Publikationen
Publikationen
Begriffsverwirrung verhindern: Was Maßnahmen Aktiver Cyberabwehr sind - und was nicht
Gärtner, Tanya; Selzer, Annika
A Generic IoT Quantum-Safe Watchdog Timer Protocol
Eckel, Michael; Gutsche, Tanja; Lauer, Hagen; Rein, André
International Conference on Availability, Reliability and Security 2023
[Conference Paper]
Exploring the Design of Visualizations of Personal Online Data Based on Users’ Mental Models
Dutz, Marija; Starčević, Nataša; Reynolds, Steven Lamarr; Kohlhammer, Jörn
International Conference Information Visualisation 2023
[Paper]
Dual-Energy CT-based Opportunistic Volumetric Bone Mineral Density Assessment of the Distal Radius
Gruenewald, Leon D.; Koch, Vitali; Simon, Martin S.; Yel, İbrahim; Mahmoudi, Scherwin; Bernatz, Simon; Eichler, Katrin; Gruber-Rouh, Tatjana; Pinto Dos Santos, Daniel; D’Angelo, Tommaso; Wesarg, Stefan; Herrmann, Eva; Golbach, Rejane; Handon, Marlin; Vogl, Thomas J.; Booz, Christian
[Journal Article]
Lifelong Learning in the Clinical Open World
González, Camila
[Thesis]
LFPeers: Temporal Similarity Search and Result Exploration
Sachdeva, Madhav; Burmeister, Jan; Kohlhammer, Jörn; Bernard, Jürgen
[Journal Article]
Context Correlation for Automated Dynamic Android App Analysis to Improve Impact Rating of Privacy and Security Flaws
Heid, Kris; Heider, Jens
International Conference on Risks and Security of Internet and Systems 2022
[Conference Paper]
Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods. An Application to the Android Framework for Data Leak Detection
Samhi, Jordan; Kober, Maria; Kabore, Abdoul Kader; Arzt, Steven; Bissyande, Tegawende F.; Klein, Jacques
International Conference on Software Analysis, Evolution and Reengineering 2023
[Paper]
Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones
Heftrig, Elias; Shulman, Haya; Waidner, Michael
USENIX Security Symposium 2023
[Conference Paper]
Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods
Samhi, Jordan; Kober, Maria; Kaboré, Abdoul Kader; Arzt, Steven; Bissyandé, Tégawendé François; Klein, Jacques
International Conference on Software Analysis, Evolution and Reengineering 2023
[Conference Paper]
Benchmarking the Benchmarks
Miltenberger, Marc; Arzt, Steven; Holzinger, Philipp; Näumann, Julius
Asia Conference on Computer and Communications Security 2023
[Conference Paper]
An Analysis of PhotoDNA
Steinebach, Martin
International Conference on Availability, Reliability and Security 2023
[Conference Paper]
Tracing Cryptographic Agility in Android and iOS Apps
Heid, Kris; Heider, Jens; Ritscher, Matthias; Stotz, Jan-Peter
International Conference on Information Systems Security and Privacy 2023
[Conference Paper]
Users' Privacy Literacy, Motivation to use Tor and Further Privacy Protecting Behavior
Platzer, Florian; Lux, Alexandra
International Symposium on Technikpsychologie 2023
[Conference Paper]
Collaborative Security Patterns for Automotive Electrical/Electronic Architectures
Fenzl, Florian; Plappert, Christian; Rieke, Roland; Zelle, Daniel; Costantino, Gianpiero; Vincenzi, Marco De; Matteucci, Ilaria
[Book Article]
Meso-Facets for Goniochromatic 3D Printing
Abu Rmaileh, Lubna; Brunton, Alan
[Journal Article]
Asymptotically Tight Bounds on the Time Complexity of Broadcast and its Variants in Dynamic Networks
El-Hayek, Antoine; Henzinger, Monika; Schmid, Stefan
Innovations in Theoretical Computer Science Conference 2023
[Conference Paper]
The Time Complexity of Consensus Under Oblivious Message Adversaries
Winkler, Kyrill; Paz, Ami; Galeana, Hugo Rincon; Schmid, Stefan; Schmid, Ulrich
Innovations in Theoretical Computer Science Conference 2023
[Conference Paper]
On the Feasibility of Single-Trace Attacks on the Gaussian Sampler Using a CDT
Marzougui, Soundes; Kabin, Ievgen; Krämer, Juliane; Aulbach, Thomas; Seifert, Jean-Pierre
International Workshop on Constructive Side-Channel Analysis and Secure Design 2023
[Conference Paper]
Post-quantum Security for the Extended Access Control Protocol
Fischlin, Marc; Heyden, Jonas von der; Margraf, Marian; Morgner, Frank; Wallner, Andreas; Bock, Holger
Security Standardisation Research, p.22-52
[Conference Proceedings]
Towards detecting device fingerprinting on iOS with API function hooking
Heid, Kris; Andrae, Vincent; Heider, Jens
European Interdisciplinary Cybersecurity Conference 2023
[Conference Paper]
Massively Parallel Adaptive Collapsing of Edges for Unstructured Tetrahedral Meshes
Ströter, Daniel; Stork, Andre; Fellner, Dieter
Symposium "High-Performance Graphics" 2023
[Conference Paper]
Dynamic Maintenance of Monotone Dynamic Programs and Applications
Henzinger Rauch, Monika; Neumann, Stefan; Räcke, Harald; Schmid, Stefan
International Symposium on Theoretical Aspects of Computer Science 2023
[Conference Paper]
Duo: A High-Throughput Reconfigurable Datacenter Network Using Local Routing and Control
Zerwas, Johannes; Györgyi, Csaba; Blenk, Andreas; Schmid, Stefan; Avin, Chen
International Conference on Measurement and Modeling of Computer Systems 2023
[Conference Paper]
Disorientation Faults in CSIDH
Banegas, Gustavo; Krämer, Juliane; Lange, Tanja; Meyer, Michael; Panny, Lorenz; Reijnders, Krijn; Sotáková, Jana; Trimoska, Monika
Advances in Cryptology - EUROCRYPT 2023, p.310-342
[Conference Proceedings]
A Lightweight Identification Protocol Based on Lattices
Düzlü, Samed; Krämer, Juliane; Pöppelmann, Thomas; Struck, Patrick
Public-Key Cryptography - PKC 2023, p.95-113
[Conference Proceedings]
Visual Computing Report
[Report]
Combining seeded region growing and k-nearest neighbours for the segmentation of routinely acquired spatio-temporal image data
Zerweck, Lukas; Wesarg, Stefan; Kohlhammer, Jörn; Köhm, Michaela
International Congress and Exhibition on Computer Assisted Radiology and Surgery 2024
[Journal Article]
SAFEFL: MPC-friendly Framework for Private and Robust Federated Learning
Gehlhar, Till; Marx, Felix; Schneider, Thomas; Suresh, Ajith; Wehrle, Tobias; Yalame, Hossein
6th Deep Learning Security and Privacy Workshop (DLSP 2023)
[Conference Proceedings]
FLUTE: Fast and Secure Lookup Table Evaluations
Brüggemann, Andreas; Hundt, Robin; Schneider, Thomas; Suresh, Ajith; Yalame, Hossein
Proceedings: 44th IEEE Symposium on Security and Privacy: SP 2023, p.515-533
[Conference Proceedings]