Publications

Publications

One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol

Stute, Milan; Kreitschmann, David; Hollick, Matthias
MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, p.529-543
Language: English
[Conference Proceedings]

Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link

Stute, Milan; Kreitschmann, David; Hollick, Matthias
MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, p.820-822
Language: English
[Conference Proceedings]

Web Application for Privacy-Preserving Scheduling (Poster)

Kiss, Ágnes; Schick, Oliver; Schneider, Thomas
27. USENIX Security Symposium (USENIX Security'18) Poster Session
Language: English
[Conference Proceedings]

Removing the Bottleneck for Practical 2PC

Shrishak, Kris; Shulman, Haya; Waidner, Michael
ACM SIGSAG Conference on Computer and Communications Security (ACM CCS)
Language: English
[Conference Proceedings]

Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security

Gilad, Yossi; Hlavacek, Tomas; Herzberg, Amir; Schapira, Michael; Shulman, Haya
HotNets'18: 17th ACM Workshop on Hot Topics in Networks
Language: English
[Conference Proceedings]

Off-path Attacks Against PKI

Dai, Tianxiang; Shulman, Haya; Waidner, Michael
ACM SIGSAG Conference on Computer and Communications Security (CCS 2018)
Language: English
[Conference Proceedings]

Internet As a Source of Randomness

Brandt, Markus; Shulman, Haya; Waidner, Michael
HotNets '18: 17th ACM Workshop on Hot Topics in Networks
Language: English
[Conference Proceedings]

IANUS am FiF und darüber hinaus: Die Bedeutung natur- und ingenieurwissen­schaft­licher Friedensforschung für die TU Darmstadt

Nordmann, Alfred; Reuter, Christian; Lederer, Markus
10 Jahre Forum interdisziplinäre Forschung an der TU Darmstadt, p.70-89
Language: German

Towards a Cloud-based System for Software Protection and Licensing

Schaad, Andreas; Grohmann, Bjoern; Winzenried, Oliver; Brasser, Ferdinand; Sadeghi, Ahmad-Reza
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2, p.698-702
Language: English
[Conference Proceedings]

CodeMatch: Obfuscation Won't Conceal Your Repackaged App

Glanz, Leonid; Amann, Sven; Eichberg, Michael; Reif, Michael; Mezini, Mira
Software Engineering und Software Management 2018, p.117-118
Language: English

‘Home, Smart Home’ – Exploring End Users’ Mental Models of Smart Homes

Zimmermann, Verena; Bennighof, Merve; Edel, Miriam; Hofmann, Oliver; Jung, Judith; Wick, Melina von
Mensch und Computer 2018 - Workshopband
Language: English
[Conference Proceedings]

Nudging folks towards stronger password choices: Providing certainty is the key.

Renaud, Karen; Zimmermann, Verena
Behavioural Public Policy (BPP), p.1-31
Language: English
[Journal Article]

Ethical guidelines for nudging in information security & privacy

Renaud, Karen; Zimmermann, Verena
International Journal of Human-Computer Studies (IJHCS), p.22-35
Language: English
[Journal Article]

Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp

Gerber, Nina; Zimmermann, Verena; Henhapl, Birgit; Emeröz, Sinem; Volkamer, Melanie; Hilt, Tobias
Datenschutz und Datensicherheit (DuD), p.680-685
Language: German
[Journal Article]

Guidelines For Ethical Nudging in Password Authentication

Renaud, Karen; Zimmermann, Verena
South African Institute Of Electrical Engineers (SAIEE), p.102-118
Language: English
[Journal Article]

The Quest to Replace Passwords Revisited – Rating Authentication Schemes

Zimmermann, Verena; Gerber, Nina; Kleboth, Marius; Preuschen, Alexandra von; Schmidt, Konstantin; Mayer, Peter
Twelth International Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), p.38-48
Language: English
[Conference Proceedings]

Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?

Gerber, Nina; Zimmermann, Verena; Henhapl, Birgit; Emeröz, Sinem; Volkamer, Melanie
International Conference on Availability, Reliability and Security (ARES)
Language: English
[Conference Proceedings]

Collective Attestation: for a Stronger Security in Embedded Networks

Ibrahim, Ahmad
IEEE
Language: English
[Conference Proceedings]

The Future of IoT Security: Special Session

Mohan, Sibin; Asplund, Mikael; Bloom, Gedare; Sadeghi, Ahmad-Reza; Ibrahim, Ahmad; Salajageh, Negin; Griffioen, Paul; Sinopoli, Bruno
International Conference on Embedded Software (EMSOFT 2018), 2018
Language: English
[Conference Proceedings]

Securing Embedded Networks Through Secure Collective Attestation

Ibrahim, Ahmad
Workshop at 16th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2018), 2018
Language: German
[Conference Proceedings]

One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol

Stute, Milan; Kreitschmann, David; Hollick, Matthias
The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18)
Language: English
[Conference Proceedings]

Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link

Stute, Milan; Kreitschmann, David; Hollick, Matthias
The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18)
Language: English
[Conference Proceedings]

Learning from Climate Research: Applying the Finite Pool of Worry on Cyber-Related Hazards

Heidt, Margareta
European Conference on Information Systems (ECIS), Portsmouth, United Kingdom, 2018 [Research-in-Progress]
Language: English
[Journal Article]

The Influence of SME Constraints in an Organizational IT Security Context

Heidt, Margareta; Gerlach, Jin
International Conference on Information Systems (ICIS), 13.-16.12.2018, San Francisco, USA.
Language: German
[Conference Proceedings]

When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs

Dessouky, Ghada; Gens, David; Haney, Patrick; Persyn, Garrett; Kanuparthi, Arun K.; Khattri, Hareesh; Fung, Jason M.; Sadeghi, Ahmad-Reza; Rajendran, Jeyavijayan
Cryptography and Security
Language: English
[Journal Article]

Avoiding Chaotic Use of Social Media before, during and after Emergencies: Design and Evaluation of Citizens' Guidelines

Kaufhold, Marc-André; Gizikis, Alexis; Reuter, Christian; Habdank, Matthias; Grinko, Margarita
Journal of Contingencies and Crisis Management (JCCM), p.198-213
Language: English
[Journal Article]

Systematic Evaluation of the Unsoundness of Call Graph Construction Algorithms for Java

Reif, Michael; Eichberg, Michael; Kübler, Florian; Mezini, Mira
Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, p.107-112
Language: English
[Conference Proceedings]

Lattice Based Modularization of Static Analyses

Eichberg, Michael; Kübler, Florian; Helm, Dominik; Reif, Michael; Salvaneschi, Guido; Mezini, Mira
Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, p.113-118
Language: English
[Conference Proceedings]

ELSA: Efficient Long-Term Secure Storage of Large Datasets

Geihs, Matthias; Buchmann, Johannes
Information Security and Cryptology- ICISC 2018, p.269-286
Language: English
[Conference Proceedings]

A Comparative Study across Static and Dynamic Side-Channel Countermeasures

Gil Dantas, Yuri; Hamann, Tobias; Mantel, Heiko
The 11th International Symposium on Foundations & Practice of Security (FPS)
Language: English
[Journal Article]