Publications

Publications

An Unconditionally Hiding Auditing Procedure for Computations over Distributed Data
Schabhüser, Lucas; Demirel, Denise; Buchmann, Johannes
The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016)
[Conference Proceedings]


SANA: Secure and Scalable Aggregate Network Attestation
Sadeghi, Ahmad-Reza; Schunter, Matthias; Ibrahim, Ahmad; Conti, Mauro; Neven, Gregory
23rd ACM Conference on Computer and Communications Security (CCS) 2016
[Conference Proceedings]


Why don’t UK citizens protest against privacy-invading dragnet surveillance?
Renaud, Karen; Flowerday, Stephen; English, Rosanne; Volkamer, Melanie
>Information and Computer Security, p.400-415
[Journal Article]


Analyzing TETRA Location Privacy and Network Availability
Pfeiffer, Martin; Kwiotek, Jan-Pascal; Classen, Jiska; Klose, Robin; Hollick, Matthias
6th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, p.117--122
[Conference Proceedings]


POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes
Mayer, Peter; Neumann, Stephan; Volkamer, Melanie
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, p.1817-1819
[Conference Proceedings]


POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes
Mayer, Peter; Neumann, Stephan; Volkamer, Melanie
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, p.1817--1819
[Conference Proceedings]


Stratum Filtering: Cloud-Based Detection of Attack Sources
Herzberg, Amir; Shulman, Haya; Waidner, Michael
ACM Cloud Computing Security Workshop (CCSW)
[Conference Proceedings]


SecureScala: Scala embedding of secure computations
Hauck, Markus; Savvides, Savvas; Eugster, Patrick; Mezini, Mira; Salvaneschi, Guido
Proceedings of the 2016 7th ACM SIGPLAN Symposium on Scala
[Conference Proceedings]


SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles
Deshotels, Luke; Deaconescu, Razvan; Chiroiu, Mihai; Davi, Lucas; Enck, William; Sadeghi, Ahmad-Reza
23rd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer
Classen, Jiska; Steinmetzer, Daniel; Hollick, Matthias
3rd ACM Workshop on Visible Light Communication Systems
[Journal Article]


Disguised Chromium Browser: Robust browser, Flash and Canvas Fingerprinting Protection
Baumann, Peter; Katzenbeisser, Stefan; Stopczynski, Martin; Tews, Erik
WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, p.37-46
[Conference Proceedings]


C-FLAT: Control-Flow Attestation for Embedded Systems Software
Abera, Tigist; Asokan, N.; Davi, Lucas; Ekberg, Jan-Erik; Nyman, Thomas; Paverd, Andrew; Sadeghi, Ahmad-Reza; Tsudik, Gene
23rd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


WebRanz: web page randomization for better advertisement delivery and web-bot prevention
Wang, Weihang; Zheng, Yunhui; Xing, Xinyu; Kwon, Yonghwi; Zhang, Xiangyu; Eugster, Patrick
FSE 2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, p.205-216
[Conference Proceedings]


Reconciling Task Assignment and Scheduling in Mobile Edge Clouds
Wang, Lin; Jiao, Lei; Kliazovich, Dzmitry; Bouvry, Pascal
2016 IEEE 24th International Conference on Network Protocols (ICNP), p.1-6
[Conference Proceedings]


Towards a Policy-Agnostic Control-Flow Integrity Implementation
Sullivan, Dean; Arias, Orlando; Davi, Lucas; Sadeghi, Ahmad-Reza; Jin, Yier
Black Hat Europe
[Conference Proceedings]


SliM: Enabling Efficient, Seamless NFV State Migration (Poster Paper)
Nobach, Leonhard; Rimac, I.; Hilt, V.; Hausheer, David
2016 IEEE 24th International Conference on Network Protocols (ICNP), p.1-2
[Conference Proceedings]


FIB efficiency in distributed platforms
Kogan, Kirill; Nikolenko, Sergey I.; Eugster, Patrick; Shalimov, Alexander; Rottenstreich, Ori
2016 IEEE 24th International Conference on Network Protocols (ICNP), p.1-10
[Conference Proceedings]


An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins
Bansarkhani, Rachid El; Sturm, Jan
15th International Conference on Cryptology and Network Security - CANS 2016
[Conference Proceedings]


DNSSEC Misconfigurations in Popular Domains
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
Cryptology and Network Security. CANS 2016
[Conference Proceedings]


Scalable Secure Computation from ANSI-C
Buescher, Niklas; Kretzmer, David; Jindal, Arnav; Katzenbeisser, Stefan
WIFS - IEEE International Workshop on Information Forensics and Security
[Conference Proceedings]


AS³: Adaptive Social Secret Sharing for Distributed Storage Systems
Traverso, Giulia; Demirel, Denise; Habib, Sheikh Mahbub; Buchmann, Johannes
2016 Privacy, Security and Trust Conference
[Conference Proceedings]


Programming Scalable Cloud Services with AEON
Sang, Bo; Petri, Gustavo; Ardekani, Masoud Saeida; Ravi, Srivatsan; Eugster, Patrick
Middleware '16 Proceedings of the 17th International Middleware Conference, p.16:1
[Conference Proceedings]


Enabling Automatic Password Change in Password Managers Through Crowdsourcing
Mayer, Peter; Berket, Hermann; Volkamer, Melanie
International Conference on Passwords
[Conference Proceedings]


The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions
Gerber, Paul; Renaud, Karen; Volkamer, Melanie
>Journal of Information Security and Applications, p.8-26
[Journal Article]


A security analysis of techniques for long-term integrity protection
Geihs, Matthias; Demirel, Denise; Buchmann, Johannes
2016 Privacy, Security and Trust Conference
[Conference Proceedings]


Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks
Garcia Cordero, Carlos; Hauke, Sascha; Mühlhäuser, Max; Fischer, Mathias
Privacy, Security and Trust Conference, p.317 - 324
[Conference Proceedings]


Efficient Proactive Secret Sharing
Brendel, Jacqueline; Demirel, Denise
2016 Privacy, Security and Trust Conference
[Conference Proceedings]


AnonDrop – Räumlich begrenzte anonyme Informationsverbreitung
Zeier, Alexander; Heinemann, Andreas
D-A-CH Security 2016 Tagungsband, p.241-252
[Conference Proceedings]


Security-Management-as-a-Service für die öffentliche Verwaltung
Heinemann, Andreas; Kern, Fabian; Lange, Steffen; Margraf, Marian; Otterbein, Florian
D-A-CH Security 2016 Tagungsband. SECMGT Workshop
[Conference Proceedings]


Zur Benutzbarkeit der AusweisApp2
Willomitzer, Jörg; Heinemann, Andreas; Margraf, Marian
Mensch und Computer 2016 – Workshopband
[Conference Proceedings]