 2018
[Conference Paper]


CrazyFaces: Unassisted Circumvention of Watchlist Face Identification
Damer, Naser; Wainakh, Yaza; Boller, Viola; Berken von den, Sven; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan
International Conference on Biometrics - Theory, Applications and Systems (BTAS) 2018
[Conference Paper]


The dark side of the face: Exploring the ultraviolet spectrum for face biometrics
Samartzidis, Timotheos; Siegmund, Dirk; Gödde, Michael; Damer, Naser; Braun, Andreas; Kuijper, Arjan
International Conference on Biometrics (ICB) 2018
[Conference Paper]


P-score: Performance aligned normalization and an evaluation in score-level multi-biometric fusion
Damer, Naser; Boutros, Fadi; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan
European Signal Processing Conference (EUSIPCO) 2018
[Conference Paper]


LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution
Dessouky, Ghada; Abera, Tigist; Ibrahim, Ahmad; Sadeghi, Ahmad-Reza
37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18)
[Conference Proceedings]


A Comparative Study across Static and Dynamic Side-Channel Countermeasures
Dantas, Yuri Gil; Hamann, Tobias; Mantel, Heiko
The 11th International Symposium on Foundations & Practice of Security (FPS)
[Conference Proceedings]


Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove
Degabriele, Jean Paul; Fischlin, Marc
Advances in Cryptology - ASIACRYPT 2018, p.519-550
[Conference Proceedings]


"This Website Uses Cookies": Users' Perceptions and Reactions to the Cookie Disclaimer
Kulyk, Oksana; Hilt, Annika; Gerber, Nina; Volkamer, Melanie
3rd European Workshop on Usable Security (EuroUSEC), London, England, April 23, 2018
[Conference Proceedings]


Helping john to make informed decisions on using social login
Karegar, Farzaneh; Gerber, Nina; Volkamer, Melanie; Fischer-Hübner, Simone
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, p.1165-1174
[Conference Proceedings]


Evaluation der Nutzbarkeit von PGP und S/MIME in Thunderbird
Ghiglieri, Marco; Henhapl, Birgit; Gerber, Nina
Mensch und Computer 2018 - Workshopband
[Conference Proceedings]


Web Application for Privacy-Preserving Scheduling
Kiss, Ágnes; Schick, Oliver; Schneider, Thomas
27. USENIX Security Symposium (USENIX Security'18) Poster Session
[Conference Proceedings]


A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems
Birkholz, Henk; Krauß, Christoph; Zhdanova, Maria; Kuzhiyelil, Don; Arul, Tolga; Heinrich, Markus; Katzenbeisser, Stefan; Suri, Neeraj; Vateva-Gurova, Tsvetoslava; Schlehuber, Christian
4th International Workshop on MILS: Architecture and Assurance for Secure Systems, (MILS@DSN 2018)
[Conference Proceedings]


Anonymous Charging and Billing of Electric Vehicles
Zelle, Daniel; Springer, Markus; Zhdanova, Maria; Krauß, Christoph
Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES, p.1-22
[Conference Proceedings]


The user-centered privacy-aware control system PRICON: An interdisciplinary evaluation
Walter, Jonas; Abendroth, Bettina; Von Pape, Thilo; Plappert, Christian; Zelle, Daniel; Krauß, Christoph; Gagzow, Gundula; Decke, Hendrik
Proceedings of the 13th International Conference on Availability, Reliability and Security ARES, p.1-24
[Conference Proceedings]


Open Source Value Chains for Addressing Security Issues Efficiently
Weber, Arnd; Reith, Steffen; Kuhlmann, Dirk; Kasper, Michael; Seifert, Jean-Pierre; Krauß, Christoph
2018 IEEE International Conference on Software Quality, Reliability and Security Companion, QRS Companion, p.599-606
[Conference Proceedings]


Auf dem Weg zu sicheren abgeleiteten Identitäten mit Payment Service Directive 2
Träder, Daniel; Zeier, Alexander; Heinemann, Andreas
Sicherheit, p.183-196
[Conference Proceedings]


Towards Fingerprint Presentation Attack Detection Based on Convolutional Neural Networks and Short Wave Infrared Imaging
Tolosana, R.; Gomez-Barrero, M.; Kolberg, J.; Morales, A.; Busch, C.; Ortega-Garcia, J.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-5
[Conference Proceedings]