Publikationen
Publikationen
SafeSplit: A Novel Defense Against Client-Side Backdoor Attacks in Split Learning
Rieger, Phillip; Pegoraro, Alessandro; Kumari, Kavita; Abera, Tigist; Knauer, Jonathan; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2025
[Conference Proceedings]
VoiceRadar: Voice Deepfake Detection using Micro-Frequency and Compositional Analysis
Kumari, Kavita; Abbasihafshejani, Maryam; Pegoraro, Alessandro; Rieger, Phillip; Arshi, Kamyar; Jadliwala, Murtuza; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium
[Conference Proceedings]
Multi-Party Computation als Instrument zur Umsetzung datenschutzkonformer behördlicher Datenabgleiche: Eine interdisziplinäre Analyse am Beispiel der Diskussionen um das Gesetz zur Selbstbestimmung über den Geschlechtseintrag
Seyda, Linda; Brüggemann, Andreas; Hornung, Gerrit; Schneider, Thomas
INFORMATIK 2024, Workshop Recht und Technik: Datenschutz im Diskurs (RuT'24), p.153-167
[Journal Article]
Fuzzerfly Effect: Hardware Fuzzing for Memory Safety
Rostami, Mohamadreza; Chen, Chen; Kande, Rahul; Li, Huimin; Rajendran, Jeyavijayan; Sadeghi, Ahmad-Reza
IEEE Security & Privacy, p.76-86
[Journal Article]
Defying the Odds: Solana’s Unexpected Resilience in Spite of the Security Challenges Faced by Developers
Andreina, Sebastien; Cloosters, Tobias; Davi, Lucas; Giesen, Jens-Rene; Gutfleisch, Marco; Karame, Ghassan; Naiakshina, Alena; Naji, Houda
Proc. of the 31th ACM SIGSAC Conference on Computer & Communications Security (CCS)
[Conference Proceedings]
Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing
Rostami, Mohamadreza; Chilese, Marco; Zeitouni, Shaza; Kande, Rahul; Rajendran, Jeyavijayan; Sadeghi, Ahmad-Reza
2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), p.1-6
[Conference Proceedings]
WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors
Borkar, Pallavi; Chen, Chen; Rostami, Mohamadreza; Singh, Nikhilesh; Kande, Rahul; Sadeghi, Ahmad-Reza; Rebeiro, Chester; Rajendran, Jeyavijayan
33rd USENIX Security Symposium (USENIX Security 24), p.5377-5394
[Conference Proceedings]
Lost and Found in Speculation: Hybrid Speculative Vulnerability Detection
Rostami, Mohamadreza; Zeitouni, Shaza; Kande, Rahul; Chen, Chen; Mahmoody, Pouya; Rajendran, Jeyavijayan; Sadeghi, Ahmad-Reza
Proceedings of the 61st ACM/IEEE Design Automation Conference
[Conference Proceedings]
Digital Resilience in Dealing with Misinformation on Social Media during COVID-19: A Web Application to Assist Users in Crises
Schmid, Stefka; Hartwig, Katrin; Cieslinski, Robert; Reuter, Christian
Information Systems Frontiers, p.477-499
[Journal Article]
Marionette: Manipulate Your Touchscreen via A Charging Cable
Jiang, Yan; Ji, Xiaoyu; Wang, Kai; Yan, Chen; Mitev, Richard; Sadeghi, Ahmad-Reza
IEEE Transactions on Dependable and Secure Computing
[Journal Article]
Demasq: Unmasking the chatgpt wordsmith
Kumari, Kavita; Pegoraro, Alessandro; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2024
[Conference Proceedings]
MABFuzz: Multi-Armed Bandit Algorithms for Fuzzing Processors
Gohil, Vasudev; Rahul, Kande; Chen, Chen; Sadeghi, Ahmad-Reza; Rajendran, Jeyavijayan
2024 Design, Automation & Test in Europe Conference & Exhibition (DATE): Proceedings
[Conference Proceedings]
DeepEclipse: How to Break White-Box DNN-Watermarking Schemes
Pegoraro, Alessandro; Segna, Carlotta; Kumari, Kavita; Sadeghi, Ahmad-Reza
Proceedings of the 33rd USENIX Security Symposium, p.5287-5304
[Conference Proceedings]
Xplain: Analyzing Invisible Correlations in Model Explanation
Kumari, Kavita; Pegoraro, Alessandro; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
Proceedings of the 33rd USENIX Security Symposium, p.2937-2953
[Conference Proceedings]
