Publications

Publications

PBMC: Symbolic Slicing for the Verification of Concurrent Programs
Saissi, Habib; Bokor, Peter; Suri, Neeraj
Proceedings of the Symposium on Automated Technology for Verification and Analysis, ATVA 2015
[Conference Proceedings]


Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem
Neumann, Stephan; Volkamer, Melanie; Strube, Moritz; Jung, Wolfgang; Brelle, Achim
Datenschutz und Datensicherheit, p.747-752
[Journal Article]


Notions of Deniable Message Authentication
Fischlin, Marc; Mazaheri, Sogol
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, p.55-64
[Conference Proceedings]


A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas
22nd ACM Conference on Computer and Communications Security (CCS 2015), p.1197-1210
[Conference Proceedings]


Automated Synthesis of Optimized Circuits for Secure Computation
Demmler, Daniel; Dessouky, Ghada; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza; Schneider, Thomas; Zeitouni, Shaza
22. ACM Conference on Computer and Communications Security (CCS'15), p.1504-1517
[Conference Proceedings]


Performance problems you can fix: a dynamic analysis of memoization opportunities
Della Toffola, Luca; Pradel, Michael; Gross, Thomas R.
Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, p.607-622
[Conference Proceedings]


It's a TRAP: Table Randomization and Protection against Function Reuse Attacks
Crane, Stephen; Volckaert, Stijn; Schuster, Felix; Liebchen, Christopher; Larsen, Per; Davi, Lucas; Sadeghi, Ahmad-Reza; Holz, Thorsten; Sutter, Bjorn De; Franz, Michael
22nd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks
Conti, Mauro; Crane, Stephen; Davi, Lucas; Franz, Michael; Larsen, Per; Liebchen, Christopher; Negro, Marco; Qunaibit, Mohaned; Sadeghi, Ahmad-Reza
22nd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


SEDA: Scalable Embedded Device Attestation
Asokan, N.; Brasser, Ferdinand; Ibrahim, Ahmad; Sadeghi, Ahmad-Reza; Schunter, Matthias; Tsudik, Gene; Wachsmann, Christian
22nd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


Rating Decomposition with Conjoint Analysis and Machine Learning
Volk, Florian; Trüschler, Nadine; Mühlhäuser, Max
CENTRIC 2015: The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, p.36-41
[Conference Proceedings]


Design Principles for HFEv- based Signature Schemes
Petzoldt, Albrecht; Cheng, Ming-Shing; Yang, Bo-Yin; Chengdong, Tao; Ding, Jintai
ASIACRYPT 2015 - Part I - 21st International Conference on the Theory and Application of Cryptology and Information Security, p.1-24
[Conference Proceedings]


On the Optimality of Differential Fault Analyses on CLEFIA
Krämer, Juliane; Kiss, Ágnes; Stüber, Anke
6. International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS'15), p.181-196
[Conference Proceedings]


Learning With Errors in the Exponent
Dagdelen, Özgür; Gajek, Sebastian; Göpfert, Florian
18th International Conference on information Security and Cryptology (ICISC) 2015
[Conference Proceedings]


Body-worn Cameras for Police Accountability: Opportunities and Risks
Coudert, Fanny; Butin, Denis; Métayer, Daniel Le
Computer Law & Security Review (CLSR), p.749-762
[Journal Article]


Certification of ICTs in Elections
Wolf, Peter; Barrat, Jordi; Bolo, Eden; Bravo, Alejandro; Krimmer, Robert; Neumann, Stephan; Parreño, Al; Schürmann, Carsten; Volkamer, Melanie
[Book]


jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications
Pellegrino, Giancarlo; Tschürtz, Constantin; Bodden, Eric; Rossow, Christian
Research in Attacks, Intrusions, and Defenses. 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings., p.295-316
[Conference Proceedings]


Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing
Mayer, Peter; Volkamer, Melanie
Proceedings of the 31st Annual Computer Security Applications Conference, p.431-440
[Conference Proceedings]


Automated Software Diversity
Larsen, Per; Brunthaler, Stefan; Davi, Lucas; Sadeghi, Ahmad-Reza; Franz, Michael
[Book]


Pulse-controlled quantum gate sequences on a strongly coupled qubit chain
Frydrych, Holger; Marthaler, Michael; Alber, Gernot
Physical Review A
[Journal Article]


Building Secure Defenses Against Code-Reuse Attacks
Davi, Lucas; Sadeghi, Ahmad-Reza
[Book]


Detection and Forensics of Domains Hijacking
Borgwart, Andreas; Boukoros, Spyros; Shulman, Haya; Waidner, Michael; Royeen, Carel van
IEEE Global Communications Conference
[Conference Proceedings]


IOT: Using Channel State Information for Tamper Detection in the Internet of Things
Bagci, Ibrahim Ethem; Roedig, Utz; Martinovic, Ivan; Schulz, Matthias; Hollick, Matthias
Using Channel State Information for Tamper Detection in the Internet of Things, p.131-140
[Conference Proceedings]