Publications

Publications

Pruning the Tree: Rethinking RPKI Architecture From The Ground Up
Haya Schulmann and Niklas Vogel
[Conference Proceedings]


All That Glitters Is Not Gold: RPKI’s Stumbling Speedrun To The Top
Mirdita, Donika and Schulmann, Haya and Waidner, Michael
IEEE Transactions on Dependable and Secure Computing, p.1-12
[Journal Article]


Resilience Meets Security in Cyber-Physical Systems and Critical Infrastructures
Förster, Anna and Hollick, Matthias and Katzenbeisser, Stefan and Krauss, Christoph
Communications of the ACM, Vol.69, p.35–38
[Journal Article]


Oil, Vinegar, and Sparks: Key Recovery from UOV via Single Electromagnetic Fault Injection
Fabio Campos and Daniel Hahn and Daniel Könnecke and Marc Stöttinger


Statistical Feature-Based Detection of Adversarial Noise and Patch Attacks in Image and Deepfake Analysis
Bunzel, Niklas; Frick, Raphael; Graner, Lukas; Göller, Nicolas; Steinebach, Martin
[Book Article]


Secure Medical Digital Twins: A Use-Case Driven Approach
Ahmad, Salmah; Bartelt, Bianca; Enzmann, Matthias; Kohlhammer, Jörn; Wesarg, Stefan; Wolf, Ruben
International Workshop on Digital Twin for Healthcare 2025
[Conference Paper]


LightShed: Defeating Perturbation-based Image Copyright Protections
Foerster, Hanna; Behrouzi, Sasha; Rieger, Phillip; Jadliwala, Murtuza; Sadeghi, Ahmad-Reza
Proceedings of the 34th USENIX Security Symposium, p.7271-7290
[Conference Proceedings]


ZORRO: Zero-Knowledge Robustness and Privacy for Split Learning
Sheybani, Nojan; Pegoraro, Alessandro; Knauer, Jonathan; Rieger, Phillip; Mollakuqe, Elissa; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza
CCS '25: Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.321-334
[Conference Proceedings]


Learning to Identify Conflicts in RPKI
Haya Schulmann and Shujie Zhao
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, p.1490–1505
[Conference Proceedings]


ValidaTor: Domain Validation over Tor
Jens Frieß and Haya Schulmann and Michael Waidner
22nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 25), p.1367–1380
[Conference Proceedings]


SoK: An Introspective Analysis of RPKI Security
Donika Mirdita and Haya Schulmann and Michael Waidner
34th USENIX Security Symposium (USENIX Security 25), p.3649–3665
[Journal Article]


Stealth BGP Hijacks with uRPF Filtering
Haya Schulmann and Shujie Zhao
19th USENIX WOOT Conference on Offensive Technologies (WOOT 25), p.129–138
[Conference Proceedings]


Poster: Exploring the Landscape of RPKI Relying Parties
Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4773–4775
[Conference Proceedings]


Poster: We must talk about RPKI Repositories
Haya Schulmann and Niklas Vogel
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4755–4757
[Conference Proceedings]


Poster: The Rocky Road Towards RPKI Algorithm Agility
Katharina Miesch and Haya Schulmann and Niklas Vogel
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4767–4769
[Conference Proceedings]


Demo: Stopping Production Testing: A Graphical RPKI Test-Suite
Tobias Kirsch and Haya Schulmann and Niklas Vogel
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4722–4723
[Conference Proceedings]


Künstliche Intelligenz bei Webanwendungen
Wilmer, Thomas
Datenschutz und Internet


Rechtsgrundlagen der Verarbeitung in der Datenschutz-Grundverordnung
Wilmer, Thomas
Datenschutz und Internet


Grundsätze für die Verarbeitung personenbezogener Daten nach Art. 5 DS-GVO
Wilmer, Thomas
Datenschutz und Internet


TDDDG Telekommunikation-Digitale-Dienste-Datenschutz-Gesetz Kommentar
Riechert, Anne and Wilmer, Thomas and Brock, Marc Oliver and Golland, Alexander and Keppeler, Lutz Martin and Raji, Behrang and Riechert, Anne and Sesing-Wagenpfeil, Andreas and Ströbel, Lukas and Voß, Jan Peter and Wilmer, Thomas
[Book]


Post-Quantum Cryptography in eMRTDs – Evaluating PAKE and PKI for Travel Documents
N. Alnahawi and M. Azouaoui and J. Bos and G. Davies and S. Moon and C. van Vredendaal and A. Wiesmaier
Security Standardisation Research Conference (SSR'25)
[Conference Proceedings]


Improving Anomaly Detection for Electric Vehicle Charging with Generative Adversarial Networks
Ha The, Viet and Kern, Dustin and Nguyen Tan, Phat and Krauß, Christoph
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing SAC, p.1800–1809
[Conference Proceedings]


Anomaly Detection and Mitigation for Electric Vehicle Charging-Based Attacks on the Power Grid
Kern, Dustin and Krauß, Christoph and Hollick, Matthias
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing SAC, p.1790–1799
[Conference Proceedings]


Data Distribution and Redistribution - A formal and practical Analysis of the DDS Security Standard
Lauser, Timm and Müller, Maximilian and Baumgart, Ingmar and Krauß, Christoph
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing SAC, p.1839–1848
[Conference Proceedings]


Streamlining Plug-and-Charge Authorization for Electric Vehicles with OAuth 2 and OpenID Federation
Primbs, Jonas and Kern, Dustin and Menth, Michael and Krauß, Christoph
IEEE Access, Vol.13, p.168711-168731
[Journal Article]


RollCAN – CAN-bus based RollJam-Attack
Hamborg, Jannis and Lauser, Timm and Krauß, Christoph
Proceedings of the 2nd Cyber Security in CarS Workshop
[Conference Proceedings]


Towards a Holistic and Multi-Modal Vehicle Security Monitoring
Yekta, Ali Recai and Spychalski, Dominik and Yekta, Cenk and Heinrich, Markus and Krauß, Christoph and Katzenbeisser, Stefan
Proceedings of the 20th International Conference on Critical Information Infrastructures Security (CRITIS)
[Conference Proceedings]


CarDS - Controller Area Network and Automotive Ethernet Realistic Data Set
Hellemans, Wouter and Hamborg, Jannis and Lauser, Timm and Rabbani, Md Masoom and Preneel, Bart and Krauß, Christoph and Mentens, Nele
Proceedings of the 41st Annual Computer Security Applications Conference (ACSAC)
[Conference Proceedings]


A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection?
Henrich, Johanna and Schmitt, Nicolai and Alnahawi, Nouri and Heinemann, Andreas
Information Security, p.107–128
[Conference Proceedings]


Si­mu­la­tion-Based Software Leakage Evaluation for the RISC-V Platform
Schmitt, Nicolai and Zeitschner, Jannik and Heinemann, Andreas
Information Security, p.175–195
[Conference Proceedings]