Publikationen
Publikationen
Security and Privacy Challenges in Industrial Internet of Things
Sadeghi, Ahmad-Reza; Wachsmann, Christian; Waidner, Michael
52nd Design Automation Conference (DAC) Research
[Conference Proceedings]
Phasing: Private Set Intersection using Permutation-based Hashing
Pinkas, Benny; Schneider, Thomas; Segev, Gil; Zohner, Michael
24. USENIX Security Symposium (USENIX Security'15)
[Conference Proceedings]
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL
Nagy, Marcin; Bui, Thanh Phong; Cristofaro, Emiliano De; Asokan, N.; Ott, Jörg; Sadeghi, Ahmad-Reza
ACM WiSEC 2015
[Conference Proceedings]
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
Günther, Felix; Poettering, Bertram
20th Australasian Conference on Information Security and Privacy (ACISP 2015), p.195-212
[Conference Proceedings]
Nudging Bank Account Holders Towards More Secure PIN Management
Gutmann, Andreas; Renaud, Karen; Volkamer, Melanie
Journal of Internet Technology and Secured Transaction (JITST), p.380 - 386
[Conference Proceedings]
TyTAN: Tiny Trust Anchor for Tiny Devices
Brasser, Ferdinand; Koeberl, Patrick; Mahjoub, Brahim El; Sadeghi, Ahmad-Reza; Wachsmann, Christian
52nd Design Automation Conference (DAC) 2015
[Conference Proceedings]
HAFIX: Hardware-Assisted Flow Integrity Extension
Arias, Orlando; Davi, Lucas; Hanreich, Matthias; Jin, Yier; Koeberl, Patrick; Paul, Debayan; Sadeghi, Ahmad-Reza; Sullivan, Dean
52nd Design Automation Conference (DAC)
[Conference Proceedings]
The Love/Hate Relationship with the C Preprocessor: An Interview Study
Medeiros, Flávio; Kästner, Christian; Ribeiro, Márcio; Nadi, Sarah; Gheyi, Rohit
European Conference on Object-Oriented Programming, p.999-1022
[Conference Proceedings]
Leveraging the Potential of Cloud Security Service Level Agreements through Standards
Luna, Jesus; Suri, Neeraj; Iorga, Michaela; Karmel, Anil
Proceedings of IEEE Cloud Computing, 27.06.- 02.07. 2015, New York
[Conference Proceedings]
DLint: Dynamically Checking Bad Coding Practices in JavaScript
Gong, Liang; Pradel, Michael; Sridharan, Manu; Sen, Koushik
Proceedings of the 2015 International Symposium on Software Testing and Analysis, p.94-105
[Conference Proceedings]
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze
Ghiglieri, Marco; Lange, Benjamin; Simo, Hervais; Waidner, Michael
Digitale Schwellen - Freiheit und Privatheit in der digitalisierten Welt, p.67-84
[Conference Proceedings]
Hybrid Monitors for Concurrent Noninterference
Askarov, Aslan; Chong, Stephen; Mantel, Heiko
Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), p.137-151
[Conference Proceedings]
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness
Volkamer, Melanie; Renaud, Karen; Braun, Kristoffer; Canova, Gamze; Reinheimer, Benjamin
International Conference on Trust and Trustworthy Computing (TRUST), p.104-121
[Conference Proceedings]
On Rehoming the Electronic Id to TEEs
Tamrakar, Sandeep; Ekberg, Jan-Erik; Laitinen, Pekka
The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)
[Conference Proceedings]
How Current Android Malware Seeks to Evade Automated Code Analysis
Rasthofer, Siegfried; Asrar, Irfan; Huber, Stephan; Bodden, Eric
9th International Conference on Information Security Theory and Practice (WISTP'2015)
[Conference Proceedings]
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services
Pellegrino, Giancarlo; Balzarotti, Davide; Winter, Stefan; Suri, Neeraj
Proceedings of USENIX Security Symposium, 12.-14. August 2015, Washington D.C
[Conference Proceedings]
On Making Emerging Trusted Execution Environments Accessible to Developers
Nyman, Thomas; McGillion, Brian; Asokan, N.
8th International Conference on Trust & Trustworthy Computing, p.58-67
[Conference Proceedings]
You are AIRing too much: Assessing the privacy of users in crowdsourcing environmental data
Mineraud, Julien; Lancerin, Federico; Balasubramaniam, Sasitharan; Conti, Mauro; Tarkoma, Sasu
The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)
[Conference Proceedings]
Private Membership Test for Bloom Filters
Meskanen, Tommi; Ramezanian, Sara; Liu, Jian; Niemi, Valtteri
The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)
[Conference Proceedings]
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Kulyk, Oksana; Neumann, Stephan; Budurushi, Jurlind; Volkamer, Melanie; Haenni, Rolf; Koenig, Reto; Bergen, Philemon von
10th International Conference on Availability, Reliability and Security - ARES 2015, p.224-229
[Conference Proceedings]
PUF-based Software Protection for Low-end Embedded Devices
Kohnhäuser, Florian; Schaller, André; Katzenbeisser, Stefan
8th International Conference on Trust and Trustworthy Computing (TRUST 2015), p.3-21
[Conference Proceedings]
Capacity and Data Complexity in Multidimensional Linear Attack
Huang, Jialin; Vaudenay, Serge; Lai, Xuejia; Nyberg, Kaisa
CRYPTO
[Conference Proceedings]
PALPAS - PAsswordLess PAssword Synchronization
Horsch, Moritz; Hülsing, Andreas; Buchmann, Johannes
International Conference on Availability, Reliability and Security (ARES)
[Conference Proceedings]
JITProf: pinpointing JIT-unfriendly JavaScript code
Gong, Liang; Pradel, Michael; Sen, Koushik
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, p.357-368
[Conference Proceedings]
Data Is a Stream: Security of Stream-Based Channels
Fischlin, Marc; Günther, Felix; Marson, Giorgia Azzurra; Paterson, Kenneth G.
Advances in Cryptology - CRYPTO 2015, p.545-564
[Conference Proceedings]
Return to Where? You Can't Exploit What You Can't Find
Crane, Stephen; Liebchen, Christopher; Homescu, Andrei; Davi, Lucas; Larsen, Per; Sadeghi, Ahmad-Reza; Brunthaler, Stefan; Franz, Michael
Blackhat USA
[Conference Proceedings]
Faster Secure Computation through Automatic Parallelization
Buescher, Niklas; Katzenbeisser, Stefan
24th USENIX Security Symposium (USENIX Security'15)
[Conference Proceedings]
A Socio-Technical Investigation into Smartphone Security
Volkamer, Melanie; Renaud, Karen; Kulyk, Oksana; Emeröz, Sinem
Security and Trust Management: 11th International Workshop - STM 2015, p.265-273
[Conference Proceedings]
Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves
Steinmetzer, Daniel; Chen, Joe; Classen, Jiska; Knightly, Edward; Hollick, Matthias
IEEE Conference on Communications and Network Security 2015 (CNS)
[Conference Proceedings]
Towards Security of Internet's Naming Infrastructure
Shulman, Haya; Waidner, Michael
Computer Security ESORICS
[Conference Proceedings]