Publikationen
Publikationen
Device Fingerprinting Remediation in Android and iOS Apps
Heid, Kris; Heider, Jens
International Conference on Risks and Security of Internet and Systems 2024
[Conference Paper]
Durchführung der ersten Datenschutz-Vorsorge
Boll, Alina; Geissler, Ines
[Paper]
Revisiting Permission Piggybacking of Third-Party Libraries in Android Apps
Heid, Kris; Sonntag, Elena Julia; Heider, Jens
International Conference on Information Systems Security and Privacy 2025
[Conference Paper]
SGX-PrivInfer: A Secure Collaborative System for Quantifying and Mitigating Attribute Inference Risks in Social Networks
Simo Fhom, Hervais-Clemence; Kreutzer, Michael
International Conference on Information Systems Security and Privacy 2025
[Conference Paper]
Hash & Adjust: Competitive Demand-Aware Consistent Hashing
Pourdamghani, Arash; Avin, Chen; Sama, Robert; Shiran, Maryam; Schmid, Stefan
International Conference on Principles of Distributed Systems 2024
[Conference Paper]
Efficient Algorithms for Demand-Aware Networks and a Connection to Virtual Network Embedding
Figiel, Aleksander; Korhonen, Janne H.; Olver, Neil; Schmid, Stefan
International Conference on Principles of Distributed Systems 2024
[Conference Paper]
Fraunhofer SIT at GenAI Detection Task 1: Adapter Fusion for AI-generated Text Detection
Schäfer, Karla; Steinebach, Martin
Workshop on GenAI Content Detection 2025
[Conference Paper]
Comparative Analysis of Voice Conversion in German
Schäfer, Karla; Choi, Jeong-Eun; Steinebach, Martin
International Conference on Pattern Recognition 2024
[Conference Paper]
Deepfakes: A New Kind of Adversarial Attacks Against Face Recognition Systems?
Frick, Raphael Antonius; Graner, Lukas
23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024
[Conference Paper]
Adapter fusion for check-worthiness detection - combining a task adapter with a NER adapter
Vogel, Inna; Möhle, Pauline; Meghana, Meghana; Steinebach, Martin
4th Workshop on Reducing Online Misinformation through Credible Information Retrieval, ROMCIR 2024
[Conference Paper]
Improved identification of check-worthiness in social media data through multimodal analyses
Frick, Raphael Antonius; Steinebach, Martin
4th Workshop on Reducing Online Misinformation through Credible Information Retrieval, ROMCIR 2024
[Conference Paper]
Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms
Frieß, Johannes L.; Gattermayer, Tobias; Gelernter, Nethanel; Shulman, Haya; Waidner, Michael
21st USENIX Symposium on Networked Systems Design and Implementation, NSDI 2024
[Conference Paper]
Profiling Side-Channel Attacks on Dilithium: A Small Bit-Fiddling Leak Breaks It All
Ulitzsch, Vincent Quentin; Marzougui, Soundes; Tibouchi, Mehdi; Seifert, Jean Pierre
29th International Conference on Selected Areas in Cryptography, SAC 2022
[Conference Paper]
Color calibration for multicolored barcodes using smartphones
Bugert, Simon; Heeger, Julian; Berchtold, Waldemar
IS and T International Symposium on Electronic Imaging 2024: Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2024
[Conference Paper]
FraunhoferSIT@EXIST2024: Leveraging Stacking Ensemble Learning for Sexism Detection
Fan, Shiying; Frick, Raphael Antonius; Steinebach, Martin
25th Working Notes of the Conference and Labs of the Evaluation Forum, CLEF 2024
[Conference Paper]
Fraunhofer SIT at CheckThat! 2024: Adapter Fusion for Check-Worthiness Detection
Vogel, Inna; Möhle, Pauline
25th Working Notes of the Conference and Labs of the Evaluation Forum, CLEF 2024
[Conference Paper]
Sovereign document verification by smartphones
