Publications

Publications

Trusted Configuration in Cloud FPGAs

Zeitouni, Shaza; Vliegen, Jo; Frassetto, Tommaso; Koch, Dirk; Sadeghi, Ahmad-Reza; Mentens, Nele
29th IEEE International Symposium on Field-Programmable Custom Computing Machines
Language: English
[Conference Proceedings]

FLGUARD: Secure and Private Federated Learning

Nguyen, Thien Duc; Rieger, Phillip; Yalame, Mohammad Hossein; Möllering, Helen; Fereidooni, Hossein; Marchal, Samuel; Miettinen, Markus; Mirhoseini, Azalia; Sadeghi, Ahmad-Reza; Schneider, Thomas; Zeitouni, Shaza
Crytography and Security
Language: English
[Journal Article]

Privacy-Enhanced Robust Image Hashing with Bloom Filters

Breidenbach, Uwe; Steinebach, Martin; Liu, Huajian
International Conference on Availability, Reliability and Security (ARES) <15, 2020, Online>
Language: English
[Journal Article, Conference Paper, Electronic Publication]

Critical Traffic Analysis on the Tor Network

Platzer, Florian; Schäfer, Marcel; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) <15, 2020, Online>
Language: English
[Journal Article, Conference Paper, Electronic Publication]

Cover-aware Steganalysis

Bunzel, Niklas; Steinebach, Martin; Liu, Huajian
Language: English
[Journal Article, Electronic Publication]

Secure gate: Secure gateways and wireless sensors as enablers for sustainability in production plants

Bienhaus, Diethelm; Ebner, Andreas; Jäger, Lukas; Rieke, Roland; Krauß, Christoph
Language: English
[Journal Article, Electronic Publication]

Cybersicherheitsforschung als Teil der nationalen Sicherheitsarchitektur

Kreutzer, Michael; Schneider, Markus
Language: German
[Journal Article]

Detection of Fiber Defects Using Keypoints and Deep Learning

Siegmund, Dirk; Fu, Biying; José-García, Adán; Salahuddin, Ahmad Masood; Kuijper, Arjan
Language: English
[Journal Article]

Generalization of Fitness Exercise Recognition from Doppler Measurements by Domain-Adaption and Few-Shot Learning

Fu, Biying; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
International Conference on Pattern Recognition (ICPR) <25, 2021, Online>
Language: English
[Conference Paper]

Data Protection in AI Services: A Survey

Meurisch, Christian; Mühlhäuser, Max
ACM Computing Surveys
Language: English
[Journal Article]

Two-Party Adaptor Signatures From Identification Schemes

Erwig, Andreas; Faust, Sebastian; Hostáková, Kristina; Maitra, Monosij; Riahi, Siavash
24th International Conference on Practice and Theory of Public-Key Cryptography
Language: English
[Conference Proceedings]

Bitcoin-Compatible Virtual Channels

Aumayr, Lukas; Ersoy, Oguzhan; Erwig, Andreas; Faust, Sebastian; Hostáková, Kristina; Maffei, Matteo; Moreno-Sanchez, Pedro; Riahi, Siavash
42nd IEEE Symposium on Security and Privacy
Language: English
[Conference Proceedings]

Scalable W-type entanglement resource in neutral-atom arrays with Rydberg-dressed resonant dipole-dipole interaction

Stojanovic, Vladimir M.
Physical Review A
Language: English
[Journal Article]

Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge

Fischlin, Marc; Rohrbach, Felix
24th International Conference on Practice and Theory of Public-Key Cryptography
Language: English
[Conference Proceedings]

Remote WebAuthn: FIDO2 Authentication for Less Accessible Devices

Wagner, Paul; Heid, Kris; Heider, Jens
International Conference on Information Systems Security and Privacy (ICISSP) <7, 2021, Online>
Language: English
[Conference Paper, Electronic Publication]

