Publications

Publications

On the State of Post-Quantum Cryptography Migration
N. Alnahawi and A. Wiesmaier and T. Graßmeyer and J. Geißler and A. Zeier and P. Bauspieß and A. Heinemann
INFORMATIK'21 — PQKP-Workshop, p.907–941
[Conference Proceedings]


On Message-based Consensus and Network Coding
M. Braun and A. Wiesmaier and N. Alnahawi and J. Geißler
NoF 2021 — 12th International Conference on Network of the Future
[Conference Proceedings]


Attack Surface Assessment for Cyber­security Engineering in the Automotive Domain
Christian Plappert and Daniel Zelle and Henry Gadacz and Roland Rieke and Dirk Scheuermann and Christoph Krauß
29th Euromicro International Conference on Parallel, Distributed and Network-based Processing, PDP
[Conference Proceedings]


Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods
Zelle, Daniel and Lauser, Timm and Kern, Dustin and Krauß, Christoph
The 16th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]


Implementing a Security Architecture for Safety-Critical Railway Infrastructure
Eckel, Michael and Kuzhiyelil, Don and Krauß, Christoph and Zhdanova, Maria and Katzenbeisser, Stefan and Cosic, Jasmin and Drodt, Matthias and Pitrolle, Jean-Jacques
International Symposium on Secure and Private Execution Environment Design (SEED), p.215-226
[Conference Proceedings]


Analysis of E-Mobility-Based Threats to Power Grid Resilience
Kern, Dustin and Krauß, Christoph
Computer Science in Cars Symposium
[Conference Proceedings]


Zur Integration von Post-Quantum Verfahren in bestehende Softwarepodukte
A. Zeier and A. Wiesmaier and A. Heinemann
Tagungsband zum 17. Deutschen IT-Sicherheitskongress, p.381 – 391
[Conference Proceedings]


On the State of Post-Quantum Cryptography Migration
Nouri Alnahawi and Alexander WiesmaierAND Tobias Grasmeyer and Julian Geißler and Alexander Zeier and Pia Bauspieß and Andreas Heinemann
INFORMATIK 2021 — PQKP-Workshop, p.907-941
[Conference Proceedings]


Software Development Processes for ADs, SMCs and OSCs supporting Usability, Security, and Privacy Goals - an Overview
Tim Bender and Rolf Huesmann and Andreas Heinemann
ARES 2021, SSC Workshop: The 16th International Conference on Availability, Reliability and Security, Virtual Event, August 17-20, 2021
[Conference Proceedings]


It is not as simple as that: Playing out password security trainings in order to nudge password changes
Fabian Sterk and Andreas Heinemann
EICC '21: European Interdisciplinary Cyber­security Conference, Virtual Event, Romania, November 10-11, 2021, p.20–25
[Conference Proceedings]


On the Applicability of Synthetic Data for Face Recognition
H. Zhang and M. Grimmer and R. Raghavendra and K. Raja and C. Busch
Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]


NIR Iris Challenge Evaluation in Non-cooperative Environments: Segmentation and Localization
C. Wang and J. Tapia
Proc. of the 2021 Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


Image Quality Assessment on Identity Documents
C. Yanez and J. Tapia
Proc. Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–5
[Conference Proceedings]


Impact of Doppelgängers on Face Recognition: Database and Evaluation
C. Rathgeb and P. Drozdowski and M. Obel and A. Dörsch and F. Stockhardt and N. E. Haryanto and K. Bernardo and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–4
[Conference Proceedings]


Morphing Attack Detection: A Fusion Approach
S. Lorenz and U. Scherhag and C. Rathgeb and C. Busch
2021 IEEE 24th Intl. Conf. on Information Fusion (FUSION), p.703–709
[Conference Proceedings]


Differential Anomaly Detection for Facial Images
M. Ibsen and L. J. Gonzalez-Soler and C. Rathgeb and P. Drozdowski and M. Gomez-Barrero and C. Busch
IEEE Intl. Workshop on Information Forensics and Security (WIFS), p.1–6
[Conference Proceedings]


Analysing the feasibility of using Objectosphere for Face Presentation Attack Detection
J. Gonzalez-Soler and M. Gomez-Barrero and M. Günther and C. Busch
Norwegian Information Security Conf. (NISK)
[Conference Proceedings]


The Watchlist Imbalance Effect in Biometric Face Identification: Comparing Theoretical Estimates and Empiric Measurements
P. Drozdowski and C. Rathgeb and C. Busch
Intl. Conf. on Computer Vision Workshops (ICCVW), p.1–9
[Conference Proceedings]


Makeup Presentation Attack Potential Revisited: Skills Pay the Bills
P. Drozdowski and S. Grobarek and J. Schurse and C. Rathgeb and F. Stockhardt and C. Busch
Intl. Workshop on Biometrics and Forensics (IWBF), p.1–6
[Conference Proceedings]


Face Morphing Attacks: A Threat to eLearning?
C. Rathgeb and K. Pöppelmann and C. Busch
IEEE Global Engineering Education Conf. (EDUCON 2021), p.1–6
[Conference Proceedings]


Deep Learning-based Semantic Segmentation for Touchless Fingerprint Recognition
J. Priesnitz and C. Rathgeb and N. Buchmann and C. Busch
Proc. Intl. Conf. on Pattern Recognition (ICPR), p.154–168
[Conference Proceedings]


Safe-Error Attacks on SIKE and CSIDH
Campos, Fabio and Krämer, Juliane and Müller, Marcel
International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE), p.104–125
[Conference Proceedings]


SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities
Zeitouni, Shaza; Dessouky, Ghada; Sadeghi, Ahmad-Reza
6th IEEE European Symposium on Security and Privacy (Euro S&P 2021)
[Conference Proceedings]


EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts
Rodler, Michael; Li, Wenting; Karame, Ghassan O.; Davi, Lucas
30th USENIX Security Symposium
[Conference Proceedings]


SoK: Efficient Privacy-preserving Clustering
Hedge, Aditya; Möllering, Helen; Schneider, Thomas; Yalame, Mohammad Hossein
21st Privacy Enhancing Technologies Symposium (PETS 2021)
[Conference Proceedings]


FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants
Chen, Yanjiao; Bai, Yijie; Wang, Kaibo; Mitev, Richard; Xu, Wenyuan; Sadeghi, Ahmad-Reza
ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


CURE: A Security Architecture with CUstomizable and Resilient Enclaves
Bahmani, Raad; Brasser, Ferdinand; Dessouky, Ghada; Jauernig, Patrick; Klimmek, Matthias; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
30th USENIX Security Symposium (USENIX Security'21)
[Conference Proceedings]


BlindOR: An Efficient Lattice-Based Blind Signature Scheme from OR-Proofs
Alkeilani Alkadri, Nabil; Harasser, Patrick; Janson, Christian
20th International Conference on Cryptology and Network Security (CANS 2021)
[Conference Proceedings]


The Cost of Path Information: Routing in Anonymous Communication
Grube, Tim; Egert, Rolf; Daubert, Jörg; Mühlhäuser, Max
Consumer Communications & Networking Conference (CCNC 2021)
[Conference Proceedings]


SAFELearn: Secure Aggregation for private FEderated Learning
Fereidooni, Hossein; Marchal, Samuel; Miettinen, Markus; Mirhoseini, Azalia; Möllering, Helen; Nguyen, Thien Duc; Rieger, Phillip; Sadeghi, Ahmad-Reza; Schneider, Thomas; Yalame, Mohammad Hossein; Zeitouni, Shaza
4th Deep Learning and Security Workshop (DLS'21)
[Conference Proceedings]