Publikationen
Publikationen
Scraping and Analyzing Data of a Large Darknet Marketplace
Yannikos, York; Heeger, Julian; Steinebach, Martin
International Conference on Availability, Reliability and Security 2022
[Journal Article]
Image Hashing Robust Against Cropping and Rotation
Steinebach, Martin; Berwanger, Tiberius; Liu, Huajian
International Conference on Availability, Reliability and Security 2022
[Journal Article]
Deep Fake - Visuelle Manipulation medialer Inhalte
Steinebach, Martin
Tagung "Interkommunale Zusammenarbeit (IKZ) im Bereich der Cybersicherheit" 2022
[Conference Paper]
Wie gefährlich ist ChatGPT?
Vogel, Inna; Steinebach, Martin
Wenn aus Worten Bilder werden
Steinebach, Martin
[Journal Article]
Deepfakes Erstellen und Erkennen in Echtzeit
Steinebach, Martin
Hamburger Sicherheitsrechtstag 2022
[Conference Paper]
Detection of deepfakes using background-matching
Blümer, Stefanie; Steinebach, Martin; Frick, Raphael; Bunzel, Niklas
International Symposium on Electronic Imaging 2023
[Journal Article]
Predicting positions of flipped bits in robust image hashes
Hammann, Marius; Steinebach, Martin; Liu, Huajian; Bunzel, Niklas
International Symposium on Electronic Imaging 2023
[Journal Article]
Privacy preserving leak detection in peer-to-peer communication
Heeger, Julian; Bugert, Simon; Berchtold, Waldemar; Gruler, Alexander; Steinebach, Martin
International Symposium on Electronic Imaging 2023
[Journal Article]
Deepfakes, Dall-E & Co.
Frick, Raphael; Steinebach, Martin; Zmudzinski, Sascha
[Journal Article]
Audio captcha breaking and consequences for human users
Oberthür, Fabian; Steinebach, Martin; Battis, Verena
International Symposium on Electronic Imaging 2023
[Journal Article]
Integrity and authenticity verification of printed documents by smartphones
Bugert, Simon; Heeger, Julian; Berchtold, Waldemar
International Symposium on Electronic Imaging 2023
[Journal Article]
Erkennung von Kindesmissbrauch in Medien
Steinebach, Martin
[Journal Article]
Verantwortungsbewusster Umgang mit IT-Sicherheitslücken: Problemlagen und Optimierungsoptionen für ein effizientes Zusammenwirken zwischen IT-Sicherheitsforschung und IT-Verantwortlichen
Wagner, Manuela; Vettermann, Oliver; Arzt, Steven; Brodowski, Dominik; Dickmann, Roman; Golla, Sebastian; Goerke, Niklas; Kreutzer, Michael; Leicht, Maximilian; Obermaier, Johannes; Schink, Marc; Schreiber, Linda; Sorge, Christoph
[Book]
Coverage-Guided Fuzzing of Embedded Systems Leveraging Hardware Tracing
Beckmann, Maximilian; Steffan, Jan
European Symposium on Research in Computer Security 2022
[Conference Paper]
Ein Vorschlag für die datenschutzkonforme Gestaltung von Datenschutz-Grundsätzen und -Schutzmaßnahmen in IT-Systemen
Selzer, Annika; Timm, Ingo J.
[Journal Article]
P4RROT: Generating P4 Code for the Application Layer
Györgyi, Csaba; Schmid, Stefan; Laki, Sándor
[Journal Article]
EM-Fault it Yourself: Building a Replicable EMFI Setup for Desktop and Server Hardware
Kühnapfel, Niclas; Buhren, Robert; Jacob, Hans Niklas; Krachenfels, Thilo; Werling, Christian; Seifert, Jean-Pierre
International Conference on Physical Assurance and Inspection of Electronics 2022
[Conference Paper]
Short Paper: A Centrality Analysis of the Lightning Network
Zabka, Philipp; Foerster, Klaus-Tycho Tycho; Decker, Christian; Schmid, Stefan
International Conference on Financial Cryptography and Data Security 2022
[Conference Paper]
3. Interdisciplinary Privacy & Security at Large Workshop
Selzer, Annika; Timm, Ingo J.
Gesellschaft für Informatik (Jahrestagung) 2022
[Conference Paper]
Brief Announcement: Temporal Locality in Online Algorithms
Pacut, MacIej; Parham, Mahmoud; Rybicki, Joel; Schmid, Stefan; Suomela, Jukka; Tereshchenko, Aleksandr
International Symposium on Distributed Computing 2022
[Conference Paper]
XMSS-based Chain of Trust
Marzougui, Soundes; Seifert, Jean-Pierre
International Workshop on Security Proofs for Embedded Systems 2021
[Conference Paper]
Streaming SPHINCS+ for Embedded Devices Using the Example of TPMs
Niederhagen, Ruben; Roth, Johannes; Wälde, Julian
International Conference on Cryptology in Africa 2022
[Conference Paper]
Rechtliche Implikationen von Cybersicherheitsvorfällen in der kommunalen Verwaltung
Schreiber, Linda
Gesellschaft für Informatik (Jahrestagung) 2022
[Conference Paper]
Warum es einen Rechtsrahmen für die offensive Cybersicherheitsforschung braucht
Selzer, Annika; Spiecker Genannt Döhmann, Indra
DeTox: A Comprehensive Dataset for German Offensive Language and Conversation Analysis
Demus, Christoph; Pitz, Jonas; Schütz, Mina; Probol, Nadine; Siegel, Melanie; Labudde, Dirk
Workshop on Online Abuse and Harms 2022
[Conference Paper]
Towards Automated Detection and Prevention of Regrettable (Self-) Disclosures on Social Media
Simo Fhom, Hervais-Clemence; Kreutzer, Michael
International Conference on Trust, Security and Privacy in Computing and Communications 2022
[Conference Paper]
CAHOOT: a Context-Aware veHicular intrusiOn detectiOn sysTem
Micale, Davide; Costantino, Gianpiero; Matteucci, Ilaria; Fenzl, Florian; Rieke, Roland; Patanè, Giuseppe
International Conference on Trust, Security and Privacy in Computing and Communications 2022
[Conference Paper]
Design Space Exploration of DICE
Lorych, Dominik; Jäger, Lukas
International Conference on Availability, Reliability and Security 2022
[Conference Paper]
A Resilient Network Node for the Industrial Internet of Things
Jäger, Lukas; Lorych, Dominik; Eckel, Michael
International Conference on Availability, Reliability and Security 2022
[Conference Paper]