Publikationen

Publikationen

Performance Analysis of Machine Learning Centered Workload Prediction Models for Cloud
Saxena, Deepika; Kumar, Jitendra; Singh, Ashutosh Kumar; Schmid, Stefan
[Journal Article]


Duo: A High-Throughput Reconfigurable Datacenter Network Using Local Routing and Control
Zerwas, Johannes; Györgyi, Csaba; Blenk, Andreas; Schmid, Stefan; Avin, Chen
Association for Computing Machinery, Special Interest Group on Performance Evaluation (ACM SIGMETRICS Conference) 2023
[Journal Article]


A Concise Analysis of Pasting Attacks and their Impact on Image Classification
Bunzel, Niklas; Graner, Lukas
International Conference on Dependable Systems and Networks Workshops 2023
[Conference Paper]


Adversarial Patch Detection and Mitigation by Detecting High Entropy Regions
Bunzel, Niklas; Siwakoti, Ashim; Klause, Gerrit
International Conference on Dependable Systems and Networks Workshops 2023
[Conference Paper]


Multi-class Detection for Off The Shelf transfer-based Black Box Attacks
Bunzel, Niklas; Böringer, Dominik
Workshop on Secure and Trustworthy Deep Learning Systems 2023
[Conference Paper]


Towards Mission Aware Cyber-Resiliency with Autonomous Agents
Gkoktsis, Georgios; Lauer, Hagen; Jäger, Lukas
Australasian Computer Science Week 2023
[Conference Paper]


Identifizierbarkeit und Anonymität im Internet
Stummer, Sarah
[Journal Article]


Extensible and Scalable Architecture for Hybrid Analysis
Miltenberger, Marc; Arzt, Steven
International Workshop on the State Of the Art in Program Analysis 2023
[Conference Paper]


Secure Multi-User Contract Certificate Management for ISO 15118-20 Using Hardware Identities
Plappert, Christian; Jäger, Lukas; Irrgang, Alexander; Potluri, Chandrasekhar
International Conference on Availability, Reliability and Security 2023
[Conference Paper]


Datenschutz in der offensiven Cyber­sicher­heits­forschung
Boll, Alina; Selzer, Annika; Spiecker, Indra


Begriffsverwirrung verhindern: Was Maßnahmen Aktiver Cyberabwehr sind - und was nicht
Gärtner, Tanya; Selzer, Annika


A Generic IoT Quantum-Safe Watchdog Timer Protocol
Eckel, Michael; Gutsche, Tanja; Lauer, Hagen; Rein, André
International Conference on Availability, Reliability and Security 2023
[Conference Paper]


Context Correlation for Automated Dynamic Android App Analysis to Improve Impact Rating of Privacy and Security Flaws
Heid, Kris; Heider, Jens
International Conference on Risks and Security of Internet and Systems 2022
[Conference Paper]


Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods. An Application to the Android Framework for Data Leak Detection
Samhi, Jordan; Kober, Maria; Kabore, Abdoul Kader; Arzt, Steven; Bissyande, Tegawende F.; Klein, Jacques
International Conference on Software Analysis, Evolution and Reengineering 2023
[Paper]


Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones
Heftrig, Elias; Shulman, Haya; Waidner, Michael
USENIX Security Symposium 2023
[Conference Paper]


Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods
Samhi, Jordan; Kober, Maria; Kaboré, Abdoul Kader; Arzt, Steven; Bissyandé, Tégawendé François; Klein, Jacques
International Conference on Software Analysis, Evolution and Reengineering 2023
[Conference Paper]


Benchmarking the Benchmarks
Miltenberger, Marc; Arzt, Steven; Holzinger, Philipp; Näumann, Julius
Asia Conference on Computer and Communications Security 2023
[Conference Paper]


An Analysis of PhotoDNA
Steinebach, Martin
International Conference on Availability, Reliability and Security 2023
[Conference Paper]


Tracing Cryptographic Agility in Android and iOS Apps
Heid, Kris; Heider, Jens; Ritscher, Matthias; Stotz, Jan-Peter
International Conference on Information Systems Security and Privacy 2023
[Conference Paper]


Users' Privacy Literacy, Motivation to use Tor and Further Privacy Protecting Behavior
Platzer, Florian; Lux, Alexandra
International Symposium on Technikpsychologie 2023
[Conference Paper]


Collaborative Security Patterns for Automotive Electrical/Electronic Architectures
Fenzl, Florian; Plappert, Christian; Rieke, Roland; Zelle, Daniel; Costantino, Gianpiero; Vincenzi, Marco De; Matteucci, Ilaria
[Book Article]


Asymptotically Tight Bounds on the Time Complexity of Broadcast and its Variants in Dynamic Networks
El-Hayek, Antoine; Henzinger, Monika; Schmid, Stefan
Innovations in Theoretical Computer Science Conference 2023
[Conference Paper]


The Time Complexity of Consensus Under Oblivious Message Adversaries
Winkler, Kyrill; Paz, Ami; Galeana, Hugo Rincon; Schmid, Stefan; Schmid, Ulrich
Innovations in Theoretical Computer Science Conference 2023
[Conference Paper]


On the Feasibility of Single-Trace Attacks on the Gaussian Sampler Using a CDT
Marzougui, Soundes; Kabin, Ievgen; Krämer, Juliane; Aulbach, Thomas; Seifert, Jean-Pierre
International Workshop on Constructive Side-Channel Analysis and Secure Design 2023
[Conference Paper]


Towards detecting device fingerprinting on iOS with API function hooking
Heid, Kris; Andrae, Vincent; Heider, Jens
European Interdisciplinary Cybersecurity Conference 2023
[Conference Paper]


Dynamic Maintenance of Monotone Dynamic Programs and Applications
Henzinger Rauch, Monika; Neumann, Stefan; Räcke, Harald; Schmid, Stefan
International Symposium on Theoretical Aspects of Computer Science 2023
[Conference Paper]


Duo: A High-Throughput Reconfigurable Datacenter Network Using Local Routing and Control
Zerwas, Johannes; Györgyi, Csaba; Blenk, Andreas; Schmid, Stefan; Avin, Chen
International Conference on Measurement and Modeling of Computer Systems 2023
[Conference Paper]


Angemessene technische und organisatorische Maßnahmen
Gärtner, Tanya; Selzer, Annika
[Journal Article]


Metrikensysteme als Beitrag zur Umsetzung des risikobasierten Ansatzes
Gärtner, Tanya; Selzer, Annika
[Journal Article]


Personenbezogenheit vs. Anonymität
Stummer, Sarah
[Journal Article]