Publications

Publications

Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief
Steinmetzer, Daniel; Schulz, Matthias; Hollick, Matthias
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec)
Language: German
[Conference Proceedings]

Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks
Conti, Mauro; Crane, Stephen; Davi, Lucas; Franz, Michael; Larsen, Per; Liebchen, Christopher; Negro, Marco; Qunaibit, Mohaned; Sadeghi, Ahmad-Reza
22nd ACM Conference on Computer and Communications Security (CCS)
Language: German
[Conference Proceedings]

Market-driven Code Provisioning to Mobile Secure Hardware
Dmitrienko, Alexandra; Heuser, Stephan; Nguyen, Thien Duc; Ramos, Marcos da Silva; Rein, Andre; Sadeghi, Ahmad-Reza
Financial Cryptography and Data Security
Language: German
[Conference Proceedings]

More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
Asharov, Gilad; Lindell, Yehuda; Schneider, Thomas; Zohner, Michael
34. Advances in Cryptology -- EUROCRYPT 2015, p.673-701
Language: English
[Conference Proceedings]

NoPhish App Evaluation: Lab and Retention Study
Canova, Gamze; Volkamer, Melanie; Bergmann, Clemens; Reinheimer, Benjamin
NDSS Workshop on Usable Security 2015
Language: English
[Conference Proceedings]

Notions of Deniable Message Authentication
Fischlin, Marc; Mazaheri, Sogol
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, p.55-64
Language: German
[Conference Proceedings]

Nudging Bank Account Holders Towards More Secure PIN Management
Gutmann, Andreas; Renaud, Karen; Volkamer, Melanie
Journal of Internet Technology and Secured Transaction (JITST), p.380 - 386
Language: English
[Conference Proceedings]

On Making Emerging Trusted Execution Environments Accessible to Developers
Nyman, Thomas; McGillion, Brian; Asokan, N.
8th International Conference on Trust & Trustworthy Computing, p.58-67
Language: German
[Conference Proceedings]

On Rehoming the Electronic Id to TEEs
Tamrakar, Sandeep; Ekberg, Jan-Erik; Laitinen, Pekka
The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)
Language: German
[Conference Proceedings]

On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms
Piper, Thorsten; Suri, Neeraj; Fuhrman, Thomas
InProceedings of the 11th European Dependable Computing Conference ,07.09.2015-11.09.2015, Paris
Language: German
[Conference Proceedings]

On the Optimality of Differential Fault Analyses on CLEFIA
Krämer, Juliane; Kiss, Ágnes; Stüber, Anke
6. International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS'15), p.181-196
Language: English
[Conference Proceedings]

On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax
Geihs, Matthias; Demirel, Denise; Buchmann, Johannes
Codes, Cryptology and Information Security
Language: 1
[Conference Proceedings]

On the Systematic Drift of Physically Unclonable Functions Due to Aging
Schaller, André; Skoric, Boris; Katzenbeisser, Stefan
TrustED, p.15-20
Language: 1
[Conference Proceedings]

PALPAS - PAsswordLess PAssword Synchronization
Horsch, Moritz; Hülsing, Andreas; Buchmann, Johannes
International Conference on Availability, Reliability and Security (ARES)
Language: 1
[Conference Proceedings]

Parallel (Probable) Lock-Free Hash Sieve: A Practical Sieving Algorithm for the SVP
Mariano, Artur; Laarhoven, Thijs; Bischof, Christian
44th International Conference on Parallel Processing (ICPP 2015)
Language: English
[Conference Proceedings]

Parallel (Probable) Lock-Free Hash Sieve: A Practical Sieving Algorithm for the SVP
Mariano, Artur; Laarhoven, Thijs; Bischof, Christian
ICPP 2015 - The 44th Annual Conference 2015 International Conference on Parallel Processing
Language: German
[Conference Proceedings]

PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation
Germanus, Daniel; Ismail, Hatem; Suri, Neeraj
InProceedings of the 34th International Symposium on Reliable Distributed Systems, 28.09.2015-01.10.2015, Montreal
Language: German
[Conference Proceedings]

PBMC: Symbolic Slicing for the Verification of Concurrent Programs
Saissi, Habib; Bokor, Peter; Suri, Neeraj
Proceedings of the Symposium on Automated Technology for Verification and Analysis, ATVA 2015
Language: German
[Conference Proceedings]

Performance problems you can fix: a dynamic analysis of memoization opportunities
Della Toffola, Luca; Pradel, Michael; Gross, Thomas R.
Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, p.607-622
Language: German
[Conference Proceedings]

Phasing: Private Set Intersection using Permutation-based Hashing
Pinkas, Benny; Schneider, Thomas; Segev, Gil; Zohner, Michael
24. USENIX Security Symposium (USENIX Security'15), p.515-530
Language: English
[Conference Proceedings]

Practical Covert Channels for WiFi Systems
Classen, Jiska; Schulz, Matthias; Hollick, Matthias
IEEE Conference on Communications and Network Security (CNS), p.8
Language: 1
[Conference Proceedings]

PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices
Ghiglieri, Marco
IEEE CCNC
Language: 1
[Conference Proceedings]

Private Membership Test for Bloom Filters
Meskanen, Tommi; Ramezanian, Sara; Liu, Jian; Niemi, Valtteri
The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)
Language: German
[Conference Proceedings]

PUF-based Software Protection for Low-end Embedded Devices
Kohnhäuser, Florian; Schaller, André; Katzenbeisser, Stefan
8th International Conference on Trust and Trustworthy Computing (TRUST 2015), p.3-21
Language: 1
[Conference Proceedings]

Pulse-controlled quantum gate sequences on a strongly coupled qubit chain
Frydrych, Holger; Marthaler, Michael; Alber, Gernot
Physical Review A
Language: English
[Journal Article]