Publikationen
Publikationen
Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques
Rasthofer, Siegfried; Arzt, Steven; Miltenberger, Marc; Bodden, Eric
Network and Distributed System Security Symposium 2016, p.1-15
[Conference Proceedings]
Enhancing the scalability, tractability and memory usage of HashSieve on multi-core CPUs
Mariano, Artur; Bischof, Christian
PDP2016
[Conference Proceedings]
Efficiency Comparison of Various Approaches in E-Voting Protocols
Kulyk, Oksana; Volkamer, Melanie
Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers, p.209-233
[Conference Proceedings]
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do
Kulyk, Oksana; Gerber, Paul; Reinheimer, Benjamin; Renaud, Karen; Volkamer, Melanie
NDSS Workshop on Usable Security (USEC)
[Conference Proceedings]
Parallel Improved Schnorr-Euchner Enumeration SE++ for the CVP and SVP
Correia, Fabio; Mariano, Artur; Proença, Alberto; Bischof, Christian; Agrell, Erik
PDP 2016 - 24th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, p.596-603
[Conference Proceedings]
Leakage-Resilient Layout Randomization for Mobile Devices
Braden, Kjell; Crane, Stephen; Davi, Lucas; Franz, Michael; Larsen, Per; Liebchen, Christopher; Sadeghi, Ahmad-Reza
23rd Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]
Security in Industrie 4.0 - Challenges and Solutions for the Fourth Industrial Revolution
Waidner, Michael; Kasper, Michael
DATE 2016 (Design, Automation and Test in Europe)
[Conference Proceedings]
BASEL (Buffer mAnagement SpEcification Language)
Kogan, Kirill; Menikkumbura, Danushka; Petri, Gustavo; Noh, Youngtae; Nikolenko, Sergey I.; Eugster, Patrick
ANCS '16 Proceedings of the 2016 Symposium on Architectures for Networking and Communications Systems, p.69-74
[Conference Proceedings]
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology
Gutmann, Andreas; Renaud, Karen; Maguire, Joseph; Mayer, Peter; Volkamer, Melanie; Matsuura, Kanta; Müller-Quade, Jörn
2016 IEEE European Symposium on Security and Privacy (EuroS&P), p.357-371
[Conference Proceedings]
On the Hardness of Proving CCA-Security of Signed ElGamal
Bernhard, David; Fischlin, Marc; Warinschi, Bogdan
Public-Key Cryptography - PKC 2016, p.24
[Conference Proceedings]
An Analysis of OpenSSL's Random Number Generator
Strenzke, Falko
Advances in Cryptology – EUROCRYPT 2016. 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, p.644-669
[Conference Proceedings]
Exploring Millimeter-Wave Network Scenarios with Ray-tracing based Simulations in mmTrace
Steinmetzer, Daniel; Classen, Jiska; Hollick, Matthias
IEEE Infocom 2016 Poster Presentation (Infocom'16 Posters)
[Conference Proceedings]
Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure
Shulman, Haya; Waidner, Michael
In Traffic Monitoring and Analysis (TMA)
[Conference Proceedings]
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT
Rauzy, Pablo; Kiss, Ágnes; Krämer, Juliane; Seifert, Jean-Pierre
Constructive Side-Channel Analysis and Secure Design - 7. International Workshop (COSADE'16), p.111-129
[Conference Proceedings]
Privacy Friendly Apps-Making Developers Aware of Privacy Violations
Marky, Karola; Gutmann, Andreas; Rack, Philipp; Volkamer, Melanie
1st International Workshop on Innovations in Mobile Privacy and Security, p.46-48
[Conference Proceedings]
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack
Buchmann, Johannes; Göpfert, Florian; Player, Rachel; Wunderer, Thomas
International Conference on Cryptology AFRICACRYPT 2016
[Conference Proceedings]
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation
Akleylek, Sedat; Bindel, Nina; Buchmann, Johannes; Krämer, Juliane; Marson, Giorgia Azzurra
International Conference on Cryptology AFRICACRYPT 2016, p.10
[Conference Proceedings]
Identifying and Utilizing Dependencies Across Cloud Security Services
Taha, Ahmed; Metzler, Patrick; Trapero, Ruben; Luna, Jesus; Suri, Neeraj
ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, p.329-340
[Conference Proceedings]
Performance issues and optimizations in JavaScript: an empirical study
Selakovic, Marija; Pradel, Michael
ICSE '16 Proceedings of the 38th International Conference on Software Engineering, p.61-72
[Conference Proceedings]
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung
Schochlow, Verena; Neumann, Stephan; Braun, Kristoffer; Volkamer, Melanie
Datenschutz und Datensicherheit, p.295-299
[Conference Proceedings]
Liquido: Embedding Liquids into 3D Printed Objects to Sense Tilting and Motion
Schmitz, Martin; Leister, Andreas; Dezfuli, Niloofar; Riemann, Jan; Müller, Florian; Mühlhäuser, Max
Proceedings of the 34rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, p.2688-2696
[Conference Proceedings]
Debugging for reactive programming
Salvaneschi, Guido; Mezini, Mira
ICSE '16 Proceedings of the 38th International Conference on Software Engineering, p.796-807
[Conference Proceedings]
Jumping through hoops: why do Java developers struggle with cryptography APIs?
Nadi, Sarah; Krüger, Stefan; Mezini, Mira; Bodden, Eric
ICSE '16 Proceedings of the 38th International Conference on Software Engineering, p.935-946
[Conference Proceedings]
"Jumping Through Hoops" Why do Java Developers Struggle With Cryptography APIs?
Nadi, Sarah; Krüger, Stefan; Mezini, Mira; Bodden, Eric
International Conference on Software Engineering
[Conference Proceedings]
Nomen est Omen: Exploring and Exploiting Similarities between Argument and Parameter Names
Liu, Hui; Liu, Qiurong; Staicu, Cristian-Alexandru; Pradel, Michael; Luo, Yue
ICSE '16 Proceedings of the 38th International Conference on Software Engineering, p.1063-1073
[Conference Proceedings]
Valiant's Universal Circuit is Practical
Kiss, Ágnes; Schneider, Thomas
35. Advances in Cryptology -- EUROCRYPT 2016, p.699-728
[Conference Proceedings]
BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets
Karuppayah, Shankar; Vasilomanolakis, Emmanouil; Haas, Steffen; Fischer, Mathias; Mühlhäuser, Max
2016 IEEE International Conference on Communications
[Conference Proceedings]
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3
Fischlin, Marc; Günther, Felix; Schmidt, Benedikt; Warinschi, Bogdan
37th IEEE Symposium on Security and Privacy (S&P 2016)
[Conference Proceedings]
High-Performance and Lightweight Lattice-Based Public-Key Encryption
Buchmann, Johannes; Göpfert, Florian; Güneysu, Tim; Oder, Tobias; Pöppelmann, Thomas
IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security
[Conference Proceedings]
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge
Buchmann, Johannes; Büscher, Niklas; Katzenbeisser, Stefan; Krämer, Juliane; Micciancio, Daniele; Siim, Sander; Vredendaal, Christine van; Walter, Michael; Göpfert, Florian
ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography
[Conference Proceedings]