Publikationen

Publikationen

Why Johnny Fails to Protect his Privacy
Gerber, Nina; Zimmermann, Verena; Volkamer, Melanie
4th European Workshop on Usable Security (EuroUSEC 2019)
[Conference Proceedings]


RIP-RH: Preventing Rowhammer-based Inter-Process Attacks
Bock, Carsten; Brasser, Ferdinand; Gens, David; Liebchen, Christopher; Sadeghi, Ahmad-Reza
ACM Asia Conference on Computer and Communications Security (AsiaCCS)
[Conference Proceedings]


Sustainable Security & Safety: Challenges and Opportunities
Paverd, Andrew; Völp, Marcus; Brasser, Ferdinand; Schunter, Matthias; Asokan, N.; Sadeghi, Ahmad-Reza; Esteves-Verissimo, Paulo; Steininger, Andreas; Holz, Thorsten
4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS)
[Conference Proceedings]


Privacy-Preserving Speaker Recognition with Cohort Score Normalisation
Nautsch, Andreas; Patino, Jose; Treiber, Amos; Stafylakis, Themos; Mezira, Petr; Todisco, Massimiliano; Schneider, Thomas; Evans, Nicholas
Interspeech 2019
[Conference Proceedings]


PAtt: Physics-based Attestation of Control Systems
Ghaeini, Hamid Reza; Chan, Matthew; Bahmani, Raad; Brasser, Ferdinand; Garcia, Luis; Zhou, Jianying; Sadeghi, Ahmad-Reza; Tippenhauer, Nils Ole; Zonouz, Saman A.
22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
[Conference Proceedings]


CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems
Dessouky, Ghada; Zeitouni, Shaza; Ibrahim, Ahmad; Davi, Lucas; Sadeghi, Ahmad-Reza
2019 International Conference On Computer Aided Design (ICCAD)
[Conference Proceedings]


Web Application for Privacy-Preserving Scheduling using Secure Computation
Kiss, Ágnes; Schick, Oliver; Schneider, Thomas
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications SECRYPT - Volume 1, p.456-463
[Conference Proceedings]


Poster: Automated Evaluation of Fuzzers
Surminski, Sebastian; Rodler, Michael; Davi, Lucas
NDSS 2019 : 26th Annual Network and Distributed System Security Symposium
[Conference Proceedings]


HardScope: Hardening Embedded Systems Against Data-Oriented Attacks
Nyman, Thomas; Dessouky, Ghada; Zeitouni, Shaza; Lehikoinen, Aaro; Paverd, Andrew; Asokan, N.; Sadeghi, Ahmad-Reza
Design Automation Conference (DAC)
[Conference Proceedings]


Too Confident to Care: Investigating Overconfidence in Privacy Decision Making
Wagner, Amina; Mesbah, Neda
European Conference on Information Systems - ECIS 2019
[Conference Proceedings]


Weary of Watching Out? - Cause and Effect of Security Fatigue
Olt, Christian M.; Mesbah, Neda
European Conference on Information Systems - ECIS 2019
[Conference Proceedings]


Mobile Private Contact Discovery at Scale
Kales, Daniel; Rechberger, Christian; Schneider, Thomas; Senker, Matthias; Weinert, Christian
28. USENIX Security Symposium (USENIX Security'19)
[Conference Proceedings]


On the Meaning and Purpose of Attack Trees
Mantel, Heiko; Probst, Christian
The 32nd IEEE Computer Security Foundations Symposium (CSF)
[Conference Proceedings]


Function-Dependent Commitments from Homomorphic Authenticators
Schabhüser, Lucas; Butin, Denis; Buchmann, Johannes
24th Australasian Conference, ACISP 2019
[Conference Proceedings]


Language Support for Multiple Privacy Enhancing Technologies
Oak, Aditya; Mezini, Mira; Salvaneschi, Guido
Conference Companion of the 3rd International Conference on Art, Science, and Engineering of Programming
[Conference Proceedings]


p3Enum: A new Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver
Burger, Michael; Bischof, Christian; Krämer, Juliane
19th INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, p.535-542
[Conference Proceedings]


EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs
Schneider, Thomas; Tkachenko, Oleksandr
14. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'19)
[Conference Proceedings]


Towards Systematic Design of Collective Remote Attestation Protocols
Oliveira Nunes, Ivan de; Dessouky, Ghada; Ibrahim, Ahmad; Rattanavipanon, Norrathep; Sadeghi, Ahmad-Reza; Tsudik, Gene
The 39th International Conference on Distributed Computing Systems (ICDCS) 2019
[Conference Proceedings]


A Unified Lattice Model and Framework for Purity Analyses
Helm, Dominik; Kübler, Florian; Eichberg, Michael; Reif, Michael; Mezini, Mira
Software Engineering und Software Management 2019
[Conference Proceedings]


A unified lattice model and framework for purity analyses
Helm, Dominik; Kübler, Florian; Eichberg, Michael; Reif, Michael; Mezini, Mira
Software Engineering and Software Management 2019
[Conference Proceedings]


DÏoT: A Federated Self-learning Anomaly Detection System for IoT
Nguyen, Thien Duc; Marchal, Samuel; Miettinen, Markus; Fereidooni, Hossein; Asokan, N.; Sadeghi, Ahmad-Reza
The 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019)
[Conference Proceedings]


A Dataset of Parametric Cryptographic Misuses
Wickert, Anna-Katharina; Reif, Michael; Eichberg, Michael; Dodhy, Anam; Mezini, Mira
2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR)
[Conference Proceedings]


HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices
O'Connor, T. J.; Mohamed, Reham; Miettinen, Markus; Enck, William; Reaves, Bradley; Sadeghi, Ahmad-Reza
Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)
[Conference Proceedings]


Context Hiding Multi-Key Linearly Homomorphic Authenticators
Schabhüser, Lucas; Butin, Denis; Buchmann, Johannes
Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, p.493-513
[Conference Proceedings]


Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments
Geihs, Matthias; Schabhüser, Lucas; Buchmann, Johannes
International Conference on Codes, Cryptology, and Information Security (C2SI) 2019
[Conference Proceedings]


Multiparty Virtual State Channels
Dziembowski, Stefan; Eckey, Lisa; Faust, Sebastian; Hesse, Julia; Hostakova, Kristina
Eurocrypt 2019
[Conference Proceedings]


Perils of Zero-Interaction Security in the Internet of Things
Fomichev, Mikhail; Maass, Max; Almon, Lars; Molina, Alejandro; Hollick, Matthias
ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2019)
[Conference Proceedings]


Fault Attacks on UOV and Rainbow
Krämer, Juliane; Loiero, Mirjam
10th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2019)
[Conference Proceedings]


PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing
Järvinen, Kimmo; Leppäkoski, Helena; Lohan, Elena Simona; Richter, Philipp; Schneider, Thomas; Tkachenko, Oleksandr; Yang, Zheng
4. IEEE European Symposium on Security and Privacy (EuroS&P'19)
[Conference Proceedings]


FastKitten: Practical Smart Contracts on Bitcoin
Das, Poulami; Eckey, Lisa; Frassetto, Tommaso; Gens, David; Hostáková, Kristina; Jauernig, Patrick; Faust, Sebastian; Sadeghi, Ahmad-Reza
28th USENIX Security Symposium
[Conference Proceedings]