Publikationen
Publikationen
Hidden in Plain Sight:Obfuscated Strings Threatening Your Privacy
Glanz, Leonid; Müller, Patrick; Baumgärtner, Lars; Reif, Michael; Anthonysamy, Pauline; Mezini, Mira
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, p.694-707
[Conference Proceedings]
One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol
Stute, Milan; Kreitschmann, David; Hollick, Matthias
MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, p.529-543
[Conference Proceedings]
Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link
Stute, Milan; Kreitschmann, David; Hollick, Matthias
MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, p.820-822
[Conference Proceedings]
A Billion Open Interfaces for Eve and Mallory : MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link
Stute, Milan; Narain, Sashank; Mariotto, Alex; Heinrich, Alexander; Kreitschmann, David; Noubir, Guevara; Hollick, Matthias
Proceedings of the 28th USENIX Security Symposium, p.37-54
[Conference Proceedings]
Classic McEliece Implementation with Low Memory Footprint
Roth, Johannes; Karatsiolis, Vangelis; Krämer, Juliane
19th Smart Card Research and Advanced Application Conference (CARDIS 2020)
[Conference Proceedings]
Cost Fairness for Blockchain-Based Two-Party Exchang Protocols
Lohr, Matthias; Schlosser, Benjamin; Jürjens, Jan; Staab, Matthias
3rd IEEE International Conference on Blockchain
[Conference Proceedings]
Security of Public Key Encryption against Resetting Attacks
Krämer, Juliane; Struck, Patrick
21st International Conference on Cryptology in India (Indocrypt 2020)
[Conference Proceedings]
Warning the Public: A Survey on Attitudes, Expectations and Use of Mobile Crisis Apps in Germany
Kaufhold, Marc-André; Haunschild, Jasmin; Reuter, Christian
Proceedings of the 28th European Conference on Information Systems (ECIS)
[Conference Proceedings]
OptiSwap: Fast Optimistic Fair Exchange
Eckey, Lisa; Faust, Sebastian; Schlosser, Benjamin
15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20)
[Conference Proceedings]
Towards Post-Quantum Security for Signal's X3DH Handshake
Brendel, Jacqueline; Fischlin, Marc; Günther, Felix; Janson, Christian; Stebila, Douglas
27th Selected Areas in Cryptography (SAC 2020)
[Conference Proceedings]
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection
Bauspieß, Pia; Kolberg, Jascha; Demmler, Daniel; Krämer, Juliane; Busch, Christoph
12th IEEE International Workshop on Information Forensics and Security (WIFS 2020)
[Conference Proceedings]
Deterministic Wallets in a Quantum World
Alkeilani Alkadri, Nabil; Das, Poulami; Erwig, Andreas; Faust, Sebastian; Krämer, Juliane; Riahi, Siavash; Struck, Patrick
The 27th ACM Conference on Computer and Communications Security (CCS 2020)
[Conference Proceedings]
TRIDEnT: Towards a Decentralized Threat Indicator Marketplace
Alexopoulos, Nikolaos; Vasilomanolakis, Emmanouil; Le Roux, Stephane; Rowe, Steven; Mühlhäuser, Max
35th ACM/SIGAPP Symposium on Applied Computing (SAC'20)
[Conference Proceedings]
Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany
Haunschild, Jasmin; Kaufhold, Marc-André; Reuter, Christian
Proceedings of the International Conference on Wirtschaftsinformatik (WI), p.1545-1560
[Conference Proceedings]
A Programming Model for Semi-implicit Parallelization of Static Analyses
Helm, Dominik; Kübler, Florian; Kölzer, Jan Thomas; Haller, Philipp; Eichberg, Michael; Salvaneschi, Guido; Mezini, Mira
ISSTA '20: 29th SIGSOFT International Symposium on Software Testing and Analysis
[Conference Proceedings]
Firmware Insider: Bluetooth Randomness is Mostly Random
Tillmanns, Jörn; Classen, Jiska; Rohrbach, Felix; Hollick, Matthias
14th USENIX Workshop on Offensive Technologies (WOOT 2020)
[Conference Proceedings]
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference
Boemer, Fabian; Cammarota, Rosario; Demmler, Daniel; Schneider, Thomas; Yalame, Mohammad Hossein
2nd Privacy-Preserving Machine Learning Workshop at CRYPTO 2020
[Conference Proceedings]
CryptoSPN: Expanding PPML beyond Neural Networks
Treiber, Amos; Molina, Alejandro; Weinert, Christian; Schneider, Thomas; Kersting, Kristian
2nd Privacy-Preserving Machine Learning Workshop at CRYPTO 2020
[Conference Proceedings]
CryptoSPN: Expanding PPML beyond Neural Networks
Treiber, Amos; Molina, Alejandro; Weinert, Christian; Schneider, Thomas; Kersting, Kristian
PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practi, p.9-14
[Conference Proceedings]
Engineering Privacy-Preserving Machine Learning Protocols
Schneider, Thomas
PPMLP ‘20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, p.3-4
[Conference Proceedings]
Modular Collaborative Program Analysis in OPAL
Helm, Dominik; Kübler, Florian; Reif, Michael; Eichberg, Michael; Mezini, Mira
ESEC/FSE 2020 : Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, p.184-196
[Conference Proceedings]
Zur Benutzbarkeit und Verwendung von API-Dokumentationen
Huesmann, Rolf; Zeier, Alexander; Heinemann, Andreas; Wiesmaier, Alexander
Mensch und Computer 2020 - Workshopband
[Conference Proceedings]
Post-Quantum Secure Boot
Kumar, Vinay B. Y.; Gupta, Naina; Chattopadhyay, Anupam; Kasper, Michael; Krauß, Christoph; Niederhagen, Ruben
Design, Automation & Test in Europe Conference & Exhibition, DATE 2020
[Conference Proceedings]
TrustEV: Trustworthy Electric Vehicle Charging and Billing
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
Proceedings of the 35th ACM/SIGAPP Symposium on Applied Computing SAC 2020
[Conference Proceedings]
SEPAD - Security Evaluation Platform for Autonomous Driving
Zelle, Daniel; Rieke, Roland; Plappert, Christian; Krauß, Christoph; Levshun, Dmitry; Chechulin, Andrey
28th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP
[Conference Proceedings]
Post-Quantum TLS on Embedded Systems - Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS
Bürstinghaus-Steinbach, Kevin; Krauß, Christoph; Niederhagen, Ruben; Schneider, Michael
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS, p.841–852
[Conference Proceedings]
Securing Electric Vehicle Charging Systems through Component Binding
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
39th International Conference on Computer Safety, Reliability and Security, SAFECOMP
[Conference Proceedings]
HIP: HSM-based Identities for Plug-and-Charge
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]
HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria; Heddergott, Ronald
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]
Security Analysis of Automotive Protocols
Lauser, Timm; Zelle, Daniel; Krauß, Christoph
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]