Publikationen

Publikationen

Statically checking API protocol conformance with mined multi-object specifications
Pradel, Michael; Jaspan, Ciera; Aldrich, Jonathan; Gross, Thomas R.
Proceedings of the 34th International Conference on Software Engineering, p.925-935
[Conference Proceedings]


Leveraging test generation and specification mining for automated bug detection without false positives
Pradel, Michael; Gross, Thomas R.
Proceedings of the 34th International Conference on Software Engineering, p.288-298
[Conference Proceedings]


Instrumenting AUTOSAR for Dependability Assessment: A Guidance Framework
Piper, Thorsten; Winter, Stefan; Manns, Paul; Suri, Neeraj
Proceedings of the 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), p.1-12
[Conference Proceedings]


Usable Secure Email Communications - Criteria and evaluation of existing approaches
Moecke, Cristian Thiago; Volkamer, Melanie
Information and Computer Security, p.75-85
[Journal Article]


Trust and Trustworthy Computing : 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012 ; proceedings
Katzenbeisser, Stefan; Weippl, Edgar; Camp, Jean; Volkamer, Melanie; Reiter, Mike; Zhang, Xinwen
[Book]


Semi-automatically extracting FAQs to improve accessibility of software development knowledge
Henß, Stefan; Monperrus, Martin; Mezini, Mira
Proceedings of the 34th International Conference on Software Engineering, p.793-803
[Conference Proceedings]


SmartTokens: Delegable Access Control with NFC-enabled Smartphones
Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza; Tamrakar, Sandeep; Wachsmann, Christian
International Conference on Trust & Trustworthy Computing (TRUST), p.219-238
[Conference Proceedings]


Partial Verifiability in POLYAS for the GI Elections
Olembo, Maina; Kahlert, Anna; Neumann, Stephan; Volkamer, Melanie
5th International Conference on Electronic Voting 2012 (EVOTE2012), p.95-109
[Conference Proceedings]


Practical Security in E-Mail Applications
Kiefer, Franziskus; Wiesmaier, Alexander; Fritz, Christian
The 2012 International Conference on Security and Management (SAM’12)
[Conference Proceedings]


A Grid security architecture for AliEn
Schreiner, Steffen; Grigoras, Costin; Grigoras, Alina; Betev, Latchezar; Buchmann, Johannes
Proceedings of Science (PoS), ISGC2012:027, International Symposium on Grids & Clouds (ISGC) 2012
[Conference Proceedings]


The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version)
Sadeghi, Ahmad-Reza; Schulz, Steffen; Varadharajan, Vijay
[Report]


Civitas and the Real World: Problems and Solutions from a Practical Point of View
Neumann, Stephan; Volkamer, Melanie
7th International Conference on Availability, Reliability and Security (ARES), p.180-185
[Conference Proceedings]


Forward Secure Signatures on Smart Cards
Hülsing, Andreas; Busold, Christoph; Buchmann, Johannes
SAC2012 - Conference on Selected Areas in Cryptography, p.66-80
[Conference Proceedings]


Improving Helios with Everlasting Privacy Towards the Public
Demirel, Denise; Graaf, Jeroen van de; Araújo, Roberto
Electronic Voting Technology Workshop / Workshop on Trustworthy Elections - EVT/WOTE 2012
[Conference Proceedings]


XIFER: A Software Diversity Tool Against Code-Reuse Attacks
Davi, Lucas; Dmitrienko, Alexandra; Nürnberger, Stefan; Sadeghi, Ahmad-Reza
4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012)
[Conference Proceedings]


The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents
Vigil, Martín; Moecke, Cristian Thiago; Custódio, Ricardo Felipe; Volkamer, Melanie
EuroPKI 2012, September 13-14, p.85-97
[Conference Proceedings]


State of Online Privacy: A Technical Perspective
Kelbert, Florian; Shirazi, Fatemeh; Simo, Hervais; Wüchner, Tobias; Buchmann, Johannes; Pretschner, Alexander; Waidner, Michael
Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE), p.189-279


PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon
Katzenbeisser, Stefan; Kocabaş, Ünal; Rožic, Vladimir; Sadeghi, Ahmad-Reza; Verbauwhede, Ingrid; Wachsmann, Christian
Workshop on Cryptographic Hardware and Embedded Systems (CHES), p.283-301
[Conference Proceedings]


On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes
Göttert, Norman; Feller, Thomas; Schneider, Michael; Huss, Sorin; Buchmann, Johannes
Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), p.512-529
[Conference Proceedings]


Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems
Demirel, Denise; Henning, Maria
Jusletter IT - Die Zeitschrift für IT und Recht
[Journal Article]


How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities
Braun, Johannes; Hülsing, Andreas; Wiesmaier, Alexander; Vigil, Martín; Buchmann, Johannes
Public Key Infrastructures, Services and Applications - EuroPKI 2012, p.53-68
[Conference Proceedings]


Towards the Systematic Development of Contextualized Security Interventions
Bartsch, Steffen; Volkamer, Melanie
Designing Interactive Secure Systems (DISS), BCS HCI 2012
[Conference Proceedings]


Context determines content: an approach to resource recommendation in folksonomies
Rodenhausen, Thomas; Anjorin, Mojisola; Dominguez Garcia, Renato; Rensing, Christoph
Proceedings of the 4th ACM RecSys workshop on Recommender systems and the social web, p.17-24
[Conference Proceedings]


The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem
Schläpfer, Michael; Volkamer, Melanie
Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, p.410-418
[Conference Proceedings]


Recommendations For E-Voting System Usability: Lessons From Literature For Interface Design, User Studies, and Usability Criteria
Olembo, Maina; Volkamer, Melanie
[Report]


Malacoda: towards high-level compilation of network security applications on reconfigurable hardware
Mühlbach, Sascha; Koch, Andreas
Proceedings of the eighth ACM/IEEE symposium on Architectures for networking and communications systems, p.247-258
[Conference Proceedings]


Decoupling Authentication from the Usage of Services
Horsch, Moritz; Braun, Johannes; Wiesmaier, Alexander
[Report]


Secure Two-Party Computations in ANSI C
Holzer, Andreas; Franz, Martin; Katzenbeisser, Stefan; Veith, Helmut
Conference on Computer and Communications Security (CCS 2012), p.772-783
[Conference Proceedings]


iPIN and mTAN for secure eID applications
Braun, Johannes; Horsch, Moritz; Wiesmaier, Alexander
8th International Conference on Information Security Practice and Experience (ISPEC 2012), p.259-276
[Conference Proceedings]


Cleaning up the PKI for Long-term Signatures
Vigil, Martín; Custódio, Ricardo Felipe
12th SBSeg 2012, Brazilian Symposium on Information and Computer System Security, p.140-153
[Conference Proceedings]