Publications

Publications

ECDSA and QUARTZ in Comparison with RSA
Lieb, Patrick; Schmidt, Markus; Wiesmaier, Alexander
[Report]


Introducing Proxy Voting to Helios
Kulyk, Oksana; Marky, Karola; Neumann, Stephan; Volkamer, Melanie
11th International Conference on Availability, Reliability and Security - ARES 2016, p.98 - 106
[Conference Proceedings]


Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices
Kohnhäuser, Florian; Katzenbeisser, Stefan
21st European Symposium on Research in Computer Security (ESORICS 2016), p.320-338
[Conference Proceedings]


Comparison of two Lightweight Stream Ciphers: MICKEY 2.0 & WG-8
Jattke, Patrick; Senker, Matthias; Wiesmaier, Alexander
[Report]


SecLab: An Innovative Approach to Learn and Understand Current Security and Privacy Issues
Ghiglieri, Marco; Stopczynski, Martin
[Conference Proceedings]


Secure Logging Schemes and Certificate Transparency
Dowling, Benjamin; Günther, Felix; Herath, Udyani; Stebila, Douglas
21st European Symposium on Research in Computer Security (ESORICS 2016)
[Conference Proceedings]


Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium
Diedrich, Lennart; Jattke, Patrick; Murati, Lulzim; Senker, Matthias; Wiesmaier, Alexander
[Report]


Efficient Third Party Auditing for a Distributed Storage System
Demirel, Denise; Krenn, Stephan; Loruenser, Thomas; Traverso, Giulia
International Conference on Availability, Reliability and Security - ARES 2016
[Conference Proceedings]


Formal Policy-based Provenance Audit
Butin, Denis; Demirel, Denise; Buchmann, Johannes
The 11th International Workshop on Security - IWSEC 2016
[Conference Proceedings]


Compiling Low Depth Circuits for Practical Secure Computation
Buescher, Niklas; Holzer, Andreas; Weber, Alina; Katzenbeisser, Stefan
21st European Symposium on Research in Computer Security (ESORICS 2016)
[Conference Proceedings]


A comparison of block ciphers SIMON, SPECK, and KATAN
Bossert, Andreas; Cooper, Steven; Wiesmaier, Alexander
[Report]


Security aspects and comparison of block ciphers LED and TEA
Appel, Michael; Pauer, Christof; Wiesmaier, Alexander
[Report]


Block ciphers for the IoT - SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared
Appel, Michael; Bossert, Andreas; Cooper, Steven; Kußmaul, Tobias; Löffler, Johannes; Pauer, Christof; Wiesmaier, Alexander
[Report]


Towards effective security assurance for incremental software development - the case of zen cart application,
Ali, Azmzt; Othmane, Lotfi Ben
Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES)
[Conference Proceedings]


On Probe-Response Attacks in Collaborative Intrusion Detection Systems
Vasilomanolakis, Emmanouil; Stahn, Michael; Garcia Cordero, Carlos; Mühlhäuser, Max
IEEE Conference on Communications and Network Security, p.279 - 286
[Conference Proceedings]


An Unconditionally Hiding Auditing Procedure for Computations over Distributed Data
Schabhüser, Lucas; Demirel, Denise; Buchmann, Johannes
The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016)
[Conference Proceedings]


SANA: Secure and Scalable Aggregate Network Attestation
Sadeghi, Ahmad-Reza; Schunter, Matthias; Ibrahim, Ahmad; Conti, Mauro; Neven, Gregory
23rd ACM Conference on Computer and Communications Security (CCS) 2016
[Conference Proceedings]


Why don’t UK citizens protest against privacy-invading dragnet surveillance?
Renaud, Karen; Flowerday, Stephen; English, Rosanne; Volkamer, Melanie
>Information and Computer Security, p.400-415
[Journal Article]


Analyzing TETRA Location Privacy and Network Availability
Pfeiffer, Martin; Kwiotek, Jan-Pascal; Classen, Jiska; Klose, Robin; Hollick, Matthias
6th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, p.117--122
[Conference Proceedings]


POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes
Mayer, Peter; Neumann, Stephan; Volkamer, Melanie
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, p.1817-1819
[Conference Proceedings]


POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes
Mayer, Peter; Neumann, Stephan; Volkamer, Melanie
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, p.1817--1819
[Conference Proceedings]


Stratum Filtering: Cloud-Based Detection of Attack Sources
Herzberg, Amir; Shulman, Haya; Waidner, Michael
ACM Cloud Computing Security Workshop (CCSW)
[Conference Proceedings]


SecureScala: Scala embedding of secure computations
Hauck, Markus; Savvides, Savvas; Eugster, Patrick; Mezini, Mira; Salvaneschi, Guido
Proceedings of the 2016 7th ACM SIGPLAN Symposium on Scala
[Conference Proceedings]


SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles
Deshotels, Luke; Deaconescu, Razvan; Chiroiu, Mihai; Davi, Lucas; Enck, William; Sadeghi, Ahmad-Reza
23rd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer
Classen, Jiska; Steinmetzer, Daniel; Hollick, Matthias
3rd ACM Workshop on Visible Light Communication Systems
[Journal Article]


Disguised Chromium Browser: Robust browser, Flash and Canvas Fingerprinting Protection
Baumann, Peter; Katzenbeisser, Stefan; Stopczynski, Martin; Tews, Erik
WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, p.37-46
[Conference Proceedings]


C-FLAT: Control-Flow Attestation for Embedded Systems Software
Abera, Tigist; Asokan, N.; Davi, Lucas; Ekberg, Jan-Erik; Nyman, Thomas; Paverd, Andrew; Sadeghi, Ahmad-Reza; Tsudik, Gene
23rd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


WebRanz: web page randomization for better advertisement delivery and web-bot prevention
Wang, Weihang; Zheng, Yunhui; Xing, Xinyu; Kwon, Yonghwi; Zhang, Xiangyu; Eugster, Patrick
FSE 2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, p.205-216
[Conference Proceedings]


Reconciling Task Assignment and Scheduling in Mobile Edge Clouds
Wang, Lin; Jiao, Lei; Kliazovich, Dzmitry; Bouvry, Pascal
2016 IEEE 24th International Conference on Network Protocols (ICNP), p.1-6
[Conference Proceedings]


Towards a Policy-Agnostic Control-Flow Integrity Implementation
Sullivan, Dean; Arias, Orlando; Davi, Lucas; Sadeghi, Ahmad-Reza; Jin, Yier
Black Hat Europe
[Conference Proceedings]