Publications

Publications

DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems
Schulz, Matthias; Loch, Adrian; Hollick, Matthias
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), p.201-203
[Conference Proceedings]


Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet
Schulz, Matthias; Klapper, Patrick; Hollick, Matthias; Tews, Erik
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), p.43-48
[Conference Proceedings]


Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices (Demo)
Schultes, Tobias; Grau, Markus; Steinmetzer, Daniel; Hollick, Matthias
ACM Conference on Security and Privacy in Wireless and Mobile Networks 2016 (ACM WiSec'16)
[Conference Proceedings]


POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs
Sadeghi, Ahmad-Reza; Dessouky, Ghada
ACM WiSec 2016
[Conference Proceedings]


Supporting Decision Makers in Choosing Suitable Authentication Schemes
Mayer, Peter; Neumann, Stephan; Storck, Daniel; Volkamer, Melanie
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), p.67-77
[Conference Proceedings]


NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks
Kunz, Alexandra; Volkamer, Melanie; Stockhardt, Simon; Palberg, Sven; Lottermann, Tessa; Piegert, Eric
Jahrestagung der Gesellschaft für Informatik, p.509--518
[Conference Proceedings]


DARPA: Device Attestation Resilient to Physical Attacks
Ibrahim, Ahmad; Sadeghi, Ahmad-Reza; Tsudik, Gene; Zeitouni, Shaza
ACM WiSEC 2016
[Conference Proceedings]


Password Requirements Markup Language
Horsch, Moritz; Schlipf, Mario; Braun, Johannes; Buchmann, Johannes
ACISP 2016 - 21st Australasian Conference on Information Security and Privacy
[Conference Proceedings]


Memorable And Secure: How Do You Choose Your PIN?
Gutmann, Andreas; Volkamer, Melanie; Renaud, Karen
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), p.156-166
[Conference Proceedings]


Understanding information security compliance - Why goal setting and rewards might be a bad idea
Gerber, Nina; McDermott, Ronja; Volkamer, Melanie; Vogt, Joachim
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), p.145-155
[Conference Proceedings]


Semantic Security and Indistinguishability in the Quantum World
Gagliardoni, Tommaso; Hülsing, Andreas; Schaffner, Christian
Advances in Cryptology – CRYPTO 2016, p.60-89
[Conference Proceedings]


NetCo: Reliable Routing with Unreliable Routers
Feldmann, Anja; Heyder, Philipp; Kreutzer, Michael; Schmid, Stefan; Seifert, Jean-Pierre; Shulman, Haya; Thimmaraju, Kashyap; Waidner, Michael; Sieberg, Jens
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops
[Conference Proceedings]


Monkey see, monkey do: effective generation of GUI tests with inferred macro events
Ermuth, Markus; Pradel, Michael
ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis, p.82-93
[Conference Proceedings]


Selfrando: Securing the Tor Browser against De-anonymization Exploits
Conti, Mauro; Crane, Stephen; Frassetto, Tommaso; Homescu, Andrei; Koppen, Georg; Larsen, Per; Liebchen, Christopher; Perry, Mike; Sadeghi, Ahmad-Reza
The annual Privacy Enhancing Technologies Symposium (PETS)
[Conference Proceedings]


Towards Securing Internet eXchange Points Against Curious onlooKers
Chiesa, Marco; Demmler, Daniel; Canini, Marco; Schapira, Michael; Schneider, Thomas
ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16), p.32-34
[Conference Proceedings]


POSTER: Toward a Secure and Scalable Attestation
Ambrosin, Moreno; Conti, Mauro; Ibrahim, Ahmad; Neven, Gregory; Sadeghi, Ahmad-Reza; Schunter, Matthias
ACM WiSEC 2016
[Conference Proceedings]


Trust Management X
10th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2016)
[Conference Proceedings]


Dynamic and Verifiable Hierarchical Secret Sharing
Traverso, Giulia; Demirel, Denise; Buchmann, Johannes
9th International Conference on Information Theoretic Security - ICITS 2016
[Conference Proceedings]


Run-time Accessible DRAM PUFs in Commodity Devices
Schaller, André; Xiong, Wenjie; Gabmeyer, Sebastian; Anagnostopoulos, Nikolaos Athanasios; Saleem, Umair; Katzenbeisser, Stefan; Szefer, Jakub
Cryptographic Hardware and Embedded Systems (CHES 2016), p.432-453
[Conference Proceedings]


State Management for Hash-Based Signatures
McGrew, David; Kampanakis, Panos; Fluhrer, Scott; Gazdag, Stefan-Lukas; Butin, Denis; Buchmann, Johannes
3rd International Conference on Research in Security Standardisation (SSR 2016)
[Conference Proceedings]


Capture and Replay: Reproducible Network Experiments in Mininet
Frömmgen, Alexander; Stohr, Denny; Fornoff, Jan; Effelsberg, Wolfgang; Buchmann, Alejandro
SIGCOMM '16 Proceedings of the 2016 ACM SIGCOMM Conference, p.621-622
[Conference Proceedings]


Obfuscation Combiners
Fischlin, Marc; Herzberg, Amir; Noon, Hon Bin; Shulman, Haya
International Cryptology Conference (CRYPTO)
[Conference Proceedings]


Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System
Demirel, Denise; Traverso, Giulia; Krenn, Stephan; Loruenser, Thomas
2016 11th International Conference on Availability, Reliability and Security (ARES), p.88-97
[Conference Proceedings]


Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks
Bindel, Nina; Buchmann, Johannes; Krämer, Juliane
FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography
[Conference Proceedings]


Low-temperature data remanence attacks against intrinsic SRAM PUFs
Anagnostopoulos, Nikolaos Athanasios; Katzenbeisser, Stefan; Rosenstihl, Markus; Schaller, André; Gabmeyer, Sebastian; Arul, Tolga
[Report]


Spot the phish by checking the pruned URL
Volkamer, Melanie; Renaud, Karen; Gerber, Paul
Information and Computer Security, p.372-385
[Journal Article]


Efficient single-photon absorption by a trapped moving atom
Trautmann, Nils; Alber, Gernot; Leuchs, Gerd
Physical Review A
[Journal Article]


A Survey on Protocols securing the Internet of Things: DTLS, IPSec and IEEE 802.11i
Roepke, Rene; Thraem, Timo; Wagener, Johannes; Wiesmaier, Alexander
[Report]


Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung
Reinheimer, Benjamin; Braun, Kristoffer; Volkamer, Melanie
MuC-Workshop „Usable Security and Privacy“
[Conference Proceedings]


MQSAS - A Multivariate Sequential Aggregate Signature Scheme
Mohamed, Mohamed Saied Emam; Bansarkhani, Rachid El; Petzoldt, Albrecht
ISC 2016 - The 19th Information Security Conference, p.426-440
[Conference Proceedings]