Publikationen

Publikationen

Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK
Oesch, Sean; Abu-Salma, Ruba; Krämer, Juliane; Wu, Justin; Diallo, Oumar; Ruoti, Scott
Annual Computer Security Applications Conference (ACSAC 2020)
[Conference Proceedings]


RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation
Mantel, Heiko; Scheidel, Lukas; Schneider, Thomas; Weber, Alexandra; Weinert, Christian; Weißmantel, Tim
19. International Conference on Cryptology And Network Security (CANS'20)
[Conference Proceedings]


CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs
Krüger, Stefan; Ali, Karim; Bodden, Eric
International Symposium on Code Generation and Optimization
[Conference Proceedings]


V0LTpwn: Attacking x86 Processor Integrity from Software
Kenjar, Zijo; Frassetto, Tommaso; Gens, David; Franz, Michael; Sadeghi, Ahmad-Reza
arXiv
[Conference Proceedings]


Fuzzy Asymmetric Password-Authenticated Key Exchange
Erwig, Andreas; Hesse, Julia; Orlt, Maximilian; Riahi, Siavash
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020)
[Conference Proceedings]


CryptoSPN: Privacy-preserving Sum-Product Network Inference
Treiber, Amos; Molina, Alejandro; Weinert, Christian; Schneider, Thomas; Kersting, Kristian
24th European Conference on Artificial Intelligence (ECAI'20)
[Conference Proceedings]


Enclave Computing on RISC-V: A Brighter Future for Security?
Dessouky, Ghada; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020
[Conference Proceedings]


Secure Two-Party Computation in a Quantum world
Büscher, Niklas; Demmler, Daniel; Karvelas, Nikolaos; Katzenbeisser, Stefan; Krämer, Juliane; Rathee, Deevashwer; Schneider, Thomas; Struck, Patrick
18th International Conference on Applied Cryptography and Network Security (ACNS'20)
[Conference Proceedings]


MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference
Boemer, Fabian; Cammarota, Rosario; Demmler, Daniel; Schneider, Thomas; Yalame, Hossein
PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, p.43-45
[Conference Proceedings]


Mobile Resilience: Designing Mobile Interactive Systems for Societal and Technical Resilience
Reuter, Christian; Kaufhold, Marc-André; Comes, Tina; Knodt, Michèle; Mühlhäuser, Max
Mobile HCI 2020: Expanding the Horizon of Mobile Interaction
[Conference Proceedings]


Towards Secure Urban Infrastructures: Cyber Security Challenges to Information and Communication Technology in Smart Cities
Reuter, Christian; Haunschild, Jasmin; Hollick, Matthias; Mühlhäuser, Max; Vogt, Joachim; Kreutzer, Michael
Mensch und Computer 2020 - Workshopband
[Conference Proceedings]


Security and Privacy Awareness in Smart Environments – A Cross-Country Investigation
Kulyk, Oksana; Reinheimer, Benjamin; Aldag, Lukas; Mayer, Peter; Gerber, Nina; Volkamer, Melanie
Financial Cryptography and Data Security, p.84-101
[Conference Proceedings]


Signatures from Sequential-OR Proofs
Fischlin, Marc; Harasser, Patrick; Janson, Christian
Advances in Cryptology - EUROCRYPT 2020, p.212-244
[Conference Proceedings]


IoT Dataset Generation Framework for Evaluating Anomaly Detection Mechanisms
Meyer-Berg, Andreas; Egert, Rolf; Böck, Leon; Mühlhäuser, Max
ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and Security
[Conference Proceedings]


Security Reductions for White-Box Key-Storage in Mobile Payments
Bock, Estuardo Alpirez; Brzuska, Chris; Fischlin, Marc; Janson, Christian; Michiels, Wil
Advances in Cryptology - ASIACRYPT 2020, p.221-252
[Conference Proceedings]


