Publications
Publications
Conditional Face Image Manipulation Detection: Combining Algorithm and Human Examiner Decisions
Ibsen, M.; Nichols, R.; Rathgeb, C.; Robertson, D.; Davis, J.; L\ov\aasdal, F.; Raja, K.; Jenkins, R.; Busch, C.
ACM Workshop on Information Hiding and Multimedia Security
[Conference Proceedings]
Efficient Expression Neutrality Estimation with Application to Face Recognition Utility Prediction
Grimmer, M.; Veldhuis, R.; Busch, C.
Proc. Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]
TattTRN: Template Reconstruction Network for Tattoo Retrieval
Gonzalez-Soler, L. J.; Salwowski, M.; Rathgeb, C.; Fischer, D.
Intl. Conf. on Computer Vision and Pattern Recognition Workshops (CVPRW)
[Conference Proceedings]
PCR-HIQA: Perceptual Classifiability Ratio for Hand Image Quality Assessment
Gonzalez-Soler, L. J.; Grimmer, M.; Fischer, D.; Rathgeb, C.; Busch, C.
Proc. Intl. Joint Conf. on Biometrics (IJCB), p.1-10
[Conference Proceedings]
Information Fusion and Hand Alignment to Improve Hand Recognition in Forensic Scenarios
Gonzalez-Soler, J.; ottir, D. K. J\ onsd\; Rathgeb, C.; Fischer, D.
IEEE Access, Vol.12, p.52941-52950
[Journal Article]
Contactless Hand Biometrics for Forensics: Review and Performance Benchmark
Gonzalez-Soler, J.; Zyla, K.; Rathgeb, C.; Fischer, D.
EURASIP Journal on Image and Video Processing (JIVP), p.34
[Journal Article]
Child Face Recognition at Scale: Synthetic Data Generation and Performance Benchmark
Falkenberg, M.; Ottsen, A. B.; Ibsen, M.; Rathgeb, C.
Frontiers in Signal Processing
[Journal Article]
Detection and Mitigation of Bias in Under Exposure Estimation for Face Image Quality Assessment
Dörsch, A.; Rathgeb, C.; Grimmer, M.; Busch, C.
Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-5
[Conference Proceedings]
Analysis of behavioural curves to classify iris images under the influence of alcohol, drugs, and sleepiness conditions
Causa, L.; Tapia, J.; Perez, C.; Busch, C.
Expert Systems With Applications
[Journal Article]
Challenges for automated face recognition systems
Busch, C.
Nature Reviews Electrical Engineering
[Journal Article]
BRAKE: Biometric Resilient Authenticated Key Exchange
Bauspieß, P.; Silde, T.; Poljuha, M.; Tullot, A.; Costache, A.; Rathgeb, C.; Kolberg, J.; Busch, C
IEEE Access, Vol.12, p.46596-46615
[Journal Article]
Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4
Beullens, Ward; Campos, Fabio; Celi, Sof\ \ia; Hess, Basil; Kannwischer, Matthias J
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol.2024, p.252-275
[Journal Article]
Optimizations and Practicality of High-Security CSIDH
Campos, Fabio; Chávez-Saab, Jorge; Chi-Dom\ \inguez, Jesús-Javier; Meyer, Michael; Reijnders, Krijn; Rodr\ \iguez-Henr\ \iquez, Francisco; Schwabe, Peter; Wiggers, Thom
IACR Communications in Cryptology, Vol.1, p.5
[Journal Article]
Analyzing the Effectiveness of Image Preprocessing Defenses Under Runtime Constraints
Bunzel, Niklas; Klause, Gerrit
International Conference on Trust, Security and Privacy in Computing and Communications 2024
[Conference Paper]
The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Heftrig, Elias; Shulman, Haya; Vogel, Niklas; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]
Decision-based Data Distribution (D3): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios
Linsner, Sebastian; Demuth, Kilian; Fischlin, Marc; Reuter, Christian
Proceedings on Privacy Enhancing Technologies (PoPETs), p.185-208
[Journal Article]
Integrating Causality in Messaging Channels
Chen, Shan; Fischlin, Marc
Advances in Cryptology - EUROCRYPT 2024, p.251-282
[Conference Proceedings]
BUFFing FALCON Without Increasing the Signature Size
Düzlü, Samed; Fiedler, Rune; Fischlin, Marc
Selected Areas in Cryptography - SAC 2024, p.131-150
[Conference Proceedings]
Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication
Fischlin, Marc; Sanina, Olga
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4762-4776
[Conference Proceedings]
Post-Quantum Asynchronous Remote Key Generation for FIDO2
Brendel, Jacqueline; Clermont, Sebastian; Fischlin, Marc
Advances in Cryptology - ASIACRYPT 2024, p.465-493
[Conference Proceedings]
WAPITI - A Weighted Bayesian Method for Private Information Inference on Social Ego Networks
Simo Fhom, Hervais-Clemence; Kreutzer, Michael
International Conference on Trust, Security and Privacy in Computing and Communications 2024
[Conference Paper]
Wie stellen sich Nutzende ihren Privatsphäre-Assistenten vor?
