Publications
Publications
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics
Bindel, Nina; Buchmann, Johannes; Krämer, Juliane; Mantel, Heiko; Schickel, Johannes; Weber, Alexandra
The 10th International Symposium on Foundations & Practice of Security
[Conference Proceedings]
Towards Blockchain-Based Collaborative Intrusion Detection Systems
Alexopoulos, Nikolaos; Vasilomanolakis, Emmanouil; Ivanko, Natalia Reka; Mühlhäuser, Max
12th International Conference on Critical Information Infrastructures Security (CRITIS 2017)
[Conference Proceedings]
ATRIUM: Runtime Attestation Resilient Under Memory Attacks
Zeitouni, Shaza; Dessouky, Ghada; Arias, Orlando; Sullivan, Dean; Ibrahim, Ahmad; Jin, Yier; Sadeghi, Ahmad-Reza
2017 International Conference On Computer Aided Design (ICCAD'17)
[Conference Proceedings]
Oblivious Neural Network Predictions via MiniONN Transformations
Liu, Jian; Juuti, Mika; Lu, Yao; Asokan, N.
ACM CCS 2017, ACM Conference on Computer and Communications Security
[Conference Proceedings]
CogniCrypt: Supporting Developers in using Cryptography
Krüger, Stefan; Nadi, Sarah; Reif, Michael; Ali, Karim; Mezini, Mira; Bodden, Eric; Göpfert, Florian; Günther, Felix; Weinert, Christian; Demmler, Daniel; Kamath, Ram
Automated Software Engineering (ASE'17)
[Conference Proceedings]
Towards Accelerated Usage Control based on Access Correlations
Gay, Richard; Hu, Jinwei; Mantel, Heiko; Schickel, Johannes
NordSec2017 - Nordic Conference on Secure IT Systems
[Conference Proceedings]
Privacy-Preserving Whole-Genome Variant Queries
Demmler, Daniel; Hamacher, Kay; Schneider, Thomas; Stammler, Sebastian
Cryptology and Network Security, p.71-92
[Conference Proceedings]
I Trust my Zombies: a Trust-enabled Botnet
Vasilomanolakis, Emmanouil; Wolf, Jan Helge; Böck, Leon; Mühlhäuser, Max; Karuppayah, Shankar
Blackhat Europe
[Conference Proceedings]
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage
Sarangdhar, Ravi; Fan, Yufan; Anagnostopoulos, Nikolaos Athanasios; Gayer, Udo; Flederer, Frank; Mikschl, Tobias; Arul, Tolga; John, Philipp R.; Hierholz, Kirsten; Montenegro, Sergio; Katzenbeisser, Stefan
27th Crypto-Day
[Conference Proceedings]
More Efficient Universal Circuit Constructions
Günther, Daniel; Kiss, Ágnes; Schneider, Thomas
23. Advances in Cryptology -- ASIACRYPT 2017
[Conference Proceedings]
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers
Chiesa, Marco; Demmler, Daniel; Canini, Marco; Schapira, Michael; Schneider, Thomas
CoNEXT '17: Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, p.120-133
[Conference Proceedings]
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β
Buchmann, Johannes; Holzer, Patrick; Wunderer, Thomas
INDOCRYPT 2017 - 18th International Conference on Cryptology in India
[Conference Proceedings]
An extensive classification and analysis of attacks against Physical Unclonable Functions (PUFs)
Anagnostopoulos, Nikolaos Athanasios; Gabmeyer, Sebastian; Arul, Tolga; Katzenbeisser, Stefan
27th Crypto-Day
[Conference Proceedings]
Revisiting the Expected Cost of Solving uSVP and Applications to LWE
Albrecht, Martin; Göpfert, Florian; Vidria, Fernando; Wunderer, Thomas
ASIACRYPT 2017 - Advances in Cryptology
[Conference Proceedings]
Towards enhancing the visual analysis of interdomain routing
Ulmer, Alex; Kohlhammer, Jörn; Shulman, Haya
International Joint Conference on Computer Vision and Computer Graphics Theory and Applications (VISIGRAPP) 12, 2017, Porto>
[Conference Paper]
Sicherheitsaspekte und Vergleich der Blockchiffren LED und TEA
M. Appel and C. Pauer and A. Wiesmaier
[Report]
Comparison of two Lightweight Stream Ciphers: MICKEY 2.0 & WG-8
P. Jattke and M. Senker and A. Wiesmaier
[Report]
Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium
L. Dietrich and P. Jattke and L. Murati and M. Senker and A. Wiesmaier
[Report]
ECDSA and QUARTZ in Comparison with RSA
P. Lieb and M. Schmidt and A. Wiesmaier
[Report]
A Survey on Protocols securing the Internet of Things: DTLS, IPSec and IEEE 802.11i
R. Röpke and T. Thräm and J. Wagener and A. Wiesmaier
[Report]
Security aspects and comparison of block ciphers LED and TEA
M. Appel and C. Pauer and A. Wiesmaier
[Report]
A comparison of block ciphers SIMON, SPECK, and KATAN
A. Bossert and S. Cooper and A. Wiesmaier
[Report]
Block ciphers for the IoT – SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared
M. Appel and A. Bossert and S. Cooper and T. Kußmaul and J. Löffler and C. Pauer and A. Wiesmaier
[Report]
On the Security & Privacy of Internet of Things Architectures and Systems
E. Vasilomanolakis and J. Daubert and M. Luthra and V. Gazis and A. Wiesmaier and P. Kikiras
2015 International Workshop on Secure Internet of Things (SIoT), p.49–57
[Conference Proceedings]
Advanced Remote Firmware Upgrades Using TPM 2.0
Andreas Fuchs and Christoph Krauß and Jürgen Repp
Proceedings of the 31th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
[Conference Proceedings]
Evaluation of Lightweight TPMs for Automotive Software Updates over the Air
Richard Petri and Markus Springer and Daniel Zelle and Ira McDonald and Andreas Fuchs and Christoph Krauß
4th Embedded Security in Cars (escar) USA
[Conference Proceedings]
Zur Benutzbarkeit der AusweisApp2
Jörg Willomitzer and
Andreas Heinemann and
Marian Margraf
Mensch & Computer Workshopband
[Conference Proceedings]
Usability-Untersuchung eines Papierprototypen für eine mobile
Online-Ausweisfunktion des Personalausweises
Sandra Kostic and
Andreas Heinemann and
Marian Margraf
GI-Jahrestagung, p.519–527
[Conference Proceedings]
Workshop: Nutzerzentrierte Sicherheit - NzS 2016
Andreas Heinemann and
Steffen Lange and
Marian Margraf and
Jörg Willomitzer
GI-Jahrestagung, p.485–486
[Conference Proceedings]
In Whom Do We Trust - Sharing Security Events
J. Steinberger and B. Kuhnert and A. Sperotto and H. Baier and A. Pras
Management and Security in the Age of Hyperconnectivity, p.111–124


