Publikationen
Publikationen
The Indifferentiability of the Duplex and Its Practical Applications
Degabriele, Jean Paul; Fischlin, Marc; Govinden, Jérôme
Advances in Cryptology - ASIACRYPT 2023, p.237-269
[Conference Proceedings]
ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks
Rieger, Phillip; Chilese, Marco; Mohamed, Reham; Miettinen, Markus; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
Proceedings of the 32nd USENIX Security Symposium, p.4301-4318
[Conference Proceedings]
FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning
Li, Huimin; Rieger, Phillip; Zeitouni, Shaza; Picek, Stjepan; Sadeghi, Ahmad-Reza
Proceedings of the 2023 33rd International Conference on Field-Programmable Logic and Applications (FPL)
[Conference Proceedings]
Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M
Saß, Marvin; Mitev, Richard; Sadeghi, Ahmad-Reza
32nd USENIX Security Symposium (USENIX Security 23), p.6239-6256
[Conference Proceedings]
Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats
Pütz, Philipp; Mitev, Richard; Sadeghi, Ahmad-Reza
Annual Computer Security Applications Conference (ACSAC 2023)
[Conference Proceedings]
Griffin: Towards mixed multi-key homomorphic encryption
Schneider, Thomas; Yalame, Hossein; Yonli, Michael
Proceedings of the 20th International Conference on Security and Cryptography - SECRYPT, p.147-158
[Conference Proceedings]
Safe AND Secure Infrastructures? - Studying Human Aspects of Safety and Security Incidents with Experts from both Domains
Zimmermann, Verena; Haunschild, Jasmin; Stöver, Alina; Gerber, Nina
Mensch und Computer 2023 - Workshopband
[Conference Proceedings]
Post-quantum Security for the Extended Access Control Protocol
Fischlin, Marc; Heyden, Jonas von der; Margraf, Marian; Morgner, Frank; Wallner, Andreas; Bock, Holger
Security Standardisation Research, p.22-52
[Conference Proceedings]
Disorientation Faults in CSIDH
Banegas, Gustavo; Krämer, Juliane; Lange, Tanja; Meyer, Michael; Panny, Lorenz; Reijnders, Krijn; Sotáková, Jana; Trimoska, Monika
Advances in Cryptology - EUROCRYPT 2023, p.310-342
[Conference Proceedings]
A Lightweight Identification Protocol Based on Lattices
Düzlü, Samed; Krämer, Juliane; Pöppelmann, Thomas; Struck, Patrick
Public-Key Cryptography - PKC 2023, p.95-113
[Conference Proceedings]
SAFEFL: MPC-friendly Framework for Private and Robust Federated Learning
Gehlhar, Till; Marx, Felix; Schneider, Thomas; Suresh, Ajith; Wehrle, Tobias; Yalame, Hossein
6th Deep Learning Security and Privacy Workshop (DLSP 2023)
[Conference Proceedings]
FLUTE: Fast and Secure Lookup Table Evaluations
Brüggemann, Andreas; Hundt, Robin; Schneider, Thomas; Suresh, Ajith; Yalame, Hossein
Proceedings: 44th IEEE Symposium on Security and Privacy: SP 2023, p.515-533
[Conference Proceedings]
Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning
Sendner, Christoph; Chen, Huili; Fereidooni, Hossein; Petzi, Lukas; König, Jan; Stang, Jasper; Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza; Koushanfar, Farinaz
Network and Distributed Systems Security (NDSS) Symposium 2023
[Conference Proceedings]
DARWIN: Survival of the Fittest Fuzzing Mutators
Jauernig, Patrick; Jakobovic, Domagoj; Picek, Stjepan; Stapf, Emmanuel; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2023
[Conference Proceedings]
How to Count Bots in Longitudinal Datasets of IP Addresses
Böck, Leon; Levin, Dave; Padmanabhan, Ramakrishna; Doerr, Christian; Mühlhäuser, Max
30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023
[Conference Proceedings]
Towards Secure Urban Infrastructures: Cyber Security Challenges to Information and Communication Technology in Smart Cities
