Publikationen
Publikationen
ML-basierte Unterstützung von Lösch- und Aufbewahrungspflichten
Kunz, Thomas; Waldmann, Ulrich
[Journal Article]
Fraunhofer SIT@SMM4H’22: Learning to Predict Stances and Premises in Tweets related to COVID-19 Health Orders Using Generative Models
Frick, Raphael Antonius; Steinebach, Martin
Workshop on Social Media Mining for Health Applications 2022
[Conference Paper]
IT and more: Anonymisierung unstrukturierter Daten
Steinebach, Martin; Vogel, Inna
[Journal Article]
Behind the Scenes of RPKI
Hlavacek, Tomas; Jeitner, Philipp; Mirdita, Donika; Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security 2022
[Conference Paper]
Poster: Insights into Global Deployment of RPKI Validation
Shulman, Haya; Vogel, Niklas; Waidner, Michael
Conference on Computer and Communications Security 2022
[Conference Paper]
Poster: The Unintended Consequences of Algorithm Agility in DNSSEC
Heftrig, Elias; Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security 2022
[Conference Paper]
Poster: RPKI Kill Switch
Mirdita, Donika; Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security 2022
[Conference Paper]
Poster: DNS in Routers Considered Harmful
Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security 2022
[Conference Paper]
Security code smells in apps: are we getting better?
Arzt, Steven
European Software Engineering Conference 2022
[Conference Paper]
Auswahl cloudbasierter Dienste
Geissler, Ines; Pordesch, Ulrich; Selzer, Annika; Wilmer, Thomas
[Journal Article]
Computer Security- ESORICS 2021. 26th European Symposium on Research in Computer Security. Proceedings. Pt.I
European Symposium on Research in Computer Security (ESORICS) 2021
[Conference Proceeding]
A Novel Approach to IP ID Classification
Zhao, Shujie; Schulman, Haya
Kryptotag 2021
[Conference Paper]
Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS
Marzougui, Soundes; Wisiol, Nils; Gersch, Patrick; Krämer, Juliane; Seifert, Jean-Pierre
[Paper]
BusCount: A Provable Replay Protection Solution for Automotive CAN Networks
Zelle, Daniel; Gürgens, Sigrid
[Journal Article]
Privacy Policies of Mobile Apps - A Usability Study
Anikeev, Maxim; Shulman, Haya; Simo, Hervais
Conference on Computer Communications (INFOCOM) 2021
[Conference Paper]
Technische Herausforderungen bei der Umsetzung von Uploadfiltern
Steinebach, Martin
Gesellschaft für Informatik (GI Jahrestagung) 2021
[Conference Paper]
Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers
Heftrig, Elias; Seifert, Jean-Pierre; Shulman, Haya; Waidner, Michael; Wisiol, Nils
Conference on Computer and Communications Security (CCS) 2021
[Conference Paper]
On the quantum versus classical learnability of discrete distributions
Sweke, R.; Seifert, J.-P.; Hangleiter, D.; Eisert, J.
[Journal Article]
Secure gate: Secure gateways and wireless sensors as enablers for sustainability in production plants
Bienhaus, Diethelm; Ebner, Andreas; Jäger, Lukas; Rieke, Roland; Krauß, Christoph
[Journal Article]
Streaming SPHINCS+ for Embedded Devices using the Example of TPMs
Niederhagen, Ruben; Roth, Johannes; Wälde, Julian
[Paper]
The hijackers guide to the galaxy: Off-path taking over internet resources
Dai, Tianxiang; Jeitner, Philipp; Shulman, Haya; Waidner, Michael
USENIX Security Symposium 2021
[Conference Paper]
Automated, Dynamic Android App Vulnerability and Privacy Leak Analysis: Design Considerations, Required Components and Available Tools
Heid, Kris; Heider, Jens
European Interdisciplinary Cybersecurity Conference (EICC) 2021
[Conference Paper]
Chances and Limitations of Personal and Anonymized Data Processing
Selzer, Annika; Timm, Ingo J.
Gesellschaft für Informatik (GI Jahrestagung) 2021
[Conference Paper]
From IP to transport and beyond: Cross-layer attacks against applications
Dai, Tianxiang; Jeitner, Philipp; Shulman. Haya; Waidner, Michael
Association for Computing Machinery, Special Interest Group on Data Communication (ACM SIGCOMM Conference) 2021
[Conference Paper]
Automatic extraction of secrets from the transistor jungle using laser-assisted side-channel attacks
Krachenfels, T.; Kiyan, T.; Tajik, S.; Seifert, J.-P.
USENIX Security Symposium 2021
[Conference Paper]
Discovery of Single-Vendor Marketplace Operators in the Tor-Network
Brenner, Fabian; Platzer, Florian; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) 2021
[Conference Paper]
POSNoise: An Effective Countermeasure Against Topic Biases in Authorship Analysis
Halvani, Oren; Graner, Lukas
International Conference on Availability, Reliability and Security (ARES) 2021
[Conference Paper]
Risiken für die Privatheit aufgrund von Maschinellem Lernen
Battis, Anna-Verena; Graner, Lukas
Gesellschaft für Informatik (GI Jahrestagung) 2020
[Conference Paper]
Datenschutzkonformes Löschen bei Datenschutz- und Informationssicherheitsvorfällen
Rudolph, Louisa; Selzer, Annika; Pordesch, Ulrich
[Journal Article]
"I Never Thought about Securing my Machine Learning Systems": A Study of Security and Privacy Awareness of Machine Learning Practitioners
Boenisch, Franziska; Battis, Verena; Buchmann, Nicolas; Poikela, Maija
Konferenz "Mensch und Computer" (MuC) 2021
[Conference Paper]