Publikationen
Publikationen
Secure Logging Schemes and Certificate Transparency
Dowling, Benjamin; Günther, Felix; Herath, Udyani; Stebila, Douglas
21st European Symposium on Research in Computer Security (ESORICS 2016)
[Conference Proceedings]
Efficient Third Party Auditing for a Distributed Storage System
Demirel, Denise; Krenn, Stephan; Loruenser, Thomas; Traverso, Giulia
International Conference on Availability, Reliability and Security - ARES 2016
[Conference Proceedings]
Formal Policy-based Provenance Audit
Butin, Denis; Demirel, Denise; Buchmann, Johannes
The 11th International Workshop on Security - IWSEC 2016
[Conference Proceedings]
Compiling Low Depth Circuits for Practical Secure Computation
Buescher, Niklas; Holzer, Andreas; Weber, Alina; Katzenbeisser, Stefan
21st European Symposium on Research in Computer Security (ESORICS 2016)
[Conference Proceedings]
Towards effective security assurance for incremental software development - the case of zen cart application,
Ali, Azmzt; Othmane, Lotfi Ben
Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES)
[Conference Proceedings]
On Probe-Response Attacks in Collaborative Intrusion Detection Systems
Vasilomanolakis, Emmanouil; Stahn, Michael; Garcia Cordero, Carlos; Mühlhäuser, Max
IEEE Conference on Communications and Network Security, p.279 - 286
[Conference Proceedings]
An Unconditionally Hiding Auditing Procedure for Computations over Distributed Data
Schabhüser, Lucas; Demirel, Denise; Buchmann, Johannes
The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016)
[Conference Proceedings]
SANA: Secure and Scalable Aggregate Network Attestation
Sadeghi, Ahmad-Reza; Schunter, Matthias; Ibrahim, Ahmad; Conti, Mauro; Neven, Gregory
23rd ACM Conference on Computer and Communications Security (CCS) 2016
[Conference Proceedings]
Analyzing TETRA Location Privacy and Network Availability
Pfeiffer, Martin; Kwiotek, Jan-Pascal; Classen, Jiska; Klose, Robin; Hollick, Matthias
6th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, p.117--122
[Conference Proceedings]
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes
Mayer, Peter; Neumann, Stephan; Volkamer, Melanie
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, p.1817-1819
[Conference Proceedings]
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes
Mayer, Peter; Neumann, Stephan; Volkamer, Melanie
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, p.1817--1819
[Conference Proceedings]
Stratum Filtering: Cloud-Based Detection of Attack Sources
Herzberg, Amir; Shulman, Haya; Waidner, Michael
ACM Cloud Computing Security Workshop (CCSW)
[Conference Proceedings]
SecureScala: Scala embedding of secure computations
Hauck, Markus; Savvides, Savvas; Eugster, Patrick; Mezini, Mira; Salvaneschi, Guido
Proceedings of the 2016 7th ACM SIGPLAN Symposium on Scala
[Conference Proceedings]
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles
Deshotels, Luke; Deaconescu, Razvan; Chiroiu, Mihai; Davi, Lucas; Enck, William; Sadeghi, Ahmad-Reza
23rd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]
Disguised Chromium Browser: Robust browser, Flash and Canvas Fingerprinting Protection
Baumann, Peter; Katzenbeisser, Stefan; Stopczynski, Martin; Tews, Erik
WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, p.37-46
[Conference Proceedings]
C-FLAT: Control-Flow Attestation for Embedded Systems Software
Abera, Tigist; Asokan, N.; Davi, Lucas; Ekberg, Jan-Erik; Nyman, Thomas; Paverd, Andrew; Sadeghi, Ahmad-Reza; Tsudik, Gene
23rd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]
WebRanz: web page randomization for better advertisement delivery and web-bot prevention
Wang, Weihang; Zheng, Yunhui; Xing, Xinyu; Kwon, Yonghwi; Zhang, Xiangyu; Eugster, Patrick
FSE 2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, p.205-216
[Conference Proceedings]
Reconciling Task Assignment and Scheduling in Mobile Edge Clouds
Wang, Lin; Jiao, Lei; Kliazovich, Dzmitry; Bouvry, Pascal
2016 IEEE 24th International Conference on Network Protocols (ICNP), p.1-6
[Conference Proceedings]
Towards a Policy-Agnostic Control-Flow Integrity Implementation
Sullivan, Dean; Arias, Orlando; Davi, Lucas; Sadeghi, Ahmad-Reza; Jin, Yier
Black Hat Europe
[Conference Proceedings]
SliM: Enabling Efficient, Seamless NFV State Migration (Poster Paper)
Nobach, Leonhard; Rimac, I.; Hilt, V.; Hausheer, David
2016 IEEE 24th International Conference on Network Protocols (ICNP), p.1-2
[Conference Proceedings]
FIB efficiency in distributed platforms
Kogan, Kirill; Nikolenko, Sergey I.; Eugster, Patrick; Shalimov, Alexander; Rottenstreich, Ori
2016 IEEE 24th International Conference on Network Protocols (ICNP), p.1-10
[Conference Proceedings]
An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins
Bansarkhani, Rachid El; Sturm, Jan
15th International Conference on Cryptology and Network Security - CANS 2016
[Conference Proceedings]
DNSSEC Misconfigurations in Popular Domains
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
Cryptology and Network Security. CANS 2016
[Conference Proceedings]
Scalable Secure Computation from ANSI-C
Buescher, Niklas; Kretzmer, David; Jindal, Arnav; Katzenbeisser, Stefan
WIFS - IEEE International Workshop on Information Forensics and Security
[Conference Proceedings]
AS³: Adaptive Social Secret Sharing for Distributed Storage Systems
Traverso, Giulia; Demirel, Denise; Habib, Sheikh Mahbub; Buchmann, Johannes
2016 Privacy, Security and Trust Conference
[Conference Proceedings]
Programming Scalable Cloud Services with AEON
Sang, Bo; Petri, Gustavo; Ardekani, Masoud Saeida; Ravi, Srivatsan; Eugster, Patrick
Middleware '16 Proceedings of the 17th International Middleware Conference, p.16:1
[Conference Proceedings]
Enabling Automatic Password Change in Password Managers Through Crowdsourcing
Mayer, Peter; Berket, Hermann; Volkamer, Melanie
International Conference on Passwords
[Conference Proceedings]
A security analysis of techniques for long-term integrity protection
Geihs, Matthias; Demirel, Denise; Buchmann, Johannes
2016 Privacy, Security and Trust Conference
[Conference Proceedings]
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks
Garcia Cordero, Carlos; Hauke, Sascha; Mühlhäuser, Max; Fischer, Mathias
Privacy, Security and Trust Conference, p.317 - 324
[Conference Proceedings]
Efficient Proactive Secret Sharing
Brendel, Jacqueline; Demirel, Denise
2016 Privacy, Security and Trust Conference
[Conference Proceedings]