Publikationen

Publikationen

Zulässigkeit von Open Source-Ermittlungen zur Strafverfolgung im Darknet
Wittmer, Sandra; Platzer, Florian
Gesellschaft für Informatik (Jahrestagung) 2022
[Conference Paper]


Natural Language Processing (NLP) und der Datenschutz - Chancen und Risiken für den Schutz der Privatheit
Vogel, Inna; Setz, Tahireh; Choi, Jeong-Eun; Steinebach, Martin
Gesellschaft für Informatik (Jahrestagung) 2022
[Conference Paper]


Mehr Sicherheit durch Farbe - Digitale Siegel und der neue internationale JAB-Code Standard
Thenée, Nicolas; Schnattinger, Thomas; Berchtold, Waldemar; Liu, Huajian
Deutscher IT-Sicherheitskongress 2022
[Conference Paper]


Decision Tree-Based Rule Derivation for Intrusion Detection in Safety-Critical Automotive Systems
Buschlinger, Lucas; Rieke, Roland; Sarda, Sanat; Krauß, Christoph
International Conference on Parallel, Distributed and Network-Based Processing 2022
[Conference Paper]


Context, Prioritization, and Unexpectedness: Factors Influencing User Attitudes About Infographic and Comic Consent
Doan, Xengie Cheng; Selzer, Annika; Rossi, Arianna; Botes, Wilhelmina Maria; Lenzini, Gabriele
International Workshop on Consent Management in Online Services, Networks and Things 2022
[Conference Paper]


Stalloris: RPKI Downgrade Attack
Hlavacek, Tomas; Jeitner, Philipp; Mirdita, Donika; Shulman, Haya; Waidner, Michael
USENIX Security Symposium 2022
[Conference Paper]


Data Acquisition on a Large Darknet Marketplace
Yannikos, York; Heeger, Julian; Steinebach, Martin
International Conference on Availability, Reliability and Security 2022
[Conference Paper]


Fraunhofer SIT at CheckThat! 2022: Semi-Supervised Ensemble Classification for Detecting Check-Worthy Tweets
Frick, Raphael Antonius; Vogel, Inna; Nunes Grieser, Isabella
Conference and Labs of the Evaluation Forum 2022
[Conference Paper]


Fraunhofer SIT at CheckThat! 2022: Ensemble Similarity Estimation for Finding Previously Fact-Checked Claims
Frick, Raphael Antonius; Vogel, Inna
Conference and Labs of the Evaluation Forum 2022
[Conference Paper]


An Unorthodox Approach for Style Change Detection
Graner, Lukas; Ranly, Paul
Conference and Labs of the Evaluation Forum 2022
[Conference Paper]


Recht und Technik - Datenschutz im Diskurs
Grimm, Rüdiger; Hornung, Gerrit; Sorge, Christoph; Spiecker Genannt Doehmann, Indra
Gesellschaft für Informatik (Jahrestagung) 2022
[Conference Paper]


Fraunhofer SIT@SMM4H’22: Learning to Predict Stances and Premises in Tweets related to COVID-19 Health Orders Using Generative Models
Frick, Raphael Antonius; Steinebach, Martin
Workshop on Social Media Mining for Health Applications 2022
[Conference Paper]


Behind the Scenes of RPKI
Hlavacek, Tomas; Jeitner, Philipp; Mirdita, Donika; Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security 2022
[Conference Paper]


Poster: Insights into Global Deployment of RPKI Validation
Shulman, Haya; Vogel, Niklas; Waidner, Michael
Conference on Computer and Communications Security 2022
[Conference Paper]


Poster: The Unintended Consequences of Algorithm Agility in DNSSEC
Heftrig, Elias; Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security 2022
[Conference Paper]


Poster: RPKI Kill Switch
Mirdita, Donika; Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security 2022
[Conference Paper]


Poster: DNS in Routers Considered Harmful
Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security 2022
[Conference Paper]


Security code smells in apps: are we getting better?
Arzt, Steven
European Software Engineering Conference 2022
[Conference Paper]


A Novel Approach to IP ID Classification
Zhao, Shujie; Schulman, Haya
Kryptotag 2021
[Conference Paper]


Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS
Marzougui, Soundes; Wisiol, Nils; Gersch, Patrick; Krämer, Juliane; Seifert, Jean-Pierre
[Paper]


Privacy Policies of Mobile Apps - A Usability Study
Anikeev, Maxim; Shulman, Haya; Simo, Hervais
Conference on Computer Communications (INFOCOM) 2021
[Conference Paper]


Technische Herausforderungen bei der Umsetzung von Uploadfiltern
Steinebach, Martin
Gesellschaft für Informatik (GI Jahrestagung) 2021
[Conference Paper]


Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers
Heftrig, Elias; Seifert, Jean-Pierre; Shulman, Haya; Waidner, Michael; Wisiol, Nils
Conference on Computer and Communications Security (CCS) 2021
[Conference Paper]


Streaming SPHINCS+ for Embedded Devices using the Example of TPMs
Niederhagen, Ruben; Roth, Johannes; Wälde, Julian
[Paper]


The hijackers guide to the galaxy: Off-path taking over internet resources
Dai, Tianxiang; Jeitner, Philipp; Shulman, Haya; Waidner, Michael
USENIX Security Symposium 2021
[Conference Paper]


Automated, Dynamic Android App Vulnerability and Privacy Leak Analysis: Design Considerations, Required Components and Available Tools
Heid, Kris; Heider, Jens
European Interdisciplinary Cybersecurity Conference (EICC) 2021
[Conference Paper]


Chances and Limitations of Personal and Anonymized Data Processing
Selzer, Annika; Timm, Ingo J.
Gesellschaft für Informatik (GI Jahrestagung) 2021
[Conference Paper]


From IP to transport and beyond: Cross-layer attacks against applications
Dai, Tianxiang; Jeitner, Philipp; Shulman. Haya; Waidner, Michael
Association for Computing Machinery, Special Interest Group on Data Communication (ACM SIGCOMM Conference) 2021
[Conference Paper]


Automatic extraction of secrets from the transistor jungle using laser-assisted side-channel attacks
Krachenfels, T.; Kiyan, T.; Tajik, S.; Seifert, J.-P.
USENIX Security Symposium 2021
[Conference Paper]


Discovery of Single-Vendor Marketplace Operators in the Tor-Network
Brenner, Fabian; Platzer, Florian; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) 2021
[Conference Paper]