Publikationen

Publikationen

Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
Günther, Felix; Poettering, Bertram
20th Australasian Conference on Information Security and Privacy (ACISP 2015), p.195-212
[Conference Proceedings]


Nudging Bank Account Holders Towards More Secure PIN Management
Gutmann, Andreas; Renaud, Karen; Volkamer, Melanie
Journal of Internet Technology and Secured Transaction (JITST), p.380 - 386
[Conference Proceedings]


How to Securely Prolong the Computational Bindingness of Pedersen Commitments
Demirel, Denise; Lancrenon, Jean
[Report]


An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme
Cabarcas, Daniel; Demirel, Denise; Göpfert, Florian; Lancrenon, Jean; Wunderer, Thomas
[Report]


TyTAN: Tiny Trust Anchor for Tiny Devices
Brasser, Ferdinand; Koeberl, Patrick; Mahjoub, Brahim El; Sadeghi, Ahmad-Reza; Wachsmann, Christian
52nd Design Automation Conference (DAC) 2015
[Conference Proceedings]


HAFIX: Hardware-Assisted Flow Integrity Extension
Arias, Orlando; Davi, Lucas; Hanreich, Matthias; Jin, Yier; Koeberl, Patrick; Paul, Debayan; Sadeghi, Ahmad-Reza; Sullivan, Dean
52nd Design Automation Conference (DAC)
[Conference Proceedings]


Comparing Lightweight Hash Functions – PHOTON & Quark
Meuser, Tobias; Schmidt, Larissa; Wiesmaier, Alexander
[Report]


The Love/Hate Relationship with the C Preprocessor: An Interview Study
Medeiros, Flávio; Kästner, Christian; Ribeiro, Márcio; Nadi, Sarah; Gheyi, Rohit
European Conference on Object-Oriented Programming, p.999-1022
[Conference Proceedings]


Leveraging the Potential of Cloud Security Service Level Agreements through Standards
Luna, Jesus; Suri, Neeraj; Iorga, Michaela; Karmel, Anil
Proceedings of IEEE Cloud Computing, 27.06.- 02.07. 2015, New York
[Conference Proceedings]


Towards a New Paradigm for Privacy and Security in Cloud Services
Loruenser, Thomas; Rodriguez, Charles Bastos; Demirel, Denise; Fischer-Hübner, Simone; Gross, Thomas R.; Langer, Thomas; des Noes, Mathieu; Poehls, Henrich; Rozenberg, Boris; Slamanig, Daniel
CoRR abs/1506.05980 (2015)
[Journal Article]


Block ciphers PRESENT and SEA in comparison
Kußmaul, Tobias; Löffler, Johannes; Wiesmaier, Alexander
[Report]


DLint: Dynamically Checking Bad Coding Practices in JavaScript
Gong, Liang; Pradel, Michael; Sridharan, Manu; Sen, Koushik
Proceedings of the 2015 International Symposium on Software Testing and Analysis, p.94-105
[Conference Proceedings]


Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze
Ghiglieri, Marco; Lange, Benjamin; Simo, Hervais; Waidner, Michael
Digitale Schwellen - Freiheit und Privatheit in der digi­tali­sierten Welt, p.67-84
[Conference Proceedings]


Toward a Just-in-Time Static Analysis
Nguyen Quang Do, Lisa; Ali, Karim; Bodden, Eric; Livshits, Benjamin
[Journal Article]


Stream ciphers in the IoT: Grain and Trivium
Diedrich, Lennart; Murati, Lulzim; Wiesmaier, Alexander
[Report]


Hybrid Monitors for Concurrent Noninterference
Askarov, Aslan; Chong, Stephen; Mantel, Heiko
Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), p.137-151
[Conference Proceedings]


An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given)
Volkamer, Melanie; Renaud, Karen; Kulyk, Oksana; Emeröz, Sinem
[Report]


Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness
Volkamer, Melanie; Renaud, Karen; Braun, Kristoffer; Canova, Gamze; Reinheimer, Benjamin
International Conference on Trust and Trustworthy Computing (TRUST), p.104-121
[Conference Proceedings]


On Rehoming the Electronic Id to TEEs
Tamrakar, Sandeep; Ekberg, Jan-Erik; Laitinen, Pekka
The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)
[Conference Proceedings]


How Current Android Malware Seeks to Evade Automated Code Analysis
Rasthofer, Siegfried; Asrar, Irfan; Huber, Stephan; Bodden, Eric
9th International Conference on Information Security Theory and Practice (WISTP'2015)
[Conference Proceedings]


In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services
Pellegrino, Giancarlo; Balzarotti, Davide; Winter, Stefan; Suri, Neeraj
Proceedings of USENIX Security Symposium, 12.-14. August 2015, Washington D.C
[Conference Proceedings]


On Making Emerging Trusted Execution Environments Accessible to Developers
Nyman, Thomas; McGillion, Brian; Asokan, N.
8th International Conference on Trust & Trustworthy Computing, p.58-67
[Conference Proceedings]


You are AIRing too much: Assessing the privacy of users in crowdsourcing environmental data
Mineraud, Julien; Lancerin, Federico; Balasubramaniam, Sasitharan; Conti, Mauro; Tarkoma, Sasu
The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)
[Conference Proceedings]


Private Membership Test for Bloom Filters
Meskanen, Tommi; Ramezanian, Sara; Liu, Jian; Niemi, Valtteri
The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)
[Conference Proceedings]


Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Kulyk, Oksana; Neumann, Stephan; Budurushi, Jurlind; Volkamer, Melanie; Haenni, Rolf; Koenig, Reto; Bergen, Philemon von
10th International Conference on Availability, Reliability and Security - ARES 2015, p.224-229
[Conference Proceedings]


PUF-based Software Protection for Low-end Embedded Devices
Kohnhäuser, Florian; Schaller, André; Katzenbeisser, Stefan
8th International Conference on Trust and Trustworthy Computing (TRUST 2015), p.3-21
[Conference Proceedings]


Capacity and Data Complexity in Multidimensional Linear Attack
Huang, Jialin; Vaudenay, Serge; Lai, Xuejia; Nyberg, Kaisa
CRYPTO
[Conference Proceedings]


PALPAS - PAsswordLess PAssword Synchronization
Horsch, Moritz; Hülsing, Andreas; Buchmann, Johannes
International Conference on Availability, Reliability and Security (ARES)
[Conference Proceedings]


JITProf: pinpointing JIT-unfriendly JavaScript code
Gong, Liang; Pradel, Michael; Sen, Koushik
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, p.357-368
[Conference Proceedings]


Data Is a Stream: Security of Stream-Based Channels
Fischlin, Marc; Günther, Felix; Marson, Giorgia Azzurra; Paterson, Kenneth G.
Advances in Cryptology - CRYPTO 2015, p.545-564
[Conference Proceedings]