Publications

Publications

Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting
Richter, Philipp; Yang, Zheng; Tkachenko, Oleksandr; Leppäkoski, Helena; Järvinen, Kimmo; Schneider, Thomas
8. International Conference on Localization and GNSS (ICL-GNSS'18)
[Conference Proceedings]


How Secure is Green IT? The Case of Software-Based Energy Side Channels
Mantel, Heiko; Schickel, Johannes; Weber, Alexandra; Weber, Friedrich
ESORICS 2018
[Conference Proceedings]


Differential Power Analysis of XMSS and SPHINCS
Kannwischer, Matthias; Genêt, Aymeric; Butin, Denis; Krämer, Juliane; Buchmann, Johannes
9th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2018)
[Conference Proceedings]


Faster Privacy-Preserving Location Proximity Schemes
Järvinen, Kimmo; Kiss, Ágnes; Schneider, Thomas; Tkachenko, Oleksandr; Yang, Zheng
Cryptology and Network Security, p.3-22
[Conference Proceedings]


PROPYLA: Privacy Preserving Long-Term Secure Storage
Geihs, Matthias; Karvelas, Nikolaos; Katzenbeisser, Stefan; Buchmann, Johannes
SCC Workshop @ AsiaCCS 2018
[Conference Proceedings]


Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent
Fischlin, Marc; Harasser, Patrick
Applied Cryptography and Network Security - ACNS 2018, p.202-220
[Conference Proceedings]


PIR-PSI: Scaling Private Contact Discovery
Demmler, Daniel; Rindal, Peter; Rosulek, Mike; Trieu, Ni
Proceedings on Privacy Enhancing Technologies (PoPETs), p.159-178
[Journal Article]


Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples
Bindel, Nina; Buchmann, Johannes; Göpfert, Florian; Schmidt, Markus
Journal of Mathematical Cryptology
[Journal Article]


An Overview of DRAM-Based Security Primitives
Anagnostopoulos, Nikolaos Athanasios; Katzenbeisser, Stefan; Chandy, John A.; Tehranipoor, Fatemeh
Cryptography
[Journal Article]


Towards Secure Distributed Trust Management on a Global Scale
Alexopoulos, Nikolaos; Habib, Sheikh Mahbub; Mühlhäuser, Max
IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy
[Conference Proceedings]


Estimate all the {LWE, NTRU} schemes!
Albrecht, Martin R.; Curtis, Benjamin R.; Deo, Amit; Davidson, Alex; Player, Rachel; Postlethwaite, Eamonn W.; Virdia, Fernando; Wunderer, Thomas
SCN 2018
[Conference Proceedings]


Towards Practical RAM based Secure Computation
Buescher, Niklas; Weber, Alina; Katzenbeisser, Stefan
European Symposium on Research in Computer Security (ESORICS)
[Conference Proceedings]


IMIX: In-Process Memory Isolation EXtension
Frassetto, Tommaso; Jauernig, Patrick; Liebchen, Christopher; Sadeghi, Ahmad-Reza
Proceedings of the 27th USENIX Security Symposium, p.83-97
[Conference Proceedings]


Decay-Based DRAM PUFs in Commodity Devices
Schaller, André; Xiong, Wenjie; Anagnostopoulos, Nikolaos Athanasios; Saleem, Umair; Gabmeyer, Sebastian; Skoric, Boris; Katzenbeisser, Stefan; Szefer, Jakub
IEEE Transactions on Dependable and Secure Computing (TDSC)
[Journal Article]


Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and Their Security Applications
Kumar, Manish; Anagnostopoulos, Nikolaos Athanasios; Fan, Yufan; Katzenbeisser, Stefan
28th Crypto-Day
[Conference Proceedings]


Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions
Anagnostopoulos, Nikolaos Athanasios; Arul, Tolga; Fan, Yufan; Hatzfeld, Christian; Tehranipoor, Fatemeh; Katzenbeisser, Stefan
28th Crypto-Day
[Conference Proceedings]


Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security
Anagnostopoulos, Nikolaos Athanasios; Arul, Tolga; Fan, Yufan; Hatzfeld, Christian; Schaller, André; Xiong, Wenjie; Jain, Manishkumar; Saleem, Umair; Lotichius, Jan; Gabmeyer, Sebastian; Szefer, Jakub; Katzenbeisser, Stefan
Cryptography
[Journal Article]


VoiceGuard: Secure and Private Speech Processing
Brasser, Ferdinand; Frassetto, Tommaso; Riedhammer, Korbinian; Sadeghi, Ahmad-Reza; Schneider, Thomas; Weinert, Christian
Interspeech 2018
[Conference Proceedings]


HyCC: Compilation of Hybrid Protocols for Practical Secure Computation
Büscher, Niklas; Demmler, Daniel; Katzenbeisser, Stefan; Kretzmer, David; Schneider, Thomas
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, p.847-861
[Conference Proceedings]


Constrained PET Composition for Measuring Enforced Privacy
S. Funke and A. Wiesmaier and J. Daubert
Proceedings of the 12th International Conference on Availability, Reliability and Security, p.16:1–16:10
[Conference Proceedings]


On Using TLS to Secure In-Vehicle Networks
Daniel Zelle and Christoph Krauß and Hubert Strauß and Karsten Schmidt
Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES)
[Conference Proceedings]


Selbstdatenschutz im vernetzten Fahrzeug - Eine Datenschutzloesung unter Berücksichtigung der technischen, rechtlichen und Nutzeranforderungen
Christoph Krauß and Rasmus Robrahn and Thilo von Pape and Daniel Zelle
Datenschutz und Datensicherheit, Vol.41, p.217-222
[Journal Article]


Runtime Firmware Product Lines using TPM2.0
Andreas Fuchs and Christoph Krauß and Jürgen Repp
Proceedings of the 32th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
[Conference Proceedings]


A Privacy-aware Data Access System for Automotive Applications
Christian Plappert and Daniel Zelle and Christoph Krauß and Benjamin Lange and Sebastian Mauthofer and Jonas Walter and Bettina Abendroth and Rasmus Robrahn and Thilo von Pape and Hendrik Decke
15th Embedded Security in Cars (escar)
[Conference Proceedings]


Design and Implementation Aspects of Mobile Derived Identities
Daniel Träder and Alexander Zeier and Andreas Heinemann
CoRR, Vol.abs/1707.06505
[Journal Article]


Design and Implementation Aspects of Mobile Derived Identities
Daniel Träder and Alexander Zeier and Andreas Heinemann
Open Identity Summit, p.147–152
[Conference Proceedings]


Alle reden über Blockchain
Rüdiger Grimm and Andreas Heinemann
Datenschutz und Datensicherheit, Vol.41, p.469
[Journal Article]


Biometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reporting
U. Scherhag and A. Nautsch and C. Rathgeb and M. Gomez-Barrero and R. N. J. Veldhuis and Luuk Spreeuwers and Maikel Schils and Davide Maltoni and Patrick Grother and Sebastien Marcel and Ralph Breithaupt and Raghavendra Ramachandra and Christoph Busch
Intl. Conf. of the Biometrics Special Interest Group BIOSIG 2017, p.1–7
[Conference Proceedings]


On the Vulnerability of Face Recognition Systems Towards Morphed Face Attacks
U. Scherhag and R. Raghavendra and K. B. Raja and M. Gomez-Barrero and C. Rathgeb and C. Busch
5th Intl. Workshop on Biometrics and Forensics (IWBF), p.1–6
[Conference Proceedings]


Iris biometric template protection
C. Rathgeb and J. Wagner and C. Busch
Iris and Periocular Biometric Recognition, p.317–340