Berchtold, Waldemar; Heeger, Julian; Bugert, Simon; Biermann, Lukas; Liu, Huajian
IS and T International Symposium on Electronic Imaging 2024: Media Watermarking, Security, and Forensics, MWSF 2024
[Conference Paper]
Evaluating an Open-Source Hardware Approach from HDL to GDS for a Security Chip Design - a Review of the Final Stage of Project HEP
Henkes, Tim; Reith, Steffen; Stöttinger, Marc; Herfurth, Norbert; Panić, Goran; Wälde, Julian; Buschkowski, Fabian; Sasdrich, Pascal; Lüth, Christoph; Funck, Milan; Kiyan, Tuba; Weber, Arnd; Boeck, Detlef; Rathfelder, Rene; Grawunder, Torsten
2024 Design, Automation and Test in Europe Conference and Exhibition, DATE 2024
[Conference Paper]
Fraunhofer SIT at WASSA 2024 Empathy and Personality Shared Task: Use of Sentiment Transformers and Data Augmentation With Fuzzy Labels to Predict Emotional Reactions in Conversations and Essays
Frick, Raphael Antonius; Steinebach, Martin
14th Workshop on Computational Approaches to Subjectivity, Sentiment, and Social Media Analysis, WASSA 2024
[Conference Paper]
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
Schröder, Robin Leander; Gast, Stefan; Guo, Qian
33rd USENIX Security Symposium, USENIX Security 2024
[Conference Paper]
LanDscAPe: Exploring LDAP Weaknesses and Data Leaks at Internet Scale
Kaspereit, Jonas; Öndarö, Gurur; Cesar, Gustavo Luvizotto; Ebbers, Simon; Ising, Fabian; Saatjohann, Christoph; Jonker, Mattijs; Holz, Ralph G.; Schinzel, Sebastian
33rd USENIX Security Symposium, USENIX Security 2024
[Conference Paper]
Attacking with Something That Does Not Exist: ‘Proof of Non-Existence’ Can Exhaust DNS Resolver CPU
Gruza, Olivia; Heftrig, Elias; Jacobsen, Oliver; Shulman, Haya; Vogel, Niklas; Waidner, Michael
18th USENIX WOOT Conference on Offensive Technologies, WOOT 2024
[Conference Paper]
What All the Phuzz Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications
Neef, Sebastian; Kleissner, Lorenz; Seifert, Jean Pierre
19th ACM Asia Conference on Computer and Communications Security, AsiaCCS 2024
[Conference Paper]
Dynamically Generating Callback Summaries for Enhancing Static Analysis
Arzt, Steven; Miltenberger, Marc; Näumann, Julius
38th European Conference on Object-Oriented Programming, ECOOP 2024
[Conference Paper]
Toward Self-Adjusting k-Ary Search Tree Networks
Feder, Evgeniy; Paramonov, Anton; Mavrin, P. A.; Salem, Iosif; Aksenov, Vitaly E.; Schmid, Stefan
32nd Annual European Symposium on Algorithms, ESA 2024
[Conference Paper]
Musketeer: Incentive-Compatible Rebalancing for Payment Channel Networks
Avarikioti, Zeta; Schmid, Stefan; Tiwari, Samarth
6th Conference on Advances in Financial Technologies, AFT 2024
[Conference Paper]
Analyzing the Effectiveness of Image Preprocessing Defenses Under Runtime Constraints
Bunzel, Niklas; Klause, Gerrit
International Conference on Trust, Security and Privacy in Computing and Communications 2024
[Conference Paper]
The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Heftrig, Elias; Shulman, Haya; Vogel, Niklas; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]
WAPITI - A Weighted Bayesian Method for Private Information Inference on Social Ego Networks
Simo Fhom, Hervais-Clemence; Kreutzer, Michael
International Conference on Trust, Security and Privacy in Computing and Communications 2024
[Conference Paper]
Broadcast and Consensus in Stochastic Dynamic Networks with Byzantine Nodes and Adversarial Edges
El-Hayek, Antoine; Henzinger, Monika; Schmid, Stefan
International Symposium on Distributed Computing 2024
[Conference Paper]


