Publikationen

Publikationen

Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted Analysis
Saß, Xhani Marvin; Krachenfels, Thilo; Dermot Pustelnik, Frederik; Seifert, Jean-Pierre; Altmann, Frank
Workshop on Attacks and Solutions in Hardware Security 2023
[Conference Paper]


Poster: Longitudinal Analysis of DoS Attacks
Schulmann, Haya; Waidner, Michael; Kaiser, Fabian
Conference on Computer and Communications Security 2023
[Conference Paper]


Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP
Ulitzsch, Vincent Quentin; Marzougui, Soundes; Bagia, Alexis; Tibouchi, Mehdi; Seifert, Jean-Pierre
[Journal Article]


Content-type: multipart/oracle - tapping into format oracles in email end-to-end encryption
Ising, Fabian; Poddebniak, Damian; Kappert, Tobias; Saatjohann, Christoph; Schinzel, Sebastian
USENIX Security Symposium 2023
[Conference Paper]


Datenschutzvorsorge in der offensiven Cyber­sicher­heits­forschung
Selzer, Annika; Spiecker gen. Döhmann, Indra; Boll, Alina
[Journal Article]


Darknet
Steinebach, Martin; Yannikos, York


Resource Management for Programmable Metasurfaces: Concept, Prospects and Challenges
Liaskos, Christos; Katsalis, Kostas; Triay, Joan; Schmid, Stefan
[Journal Article]


SeedTree: A Dynamically Optimal and Local Self-Adjusting Tree
Pourdamghani, Arash; Avin, Chen; Sama, Robert; Schmid, Stefan
[Paper]


Self-Adjusting Partially Ordered Lists
Addanki, Vamsi; Pacut, Maciej; Pourdamghani, Arash; Rétvári, Gabor; Schmid, Stefan; Vanerio, Juan
Conference on Computer Communications 2023
[Conference Paper]


Runtime Verification for Programmable Switches
Shukla, Apoorv; Hudemann, Kevin; Vági, Zsolt; Hügerich, Lily; Smaragdakis, Georgios; Hecker, Artur; Schmid, Stefan; Feldmann, Anja
[Journal Article]


The Case for Stochastic Online Segment Routing Under Demand Uncertainty
Boeck, Jérôme De; Fortz, Bernard; Schmid, Stefan
Networking Conference 2023
[Conference Paper]


Toward Highly Reliable Programmable Data Planes: Verification of P4 Code Generation
Csaba, Györgyi; Laki, Sándor; Schmid, Stefan
International Conference on Network Softwarization 2023
[Conference Paper]


Analyzing the Communication Clusters in Datacenters
Foerster, Klaus-Tycho; Marette, Thibault; Neumann, Stefan; Plant, Claudia; Sadikaj, Ylli; Schmid, Stefan; Velaj, Yllka
World Wide Web Conference 2023
[Conference Paper]


OpticNet: Self-Adjusting Networks for ToR-Matching-ToR Optical Switching Architectures
Caldeira, Caio A.; Souza, Otavio A. de O.; Goussevskaia, Olga; Schmid, Stefan
Conference on Computer Communications 2023
[Conference Paper]


Dynamic Demand-Aware Link Scheduling for Reconfigurable Datacenters
Hanauer, Kathrin; Henzinger, Monika; Ost, Lara; Schmid, Stefan
Conference on Computer Communications 2023
[Conference Paper]


Sinkless Orientation Made Simple
Balliu, Alkida; Korhonen, Janne H.; Kuhn, Fabian; Lievonen, Henrik; Olivetti, Dennis; Pai, Shreyas; Paz, Ami; Rybicki, Joel; Schmid, Stefan; Studený, Jan; Suomela, Jukka; Uitto, Jara
Symposium on Simplicity in Algorithms 2023
[Conference Paper]


Fraunhofer SIT at CheckThat! 2023: Can LLMs Be Used for Data Augmentation & Few-Shot Classification? Detecting Subjectivity in Text Using ChatGPT
Frick, Raphael
Conference and Labs of the Evaluation Forum 2023
[Conference Paper]


Fraunhofer SIT at CheckThat! 2023: Mixing Single-Modal Classifiers to Estimate the Check-Worthiness of Multi-Modal Tweets
Vogel, Inna; Frick, Raphael
Conference and Labs of the Evaluation Forum 2023
[Presentation]


Fraunhofer SIT at CheckThat! 2023: Tackling Classification Uncertainty Using Model Souping on the Example of Check-Worthiness Classification
Frick, Raphael; Vogel, Inna; Choi, Jeong-Eun
Conference and Labs of the Evaluation Forum 2023
[Presentation]


Sensitive and Personal Data: What Exactly Are You Talking About?
Kober, Maria; Samhi, Jordan; Arzt, Steven; Bissyandé, Tegawendé F.; Klein, Jacques
International Conference on Mobile Software Engineering and Systems 2023
[Conference Paper]


Load-Optimization in Reconfigurable Networks: Algorithms and Complexity of Flow Routing
Dai, Wenkai; Foerster, Klaus-Tycho; Fuchssteiner, David; Schmidt, Stefan
[Journal Article]


Practical (in)security of IoT and medical IT systems
Saatjohann, Christoph
[Thesis]


Künstliche Intelligenz als Instrument des Kinder- und Jugendmedienschutzes
Steinebach, Martin
[Journal Article]


Opinion on Supplementing Regulation (EU) 2019/943
Gkoktsis, George; Kreutzer, Michael; Scheel, Kirstin; Schreiber, Linda
[Paper]


Exploring Corner Cases of Modern Applied Cryptography - Decryption Oracle Attacks on End-to-End Encryption and Attacks on Transport Encryption
Ising, Fabian
[Thesis]


Poster: LeMon: Global Route Leak Monitoring Service
Schulmann, Haya; Zhao, Shujie
Association for Computing Machinery, Special Interest Group on Data Communication (ACM SIGCOMM Conference) 2023
[Conference Paper]


Poster: Off-Path DNSSEC Downgrade Attacks
Heftrig, Elias; Schulmann, Haya; Waidner, Michael
Association for Computing Machinery, Special Interest Group on Data Communication (ACM SIGCOMM Conference) 2023
[Conference Paper]


Intermezzo. Welcher Technologie kann man vertrauen?
Schulmann, Haya; Waidner, Michael
[Journal Article]


Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet
Hlavacek, Tomas; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
USENIX Security Symposium 2023
[Paper]


Aktive Cyberabwehr
Schulmann, Haya; Waidner, Michael
[Journal Article]