Publikationen
Publikationen
Slow TCAM Exhaustion DDoS Attack
Pascoal, Tulio A.; Dantas, Yuri Gil; Fonseca, Iguatemi E.; Nigam, Vivek
Proceedings of the 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
[Conference Proceedings]
Productivity vs. Security: Mitigating Conflicting Goals in Organizations
Mayer, Peter; Gerber, Nina; McDermott, Ronja; Volkamer, Melanie; Vogt, Joachim
Information and Computer Security, p.137-151
[Journal Article]
A Systematic Study of Cache Side Channels across AES Implementations
Mantel, Heiko; Weber, Alexandra; Köpf, Boris
Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS)
[Conference Proceedings]
A Systematic Study of Cache Side Channels across AES Implementations
Mantel, Heiko; Weber, Alexandra; Köpf, Boris
[Conference Proceedings]
Taming Message-passing Communication in Compositional Reasoning about Confidentiality
Li, Ximeng; Mantel, Heiko; Tasch, Markus
Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS)
[Conference Proceedings]
Taming Message-passing Communication in Compositional Reasoning about Confidentiality
Li, Ximeng; Mantel, Heiko; Tasch, Markus
[Conference Proceedings]
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen
Gerber, Paul; Volkamer, Melanie; Gerber, Nina
Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing, p.139-167
[Conference Proceedings]
Towards Accelerated Usage Control based on Access Correlations
Gay, Richard; Hu, Jinwei; Mantel, Heiko; Schickel, Johannes
Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec)
[Conference Proceedings]
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks
Gay, Richard; Hu, Jinwei; Mantel, Heiko; Mazaheri, Sogol
Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS)
[Conference Proceedings]
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks
Gay, Richard; Hu, Jinwei; Mantel, Heiko; Mazaheri, Sogol
[Conference Proceedings]
AVR Processors as a Platform for Language-Based Security
Dewald, Florian; Mantel, Heiko; Weber, Alexandra
Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS)
[Conference Proceedings]
AVR Processors as a Platform for Language-Based Security
Dewald, Florian; Mantel, Heiko; Weber, Alexandra
[Conference Proceedings]
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics
Bindel, Nina; Buchmann, Johannes; Krämer, Juliane; Mantel, Heiko; Schickel, Johannes; Weber, Alexandra
Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS)
[Conference Proceedings]
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics
Bindel, Nina; Buchmann, Johannes; Krämer, Juliane; Mantel, Heiko; Schickel, Johannes; Weber, Alexandra
[Conference Proceedings]
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug
Rehfeld, Silke; Volkamer, Melanie; Neumann, Stephan
>Mittelstand 4.0 - Agentur Kommunikation
[Journal Article]
Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks
Kohnhäuser, Florian; Büscher, Niklas; Gabmeyer, Sebastian; Katzenbeisser, Stefan
[Journal Article, Report]
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
Grube, Tim; Hauke, Sascha; Daubert, Jörg; Mühlhäuser, Max
2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), p.337-340
[Conference Proceedings]
Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications
Ankele, Robin; Kucuk, Kubilay A.; Martin, Andrew; Simpson, Andrew; Paverd, Andrew
13th IEEE International Conference on Advanced and Trusted Computing, p.414-422
[Conference Proceedings]
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn
Volkamer, Melanie; Renaud, Karen; Reinheimer, Benjamin; Kunz, Alexandra
>Computers & Security, p.100-113
[Journal Article]
Towards Enhancing the Visual Analysis of Interdomain Routing
Ulmer, Alex; Kohlhammer, Jörn; Shulman, Haya
VISIGRAPP 2017 : 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications
[Conference Proceedings]
Will a Decaying Atom Feel a Friction Force?
Trautmann, Nils; Sonnleitner, Matthias; Barnett, Stephen
Physical Review Letters
[Journal Article]
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security
Schaller, André; Xiong, Wenjie; Anagnostopoulos, Nikolaos Athanasios; Saleem, Umair; Gabmeyer, Sebastian; Katzenbeisser, Stefan; Szefer, Jakub
2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
[Conference Proceedings]
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity
Rudd, Robert; Skowyra, Richard; Bigelow, David; Dedhia, Veer; Hobson, Thomas; Crane, Stephen; Liebchen, Christopher; Larsen, Per; Davi, Lucas; Franz, Michael; Sadeghi, Ahmad-Reza; Okhravi, Hamed
24th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]
Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO
Nielsen, Jesper Buus; Schneider, Thomas; Trifiletti, Roberto
24. Annual Network and Distributed System Security Symposium (NDSS'17)
[Conference Proceedings]
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit
Garcia, Luis; Brasser, Ferdinand; Cintuglu, Mehmet H.; Sadeghi, Ahmad-Reza; Mohammed, Osama; Zonouz, Saman A.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]
Pushing the Communication Barrier in Secure Computation using Lookup Tables
Dessouky, Ghada; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza; Schneider, Thomas; Zeitouni, Shaza; Zohner, Michael
24. Annual Network and Distributed System Security Symposium (NDSS'17)
[Conference Proceedings]
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables
Davi, Lucas; Gens, David; Liebchen, Christopher; Sadeghi, Ahmad-Reza
24th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]
Are We There Yet? On RPKIs Deployment and Security
Cohen, Avichai; Gilad, Yossi; Herzberg, Amir; Schapira, Michael; Shulman, Haya
Network and Distributed Systems Security (NDSS)
[Conference Proceedings]
Privacy-Preserving Interdomain Routing at Internet Scale
Asharov, Gilad; Demmler, Daniel; Schapira, Michael; Schneider, Thomas; Segev, Gil; Shenker, Scott; Zohner, Michael
Proceedings on Privacy Enhancing Technologies (PoPETs), p.143-163
[Journal Article]
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in Signed Domains
Shulman, Haya; Waidner, Michael
The 14th USENIX Symposium on Networked SystemsDesign and Implementation (NSDI)
[Conference Proceedings]