Publications

Publications

Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System
Heinrich, Alexander; Stute, Milan; Kornhuber, Tim; Hollick, Matthias
The 21st Privacy Enhancing Technologies Symposium
[Conference Proceedings]


PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Heinrich, Alexander; Hollick, Matthias; Schneider, Thomas; Stute, Milan; Weinert, Christian
Proceedings of the 30th USENIX Security Symposium, p.3577-3594
[Conference Proceedings]


TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter
Hartwig, Katrin; Reuter, Christian
Tagungsband WI 2019 : Human Practice. Digital Ecologies. Our Future., p.1844-1855
[Conference Proceedings]


FedCRI: Federated Mobile Cyber-Risk Intelligence
Fereidooni, Hossein; Dmitrienko, Alexandra; Rieger, Phillip; Miettinen, Markus; Sadeghi, Ahmad-Reza; Madlener, Felix
Network and Distributed Systems Security (NDSS) Symposium 2022
[Conference Proceedings]


The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community
Carvalho, Aparecido Fabiano Pinatti de; Saeed, Saqib; Reuter, Christian; Wulf, Volker
International reports on socio-informatics, p.41-47
[Journal Article]


Usability stumm geschaltet? Usable Security und Privacy in Videokonferenzsystemen
Balthasar, Mandy; Gerber, Nina; Schmitt, Hartmut
Mensch und Computer 2021 - Usability Professionals
[Conference Proceedings]


AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices
Heinrich, Alexander; Bittner, Niklas; Hollick, Matthias
WiSec '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.26-38
[Conference Proceedings]


WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens
Jiang, Yan; Ji, Xiaoyu; Wang, Kai; Yan, Chen; Mitev, Richard; Sadeghi, Ahmad-Reza; Xu, Wenyuan
Proceedings: 43rd IEEE Symposium on Security and Privacy (SP 2022), p.984-1001
[Conference Proceedings]


GhostTouch: Targeted Attacks on Touchscreens without Physical Touch
Wang, Kai; Mitev, Richard; Yan, Chen; Ji, Xiaoyu; Sadeghi, Ahmad-Reza; Xu, Wenyuan
Proceedings of the 31st USENIX Security Symposium
[Conference Proceedings]


The Nerd Factor: The Potential of S&P Adepts to Serve as a Social Resource in the User’s Quest for More Secure and Privacy-Preserving Behavior
Gerber, Nina; Marky, Karola
Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), p.57-76
[Conference Proceedings]


Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M
Sadeghi, Ahmad-Reza; Mitev, Richard; Saß, Marvin
25th Black Hat USA
[Conference Proceedings]


IANUS am FiF und darüber hinaus: Die Bedeutung natur- und ingenieurwissenschaftlicher Friedensforschung für die TU Darmstadt
Nordmann, Alfred; Reuter, Christian; Lederer, Markus
Zwischendrin : 10 Jahre Forum inter­dis­zi­pli­näre Forschung der TU Darmstadt, p.70-89


Integration von Flow in die Mensch-Computer-Interaktion? Potenziale für die Gestaltung interaktiver Systeme
Kaufhold, Marc-André; Reuter, Christian
Wissenschaft trifft Praxis, p.78-88
[Journal Article]


Digitalisation and Communication: Societal Trends and the Change in Organisations — Preface
Reuter, Christian; Schultz, Tanjev; Stegbauer, Christian
Digitalisation and Communication: Societal Trends and the Change in Organisations, p.1-1


Die Digitalisierung der Kommunikation: Gesellschaftliche Trends und der Wandel von Organisationen — Einleitung
Reuter, Christian; Schultz, Tanjev; Stegbauer, Christian
Die Digitalisierung der Kommunikation: Gesellschaftliche Trends und der Wandel von Organisationen, p.1-1


Fake News und manipulierte Meinungsbildung
Reuter, Christian
Die Digitalisierung der Kommunikation: Gesellschaftliche Trends und der Wandel von Organisationen, p.15-19


Fake News and the Manipulation of Public Opinion
Reuter, Christian
Digitalisation and Communication: Societal Trends and the Change in Organisations, p.13-16


Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures
Dessouky, Ghada; Gruler, Alexander; Mahmoody, Pouya; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
Network and Distributed Systems Security (NDSS) Symposium 2022
[Conference Proceedings]


Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany
Haunschild, Jasmin; Kaufhold, Marc-André; Reuter, Christian
Proceedings der 15. Internationalen Tagung Wirtschaftsinformatik 2020 : Ent­wicklungen, Chancen und Herausforderungen der Digitalisierung : WI 2020 : Zentrale Tracks
[Conference Proceedings]


Financially Backed Covert Security
Faust, Sebastian; Hazay, Carmit; Kretzler, David; Schlosser, Benjamin
International Conference on Practice and Theory of Public-Key Cryptography 2022
[Conference Proceedings]


Time-dependent POVM reconstruction for single-photon avalanche photo diodes using adaptive regularization
Fitzke, Erik; Krebs, Robin; Haase, Thorsten; Mengler, Max; Alber, Gernot; Walther, Thomas
New Journal of Physics
[Journal Article]


Nomadic Knowledge Sharing Practices and Challenges: Findings From a Long-Term Case Study
Saeed, Saqib; Pipek, Volkmar; Rohde, Markus; Reuter, Christian; Pinatti de Carvalho, Aparecido Fabiano; Wulf, Volker
IEEE Access, p.63564-63577
[Journal Article]


CiFi: Versatile Analysis of Class and Field Immutability
Roth, Tobias; Helm, Dominik; Reif, Michael; Mezini, Mira
Software Engineering 2022: Fachtagung des GI-Fachbereichs Softwaretechnik, p.81-82
[Conference Proceedings]


Proceedings of the 2nd Workshop on Mobile Resilience: Designing Interactive Systems for Crisis Response
2nd Workshop on Mobile Resilience: Designing Interactive Systems for Crisis Response
[Conference Proceedings]


On the State of Post-Quantum Cryptography Migration
N. Alnahawi and A. Wiesmaier and T. Graßmeyer and J. Geißler and A. Zeier and P. Bauspieß and A. Heinemann
INFORMATIK'21 — PQKP-Workshop, p.907–941
[Conference Proceedings]


On Message-based Consensus and Network Coding
M. Braun and A. Wiesmaier and N. Alnahawi and J. Geißler
NoF 2021 — 12th International Conference on Network of the Future
[Conference Proceedings]


Attack Surface Assessment for Cyber­security Engineering in the Automotive Domain
Christian Plappert and Daniel Zelle and Henry Gadacz and Roland Rieke and Dirk Scheuermann and Christoph Krauß
29th Euromicro International Conference on Parallel, Distributed and Network-based Processing, PDP
[Conference Proceedings]


Secure gate: Secure gateways and wireless sensors as enablers for sustainability in production plants
Diethelm Bienhaus and Andreas Ebner and Lukas Jäger and Roland Rieke and Christoph Krauß
Si­mu­la­tion Modelling Practice and Theory, Vol.109, p.9
[Journal Article]


Microgrid Systems: Towards a Technical Performance Assessment Frame
Sophie Marchand and Cristian Monsalve and Thorsten Reimann and Wolfram Heckmann and Jakob Ungerland and Hagen Lauer and Stephan Ruhe and Christoph Krauß
Energies, Vol.14, p.23
[Journal Article]


Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods
Zelle, Daniel and Lauser, Timm and Kern, Dustin and Krauß, Christoph
The 16th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]