Publications

Publications

Adversarial Examples zum Selbstdatenschutz? Der Fall biometrischer Gesichtserkennung im öffentlichen Raum
Bunzel, Niklas; Zander, Neele; Landwirth, Robert; Riedel, Ann-Katrin
Gesellschaft für Informatik (GI Jahrestagung) 51, 2021, Berlin; Online>
Language: German
[Conference Paper]


Achieving Facial De-Identification by Taking Advantage of the Latent Space of Generative Adversial Networks
Frick, Raphael Antonius; Steinebach, Martin
Gesellschaft für Informatik (GI Jahrestagung) 51, 2021, Berlin; Online>
Language: English
[Conference Paper]


IT-Rettung 2017: IT-Unterstützung in Emergency Management & Response
Pottebaum, Jens; Erfurth, Christian; Reuter, Christian
Informatik 2017 : 25.- 29. September 2017 Chemnitz, p.1281-1282
Language: German
[Conference Proceedings]


Social Media Analytics: Eine Marktstudie im Krisenmanagement
Kaufhold, Marc-André; Reuter, Christian; Ludwig, Thomas; Scholl, Simon
Informatik 2017 : 25.- 29. September 2017 Chemnitz, p.1325-1338
Language: German
[Conference Proceedings]


Traffic Engineering with Joint Link Weight and Segment Optimization
Parham, Mahmoud; Fenz, Thomas; Süss, Nikolaus; Foerster, Klaus-Tycho; Schmid, Stefan
International Conference on Emerging Networking EXperiments and Technologies (CoNEXT) 17, 2021, Online>
Language: English
[Conference Paper]


Improved scalability of demand-aware datacenter topologies with minimal route lengths and congestion
Pacut, Maciej; Dai, Wenkai; Labbe, Alexandre; Foerster, Klaus-T.; Schmid, Stefan
Language: English
[Journal Article, Electronic Publication]


Extraction of Secrets from Allegedly Secret-free IoT Sensors using Artificial Intelligence
Kiyan, Tuba; Krachenfels, Thilo; Amini, Elham; Shakibaei, Zarin; Boit, Christian; Seifert, Jean-Pierre
International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA) 28, 2021, Online>
Language: English
[Conference Paper]


Einsatz von FIDO2 im PSD II-konformen Zahlungsverkehr
Heider, Jens
Language: German
[Journal Article]


Chances and Limitations of Personal and Anonymized Data Processing: Implementing Appropriate Technical and Organizational Measures and Creating Added Value in Smart Cities
Selzer, Annika; Timm, Ingo J.
Gesellschaft für Informatik (GI Jahrestagung) 51, 2021, Berlin; Online>
Language: English
[Conference Paper, Electronic Publication]


Brief Announcement: Sinkless Orientation is Hard also in the Supported LOCAL Model
Korhonen, Janne H.; Paz, Ami; Rybicki, Joel; Schmid, Stefan; Suomela, Jukka
International Symposium on Distributed Computing (DISC) 35, 2021, Freiburg; Online>
Language: English
[Conference Paper]


Automated, Dynamic Android App Vulnerability and Privacy Leak Analysis: Design Considerations, Required Components and Available Tools
Heid, Kris; Heider, Jens
European Interdisciplinary Cybersecurity Conference (EICC) 2021, Online>
Language: English
[Conference Paper]


User-Centered Design of Visualizations for Software Vulnerability Reports
Reynolds, Steven Lamarr; Mertz, Tobias; Arzt, Steven; Kohlhammer, Jörn
Symposium on Visualization for Cyber Security (VizSec) 18, 2021, Online>
Language: English
[Conference Paper]


ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation
Damer, Naser; Raja, Kiran; Süßmilch, Marius; Venkatesh, Sushma; Boutros, Fadi; Fang, Meiling; Kirchbuchner, Florian; Ramachandra, Raghavendra; Kuijper, Arjan
International Symposium on Visual Computing (ISVC) 16, 2021, Online>
Language: English
[Conference Paper]


PW-MAD: Pixel-Wise Supervision for Generalized Face Morphing Attack Detection
Damer, Naser; Spiller, Noémie Catherine Hélène; Fang, Meiling; Boutros, Fadi; Kirchbuchner, Florian; Kuijper, Arjan
International Symposium on Visual Computing (ISVC) 16, 2021, Online>
Language: English
[Conference Paper]


