Publikationen

Publikationen

On the Timing Leakage of the Deterministic Re-encryption in HQC KEM
Hlauschek, Clemens; Lahr, Norman; Schröder, Robin Leander
[Paper]


Userspace Software Integrity Measurement
Eckel, Michael; Riemann, Tim
International Conference on Availability, Reliability and Security (ARES) 2021
[Conference Paper]


DNS-over-TCP considered vulnerable
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
Applied Networking Research Workshop (ANRW) 2021
[Conference Paper]


User-Centered Design of Visualizations for Software Vulnerability Reports
Reynolds, Steven Lamarr; Mertz, Tobias; Arzt, Steven; Kohlhammer, Jörn
Symposium on Visualization for Cyber Security (VizSec) 18, 2021, Online>
[Conference Paper]


PrivInferVis: Towards Enhancing Transparency over Attribute Inference in Online Social Networks
Simo, Hervais; Shulman, Haya; Schufrin, Marija; Reynolds, Steven Lamarr; Kohlhammer, Jörn
Conference on Computer Communications (INFOCOM) 2021, Online>
[Conference Paper]


MPC for securing internet infrastructure
Shrishak, K.; Shulman, H.
International Conference on Dependable Systems and Networks (DSN) 2020
[Conference Paper]


Optimal transport layer for secure computation
Brandt, M.; Orlandi, C.; Shrishak, K.; Shulman, H.
International Conference on Security and Cryptography (SECRYPT) 2020
[Conference Paper]


ASIC Accelerator in 28 nm for the Post-Quantum Digital Signature Scheme XMSS
Mohan, Prashanth; Wang, Wen; Jungk, Bernhard; Niederhagen, Ruben; Szefer, Jakub; Mai, Ken
International Conference on Computer Design (ICCD) 2020
[Conference Paper]


Sicherheit messen! Kennzahlensysteme zur Überwachung der Informationssicherheit
Stöwer, Mechthild; Kraft, Reiner
[Book Article]


Privacy and Robust Hashes. Privacy-Preserving Forensics for Image Re-Identification
Steinebach, Martin; Lutz, Sebastian; Liu, Huajian
[Journal Article]


Black-box caches fingerprinting
Klein, Amit; Heftrig, Elias; Shulman, Haya; Waidner, Michael
International Conference on emerging Networking EXperiments and Technologies (CoNEXT) 2020
[Conference Paper]


IT/OT-Security bei Internet of Railway Things (IoRT)
Arul, Tolga; Cosic, Jasmin; Drodt, Matthias; Friedrich, Marcus; Heinrich, Markus; Kant, Michael; Katzenbeisser, Stefan; Klarer, Helmut; Rauscher, Patrick; Schubert, Max; Still, Gerhard; Wallenhorst, Detlef; Zhdanova, Maria
[Report]


Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors
Bienhaus, Diethelm; Jäger, Lukas; Rieke, Roland; Krauß, Christoph
International Symposium on Intelligent Distributed Computing (IDC) 2019
[Conference Paper]


Desinformation aufdecken und bekämpfen
[Scientific Anthology]


Security Analysis of Automotive Protocols
Lauser, Timm; Zelle, Daniel; Krauß, Christoph
Computer Science in Cars Symposium (CSCS) 2020
[Conference Paper]


White Paper. Einwilligung. Möglich­keiten und Fallstricke aus der Konsumentenperspektive
Roßnagel, Alexander; Bile, Tamer; Nebel, Maxi; Geminn, Christian; Karaboga, Murat; Ebbers, Frank; Bremert, Benjamin; Stapf, Ingrid; Teebken, Mena; Thürmel, Verena; Ochs, Carsten; Uhlmann, Markus; Krämer, Nicole; Meier, Yannic; Kreutzer, Michael; Schreiber, Linda; Simo, Hervais
[Report]


XMSS and Embedded Systems
Wang, Wen; Jungk, Bernhard; Wälde, Julian; Deng, Shuwen; Gupta, Naina; Szefer, Jakub; Niederhagen, Ruben
International Conference on Selected Areas in Cryptography (SAC) 2019
[Conference Paper]


Interface to Network Security Functions (I2NSF) Terminology. Version 08
Hares, Susan; Strassner, John; Lopez, Diego R.; Xia, Liang; Birkholz, Henk
[Report]


Subverting Linux' Integrity Measurement Architecture
Bohling, Felix; Müller, Tobias; Eckel, Michael; Lindemann, Jens
International Conference on Availability, Reliability and Security (ARES) 2020
[Conference Paper]


An Improved Topic Masking Technique for Authorship Analysis
Halvani, Oren; Graner, Lukas; Regev, Roey; Marquardt, Philipp
International Conference on Availability, Reliability and Security (ARES) 2021
[Presentation]


Development and empirical optimization of an electrochemical analysis cell for the visualization of latent fingerprints and their chemical adhesives
Bergmann, Tommy; Gottschall, Sebastian; Fuchs, Enrico; Berlipp, Oliver; Labudde, Dirk
Gesellschaft für Informatik, Special Interest Group on Biometrics and Electronic Signatures (BIOSIG International Conference) 2020
[Conference Paper]


ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V
Alkim, Erdem; Evkan, Hülya; Lahr, Norman; Niederhagen, Ruben; Petri, Richard
[Paper]


Detecting "DeepFakes" in H.264 Video Data Using Compression Ghost Artifacts
Frick, Raphael Antonius; Zmudzinski, Sascha; Steinebach, Martin
Annual Symposium on Electronic Imaging, Science and Technology 2020
[Journal Article]


The structural basis of the genetic code: amino acid recognition by aminoacyl-tRNA synthetases
Kaiser, F.; Krautwurst, S.; Salentin, S.; Haupt, V.J.; Leberecht, C.; Bittrich, S.; Labudde, D.; Schroeder, M.
[Journal Article]


Secure IT without vulnerabilities and back doors
Weber, Arnd; Heiser, Gernot; Kuhlmann, Dirk; Schallbruch, Martin; Chattopadhyay, Anupam; Guilley, Sylvain; Kasper, Michael; Krauß, Christoph; Krüger, Philipp S.; Reith, Steffen; Seifert, Jean-Pierre
[Journal Article]


Recht und Informatik - Voneinander lernen und gemeinsam handeln
Grimm, Rüdiger
[Book Article]


DICE harder: A hardware implementation of the device identifier composition engine
Jäger, Lukas; Petri, Richard
International Conference on Availability, Reliability and Security (ARES) 2020
[Conference Paper]


Detecting Fake News Spreaders on Twitter from a Multilingual Perspective
Vogel, Inna; Meghana, Meghana
International Conference on Data Science and Advanced Analytics (DSAA) 2020
[Conference Paper]


DaVinci: Android App Analysis beyond Frida via Dynamic System Call Instrumentation
Druffel, Alexander; Heid, Kris
International Conference on Applied Cryptography and Network Security (ACNS) 2020
[Conference Paper]


The Impact of DNS Insecurity on Time
Jeitner, P.; Shulman, H.; Waidner, M.
International Conference on Dependable Systems and Networks (DSN) 2020
[Conference Paper]