Publications

Publications

SAX-PAC (Scalable And eXpressive PAcket Classification)
Kogan, Kirill; Nikolenko, Sergey I.; Rottenstreich, Ori; Culhane, William; Eugster, Patrick
Proceedings of the 2014 ACM conference on SIGCOMM, p.15-26
[Conference Proceedings]


ASM: A Programmable Interface for Extending Android Security
Heuser, Stephan; Nadkarni, Adwait; Enck, William; Sadeghi, Ahmad-Reza
23rd USENIX Security Symposium
[Conference Proceedings]


Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
Demmler, Daniel; Schneider, Thomas; Zohner, Michael
23. USENIX Security Symposium (USENIX Security'14)
[Conference Proceedings]


Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection
Davi, Lucas; Lehmann, Daniel; Sadeghi, Ahmad-Reza; Monrose, Fabian
23rd USENIX Security Symposium
[Conference Proceedings]


The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques
Davi, Lucas; Lehmann, Daniel; Sadeghi, Ahmad-Reza
BlackHat USA
[Conference Proceedings]


Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
Brzuska, Christina; Farshim, Pooya; Mittelbach, Arno
Advances in Cryptology – CRYPTO 2014. 34th Annual Cryptology Conference. Santa Barbara, CA, USA. August 17-21, 2014. Proceedings., p.188-205
[Conference Proceedings]


Mobile Trusted Computing
Asokan, N.; Ekberg, Jan-Erik; Kostiainen, Kari; Rajan, Anand; Rozas, Carlos; Sadeghi, Ahmad-Reza; Schulz, Steffen; Wachsmann, Christian
Proceedings of the IEEE, p.1189-1206
[Journal Article]


AES-SEC: Improving software obfuscation through hardware-assistance (short paper)
Schrittwieser, Sebastian; Katzenbeisser, Stefan; Merzdovnik, Georg; Kieseberg, Peter; Weippl, Edgar
Proceedings of the 2014 Ninth International Conference on Availability, Reliability and Security Pages, p.184-191
[Conference Proceedings]


Patrolling wireless sensor networks: Randomized intrusion detection
Riecker, Michael; Yuan, Dingwen; Bansarkhani, Rachid El; Hollick, Matthias
10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet ’14, p.61-69
[Conference Proceedings]


Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
Neumann, Stephan; Olembo, Maina; Renaud, Karen; Volkamer, Melanie
3rd International Conference on Electronic Government and the Information Systems Perspective, p.246-260
[Conference Proceedings]


A Usable Android Application Implementing Distributed Cryptography For Election Authorities
Neumann, Stephan; Kulyk, Oksana; Volkamer, Melanie
9th International Workshop on Frontiers in Availability, Reliability and Security - FARES 2014, p.198-207
[Conference Proceedings]


Tracking Load-time Configuration Option
Lillack, Max; Kästner, Christian; Bodden, Eric
Proceedings of the 29th ACM/IEEE international conference on Automated software engineering, p.445-456
[Conference Proceedings]


DNS Security: Past, Present and Future
Herzberg, Amir; Shulman, Haya
Future Security Conference 2014
[Conference Proceedings]


Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms
Geihs, Matthias; Cabarcas, Daniel
3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, p.48-63
[Conference Proceedings]


Coercion-Resistant Internet Voting in Practice
Feier, Christian; Neumann, Stephan; Volkamer, Melanie
INFORMATIK 2014: Big Data - Komplexität meistern, p.1401-1414
[Conference Proceedings]


High-speed signatures from standard lattices
Dagdelen, Özgür; Bansarkhani, Rachid El; Göpfert, Florian; Güneysu, Tim; Oder, Tobias; Pöppelmann, Thomas; Sanchez, Ana Helena; Schwabe, Peter
Latincrypt 2014
[Conference Proceedings]


Analyzing the Effectiveness of DoS Attacks on Tor
Conrad, Bernd; Shirazi, Fatemeh
7th International Conference on Security of Information and Networks (SIN 2014)
[Conference Proceedings]


NoPhish: An Anti-Phishing Education App
Canova, Gamze; Volkamer, Melanie; Bergmann, Clemens; Borza, Roland
10th International Workshop on Security and Trust Management in conjunction with ESORICS 2014, p.188-192
[Conference Proceedings]


Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail
Budurushi, Jurlind; Neumann, Stephan; Shala, Genc; Volkamer, Melanie
INFORMATIK 2014: Big Data - Komplexität meistern, p.1415-1426
[Conference Proceedings]


Towards Security Solutions for Emergent Business Software
Buchmann, Johannes; Bansarkhani, Rachid El; Hauke, Sascha
Future Business Software Conference 2012, p.67-80
[Conference Proceedings]


Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten
Bartsch, Steffen; Boos, Carina; Canova, Gamze; Dyck, Dominic; Henhapl, Birgit; Schultheis, Michael; Volkamer, Melanie
Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014, p.2069-2078
[Conference Proceedings]


Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks
Ambrosin, Moreno; Busold, Christoph; Conti, Mauro; Sadeghi, Ahmad-Reza; Schunter, Matthias
Computer Security - ESORICS 2014, p.76-93


Mitigating Eclipse Attacks in Peer-to-Peer Networks
Suri, Neeraj; Germanus, Daniel; Roos, Stefanie; Strufe, Thorsten
In Proceedings of IEEE Conference on Communications and Network Security (CNS)
[Conference Proceedings]


Reducing User Tracking through Automatic Web Site State Isolations
Stopczynski, Martin; Zugelder, Michael
Information Security, p.309-327
[Conference Proceedings]


EventBreak: Analyzing the Responsiveness of User Interfaces through Performance-Guided Test Generation
Pradel, Michael; Schuh, Parker; Necula, George; Sen, Koushik
Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, p.33-47
[Conference Proceedings]


Pretty Understandable Democracy 2.0
Neumann, Stephan; Feier, Christian; Sahin, Perihan; Fach, Sebastian
6th International Conference on Electronic Voting (EVOTE), p.69 - 72
[Conference Proceedings]


i3QL: Language-Integrated Live Data Views
Mitschke, Ralf; Erdweg, Sebastian; Köhler, Mirko; Mezini, Mira; Salvaneschi, Guido
Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, p.417-432
[Conference Proceedings]


Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design
Kulyk, Oksana; Feier, Christian; Köster, Thorben
6th International Conference on Electronic Voting - EVOTE 2014, p.1-10
[Conference Proceedings]


The Cubic Simple Matrix Encryption Scheme
Ding, Jintai; Petzoldt, Albrecht; Wang, Lih-Chung
PQCrypto 2014, p.76-87
[Conference Proceedings]


A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations
Dagdelen, Özgür; Venturi, Daniele
BalkancryptSec 2014 - International Conference on Cryptography and Information security, p.161-172
[Conference Proceedings]