Publications

Publications

Domain Validation ++ for MitM-Resilient PKI
Brandt, Markus; Dai, Tianxiang; Klein, Amit; Shulman, Haya; Waidner, Michael
ACM CCS 2018
[Conference Proceedings]


DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices
Nguyen, Thien Duc; Marchal, Samuel; Miettinen, Markus; Dang, Minh Hoang; Asokan, N.; Sadeghi, Ahmad-Reza
CoRR
[Journal Article]


OmniShare: Encrypted Cloud Storage for the Multi-Device Era
Asokan, N.; Gröndahl, Tommi; Nguyen, Hoang Long; Nguyen, Thien Duc; Paverd, Andrew; Pendyala, Praveen; Sadeghi, Ahmad-Reza; Stobert, Elizabeth; Tamrakar, Sandeep
IEEE Internet Computing, p.1-1
[Journal Article]


State-Aware Anomaly Detection for Industrial Control Systems
Ghaeini, Hamid Reza; Antonioli, Daniele; Brasser, Ferdinand; Sadeghi, Ahmad-Reza; Tippenhauer, Nils Ole
The 33rd ACM/SIGAPP Symposium On Applied Computing (SAC)
[Conference Proceedings]


The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX
Biondo, Andrea; Conti, Mauro; Davi, Lucas; Frassetto, Tommaso; Sadeghi, Ahmad-Reza
27th USENIX Security Symposium
[Conference Proceedings]


It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs
Zeitouni, Shaza; Gens, David; Sadeghi, Ahmad-Reza
Design Automation Conference (DAC) 2018
[Conference Proceedings]


US-AID: Unattended Scalable Attestation of IoT Devices
Ibrahim, Ahmad; Sadeghi, Ahmad-Reza; Tsudik, Gene
37th IEEE International Symposium on Reliable Distributed Systems (SRDS 2018)
[Conference Proceedings]


SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices
Ambrosin, Moreno; Conti, Mauro; Ibrahim, Ahmad; Sadeghi, Ahmad-Reza; Schunter, Matthias
23rd European Symposium on Research in Computer Security (ESORICS 2018)
[Conference Proceedings]


SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks
Kohnhäuser, Florian; Büscher, Niklas; Katzenbeisser, Stefan
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, p.329-342
[Conference Proceedings]


On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks
Lemos, Marcilio O. O.; Dantas, Yuri Gil; Fonseca, Iguatemi E.; Nigam, Vivek
Journal of Logical and Algebraic Methods in Programming, p.45-67
[Journal Article]


On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks
Lemos, Marcilio O. O.; Dantas, Yuri Gil; Fonseca, Iguatemi E.; Nigam, Vivek
Proceedings of the Journal of Logical and Algebraic Methods in Programming (JLAMP), p.45-67
[Journal Article]


How Secure is Green IT? The Case of Software-Based Energy Side Channels
Mantel, Heiko; Schickel, Johannes; Weber, Alexandra; Weber, Friedrich
Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS)
[Conference Proceedings]


An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior
Gil Dantas, Yuri; Gay, Richard; Hamann, Tobias; Mantel, Heiko; Schickel, Johannes
33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC)
[Conference Proceedings]


HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot
Daubert, Jörg; Boopalan, Dhanasekar; Mühlhäuser, Max; Vasilomanolakis, Emmanouil
IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies, p.1-6
[Conference Proceedings]


An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior
Dantas, Yuri Gil; Gay, Richard; Hamann, Tobias; Mantel, Heiko; Schickel, Johannes
[Conference Proceedings]


A Systematic Evaluation of API-Misuse Detectors
Amann, Sven; Nguyen, Hoan Anh; Nadi, Sarah; Nguyen, Tien; Mezini, Mira
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
[Journal Article]


Scalable Private Set Intersection Based on OT Extension
Pinkas, Benny; Schneider, Thomas; Zohner, Michael
ACM Transactions on Privacy and Security (TOPS), p.7:1-7:35
[Journal Article]


Human Factors in Security
Gerber, Paul; Ghiglieri, Marco; Henhapl, Birgit; Kulyk, Oksana; Marky, Karola; Mayer, Peter; Reinheimer, Benjamin; Volkamer, Melanie
Sicherheitskritische Mensch-Computer-Interaktion, p.83-98


Trapped-ion quantum simulation of excitation transport: Disordered, noisy, and long-range connected quantum networks
Trautmann, N.; Hauke, P.
Physical Review A
[Journal Article]


K-Miner: Uncovering Memory Corruption in Linux
Gens, David; Schmitt, Simon; Davi, Lucas; Sadeghi, Ahmad-Reza
25th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware
Classen, Jiska; Wegemer, Daniel; Patras, Paul; Spink, Tom; Hollick, Matthias
PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)
[Conference Proceedings]


Don't Steal my Drone: Catching Attackers with an Unmanned Aerial Vehicle Honeypot
Vasilomanolakis, Emmanouil; Daubert, Jörg; Boopalan, Dhanasekar; Mühlhäuser, Max
IEEE/IFIP Network Operations and Management Symposium (NOMS), p.1-2
[Conference Proceedings]


Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points
Bielsa, Guillermo; Palacios, Joan; Loch, Adrian; Steinmetzer, Daniel; Cesari, Paolo; Widmer, Joerg
IEEE International Conference on Computer Communications (INFOCOM)
[Conference Proceedings]


VisuFlow: a Debugging Environment for Static Analyses
Nguyen, Lisa; Krüger, Stefan; Hill, Patrick; Ali, Karim; Bodden, Eric
ICSE
[Conference Proceedings]


Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies
Tkachenko, Oleksandr; Weinert, Christian; Schneider, Thomas; Hamacher, Kay
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), p.221-235
[Conference Proceedings]


Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks
Steinmetzer, Daniel; Yuan, Yimin; Hollick, Matthias
11th ACM Conference on Security and Privacy in Wireless and Mobile Networks
[Conference Proceedings]


Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications
Riazi, M. Sadegh; Weinert, Christian; Tkachenko, Oleksandr; Songhori, Ebrahim M.; Schneider, Thomas; Koushanfar, Farinaz
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), p.707-721
[Conference Proceedings]


Revisiting Context-Based Pairing in IoT
Miettinen, Markus; Nguyen, Thien Duc; Asokan, N.; Sadeghi, Ahmad-Reza
Proceedings of the 55th Design Automation Conference (DAC), p.32:1-32:6
[Conference Proceedings]


iOracle: Automated Evaluation of Access Control Policies in iOS
Deaconescu, Razvan; Carabas, Costin; Manda, Iulia; Enck, William; Chiroiu, Mihai; Li, Ninghui; Sadeghi, Ahmad-Reza
13th ASIA Conference on Information, Computer and Communications Security
[Conference Proceedings]


Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE
Wunderer, Thomas; Wang, Yuntao
ISPEC 2018
[Conference Proceedings]