Publikationen

Publikationen

HERA: Hotpatching of Embedded Real-time Applications
Niesler, Christian; Surminski, Sebastian; Davi, Lucas
Proc. of 28th Network and Distributed System Security Symposium (NDSS 2021)
[Conference Proceedings]


The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions
Zimmermann, Verena; Renaud, Karen
ACM Transactions on Computer-Human Interaction, p.7:1-7:45
[Journal Article]


ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation
Patra, Arpita; Schneider, Thomas; Suresh, Ajith; Yalame, Mohammad Hossein
30th USENIX Security Symposium (USENIX Security 21), p.2165-2182
[Conference Proceedings]


All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers
Hagen, Christoph; Weinert, Christian; Sendner, Christoph; Dmitrienko, Alexandra; Schneider, Thomas
28. Annual Network and Distributed System Security Symposium (NDSS'21)
[Conference Proceedings]


Aimes: Advanced computation and I/O methods for earth-system simulations
Kunkel, Julian; Jumah, Nabeeh; Novikova, Anastasiia; Ludwig, Thomas; Yashiro, Hisashi; Maruyama, Naoya; Wahib, Mohamed; Thuburn, John
[Book Article]


A Characterization of Data Exchange between Visual Analytics Tools
Nonnemann, Lars; Schumann, Heidrun; Urban, Bodo; Aehnelt, Mario; Schulz, Hans-Jörg
International Conference Information Visualisation (IV) 2020
[Conference Paper]


Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK
Oesch, Sean; Abu-Salma, Ruba; Krämer, Juliane; Wu, Justin; Diallo, Oumar; Ruoti, Scott
Annual Computer Security Applications Conference (ACSAC 2020)
[Conference Proceedings]


RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation
Mantel, Heiko; Scheidel, Lukas; Schneider, Thomas; Weber, Alexandra; Weinert, Christian; Weißmantel, Tim
19. International Conference on Cryptology And Network Security (CANS'20)
[Conference Proceedings]


CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs
Krüger, Stefan; Ali, Karim; Bodden, Eric
International Symposium on Code Generation and Optimization
[Conference Proceedings]


V0LTpwn: Attacking x86 Processor Integrity from Software
Kenjar, Zijo; Frassetto, Tommaso; Gens, David; Franz, Michael; Sadeghi, Ahmad-Reza
arXiv
[Conference Proceedings]


Fuzzy Asymmetric Password-Authenticated Key Exchange
Erwig, Andreas; Hesse, Julia; Orlt, Maximilian; Riahi, Siavash
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020)
[Conference Proceedings]


CryptoSPN: Privacy-preserving Sum-Product Network Inference
Treiber, Amos; Molina, Alejandro; Weinert, Christian; Schneider, Thomas; Kersting, Kristian
24th European Conference on Artificial Intelligence (ECAI'20)
[Conference Proceedings]


Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications
Javadi, Mohammad; Yalame, Mohammad Hossein; Mahdiani, Hamid Reza
Transactions on Computers
[Journal Article]


Enclave Computing on RISC-V: A Brighter Future for Security?
Dessouky, Ghada; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020
[Conference Proceedings]


Efficient and Scalable Universal Circuits
Alhassan, Masaud Y.; Günther, Daniel; Kiss, Ágnes; Schneider, Thomas
Journal of Cryptology (JoC)
[Journal Article]


Secure Two-Party Computation in a Quantum world
Büscher, Niklas; Demmler, Daniel; Karvelas, Nikolaos; Katzenbeisser, Stefan; Krämer, Juliane; Rathee, Deevashwer; Schneider, Thomas; Struck, Patrick
18th International Conference on Applied Cryptography and Network Security (ACNS'20)
[Conference Proceedings]


MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference
Boemer, Fabian; Cammarota, Rosario; Demmler, Daniel; Schneider, Thomas; Yalame, Hossein
PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, p.43-45
[Conference Proceedings]


Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming
Alber, Gernot; Sauer, Alexander
Cryptography
[Journal Article]


