Publications
Publications
LightShed: Defeating Perturbation-based Image Copyright Protections
Foerster, Hanna; Behrouzi, Sasha; Rieger, Phillip; Jadliwala, Murtuza; Sadeghi, Ahmad-Reza
Proceedings of the 34th USENIX Security Symposium, p.7271-7290
[Conference Proceedings]
ZORRO: Zero-Knowledge Robustness and Privacy for Split Learning
Sheybani, Nojan; Pegoraro, Alessandro; Knauer, Jonathan; Rieger, Phillip; Mollakuqe, Elissa; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza
CCS '25: Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.321-334
[Conference Proceedings]
Learning to Identify Conflicts in RPKI
Haya Schulmann and Shujie Zhao
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, p.1490–1505
[Conference Proceedings]
ValidaTor: Domain Validation over Tor
Jens Frieß and Haya Schulmann and Michael Waidner
22nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 25), p.1367–1380
[Conference Proceedings]
SoK: An Introspective Analysis of RPKI Security
Donika Mirdita and Haya Schulmann and Michael Waidner
34th USENIX Security Symposium (USENIX Security 25), p.3649–3665
[Journal Article]
Stealth BGP Hijacks with uRPF Filtering
Haya Schulmann and Shujie Zhao
19th USENIX WOOT Conference on Offensive Technologies (WOOT 25), p.129–138
[Conference Proceedings]
Poster: Exploring the Landscape of RPKI Relying Parties
Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4773–4775
[Conference Proceedings]
Poster: We must talk about RPKI Repositories
Haya Schulmann and Niklas Vogel
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4755–4757
[Conference Proceedings]
Poster: The Rocky Road Towards RPKI Algorithm Agility
Katharina Miesch and Haya Schulmann and Niklas Vogel
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4767–4769
[Conference Proceedings]
Demo: Stopping Production Testing: A Graphical RPKI Test-Suite
Tobias Kirsch and Haya Schulmann and Niklas Vogel
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4722–4723
[Conference Proceedings]
Künstliche Intelligenz bei Webanwendungen
Wilmer, Thomas
Datenschutz und Internet
Rechtsgrundlagen der Verarbeitung in der Datenschutz-Grundverordnung
Wilmer, Thomas
Datenschutz und Internet
Grundsätze für die Verarbeitung personenbezogener Daten nach Art. 5 DS-GVO
Wilmer, Thomas
Datenschutz und Internet
TDDDG Telekommunikation-Digitale-Dienste-Datenschutz-Gesetz Kommentar
Riechert, Anne and Wilmer, Thomas and Brock, Marc Oliver and Golland, Alexander and Keppeler, Lutz Martin and Raji, Behrang and Riechert, Anne and Sesing-Wagenpfeil, Andreas and Ströbel, Lukas and Voß, Jan Peter and Wilmer, Thomas
[Book]
Post-Quantum Cryptography in eMRTDs – Evaluating PAKE and PKI for Travel Documents
N. Alnahawi and M. Azouaoui and J. Bos and G. Davies and S. Moon and C. van Vredendaal and A. Wiesmaier
Security Standardisation Research Conference (SSR'25)
[Conference Proceedings]
Improving Anomaly Detection for Electric Vehicle Charging with Generative Adversarial Networks
Ha The, Viet and Kern, Dustin and Nguyen Tan, Phat and Krauß, Christoph
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing SAC, p.1800–1809
[Conference Proceedings]
Anomaly Detection and Mitigation for Electric Vehicle Charging-Based Attacks on the Power Grid
Kern, Dustin and Krauß, Christoph and Hollick, Matthias
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing SAC, p.1790–1799
[Conference Proceedings]
Data Distribution and Redistribution - A formal and practical Analysis of the DDS Security Standard
Lauser, Timm and Müller, Maximilian and Baumgart, Ingmar and Krauß, Christoph
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing SAC, p.1839–1848
[Conference Proceedings]
Streamlining Plug-and-Charge Authorization for Electric Vehicles with OAuth 2 and OpenID Federation
Primbs, Jonas and Kern, Dustin and Menth, Michael and Krauß, Christoph
IEEE Access, Vol.13, p.168711-168731
[Journal Article]
RollCAN – CAN-bus based RollJam-Attack
Hamborg, Jannis and Lauser, Timm and Krauß, Christoph
Proceedings of the 2nd Cyber Security in CarS Workshop
[Conference Proceedings]
Towards a Holistic and Multi-Modal Vehicle Security Monitoring
Yekta, Ali Recai and Spychalski, Dominik and Yekta, Cenk and Heinrich, Markus and Krauß, Christoph and Katzenbeisser, Stefan
Proceedings of the 20th International Conference on Critical Information Infrastructures Security (CRITIS)
[Conference Proceedings]
CarDS - Controller Area Network and Automotive Ethernet Realistic Data Set
Hellemans, Wouter and Hamborg, Jannis and Lauser, Timm and Rabbani, Md Masoom and Preneel, Bart and Krauß, Christoph and Mentens, Nele
Proceedings of the 41st Annual Computer Security Applications Conference (ACSAC)
[Conference Proceedings]
A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection?
Henrich, Johanna
and Schmitt, Nicolai
and Alnahawi, Nouri
and Heinemann, Andreas
Information Security, p.107–128
[Conference Proceedings]
Simulation-Based Software Leakage Evaluation for the RISC-V Platform
Schmitt, Nicolai
and Zeitschner, Jannik
and Heinemann, Andreas
Information Security, p.175–195
[Conference Proceedings]
DemoQuanDT: a carrier-grade QKD network
P. Horoschenkoff and J. Henrich and R. Böhn and I. Khan and J. Rödiger and M. Gunkel and M. Bauch and J. Benda and P. Bläcker and E. Eichhammer and U. Eismann and G. Frenck and H. Griesser and W. Jontofsohn and N. Kopshoff and S. Röhrich and F. Seidl and N. Schark and E. Sollner and D. von Blanckenburg and A. Heinemann and M. Stiemerling and M. Gärtner
J. Opt. Commun. Netw., Vol.17, p.743–756
[Journal Article]
Syn-IDPass: Passport Synthetic Dataset for Presentation Attack Detection?
J. E. Tapia and F. Stockhardt and L. J. Gonzalez-Soler and C. Busch
Proc. IEEE Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]
Single-morphing attack detection using few-shot learning and triplet-loss
J. E. Tapia and D. Schulz and C. Busch
Neurocomputing
[Conference Proceedings]
Generating Automatically Print/Scan Textures for Morphing Attack Detection Applications
J. E. Tapia and M. Russo and C. Busch
IEEE Access
[Conference Proceedings]
Towards Iris Presentation Attack Detection with Foundation Models
J. E. Tapia and L. J. Gonzalez-Soler and C. Busch
The 19th IEEE International Conference on Automatic Face and Gesture
[Conference Proceedings]
Are Morphed Periocular Iris Images a Threat to Iris Recognition?
J. Tapia, S. Gonzalez, D. Benalcazar and C. Busch
IEEE Trans. on Information Forensics and Security, Vol.20, p.12417-12428
[Journal Article]


