Publikationen

Publikationen

Da­ten­schutz­freund­liche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten
Ghiglieri, Marco; Müller, Jan
14. Deutscher IT-Sicherheitskongress
[Conference Proceedings]


Readactor: Practical Code Randomization Resilient to Memory Disclosure
Crane, Stephen; Liebchen, Christopher; Homescu, Andrei; Davi, Lucas; Larsen, Per; Sadeghi, Ahmad-Reza; Brunthaler, Stefan; Franz, Michael
36th IEEE Symposium on Security and Privacy (Oakland)
[Conference Proceedings]


Learn To Spot Phishing URLs with the Android NoPhish App
Canova, Gamze; Volkamer, Melanie; Bergmann, Clemens; Borza, Roland; Reinheimer, Benjamin; Stockhardt, Simon; Tenberg, Ralf
Information Security Education Across the Curriculum - 9th (IFIP), p.87-100
[Conference Proceedings]


EnvDASH: An Environment-Aware Dynamic Adaptive Streaming over HTTP System
Wilk, Stefan; Schönherr, Sophie; Stohr, Denny; Effelsberg, Wolfgang
Proceedings of the ACM International Conference on Interactive Experiences for TV and Online Video, p.113-118
[Conference Proceedings]


Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief
Steinmetzer, Daniel; Schulz, Matthias; Hollick, Matthias
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec)
[Conference Proceedings]


Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis
Songhori, Ebrahim; Sadeghi, Ahmad-Reza; Koushanfar, Farinaz
52nd Design Automation Conference (DAC)
[Conference Proceedings]


Universal Threshold Calculation for Fingerprinting Decoders using Mixture Models
Schäfer, Marcel; Mair, Sebastian; Berchtold, Waldemar; Steinebach, Martin
IH&MMSec '15 Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, p.109-114
[Conference Proceedings]


Security and Privacy Challenges in Industrial Internet of Things
Sadeghi, Ahmad-Reza; Wachsmann, Christian; Waidner, Michael
52nd Design Automation Conference (DAC) Research
[Conference Proceedings]


Phasing: Private Set Intersection using Permutation-based Hashing
Pinkas, Benny; Schneider, Thomas; Segev, Gil; Zohner, Michael
24. USENIX Security Symposium (USENIX Security'15)
[Conference Proceedings]


How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL
Nagy, Marcin; Bui, Thanh Phong; Cristofaro, Emiliano De; Asokan, N.; Ott, Jörg; Sadeghi, Ahmad-Reza
ACM WiSEC 2015
[Conference Proceedings]


Computational trust methods for security quantification in the cloud ecosystem
Habib, Sheikh Mahbub; Volk, Florian; Hauke, Sascha; Mühlhäuser, Max
The Cloud Security Ecosystem, p.463-493
[Journal Article]


Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
Günther, Felix; Poettering, Bertram
20th Australasian Conference on Information Security and Privacy (ACISP 2015), p.195-212
[Conference Proceedings]


Nudging Bank Account Holders Towards More Secure PIN Management
Gutmann, Andreas; Renaud, Karen; Volkamer, Melanie
Journal of Internet Technology and Secured Transaction (JITST), p.380 - 386
[Conference Proceedings]


How to Securely Prolong the Computational Bindingness of Pedersen Commitments
Demirel, Denise; Lancrenon, Jean
[Report]


An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme
Cabarcas, Daniel; Demirel, Denise; Göpfert, Florian; Lancrenon, Jean; Wunderer, Thomas
[Report]


TyTAN: Tiny Trust Anchor for Tiny Devices
Brasser, Ferdinand; Koeberl, Patrick; Mahjoub, Brahim El; Sadeghi, Ahmad-Reza; Wachsmann, Christian
52nd Design Automation Conference (DAC) 2015
[Conference Proceedings]


HAFIX: Hardware-Assisted Flow Integrity Extension
Arias, Orlando; Davi, Lucas; Hanreich, Matthias; Jin, Yier; Koeberl, Patrick; Paul, Debayan; Sadeghi, Ahmad-Reza; Sullivan, Dean
52nd Design Automation Conference (DAC)
[Conference Proceedings]


Comparing Lightweight Hash Functions – PHOTON & Quark
Meuser, Tobias; Schmidt, Larissa; Wiesmaier, Alexander
[Report]


The Love/Hate Relationship with the C Preprocessor: An Interview Study
Medeiros, Flávio; Kästner, Christian; Ribeiro, Márcio; Nadi, Sarah; Gheyi, Rohit
European Conference on Object-Oriented Programming, p.999-1022
[Conference Proceedings]


Leveraging the Potential of Cloud Security Service Level Agreements through Standards
Luna, Jesus; Suri, Neeraj; Iorga, Michaela; Karmel, Anil
Proceedings of IEEE Cloud Computing, 27.06.- 02.07. 2015, New York
[Conference Proceedings]


Towards a New Paradigm for Privacy and Security in Cloud Services
Loruenser, Thomas; Rodriguez, Charles Bastos; Demirel, Denise; Fischer-Hübner, Simone; Gross, Thomas R.; Langer, Thomas; des Noes, Mathieu; Poehls, Henrich; Rozenberg, Boris; Slamanig, Daniel
CoRR abs/1506.05980 (2015)
[Journal Article]


Block ciphers PRESENT and SEA in comparison
Kußmaul, Tobias; Löffler, Johannes; Wiesmaier, Alexander
[Report]


DLint: Dynamically Checking Bad Coding Practices in JavaScript
Gong, Liang; Pradel, Michael; Sridharan, Manu; Sen, Koushik
Proceedings of the 2015 International Symposium on Software Testing and Analysis, p.94-105
[Conference Proceedings]


Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze
Ghiglieri, Marco; Lange, Benjamin; Simo, Hervais; Waidner, Michael
Digitale Schwellen - Freiheit und Privatheit in der digi­tali­sierten Welt, p.67-84
[Conference Proceedings]


Toward a Just-in-Time Static Analysis
Nguyen Quang Do, Lisa; Ali, Karim; Bodden, Eric; Livshits, Benjamin
[Journal Article]


Stream ciphers in the IoT: Grain and Trivium
Diedrich, Lennart; Murati, Lulzim; Wiesmaier, Alexander
[Report]


Hybrid Monitors for Concurrent Noninterference
Askarov, Aslan; Chong, Stephen; Mantel, Heiko
Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), p.137-151
[Conference Proceedings]


An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given)
Volkamer, Melanie; Renaud, Karen; Kulyk, Oksana; Emeröz, Sinem
[Report]


Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness
Volkamer, Melanie; Renaud, Karen; Braun, Kristoffer; Canova, Gamze; Reinheimer, Benjamin
International Conference on Trust and Trustworthy Computing (TRUST), p.104-121
[Conference Proceedings]


On Rehoming the Electronic Id to TEEs
Tamrakar, Sandeep; Ekberg, Jan-Erik; Laitinen, Pekka
The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)
[Conference Proceedings]