Phantom: Untargeted Poisoning Attacks on Semi-Supervised Learning
Knauer, Jonathan; Rieger, Phillip; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.615-629
[Conference Proceedings]
LayerDBA: Circumventing Similarity-Based Defenses in Federated Learning
Nikolov, Javor; Pegoraro, Alessandro; Rieger, Phillip; Sadeghi, Ahmad-Reza
Proceedings: 45th IEEE Symposium on Security and Privacy Workshops: SPW 2024, p.299-305
[Conference Proceedings]
How to Respect Bystanders' Privacy in Smart Homes - A Co-Creation Study
Hahn, Sara; Al-Amrani, Nusaibah; Allagah, Sara; Huang, He Rong; Kircher, Eva; Rehs, Cornelia; Vogt, Joachim; Marky, Karola; Gerber, Nina
NordiCHI '24: Proceedings of the 13th Nordic Conference on Human-Computer Interaction
[Conference Proceedings]
Evaluating leakage attacks against relational encrypted search
Ehrler, Patrick; Kati, Abdelkarim; Schneider, Thomas; Treiber, Amos
Proceedings of the 2024 on Cloud Computing Security Workshop (CCSW '24), p.15-28
[Conference Proceedings]
Investigating Voter Perceptions of Printed Physical Audit Trails for Online Voting
Marky, Karola; Gerber, Nina; Krumb, Henry John; Khamis, Mohamed; Mühlhäuser, Max
2024 IEEE Symposium on Security and Privacy (SP), p.3458-3477
[Conference Proceedings]
Practitioners’ Corner ∙ How Effectively Do Consent Notices Inform Users About the Risks to Their Fundamental Rights?
Grassl, Paul; Gerber, Nina; Max, von Grafenstein
European Data Protection Law Review, p.96-104
[Journal Article]
Of Mothers and Managers – The Effect of Videos Depicting Gender Stereotypes on Women and Men in the Security and Privacy Field
Gerber, Nina; Stöver, Alina; Mayer, Peter
Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), p.547-566
[Conference Proceedings]
Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users
Koisser, David; Mitev, Richard; Chilese, Marco; Sadeghi, Ahmad-Reza
Proceedings: 45th IEEE Symposium on Security and Privacy - SP 2024
[Conference Proceedings]
One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices
Chilese, Marco; Mitev, Richard; Orenbach, Meni; Thorburn, Robert; Atamli, Ahmad; Sadeghi, Ahmad-Reza
Proceedings: 45th IEEE Symposium on Security and Privacy - SP 2024
[Conference Proceedings]
FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning
Fereidooni, Hossein; Pegoraro, Alessandro; Rieger, Phillip; Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2024
[Conference Proceedings]
CrowdGuard: Federated Backdoor Detection in Federated Learning
Rieger, Phillip; Krauß, Torsten; Miettinen, Mark; Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2024
[Conference Proceedings]
The Committing Security of MACs with Applications to Generic Composition
Bhaumik, Ritam; Chakraborty, Bishwajit; Choi, Wonseok; Dutta, Avijit; Govinden, Jérôme; Shen, Yaobin
44th Annual International Cryptology Conference (CRYPTO 2024)
[Conference Proceedings]
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
Fischlin, Marc; Günther, Felix; Janson, Christian
Journal of Cryptology
[Journal Article]
SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields
Degabriele, Jean Paul; Gilcher, Jan; Govinden, Jérôme; Paterson, Kenneth G.
2024 IEEE Symposium on Security and Privacy (SP)
[Conference Proceedings]
A Novel Design Flow for a Security-Driven Synthesis of Side-Channel Hardened Cryptographic Modules
Huss, Sorin; Stein, Oliver
Journal of Low Power Electronics and Applications
[Journal Article]
Fuzz on the Beach: Fuzzing Solana Smart Contracts
Smolka, Sven; Giesen, Jens-Rene; Winkler, Pascal; Draissi, Oussama; Davi, Lucas; Karame, Ghassan; Pohl, Klaus
Proc. of the 30th ACM SIGSAC Conference on Computer & Communications Security (CCS), p.1197-1211
[Conference Proceedings]