Publications

Publications

XDRI Attacks - and - How to Enhance Resilience of Residential Routers
Philipp Jeitner and Haya Schulmann and Lucas Teichmann and Michael Waidner
31st USENIX Security Symposium (USENIX Security 22), p.4473–4490
[Conference Proceedings]


Stalloris: RPKI Downgrade Attack
Tomas Hlavacek and Philipp Jeitner and Donika Mirdita and Haya Schulmann and Michael Waidner
31st USENIX Security Symposium (USENIX Security 22), p.4455–4471
[Conference Proceedings]


Smart RPKI Validation: Avoiding Errors and Preventing Hijacks
Tomas Hlavacek and Haya Schulmann and Michael Waidner
Computer Security – ESORICS 2022, p.509–530
[Conference Proceedings]


How (Not) to Deploy Cryptography on the Internet
Haya Schulmann
Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy, p.1
[Conference Proceedings]


Poster: DNS in Routers Considered Harmful
Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3471–3473
[Conference Proceedings]


Poster: Insights into Global Deployment of RPKI Validation
Haya Schulmann and Niklas Vogel and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3467–3469
[Conference Proceedings]


Poster: RPKI Kill Switch
Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3423–3425
[Conference Proceedings]


Poster: The Unintended Consequences of Algorithm Agility in DNSSEC
Elias Heftrig and Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3363–3365
[Conference Proceedings]


Behind the Scenes of RPKI
Tomas Hlavacek and Philipp Jeitner and Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.1413–1426
[Conference Proceedings]


Special issue ESORICS 2021
Elisa Bertino and Haya Schulmann and Michael Waidner
Journal of Computer Security, Vol.30, p.753–755
[Journal Article]


crypto_lib: Comparing and Selecting Cryptography Libraries
J. Wohlwender and R. Huesmann and A. Heinemann and A. Wiesmaier
European Interdisciplinary Cyber­security Conference (EICC'22), p.6 – 11
[Conference Proceedings]


Efficient Practical Byzantine Consensus Using Random Linear Network Coding
M. Braun and A. Wiesmaier and N. Alnahawi
Springer Annals of Telecommunications (Journal), Vol.78, p.33–51
[Journal Article]


Sussex-Huawei Locomotion and Transportation Dataset
Hristijan Gjoreski and Mathias Ciliberto and Lin Wang and Francisco Javier Ordóñez Morales and Sami Mekki and Stefan Valentin and Daniel Roggen


ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering
Daniel Zelle and Christian Plappert and Roland Rieke and Dirk Scheuermann and Christoph Krauß
Microprocessors and Microsystems, Vol.90, p.104461
[Journal Article]


Decision Tree-Based Rule Derivation for Intrusion Detection in Safety-Critical Automotive Systems
Lucas Buschlinger and Roland Rieke and Sanat Sarda and Christoph Krauß
2022 30th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), p.246-254
[Conference Proceedings]


Integrating Privacy into the Electric Vehicle Charging Architecture
Dustin Kern and Timm Lauser and Christoph Krauß
Proceedings on Privacy Enhancing Technologies, Vol.2022, p.140-158
[Journal Article]


On the State of Crypto-Agility
N. Alnahawi and N. Schmitt and A. Wiesmaier and A. Heinemann and T. Graßmeyer
18. Deutscher IT-Sicherheitskongress, p.103 – 126
[Conference Proceedings]


Towards a maturity model for crypto-agility assessment
Julian Hohm and Andreas Heinemann and Alexander Wiesmaier
CoRR, Vol.abs/2202.07645
[Journal Article]


Future Trends in Digital Face Manipulation and Detection
R. Tolosana and C. Rathgeb and R. Vera-Rodriguez and C. Busch and Luisa Verdoliva and S. Lyu and others
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, p.463–482


Selfie Periocular Verification using an Efficient Super-Resolution Approach
J. Tapia and A. Valenzuela and R. Lara and M. Gomez-Barrero and C. Busch
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
[Journal Article]


Alcohol Consumption Detection from Periocular NIR Images Using Capsule Network
J. Tapia and E. Lopez-Droguett and C. Busch
26th Intl. Conf. on Pattern Recognition (ICPR), p.959–966
[Conference Proceedings]


Identity Documents Image Quality Assessment
D. Schulz and J. Maureira and J. Tapia and C. Busch
30th European Signal Processing Conf. (EUSIPCO), p.1017–1021
[Conference Proceedings]


Analysis of the synthetic periocular iris images for robust Presentation Attacks Detection algorithms
J. Maureira and J. Tapia and C. Arellano, C. Busch
IET Biometrics, Vol.n/a, p.1–12
[Journal Article]


A novel Capsule Neural Network based model for drowsiness detection using electroencephalography signals
L. Guarda and J. Tapia and E. Lopez-Droguett and M. Ramos
Expert Systems with Applications, Vol.201, p.116977
[Journal Article]


Evaluating Face Image Quality Score Fusion for Modern Deep Learning Models
T. Schlett and C. Rathgeb and J. Tapia and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–8
[Conference Proceedings]


Face Morphing Attack Detection Methods
U. Scherhag and C. Rathgeb and C. Busch
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, p.331–349


Reliable detection of doppelgängers based on deep face representations
C. Rathgeb and D. Fischer and P. Drozdowski and C. Busch
IET Biometrics, Vol.11, p.215–224
[Journal Article]


Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks
C. Rathgeb and R. Tolosana and R. Vera and C. Busch
[Book]


Demographic fairness in biometric systems: What do the experts say?
C. Rathgeb and P. Drozdowski and D. C. Frings and N. Damer and C. Busch
IEEE Technology and Society Magazine, Vol.41, p.71–82
[Journal Article]


Deep face fuzzy vault: Implementation and performance
C. Rathgeb and J. Merkle and J. Scholz and B. Tams and V. Nesterowicz
Computers & Security
[Journal Article]