Publikationen

Publikationen

ATRIUM: Runtime Attestation Resilient Under Memory Attacks
Zeitouni, Shaza; Dessouky, Ghada; Arias, Orlando; Sullivan, Dean; Ibrahim, Ahmad; Jin, Yier; Sadeghi, Ahmad-Reza
2017 International Conference On Computer Aided Design (ICCAD'17)
[Conference Proceedings]


Oblivious Neural Network Predictions via MiniONN Transformations
Liu, Jian; Juuti, Mika; Lu, Yao; Asokan, N.
ACM CCS 2017, ACM Conference on Computer and Communications Security
[Conference Proceedings]


CogniCrypt: Supporting Developers in using Cryptography
Krüger, Stefan; Nadi, Sarah; Reif, Michael; Ali, Karim; Mezini, Mira; Bodden, Eric; Göpfert, Florian; Günther, Felix; Weinert, Christian; Demmler, Daniel; Kamath, Ram
Automated Software Engineering (ASE'17)
[Conference Proceedings]


Towards Accelerated Usage Control based on Access Correlations
Gay, Richard; Hu, Jinwei; Mantel, Heiko; Schickel, Johannes
NordSec2017 - Nordic Conference on Secure IT Systems
[Conference Proceedings]


Privacy-Preserving Whole-Genome Variant Queries
Demmler, Daniel; Hamacher, Kay; Schneider, Thomas; Stammler, Sebastian
Cryptology and Network Security, p.71-92
[Conference Proceedings]


I Trust my Zombies: a Trust-enabled Botnet
Vasilomanolakis, Emmanouil; Wolf, Jan Helge; Böck, Leon; Mühlhäuser, Max; Karuppayah, Shankar
Blackhat Europe
[Conference Proceedings]


An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage
Sarangdhar, Ravi; Fan, Yufan; Anagnostopoulos, Nikolaos Athanasios; Gayer, Udo; Flederer, Frank; Mikschl, Tobias; Arul, Tolga; John, Philipp R.; Hierholz, Kirsten; Montenegro, Sergio; Katzenbeisser, Stefan
27th Crypto-Day
[Conference Proceedings]


More Efficient Universal Circuit Constructions
Günther, Daniel; Kiss, Ágnes; Schneider, Thomas
23. Advances in Cryptology -- ASIACRYPT 2017
[Conference Proceedings]


SIXPACK: Securing Internet eXchange Points Against Curious onlooKers
Chiesa, Marco; Demmler, Daniel; Canini, Marco; Schapira, Michael; Schneider, Thomas
CoNEXT '17: Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, p.120-133
[Conference Proceedings]


Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β
Buchmann, Johannes; Holzer, Patrick; Wunderer, Thomas
INDOCRYPT 2017 - 18th International Conference on Cryptology in India
[Conference Proceedings]


An extensive classification and analysis of attacks against Physical Unclonable Functions (PUFs)
Anagnostopoulos, Nikolaos Athanasios; Gabmeyer, Sebastian; Arul, Tolga; Katzenbeisser, Stefan
27th Crypto-Day
[Conference Proceedings]


Revisiting the Expected Cost of Solving uSVP and Applications to LWE
Albrecht, Martin; Göpfert, Florian; Vidria, Fernando; Wunderer, Thomas
ASIACRYPT 2017 - Advances in Cryptology
[Conference Proceedings]


Let’s get physical: Lässt sich User Experience physiologisch erfassen?
Gerber, Nina
Mensch und Computer 2016 - Tagungsband
[Conference Proceedings]


LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper)
Braun, Johannes; Buchmann, Johannes; Demirel, Denise; Fujiwara, Mikio; Geihs, Matthias; Moriai, Shiho; Sasaki, Masahide; Waseda, Atsushi
ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, p.1-13
[Conference Proceedings]


Analyzing TETRA Location Privacy and Network Availability
Pfeiffer, Martin; Kwiotek, Jan-Pascal; Classen, Jiska; Klose, Robin; Hollick, Matthias
6th Workshop on Security and Privacy in Smartphones and Mobile Devices
[Conference Proceedings]


Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments
Miettinen, Markus; Huang, Jialin; Nguyen, Thien Duc; Asokan, N.; Sadeghi, Ahmad-Reza
Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16)
[Conference Proceedings]


Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure
Shulman, Haya; Waidner, Michael
In Traffic Monitoring and Analysis (TMA)
[Conference Proceedings]


Call graph construction for Java libraries
Reif, Michael; Eichberg, Michael; Hermann, Ben; Lerch, Johannes; Mezini, Mira
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering
[Conference Proceedings]


Variability Modeling of Cryptographic Components (Clafer Experience Report)
Nadi, Sarah; Krüger, Stefan
Tenth International Workshop on Variability Modelling of Software-intensive Systems
[Conference Proceedings]


On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA
Akleylek, Sedat; Dagdelen, Özgür; Tok, Zaliha Yüce
Cryptography and Information Security in the Balkans, p.155-168
[Conference Proceedings]


NetCo: Reliable Routing with Unreliable Routers
Feldmann, Anja; Heyder, Philipp; Kreutzer, Michael; Schmid, Stefan; Seifert, Jean-Pierre; Shulman, Haya; Thimmaraju, Kashyap; Waidner, Michael; Sieberg, Jens
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops
[Conference Proceedings]


Obfuscation Combiners
Fischlin, Marc; Herzberg, Amir; Noon, Hon Bin; Shulman, Haya
International Cryptology Conference (CRYPTO)
[Conference Proceedings]


Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments
Asokan, N.; Huang, Jialin; Miettinen, Markus; Nguyen, Thien Duc; Sadeghi, Ahmad-Reza
[Conference Proceedings]


LoT: a Reputation-based Trust System for Long-term Archiving
Vigil, Martín; Demirel, Denise; Habib, Sheikh Mahbub; Hauke, Sascha; Buchmann, Johannes; Mühlhäuser, Max
SECURWARE 2016, p.262-270
[Conference Proceedings]


Towards a Unified Security Model for Physically Unclonable Functions
Sadeghi, Ahmad-Reza; Armknecht, Frederik
CT-RSA - Cryptographers' Track at the RSA Conference
[Conference Proceedings]


ProxiWatch: Enhancing Smartwatch Interaction through Proximity-based Hand Input
Müller, Florian; Günther, Sebastian; Dezfuli, Niloofar; Khalilbeigi, Mohammadreza; Mühlhäuser, Max
CHI EA '16: Proceedings of the 34rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems
[Conference Proceedings]


Can IoT be Secured: Emerging Challenges in Connecting the Unconnected
Cam-Winget, Nancy; Sadeghi, Ahmad-Reza; Jin, Yier
53rd Design Automation Conference (DAC)
[Conference Proceedings]


Remote Attestation for Low-End Embedded Devices: the Prover's Perspective
Brasser, Ferdinand; Rasmussen, Kasper; Sadeghi, Ahmad-Reza; Tsudik, Gene
Proceedings of the 53nd Annual Design Automation Conference
[Conference Proceedings]


DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android
Heuser, Stephan; Negro, Marco; Pendyala, Praveen Kumar; Sadeghi, Ahmad-Reza
Financial Crypto 2016
[Conference Proceedings]


On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks
Daubert, Jörg; Grube, Tim; Fischer, Mathias; Mühlhäuser, Max
Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), p.738-744
[Conference Proceedings]