Publikationen

Publikationen

SafeSplit: A Novel Defense Against Client-Side Backdoor Attacks in Split Learning
Rieger, Phillip; Pegoraro, Alessandro; Kumari, Kavita; Abera, Tigist; Knauer, Jonathan; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2025
[Conference Proceedings]


VoiceRadar: Voice Deepfake Detection using Micro-Frequency and Compositional Analysis
Kumari, Kavita; Abbasihafshejani, Maryam; Pegoraro, Alessandro; Rieger, Phillip; Arshi, Kamyar; Jadliwala, Murtuza; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium
[Conference Proceedings]


Defying the Odds: Solana’s Unexpected Resilience in Spite of the Security Challenges Faced by Developers
Andreina, Sebastien; Cloosters, Tobias; Davi, Lucas; Giesen, Jens-Rene; Gutfleisch, Marco; Karame, Ghassan; Naiakshina, Alena; Naji, Houda
Proc. of the 31th ACM SIGSAC Conference on Computer & Communications Security (CCS)
[Conference Proceedings]


Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing
Rostami, Mohamadreza; Chilese, Marco; Zeitouni, Shaza; Kande, Rahul; Rajendran, Jeyavijayan; Sadeghi, Ahmad-Reza
2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), p.1-6
[Conference Proceedings]


WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors
Borkar, Pallavi; Chen, Chen; Rostami, Mohamadreza; Singh, Nikhilesh; Kande, Rahul; Sadeghi, Ahmad-Reza; Rebeiro, Chester; Rajendran, Jeyavijayan
33rd USENIX Security Symposium (USENIX Security 24), p.5377-5394
[Conference Proceedings]


Lost and Found in Speculation: Hybrid Speculative Vulnerability Detection
Rostami, Mohamadreza; Zeitouni, Shaza; Kande, Rahul; Chen, Chen; Mahmoody, Pouya; Rajendran, Jeyavijayan; Sadeghi, Ahmad-Reza
Proceedings of the 61st ACM/IEEE Design Automation Conference
[Conference Proceedings]


Demasq: Unmasking the chatgpt wordsmith
Kumari, Kavita; Pegoraro, Alessandro; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2024
[Conference Proceedings]


MABFuzz: Multi-Armed Bandit Algorithms for Fuzzing Processors
Gohil, Vasudev; Rahul, Kande; Chen, Chen; Sadeghi, Ahmad-Reza; Rajendran, Jeyavijayan
2024 Design, Automation & Test in Europe Conference & Exhibition (DATE): Proceedings
[Conference Proceedings]


DeepEclipse: How to Break White-Box DNN-Watermarking Schemes
Pegoraro, Alessandro; Segna, Carlotta; Kumari, Kavita; Sadeghi, Ahmad-Reza
Proceedings of the 33rd USENIX Security Symposium, p.5287-5304
[Conference Proceedings]


Xplain: Analyzing Invisible Correlations in Model Explanation
Kumari, Kavita; Pegoraro, Alessandro; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
Proceedings of the 33rd USENIX Security Symposium, p.2937-2953
[Conference Proceedings]


Phantom: Untargeted Poisoning Attacks on Semi-Supervised Learning
Knauer, Jonathan; Rieger, Phillip; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.615-629
[Conference Proceedings]


LayerDBA: Circumventing Similarity-Based Defenses in Federated Learning
Nikolov, Javor; Pegoraro, Alessandro; Rieger, Phillip; Sadeghi, Ahmad-Reza
Proceedings: 45th IEEE Symposium on Security and Privacy Workshops: SPW 2024, p.299-305
[Conference Proceedings]


How to Respect Bystanders' Privacy in Smart Homes - A Co-Creation Study
Hahn, Sara; Al-Amrani, Nusaibah; Allagah, Sara; Huang, He Rong; Kircher, Eva; Rehs, Cornelia; Vogt, Joachim; Marky, Karola; Gerber, Nina
NordiCHI '24: Proceedings of the 13th Nordic Conference on Human-Computer Interaction
[Conference Proceedings]


