Publikationen
Publikationen
Trustworthy things
Birkholz, H.; Fossati, T.
Descriptive Approaches to IoT Security, Network, and Application Configuration (DAI-SNAC) 2021
[Conference Paper]
Fragmentation Attacks on DNS over TCP
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
International Conference on Distributed Computing Systems (ICDCS) 2021
[Conference Paper]
An Economic Analysis of Appropriateness under Article 32 GDPR
Selzer, Annika; Woods, Daniel; Böhme, Rainer
[Journal Article]
Extraction of Secrets from Allegedly Secret-free IoT Sensors using Artificial Intelligence
Kiyan, Tuba; Krachenfels, Thilo; Amini, Elham; Shakibaei, Zarin; Boit, Christian; Seifert, Jean-Pierre
International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA) 282021
[Conference Paper]
User-Centered Design of Visualizations for Software Vulnerability Reports
Reynolds, Steven Lamarr; Mertz, Tobias; Arzt, Steven; Kohlhammer, Jörn
Symposium on Visualization for Cyber Security (VizSec) 2021
[Conference Paper]
Conceptual Design and Analysis of a Mobile Digital Identity for eHealth Applications
Spychalski, Dominik; Rode, Olaf; Ritthaler, Markus; Raptis, Georgios
International Conference on Biomedical and Health Informatics (BHI) 2021
[Conference Paper]
PrivInferVis: Towards Enhancing Transparency over Attribute Inference in Online Social Networks
Simo, Hervais; Shulman, Haya; Schufrin, Marija; Reynolds, Steven Lamarr; Kohlhammer, Jörn
Conference on Computer Communications (INFOCOM) 2021
[Conference Paper]
Detecting Deepfakes with Haralicks Texture Properties
Frick, Raphael Antonius; Zmudzinski, Sascha; Steinebach, Martin
International Symposium on Electronic Imaging Science and Technology (IS&T) 2021
[Conference Paper]
Adversarial Examples zum Selbstdatenschutz? Der Fall biometrischer Gesichtserkennung im öffentlichen Raum
Bunzel, Niklas; Zander, Neele; Landwirth, Robert; Riedel, Ann-Katrin
Gesellschaft für Informatik (GI Jahrestagung) 2021
[Conference Paper]
Potenziale anonymer Datenverarbeitungen nutzen. Ein Vorschlag für Smart Cities
Selzer, Annika; Timm, Ingo J.
[Journal Article]
Off-path VoIP Interception Attacks
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
International Conference on Distributed Computing Systems (ICDCS) 2021
[Conference Paper]
Improved scalability of demand-aware datacenter topologies with minimal route lengths and congestion
Pacut, Maciej; Dai, Wenkai; Labbe, Alexandre; Foerster, Klaus-T.; Schmid, Stefan
[Journal Article]
Network Traffic Characteristics of Machine Learning Frameworks Under the Microscope
Zerwas, Johannes; Aykurt, Kaan; Schmid, Stefan; Blenk, Andreas
International Conference on Network and Service Management (CNSM) 2021
[Conference Paper]
Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods
Zelle, Daniel; Lauser, Timm; Kern, Dustin; Krauß, Christoph
International Conference on Availability, Reliability and Security (ARES) 2021
[Conference Paper]
Linking loose ends: An interdisciplinary privacy and communication model
Bräunlich, Katharina; Dienlin, Tobias; Eichenhofer, Johannes; Helm, Paula; Trepte, Sabine; Grimm, Rüdiger; Seubert, Sandra; Gusy, Christoph
[Journal Article]
Einsatz von FIDO2 im PSD II-konformen Zahlungsverkehr
Heider, Jens
[Journal Article]
Cybersicherheitsforschung als Teil der nationalen Sicherheitsarchitektur
Kreutzer, Michael; Schneider, Markus
[Journal Article]
Evaluation of electric mobility authentication approaches
Gadacz, H.
Computer Science in Cars Symposium (CSCS) 2021
[Conference Paper]
Macchiato: Importing Cache Side Channels to SDNs
Sabzi, Amir; Schiff, Liron; Thimmaraju, Kashyap; Blenk, Andreas; Schmid, Stefan
Symposium on Architectures for Networking and Communications Systems (ANCS) 2021
[Conference Paper]
The Master and Parasite Attack
Baumann, Lukas; Heftrig, Elias; Shulman, Haya; Waidner, Michael
International Conference on Dependable Systems and Networks (DSN) 2021
[Conference Paper]
Preacher: Network Policy Checker for Adversarial Environments
Thimmaraju, K.; Schiff, L.; Schmid, S.
[Journal Article]
Das digitale Erbe
Selzer, Annika; Waldmann, Ulrich
[Journal Article]
Phased Deployment of Distributed RPKI
Shrishak, Kris; Shulman, Haya
Kryptotag 2021
[Conference Paper]
A Systematic Hardening of Java's Information Hiding
Holzinger, Philipp; Boden, Eric
International Symposium on Advanced Security on Software and Systems (ASSS) 2021
[Conference Paper]
Wertschöpfung durch Software in Deutschland
Aichroth, Patrick; Bös, Joachim; Sladeczek, Christoph; Bodden, Eric; Liggesmeyer, Peter; Trapp, Mario; Falk Howar; Otto, Boris; Rehof, Jakob; Spiekermann, Markus; Arzt, Steven; Steffen, Barbara; Nouak, Alexander; Köhler, Henning
[Report]
Negotiating PQC for DNSSEC
Shrishak, Kris; Shulman, Haya
International Conference on Dependable Systems and Networks (DSN) 2021
[Conference Paper]
exHide: Hiding Data within the exFAT File System
Heeger, Julian; Yannikos, York; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) 2021
[Conference Paper]
RNNIDS: Enhancing network intrusion detection systems through deep learning
Sohi, Soroush M.; Seifert, Jean-Pierre; Ganji, Fatemeh
[Journal Article]
Datenerfassung und -analyse von radikalen Online-Inhalten
Steinebach, Martin; Yannikos, York; Halvani, Oren; Vogel, Inna
[Book Article]
Remote Attestation Extended to the Analog Domain
Jäger, L.; Lorych, D.
International Conference on Availability, Reliability and Security (ARES) 2021
[Conference Paper]