Stöver, Alina; Hahn, Sara; Althaus, Simon; Zimmer, Ephraim; Gerber, Nina
Datenschutz und Datensicherheit - DuD, p.633-636
[Journal Article]
Multi-Party Computation als Instrument zur Umsetzung datenschutzkonformer behördlicher Datenabgleiche: Eine interdisziplinäre Analyse am Beispiel der Diskussionen um das Gesetz zur Selbstbestimmung über den Geschlechtseintrag
Seyda, Linda; Brüggemann, Andreas; Hornung, Gerrit; Schneider, Thomas
INFORMATIK 2024, Workshop Recht und Technik: Datenschutz im Diskurs (RuT'24), p.153-167
[Journal Article, Conference Proceedings]
Fuzzerfly Effect: Hardware Fuzzing for Memory Safety
Rostami, Mohamadreza; Chen, Chen; Kande, Rahul; Li, Huimin; Rajendran, Jeyavijayan; Sadeghi, Ahmad-Reza
IEEE Security & Privacy, p.76-86
[Journal Article]
Defying the Odds: Solana’s Unexpected Resilience in Spite of the Security Challenges Faced by Developers
Andreina, Sebastien; Cloosters, Tobias; Davi, Lucas; Giesen, Jens-Rene; Gutfleisch, Marco; Karame, Ghassan; Naiakshina, Alena; Naji, Houda
Proc. of the 31th ACM SIGSAC Conference on Computer & Communications Security (CCS)
[Conference Proceedings]
Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing
Rostami, Mohamadreza; Chilese, Marco; Zeitouni, Shaza; Kande, Rahul; Rajendran, Jeyavijayan; Sadeghi, Ahmad-Reza
2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), p.1-6
[Conference Proceedings]
WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors
Borkar, Pallavi; Chen, Chen; Rostami, Mohamadreza; Singh, Nikhilesh; Kande, Rahul; Sadeghi, Ahmad-Reza; Rebeiro, Chester; Rajendran, Jeyavijayan
33rd USENIX Security Symposium (USENIX Security 24), p.5377-5394
[Conference Proceedings]
Broadcast and Consensus in Stochastic Dynamic Networks with Byzantine Nodes and Adversarial Edges
El-Hayek, Antoine; Henzinger, Monika; Schmid, Stefan
International Symposium on Distributed Computing 2024
[Conference Paper]
Lost and Found in Speculation: Hybrid Speculative Vulnerability Detection
Rostami, Mohamadreza; Zeitouni, Shaza; Kande, Rahul; Chen, Chen; Mahmoody, Pouya; Rajendran, Jeyavijayan; Sadeghi, Ahmad-Reza
Proceedings of the 61st ACM/IEEE Design Automation Conference
[Conference Proceedings]
Poster: From Fort to Foe: The Threat of RCE in RPKI
Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]


