Publications

Publications

Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Tech­no­logien und Soziale Medien im Krisen- und Sicherheitsmanagement
Language: German
[Book]


Journal of Contingencies and Crisis Management : Special Issue: Human-Computer-Interaction and Social Media in Safety-Critical Systems
Language: English


Efficient Circuit-based PSI via Cuckoo Hashing
Pinkas, Benny; Schneider, Thomas; Weinert, Christian; Wieder, Udi
37. Advances in Cryptology -- EUROCRYPT 2018, p.125-157
Language: English
[Conference Proceedings]


Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices
Carpent, Xavier; Eldefrawy, Karim; Rattanavipanon, Norrathep; Sadeghi, Ahmad-Reza; Tsudik, Gene
Design Automation Conference
Language: English
[Conference Proceedings]


A unified lattice model and framework for purity analyses
Helm, Dominik; Kübler, Florian; Eichberg, Michael; Reif, Michael; Mezini, Mira
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, p.340-350
Language: English
[Conference Proceedings]


Examining Leakage of Access Counts in ORAM Constructions
Karvelas, Nikolaos; Treiber, Amos; Katzenbeisser, Stefan
crypto day matters: Beiträge vom 29. Kryptotag
Language: English
[Conference Proceedings]


General State Channel Networks
Dziembowski, Stefan; Faust, Sebastian; Hostakova, Kristina
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
Language: English
[Conference Proceedings]


FairSwap: How to fairly exchange digital goods
Dziembowski, Stefan; Eckey, Lisa; Faust, Sebastian
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
Language: English
[Conference Proceedings]


Parallelizing the Hybrid Lattice Reduction and Meet-in-the-Middle Attack
Wunderer, Thomas; Burger, Michael; Nguyen, Giang Nam
CSE-2018
Language: English
[Conference Proceedings]


A Detailed Analysis of the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack
Wunderer, Thomas
Journal of Mathematical Cryptology (JMC)
Language: English
[Journal Article]


Exploring the Performance Envelope of the LLL Algorithm
Burger, Michael; Bischof, Christian; Calotoiu, Alexandru; Wunderer, Thomas; Wolf, Felix
CSE-2018
Language: English
[Conference Proceedings]


Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks
Fischlin, Marc; Mazaheri, Sogol
2018 IEEE 31st Computer Security Foundations Symposium (CSF)
Language: English
[Conference Proceedings]


Call Graph Construction for Java Libraries
Reif, Michael; Eichberg, Michael; Mezini, Mira
Software Engineering und Software Management 2018
Language: English
[Conference Proceedings]


A Practical IEEE 802.11ad Research Platform: The Hidden Potential of Off -the-Shelf Devices
Steinmetzer, Daniel; Wegemer, Daniel; Hollick, Matthias
3rd NSF Millimeter-Wave RCN Workshop
Language: English
[Conference Proceedings]


M-STAR: A Modular, Evidence-based Software Trustworthiness Framework
Alexopoulos, Nikolaos; Habib, Sheikh Mahbub; Schulz, Steffen; Mühlhäuser, Max
Language: English
[Report, Journal Article]


Quantum security analysis of a lattice-based oblivious transfer protocol
Liu, Mo-meng; Krämer, Juliane; Hu, Yu-pu; Buchmann, Johannes
Frontiers of Information Technology & Electronic Engineering, p.1348-1369
Language: English
[Journal Article]


LARA - A Design Concept for Lattice-based Encryption
Bansarkhani, Rachid El
Language: English
[Report]


Adaptive Codebook Optimization for Beam-Training on Off-The-Shelf IEEE 802.11ad Devices
Palacios, Joan; Steinmetzer, Daniel; Loch, Adrian; Hollick, Matthias; Widmer, Joerg
MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking
Language: English
[Conference Proceedings]


Private Function Evaluation with Universal Circuits
Günther, Daniel
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag)
Language: English
[Conference Proceedings]


CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs
Krüger, Stefan; Späth, Johannes; Ali, Karim; Bodden, Eric; Mezini, Mira
32nd European Conference on Object-Oriented Programming (ECOOP 2018), p.10:1-10:27
Language: English
[Conference Proceedings]


Privacy-Preserving Genomics on a Large Scale
Tkachenko, Oleksandr
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag)
Language: English
[Conference Proceedings]


Path MTU Discovery Considered Harmful
Göhring, Matthias; Shulman, Haya; Waidner, Michael
ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems
Language: English
[Conference Proceedings]


Practical Experience: Methodologies for Measuring Route Origin Validation
Hlavacek, Tomas; Herzberg, Amir; Shulman, Haya; Waidner, Michael
DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks
Language: English
[Conference Proceedings]


Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases
Schneider, Thomas; Tkachenko, Oleksandr
17. Workshop on Privacy in the Electronic Society (WPES’18), p.71-75
Language: English
[Conference Proceedings]


Examining Leakage of Access Counts in ORAM Constructions
Karvelas, Nikolaos; Treiber, Amos; Katzenbeisser, Stefan
WPES'18: Proceedings of the 2018 Workshop on Privacy in the Electronic Society, p.66-70
Language: English
[Conference Proceedings]


Domain Validation ++ for MitM-Resilient PKI
Brandt, Markus; Dai, Tianxiang; Klein, Amit; Shulman, Haya; Waidner, Michael
ACM CCS 2018
Language: English
[Conference Proceedings]


DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices
Nguyen, Thien Duc; Marchal, Samuel; Miettinen, Markus; Dang, Minh Hoang; Asokan, N.; Sadeghi, Ahmad-Reza
CoRR
Language: German
[Journal Article]


OmniShare: Encrypted Cloud Storage for the Multi-Device Era
Asokan, N.; Gröndahl, Tommi; Nguyen, Hoang Long; Nguyen, Thien Duc; Paverd, Andrew; Pendyala, Praveen; Sadeghi, Ahmad-Reza; Stobert, Elizabeth; Tamrakar, Sandeep
IEEE Internet Computing, p.1-1
Language: English
[Journal Article]


State-Aware Anomaly Detection for Industrial Control Systems
Ghaeini, Hamid Reza; Antonioli, Daniele; Brasser, Ferdinand; Sadeghi, Ahmad-Reza; Tippenhauer, Nils Ole
The 33rd ACM/SIGAPP Symposium On Applied Computing (SAC)
Language: English
[Conference Proceedings]


The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX
Biondo, Andrea; Conti, Mauro; Davi, Lucas; Frassetto, Tommaso; Sadeghi, Ahmad-Reza
27th USENIX Security Symposium
Language: English
[Conference Proceedings]