Publications

Publications

Distributed Construction of Demand-Aware Datacenter Networks
Figiel, Aleksander; Melnyk, Darya; Milentijevic, Tijana; Schmid, Stefan
39th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2025
[Conference Paper]


Fraunhofer SIT at GenAI Detection Task 1: Adapter Fusion for AI-generated Text Detection
Schäfer, Karla; Steinebach, Martin
1st Workshop on GenAI Content Detection, GenAIDetect 2025
[Conference Paper]


Security Assessment of Mobile Banking Apps in West African Economic and Monetary Union
Diallo, Alioune; War, Aicha; Diouf, Moustapha Awwalou; Samhi, Jordan; Arzt, Steven; Bissyandé, Tégawendé François; Klein, Jacques
2nd Cyber­security for Development, C4D 2025
[Conference Paper]


Learning to Identify Conflicts in RPKI
Shulman, Haya; Zhao, Shujie
20th ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2025
[Conference Paper]


Enhancing Transparency and Trust in Remote Attestation for Secure IT and OT Systems
Eckel, Michael
[Thesis]


Secure Management of Connected Vehicles using Trusted Computing-enabled Central Security Provider
Plappert, Christian
[Thesis]


Second Competition on Presentation Attack Detection on ID Card
Tapia, Juan E.; Nieto, Mario; Espin, Juan M.; Rocamora, Alvaro S.; Barrachina, Javier; Damer, Naser; Busch, Christoph; Ivanovska, Marija; Todorov, Leon; Khizbullin, Renat; Lazarevich, Lazar; Grishin, Aleksei; Schulz, Daniel; Gonzalez, Sebastian; Mohammadi, Amir; Kotwal, Ketan; Marcel, Sebastien; Mudgalgundurao, Raghavendra; Raja, Kiran; Schuch, Patrick; Patwardhan, Sushrut; Ramachandra, Raghavendra; Pereira, Pedro Couto; Pinto, Joao Ribeiro; Xavier, Mariana; Valenzuela, Andrés; Lara, Rodrigo; Batagelj, Borut; Peterlin, Marko; Peer, Peter; Muhammed, Ajnas; Nunes, Diogo; Gonçalves, Nuno
International Joint Conference on Biometrics 2025
[Conference Paper]


Recht und Technik - Datenschutz im Diskurs Vorwort zu den Workshopbeiträgen
Grimm, Rüdiger; Hornung, Gerrit; Sorge, Christoph; Döhmann genannt Spiecker, Indra
Gesellschaft für Informatik (Jahrestagung) 2025
[Conference Paper]


Automatisierung offensiver Cybersicherheitsmaßnahmen
Esser, Julia; Plötz, Caroline
Gesellschaft für Informatik (Jahrestagung) 2025
[Conference Paper]


Characterizing Hosting and Security Practices for Public-Facing LDAP Servers
Cesar, Gustavo Luvizotto; Öndarö, Gurur; Kaspereit, Jonas; Ising, Fabian; Schinzel, Sebastian; Jonker, Mattijs; Holz, Ralph G.
International Conference on Network and Service Management 2025
[Conference Paper]


Terminator: Enabling Efficient Fuzzing of Closed-Source GUI Programs by Automatic Coverage-Guided Termination
Zabel, Jonas; Kolvenbach, Philip; Arzt, Steven
International Conference on Automated Software Engineering 2025
[Conference Paper]


Photonic Side-Channel Analyzer: Enabling Security-Aware Physical Design Methodology
Wang, Meizhi; Chen, Yi-Ru; Nibhanupudi, S.S. Teja; Amini, Elham; Saavedra, Antonio; Wang, Yinan; Wasserman, Daniel; Seifert, Jean-Pierre; Kulkarni, Jaydeep P.
International Symposium on Physical Design 2025
[Conference Paper]


Disinformation Analysis on Telegram: A Metadata-Centered, Privacy-Aware Dataset
Choi, Jeong-Eun; Schäfer, Karla; Yannikos, York; Steinebach, Martin
International Conference on Big Data 2025
[Conference Paper]


Towards Interpretable Suicide Risk Prediction: A Hybrid Approach with Feature Extraction and Sequential Binary Classification
Choi, Jeong-Eun; Fan, Shiying
International Conference on Big Data 2025
[Conference Paper]


Exploring the Relationship Between Network Similarity and Transferability of Adversarial Attacks
Klause, Gerrit; Bunzel, Niklas
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]


Trade-offs in Cross-Domain Generalization of Foundation Model Fine-Tuned for Biometric Applications
Chettaoui, Tahar; Damer, Naser; Boutros, Fadi
International Joint Conference on Biometrics 2025
[Conference Paper]


SwitchAR: Enabling Perceptual Manipulations in Augmented Reality Leveraging Change Blindness and Inattentional Blindness
Wombacher, Jonas; Li, Zhipeng; Gugenheimer, Jan
CHI EA '25: Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems
[Conference Proceedings]


SwitchAR: Perceptual Manipulations in Augmented Reality
Wombacher, Jonas; Li, Zhipeng; Gugenheimer, Jan
UIST '25: Proceedings of the 38th Annual ACM Symposium on User Interface Software and Technology
[Conference Proceedings]


LightShed: Defeating Perturbation-based Image Copyright Protections
Foerster, Hanna; Behrouzi, Sasha; Rieger, Phillip; Jadliwala, Murtuza; Sadeghi, Ahmad-Reza
Proceedings of the 34th USENIX Security Symposium, p.7271-7290
[Conference Proceedings]


ZORRO: Zero-Knowledge Robustness and Privacy for Split Learning
Sheybani, Nojan; Pegoraro, Alessandro; Knauer, Jonathan; Rieger, Phillip; Mollakuqe, Elissa; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza
CCS '25: Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.321-334
[Conference Proceedings]


Learning to Identify Conflicts in RPKI
Haya Schulmann and Shujie Zhao
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, p.1490–1505
[Conference Proceedings]


ValidaTor: Domain Validation over Tor
Jens Frieß and Haya Schulmann and Michael Waidner
22nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 25), p.1367–1380
[Conference Proceedings]


SoK: An Introspective Analysis of RPKI Security
Donika Mirdita and Haya Schulmann and Michael Waidner
34th USENIX Security Symposium (USENIX Security 25), p.3649–3665
[Journal Article]


Stealth BGP Hijacks with uRPF Filtering
Haya Schulmann and Shujie Zhao
19th USENIX WOOT Conference on Offensive Technologies (WOOT 25), p.129–138
[Conference Proceedings]


Poster: Exploring the Landscape of RPKI Relying Parties
Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4773–4775
[Conference Proceedings]


Poster: We must talk about RPKI Repositories
Haya Schulmann and Niklas Vogel
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4755–4757
[Conference Proceedings]


Poster: The Rocky Road Towards RPKI Algorithm Agility
Katharina Miesch and Haya Schulmann and Niklas Vogel
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4767–4769
[Conference Proceedings]


Demo: Stopping Production Testing: A Graphical RPKI Test-Suite
Tobias Kirsch and Haya Schulmann and Niklas Vogel
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4722–4723
[Conference Proceedings]


Künstliche Intelligenz bei Webanwendungen
Wilmer, Thomas
Datenschutz und Internet


Rechtsgrundlagen der Verarbeitung in der Datenschutz-Grundverordnung
Wilmer, Thomas
Datenschutz und Internet