HERA: Hotpatching of Embedded Real-time Applications

Niesler, Christian; Surminski, Sebastian; Davi, Lucas
Proc. of 28th Network and Distributed System Security Symposium (NDSS 2021)
Language: English
[Conference Proceedings]

Sustainable Solving: Reducing the Memory Footprint of IFDS-Based Data Flow Analyses Using Intelligent Garbage Collection

Arzt, Steven
International Conference on Software Engineering (ICSE) <43, 2021, Online>
Language: English
[Conference Paper, Electronic Publication, Presentation]

RNNIDS: Enhancing network intrusion detection systems through deep learning

Sohi, Soroush M.; Seifert, Jean-Pierre; Ganji, Fatemeh
Language: English
[Journal Article]

Risiken für die Privatheit aufgrund von Maschinellem Lernen

Battis, Anna-Verena; Graner, Lukas
Gesellschaft für Informatik (GI Jahrestagung) <50, 2020, Online>
Language: German
[Conference Paper, Electronic Publication]

The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions

Zimmermann, Verena; Renaud, Karen
ACM Transactions on Computer-Human Interaction, p.7:1-7:45
Language: English
[Journal Article]

ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation

Patra, Arpita; Schneider, Thomas; Suresh, Ajith; Yalame, Mohammad Hossein
30th USENIX Security Symposium (USENIX Security'21)
Language: English
[Conference Proceedings]

All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers

Hagen, Christoph; Weinert, Christian; Sendner, Christoph; Dmitrienko, Alexandra; Schneider, Thomas
28. Annual Network and Distributed System Security Symposium (NDSS'21)
Language: English
[Conference Proceedings]

A Visualization Interface to Improve the Transparency of Collected Personal Data on the Internet

Schufrin, Marija; Reynolds, Steven Lamarr; Kuijper, Arjan; Kohlhammer, Jörn
Language: English
[Journal Article]

Microgrid Systems: Towards a Technical Performance Assessment Frame

Marchand, Sophie; Monsalve, Cristian; Reimann, Thorsten; Heckmann, Wolfram; Ungerland, Jakob; Lauer, Hagen; Ruhe, Stephan; Krauß, Christoph
Energies, Vol.14, p.23
[Conference Proceedings]

Verfassungs- und völkerrechtliche Fragen im militärischen Cyber- und Informationsraum unter besonderer Berücksichtigung des Parlamentsvorbehalts, der Zurechenbarkeit von Cyberangriffen sowie einer möglichen Anpassung nationaler und inter­nationaler Normen

Reinhold, Thomas
Language: German
[Report]

Optimal transport layer for secure computation

Brandt, M.; Orlandi, C.; Shrishak, K.; Shulman, H.
International Conference on Security and Cryptography (SECRYPT) <17, 2020, Online>
Language: English
[Conference Paper]

An Overview of the Botnet Si­mu­la­tion Framework

Böck, Leon; Shankar, Karuppayah; Mühlhäuser, Max; Emmanouil, Vasilomanolakis
The Journal on Cybercrime & Digital Investigations, p.1-10
Language: English
[Journal Article]

Control Behavior Integrity for Distributed Cyber-Physical Systems

Adepu, Sridhar; Brasser, Ferdinand; Garcia, Luis; Rodler, Michael; Davi, Lucas; Sadeghi, Ahmad-Reza; Zonouz, Saman A.
2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS), p.1-15
Language: English
[Conference Proceedings]

Cryptanalysis of FNV-Based cookies

Klein, A.; Shulman, H.; Waidner, M.
Global Communications Conference (GLOBECOM) <2020, Online>
Language: English
[Conference Paper]

Face Presentation Attack Detection in Ultraviolet Spectrum via Local and Global Features

Siegmund, Dirk; Kerckhoff, Florian; Yeste Magdaleno, Javier; Jansen, Nils; Kirchbuchner, Florian; Kuijper, Arjan
Gesellschaft für Informatik, Special Interest Group on Biometrics and Electronic Signatures (BIOSIG International Conference) <19, 2020, Online>
Language: English
[Conference Paper]