Publications
Publications
Poster: Kill Krill or Proxy RPKI
Louis Cattepoel and Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4922–4924
[Conference Proceedings]
The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Elias Heftrig and Haya Schulmann and Niklas Vogel and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.497–510
[Conference Proceedings]
Byzantine-Secure Relying Party for Resilient RPKI
Jens Frieß and Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.49–63
[Conference Proceedings]
External Attack-Surface of Modern Organizations
Nethanel Gelernter and Haya Schulmann and Michael Waidner
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, p.589–604
[Conference Proceedings]
Protocol Fixes for KeyTrap Vulnerabilities
Elias Heftrig and Haya Schulmann and Niklas Vogel and Michael Waidner
Proceedings of the 2024 Applied Networking Research Workshop, p.74–80
[Conference Proceedings]
ZPredict: ML-Based IPID Side-channel Measurements
Haya Schulmann and Shujie Zhao
ACM Trans. Priv. Secur., Vol.27
[Journal Article]
Wie Deutschland zur Cybernation wird
Haya Schulmann and Michael Waidner
Datenschutz und Datensicherheit, Vol.48, p.11–15
[Journal Article]
Privacy Dashboards for Citizens and GDPR Services for Small Data Holders: A Literature Review
N. Puhlmann and A. Wiesmaier and P. Weber and A. Heinemann
Toward Next Generation Quantum-Safe eIDs and eMRTDs: A Survey
N. Alnahawi and N. Schmitt and A. Wiesmaier and C.M. Zok
ACM Trans. Embed. Comput. Syst. (Journal), Vol.23
[Journal Article]
On Criteria and Tooling for Cryptographic Inventories
N. Schmitt and J. Henrich and D. Heinz and N. Alnahawi and A. Wiesmaier
LNI Tagungsband GI Sicherheit 2024, p.49–63
[Conference Proceedings]
PMMP - PQC Migration Management Process
N. von Nethen and A. Wiesmaier and N. Alnahawi and J. Henrich
European Interdisciplinary Cybersecurity Conference (EICC'24), p.144–154
[Conference Proceedings]
One-Class Classification as GLRT for Jamming Detection in Private
5G Networks
Matteo Varotto and
Stefan Valentin and
Francesco Ardizzon and
Samuele Marzotto and
Stefano Tomasin
CoRR, Vol.abs/2405.09565
[Journal Article]
Detecting 5G Narrowband Jammers with CNN, k-nearest Neighbors, and
Support Vector Machines
Matteo Varotto and
Florian Heinrichs and
Timo Schuerg and
Stefano Tomasin and
Stefan Valentin
CoRR, Vol.abs/2405.09564
[Journal Article]
Detecting 5G Narrowband Jammers with CNN, k-nearest Neighbors, and
Support Vector Machines
Matteo Varotto and
Florian Heinrichs and
Timo Schuerg and
Stefano Tomasin and
Stefan Valentin
IEEE International Workshop on Information Forensics and Security,
WIFS 2024, Rome, Italy, December 2-5, 2024, p.1–6
[Conference Proceedings]
One-Class Classification as GLRT for Jamming Detection in Private
5G Networks
Matteo Varotto and
Stefan Valentin and
Francesco Ardizzon and
Samuele Marzotto and
Stefano Tomasin
25th IEEE International Workshop on Signal Processing Advances in
Wireless Communications, SPAWC 2024, Lucca, Italy, September 10-13,
2024, p.201–205
[Conference Proceedings]
Detecting 5G Signal Jammers Using Spectrograms with Supervised and
Unsupervised Learning
Matteo Varotto and
Stefan Valentin and
Stefano Tomasin
IEEE International Conference on Communications Workshops, ICC
2024 Workshops, Denver, CO, USA, June 9-13, 2024, p.767–772
[Conference Proceedings]
Self-sovereign Identity for Electric Vehicle Charging
Kailus, Adrian and Kern, Dustin and Krauß, Christoph
22nd International Conference on Applied Cryptography and Network Security (ACNS), p.137–162
[Conference Proceedings]
Penetration Testing of In-Vehicle Infotainment Systems in Connected Vehicles
Wieser, Hannah and Schäfer, Thomas and Krauß, Christoph
2024 IEEE Vehicular Networking Conference (VNC), p.156-163
[Conference Proceedings]
Security Protocols for Ethernet-Based In-Vehicle Communication
Lauser, Timm and Zelle, Daniel and Kern, Dustin and Krauß, Christoph and Völker, Lars
2024 IEEE Vehicular Networking Conference (VNC), p.148-155
[Conference Proceedings]
Attack Analysis and Detection for the Combined Electric Vehicle Charging and Power Grid Domains
Kern, Dustin and Krauß, Christoph and Hollick, Matthias
19th International Conference on Availability, Reliability and Security (ARES)
[Conference Proceedings]
(Un)authenticated Diagnostic Services: A Practical Evaluation of Vulnerabilities in the UDS Authentication Service
Lauser, Timm and Munoz Molto, Gideon and Krauß, Christoph
Proceedings of the 2024 Cyber Security in CarS Workshop, p.50–60
[Conference Proceedings]
Assessment of Automotive Attack Feasibility Methods in Comparison to Railway and Aviation Methods
von Richthofen, Johannes and Krauß, Christoph and Altgenug, Johann and Spychalski, Dominik and Hommel, Wolfgang
Information Security and Cryptology (ICISC)
[Conference Proceedings]
Toward Next Generation Quantum-Safe eIDs and eMRTDs: A Survey
Alnahawi, Nouri and Schmitt, Nicolai and Wiesmaier, Alexander and Zok, Chiara-Marie
ACM Trans. Embed. Comput. Syst., Vol.23
[Journal Article]
On Criteria and Tooling for Cryptographic Inventories
Schmitt, Nicolai and Henrich, Johanna and Heinz, Dominik and Alnahawi, Nouri and Wiesmaier, Alexander
Sicherheit 2024, p.49–63
PMMP-PQC Migration Management Process
Von Nethen, Nils and Wiesmaier, Alexander and Alnahawi, Nouri and Henrich, Johanna
Proceedings of the 2024 European Interdisciplinary Cybersecurity Conference, p.144–154
[Conference Proceedings]
Hornung/Schallbruch (Hrsg.): IT-Sicherheitsrecht. Praxishandbuch. 2. Auflage
Marian Margraf and Andreas Heinemann
[Book Article]
Bopp, Karen and Heinemann, Andreas and Renaud, Karen
How to Respect Bystanders' Privacy in Smart Homes - A Co-Creation Study
Hahn, Sara and Al-Amrani, Nusaibah and Allagah, Sara and Huang, He Rong and Kircher, Eva and Rehs, Cornelia and Vogt, Joachim and Marky, Karola and Gerber, Nina
Proceedings of the 13th Nordic Conference on Human-Computer Interaction
[Conference Proceedings]
Presentation Attack Detection using iris periocular visual spectrum images
A. Valenzuela and J.Tapia and V. Chang and C. Busch
Frontiers on Image
[Journal Article]
Impact of Occlusion Masks on Gender Classification from Iris Texture
J. Tapia and C. Yanez and C. Perez and C. Busch
IET Biometrics
[Journal Article]


