Publikationen

Publikationen

ChirpOTLE: A Framework for Practical LoRaWAN Security Evaluation
Hessel, Frank; Almon, Lars; Álvarez, Flor
WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.306-316
[Conference Proceedings]


MagicPairing: Apple’s Take on Securing Bluetooth Peripherals
Heinze, Dennis; Classen, Jiska; Rohrbach, Felix
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
[Conference Proceedings]


On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts
Alkeilani Alkadri, Nabil; Bansarkhani, Rachid El; Buchmann, Johannes
The 25th Australasian Conference on Information Security and Privacy (ACISP'20)
[Conference Proceedings]


The Lattice-Based Digital Signature Scheme qTESLA
Alkim, Erdem; Barreto, Paulo S. L. M.; Bindel, Nina; Krämer, Juliane; Longa, Patrick; Ricardini, Jefferson E.
18th International Conference on Applied Cryptography and Network Security (ACNS 2020)
[Conference Proceedings]


Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security
Krämer, Juliane; Struck, Patrick
11th International Conference on Post-Quantum Cryptography (PQCrypto 2020)
[Conference Proceedings]


TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves
Cloosters, Tobias; Rodler, Michael; Davi, Lucas
29th USENIX Security Symposium
[Conference Proceedings]


Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
Krämer, Juliane; Struck, Patrick
11th International Workshop on Constructive Side-Channel Analysis and Secure Design(COSADE 2020)
[Conference Proceedings]


On the Security of Strong Memristor-based Physically Unclonable Functions
Zeitouni, Shaza; Stapf, Emmanuel; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
Design Automation Conference 2020
[Conference Proceedings]


SAFE: A Secure and Efficient Long-Term Distributed Storage System
Buchmann, Johannes; Dessouky, Ghada; Frassetto, Tommaso; Kiss, Ágnes; Sadeghi, Ahmad-Reza; Schneider, Thomas; Traverso, Giulia; Zeitouni, Shaza
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20)
[Conference Proceedings]


Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System
Nguyen, Thien Duc; Rieger, Phillip; Miettinen, Markus; Sadeghi, Ahmad-Reza
Workshop on Decentralized IoT Systems and Security (DISS) @ NDSS Symposium 2020
[Conference Proceedings]


BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications
Alkeilani Alkadri, Nabil; Bansarkhani, Rachid El; Buchmann, Johannes
24th International Conference on Financial Cryptography and Data Security (FC'20)
[Conference Proceedings]


Offline Model Guard: Secure and Private ML on Mobile Devices
Bayerl, Sebastian P.; Frassetto, Tommaso; Jauernig, Patrick; Riedhammer, Korbinian; Sadeghi, Ahmad-Reza; Schneider, Thomas; Stapf, Emmanuel; Weinert, Christian
23. Design, Automation and Test in Europe Conference (DATE '20)
[Conference Proceedings]


HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
Dessouky, Ghada; Frassetto, Tommaso; Sadeghi, Ahmad-Reza
USENIX Security
[Conference Proceedings]


Cross-spectrum thermal to visible face recognition based on cascaded image synthesis
Mallat, Khawla; Damer, Naser; Boutros, Fadi; Kuijper, Arjan; Dugelay, Jean-Luc
International Conference on Biometrics (ICB) 2019
[Conference Paper]


Thermal and Cross-spectral Palm Image Matching in the Visual Domain by Robust Image Transformation
Bartuzi, Ewelina; Damer, Naser
International Conference on Biometrics (ICB) 2019
[Conference Paper]


Reliable Age and Gender Estimation from Face Images: Stating the Confidence of Model Predictions
Terhörst, Philipp; Zelch, Ines; Huber, Marco; Kolf, Jan Niklas; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
International Conference on Biometrics - Theory, Applications and Systems (BTAS) 2019
[Conference Paper]


Realistic Dreams: Cascaded Enhancement of GAN-generated Imageswith an Example in Face Morphing Attacks
Damer, Naser; Boutros, Fadi; Saladie, Alexandra Moseguí; Kirchbuchner, Florian; Kuijper, Arjan
International Conference on Biometrics - Theory, Applications and Systems (BTAS) 2019
[Conference Paper]


Cross-Spectral Periocular Recognition by Cascaded Spectral Image Transformation
Raja, Kiran; Damer, Naser; Ramachandra, Raghavendra; Boutros, Fadi; Busch, Christoph
International Conference on Imaging Systems & Techniques (IST) 2019
[Conference Paper]


Minutiae-Based Gender Estimation for Full and Partial Fingerprints of Arbitrary Size and Shape
Terhörst, Philipp; Damer, Naser; Braun, Andreas; Kuijper, Arjan
Asian Conference on Computer Vision (ACCV) 2018
[Conference Paper]


D-ID-Net: Two-Stage Domain and Identity Learning for Identity-Preserving Image Generation from Semantic Segmentation
Damer, Naser; Boutros, Fadi; Kirchbuchner, Florian; Kuijper, Arjan
International Conference on Computer Vision (ICCV) 2019
[Conference Paper]


Eye-MMS: Miniature Multi-Scale Segmentation Network of Key Eye-Regions in Embedded Applications
Boutros, Fadi; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
International Conference on Computer Vision (ICCV) 2019
[Conference Paper]


To (Psychologically) Own Data is to Protect Data: How Psychological Ownership Determines Protective Behavior in a Work and Private Context
Heidt, Margareta; Olt, Christian M.; Buxmann, Peter
Internationale Tagung Wirtschaftsinformatik
[Conference Proceedings]


HEALED: HEaling & Attestation for Low-end Embedded Devices
Ibrahim, Ahmad; Sadeghi, Ahmad-Reza; Tsudik, Gene
23rd International Conference Financial Cryptography and Data Security (FC 2019), 2019
[Conference Proceedings]


Asymmetric DCnets for Effective and Efficient Sender Anonymity
Grube, Tim; Daubert, Jörg; Mühlhäuser, Max
IEEE Global Communications Conference (GLOBECOM)
[Conference Proceedings]


DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification
Truong, Hien Thi Thu; Toivonen, Juhani; Nguyen, Thien Duc; Soriente, Claudio; Tarkoma, Sasu; Asokan, N.
IEEE International Conference on Pervasive Computing and Communications (PerCom2019)
[Conference Proceedings]


On (The Lack Of) Location Privacy in Crowdsourcing Applications
Boukoros, Spyros; Humbert, Mathias; Katzenbeisser, Stefan; Troncoso, Carmela
USENIX Security Symposium
[Conference Proceedings]


AR Tracking with Hybrid, Agnostic and Browser Based Approach
Laxman Ahire, Amit; Basgier, Dennis
International Conference on Artificial Intelligence and Virtual Reality (AIVR) 2019
[Conference Paper]


Merge-SfM: Merging Partial Reconstructions
Fang, Meiling; Pollok, Thomas; Qu, Chengchao
British Machine Vision Conference (BMVC) 2019
[Conference Paper]


NetCapVis: Web-based Progressive Visual Analytics for Network Packet Captures
Ulmer, Alex; Sessler, David; Kohlhammer, Jörn
Symposium on Visualization for Cyber Security (VizSec) 2019
[Conference Paper]


Hand-Arm Vibration Estimation Using A Commercial Smartwatch
Matthies, Denys J.C.; Haescher, Marian; Bieber, Gerald; Nanayakkara, Suranga
International Conference on Hand-Arm Vibration 2019
[Conference Paper]