Publikationen

Publikationen

Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 7.-9. März 2012 in Darmstadt
[Conference Proceedings]


Internet Privacy - Eine multidisziplinäre Bestandsaufnahme - A multidisciplinary analysis
[Book]


Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs
Herrewege, Anthony van; Katzenbeisser, Stefan; Maes, Roel; Peeters, Roel; Sadeghi, Ahmad-Reza; Verbauwhede, Ingrid; Wachsmann, Christian
Financial Cryptography (FC) 2012, p.374-389
[Conference Proceedings]


Softer Smartcards: Usable Cryptographic Tokens with Secure Execution
Schulz, Steffen; Brasser, Ferdinand; Filyanov, Atanas
Financial Cryptography and Data Security (FC)
[Conference Proceedings]


Post-Quantum Signaturverfahren Heute
Hülsing, Andreas; Petzoldt, Albrecht; Schneider, Michael; Yousfi Alaoui, Sidi Mohamed el
22. SIT-Smartcard Workshop 2012
[Conference Proceedings]


Technical Aspects of Online Privacy
Ghiglieri, Marco; Simo, Hervais; Waidner, Michael
[Report]


MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones
Davi, Lucas; Dmitrienko, Alexandra; Egele, Manuel; Fischer, Thomas; Holz, Thorsten; Hund, Ralf; Nürnberger, Stefan; Sadeghi, Ahmad-Reza
19th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


Towards Taming Privilege-Escalation Attacks on Android
Bugiel, Sven; Davi, Lucas; Dmitrienko, Alexandra; Fischer, Thomas; Sadeghi, Ahmad-Reza; Shastry, Bhargava
19th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately
Kauer, Michaela; Pfeiffer, Thomas; Volkamer, Melanie; Theuerling, Heike; Bruder, Ralph
Sicherheit, p.187-198
[Conference Proceedings]


POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC
Das, Amitabh; Kocabaş, Ünal; Sadeghi, Ahmad-Reza; Verbauwhede, Ingrid
Conference on Digital Automation and Test Europe (DATE)
[Conference Proceedings]


TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures
Bessani, Alysson; Abbadi, Imad M.; Bugiel, Sven; Cesena, Emanuele; Deng, Mina; Gröne, Michael; Marnau, Ninja; Nürnberger, Stefan; Pasin, Marcelo; Schirmer, Norbert
European research activities in cloud computing, p.151-177
[Book]


Sicherheitskern(e) für Smartphones: Ansätze und Lösungen
Alkassar, Ammar; Schulz, Steffen; Stüble, Christian
Datenschutz und Datensicherheit (DuD), p.175-179
[Journal Article]


Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions
Wachsmann, Christian; Sadeghi, Ahmad-Reza; Schulz, Steffen
Secure Smart Embedded Devices, Platforms and Applications, p.429-449


Tetherway: A Framework for Tethering Camouflage
Schulz, Steffen; Sadeghi, Ahmad-Reza; Zhdanova, Maria; Xu, Wenyuan; Mustafa, Hossen; Varadharajan, Vijay
Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)
[Conference Proceedings]


Unsafe Exposure Analysis of Mobile In-App Advertisements
Jiang, Xuxian; Grace, Michael; Sadeghi, Ahmad-Reza; Zhou, Wu
to appear at WiSec
[Conference Proceedings]


Educational Interfaces, Software and Technology: 3rd Workshop on UI Technologies and Educational Pedagogy
Tse, Edward; Marentette, Lynn; Ahmed, Syed Ishtiaque; Thayer, Alex; Huber, Jochen; Kim, Si Jung; Brown, Quincy; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2691-2694
[Conference Proceedings]


Massively distributed authorship of academic papers
Ständer, Marcus
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.11-20
[Conference Proceedings]


EDA for Secure and Dependable Cybercars: Challenges and Opportunities
Seudié, Hervé; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza
ACM/IEEE Design Automation Conference (DAC)
[Conference Proceedings]


C4PS: colors for privacy settings
Paul, Thomas; Stopczynski, Martin; Puscher, Daniel; Volkamer, Melanie; Strufe, Thorsten
Proceedings of the 21st international conference companion on World Wide Web, p.585--586
[Conference Proceedings]


Formal Treatment of Distributed Trust in Electronic Voting
Neumann, Stephan; Volkamer, Melanie
The Seventh International Conference on Internet Monitoring and Protection (ICIMP2012), Vol.ICIMP 2012, The Seventh I, p.30-39
[Conference Proceedings]


Interacting with Videos On Paper-like Displays
Lissermann, Roman; Olberding, Simon; Steimle, Jürgen; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2579-2584
[Conference Proceedings]


Occlusion-aware Interaction Techniques for Tabletop Systems
Khalilbeigi, Mohammadreza; Schmittat, Patrik; Steimle, Jürgen; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2531-2536
[Conference Proceedings]


LightBeam: Nomadic Pico Projector Interaction with Real World Objects
Huber, Jochen; Steimle, Jürgen; Liao, Chunyuan; Liu, Qiong; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2513-2518
[Conference Proceedings]


Toward a Theory of Interaction in Mobile Paper-Digital Ensembles
Heinrichs, Felix; Schreiber, Daniel; Huber, Jochen; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.1897-1900
[Conference Proceedings]


Leveraging the Palm Surface as an Eyes-free TV Remote Control
Dezfuli, Niloofar; Khalilbeigi, Mohammadreza; Huber, Jochen; Müller, Florian; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2483-2488
[Conference Proceedings]


Perfect Confidentiality Network - A solution for information theoretically secure key agreement
Braun, Johannes; Buchmann, Johannes
5th IFIP International Conference on New Technologies, Mobility & Security (NTMS) 2012, p.1-5
[Conference Proceedings]


How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization
Bartsch, Steffen; Sasse, Angela
[Report]


Policy Override in Practice: Model, Evaluation, and Decision Support
Bartsch, Steffen
Security and Communication Networks
[Journal Article]


Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography
[Conference Proceedings]


Converse PUF-Based Authentication
Sadeghi, Ahmad-Reza; Kocabaş, Ünal; Katzenbeisser, Stefan
International Conference on Trust & Trustworthy Computing (TRUST)
[Conference Proceedings]