Publications

Publications

Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT
Rauzy, Pablo; Kiss, Ágnes; Krämer, Juliane; Seifert, Jean-Pierre
Constructive Side-Channel Analysis and Secure Design - 7. International Workshop (COSADE'16), p.111-129
[Conference Proceedings]


Privacy Friendly Apps-Making Developers Aware of Privacy Violations
Marky, Karola; Gutmann, Andreas; Rack, Philipp; Volkamer, Melanie
1st International Workshop on Innovations in Mobile Privacy and Security, p.46-48
[Conference Proceedings]


On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack
Buchmann, Johannes; Göpfert, Florian; Player, Rachel; Wunderer, Thomas
International Conference on Cryptology AFRICACRYPT 2016
[Conference Proceedings]


An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation
Akleylek, Sedat; Bindel, Nina; Buchmann, Johannes; Krämer, Juliane; Marson, Giorgia Azzurra
International Conference on Cryptology AFRICACRYPT 2016, p.10
[Conference Proceedings]


Identifying and Utilizing Dependencies Across Cloud Security Services
Taha, Ahmed; Metzler, Patrick; Trapero, Ruben; Luna, Jesus; Suri, Neeraj
ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, p.329-340
[Conference Proceedings]


Performance issues and optimizations in JavaScript: an empirical study
Selakovic, Marija; Pradel, Michael
ICSE '16 Proceedings of the 38th International Conference on Software Engineering, p.61-72
[Conference Proceedings]


Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung
Schochlow, Verena; Neumann, Stephan; Braun, Kristoffer; Volkamer, Melanie
Datenschutz und Datensicherheit, p.295-299
[Conference Proceedings]


Liquido: Embedding Liquids into 3D Printed Objects to Sense Tilting and Motion
Schmitz, Martin; Leister, Andreas; Dezfuli, Niloofar; Riemann, Jan; Müller, Florian; Mühlhäuser, Max
Proceedings of the 34rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, p.2688-2696
[Conference Proceedings]


Debugging for reactive programming
Salvaneschi, Guido; Mezini, Mira
ICSE '16 Proceedings of the 38th International Conference on Software Engineering, p.796-807
[Conference Proceedings]


Jumping through hoops: why do Java developers struggle with cryptography APIs?
Nadi, Sarah; Krüger, Stefan; Mezini, Mira; Bodden, Eric
ICSE '16 Proceedings of the 38th International Conference on Software Engineering, p.935-946
[Conference Proceedings]


"Jumping Through Hoops" Why do Java Developers Struggle With Cryptography APIs?
Nadi, Sarah; Krüger, Stefan; Mezini, Mira; Bodden, Eric
International Conference on Software Engineering
[Conference Proceedings]


Nomen est Omen: Exploring and Exploiting Similarities between Argument and Parameter Names
Liu, Hui; Liu, Qiurong; Staicu, Cristian-Alexandru; Pradel, Michael; Luo, Yue
ICSE '16 Proceedings of the 38th International Conference on Software Engineering, p.1063-1073
[Conference Proceedings]


Valiant's Universal Circuit is Practical
Kiss, Ágnes; Schneider, Thomas
35. Advances in Cryptology -- EUROCRYPT 2016, p.699-728
[Conference Proceedings]


BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets
Karuppayah, Shankar; Vasilomanolakis, Emmanouil; Haas, Steffen; Fischer, Mathias; Mühlhäuser, Max
2016 IEEE International Conference on Communications
[Conference Proceedings]


Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3
Fischlin, Marc; Günther, Felix; Schmidt, Benedikt; Warinschi, Bogdan
37th IEEE Symposium on Security and Privacy (S&P 2016)
[Conference Proceedings]


High-Performance and Lightweight Lattice-Based Public-Key Encryption
Buchmann, Johannes; Göpfert, Florian; Güneysu, Tim; Oder, Tobias; Pöppelmann, Thomas
IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security
[Conference Proceedings]


Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge
Buchmann, Johannes; Büscher, Niklas; Katzenbeisser, Stefan; Krämer, Juliane; Micciancio, Daniele; Siim, Sander; Vredendaal, Christine van; Walter, Michael; Göpfert, Florian
ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography
[Conference Proceedings]


StubDroid: automatic inference of precise data-flow summaries for the android framework
Arzt, Steven; Bodden, Eric
ICSE '16 Proceedings of the 38th International Conference on Software Engineering, p.725-735
[Conference Proceedings]


TORPEDO: TOoltip-poweRed Phishing Email DetectiOn
Volkamer, Melanie; Renaud, Karen; Reinheimer, Benjamin
31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), p.161-175
[Conference Proceedings]


Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity
Sullivan, Dean; Arias, Orlando; Davi, Lucas; Larsen, Per; Sadeghi, Ahmad-Reza; Jin, Yier
53rd Design Automation Conference (DAC)
[Conference Proceedings]


Teaching Phishing-Security: Which Way is Best?
Stockhardt, Simon; Reinheimer, Benjamin; Volkamer, Melanie; Mayer, Peter; Kunz, Alexandra; Rack, Philipp; Lehmann, Daniel
31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), p.135-149
[Conference Proceedings]


GarbledCPU: A MIPS Processor for Secure Computation in Hardware
Songhori, Ebrahim; Zeitouni, Shaza; Dessouky, Ghada; Schneider, Thomas; Sadeghi, Ahmad-Reza; Koushanfar, Farinaz
53. Annual Design Automation Conference (DAC'16), p.73:1-73:6
[Conference Proceedings]


A vectorized, cache efficient LLL implementation
Mariano, Artur; Correia, Fabio; Bischof, Christian
VECPAR 2016 - 12th International Meeting on High Performance Computing for Computational Science
[Conference Proceedings]


Subversive-C: Abusing and Protecting Dynamic Message Dispatch
Lettner, Julian; Kollenda, Benjamin; Homescu, Andrei; Larsen, Per; Schuster, Felix; Davi, Lucas; Sadeghi, Ahmad-Reza; Holz, Thorsten; Franz, Michael
USENIX Annual Technical Conference (ATC)
[Conference Proceedings]


Coercion-resistant Proxy Voting
Kulyk, Oksana; Neumann, Stephan; Marky, Karola; Budurushi, Jurlind; Volkamer, Melanie
31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, p.3-16
[Conference Proceedings]


Survey of Software Protection with Minimal Hardware
Herzberg, Amir; Shulman, Haya; Waidner, Michael
International Conference on Software Science, Technology and Engineering (SWSTE)
[Conference Proceedings]


Regulating ARM TrustZone Devices in Restricted Spaces
Brasser, Ferdinand; Ganapathy, Vinod; Iftode, Liviu; Kim, Daeyoung; Liebchen, Christopher; Sadeghi, Ahmad-Reza
14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
[Conference Proceedings]


Towards Automated Measurements of Internets Naming Infrastructure
Borgwart, Andreas; Shulman, Haya; Waidner, Michael
International Conference on Software Science, Technology and Engineering (SWSTE)
[Conference Proceedings]


Things, Trouble, Trust: On Building Trust in IoT Systems
Abera, Tigist; Asokan, N.; Davi, Lucas; Koushanfar, Farinaz; Praverd, Andrew; Tsudik, Gene; Sadeghi, Ahmad-Reza
53rd Design Automation Conference (DAC)
[Conference Proceedings]


Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding
Zheng, Yao; Schulz, Matthias; Lou, Wenjing; Hou, Thomas; Hollick, Matthias
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), p.21-30
[Conference Proceedings]