Publikationen
Publikationen
Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks
Linsner, Sebastian; Varma, Rashmi; Reuter, Christian
Informatik in der Land-, Forst- und Ernährungswirtschaft : Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, p.119-124
[Conference Proceedings]
Are thermal attacks a realistic threat? Investigating the preconditions of thermal attacks in users’ daily lives
Bekaert, Paul; Alotaibi, Norah; Mathis, Florian; Gerber, Nina; Rafferty, Aidan Christopher; Khamis, Mohamed; Marky, Karola
Proceedings of the 12th Nordic Conference on Human-Computer Interaction, p.1-9
[Conference Proceedings]
Website operators are not the enemy either - Analyzing options for creating cookie consent notices without dark patterns
Stöver, Alina; Gerber, Nina; Cornel, Christin; Henz, Mona; Marky, Karola; Zimmermann, Verena; Vogt, Joachim
Mensch und Computer 2022 - Workshopband
[Conference Proceedings]
Autonomous Driving - Analysing the Impact of Resilience Engineering Features in Smart Car Interfaces
Pasnicu, Otilia; Zmmermann, Verena; Gerber, Nina; Cardoso, Sarah
Mensch und Computer 2022: Facing Realities - Tagungsband, p.545-549
[Conference Proceedings]
You offer privacy like you offer tea: Investigating Mechanisms for Improving Guest Privacy in IoT-Equipped Households
Marky, Karola; Gerber, Nina; Pelzer, Michelle Gabriela; Khamis, Mohamed; Mühlhäuser, Max
Proceedings on Privacy Enhancing Technologies (PoPETs), p.400-420
[Journal Article]
Nostradamus Goes Quantum
Benedikt, Barbara Jiabao; Fischlin, Marc; Huppert, Moritz
Advances in Cryptology - ASIACRYPT 2022, p.583-613
[Conference Proceedings]
Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels
Degabriele, Jean Paul; Karadžić, Vukašin
Advances in Cryptology - CRYPTO 2022, p.264-295
[Conference Proceedings]
On Quantum Ciphertext Indistinguishability, Recoverability, and OAEP
Krämer, Juliane; Struck, Patrick
Post-Quantum Cryptography, p.286-306
[Conference Proceedings]
A Random Oracle for All of Us
Fischlin, Marc; Rohrbach, Felix; Schmalz, Tobias
Progress in Cryptology - AFRICACRYPT 2022, p.469-489
[Conference Proceedings]
Processing of botnet tracking data under the GDPR
Böck, Leon; Fejrskov, Martin; Demetzou, Katerina; Karuppayah, Shankar; Mühlhäuser, Max; Vasilomanolakis, Emmanouil
Computer law & security review
[Journal Article]
VirTEE: a full backward-compatible TEE with native live migration and secure I/O
Wang, Jianqiang; Mahmoody, Pouya; Brasser, Ferdinand; Jauernig, Patrick; Sadeghi, Ahmad-Reza; Yu, Donghui; Pan, Dahan; Zhang, Yuanyuan
DAC'22: Proceedings of the 59th ACM/IEEE Design Automation Conference, p.241-246
[Conference Proceedings]
Trusting the trust anchor: towards detecting cross-layer vulnerabilities with hardware fuzzing
Chen, Chen; Kande, Rahul; Mahmoody, Pouya; Sadeghi, Ahmad-Reza; Rajendran, JV
DAC'22: Proceedings of the 59th ACM/IEEE Design Automation Conference, p.1379-1383
[Conference Proceedings]
PEA: Practical private epistasis analysis using MPC
Hamacher, Kay; Kussel, Tobias; Schneider, Thomas; Tkachenko, Oleksandr
Computer Security - ESORICS 2022, p.320-339
[Conference Proceedings]
POSTER: MPClan: Protocol suite for privacy-conscious computations
Kotila, Nishat; Patil, Shravani; Patra, Arpita; Suresh, Ajith
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3379-3381
[Conference Proceedings]
Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs
Günther, Daniel; Holz, Marco; Judkewitz, Benjamin; Möllering, Helen; Pinkas, Benny; Schneider, Thomas; Suresh, Ajith
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3351-3353
[Conference Proceedings]
Poster: Efficient Three-Party Shuffling Using Precomputation
Brüggemann, Andreas; Schneider, Thomas; Suresh, Ajith; Yalame, Hossein
