Publikationen

Publikationen

TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter
Hartwig, Katrin; Reuter, Christian
Proceedings of the International Conference on Wirtschaftsinformatik (WI)
[Conference Proceedings]


Hybride Dienst­leis­tun­gen in digi­tali­sierten Kooperationen in der Landwirtschaft
Bernardi, Ansgar; Reuter, Christian; Schneider, Wolfgang; Linsner, Sebastian; Kaufhold, Marc-André
38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?
[Conference Proceedings]


A Holistic View on Organizational IT Security: The Influence of Contextual Aspects During IT Security Decisions
Heidt, Margareta; Gerlach, Jin; Buxmann, Peter
Hawaii International Conference on System Sciences (HICSS)
[Conference Proceedings]


Resilient Smart Farming (RSF) – Nutzung digitaler Tech­no­logien in krisensicherer Infrastruktur
Reuter, Christian; Schneider, Wolfgang; Eberz, Daniel
Informatik in der Land-, Forst- und Ernährungswirtschaft : Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen – ein Widerspruch in sich? Referate der 39. GIL-Jahrestagung, p.177-182
[Conference Proceedings]


SANCTUARY: ARMing TrustZone with User-space Enclaves
Brasser, Ferdinand; Gens, David; Jauernig, Patrick; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
26th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V
Weiser, Samuel; Werner, Mario; Brasser, Ferdinand; Malenko, Maja; Mangard, Stefan; Sadeghi, Ahmad-Reza
26th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


Nautilus: Fishing for Deep Bugs with Grammars
Aschermann, Cornelius; Frassetto, Tommaso; Holz, Thorsten; Jauernig, Patrick; Sadeghi, Ahmad-Reza; Teuchert, Daniel
26th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


Perun: Virtual Payment Hubs over Cryptocurrencies
Dziembowski, Stefan; Eckey, Lisa; Faust, Sebastian; Malinowski, Daniel
39th IEEE Symposium on Security and Privacy
[Conference Proceedings]


LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution
Dessouky, Ghada; Abera, Tigist; Ibrahim, Ahmad; Sadeghi, Ahmad-Reza
37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18)
[Conference Proceedings]


A Comparative Study across Static and Dynamic Side-Channel Countermeasures
Dantas, Yuri Gil; Hamann, Tobias; Mantel, Heiko
The 11th International Symposium on Foundations & Practice of Security (FPS)
[Conference Proceedings]


Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove
Degabriele, Jean Paul; Fischlin, Marc
Advances in Cryptology - ASIACRYPT 2018, p.519-550
[Conference Proceedings]


"This Website Uses Cookies": Users' Perceptions and Reactions to the Cookie Disclaimer
Kulyk, Oksana; Hilt, Annika; Gerber, Nina; Volkamer, Melanie
3rd European Workshop on Usable Security (EuroUSEC), London, England, April 23, 2018
[Conference Proceedings]


Helping john to make informed decisions on using social login
Karegar, Farzaneh; Gerber, Nina; Volkamer, Melanie; Fischer-Hübner, Simone
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, p.1165-1174
[Conference Proceedings]


Evaluation der Nutzbarkeit von PGP und S/MIME in Thunderbird
Ghiglieri, Marco; Henhapl, Birgit; Gerber, Nina
Mensch und Computer 2018 - Workshopband
[Conference Proceedings]


Web Application for Privacy-Preserving Scheduling
Kiss, Ágnes; Schick, Oliver; Schneider, Thomas
27. USENIX Security Symposium (USENIX Security'18) Poster Session
[Conference Proceedings]


Removing the Bottleneck for Practical 2PC
Shrishak, Kris; Shulman, Haya; Waidner, Michael
ACM SIGSAG Conference on Computer and Communications Security (ACM CCS)
[Conference Proceedings]


Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security
Gilad, Yossi; Hlavacek, Tomas; Herzberg, Amir; Schapira, Michael; Shulman, Haya
HotNets'18: 17th ACM Workshop on Hot Topics in Networks
[Conference Proceedings]


Off-path Attacks Against PKI
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
ACM SIGSAG Conference on Computer and Communications Security (CCS 2018)
[Conference Proceedings]


Internet As a Source of Randomness
Brandt, Markus; Shulman, Haya; Waidner, Michael
HotNets '18: 17th ACM Workshop on Hot Topics in Networks
[Conference Proceedings]


Towards a Cloud-based System for Software Protection and Licensing
Schaad, Andreas; Grohmann, Bjoern; Winzenried, Oliver; Brasser, Ferdinand; Sadeghi, Ahmad-Reza
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2, p.698-702
[Conference Proceedings]


‘Home, Smart Home’ – Exploring End Users’ Mental Models of Smart Homes
Zimmermann, Verena; Bennighof, Merve; Edel, Miriam; Hofmann, Oliver; Jung, Judith; Wick, Melina von
Mensch und Computer 2018 - Workshopband
[Conference Proceedings]


The Quest to Replace Passwords Revisited – Rating Authentication Schemes
Zimmermann, Verena; Gerber, Nina; Kleboth, Marius; Preuschen, Alexandra von; Schmidt, Konstantin; Mayer, Peter
Twelth International Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), p.38-48
[Conference Proceedings]


Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?
Gerber, Nina; Zimmermann, Verena; Henhapl, Birgit; Emeröz, Sinem; Volkamer, Melanie
International Conference on Availability, Reliability and Security (ARES)
[Conference Proceedings]


Collective Attestation: for a Stronger Security in Embedded Networks
Ibrahim, Ahmad
IEEE
[Conference Proceedings]


The Future of IoT Security: Special Session
Mohan, Sibin; Asplund, Mikael; Bloom, Gedare; Sadeghi, Ahmad-Reza; Ibrahim, Ahmad; Salajageh, Negin; Griffioen, Paul; Sinopoli, Bruno
International Conference on Embedded Software (EMSOFT 2018), 2018
[Conference Proceedings]


Securing Embedded Networks Through Secure Collective Attestation
Ibrahim, Ahmad
Workshop at 16th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2018), 2018
[Conference Proceedings]


One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol
Stute, Milan; Kreitschmann, David; Hollick, Matthias
The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18)
[Conference Proceedings]


Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link
Stute, Milan; Kreitschmann, David; Hollick, Matthias
The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18)
[Conference Proceedings]


The Influence of SME Constraints in an Organizational IT Security Context
Heidt, Margareta; Gerlach, Jin
International Conference on Information Systems (ICIS), 13.-16.12.2018, San Francisco, USA.
[Conference Proceedings]


Systematic Evaluation of the Unsoundness of Call Graph Construction Algorithms for Java
Reif, Michael; Eichberg, Michael; Kübler, Florian; Mezini, Mira
Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, p.107-112
[Conference Proceedings]