Publications

Publications

End-2-End Privacy Architecture for IoT
Funke, S.; Daubert, J.; Wiesmaier, A.; Kikiras, P.; Mühlhäuser, M.
Third IEEE Conference on Communications and Network Security (CNS 2015), p.705-706
[Conference Proceedings]

EnvDASH: An Environment-Aware Dynamic Adaptive Streaming over HTTP System
Wilk, Stefan; Schönherr, Sophie; Stohr, Denny; Effelsberg, Wolfgang
Proceedings of the ACM International Conference on Interactive Experiences for TV and Online Video, p.113-118
Language: German
[Conference Proceedings]

Evaluation of User Feedback in Smart Home for Situational Context Identification
Alhamoud, Alaa; Xu, Pei; Englert, Frank; Scholl, Philipp; Nguyen, The An Binh; Böhnstedt, Doreen; Steinmetz, Ralf
2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), p.20-25
Language: German
[Conference Proceedings]

EvoSE: Evolutionary symbolic execution
Baluda, Mauro
International Workshop on Automating Test Case Design, Selection and Evaluation (A-TEST) <6, 2015, Bergamo>
Language: English
[Conference Paper]

Extending Helios Towards Private Eligibility Verifiability
Kulyk, Oksana; Teague, Vanessa; Volkamer, Melanie
E-Voting and Identity: 5th International Conference - VoteID 2015, p.57-73
Language: English
[Conference Proceedings]

Extracting Configuration Knowledge from Build Files with Symbolic Analysis
Zhou, Shurui; Al-Kofahi, Jafar; Nguyen, Tien; Kaestner, Christian; Nadi, Sarah
3rd International Workshop on Release Engineering, p.4
Language: 1
[Conference Proceedings]

Factors impacting the effort required to fix security vulnerabilities. An industrial case study
Othmane, L. ben; Chehrazi, G.; Bodden, E.; Tsalovski, P.; Brucker, A.D.; Miseldine, P.
Information Security Conference (ISC) <18, 2015, Trondheim>
Language: English
[Conference Paper]

Faster Secure Computation through Automatic Parallelization
Buescher, Niklas; Katzenbeisser, Stefan
24th USENIX Security Symposium (USENIX Security'15)
Language: German
[Conference Proceedings]

Flow-insensitive information flow analysis (for Android)
Müller, Patrick; Bodden, Eric
Language: English
[Bachelor Thesis]

Forensic readiness: Emerging discipline for creating reliable and secure digital evidence
Endicott-Popovsky, B.; Kuntze, N.; Rudolph, C.
Language: English
[Journal Article]

Formal Accountability for Biometric Surveillance: A Case Study
Ta, Vinh-Thong; Butin, Denis; Métayer, Daniel Le
Annual Privacy Forum (APF2015)
Language: German
[Conference Proceedings]

Future Internet Including 5G and Beyond: Presentation held at ICTP 2015, 1st IEEE International Conference on Telecommunications and Photonics, BUET, Dhaka, 26 - 28 December 2015
Khondoker, Rahamatullah
International Conference on Telecommunications and Photonics (ICTP) <1, 2015, Dhaka>
Language: English
[Presentation, Electronic Publication]

Fuzzy logic and multi-biometric fusion: An Overview
Maul, Fabian; Damer, Naser
International Conference on Pattern Recognition Applications and Methods (ICPRAM) <4, 2015, Lisbon>
Language: English
[Conference Paper]

Generating secure service compositions
Pino, L.; Spanoudakis, G.; Fuchs, A.; Gürgens, S.
International Conference on Cloud Computing and Services Science (CLOSER) <4, 2014, Barcelona>
Language: English
[Conference Paper]

GRINDER: On Reusability of Fault Injection Tools
Winter, Stefan; Piper, Thorsten; Schwahn, Oliver; Natella, Roberto; Suri, Neeraj; Cotroneo, Domenico
Proceedings of the ICSE/AST, 23.05.-24.05.2015, Florenz
Language: German
[Conference Proceedings]

HAFIX: Hardware-Assisted Flow Integrity Extension
Arias, Orlando; Davi, Lucas; Hanreich, Matthias; Jin, Yier; Koeberl, Patrick; Paul, Debayan; Sadeghi, Ahmad-Reza; Sullivan, Dean
52nd Design Automation Conference (DAC)
Language: German
[Conference Proceedings]

HAFIX: Hardware-Assisted Flow Integrity Extension (Best Paper Award)
Arias, Orlando; Davi, Lucas; Hanreich, Matthias; Jin, Yier; Koeberl, Patrick; Paul, Debayan; Sadeghi, Ahmad-Reza; Sullivan, Dean
52nd Design Automation Conference (DAC)
Language: aa
[Conference Proceedings]

Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors
Biedermann, Sebastian; Katzenbeisser, Stefan; Szefer, Jakub
Financial Cryptography and Data Security - 19th International Conference, FC 2015, p.5-13
Language: German
[Journal Article]

Hide And Seek: Detecting Sensors in P2P Botnets
Böck, Leon; Karuppayah, Shankar; Grube, Tim; Fischer, Mathias; Mühlhäuser, Max
Communications and Network Security (CNS), 2015 IEEE Conference on, p.731-732
Language: German
[Conference Proceedings]

High Performance Lattice-based CCA-secure Encryption
El Bansarkhani, Rachid; Buchmann, Johannes
Cryptology ePrint Archive, p.20
Language: German
[Journal Article]

How current android malware seeks to evade automated code analysis
Rasthofer, Siegfried; Asrar, Irfan; Huber, Stephan; Bodden, Eric
International Conference on Information Security Theory and Practice (WISTP) <9, 2015, Heraklion>
Language: English
[Conference Paper]

How Current Android Malware Seeks to Evade Automated Code Analysis
Rasthofer, Siegfried; Asrar, Irfan; Huber, Stephan; Bodden, Eric
9th International Conference on Information Security Theory and Practice (WISTP'2015)
Language: German
[Conference Proceedings]

How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL
Nagy, Marcin; Bui, Thanh Phong; Cristofaro, Emiliano De; Asokan, N.; Ott, Jörg; Sadeghi, Ahmad-Reza
ACM WiSEC 2015
Language: English
[Conference Proceedings]

How to Securely Prolong the Computational Bindingness of Pedersen Commitments
Demirel, Denise; Lancrenon, Jean
Language: English
[Report]

Hybrid Communication Architecture for Emergency Response - An Implementation in Firefighter’s Use Case
Nguyen, The An Binh; Englert, Frank; Farr, Simon; Gottron, Christian; Böhnstedt, Doreen; Steinmetz, Ralf
International Workshop on Pervasive Networks for Emergency Management (PerNEM)
Language: German
[Conference Proceedings]