Reuter, Christian; Haunschild, Jasmin; Hollick, Matthias; Mühlhäuser, Max; Vogt, Joachim; Kreutzer, Michael
Mensch und Computer 2020 - Workshopband
[Conference Proceedings]
AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms
Fereidooni, Hossein; König, Jan; Rieger, Phillip; Chilese, Marco; Goekbakan, Bora; Finke, Moritz; Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2023
[Conference Proceedings]
SocialML: EUD im Maschine Learning zur Analyse sozialer Medien
Scholl, Simon; Reuter, Christian; Ludwig, Thomas; Kaufhold, Marc-André
Mensch und Computer 2018 Tagungsband, p.443-446
[Conference Proceedings]
From Conspiracies to Insults: A Case Study of Radicalisation in Social Media Discourse
Riebe, Thea; Pätsch, Katja; Kaufhold, Marc-André; Reuter, Christian
Mensch und Computer 2018: Workshopband MuC 2018, p.595-603
[Conference Proceedings]
Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft - mobil, dezentral, ausfallsicher
Reuter, Christian; Schneider, Wolfgang; Eberz, Daniel; Bayer, Markus; Hartung, Daniel; Kaygusuz, Cemal
Mensch und Computer 2018: Workshopband MuC 2018, p.623-632
[Conference Proceedings]
Resilient Smart Farming (RSF) – Nutzung digitaler Technologien in krisensicherer Infrastruktur
Reuter, Christian; Schneider, Wolfgang; Eberz, Daniel
Informatik in der Land-, Forst- und Ernährungswirtschaft : Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, p.177-182
[Conference Proceedings]
5. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen
Reuter, Christian; Mentler, Tilo; Nestler, Simon; Herczeg, Michael; Geisler, Stefan; Ludwig, Thomas; Pipek, Volkmar; Pottebaum, Jens
Mensch und Computer 2018: Workshopband MuC 2018, p.565-569
[Conference Proceedings]
Benutzbare Sicherheit: Usability, Safety und Security bei Passwörtern
Reuter, Christian; Kaufhold, Marc-André; Klös, Jonas
Mensch & Computer: Workshopband, p.33-41
[Conference Proceedings]
Design eines BCM-Dashboards für kleine und mittlere Unternehmen
Kaufhold, Marc-André; Reuter, Christian; Riebe, Thea; von Radziewski, Elmar
Mensch und Computer 2018: Workshopband, p.579-586
[Conference Proceedings]
Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU
Kaufhold, Marc-André; Reuter, Christian; Ermert, Tobias
Mensch und Computer 2018 Tagungsband, p.309-312
[Conference Proceedings]
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft
Bernardi, Ansgar; Reuter, Christian; Schneider, Wolfgang; Linsner, Sebastian; Kaufhold, Marc-André
Informatik in der Land-, Forst- und Ernährungswirtschaft : Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, p.25-30
[Conference Proceedings]
BayBFed: Bayesian Backdoor Defense for Federated Learning
Kumari, Kavita; Rieger, Phillip; Fereidooni, Hossein; Jadliwala, Murtuza; Sadeghi, Ahmad-Reza
Proceedings: 44th IEEE Symposium on Security and Privacy - SP 2023, p.747-764
[Conference Proceedings]
Ein Kampf gegen Windmühlen: qualitative Studie über Informatikabsolventinnen und ihre Datenprivatheit
Schmidbauer-Wolf, Gina Maria; Herbert, Franziska; Reuter, Christian
Mensch und Computer 2019 - Workshopband, p.256-264
[Conference Proceedings]
Wertekonflikte in der Nutzung sozialer Medien zur Vernetzung ungebundener HelferInnen in Krisensituationen – Ein Value-Sensitive Design Ansatz
Riebe, Thea; Langer, Amanda; Kaufhold, Marc-André; Kretschmer, Nina Katharina; Reuter, Christian
Mensch und Computer 2019 - Workshopband, p.308-318
[Conference Proceedings]
6. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen - Neue digitale Realitäten
Reuter, Christian; Mentler, Tilo; Nestler, Simon; Herczeg, Michael; Ludwig, Thomas; Pottebaum, Jens; Kaufhold, Marc-André
Mensch und Computer 2019 - Workshopband, p.278-280
[Conference Proceedings]