Publikationen
Publikationen
Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU
Gruza, Olivia; Heftrig, Elias; Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Conference on Offensive Technologies 2024
[Paper]
External Attack-Surface of Modern Organizations
Gelernter, Nethanel; Schulmann, Haya; Waidner, Michael
Asia Conference on Computer and Communications Security 2024
[Conference Paper]
The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Heftrig, Elias; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Conference on Computer and Communications Security 2024
[Paper]
Byzantine-Secure Relying Party for Resilient RPKI
Frieß, Jens; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
[Paper]
Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms
Frieß, Jens; Gattermayer, Tobias; Gelernter, Nethanel; Schulmann, Haya; Waidner, Michael
Symposium on Networked Systems Design and Implementation 2024
[Paper]
Protocol Fixes for KeyTrap Vulnerabilities
Heftrig, Elias; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Applied Networking Research Workshop 2024
[Conference Paper]
Rechtliche Folgen und Risiken der De-Anonymisierung
Stummer, Sarah
[Journal Article]
Die Zukunft der ePrivacy-Verordnung
Selzer, Annika
[Journal Article]
De-Anonymisierung: Beobachtungs- und sonstige Pflichten
Stummer, Sarah
[Journal Article]
The CURE to Vulnerabilities in RPKI Validation
Mirdita, Donika; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Network and Distributed System Security Symposium 2024
[Conference Paper]
Rechtliche und technische Herausforderungen von Privatheit in Big-Data-Verarbeitungssystemen
Hornung, Gerrit; Schaller, Till; Selzer, Annika; Stummer, Sarah
[Journal Article]
Datenschutz und Cybersicherheit gemeinsam angehen
Appelt, Dominik; Enzmann, Matthias; Selzer, Annika; Wolf, Ruben
Hardware Trust Anchor Authentication for Updatable IoT Devices
Lorych, Dominik; Plappert, Christian
International Conference on Availability, Reliability and Security 2024
[Conference Paper]
A Photo and a Few Spoken Words Is All It Needs?! On the Challenges of Targeted Deepfake Attacks and their Detection
Frick, Raphael; Steinebach, Martin
Workshop on the Security Implications of Deepfakes and Cheapfakes 2024
[Conference Paper]
Acceleration of DICE Key Generation using Key Caching
Lorych, Dominik; Jäger, Lukas; Fuchs, Andreas
International Conference on Availability, Reliability and Security 2024
[Conference Paper]
SECURA: Unified Reference Architecture for Advanced Security and Trust in Safety Critical Infrastructures
Eckel, Michael; Gürgens, Sigrid
International Conference on Availability, Reliability and Security 2024
[Conference Paper]
One Detector to Rule Them All? On the Robustness and Generalizability of Current State-of-the-Art Deepfake Detection Methods
Frick, Raphael; Steinebach, Martin
Media Watermarking, Security, and Forensics Conference 2024
[Journal Article]
Towards Practical Hardware Fingerprinting for Remote Attestation
Eckel, Michael; Fenzl, Florian; Jäger, Lukas
International Conference on ICT Systems Security and Privacy Protection 2024
[Conference Paper]
Natural Language Steganography by ChatGPT
Steinebach, Martin
International Conference on Availability, Reliability and Security 2024
[Conference Paper]
Unveiling the Darkness: Analysing Organised Crime on the Wall Street Market Darknet Marketplace using PGP Public Keys
Fan, Shiying; Ranly, Paul Moritz; Graner, Lukas; Vogel, Inna; Steinebach, Martin
International Conference on Availability, Reliability and Security 2024
[Conference Paper]
An automated consistency management approach for a privacy-aware electric vehicle architecture
Stancke, Jonathan; Plappert, Christian; Jäger, Lukas
[Journal Article]
Captchas on Darknet Marketplaces: Overview and Automated Solvers
Yannikos, York; Heeger, Julian
International Symposium for Electronic Imaging 2024
[Journal Article]
Security Protocols for Ethernet-Based In-Vehicle Communication
Lauser, Timm; Zelle, Daniel; Krauß, Christoph; Kern, Dustin; Völker, Lars
Vehicular Networking Conference 2024
[Conference Paper]
Prediction of Flipped Bits in Robust Image Hashes by Machine Learning
Bunzel, Niklas; Steinebach, Martin; Hammann, Marius; Liu, Huajian
Media Watermarking, Security, and Forensics Conference 2024
[Journal Article]
Efficient Hash Lookup for PhotoDNA
Steinebach, Martin
International Symposium for Electronic Imaging 2024
[Journal Article]
Live-Ortung von Beschäftigten in der agilen Personaleinsatzplanung
Johannhörster, Volker; Kohn, Matthias; Kunz, Thomas; Schleper, Janine; Waldmann, Ulrich
[Journal Article]
Evaluating an Open-Source Hardware Approach from HDL to GDS for a Security Chip Design - a Review of the Final Stage of Project HEP
Henkes, Tim; Reith, Steffen; Stöttinger, Marc; Herfurth, Norbert; Panic, Goran; Wälde, Julian; Buschkowski, Fabian; Sasdrich, Pascal; Lüth, Christoph; Funck, Milan; Kiyan, Tuba; Weber, Arnd; Boeck, Detlef; Rathfelder, René; Grawunder, Torsten
Design, Automation & Test in Europe Conference & Exhibition 2024
[Conference Paper]
ValBench: Benchmarking Exact Value Analysis
Arzt, Steven; Miltenberger, Marc
International Workshop on the State Of the Art in Program Analysis 2024
[Conference Paper]
Introduction to Audio Deepfake Generation: Academic Insights for Non-Experts
Choi, Jeong-Eun; Schäfer, Karla; Zmudzinski, Sascha
International Workshop on Multimedia AI against Disinformation 2024
[Conference Paper]
Explore the World of Audio Deepfakes: A Guide to Detection Techniques for Non-Experts
Schäfer, Karla; Choi, Jeong-Eun; Zmudzinski, Sascha
International Workshop on Multimedia AI against Disinformation 2024
[Conference Paper]