Publications

Publications

Pruning the Tree: Rethinking RPKI Architecture From The Ground Up
Schulmann, Haya; Vogel, Niklas
[Conference Proceedings]


All That Glitters Is Not Gold: RPKI’s Stumbling Speedrun To The Top
Mirdita, Donika; Schulmann, Haya; Waidner, Michael
IEEE Transactions on Dependable and Secure Computing, p.1-12
[Journal Article]


Resilience Meets Security in Cyber-Physical Systems and Critical Infrastructures
Förster, Anna; Hollick, Matthias; Katzenbeisser, Stefan; Krauss, Christoph
Communications of the ACM, Vol.69, p.35–38
[Journal Article]


Oil, Vinegar, and Sparks: Key Recovery from UOV via Single Electromagnetic Fault Injection
Campos, Fabio; Hahn, Daniel; Könnecke, Daniel; Stöttinger, Marc


Statistical Feature-Based Detection of Adversarial Noise and Patch Attacks in Image and Deepfake Analysis
Bunzel, Niklas; Frick, Raphael; Graner, Lukas; Göller, Nicolas; Steinebach, Martin
[Book Article]


Secure Medical Digital Twins: A Use-Case Driven Approach
Ahmad, Salmah; Bartelt, Bianca; Enzmann, Matthias; Kohlhammer, Jörn; Wesarg, Stefan; Wolf, Ruben
International Workshop on Digital Twin for Healthcare 2025
[Conference Paper]


Learning to Identify Conflicts in RPKI
Schulmann, Haya; Zhao, Shujie
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, p.1490-1505
[Conference Proceedings]


ValidaTor: Domain Validation over Tor
Frieß, Jens; Schulmann, Haya; Waidner, Michael
22nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 25), p.1367-1380
[Conference Proceedings]


SoK: An Introspective Analysis of RPKI Security
Mirdita, Donika; Schulmann, Haya; Waidner, Michael
34th USENIX Security Symposium (USENIX Security 25), p.3649-3665
[Journal Article]


Stealth BGP Hijacks with uRPF Filtering
Schulmann, Haya; Zhao, Shujie
19th USENIX WOOT Conference on Offensive Technologies (WOOT 25), p.129-138
[Conference Proceedings]


Poster: Exploring the Landscape of RPKI Relying Parties
Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4773-4775
[Conference Proceedings]


Poster: We must talk about RPKI Repositories
Schulmann, Haya; Vogel, Niklas
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4755-4757
[Conference Proceedings]


Poster: The Rocky Road Towards RPKI Algorithm Agility
Miesch, Katharina; Schulmann, Haya; Vogel, Niklas
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4767-4769
[Conference Proceedings]


Demo: Stopping Production Testing: A Graphical RPKI Test-Suite
Kirsch, Tobias; Schulmann, Haya; Vogel, Niklas
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4722-4723
[Conference Proceedings]


Künstliche Intelligenz bei Webanwendungen
Wilmer, Thomas
Datenschutz und Internet


Rechtsgrundlagen der Verarbeitung in der Datenschutz-Grundverordnung
Wilmer, Thomas
Datenschutz und Internet


Grundsätze für die Verarbeitung personenbezogener Daten nach Art.\ 5 DS-GVO
Wilmer, Thomas
Datenschutz und Internet


TDDDG Telekommunikation-Digitale-Dienste-Datenschutz-Gesetz Kommentar
Riechert, Anne; Wilmer, Thomas; Brock, Marc Oliver; Golland, Alexander; Keppeler, Lutz Martin; Raji, Behrang; Riechert, Anne; Sesing-Wagenpfeil, Andreas; Ströbel, Lukas; Voß, Jan Peter; Wilmer, Thomas
[Book]


Post-Quantum Cryptography in eMRTDs — Evaluating PAKE and PKI for Travel Documents
Alnahawi, N.; Azouaoui, M.; Bos, J.; Davies, G.; Moon, S.; van Vredendaal, C.; Wiesmaier, A.
Security Standardisation Research Conference (SSR 25)
[Conference Proceedings]


Improving Anomaly Detection for Electric Vehicle Charging with Generative Adversarial Networks
Ha The, Viet; Kern, Dustin; Nguyen Tan, Phat; Krauß, Christoph
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing SAC, p.1800–1809
[Conference Proceedings]


Anomaly Detection and Mitigation for Electric Vehicle Charging-Based Attacks on the Power Grid
Kern, Dustin; Krauß, Christoph; Hollick, Matthias
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing SAC, p.1790–1799
[Conference Proceedings]


Data Distribution and Redistribution - A formal and practical Analysis of the DDS Security Standard
Lauser, Timm; Müller, Maximilian; Baumgart, Ingmar; Krauß, Christoph
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing SAC, p.1839–1848
[Conference Proceedings]


Streamlining Plug-and-Charge Authorization for Electric Vehicles with OAuth 2 and OpenID Federation
Primbs, Jonas; Kern, Dustin; Menth, Michael; Krauß, Christoph
IEEE Access, Vol.13, p.168711-168731
[Journal Article]


RollCAN – CAN-bus based RollJam-Attack
Hamborg, Jannis; Lauser, Timm; Krauß, Christoph
Proceedings of the 2nd Cyber Security in CarS Workshop
[Conference Proceedings]


Towards a Holistic and Multi-Modal Vehicle Security Monitoring
Yekta, Ali Recai; Spychalski, Dominik; Yekta, Cenk; Heinrich, Markus; Krauß, Christoph; Katzenbeisser, Stefan
Proceedings of the 20th International Conference on Critical Information Infrastructures Security (CRITIS)
[Conference Proceedings]


CarDS - Controller Area Network and Automotive Ethernet Realistic Data Set
Hellemans, Wouter; Hamborg, Jannis; Lauser, Timm; Rabbani, Md Masoom; Preneel, Bart; Krauß, Christoph; Mentens, Nele
Proceedings of the 41st Annual Computer Security Applications Conference (ACSAC)
[Conference Proceedings]


A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection?
"Henrich, Johanna; Schmitt, Nicolai; Alnahawi, Nouri; Heinemann, Andreas"
Information Security, p.107-128
[Conference Proceedings]


Si­mu­la­tion-Based Software Leakage Evaluation for the RISC-V Platform
"Schmitt, Nicolai; Zeitschner, Jannik; Heinemann, Andreas"
Information Security, p.175-195
[Conference Proceedings]


DemoQuanDT: a carrier-grade QKD network
Horoschenkoff, P.; Henrich, J.; Böhn, R.; Khan, I.; Rödiger, J.; Gunkel, M.; Bauch, M.; Benda, J.; Bläcker, P.; Eichhammer, E.; Eismann, U.; Frenck, G.; Griesser, H.; Jontofsohn, W.; Kopshoff, N.; Röhrich, S.; Seidl, F.; Schark, N.; Sollner, E.; von Blanckenburg, D.; Heinemann, A.; Stiemerling, M.; Gärtner, M.
J. Opt. Commun. Netw., Vol.17, p.743-756
[Journal Article]


Syn-IDPass: Passport Synthetic Dataset for Presentation Attack Detection?
Tapia, J. E.; Stockhardt, F.; Gonzalez-Soler, L. J.; Busch, C.
Proc. IEEE Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]