Publikationen
Publikationen
Poster: RPKI Kill Switch
Mirdita, Donika; Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security 2022
[Conference Paper]
Poster: DNS in Routers Considered Harmful
Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security 2022
[Conference Paper]
Security code smells in apps: are we getting better?
Arzt, Steven
European Software Engineering Conference 2022
[Conference Paper]
Disrupting Continuity of Apple’s Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi
Stute, Milan; Heinrich, Alexander; Lorenz, Jannik; Hollick, Matthias
Proceedings of the 30th USENIX Security Symposium, p.3917-3934
[Conference Proceedings]
DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection
Rieger, Phillip; Nguyen, Thien Duc; Miettinen, Markus; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2022
[Conference Proceedings]
Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps
Reuter, Christian; Kaufhold, Marc-André; Leopold, Inken; Knipp, Hannah
Proceedings of the 25th European Conference on Information Systems (ECIS), p.2187-2201
[Conference Proceedings]
Fake News Perception in Germany: A Representative Study of People's Attitudes and Approaches to Counteract Disinformation
Reuter, Christian; Hartwig, Katrin; Kirchner, Jan; Schlegel, Noah
Tagungsband WI 2019 : Human Practice. Digital Ecologies. Our Future., p.1069-1083
[Conference Proceedings]
FLAME: Taming Backdoors in Federated Learning
Nguyen, Thien Duc; Rieger, Phillip; Chen, Huili; Yalame, Mohammad Hossein; Möllering, Helen; Fereidooni, Hossein; Marchal, Samuel; Miettinen, Markus; Mirhoseini, Azalia; Zeitouni, Shaza; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza; Schneider, Thomas
Proceedings of the 31st USENIX Security Symposium, p.1415-1432
[Conference Proceedings]
112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen
Kaufhold, Marc-André; Rupp, Nicola; Reuter, Christian; Amelunxen, Christoph; Cristaldi, Massimo
Proceedings of the European Conference on Information Systems (ECIS) 2018
[Conference Proceedings]
Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland
Kaufhold, Marc-André; Grinko, Margarita; Reuter, Christian; Schorch, Marén; Langer, Amanda; Skudelny, Sascha; Hollick, Matthias
Tagungsband WI 2019 : Human Practice. Digital Ecologies. Our Future., p.1054-1068
[Conference Proceedings]
SoK: Cryptanalysis of encrypted search with LEAKER - a framework for LEakage AttacK Evaluation on Real-world data
Kamara, Seny; Kat, Abdelkarim; Moataz, Tarik; Schneider, Thomas; Treiber, Amos; Yonli, Michael
7th IEEE European Symposium on Security and Privacy (EuroS&P'22)
[Conference Proceedings]
Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System
Heinrich, Alexander; Stute, Milan; Kornhuber, Tim; Hollick, Matthias
The 21st Privacy Enhancing Technologies Symposium
[Conference Proceedings]
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Heinrich, Alexander; Hollick, Matthias; Schneider, Thomas; Stute, Milan; Weinert, Christian
Proceedings of the 30th USENIX Security Symposium, p.3577-3594
[Conference Proceedings]
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter
Hartwig, Katrin; Reuter, Christian
Tagungsband WI 2019 : Human Practice. Digital Ecologies. Our Future., p.1844-1855
[Conference Proceedings]
FedCRI: Federated Mobile Cyber-Risk Intelligence
Fereidooni, Hossein; Dmitrienko, Alexandra; Rieger, Phillip; Miettinen, Markus; Sadeghi, Ahmad-Reza; Madlener, Felix
Network and Distributed Systems Security (NDSS) Symposium 2022
[Conference Proceedings]
Usability stumm geschaltet? Usable Security und Privacy in Videokonferenzsystemen
Balthasar, Mandy; Gerber, Nina; Schmitt, Hartmut
Mensch und Computer 2021 - Usability Professionals
[Conference Proceedings]
AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices
Heinrich, Alexander; Bittner, Niklas; Hollick, Matthias
WiSec '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.26-38
[Conference Proceedings]
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens
Jiang, Yan; Ji, Xiaoyu; Wang, Kai; Yan, Chen; Mitev, Richard; Sadeghi, Ahmad-Reza; Xu, Wenyuan
Proceedings: 43rd IEEE Symposium on Security and Privacy (SP 2022), p.984-1001
[Conference Proceedings]
GhostTouch: Targeted Attacks on Touchscreens without Physical Touch
Wang, Kai; Mitev, Richard; Yan, Chen; Ji, Xiaoyu; Sadeghi, Ahmad-Reza; Xu, Wenyuan
Proceedings of the 31st USENIX Security Symposium
[Conference Proceedings]
The Nerd Factor: The Potential of S&P Adepts to Serve as a Social Resource in the User’s Quest for More Secure and Privacy-Preserving Behavior
Gerber, Nina; Marky, Karola
Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), p.57-76
[Conference Proceedings]
Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M
Sadeghi, Ahmad-Reza; Mitev, Richard; Saß, Marvin
25th Black Hat USA
[Conference Proceedings]
Are Average Faces Master Faces?
Dörsch, André; Rathgeb, Christian; Ibsen, Mathias; Busch, Christoph
Proc. Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]
$crypto_lib$: Comparing and Selecting Cryptography Libraries
Wohlwender, Jan; Huesmann, Rolf; Heinemann, Andreas; Wiesmaier, Alexander
Accepted at European Interdisciplinary Cybersecurity Conference (EICC 22)
[Conference Proceedings]
Decision Tree-Based Rule Derivation for Intrusion Detection in Safety-Critical Automotive Systems
Buschlinger, Lucas; Rieke, Roland; Sarda, Sanat; Krauß, Christoph
2022 30th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), p.246-254
[Conference Proceedings]
On the State of Crypto Agility
Alnahawi, N.; Schmitt, N.; Wiesmaier, A.; Heinemann, A.; Graßmeyer, T.
18. Deutscher IT-Sicherheitskongress, p.103-126
[Conference Proceedings]
Improved Homomorphically Encrypted Biometric Identification Using Coefficient Packing
Bauspieß, P.; Olafsson, J.; Kolberg, J.; Drozdowski, P.; Rathgeb, C.; Busch, C.
Proc. Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]
Dual-Stream Temporal Convolutional Neural Network for Voice Presentation Attack Detection
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Kamble, M.; Todisco, M.; Busch, C.
Proc. Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]
Exploring Quality Scores for Workload Reduction in Biometric Identification
Osorio-Roig, D.; Schlett, T.; Rathgeb, C.; Tapia, J.; Busch, C.
Proc. Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures
Dessouky, Ghada; Gruler, Alexander; Mahmoody, Pouya; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
Network and Distributed Systems Security (NDSS) Symposium 2022
[Conference Proceedings]
Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany
Haunschild, Jasmin; Kaufhold, Marc-André; Reuter, Christian
Proceedings der 15. Internationalen Tagung Wirtschaftsinformatik 2020 : Entwicklungen, Chancen und Herausforderungen der Digitalisierung : WI 2020 : Zentrale Tracks
[Conference Proceedings]