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3331-3333
[Conference Proceedings]
Terrorbekämpfung mithilfe sozialer Medien –
ein explorativer Einblick am Beispiel von Twitter
Reuter, Christian; Pätsch, Katja; Runft, Elena
Proceedings der 13. Internationalen Tagung Wirtschaftsinformatik (WI 2017), p.649-663
[Conference Proceedings]
How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes
Alexopoulos, Nikolaos; Brack, Manuel; Wagner, Jan Philipp; Grube, Tim; Mühlhäuser, Max
Proceedings of the 31st USENIX Security Symposium, p.359-376
[Conference Proceedings]
Sicherheitsherausforderungen für Smart-City-Infrastrukturen
Zimmermann, Verena; Haunschild, Jasmin; Unden, Marita; Gerber, Paul; Gerber, Nina
Wirtschaftsinformatik & Management, p.119-126
[Journal Article]
Disrupting Continuity of Apple’s Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi
Stute, Milan; Heinrich, Alexander; Lorenz, Jannik; Hollick, Matthias
Proceedings of the 30th USENIX Security Symposium, p.3917-3934
[Conference Proceedings]
DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection
Rieger, Phillip; Nguyen, Thien Duc; Miettinen, Markus; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2022
[Conference Proceedings]
Guest Editorial Preface: Special Issue on IT-Support for Crisis and Continuity Management
Reuter, Christian; Pottebaum, Jens
International Journal of Information Systems for Crisis Response and Management (IJISCRAM), p.v-viii
[Journal Article]
Soziale Medien und Apps in Notsituationen: Eine repräsentative Studie über die Wahrnehmung in Deutschland
Reuter, Christian; Kaufhold, Marc-André; Spielhofer, Thomas; Hahne, Anna Sophie
BBK Bevölkerungsschutz, p.22-24
[Journal Article]
Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps
Reuter, Christian; Kaufhold, Marc-André; Leopold, Inken; Knipp, Hannah
Proceedings of the 25th European Conference on Information Systems (ECIS), p.2187-2201
[Conference Proceedings]
Fake News Perception in Germany: A Representative Study of People's Attitudes and Approaches to Counteract Disinformation
Reuter, Christian; Hartwig, Katrin; Kirchner, Jan; Schlegel, Noah
Tagungsband WI 2019 : Human Practice. Digital Ecologies. Our Future., p.1069-1083
[Conference Proceedings]
FLAME: Taming Backdoors in Federated Learning
Nguyen, Thien Duc; Rieger, Phillip; Chen, Huili; Yalame, Mohammad Hossein; Möllering, Helen; Fereidooni, Hossein; Marchal, Samuel; Miettinen, Markus; Mirhoseini, Azalia; Zeitouni, Shaza; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza; Schneider, Thomas
Proceedings of the 31st USENIX Security Symposium, p.1415-1432
[Conference Proceedings]
112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen
Kaufhold, Marc-André; Rupp, Nicola; Reuter, Christian; Amelunxen, Christoph; Cristaldi, Massimo
Proceedings of the European Conference on Information Systems (ECIS) 2018
[Conference Proceedings]
Business Continuity Management in Micro Enterprises: Perception, Strategies, and Use of ICT
Kaufhold, Marc-André; Riebe, Thea; Reuter, Christian; Hester, Julian; Jeske, Danny; Knüver, Lisa; Richert, Viktoria
International Journal of Information Systems for Crisis Response and Management, p.1-19
[Journal Article]
Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland
Kaufhold, Marc-André; Grinko, Margarita; Reuter, Christian; Schorch, Marén; Langer, Amanda; Skudelny, Sascha; Hollick, Matthias
Tagungsband WI 2019 : Human Practice. Digital Ecologies. Our Future., p.1054-1068
[Conference Proceedings]
SoK: Cryptanalysis of encrypted search with LEAKER - a framework for LEakage AttacK Evaluation on Real-world data
Kamara, Seny; Kat, Abdelkarim; Moataz, Tarik; Schneider, Thomas; Treiber, Amos; Yonli, Michael
7th IEEE European Symposium on Security and Privacy (EuroS&P'22)
[Conference Proceedings]