Publications
Publications
Pruning the Tree: Rethinking RPKI Architecture From The Ground Up
[Conference Proceedings]
Secure Medical Digital Twins: A Use-Case Driven Approach
Ahmad, Salmah; Bartelt, Bianca; Enzmann, Matthias; Kohlhammer, Jörn; Wesarg, Stefan; Wolf, Ruben
International Workshop on Digital Twin for Healthcare 2025
[Conference Paper]
LightShed: Defeating Perturbation-based Image Copyright Protections
Foerster, Hanna; Behrouzi, Sasha; Rieger, Phillip; Jadliwala, Murtuza; Sadeghi, Ahmad-Reza
Proceedings of the 34th USENIX Security Symposium, p.7271-7290
[Conference Proceedings]
ZORRO: Zero-Knowledge Robustness and Privacy for Split Learning
Sheybani, Nojan; Pegoraro, Alessandro; Knauer, Jonathan; Rieger, Phillip; Mollakuqe, Elissa; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza
CCS '25: Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.321-334
[Conference Proceedings]
Learning to Identify Conflicts in RPKI
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, p.1490–1505
[Conference Proceedings]
ValidaTor: Domain Validation over Tor
22nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 25), p.1367–1380
[Conference Proceedings]
Stealth BGP Hijacks with uRPF Filtering
19th USENIX WOOT Conference on Offensive Technologies (WOOT 25), p.129–138
[Conference Proceedings]
Poster: Exploring the Landscape of RPKI Relying Parties
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4773–4775
[Conference Proceedings]
Poster: We must talk about RPKI Repositories
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4755–4757
[Conference Proceedings]
Poster: The Rocky Road Towards RPKI Algorithm Agility
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4767–4769
[Conference Proceedings]
Demo: Stopping Production Testing: A Graphical RPKI Test-Suite
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4722–4723
[Conference Proceedings]
Post-Quantum Cryptography in eMRTDs – Evaluating PAKE and PKI for Travel Documents
Security Standardisation Research Conference (SSR'25)
[Conference Proceedings]
Improving Anomaly Detection for Electric Vehicle Charging with Generative Adversarial Networks
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing SAC, p.1800–1809
[Conference Proceedings]
Anomaly Detection and Mitigation for Electric Vehicle Charging-Based Attacks on the Power Grid
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing SAC, p.1790–1799
[Conference Proceedings]
Data Distribution and Redistribution - A formal and practical Analysis of the DDS Security Standard
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing SAC, p.1839–1848
[Conference Proceedings]
RollCAN – CAN-bus based RollJam-Attack
Proceedings of the 2nd Cyber Security in CarS Workshop
[Conference Proceedings]
Towards a Holistic and Multi-Modal Vehicle Security Monitoring
Proceedings of the 20th International Conference on Critical Information Infrastructures Security (CRITIS)
[Conference Proceedings]
CarDS - Controller Area Network and Automotive Ethernet Realistic Data Set
Proceedings of the 41st Annual Computer Security Applications Conference (ACSAC)
[Conference Proceedings]
A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection?
Information Security, p.107–128
[Conference Proceedings]
Simulation-Based Software Leakage Evaluation for the RISC-V Platform
Information Security, p.175–195
[Conference Proceedings]
Syn-IDPass: Passport Synthetic Dataset for Presentation Attack Detection?
Proc. IEEE Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]
Single-morphing attack detection using few-shot learning and triplet-loss
Neurocomputing
[Conference Proceedings]
Generating Automatically Print/Scan Textures for Morphing Attack Detection Applications
IEEE Access
[Conference Proceedings]
Towards Iris Presentation Attack Detection with Foundation Models
The 19th IEEE International Conference on Automatic Face and Gesture
[Conference Proceedings]
Can Foundation Models Predict Fitness for Duty?
The IEEE International Joint Conference on Biometrics (IJCB)
[Conference Proceedings]
Enhanced Deep Learning DeepFake Detection Integrating Handcrafted Features
21st International Conference in Computer Analysis of Images and Patterns (CAIP) September 22-25
[Conference Proceedings]
Second Competition on Presentation Attack Detection on ID Card
International Joint Conference in Biometrics (IJCB) 2025
[Conference Proceedings]
Impact and Mitigation of Quality Degradation for Differential Morphing Attack Detection
Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]
Secure Multi-Party Homomorphic Encryption for Post-Quantum Biometric Recognition
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]
LivDet 2025: Toward Robust and Generalizable Fingerprint Presentation Attack Detection
Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


