Publikationen

Publikationen

Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi
Stute, Milan; Heinrich, Alexander; Lorenz, Jannik; Hollick, Matthias
30th USENIX Security Symposium
[Conference Proceedings]


DEMO: BTLEmap: Nmap for Bluetooth Low Energy
Heinrich, Alexander; Stute, Milan; Hollick, Matthias
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20)
[Conference Proceedings]


BUFFing signature schemes beyond unforgeability and the case of post-quantum signature
Cremers, Cas; Düzlü, Samed; Fiedler, Rune; Fischlin, Marc; Janson, Christian
42nd IEEE Symposium on Security and Privacy
[Conference Proceedings]


Conversion from W to Greenberger-Horne-Zeilinger states in the Rydberg-blockade regime of neutral-atom systems
Haase, Thorsten; Alber, Gernot; Stojanovic, Vladimir M.
Physical Review A
[Journal Article]


Generic Compiler for Publicly Verifiable Covert Multi-Party Computation
Faust, Sebastian; Hazay, Carmit; Kretzler, David; Schlosser, Benjamin
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2021)
[Conference Proceedings]


Trusted Configuration in Cloud FPGAs
Zeitouni, Shaza; Vliegen, Jo; Frassetto, Tommaso; Koch, Dirk; Sadeghi, Ahmad-Reza; Mentens, Nele
29th IEEE International Symposium on Field-Programmable Custom Computing Machines
[Conference Proceedings]


FLGUARD: Secure and Private Federated Learning
Nguyen, Thien Duc; Rieger, Phillip; Yalame, Mohammad Hossein; Möllering, Helen; Fereidooni, Hossein; Marchal, Samuel; Miettinen, Markus; Mirhoseini, Azalia; Sadeghi, Ahmad-Reza; Schneider, Thomas; Zeitouni, Shaza
[Journal Article, Report]


Data Protection in AI Services: A Survey
Meurisch, Christian; Mühlhäuser, Max
ACM Computing Surveys
[Journal Article]


Two-Party Adaptor Signatures From Identification Schemes
Erwig, Andreas; Faust, Sebastian; Hostáková, Kristina; Maitra, Monosij; Riahi, Siavash
24th International Conference on Practice and Theory of Public-Key Cryptography
[Conference Proceedings]


Bitcoin-Compatible Virtual Channels
Aumayr, Lukas; Ersoy, Oguzhan; Erwig, Andreas; Faust, Sebastian; Hostáková, Kristina; Maffei, Matteo; Moreno-Sanchez, Pedro; Riahi, Siavash
42nd IEEE Symposium on Security and Privacy
[Conference Proceedings]


Scalable W-type entanglement resource in neutral-atom arrays with Rydberg-dressed resonant dipole-dipole interaction
Stojanovic, Vladimir M.
Physical Review A
[Journal Article]


Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge
Fischlin, Marc; Rohrbach, Felix
Public-Key Cryptography - PKC 2021, p.205-234
[Conference Proceedings]


HERA: Hotpatching of Embedded Real-time Applications
Niesler, Christian; Surminski, Sebastian; Davi, Lucas
Proc. of 28th Network and Distributed System Security Symposium (NDSS 2021)
[Conference Proceedings]


The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions
Zimmermann, Verena; Renaud, Karen
ACM Transactions on Computer-Human Interaction, p.7:1-7:45
[Journal Article]


ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation
Patra, Arpita; Schneider, Thomas; Suresh, Ajith; Yalame, Mohammad Hossein
30th USENIX Security Symposium (USENIX Security 21), p.2165-2182
[Conference Proceedings]


All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers
Hagen, Christoph; Weinert, Christian; Sendner, Christoph; Dmitrienko, Alexandra; Schneider, Thomas
28. Annual Network and Distributed System Security Symposium (NDSS'21)
[Conference Proceedings]


Aimes: Advanced computation and I/O methods for earth-system simulations
Kunkel, Julian; Jumah, Nabeeh; Novikova, Anastasiia; Ludwig, Thomas; Yashiro, Hisashi; Maruyama, Naoya; Wahib, Mohamed; Thuburn, John
[Book Article]


A Characterization of Data Exchange between Visual Analytics Tools
Nonnemann, Lars; Schumann, Heidrun; Urban, Bodo; Aehnelt, Mario; Schulz, Hans-Jörg
International Conference Information Visualisation (IV) 2020
[Conference Paper]


Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK
Oesch, Sean; Abu-Salma, Ruba; Krämer, Juliane; Wu, Justin; Diallo, Oumar; Ruoti, Scott
Annual Computer Security Applications Conference (ACSAC 2020)
[Conference Proceedings]


RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation
Mantel, Heiko; Scheidel, Lukas; Schneider, Thomas; Weber, Alexandra; Weinert, Christian; Weißmantel, Tim
19. International Conference on Cryptology And Network Security (CANS'20)
[Conference Proceedings]


CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs
Krüger, Stefan; Ali, Karim; Bodden, Eric
International Symposium on Code Generation and Optimization
[Conference Proceedings]


V0LTpwn: Attacking x86 Processor Integrity from Software
Kenjar, Zijo; Frassetto, Tommaso; Gens, David; Franz, Michael; Sadeghi, Ahmad-Reza
arXiv
[Conference Proceedings]


Fuzzy Asymmetric Password-Authenticated Key Exchange
Erwig, Andreas; Hesse, Julia; Orlt, Maximilian; Riahi, Siavash
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020)
[Conference Proceedings]


CryptoSPN: Privacy-preserving Sum-Product Network Inference
Treiber, Amos; Molina, Alejandro; Weinert, Christian; Schneider, Thomas; Kersting, Kristian
24th European Conference on Artificial Intelligence (ECAI'20)
[Conference Proceedings]


Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications
Javadi, Mohammad; Yalame, Mohammad Hossein; Mahdiani, Hamid Reza
Transactions on Computers
[Journal Article]


Enclave Computing on RISC-V: A Brighter Future for Security?
Dessouky, Ghada; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020
[Conference Proceedings]


Efficient and Scalable Universal Circuits
Alhassan, Masaud Y.; Günther, Daniel; Kiss, Ágnes; Schneider, Thomas
Journal of Cryptology (JoC)
[Journal Article]


Secure Two-Party Computation in a Quantum world
Büscher, Niklas; Demmler, Daniel; Karvelas, Nikolaos; Katzenbeisser, Stefan; Krämer, Juliane; Rathee, Deevashwer; Schneider, Thomas; Struck, Patrick
18th International Conference on Applied Cryptography and Network Security (ACNS'20)
[Conference Proceedings]


MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference
Boemer, Fabian; Cammarota, Rosario; Demmler, Daniel; Schneider, Thomas; Yalame, Hossein
PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, p.43-45
[Conference Proceedings]


Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming
Alber, Gernot; Sauer, Alexander
Cryptography
[Journal Article]