Evaluating leakage attacks against relational encrypted search
Ehrler, Patrick; Kati, Abdelkarim; Schneider, Thomas; Treiber, Amos
Proceedings of the 2024 on Cloud Computing Security Workshop (CCSW '24), p.15-28
[Conference Proceedings]


Investigating Voter Perceptions of Printed Physical Audit Trails for Online Voting
Marky, Karola; Gerber, Nina; Krumb, Henry John; Khamis, Mohamed; Mühlhäuser, Max
2024 IEEE Symposium on Security and Privacy (SP), p.3458-3477
[Conference Proceedings]


Of Mothers and Managers – The Effect of Videos Depicting Gender Stereotypes on Women and Men in the Security and Privacy Field
Gerber, Nina; Stöver, Alina; Mayer, Peter
Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), p.547-566
[Conference Proceedings]


Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users
Koisser, David; Mitev, Richard; Chilese, Marco; Sadeghi, Ahmad-Reza
Proceedings: 45th IEEE Symposium on Security and Privacy - SP 2024
[Conference Proceedings]


One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices
Chilese, Marco; Mitev, Richard; Orenbach, Meni; Thorburn, Robert; Atamli, Ahmad; Sadeghi, Ahmad-Reza
Proceedings: 45th IEEE Symposium on Security and Privacy - SP 2024
[Conference Proceedings]


FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning
Fereidooni, Hossein; Pegoraro, Alessandro; Rieger, Phillip; Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2024
[Conference Proceedings]


CrowdGuard: Federated Backdoor Detection in Federated Learning
Rieger, Phillip; Krauß, Torsten; Miettinen, Mark; Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2024
[Conference Proceedings]


The Committing Security of MACs with Applications to Generic Composition
Bhaumik, Ritam; Chakraborty, Bishwajit; Choi, Wonseok; Dutta, Avijit; Govinden, Jérôme; Shen, Yaobin
44th Annual International Cryptology Conference (CRYPTO 2024)
[Conference Proceedings]


SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields
Degabriele, Jean Paul; Gilcher, Jan; Govinden, Jérôme; Paterson, Kenneth G.
2024 IEEE Symposium on Security and Privacy (SP)
[Conference Proceedings]


Fuzz on the Beach: Fuzzing Solana Smart Contracts
Smolka, Sven; Giesen, Jens-Rene; Winkler, Pascal; Draissi, Oussama; Davi, Lucas; Karame, Ghassan; Pohl, Klaus
Proc. of the 30th ACM SIGSAC Conference on Computer & Communications Security (CCS), p.1197-1211
[Conference Proceedings]


PSOFuzz: Fuzzing Processors with Particle Swarm Optimization
Chen, Chen; Vasudev, Gohil; Rahul, Kande; Sadeghi, Ahmad-Reza; Rajendran, Jeyavijayan
IEEE/ACM ICCAD Conference Proceedings
[Conference Proceedings]


FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks
Castillo, Jorge; Rieger, Phillip; Fereidooni, Hossein; Chen, Qian; Sadeghi, Ahmad-Reza
ACSAC '23: Proceedings of the 39th Annual Computer Security Applications Conference
[Conference Proceedings]


Verifiable Verification in Cryptographic Protocols
Fischlin, Marc; Günther, Felix
CCS'23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, p.3239-3253
[Conference Proceedings]


Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3
Fischlin, Marc
CCS'23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, p.2901-2914
[Conference Proceedings]


Searching for ELFs in the Cryptographic Forest
Fischlin, Marc; Rohrbach, Felix
TCC 2023: Theory of Cryptography, p.207-236
[Conference Proceedings]


Hardware-Based Isolation for Advanced Safety and Security in Spacecraft
Koisser, David; Brasser, Ferdinand; Jauernig, Patrick; Stapf, Emmanuel; Wallum, Marcus; Fischer, Daniel; Sadeghi, Ahmad-Reza
17th International Conference on Space Operations (SpaceOps 2023)
[Conference Proceedings]


Populating the Zoo of Rugged Pseudorandom Permutations
Degabriele, Jean Paul; Karadžić, Vukašin
Advances in Cryptology - ASIACRYPT 2023, p.270-300
[Conference Proceedings]