Publications

Publications

Dynamic Tree Colors: Adaptive Discriminable Hierarchies with Minimum Instability
Mertz, Tobias; Reynolds-Ringer, Steven Lamarr; Kohlhammer, Jörn
International Conference on Computer Graphics, Interaction and Visualization Theory and Applications 2026
[Conference Paper]


Impact of Head Pose Angles on Face Image Quality and Recognition Performance
Kurz, Alexander; Carnap, Jacob; Henniger, Olaf
International Conference on Pattern Recognition Applications and Methods 2026
[Conference Paper]


Too Much Sharing, Too Little Security: Authentication Cookie Theft At Scale
Tobias Gattermayer and Haya Schulmann
Proceedings of the ACM Web Conference 2026
[Conference Proceedings]


AdaptDiff: Adaptive Guidance in Diffusion Models for Diverse and Identity-Consistent Face Synthesis (Student Abstract)
Loureiro Caldeira, Maria Eduarda; Chettaoui, Tahar; Damer, Naser; Boutros, Fadi
Conference on Artificial Intelligence 2026
[Conference Paper]


ViTNT-FIQA: Training-Free Face Image Quality Assessment with Vision Transformers
Ozgur, Guray; Loureiro Caldeira, Maria Eduarda; Chettaoui, Tahar; Kolf, Jan Niklas; Huber, Marco; Damer, Naser; Boutros, Fadi
Winter Conference on Applications of Computer Vision 2026
[Paper]


Fast Rerouting Against Dynamic Failures: 2-Resilience via Ear-Decomposition and Planarity
Dai, Wenkai; Foerster, Klaus-Tycho Tycho; Schmid, Stefan
International Conference on Principles of Distributed Systems 2025
[Conference Paper]


Identifying Microcontroller Architecture Through Static Analysis of Firmware Binaries
Malaschonok, David
Workshop on Security and Privacy in Standardized IoT 2026
[Conference Paper]


Pruning the Tree: Rethinking RPKI Architecture From The Ground Up
Haya Schulmann and Niklas Vogel
33rd Annual Network and Distributed System Security Symposium
[Conference Proceedings]


Secure Medical Digital Twins: A Use-Case Driven Approach
Ahmad, Salmah; Bartelt, Bianca; Enzmann, Matthias; Kohlhammer, Jörn; Wesarg, Stefan; Wolf, Ruben
International Workshop on Digital Twin for Healthcare 2025
[Conference Paper]


Distributed Construction of Demand-Aware Datacenter Networks
Figiel, Aleksander; Melnyk, Darya; Milentijevic, Tijana; Schmid, Stefan
39th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2025
[Conference Paper]


Fraunhofer SIT at GenAI Detection Task 1: Adapter Fusion for AI-generated Text Detection
Schäfer, Karla; Steinebach, Martin
1st Workshop on GenAI Content Detection, GenAIDetect 2025
[Conference Paper]


Security Assessment of Mobile Banking Apps in West African Economic and Monetary Union
Diallo, Alioune; War, Aicha; Diouf, Moustapha Awwalou; Samhi, Jordan; Arzt, Steven; Bissyandé, Tégawendé François; Klein, Jacques
2nd Cyber­security for Development, C4D 2025
[Conference Paper]


Learning to Identify Conflicts in RPKI
Shulman, Haya; Zhao, Shujie
20th ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2025
[Conference Paper]


Second Competition on Presentation Attack Detection on ID Card
Tapia, Juan E.; Nieto, Mario; Espin, Juan M.; Rocamora, Alvaro S.; Barrachina, Javier; Damer, Naser; Busch, Christoph; Ivanovska, Marija; Todorov, Leon; Khizbullin, Renat; Lazarevich, Lazar; Grishin, Aleksei; Schulz, Daniel; Gonzalez, Sebastian; Mohammadi, Amir; Kotwal, Ketan; Marcel, Sebastien; Mudgalgundurao, Raghavendra; Raja, Kiran; Schuch, Patrick; Patwardhan, Sushrut; Ramachandra, Raghavendra; Pereira, Pedro Couto; Pinto, Joao Ribeiro; Xavier, Mariana; Valenzuela, Andrés; Lara, Rodrigo; Batagelj, Borut; Peterlin, Marko; Peer, Peter; Muhammed, Ajnas; Nunes, Diogo; Gonçalves, Nuno
International Joint Conference on Biometrics 2025
[Conference Paper]


