Publikationen

Publikationen

Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability
Buchmann, Johannes; Demirel, Denise; Schabhüser, Lucas; Struck, Patrick
C2SI 2017 - Codes, Cryptology and Information Security - Second International Conference in honor of Professor Claude Carlet, p.142-160
[Conference Proceedings]


SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality
Braun, Johannes; Buchmann, Johannes; Demirel, Denise; Fujiwara, Mikio; Geihs, Matthias; Moriai, Shiho; Sasaki, Masahide; Waseda, Atsushi
ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, p.461-468
[Conference Proceedings]


Student Research Abstract: On Enhancing Trust in Cryptographic Solutions
Alexopoulos, Nikolaos
Proceedings of the 32nd Annual ACM Symposium on Applied Computing
[Conference Proceedings]


Flexibles: Deformation-Aware 3D-Printed Tangibles for Capacitive Touchscreens
Schmitz, Martin; Steimle, Jürgen; Huber, Jochen; Dezfuli, Niloofar; Mühlhäuser, Max
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, p.1001-1014
[Conference Proceedings]


Election-Dependent Security Evaluation of Internet Voting Schemes
Neumann, Stephan; Noll, Manuel; Volkamer, Melanie
ICT Systems Security and Privacy Protection. SEC 2017. IFIP Advances in Information and Communication Technology, p.371-382
[Conference Proceedings]


Internet-Wide Study of DNS Cache Injections
Klein, Amit; Shulman, Haya; Waidner, Michael
IEEE International Conference on Computer Communications (INFOCOM)
[Conference Proceedings]


Hardening Java's Access Control by Abolishing Implicit Privilege Elevation
Holzinger, Philipp; Hermann, Ben; Lerch, Johannes; Bodden, Eric; Mezini, Mira
2017 IEEE Symposium on Security and Privacy (SP 2017), p.1.109
[Conference Proceedings]


Finding Common Ground: A Survey of Capacitive Sensing in Human-Computer Interaction
Grosse-Puppendahl, Tobias; Holz, Christian; Cohn, Gabe A.; Wimmer, Raphael; Bechtold, Oskar; Hodges, Steve; Reynolds, Matthew S.; Smith, Joshua R.
CHI'17 CHI Conference on Human Factors in Computing Systems, p.3293-3316
[Conference Proceedings]


Cheetah: Just-in-Time Taint Analysis for Android Apps
Nguyen Quang Do, Lisa; Ali, Karim; Livshits, Benjamin; Bodden, Eric; Smith, Justin; Murphy-Hill, Emerson
2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C), p.39-42
[Conference Proceedings]


Ein deutsches digitales Signaturverfahren auf dem Weg zum internationalen kryptographischen Standard
Bindel, Nina
Digitale Gesellschaft zwischen Risikobereitschaft und Sicherheitsbedürfnis- Tagungsband zum 15. Deutschen IT-Sicherheitskongress
[Conference Proceedings]


Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions
Vasilomanolakis, Emmanouil; Habib, Sheikh Mahbub; Milaszewicz, Pavlos; Malik, Rabee Sohail; Mühlhäuser, Max
Trust Management XI, p.94-109
[Conference Proceedings]


IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT
Miettinen, Markus; Marchal, Samuel; Hafeez, Ibbad; Frassetto, Tommaso; Asokan, N.; Sadeghi, Ahmad-Reza; Tarkoma, Sasu
Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017)
[Conference Proceedings]


IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT
Miettinen, Markus; Marchal, Samuel; Hafeez, Ibbad; Asokan, N.; Sadeghi, Ahmad-Reza; Tarkoma, Sasu
Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017)
[Conference Proceedings]


Counting in the Dark: Caches Discovery and Enumeration in the Internet
Klein, Amit; Shulman, Haya; Waidner, Michael
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
[Conference Proceedings]


A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE
Göpfert, Florian; Vredendaal, Christine van; Wunderer, Thomas
PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography
[Conference Proceedings]


ORAMs in a Quantum World
Gagliardoni, Tommaso; Karvelas, Nikolaos; Katzenbeisser, S.
PQCrypto 2017 - 8th International Workshop Post-Quantum Cryptography
[Conference Proceedings]


IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende
Funke, Sebastian
Proceedings of the DACH Security 2017, p.1-10
[Conference Proceedings]


A lightweight protocol for privacy preserving division
Boukoros, Spyros; Karvelas, Nikolaos; Katzenbeisser, Stefan
IWCMC 2017 - 13th International Wireless Communications and Mobile Computing Conference
[Conference Proceedings]


Transitioning to a Quantum-Resistant Public Key Infrastructure
Bindel, Nina; Herath, Udyani; McKague, Matthew; Stebila, Douglas
PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography
[Conference Proceedings]


Systematic Black-Box Analysis of Collaborative Web Applications
Billes, Marina; Møller, Anders; Pradel, Michael
PLDI '17 ACM SIGPLAN Conference on Programming Language Design and Implementation, p.708
[Conference Proceedings]


Revisiting TESLA in the quantum random oracle model
Alkim, Erdem; Bindel, Nina; Buchmann, Johannes; Dagdelen, Özgür; Eaton, Edward; Gutoski, Gus; Krämer, Juliane; Pawlega, Filip
PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography
[Conference Proceedings]


DEMO: Demonstrating Reactive Smartphone-Based Jamming
Schulz, Matthias; Hollick, Matthias; Gringoli, Francesco; Deligeorgopoulos, Efstathios
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), p.285-287
[Conference Proceedings]


Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control
Schulz, Matthias; Gringoli, Francesco; Koch, Michael; Steinmetzer, Daniel; Hollick, Matthias
10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017)
[Conference Proceedings]


A Systematic Study of Cache Side Channels across AES Implementations
Mantel, Heiko; Weber, Alexandra; Köpf, Boris
ESSoS 2017 - 9th International Symposium on Engineering Secure Software and Systems
[Conference Proceedings]


Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information
Kulyk, Oksana; Reinheimer, Benjamin; Volkamer, Melanie
International Conference on Human-Computer Interaction (HCII), p.675-690
[Conference Proceedings]


SCAPI: a scalable attestation protocol to detect software and physical attacks
Kohnhäuser, Florian; Büscher, Niklas; Gabmeyer, Sebastian; Katzenbeisser, Stefan
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.75-86
[Conference Proceedings]


SeED: Secure Non-Interactive Attestation for Embedded Devices
Ibrahim, Ahmad; Sadeghi, Ahmad-Reza; Zeitouni, Shaza
10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017)
[Conference Proceedings]


Update-tolerant and Revocable Password Backup
Horsch, Moritz; Braun, Johannes; Metz, Dominique; Buchmann, Johannes
ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy
[Conference Proceedings]


Phonion: Practical Protection of Metadata in Telephony Networks
Heuser, Stephan; Reaves, Bradley; Pendyala, Praveen Kumar; Carter, Henry; Dmitrienko, Alexandra; Kiyavash, Negar; Enck, William; Sadeghi, Ahmad-Reza; Traynor, Patrick
Proceedings on Privacy Enhancing Technologies (PoPETs)
[Conference Proceedings]


Exploring Consumers' Attitudes of Smart TV Related Privacy Risks
Ghiglieri, Marco; Volkamer, Melanie; Renaud, Karen
Human Aspects of Information Security, Privacy and Trust / 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vol.10292, p.656-674
[Conference Proceedings]