Publications

Publications

Analysis and Evaluation of Hardware Trust Anchors in the Automotive Domain
Plappert, Christian; Fuchs, Andreas; Heddergott, Ronald
International Conference on Availability, Reliability and Security 2022
[Conference Paper]


A Synopsis of Critical Aspects for Darknet Research
Platzer, Florian; Lux, Alexandra
International Conference on Availability, Reliability and Security 2022
[Conference Paper]


How (Not) to Deploy Cryptography on the Internet
Shulman, Haya
Conference on Data and Application Security and Privacy 2022
[Conference Paper]


Einleitung: Selbstbestimmung und Privatheit – Gestaltungsoptionen für einen europäischen Weg
Friedewald, Michael; Kreutzer, Michael; Hansen, Marit
[Book Article]


Image montage detection based on image segmentation and robust hashing techniques
Steinebach, Martin; Berwanger, Tiberius; Liu, Huajian
International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics 2022
[Journal Article]


Prognose Securitybedarf und Bewertung möglicher Sicherheitskonzepte. Teil 1: Technologieprognose
Leining, Michael; Schubert, Max; Heinrich, Markus; Katzenbeisser, Stefan; Unger, Simon; Krauß, Christoph; Scheuermann, Dirk
[Report]


REGRETS: A New Corpus of Regrettable (Self-) Disclosures on Social Media
Simo Fhom, Hervais-Clemence; Kreutzer, Michael
Conference on Computer Communications 2022
[Conference Paper]


Cultural assets identification using transfer learning
Burgert, Simon; Liu, Huajian; Berchtold, Waldemar; Steinebach, Martin
Conference "Imaging and Multimedia Analytics at the Edge" 2022
[Journal Article]


From IP to transport and beyond: Cross-layer attacks against applications
Dai, Tianxiang; Jeitner, Philipp; Shulman, Haya; Waidner, Michael
[Paper]


SECPAT: Security Patterns for Resilient Automotive E / E Architectures
Plappert, Christian; Fenzl, Florian; Rieke, Roland; Matteucci, Ilaria; Costantino, Gianpiero; Vincenzi, Marco de
International Conference on Parallel, Distributed and Network-Based Processing 2022
[Conference Paper]


Zulässigkeit von Open Source-Ermittlungen zur Strafverfolgung im Darknet
Wittmer, Sandra; Platzer, Florian
Gesellschaft für Informatik (Jahrestagung) 2022
[Conference Paper]


Natural Language Processing (NLP) und der Datenschutz - Chancen und Risiken für den Schutz der Privatheit
Vogel, Inna; Setz, Tahireh; Choi, Jeong-Eun; Steinebach, Martin
Gesellschaft für Informatik (Jahrestagung) 2022
[Conference Paper]


Authentizitätsnachweis bei Multimediadaten
Berchtold, Waldemar
[Thesis]


Mehr Sicherheit durch Farbe - Digitale Siegel und der neue internationale JAB-Code Standard
Thenée, Nicolas; Schnattinger, Thomas; Berchtold, Waldemar; Liu, Huajian
Deutscher IT-Sicherheitskongress 2022
[Conference Paper]


Decision Tree-Based Rule Derivation for Intrusion Detection in Safety-Critical Automotive Systems
Buschlinger, Lucas; Rieke, Roland; Sarda, Sanat; Krauß, Christoph
International Conference on Parallel, Distributed and Network-Based Processing 2022
[Conference Paper]


An Introduction to the exFAT File System and How to Hide Data Within
Heeger, Julian; Yannikos, York; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) 2021
[Journal Article]


Similarity Analysis of Single-Vendor Marketplaces in the Tor-Network
Platzer, Florian; Brenner, Fabian; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) 2021
[Journal Article]


Online-Privatheitskompetenz und Möglich­keiten der technischen Umsetzung mit dem Anonymisierungsnetzwerk Tor
Lux, Alexandra; Platzer, Florian
[Book Article]


Der Wert des Anonymen
Landwirth, Robert
[Book Article]


Ausprägungen von Uploadfiltern
Steinebach, Martin
[Book Article]


Datenschutz- und Sicherheitsanalyse von Mobilen Learning Apps
Dass, Sunny; Kreutzer, Michael; Schreiber, Linda; Simo Fhom, Hervais-Clemence
[Book Article]


Maschinelles Lernen und das Recht auf Nichtwissen
Kreutzer, Michael; Mittermeier, Johanna
[Book Article]


Deanonymisierung im Tor-Netzwerk - Technische Möglich­keiten und rechtliche Rahmen­bedingungen
Wittmer, Sandra; Platzer, Florian; Steinebach, Martin; Yannikos, York
[Book Article]


Context, Prioritization, and Unexpectedness: Factors Influencing User Attitudes About Infographic and Comic Consent
Doan, Xengie Cheng; Selzer, Annika; Rossi, Arianna; Botes, Wilhelmina Maria; Lenzini, Gabriele
International Workshop on Consent Management in Online Services, Networks and Things 2022
[Conference Paper]


Digitaler Fußabdruck
Conrad, Bernd; Kreutzer, Michael; Mittermeier, Johanna; Schreiber, Linda; Simo Fhom, Hervais-Clemence
[Book Article]


Stalloris: RPKI Downgrade Attack
Hlavacek, Tomas; Jeitner, Philipp; Mirdita, Donika; Shulman, Haya; Waidner, Michael
USENIX Security Symposium 2022
[Conference Paper]


Kontrollen bei Auftragsverarbeitern
Durmus, Erdem; Engelhardt, Jens; Selzer, Annika
[Journal Article]


Data Acquisition on a Large Darknet Marketplace
Yannikos, York; Heeger, Julian; Steinebach, Martin
International Conference on Availability, Reliability and Security 2022
[Conference Paper]


Fraunhofer SIT at CheckThat! 2022: Semi-Supervised Ensemble Classification for Detecting Check-Worthy Tweets
Frick, Raphael Antonius; Vogel, Inna; Nunes Grieser, Isabella
Conference and Labs of the Evaluation Forum 2022
[Conference Paper]


Fraunhofer SIT at CheckThat! 2022: Ensemble Similarity Estimation for Finding Previously Fact-Checked Claims
Frick, Raphael Antonius; Vogel, Inna
Conference and Labs of the Evaluation Forum 2022
[Conference Paper]