Recht und Technik - Datenschutz im Diskurs Vorwort zu den Workshopbeiträgen
Grimm, Rüdiger; Hornung, Gerrit; Sorge, Christoph; Döhmann genannt Spiecker, Indra
Gesellschaft für Informatik (Jahrestagung) 2025
[Conference Paper]


Automatisierung offensiver Cybersicherheitsmaßnahmen
Esser, Julia; Plötz, Caroline
Gesellschaft für Informatik (Jahrestagung) 2025
[Conference Paper]


Characterizing Hosting and Security Practices for Public-Facing LDAP Servers
Cesar, Gustavo Luvizotto; Öndarö, Gurur; Kaspereit, Jonas; Ising, Fabian; Schinzel, Sebastian; Jonker, Mattijs; Holz, Ralph G.
International Conference on Network and Service Management 2025
[Conference Paper]


Terminator: Enabling Efficient Fuzzing of Closed-Source GUI Programs by Automatic Coverage-Guided Termination
Zabel, Jonas; Kolvenbach, Philip; Arzt, Steven
International Conference on Automated Software Engineering 2025
[Conference Paper]


Photonic Side-Channel Analyzer: Enabling Security-Aware Physical Design Methodology
Wang, Meizhi; Chen, Yi-Ru; Nibhanupudi, S.S. Teja; Amini, Elham; Saavedra, Antonio; Wang, Yinan; Wasserman, Daniel; Seifert, Jean-Pierre; Kulkarni, Jaydeep P.
International Symposium on Physical Design 2025
[Conference Paper]


Disinformation Analysis on Telegram: A Metadata-Centered, Privacy-Aware Dataset
Choi, Jeong-Eun; Schäfer, Karla; Yannikos, York; Steinebach, Martin
International Conference on Big Data 2025
[Conference Paper]


Towards Interpretable Suicide Risk Prediction: A Hybrid Approach with Feature Extraction and Sequential Binary Classification
Choi, Jeong-Eun; Fan, Shiying
International Conference on Big Data 2025
[Conference Paper]


Exploring the Relationship Between Network Similarity and Transferability of Adversarial Attacks
Klause, Gerrit; Bunzel, Niklas
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]


Trade-offs in Cross-Domain Generalization of Foundation Model Fine-Tuned for Biometric Applications
Chettaoui, Tahar; Damer, Naser; Boutros, Fadi
International Joint Conference on Biometrics 2025
[Conference Paper]


SwitchAR: Enabling Perceptual Manipulations in Augmented Reality Leveraging Change Blindness and Inattentional Blindness
Wombacher, Jonas; Li, Zhipeng; Gugenheimer, Jan
CHI EA '25: Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems
[Conference Proceedings]


SwitchAR: Perceptual Manipulations in Augmented Reality
Wombacher, Jonas; Li, Zhipeng; Gugenheimer, Jan
UIST '25: Proceedings of the 38th Annual ACM Symposium on User Interface Software and Technology
[Conference Proceedings]


LightShed: Defeating Perturbation-based Image Copyright Protections
Foerster, Hanna; Behrouzi, Sasha; Rieger, Phillip; Jadliwala, Murtuza; Sadeghi, Ahmad-Reza
Proceedings of the 34th USENIX Security Symposium, p.7271-7290
[Conference Proceedings]


ZORRO: Zero-Knowledge Robustness and Privacy for Split Learning
Sheybani, Nojan; Pegoraro, Alessandro; Knauer, Jonathan; Rieger, Phillip; Mollakuqe, Elissa; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza
CCS '25: Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.321-334
[Conference Proceedings]


Learning to Identify Conflicts in RPKI
Haya Schulmann and Shujie Zhao
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, p.1490–1505
[Conference Proceedings]


ValidaTor: Domain Validation over Tor
Jens Frieß and Haya Schulmann and Michael Waidner
22nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 25), p.1367–1380
[Conference Proceedings]


Stealth BGP Hijacks with uRPF Filtering
Haya Schulmann and Shujie Zhao
19th USENIX WOOT Conference on Offensive Technologies (WOOT 25), p.129–138
[Conference Proceedings]