Publications

Publications

Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model
Krachenfels, Thilo; Ganji, Fatemeh; Moradi, Amir; Tajik, Shahin; Seifert, Jean-Pierre
Symposium on Security and Privacy (SP) 2021
[Conference Paper]


Privacy-Enhanced Robust Image Hashing with Bloom Filters
Breidenbach, Uwe; Steinebach, Martin; Liu, Huajian
International Conference on Availability, Reliability and Security (ARES) 2020
[Journal Article]


Let's Downgrade Let's Encrypt
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security (CCS) 2021
[Conference Paper]


Tracing Contacts with Mobile Phones to Curb the Pandemic: Topics and Stances in People's Online Comments about the Oficial German Contact-Tracing App
Arzt, Steven; Poller, Andreas; Vallejo, Gisela
Conference on Human Factors in Computing Systems (CHI) 2021
[Conference Paper]


Security and Quality: Two Sides of the Same Coin?
Arzt, Steven
International Workshop on the State Of the Art in Program Analysis (SOAP) 2021
[Conference Paper]


Achieving Facial De-Identification by Taking Advantage of the Latent Space of Generative Adversial Networks
Frick, Raphael Antonius; Steinebach, Martin
Gesellschaft für Informatik (GI Jahrestagung) 2021
[Conference Paper]


Risikobewertung von Schwachstellen
Kreutzer, Michael; Schreiber, Linda
[Book Article]


Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3
Paul, Sebastian; Kuzovkova, Yulia; Lahr, Norman; Niederhagen, Ruben
[Paper]


SSLChecker
Shulman, Haya; Waidner, Michael
Conference on Computer Communications (INFOCOM) 2021
[Conference Paper]


A Close Look at Robust Hash Flip Positions
Steinebach, Martin
International Symposium on Electronic Imaging Science and Technology (IS&T) 2021
[Conference Paper]


Phishing detection on tor hidden services
Steinebach, Martin; Zenglein, Sascha; Brandl, Katharina
European Digital Forensics Research Workshop (DFRWS) 2021
[Journal Article]


An Axiomatic Perspective on the Performance Effects of End-Host Path Selection
Scherrer, Simon; Legner, Markus; Perrig, Adrian; Schmid, Stefan
International Symposium on Computer Performance, Modeling, Measurements and Evaluation (PERFORMANCE) 2021
[Paper]


Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging
Krachenfels, Thilo; Seifert, Jean-Pierre; Tajik, Shahin
Workshop on Attacks and Solutions in Hardware Security (ASHES) 2021
[Conference Paper]


Towards Automatically Generating Security Analyses from Machine-Learned Library Models
Kober, Maria; Arzt, Steven
European Symposium on Research in Computer Security (ESORICS) 2021
[Poster]


Trustworthy things
Birkholz, H.; Fossati, T.
Descriptive Approaches to IoT Security, Network, and Application Configuration (DAI-SNAC) 2021
[Conference Paper]


Fragmentation Attacks on DNS over TCP
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
International Conference on Distributed Computing Systems (ICDCS) 2021
[Conference Paper]


An Economic Analysis of Appropriateness under Article 32 GDPR
Selzer, Annika; Woods, Daniel; Böhme, Rainer
[Journal Article]


Extraction of Secrets from Allegedly Secret-free IoT Sensors using Artificial Intelligence
Kiyan, Tuba; Krachenfels, Thilo; Amini, Elham; Shakibaei, Zarin; Boit, Christian; Seifert, Jean-Pierre
International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA) 282021
[Conference Paper]


User-Centered Design of Visualizations for Software Vulnerability Reports
Reynolds, Steven Lamarr; Mertz, Tobias; Arzt, Steven; Kohlhammer, Jörn
Symposium on Visualization for Cyber Security (VizSec) 2021
[Conference Paper]


Conceptual Design and Analysis of a Mobile Digital Identity for eHealth Applications
Spychalski, Dominik; Rode, Olaf; Ritthaler, Markus; Raptis, Georgios
International Conference on Biomedical and Health Informatics (BHI) 2021
[Conference Paper]


PrivInferVis: Towards Enhancing Transparency over Attribute Inference in Online Social Networks
Simo, Hervais; Shulman, Haya; Schufrin, Marija; Reynolds, Steven Lamarr; Kohlhammer, Jörn
Conference on Computer Communications (INFOCOM) 2021
[Conference Paper]


Detecting Deepfakes with Haralicks Texture Properties
Frick, Raphael Antonius; Zmudzinski, Sascha; Steinebach, Martin
International Symposium on Electronic Imaging Science and Technology (IS&T) 2021
[Conference Paper]


Adversarial Examples zum Selbstdatenschutz? Der Fall biometrischer Gesichtserkennung im öffentlichen Raum
Bunzel, Niklas; Zander, Neele; Landwirth, Robert; Riedel, Ann-Katrin
Gesellschaft für Informatik (GI Jahrestagung) 2021
[Conference Paper]


Potenziale anonymer Da­ten­verarbeitungen nutzen. Ein Vorschlag für Smart Cities
Selzer, Annika; Timm, Ingo J.
[Journal Article]


Off-path VoIP Interception Attacks
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
International Conference on Distributed Computing Systems (ICDCS) 2021
[Conference Paper]


Improved scalability of demand-aware datacenter topologies with minimal route lengths and congestion
Pacut, Maciej; Dai, Wenkai; Labbe, Alexandre; Foerster, Klaus-T.; Schmid, Stefan
[Journal Article]


Network Traffic Characteristics of Machine Learning Frameworks Under the Microscope
Zerwas, Johannes; Aykurt, Kaan; Schmid, Stefan; Blenk, Andreas
International Conference on Network and Service Management (CNSM) 2021
[Conference Paper]


Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods
Zelle, Daniel; Lauser, Timm; Kern, Dustin; Krauß, Christoph
International Conference on Availability, Reliability and Security (ARES) 2021
[Conference Paper]


Linking loose ends: An interdisciplinary privacy and communication model
Bräunlich, Katharina; Dienlin, Tobias; Eichenhofer, Johannes; Helm, Paula; Trepte, Sabine; Grimm, Rüdiger; Seubert, Sandra; Gusy, Christoph
[Journal Article]


Einsatz von FIDO2 im PSD II-konformen Zahlungsverkehr
Heider, Jens
[Journal Article]