Publikationen
Publikationen
OptiSwap: Fast Optimistic Fair Exchange
Eckey, Lisa; Faust, Sebastian; Schlosser, Benjamin
15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20)
[Conference Proceedings]
Towards Post-Quantum Security for Signal's X3DH Handshake
Brendel, Jacqueline; Fischlin, Marc; Günther, Felix; Janson, Christian; Stebila, Douglas
27th Selected Areas in Cryptography (SAC 2020)
[Conference Proceedings]
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection
Bauspieß, Pia; Kolberg, Jascha; Demmler, Daniel; Krämer, Juliane; Busch, Christoph
12th IEEE International Workshop on Information Forensics and Security (WIFS 2020)
[Conference Proceedings]
Deterministic Wallets in a Quantum World
Alkeilani Alkadri, Nabil; Das, Poulami; Erwig, Andreas; Faust, Sebastian; Krämer, Juliane; Riahi, Siavash; Struck, Patrick
The 27th ACM Conference on Computer and Communications Security (CCS 2020)
[Conference Proceedings]
TRIDEnT: Towards a Decentralized Threat Indicator Marketplace
Alexopoulos, Nikolaos; Vasilomanolakis, Emmanouil; Le Roux, Stephane; Rowe, Steven; Mühlhäuser, Max
35th ACM/SIGAPP Symposium on Applied Computing (SAC'20)
[Conference Proceedings]
Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany
Haunschild, Jasmin; Kaufhold, Marc-André; Reuter, Christian
Proceedings of the International Conference on Wirtschaftsinformatik (WI), p.1545-1560
[Conference Proceedings]
A Programming Model for Semi-implicit Parallelization of Static Analyses
Helm, Dominik; Kübler, Florian; Kölzer, Jan Thomas; Haller, Philipp; Eichberg, Michael; Salvaneschi, Guido; Mezini, Mira
ISSTA '20: 29th SIGSOFT International Symposium on Software Testing and Analysis
[Conference Proceedings]
Firmware Insider: Bluetooth Randomness is Mostly Random
Tillmanns, Jörn; Classen, Jiska; Rohrbach, Felix; Hollick, Matthias
14th USENIX Workshop on Offensive Technologies (WOOT 2020)
[Conference Proceedings]
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference
Boemer, Fabian; Cammarota, Rosario; Demmler, Daniel; Schneider, Thomas; Yalame, Mohammad Hossein
2nd Privacy-Preserving Machine Learning Workshop at CRYPTO 2020
[Conference Proceedings]
CryptoSPN: Expanding PPML beyond Neural Networks
Treiber, Amos; Molina, Alejandro; Weinert, Christian; Schneider, Thomas; Kersting, Kristian
2nd Privacy-Preserving Machine Learning Workshop at CRYPTO 2020
[Conference Proceedings]
CryptoSPN: Expanding PPML beyond Neural Networks
Treiber, Amos; Molina, Alejandro; Weinert, Christian; Schneider, Thomas; Kersting, Kristian
PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practi, p.9-14
[Conference Proceedings]
Engineering Privacy-Preserving Machine Learning Protocols
Schneider, Thomas
PPMLP ‘20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, p.3-4
[Conference Proceedings]
Modular Collaborative Program Analysis in OPAL
Helm, Dominik; Kübler, Florian; Reif, Michael; Eichberg, Michael; Mezini, Mira
ESEC/FSE 2020 : Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, p.184-196
[Conference Proceedings]
Peek-a-Boo: I see your smart home activities, even encrypted!
Acar, Abbas; Fereidooni, Hossein; Abera, Tigist; Sikder, Amit Kumsr; Miettinen, Markus; Aksu, Hidayet; Conti, Mauro; Sadeghi, Ahmad-Reza
WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
[Conference Proceedings]
Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication
Putz, Florentin; Álvarez, Flor; Classen, Jiska
WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.31-41
[Conference Proceedings]
DEMO: BTLEmap: Nmap for Bluetooth Low Energy
Heinrich, Alexander; Stute, Milan; Hollick, Matthias
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and MobileNetworks, p.331-333
[Conference Proceedings]
MPC for Securing Internet Infrastructure
Shrishak, Kris; Shulman, Haya
50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020)
[Conference Proceedings]
Diving into Email Bomb Attack
Schneider, Markus; Shulman, Haya; Sidis, Adi; Sidis, Ravid; Waidner, Michael
DSN 2020-International Conference on Dependable Systems and Networks
[Conference Proceedings]
Secure Consensus Generation with Distributed DoH
Jeitner, Philipp; Shulman, Haya; Waidner, Michael
DSN 2020-International Conference on Dependable Systems and Networks
[Conference Proceedings]
Pitfalls of Provably Secure Systems in Internet - The Case of Chronos-NTP
Jeitner, Philipp; Shulman, Haya; Waidner, Michael
DSN 2020-International Conference on Dependable Systems and Networks
[Conference Proceedings]
The Impact of DNS Insecurity on Time
Jeitner, Philipp; Shulman, Haya; Waidner, Michael
DSN2020 - 50th International Conference on Dependable Systems and Networks
[Conference Proceedings]
DISCO: Sidestepping RPKI's Deployment Barriers
Hlavacek, Tomas; Cunha, Italo; Gilad, Yossi; Herzberg, Amir; Katz-Bassett, Ethan; Schapira, Michael; Shulman, Haya
Network and Distributed Systems Security Symposium (NDSS 2020)
[Conference Proceedings]
INVITED: AI Utopia or Dystopia - On Securing AI Platforms
Dessouky, Ghada; Jauernig, Patrick; Mentens, Nele; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
DAC'20-Design Automation Conference 2020
[Conference Proceedings]
Client-oblivious OPRAM
Davies, Gareth T.; Janson, Christian; Martin, Daniel P.
The 22nd International Conference on Information and Communications Security (ICICS 2020)
[Conference Proceedings]
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC
Dalskov, Anders; Keller, Marcel; Orlandi, Claudio; Shrishak, Kris; Shulman, Haya
ESORICS 2020-The 25th European Symposium on Research in Computer Security
[Conference Proceedings]
Optimal Transport Layer for Secure Computation
Brandt, Markus; Orlandi, Claudio; Shrishak, Kris; Shulman, Haya
SECRYPT 2020-The 17th International Conference on Security and Cryptography
[Conference Proceedings]
TACAI: An Intermediate Representation Based on Abstract Interpretation
Reif, Michael; Kübler, Florian; Helm, Dominik; Hermann, Ben; Eichberg, Michael; Mezini, Mira
SOAP 2020-9th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis
[Conference Proceedings]
Linear-Complexity Private Function Evaluation is Practical
Holz, Marco; Kiss, Ágnes; Rathee, Deevashwer; Schneider, Thomas
25. European Symposium on Research in Computer Security (ESORICS'20)
[Conference Proceedings]
Limiting the Power of RPKI Authorities
Shrishak, Kris; Shulman, Haya
Proceedings of the Applied Networking Research Workshop (ANRW'20)
[Conference Proceedings]
MP2ML: A mixed-protocol machine learning framework for private inference
Boemer, Fabian; Cammarota, Rosario; Demmler, Daniel; Schneider, Thomas; Yalame, Mohammad Hossein
ARES 2020: 15th International Conference on Availability, Reliability and Security
[Conference Proceedings]