Publikationen

Publikationen

Sinkless Orientation Made Simple
Balliu, Alkida; Korhonen, Janne H.; Kuhn, Fabian; Lievonen, Henrik; Olivetti, Dennis; Pai, Shreyas; Paz, Ami; Rybicki, Joel; Schmid, Stefan; Studený, Jan; Suomela, Jukka; Uitto, Jara
Symposium on Simplicity in Algorithms 2023
[Conference Paper]


Fraunhofer SIT at CheckThat! 2023: Can LLMs Be Used for Data Augmentation & Few-Shot Classification? Detecting Subjectivity in Text Using ChatGPT
Frick, Raphael
Conference and Labs of the Evaluation Forum 2023
[Conference Paper]


Fraunhofer SIT at CheckThat! 2023: Mixing Single-Modal Classifiers to Estimate the Check-Worthiness of Multi-Modal Tweets
Vogel, Inna; Frick, Raphael
Conference and Labs of the Evaluation Forum 2023
[Presentation]


Fraunhofer SIT at CheckThat! 2023: Tackling Classification Uncertainty Using Model Souping on the Example of Check-Worthiness Classification
Frick, Raphael; Vogel, Inna; Choi, Jeong-Eun
Conference and Labs of the Evaluation Forum 2023
[Presentation]


Sensitive and Personal Data: What Exactly Are You Talking About?
Kober, Maria; Samhi, Jordan; Arzt, Steven; Bissyandé, Tegawendé F.; Klein, Jacques
International Conference on Mobile Software Engineering and Systems 2023
[Conference Paper]


Load-Optimization in Reconfigurable Networks: Algorithms and Complexity of Flow Routing
Dai, Wenkai; Foerster, Klaus-Tycho; Fuchssteiner, David; Schmidt, Stefan
[Journal Article]


Practical (in)security of IoT and medical IT systems
Saatjohann, Christoph
[Thesis]


Künstliche Intelligenz als Instrument des Kinder- und Jugendmedienschutzes
Steinebach, Martin
[Journal Article]


Opinion on Supplementing Regulation (EU) 2019/943
Gkoktsis, George; Kreutzer, Michael; Scheel, Kirstin; Schreiber, Linda
[Paper]


Exploring Corner Cases of Modern Applied Cryptography - Decryption Oracle Attacks on End-to-End Encryption and Attacks on Transport Encryption
Ising, Fabian
[Thesis]


Poster: LeMon: Global Route Leak Monitoring Service
Schulmann, Haya; Zhao, Shujie
Association for Computing Machinery, Special Interest Group on Data Communication (ACM SIGCOMM Conference) 2023
[Conference Paper]


Poster: Off-Path DNSSEC Downgrade Attacks
Heftrig, Elias; Schulmann, Haya; Waidner, Michael
Association for Computing Machinery, Special Interest Group on Data Communication (ACM SIGCOMM Conference) 2023
[Conference Paper]


Intermezzo. Welcher Technologie kann man vertrauen?
Schulmann, Haya; Waidner, Michael
[Journal Article]


Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet
Hlavacek, Tomas; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
USENIX Security Symposium 2023
[Paper]


Aktive Cyberabwehr
Schulmann, Haya; Waidner, Michael
[Journal Article]


Risk Assessments in Virtual Power Plants with NESCOR Criteria, Practical Application, Advantages and Disadvantages
Gkoktsis, Georgios; Lauer, Hagen; Jäger, Lukas
International Conference on Availability, Reliability and Security 2023
[Conference Paper]


Beyond Limits: How to Disable Validators in Secure Networks
Hlavacek, Tomas; Jeitner, Philipp; Mirdita, Donika; Shulman, Haya; Waidner, Michael
Association for Computing Machinery, Special Interest Group on Data Communication (ACM SIGCOMM Conference) 2023
[Conference Paper]


Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates
Frieß, Jens; Schulmann, Haya; Waidner, Michael
International Conference on Emerging Networking EXperiments and Technologies 2023
[Journal Article]


Einsatz von computergenerierten Missbrauchsabbildungen zur Strafverfolgung im Darknet
Wittmer, Sandra; Steinebach, Martin
[Book Article]


Der richtige Umgang mit KI-generierten Inhalten
Steinebach, Martin


APT Detection: An Incremental Correlation Approach
Daneshgadeh Çakmakçı, Salva; Gkoktsis, Georgios; Buchta, Robin; Detken, Kai Oliver; Heine, Felix; Kleiner, Carsten
International Conference on Intelligent Data Acquisition and Advanced Computing Systems - Technology Applications 2023
[Conference Paper]


Desinformationserkennung anhand von Netzwerkanalysen - ein Instrument zur Durchsetzung der Pflichten des DSA am Beispiel von Telegram
Panahi, Tahireh; Hornung, Gerrit; Schäfer, Karla; Choi, Jeong-Eun; Steinebach, Martin; Vogel, Inna
[Book Article]


Abschreckungseffekte und Überwachungsgefühl im Datenschutzrecht
Büscher, Maximilian; Hornung, Gerrit; Schindler, Stephan; Zurawski, Paul; Gutjahr, Amina; Spiecker gen. Döhmann, Indra; Selzer, Annika; Stummer, Sarah; Wilmer, Thomas
[Journal Article]


Zulässigkeit der Zweckänderung durch Auftragsverarbeiter
Boll, Alina; Gärtner, Tanya; Geissler, Ines; Stummer, Sarah
[Journal Article]


Remote Attestation with Constrained Disclosure
Eckel, Michael; George, Dominik Roy; Grohmann, Björn; Krauß, Christoph
Annual Computer Security Applications Conference 2023
[Conference Paper]


Secure and Lightweight Over-the-Air Software Update Distribution for Connected Vehicles
Plappert, Christian; Fuchs, Andreas
Annual Computer Security Applications Conference 2023
[Conference Paper]


Secure and Lightweight ECU Attestations for Resilient Over-the-Air Updates in Connected Vehicles
Plappert, Christian; Fuchs, Andreas
Annual Computer Security Applications Conference 2023
[Conference Paper]


Langfristige IT-Sicherheit durch Kryptoagilität
Wolf, Leonie; Kreutzer, Michael


Queen of Swords at Touché 2023. Intra-Multilingual Multi-Target Stance Classification using BERT
Schäfer, Karla
Conference and Labs of the Evaluation Forum 2023
[Conference Paper]


Fraunhofer SIT at CheckThat! 2023: Enhancing the Detection of Multimodal and Multigenre Check-Worthiness Using Optical Character Recognition and Model Souping
Frick, Raphael; Vogel, Inna; Choi, Jeong-Eun
Conference and Labs of the Evaluation Forum 2023
[Conference Paper]