Publikationen

Publikationen

Detection and Mitigation of Bias in Under Exposure Estimation for Face Image Quality Assessment
A. Dörsch and C. Rathgeb and M. Grimmer and C. Busch
Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–5
[Conference Proceedings]


Analysis of behavioural curves to classify iris images under the influence of alcohol, drugs, and sleepiness conditions
L. Causa and J. Tapia and C. Perez and C. Busch
Expert Systems With Applications
[Journal Article]


Challenges for automated face recognition systems
C. Busch
Nature Reviews Electrical Engineering
[Journal Article]


BRAKE: Biometric Resilient Authenticated Key Exchange
P. Bauspieß and T. Silde and M. Poljuha and A. Tullot and A. Costache and C. Rathgeb and J. Kolberg and C Busch
IEEE Access, Vol.12, p.46596–46615
[Journal Article]


Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4
Beullens, Ward and Campos, Fabio and Celi, Sofía and Hess, Basil and Kannwischer, Matthias J
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol.2024, p.252–275
[Journal Article]


Optimizations and Practicality of High-Security CSIDH
Campos, Fabio and Chávez-Saab, Jorge and Chi-Domínguez, Jesús-Javier and Meyer, Michael and Reijnders, Krijn and Rodríguez-Henríquez, Francisco and Schwabe, Peter and Wiggers, Thom
IACR Communications in Cryptology, Vol.1, p.5
[Journal Article]


Analyzing the Effectiveness of Image Preprocessing Defenses Under Runtime Constraints
Bunzel, Niklas; Klause, Gerrit
International Conference on Trust, Security and Privacy in Computing and Communications 2024
[Conference Paper]


The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Heftrig, Elias; Shulman, Haya; Vogel, Niklas; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]


Decision-based Data Distribution (D3): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios
Linsner, Sebastian; Demuth, Kilian; Fischlin, Marc; Reuter, Christian
Proceedings on Privacy Enhancing Technologies (PoPETs), p.185-208
[Journal Article]


Integrating Causality in Messaging Channels
Chen, Shan; Fischlin, Marc
Advances in Cryptology - EUROCRYPT 2024, p.251-282
[Conference Proceedings]


BUFFing FALCON Without Increasing the Signature Size
Düzlü, Samed; Fiedler, Rune; Fischlin, Marc
Selected Areas in Cryptography - SAC 2024, p.131-150
[Conference Proceedings]


Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication
Fischlin, Marc; Sanina, Olga
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4762-4776
[Conference Proceedings]


Post-Quantum Asynchronous Remote Key Generation for FIDO2
Brendel, Jacqueline; Clermont, Sebastian; Fischlin, Marc
Advances in Cryptology - ASIACRYPT 2024, p.465-493
[Conference Proceedings]


WAPITI - A Weighted Bayesian Method for Private Information Inference on Social Ego Networks
Simo Fhom, Hervais-Clemence; Kreutzer, Michael
International Conference on Trust, Security and Privacy in Computing and Communications 2024
[Conference Paper]


Wie stellen sich Nutzende ihren Privatsphäre-Assistenten vor?
Stöver, Alina; Hahn, Sara; Althaus, Simon; Zimmer, Ephraim; Gerber, Nina
Datenschutz und Datensicherheit - DuD, p.633-636
[Journal Article]


Multi-Party Computation als Instrument zur Umsetzung datenschutzkonformer behördlicher Datenabgleiche: Eine inter­dis­zi­pli­näre Analyse am Beispiel der Diskussionen um das Gesetz zur Selbstbestimmung über den Geschlechtseintrag
Seyda, Linda; Brüggemann, Andreas; Hornung, Gerrit; Schneider, Thomas
INFORMATIK 2024, Workshop Recht und Technik: Datenschutz im Diskurs (RuT'24), p.153-167
[Journal Article, Conference Proceedings]


Fuzzerfly Effect: Hardware Fuzzing for Memory Safety
Rostami, Mohamadreza; Chen, Chen; Kande, Rahul; Li, Huimin; Rajendran, Jeyavijayan; Sadeghi, Ahmad-Reza
IEEE Security & Privacy, p.76-86
[Journal Article]


Defying the Odds: Solana’s Unexpected Resilience in Spite of the Security Challenges Faced by Developers
Andreina, Sebastien; Cloosters, Tobias; Davi, Lucas; Giesen, Jens-Rene; Gutfleisch, Marco; Karame, Ghassan; Naiakshina, Alena; Naji, Houda
Proc. of the 31th ACM SIGSAC Conference on Computer & Communications Security (CCS)
[Conference Proceedings]


Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing
Rostami, Mohamadreza; Chilese, Marco; Zeitouni, Shaza; Kande, Rahul; Rajendran, Jeyavijayan; Sadeghi, Ahmad-Reza
2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), p.1-6
[Conference Proceedings]


WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors
Borkar, Pallavi; Chen, Chen; Rostami, Mohamadreza; Singh, Nikhilesh; Kande, Rahul; Sadeghi, Ahmad-Reza; Rebeiro, Chester; Rajendran, Jeyavijayan
33rd USENIX Security Symposium (USENIX Security 24), p.5377-5394
[Conference Proceedings]


Broadcast and Consensus in Stochastic Dynamic Networks with Byzantine Nodes and Adversarial Edges
El-Hayek, Antoine; Henzinger, Monika; Schmid, Stefan
International Symposium on Distributed Computing 2024
[Conference Paper]


Lost and Found in Speculation: Hybrid Speculative Vulnerability Detection
Rostami, Mohamadreza; Zeitouni, Shaza; Kande, Rahul; Chen, Chen; Mahmoody, Pouya; Rajendran, Jeyavijayan; Sadeghi, Ahmad-Reza
Proceedings of the 61st ACM/IEEE Design Automation Conference
[Conference Proceedings]


Poster: From Fort to Foe: The Threat of RCE in RPKI
Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]


Reliability Assurance in RIS-Assisted 6G Campus Networks
Tohidi, Ehsan; Franke, Max; Phung, Cao Vien; Khan, Naveed; Drummond, André; Schmid, Stefan; Jukan, Admela; Stanczak, Slawomir
International Conference on the Design of Reliable Communication Networks 2024
[Conference Paper]


RIS as a Network Resource: User Multiplexing and Pricing Algorithms
Papadopoulos, Alexandros; Lalas, Antonios; Votis, Konstantinos; Schmid, Stefan; Katsalis, Kostas; Liaskos, Christos
International Conference on 6G Networking 2024
[Conference Paper]


Baiji: Domain Planning for CDNs under the 95th Percentile Billing Model
Vanerio, Juan; Liu, Huiran; Zhang, Qi; Schmid, Stefan
Networking Conference 2024
[Conference Paper]


L3: Latency-aware Load Balancing in Multi-Cluster Service Mesh
Michaelis, Olivier; Schmid, Stefan; Mostafaei, Habib
International Middleware Conference 2024
[Conference Paper]


HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme
Sayari, Oussama; Marzougui, Soundes; Aulbach, Thomas; Krämer, Juliane; Seifert, Jean-Pierre
International Workshop on Constructive Side-Channel Analysis and Secure Design 2024
[Conference Paper]


MAYo or MAY-not: Exploring Implementation Security of the Post-Quantum Signature Scheme MAYO Against Physical Attacks
Aulbach, Thomas; Marzougui, Soundes; Seifert, Jean-Pierre; Ulitzsch, Vincent Quentin
Workshop on Fault Detection and Tolerance in Cryptography 2024
[Conference Paper]


Poster: Kill Krill or Proxy RPKI
Cattepoel, Luis; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]