Publications

Publications

Zero-Interaction Security-Towards Sound Experimental Validation
Fomichev, Mikhail; Maass, Max; Hollick, Matthias
GetMobile: Mobile Computing and Communications
[Journal Article]


Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System
Heinrich, Alexander; Stute, Milan; Kornhuber, Tim; Hollick, Matthias
Proceedings on Privacy Enhancing Technologies, p.227-245
[Journal Article]


Language Support for Secure Software Development with Enclaves
Oak, Aditya; Ahmadian, Amir M.; Balliu, Musard; Salvaneschi, Guido
34th IEEE Computer Security Foundations Symposium (CSF 2021)
[Conference Proceedings]


Privacy - Preserving Clustering
Keller, Hannah; Möllering, Helen; Schneider, Thomas; Yalame, Hossein
32. Kryptotag - crypto day matters
[Conference Proceedings]


Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi
Stute, Milan; Heinrich, Alexander; Lorenz, Jannik; Hollick, Matthias
30th USENIX Security Symposium
[Conference Proceedings]


DEMO: BTLEmap: Nmap for Bluetooth Low Energy
Heinrich, Alexander; Stute, Milan; Hollick, Matthias
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20)
[Conference Proceedings]


BUFFing signature schemes beyond unforgeability and the case of post-quantum signature
Cremers, Cas; Düzlü, Samed; Fiedler, Rune; Fischlin, Marc; Janson, Christian
42nd IEEE Symposium on Security and Privacy
[Conference Proceedings]


Conversion from W to Greenberger-Horne-Zeilinger states in the Rydberg-blockade regime of neutral-atom systems
Haase, Thorsten; Alber, Gernot; Stojanovic, Vladimir M.
Physical Review A
[Journal Article]


Generic Compiler for Publicly Verifiable Covert Multi-Party Computation
Faust, Sebastian; Hazay, Carmit; Kretzler, David; Schlosser, Benjamin
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2021)
[Conference Proceedings]


Trusted Configuration in Cloud FPGAs
Zeitouni, Shaza; Vliegen, Jo; Frassetto, Tommaso; Koch, Dirk; Sadeghi, Ahmad-Reza; Mentens, Nele
29th IEEE International Symposium on Field-Programmable Custom Computing Machines
[Conference Proceedings]


FLGUARD: Secure and Private Federated Learning
Nguyen, Thien Duc; Rieger, Phillip; Yalame, Mohammad Hossein; Möllering, Helen; Fereidooni, Hossein; Marchal, Samuel; Miettinen, Markus; Mirhoseini, Azalia; Sadeghi, Ahmad-Reza; Schneider, Thomas; Zeitouni, Shaza
[Journal Article, Report]


Data Protection in AI Services: A Survey
Meurisch, Christian; Mühlhäuser, Max
ACM Computing Surveys
[Journal Article]


Two-Party Adaptor Signatures From Identification Schemes
Erwig, Andreas; Faust, Sebastian; Hostáková, Kristina; Maitra, Monosij; Riahi, Siavash
24th International Conference on Practice and Theory of Public-Key Cryptography
[Conference Proceedings]


Bitcoin-Compatible Virtual Channels
Aumayr, Lukas; Ersoy, Oguzhan; Erwig, Andreas; Faust, Sebastian; Hostáková, Kristina; Maffei, Matteo; Moreno-Sanchez, Pedro; Riahi, Siavash
42nd IEEE Symposium on Security and Privacy
[Conference Proceedings]


Scalable W-type entanglement resource in neutral-atom arrays with Rydberg-dressed resonant dipole-dipole interaction
Stojanovic, Vladimir M.
Physical Review A
[Journal Article]


Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge
Fischlin, Marc; Rohrbach, Felix
Public-Key Cryptography - PKC 2021, p.205-234
[Conference Proceedings]


HERA: Hotpatching of Embedded Real-time Applications
Niesler, Christian; Surminski, Sebastian; Davi, Lucas
Proc. of 28th Network and Distributed System Security Symposium (NDSS 2021)
[Conference Proceedings]


The Nudge Puzzle: Matching Nudge Interventions to Cyber­security Decisions
Zimmermann, Verena; Renaud, Karen
ACM Transactions on Computer-Human Interaction, p.7:1-7:45
[Journal Article]


ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation
Patra, Arpita; Schneider, Thomas; Suresh, Ajith; Yalame, Mohammad Hossein
30th USENIX Security Symposium (USENIX Security 21), p.2165-2182
[Conference Proceedings]


All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers
Hagen, Christoph; Weinert, Christian; Sendner, Christoph; Dmitrienko, Alexandra; Schneider, Thomas
28. Annual Network and Distributed System Security Symposium (NDSS'21)
[Conference Proceedings]


Zur Benutzbarkeit und Verwendung von API-Dokumentationen
R. Huesmann and A. Zeier and A. Heinemann and A. Wiesmaier
Mensch und Computer 2020 - Workshopband
[Conference Proceedings]


Is the Uplink Enough? Estimating Video Stalls from Encrypted Network Traffic
Frank Loh and Florian Wamser and Christian Moldovan and Bernd Zeidler and Dimitrios Tsilimantos and Stefan Valentin and Tobias Hoßfeld
NOMS 2020 - IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, April 20-24, 2020, p.1–9
[Conference Proceedings]


IJNM Special Issue - International Journal of Network Management: QoE-centric analysis and management of communication networks
Florian Wamser and Özgü Alay and Florian Metzger and Stefan Valentin
Int. J. Netw. Manag., Vol.30
[Journal Article]


Post-Quantum Secure Boot
Vinay B. Y. Kumar and Naina Gupta and Anupam Chattopadhyay and Michael Kasper and Christoph Krauß and Ruben Niederhagen
Design, Automation & Test in Europe Conference & Exhibition, DATE 2020
[Conference Proceedings]


TrustEV: Trustworthy Electric Vehicle Charging and Billing
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova
Proceedings of the 35th ACM/SIGAPP Symposium on Applied Computing SAC 2020
[Conference Proceedings]


SEPAD - Security Evaluation Platform for Autonomous Driving
Daniel Zelle and Roland Rieke and Christian Plappert and Christoph Krauß and Dmitry Levshun and Andrey Chechulin
28th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP
[Conference Proceedings]


Post-Quantum TLS on Embedded Systems - Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS
Kevin Bürstinghaus-Steinbach and Christoph Krauß and Ruben Niederhagen and Michael Schneider
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS, p.841–852
[Conference Proceedings]


Securing Electric Vehicle Charging Systems through Component Binding
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova
39th International Conference on Computer Safety, Reliability and Security, SAFECOMP
[Conference Proceedings]


HIP: HSM-based Identities for Plug-and-Charge
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova
Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]


HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova and Ronald Heddergott
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]