Control Behavior Integrity for Distributed Cyber-Physical Systems
Adepu, Sridhar; Brasser, Ferdinand; Garcia, Luis; Rodler, Michael; Davi, Lucas; Sadeghi, Ahmad-Reza; Zonouz, Saman A.
2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS), p.1-15
[Conference Proceedings]


LegIoT: Ledgered Trust Management Platform for IoT
Neureither, Jens; Dmitrienko, Alexandra; Koisser, David; Brasser, Ferdinand; Sadeghi, Ahmad-Reza
Computer Security - ESORICS 2020, p.377-396
[Conference Proceedings]


Information-Theoretic Security of Cryptographic Channels
Fischlin, Marc; Günther, Felix; Muth, Philipp
Information and Communications Security, p.295-311
[Conference Proceedings]


LeakyPick: IoT Audio Spy Detector
Mitev, Richard; Pazii, Anna; Miettinen, Markus; Enck, William; Sadeghi, Ahmad-Reza
ACSAC '20: Annual Computer Security Applications Conference, p.694-705
[Conference Proceedings]


Long Live Randomization: On Privacy-Preserving Contact Tracing in Pandemic
Nguyen, Thien Duc; Miettinen, Markus; Sadeghi, Ahmad-Reza
MTD'20: Proceedings of the 7th ACM Workshop on Moving Target Defense
[Conference Proceedings]


Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild
Lauinger, Johannes; Baumgärtner, Lars; Wickert, Anna-Katharina; Mezini, Mira
Proceedings : 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, p.410-417
[Conference Proceedings]


Mind the GAP: Security & Privacy Risks of Contact Tracing Apps
Baumgärtner, Lars; Dmitrienko, Alexandra; Freisleben, Bernd; Gruler, Alexander; Höchst, Jonas; Kühlberg, Joshua; Mezini, Mira; Mitev, Richard; Miettinen, Markus; Muhamedagic, Anel; Nguyen, Thien Duc; Penning, Alvar; Pustelnik, Frederik; Roos, Filipp; Sadeghi, Ahmad-Reza; Schwarz, Michael; Uhl, Christian
Proceedings : 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, p.458-467
[Conference Proceedings]


Hidden in Plain Sight:Obfuscated Strings Threatening Your Privacy
Glanz, Leonid; Müller, Patrick; Baumgärtner, Lars; Reif, Michael; Anthonysamy, Pauline; Mezini, Mira
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, p.694-707
[Conference Proceedings]


One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol
Stute, Milan; Kreitschmann, David; Hollick, Matthias
MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, p.529-543
[Conference Proceedings]


Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link
Stute, Milan; Kreitschmann, David; Hollick, Matthias
MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, p.820-822
[Conference Proceedings]


A Billion Open Interfaces for Eve and Mallory : MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link
Stute, Milan; Narain, Sashank; Mariotto, Alex; Heinrich, Alexander; Kreitschmann, David; Noubir, Guevara; Hollick, Matthias
Proceedings of the 28th USENIX Security Symposium, p.37-54
[Conference Proceedings]


Classic McEliece Implementation with Low Memory Footprint
Roth, Johannes; Karatsiolis, Vangelis; Krämer, Juliane
19th Smart Card Research and Advanced Application Conference (CARDIS 2020)
[Conference Proceedings]


Cost Fairness for Blockchain-Based Two-Party Exchang Protocols
Lohr, Matthias; Schlosser, Benjamin; Jürjens, Jan; Staab, Matthias
3rd IEEE International Conference on Blockchain
[Conference Proceedings]


Security of Public Key Encryption against Resetting Attacks
Krämer, Juliane; Struck, Patrick
21st International Conference on Cryptology in India (Indocrypt 2020)
[Conference Proceedings]


Warning the Public: A Survey on Attitudes, Expectations and Use of Mobile Crisis Apps in Germany
Kaufhold, Marc-André; Haunschild, Jasmin; Reuter, Christian
Proceedings of the 28th European Conference on Information Systems (ECIS)
[Conference Proceedings]