Publications
Publications
Practical Covert Channels for WiFi Systems
Classen, Jiska; Schulz, Matthias; Hollick, Matthias
IEEE Conference on Communications and Network Security (CNS), p.8
[Conference Proceedings]
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications
Classen, Jiska; Chen, Joe; Steinmetzer, Daniel; Hollick, Matthias; Knightly, Edward
2nd ACM Workshop on Visible Light Communication Systems, p.6
[Conference Proceedings]
Hide And Seek: Detecting Sensors in P2P Botnets
Böck, Leon; Karuppayah, Shankar; Grube, Tim; Fischer, Mathias; Mühlhäuser, Max
Communications and Network Security (CNS), 2015 IEEE Conference on, p.731-732
[Conference Proceedings]
Formal Accountability for Biometric Surveillance: A Case Study
Ta, Vinh-Thong; Butin, Denis; Métayer, Daniel Le
Annual Privacy Forum (APF2015)
[Conference Proceedings]
DNSSEC for Cyber Forensics
Shulman, Haya; Waidner, Michael
EURASIP J. Information Security, p.14
[Journal Article]
On the Systematic Drift of Physically Unclonable Functions Due to Aging
Schaller, André; Skoric, Boris; Katzenbeisser, Stefan
TrustED, p.15-20
[Conference Proceedings]
PBMC: Symbolic Slicing for the Verification of Concurrent Programs
Saissi, Habib; Bokor, Peter; Suri, Neeraj
Proceedings of the Symposium on Automated Technology for Verification and Analysis, ATVA 2015
[Conference Proceedings]
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem
Neumann, Stephan; Volkamer, Melanie; Strube, Moritz; Jung, Wolfgang; Brelle, Achim
Datenschutz und Datensicherheit, p.747-752
[Journal Article]
Notions of Deniable Message Authentication
Fischlin, Marc; Mazaheri, Sogol
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, p.55-64
[Conference Proceedings]
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas
22nd ACM Conference on Computer and Communications Security (CCS 2015), p.1197-1210
[Conference Proceedings]
Automated Synthesis of Optimized Circuits for Secure Computation
Demmler, Daniel; Dessouky, Ghada; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza; Schneider, Thomas; Zeitouni, Shaza
CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, p.1504-1517
[Conference Proceedings]
Performance problems you can fix: a dynamic analysis of memoization opportunities
Della Toffola, Luca; Pradel, Michael; Gross, Thomas R.
Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, p.607-622
[Conference Proceedings]
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks
Crane, Stephen; Volckaert, Stijn; Schuster, Felix; Liebchen, Christopher; Larsen, Per; Davi, Lucas; Sadeghi, Ahmad-Reza; Holz, Thorsten; Sutter, Bjorn De; Franz, Michael
22nd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks
Conti, Mauro; Crane, Stephen; Davi, Lucas; Franz, Michael; Larsen, Per; Liebchen, Christopher; Negro, Marco; Qunaibit, Mohaned; Sadeghi, Ahmad-Reza
22nd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]
SEDA: Scalable Embedded Device Attestation
Asokan, N.; Brasser, Ferdinand; Ibrahim, Ahmad; Sadeghi, Ahmad-Reza; Schunter, Matthias; Tsudik, Gene; Wachsmann, Christian
22nd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]
Rating Decomposition with Conjoint Analysis and Machine Learning
Volk, Florian; Trüschler, Nadine; Mühlhäuser, Max
CENTRIC 2015: The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, p.36-41
[Conference Proceedings]
Design Principles for HFEv- based Signature Schemes
Petzoldt, Albrecht; Cheng, Ming-Shing; Yang, Bo-Yin; Chengdong, Tao; Ding, Jintai
ASIACRYPT 2015 - Part I - 21st International Conference on the Theory and Application of Cryptology and Information Security, p.1-24
[Conference Proceedings]
On the Optimality of Differential Fault Analyses on CLEFIA
Krämer, Juliane; Kiss, Ágnes; Stüber, Anke
6. International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS'15), p.181-196
[Conference Proceedings]
Learning With Errors in the Exponent
Dagdelen, Özgür; Gajek, Sebastian; Göpfert, Florian
18th International Conference on information Security and Cryptology (ICISC) 2015
[Conference Proceedings]
Body-worn Cameras for Police Accountability: Opportunities and Risks
Coudert, Fanny; Butin, Denis; Métayer, Daniel Le
Computer Law & Security Review (CLSR), p.749-762
[Journal Article]
Certification of ICTs in Elections
Wolf, Peter; Barrat, Jordi; Bolo, Eden; Bravo, Alejandro; Krimmer, Robert; Neumann, Stephan; Parreño, Al; Schürmann, Carsten; Volkamer, Melanie
[Book]
jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications
Pellegrino, Giancarlo; Tschürtz, Constantin; Bodden, Eric; Rossow, Christian
Research in Attacks, Intrusions, and Defenses. 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings., p.295-316
[Conference Proceedings]
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing
Mayer, Peter; Volkamer, Melanie
Proceedings of the 31st Annual Computer Security Applications Conference, p.431-440
[Conference Proceedings]
Automated Software Diversity
Larsen, Per; Brunthaler, Stefan; Davi, Lucas; Sadeghi, Ahmad-Reza; Franz, Michael
[Book]
Pulse-controlled quantum gate sequences on a strongly coupled qubit chain
Frydrych, Holger; Marthaler, Michael; Alber, Gernot
Physical Review A
[Journal Article]
Building Secure Defenses Against Code-Reuse Attacks
Davi, Lucas; Sadeghi, Ahmad-Reza
[Book]
Detection and Forensics of Domains Hijacking
Borgwart, Andreas; Boukoros, Spyros; Shulman, Haya; Waidner, Michael; Royeen, Carel van
IEEE Global Communications Conference
[Conference Proceedings]
IOT: Using Channel State Information for Tamper Detection in the Internet of Things
Bagci, Ibrahim Ethem; Roedig, Utz; Martinovic, Ivan; Schulz, Matthias; Hollick, Matthias
Using Channel State Information for Tamper Detection in the Internet of Things, p.131-140
[Conference Proceedings]
Poster: Password Entering and Transmission Security
Canova, Gamze; Volkamer, Melanie; Weiler, Simon
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, p.1418-1420
[Conference Proceedings]
SAX-PAC (scalable and expressive packet classification)
Kogan, Kirill; Nikolenko, Sergey I.; Rottenstreich, Ori; Culhane, William; Eugster, Patrick
Proceedings of the 2014 ACM conference on SIGCOMM, p.15-26
[Conference Proceedings]