Publikationen

Publikationen

The hijackers guide to the galaxy: Off-path taking over internet resources
Dai, Tianxiang; Jeitner, Philipp; Shulman, Haya; Waidner, Michael
USENIX Security Symposium 2021
[Conference Paper]


Automated, Dynamic Android App Vulnerability and Privacy Leak Analysis: Design Considerations, Required Components and Available Tools
Heid, Kris; Heider, Jens
European Interdisciplinary Cybersecurity Conference (EICC) 2021
[Conference Paper]


Chances and Limitations of Personal and Anonymized Data Processing
Selzer, Annika; Timm, Ingo J.
Gesellschaft für Informatik (GI Jahrestagung) 2021
[Conference Paper]


From IP to transport and beyond: Cross-layer attacks against applications
Dai, Tianxiang; Jeitner, Philipp; Shulman. Haya; Waidner, Michael
Association for Computing Machinery, Special Interest Group on Data Communication (ACM SIGCOMM Conference) 2021
[Conference Paper]


Automatic extraction of secrets from the transistor jungle using laser-assisted side-channel attacks
Krachenfels, T.; Kiyan, T.; Tajik, S.; Seifert, J.-P.
USENIX Security Symposium 2021
[Conference Paper]


Discovery of Single-Vendor Marketplace Operators in the Tor-Network
Brenner, Fabian; Platzer, Florian; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) 2021
[Conference Paper]


POSNoise: An Effective Countermeasure Against Topic Biases in Authorship Analysis
Halvani, Oren; Graner, Lukas
International Conference on Availability, Reliability and Security (ARES) 2021
[Conference Paper]


Risiken für die Privatheit aufgrund von Maschinellem Lernen
Battis, Anna-Verena; Graner, Lukas
Gesellschaft für Informatik (GI Jahrestagung) 2020
[Conference Paper]


Datenschutzkonformes Löschen bei Datenschutz- und Informationssicherheitsvorfällen
Rudolph, Louisa; Selzer, Annika; Pordesch, Ulrich
[Journal Article]


"I Never Thought about Securing my Machine Learning Systems": A Study of Security and Privacy Awareness of Machine Learning Practitioners
Boenisch, Franziska; Battis, Verena; Buchmann, Nicolas; Poikela, Maija
Konferenz "Mensch und Computer" (MuC) 2021
[Conference Paper]


Remote WebAuthn: FIDO2 Authentication for Less Accessible Devices
Wagner, Paul; Heid, Kris; Heider, Jens
International Conference on Information Systems Security and Privacy (ICISSP) 2021
[Conference Paper]


One Glitch to Rule Them All: Fault Injection Attacks Against AMD's, Secure Encrypted Virtualization
Buhren, Robert; Jacob, Hans Niklas; Krachenfels, Thilo; Seifert, Jean-Pierre
Conference on Computer and Communications Security (CCS) 2021
[Conference Paper]


Smart Governance for Cybersecurity
Scheel, Kristin; Kreutzer, Michael
[Journal Article]


Automated Image Metadata Verification
Wittorf, Kyra; Steinebach, Martin; Liu, Huajian
International Symposium on Electronic Imaging Science and Technology (IS&T) 2021
[Conference Paper]


Fingerprinting Blank Paper and Printed Material by Smartphones
Berchtold, Waldemar; Sütter, Markus; Steinebach, Martin
International Symposium on Electronic Imaging Science and Technology (IS&T) 2021
[Conference Paper]


WallGuard - A Deep Learning Approach for Avoiding Regrettable Posts in Social Media
Shulman, Haya; Simo, Hervais
International Conference on Distributed Computing Systems (ICDCS) 2021
[Conference Paper]


Einschätzen von Kulturgütern per App
Steinebach, Martin
[Journal Article]


Recht und Technik - Datenschutz im Diskurs
Grimm, Rüdiger; Hornung, Gerrit; Sorge, Christoph; Spiecker genannt Döhmann, Indra
Gesellschaft für Informatik (GI Jahrestagung) 2021
[Conference Paper]


Evaluating Resilience of Domains in PKI
Brandt, Markus; Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security (CCS) 2021
[Conference Paper]


Traffic Engineering with Joint Link Weight and Segment Optimization
Parham, Mahmoud; Fenz, Thomas; Süss, Nikolaus; Foerster, Klaus-Tycho; Schmid, Stefan
International Conference on Emerging Networking EXperiments and Technologies (CoNEXT) 2021
[Conference Paper]


Optimized BGP Simulator for Evaluation of Internet Hijacks
Brandt, Markus; Shulman, Haya
Conference on Computer Communications (INFOCOM) 2021
[Conference Paper]


The Elephant in the Background: A Quantitative Approach to Empower Users Against Web Browser Fingerprinting
Fietkau, Julian; Thimmaraju, Kashyap; Kybranz, Felix; Neef, Sebastian; Seifert, Jean-Pierre
Workshop on Privacy in the Electronic Society (WPES) 2021
[Conference Paper]


Privacy preserving and resilient RPKI
Shrishak, K.; Shulman, H.
Conference on Computer Communications (INFOCOM) 2021
[Conference Paper]


Cover-aware Steganalysis
Bunzel, Niklas; Steinebach, Martin; Liu, Huajian
[Journal Article]


Privacy Preserving and Resilient RPKI
Shriskak, Kris; Shulman, Haya
[Paper]


Video Source Identification from MP4 Data Based on Field Values in Atom/Box Attributes
Gelbing, Erik; Würsching, Leon; Zmudzinski, Sascha; Steinebach, Martin
International Symposium on Electronic Imaging Science and Technology (IS&T) 2021
[Conference Paper]


The appropriateness of technical and organisational measures under article 32 GDPR
Selzer, Annika
[Journal Article]


Computer Security - ESORICS 2021. 26th European Symposium on Research in Computer Security. Proceedings. Pt.II
European Symposium on Research in Computer Security (ESORICS) 2021
[Conference Proceeding]


Profiling Hate Speech Spreaders on Twitter: SVM vs. Bi-LSTM
Vogel, Inna; Meghana, Meghana
Conference and Labs of the Evaluation Forum (CLEF) 2021
[Conference Paper]


Preventing time synchronization in NTP broadcast mode
Tripathi, N.; Hubballi, N.
[Journal Article]