Publikationen

Publikationen

Return to Where? You Can't Exploit What You Can't Find
Crane, Stephen; Liebchen, Christopher; Homescu, Andrei; Davi, Lucas; Larsen, Per; Sadeghi, Ahmad-Reza; Brunthaler, Stefan; Franz, Michael
Blackhat USA
[Conference Proceedings]


Faster Secure Computation through Automatic Parallelization
Buescher, Niklas; Katzenbeisser, Stefan
24th USENIX Security Symposium (USENIX Security'15)
[Conference Proceedings]


SEDA - Technical Report
Asokan, N.; Brasser, Ferdinand; Ibrahim, Ahmad; Sadeghi, Ahmad-Reza; Schunter, Matthias; Tsudik, Gene; Wachsmann, Christian
[Report]


A Socio-Technical Investigation into Smartphone Security
Volkamer, Melanie; Renaud, Karen; Kulyk, Oksana; Emeröz, Sinem
Security and Trust Management: 11th International Workshop - STM 2015, p.265-273
[Conference Proceedings]


Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption
Tao, Chengdong; Xiang, Hong; Petzoldt, Albrecht; Ding, Jintai
Finite Fields and Their Applications, p.352-368
[Journal Article]


Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves
Steinmetzer, Daniel; Chen, Joe; Classen, Jiska; Knightly, Edward; Hollick, Matthias
IEEE Conference on Communications and Network Security 2015 (CNS)
[Conference Proceedings]


Towards Security of Internet's Naming Infrastructure
Shulman, Haya; Waidner, Michael
Computer Security ESORICS
[Conference Proceedings]


DNS-Scopy: Towards Security of Internet Naming Infrastructure
Shulman, Haya; Waidner, Michael
20th European Symposium on Research in Computer Security Vienna, Austria, September 21 – 25, 2015 Proceedings, p.3-22
[Conference Proceedings]


On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms
Piper, Thorsten; Suri, Neeraj; Fuhrman, Thomas
InProceedings of the 11th European Dependable Computing Conference ,07.09.2015-11.09.2015, Paris
[Conference Proceedings]


Parallel (Probable) Lock-Free Hash Sieve: A Practical Sieving Algorithm for the SVP
Mariano, Artur; Laarhoven, Thijs; Bischof, Christian
ICPP 2015 - The 44th Annual Conference 2015 International Conference on Parallel Processing
[Conference Proceedings]


Transforming Out Timing Leaks, More or Less
Mantel, Heiko; Starostin, Artem
Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015) - Part I, p.20
[Conference Proceedings]


Extending Helios Towards Private Eligibility Verifiability
Kulyk, Oksana; Teague, Vanessa; Volkamer, Melanie
E-Voting and Identity: 5th International Conference - VoteID 2015, p.57-73
[Conference Proceedings]


PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation
Germanus, Daniel; Ismail, Hatem; Suri, Neeraj
InProceedings of the 34th International Symposium on Reliable Distributed Systems, 28.09.2015-01.10.2015, Montreal
[Conference Proceedings]


Practical Covert Channels for WiFi Systems
Classen, Jiska; Schulz, Matthias; Hollick, Matthias
IEEE Conference on Communications and Network Security (CNS), p.8
[Conference Proceedings]


The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications
Classen, Jiska; Chen, Joe; Steinmetzer, Daniel; Hollick, Matthias; Knightly, Edward
2nd ACM Workshop on Visible Light Communication Systems, p.6
[Conference Proceedings]


Hide And Seek: Detecting Sensors in P2P Botnets
Böck, Leon; Karuppayah, Shankar; Grube, Tim; Fischer, Mathias; Mühlhäuser, Max
Communications and Network Security (CNS), 2015 IEEE Conference on, p.731-732
[Conference Proceedings]


Formal Accountability for Biometric Surveillance: A Case Study
Ta, Vinh-Thong; Butin, Denis; Métayer, Daniel Le
Annual Privacy Forum (APF2015)
[Conference Proceedings]


DNSSEC for Cyber Forensics
Shulman, Haya; Waidner, Michael
EURASIP J. Information Security, p.14
[Journal Article]


On the Systematic Drift of Physically Unclonable Functions Due to Aging
Schaller, André; Skoric, Boris; Katzenbeisser, Stefan
TrustED, p.15-20
[Conference Proceedings]


PBMC: Symbolic Slicing for the Verification of Concurrent Programs
Saissi, Habib; Bokor, Peter; Suri, Neeraj
Proceedings of the Symposium on Automated Technology for Verification and Analysis, ATVA 2015
[Conference Proceedings]


Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem
Neumann, Stephan; Volkamer, Melanie; Strube, Moritz; Jung, Wolfgang; Brelle, Achim
Datenschutz und Datensicherheit, p.747-752
[Journal Article]


Notions of Deniable Message Authentication
Fischlin, Marc; Mazaheri, Sogol
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, p.55-64
[Conference Proceedings]


A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas
22nd ACM Conference on Computer and Communications Security (CCS 2015), p.1197-1210
[Conference Proceedings]


Automated Synthesis of Optimized Circuits for Secure Computation
Demmler, Daniel; Dessouky, Ghada; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza; Schneider, Thomas; Zeitouni, Shaza
CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, p.1504-1517
[Conference Proceedings]


Performance problems you can fix: a dynamic analysis of memoization opportunities
Della Toffola, Luca; Pradel, Michael; Gross, Thomas R.
Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, p.607-622
[Conference Proceedings]


It's a TRAP: Table Randomization and Protection against Function Reuse Attacks
Crane, Stephen; Volckaert, Stijn; Schuster, Felix; Liebchen, Christopher; Larsen, Per; Davi, Lucas; Sadeghi, Ahmad-Reza; Holz, Thorsten; Sutter, Bjorn De; Franz, Michael
22nd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks
Conti, Mauro; Crane, Stephen; Davi, Lucas; Franz, Michael; Larsen, Per; Liebchen, Christopher; Negro, Marco; Qunaibit, Mohaned; Sadeghi, Ahmad-Reza
22nd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


SEDA: Scalable Embedded Device Attestation
Asokan, N.; Brasser, Ferdinand; Ibrahim, Ahmad; Sadeghi, Ahmad-Reza; Schunter, Matthias; Tsudik, Gene; Wachsmann, Christian
22nd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


Rating Decomposition with Conjoint Analysis and Machine Learning
Volk, Florian; Trüschler, Nadine; Mühlhäuser, Max
CENTRIC 2015: The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, p.36-41
[Conference Proceedings]


Design Principles for HFEv- based Signature Schemes
Petzoldt, Albrecht; Cheng, Ming-Shing; Yang, Bo-Yin; Chengdong, Tao; Ding, Jintai
ASIACRYPT 2015 - Part I - 21st International Conference on the Theory and Application of Cryptology and Information Security, p.1-24
[Conference Proceedings]