Publications

Publications

Limiting the Power of RPKI Authorities
Shrishak, Kris; Shulman, Haya
Applied Networking Research Workshop (ANRW) 2020
[Conference Paper]


SEPAD - Security Evaluation Platform for Autonomous Driving
Zelle, Daniel; Rieke, Roland; Plappert, Christian; Krauß, Christoph; Levshun, Dmitry; Chechulin, Andrey
International Conference on Parallel, Distributed and Network-Based Processing (PDP) 2020
[Conference Paper]


Concise Identities. Version 02
Birkholz, Henk; Bormann, Carsten; Pritikin, Max; Moskowitz, Robert
[Report]


IT-Sicherheitsarchitektur für die nächste Generation der Leit- und Sicherheitstechnik
Heinrich, Markus; Krauß, Christoph; Zhdanova, Maria; Eckel, Michael; Katzenbeisser, Stefan; Kuzhiyelil, Don; Cosic, Jasmin; Drodt, Matthias
[Journal Article]


The Lattice-Based Digital Signature Scheme qTESLA
Alkim, E.; Barreto, P.S.L.M.; Bindel, N.; Krämer, J.; Longa, P.; Ricardini, J.E.
International Conference on Applied Cryptography and Network Security (ACNS) 2020
[Conference Paper]


Ensuring the Integrity and Security of Network Equipment is Critical in the Fight Against Cyber Attacks
Eckel, Michael; Laffey, Tom
[Journal Article]


Machine Learning Application for Prediction of Sapphire Crystals Defects
Klunnikova, Yulia Vladimirovna; Anikeev, Maxim Vladimirovich; Filimonov, Alexey Vladimirovich; Kumar, Ravi
[Journal Article]


Detection and Analysis of Tor Onion Services
Steinebach, Martin; Schäfer, Marcel; Karakuz, Alexander; Brandl, Katharina
[Journal Article]


Sicherheitskennzahlen: Metriken aus Angreifer-Sicht
Stöwer, Mechthild; Klaus, Marko
[Journal Article]


Side Channel Information Set Decoding Using Iterative Chunking
Lahr, Norman; Niederhagen, Ruben; Petri, Richard; Samardjiska, Simona
International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT) 2020
[Conference Paper]


Cryptanalysis of FNV-Based cookies
Klein, A.; Shulman, H.; Waidner, M.
Global Communications Conference (GLOBECOM) 2020
[Conference Paper]


A location privacy analysis of Bluetooth mesh
Caesar, Matthias; Steffan, Jan
[Journal Article]


Automatisierte Erkennung von Desinformationen
Halvani, Oren; Heereman von Zuydtwyck, Wendy; Herfert, Michael; Kreutzer, Michael; Liu, Huajian; Simo Fhom, Hervais-Clemence; Steinebach, Martin; Vogel, Inna; Wolf, Ruben; Yannikos, York; Zmudzinski, Sascha
[Book Article]


DFarm: Massive-Scaling Dynamic Android App Analysis on Real Hardware
Miltenberger, Marc; Gerding, Julien; Guthmann, Jens; Arzt, Steven
International Conference on Mobile Software Engineering and Systems (MOBILESoft) 2020
[Conference Paper]


Technische Erkennung von Desinformation - Von Kopien über Montagen bis zu Deep-Fake-Videos
Waidner, Michael; Steinebach, Martin; Kreutzer, Michael
[Book Article]


Pitfalls of provably secure systems in internet the case of chronos-NTP
Jeitner, P.; Shulman, H.; Waidner, M.
International Conference on Dependable Systems and Networks (DSN) 2020
[Conference Paper]


Secure consensus generation with distributed DoH
Jeitner, P.; Shulman, H.; Waidner, M.
International Conference on Dependable Systems and Networks (DSN) 2020
[Conference Paper]


Privacy und Big Data
Winter, Christian; Steinebach, Martin; Heereman, Wendy; Steiner, Simone; Battis, Verena; Halvani, Oren; Yannikos, York; Schüßler, Christoph
[Study]


Automatisierung beim Auffinden radikaler Inhalte im Internet
Steinebach, Martin; Vogel, Inna; Yannikos, York; Regev, Roey
[Book Article]


Eberbacher Gespräch on "AI, Security & Privacy"
Kreutzer, Michael; Küch, Oliver; Steinebach, Martin
[Report]


Towards Secure Urban Infrastructures: Cyber Security Challenges for Information and Communication Technology in Smart Cities
Reuter, Christian; Haunschild, Jasmin; Hollick, Matthias; Mühlhäuser, Max; Vogt, Joachim; Kreutzer, Michael
Konferenz "Mensch und Computer" (MuC) 2020
[Conference Paper]


TAVeer: An interpretable topic-agnostic authorship verification method
Halvani, Oren; Graner, Lukas; Regev, Roey
International Conference on Availability, Reliability and Security (ARES) 2020
[Conference Paper]


Cortex-M4 Optimizations for \{R,M\}LWE Schemes
Alkim, Erdem; Bilgin, Yusuf Alper; Cenk, Murat; Gérard, Francois
[Paper]


Secure Attestation of Virtualized Environments
Eckel, Michael; Fuchs, Andreas; Repp, Jürgen; Springer, Markus
International Conference on ICT Systems Security and Privacy Protection (SEC) 2020
[Conference Paper]


Herstellung und Detektion von Videos und Bildern mit KI und deren Bezug zu Beweismitteln
Woithe, Jennifer; Becker, Sven; Labudde, Dirk
[Book Article]


Auswahl und Nutzung web­ba­sier­ter Kom­muni­kations­dienste in Zeiten von Corona
Selzer, Annika; Stummer, Sarah; Waldmann, Ulrich
[Report]


TrustEV: Trustworthy Electric Vehicle Charging and Billing
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
Symposium on Applied Computing (SAC) 2020
[Conference Paper]


Anonymisierung und Pseudonymisierung von Daten für Projekte des maschinellen Lernens
Aichroth, Patrick; Battis, Verena; Dewes, Andreas; Dibak, Christoph; Doroshenko, Vadym; Geiger, Bernd; Graner, Lukas; Holly, Steffen; Huth, Michael; Kämpgen, Benedikt; Kaulartz, Markus; Mundt, Michael; Rapp, Hermann; Steinebach, Martin; Sushko, Yurii; Swarat, Dominic; Winter, Christian; Weiß, Rebekka
[Book]


Detecting and tracking criminals in the real world through an IoT-based system
Tundis, A.; Kaleem, H.; Mühlhäuser, M.
[Journal Article]


Fake News Spreader Detection on Twitter using Character N-Grams
Vogel, Inna; Meghana, Meghana
Conference and Labs of the Evaluation Forum (CLEF) 2020
[Conference Paper]