Mobile Resilience: Designing Mobile Interactive Systems for Societal and Technical Resilience
Reuter, Christian; Kaufhold, Marc-André; Comes, Tina; Knodt, Michèle; Mühlhäuser, Max
Mobile HCI 2020: Expanding the Horizon of Mobile Interaction
[Conference Proceedings]


Towards Secure Urban Infrastructures: Cyber Security Challenges to Information and Communication Technology in Smart Cities
Reuter, Christian; Haunschild, Jasmin; Hollick, Matthias; Mühlhäuser, Max; Vogt, Joachim; Kreutzer, Michael
Mensch und Computer 2020 - Workshopband
[Conference Proceedings]


Demographic Bias in Presentation Attack Detection of Iris Recognition Systems
Fang, Meiling; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
European Signal Processing Conference (EUSIPCO) 2020
[Conference Paper]


GCH 2020, Eurographics Workshop on Graphics and Cultural Heritage
Workshop on Graphics and Cultural Heritage (GCH) 2020
[Conference Proceeding]


Wrist-worn Accelerometer based Fall Detection for Embedded Systems and IoT devices using Deep Learning Algorithms
Kraft, Dimitri; Srinivasan, Karthik; Bieber, Gerald
International Conference on PErvasive Technologies Related to Assistive Environments (PETRA) 2020
[Conference Paper]


Sensing Technology for Human Activity Recognition: A Comprehensive Survey
Fu, Biying; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
[Journal Article]


Privacy Evaluation Protocols for the Evaluation of Soft-Biometric Privacy-Enhancing Technologies
Terhörst, Philipp; Huber, Marco; Damer, Naser; Rot, Peter; Kirchbuchner, Florian; Struc, Vitomir; Kuijper, Arjan
Gesellschaft für Informatik, Special Interest Group on Biometrics and Electronic Signatures (BIOSIG International Conference) 2020
[Conference Paper]


Privacy by Design. Analysis of Capacitive Proximity Sensing as System of Choice for Driver Vehicle Interfaces
Frank, Sebastian; Kuijper, Arjan
International Conference on Human-Computer Interaction (HCI International) 2020
[Conference Paper]


Demonstration and analysis of an extended adaptive general four-component decomposition
Wang, Yu; Yu, Weidong; Liu, Xiuqing; Wang, Chunle; Kuijper, Arjan; Guthe, Stefan
[Journal Article]


Preoperative Surgical Planning
Fauser, Johannes
[Thesis]


Deep Learning Multi-layer Fusion for an Accurate Iris Presentation Attack Detection
Fang, Meiling; Damer, Naser; Boutros, Fadi; Kirchbuchner, Florian; Kuijper, Arjan
International Conference on Information Fusion (FUSION) 2020
[Conference Paper]


SSBC 2020: Sclera Segmentation Benchmarking Competition in the Mobile Environment
Vitek, M.; Das, A.; Pourcenoux, Yann; Missler, Alexandre; Paumier, C.; Das, S.; Ghosh, Ishita de; Lucio, Diego Rafael; Zanlorensi, Luiz Antonio; Boutros, Fadi; Damer, Naser; Grebe, Jonas Henry; Kuijper, Arjan; Hu, J.; He, Y.; Wang, C.; Liu, H.; Wang, Y.; Sun, Z.; Osorio-Roig, D.; Rathgeb, Christian; Busch, Christoph; Tapia, Juan; Valenzuela, Andrés; Zampoukis, Georgios; Tsochatzidis, Lazaros; Pratikakis, Ioannis; Nathan, Sabari; Suganya, Ramamoorthy; Mehta, V.; Dhall, Abhinav; Raja, Kiran; Gupta, G.; Khiarak, Jalil Nourmohammadi; Akbari-Shahper, Mohsen; Jaryani, Farhang; Asgari-Chenaghl, Meysam; Vyas, Ritesh; Dakshit, Sagnik; Peer, Peter; Pal, Umapada; Struc, Vitomir; Menotti, David
International Joint Conference on Biometrics (IJCB) 2020
[Conference Paper]