Resilience in Security and Crises through Adaptions and Transitions
Kalle, Timo; Kaufhold, Marc-André; Kuntke, Franz; Reuter, Christian; Rizk, Amr; Steinmetz, Ralf
50 Jahre Gesellschaft für Informatik - Informatik für Gesellschaft : Workshopbeiträge der 49. Jahrestagung der Gesellschaft für Informatik, p.571-584
Language: English
[Conference Proceedings]


Optimized Portable Unilateral Magnetic Resonance Sensor for Assessing the Aging Status of Silicon Rubber Insulators
Xu, Xianneng; Guo, Pan; Lu, Ming; Zhao, Shujie; Xu, Zheng
Language: English
[Journal Article]


Let's Downgrade Let's Encrypt
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security (CCS) 2021, Online>
Language: English
[Conference Paper]


Evaluating Resilience of Domains in PKI
Brandt, Markus; Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security (CCS) 2021, Online>
Language: English
[Conference Paper]


Computer Security- ESORICS 2021. 26th European Symposium on Research in Computer Security. Proceedings. Pt.I: Darmstadt, Germany, October 4-8, 2021
Bertino, Elisa; Shulman, Haya; Waidner, Michael ; Fraunhofer-Institut für Sichere Informations­technologie -SIT-, Darmstadt
European Symposium on Research in Computer Security (ESORICS) 26, 2021, Online>
Language: German
[Conference Proceedings]


Computer Security - ESORICS 2021. 26th European Symposium on Research in Computer Security. Proceedings. Pt.II: Darmstadt, Germany, October 4-8, 2021
Berino, Elisa; Shulman, Haya; Waidner, Michael ; Fraunhofer-Institut für Sichere Informations­technologie -SIT-, Darmstadt
European Symposium on Research in Computer Security (ESORICS) 26, 2021, Online>
Language: English
[Conference Proceedings]


BusCount: A Provable Replay Protection Solution for Automotive CAN Networks
Zelle, Daniel; Gürgens, Sigrid
Language: English
[Journal Article, Electronic Publication]


Risikobewertung von Schwachstellen
Kreutzer, Michael; Schreiber, Linda
Language: German
[Book Article, Electronic Publication]


VIA: Analyzing Device Interfaces of Protected Virtual Machines: Published on arXiv
Hetzelt, Felicitas; Radev, Martin; Buhren, Robert; Morbitzer, Mathias; Seifert, Jean-Pierre
Language: English
[Preprint, Electronic Publication, Paper]


Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging
Krachenfels, Thilo; Seifert, Jean-Pierre; Tajik, Shahin
Workshop on Attacks and Solutions in Hardware Security (ASHES) 5, 2021, Online>
Language: English
[Conference Paper]


Rock'n'roll PUFs: Crafting provably secure pufs from less secure ones (extended version)
Ganji, Fatemeh; Tajik, Shahin; Stauss, Pascal; Seifert, Jean-Pierre; Tehranipoor, Mark Mohammad; Forte, Domenic
International Workshop on Security Proofs for Embedded Systems (PROOFS) 2019, Atlanta/Ga.>
Language: English
[Journal Article]


Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model
Krachenfels, Thilo; Ganji, Fatemeh; Moradi, Amir; Tajik, Shahin; Seifert, Jean-Pierre
Symposium on Security and Privacy (SP) 42, 2021, Online>
Language: English
[Conference Paper]


One Glitch to Rule Them All: Fault Injection Attacks Against AMD's, Secure Encrypted Virtualization
Buhren, Robert; Jacob, Hans Niklas; Krachenfels, Thilo; Seifert, Jean-Pierre
Conference on Computer and Communications Security (CCS) 2021, Online>
Language: English
[Conference Paper]


Neural-Network-Based Modeling Attacks on XOR Arbiter PUFs Revisited: Published on Cryptology ePrint Archive
Wisiol, Nils; Mursi, Khalid T.; Seifert, Jean-Pierre; Zhuang, Yu
Language: English
[Preprint, Electronic Publication, Paper]


Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS: Published on arXiv
Marzougui, Soundes; Wisiol, Nils; Gersch, Patrick; Krämer, Juliane; Seifert, Jean-Pierre
Language: English
[Preprint, Electronic Publication, Paper]


Learnability of the output distributions of local quantum circuits: Published on arXiv
Hinsche, Marcel; Ioannou, Marios; Nietner, Alexander; Haferkamp, Jonas; Quek, Yihui; Hangleiter, Dominik; Seifert, Jean-Pierre; Eisert, Jens; Sweke, Ryan
Language: English
[Preprint, Electronic Publication, Paper]