Publications

Publications

Computational trust methods for security quantification in the cloud ecosystem
Habib, Sheikh Mahbub; Volk, Florian; Hauke, Sascha; Mühlhäuser, Max
The Cloud Security Ecosystem, p.463-493
Language: English
[Journal Article]

Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications
Schuster, Felix; Tendyck, Thomas; Liebchen, Christopher; Davi, Lucas; Sadeghi, Ahmad-Reza; Holz, Thorsten
36th IEEE Symposium on Security and Privacy (Oakland)
Language: German
[Conference Proceedings]

Das versteckte Internet. White Paper: Zu Hause - Im Auto - Am Körper
Friedewald, Michael; Karaboga, Murat; Zoche, Peter; Matzner, Tobias; Morlok, Tina; Pittroff, Fabian; Nebel, Maxi; Ochs, Carsten; Pape, Thilo von; Pörschke, Julia V.; Schütz, Philip; Fhom, Hervais S.
Language: German
[Book, Electronic Publication]

Data Is a Stream: Security of Stream-Based Channels
Fischlin, Marc; Günther, Felix; Marson, Giorgia Azzurra; Paterson, Kenneth G.
Advances in Cryptology - CRYPTO 2015, p.545-564
Language: German
[Conference Proceedings]

Datenschutz im Zeitalter von Big Data
Steinebach, Martin; Schäfer, Marcel; Winter, Christian
Language: German
[Journal Article]

Datenschutz in der Cloud - Kennzahlen für mehr Vertrauen
Jäger, Bernd; Kraft, Reiner; Luhn, Sebastian; Waldmann, Ulrich; Wilmer, Thomas
Deutscher IT-Sicherheitskongress <14, 2015, Bad-Godesberg>
Language: German
[Conference Paper]

Datenschutz in Europa und den USA - Grenzüberschreitender Datenverkehr nach dem Safe Harbor Aus
Selzer, Annika
Language: German
[Electronic Publication]

Da­ten­schutz­freund­liche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten
Ghiglieri, Marco; Müller, Jan
14. Deutscher IT-Sicherheitskongress
Language: German
[Conference Proceedings]

Decision-making criteria for cyber security adoption: Internet of Things privacy and cyber security issues
Lukavchenko, Alexandra; Rajasekaran, Hariharan; Wiesmaier, Alexander; Kikiras, Panayotis
10th Future Security Conference 2015 (Future Security 2015), p.245-252
[Conference Proceedings]

Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness
Volkamer, Melanie; Renaud, Karen; Braun, Kristoffer; Canova, Gamze; Reinheimer, Benjamin
International Conference on Trust and Trustworthy Computing (TRUST), p.104-121
Language: English
[Conference Proceedings]

Design Principles for HFEv- based Signature Schemes
Petzoldt, Albrecht; Cheng, Ming-Shing; Yang, Bo-Yin; Chengdong, Tao; Ding, Jintai
ASIACRYPT 2015 - Part I - 21st International Conference on the Theory and Application of Cryptology and Information Security, p.1-24
Language: German
[Conference Proceedings]

Detection and forensics of domains hijacking
Borgwart, Andreas; Boukoros, Spyros; Shulman, Haya; Royeen, Carel van; Waidner, Michael
Global Communications Conference (GLOBECOM) <2015, San Diego/Calif.>
Language: English
[Conference Paper]

Detection and Forensics of Domains Hijacking
Borgwart, Andreas; Boukoros, Spyros; Shulman, Haya; Waidner, Michael; van Royeen, Carel
IEEE Global Communications Conference
Language: German
[Conference Proceedings]

Die automatisierte Messung von Cloud-Verarbeitungsstandorten
Jäger, Bernd; Selzer, Annika; Waldmann, Ulrich
Language: German
[Journal Article]

Digital audio watermarking
Steinebach, Martin; Webster, John G.
Language: English
[Book Article]

Distributed security management for the IoT
Lincke, N.; Kuntze, N.; Rudolph, C.
International Symposium on Integrated Network Management (IM) <14, 2015, Ottawa>
Language: English
[Conference Paper]

DLint: Dynamically Checking Bad Coding Practices in JavaScript
Gong, Liang; Pradel, Michael; Sridharan, Manu; Sen, Koushik
Proceedings of the 2015 International Symposium on Software Testing and Analysis, p.94-105
Language: German
[Conference Proceedings]

DNS-Scopy: Towards Security of Internet Naming Infrastructure
Shulman, Haya; Waidner, Michael
20th European Symposium on Research in Computer Security Vienna, Austria, September 21 – 25, 2015 Proceedings, p.3-22
Language: German
[Conference Proceedings]

DNSSEC for Cyber Forensics
Shulman, Haya; Waidner, Michael
EURASIP J. Information Security, p.14
Language: German
[Journal Article]

DroidSearch: A tool for scaling Android app triage to real-world app stores
Rasthofer, Siegfried; Arzt, Steven; Kolhagen, Max; Pfretzschner, Brian; Huber, Stephan; Bodden, Eric; Richter, Philipp
Science and Information Conference (SAI) <2015, London>
Language: English
[Conference Paper]

Dynamically provisioning isolation in hierarchical architectures
Falzon, Kevin; Bodden, Eric
Information Security Conference (ISC) <18, 2015, Trondheim>
Language: English
[Conference Paper]

Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves
Steinmetzer, Daniel; Chen, Joe; Classen, Jiska; Knightly, Edward; Hollick, Matthias
IEEE Conference on Communications and Network Security 2015 (CNS)
Language: German
[Conference Proceedings]

Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Kulyk, Oksana; Neumann, Stephan; Budurushi, Jurlind; Volkamer, Melanie; Haenni, Rolf; Koenig, Reto; von Bergen, Philemon
Cryptology ePrint Archive, p.1-19
Language: English
[Journal Article]

Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Kulyk, Oksana; Neumann, Stephan; Budurushi, Jurlind; Volkamer, Melanie; Haenni, Rolf; Koenig, Reto; von Bergen, Philemon
10th International Conference on Availability, Reliability and Security - ARES 2015, p.224-229
Language: English
[Conference Proceedings]

End-2-End Privacy Architecture for IoT
Funke, Sebastian; Daubert, Jörg; Wiesmaier, Alexander; Kikiras, Panayotis; Mühlhäuser, Max
IEEE Conference on Communications and Network Security (CNS)
Language: German
[Conference Proceedings]