Publications

Publications

PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Heinrich, Alexander; Hollick, Matthias; Schneider, Thomas; Stute, Milan; Weinert, Christian
30th USENIX Security Symposium
[Conference Proceedings]


BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures
Cremers, Cas; Düzlü, Samed; Fiedler, Rune; Fischlin, Marc; Janson, Christian
Proceedings: 2021 IEEE Symposium on Security and Privacy (SP 2021), p.1696-1714
[Conference Proceedings]


Multipath TLS 1.3
Fischlin, Marc; Müller, Sven-Andre; Münch, Jean-Pierre; Porth, Lars
Computer Security - ESORICS 2021, p.86-105
[Conference Proceedings]


Revisiting Hybrid Private Information Retrieval
Günther, Daniel; Schneider, Thomas; Wiegand, Felix
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, p.2408-2410
[Conference Proceedings]


A Generic Hybrid 2PC Framework with Application to Private Inference of Unmodified Neural Networks (Extended Abstract)
Braun, Lennart; Cammarota, Rosario; Schneider, Thomas
Privacy in Machine Learning Workshop at 35th Conference on Neural Information Processing Systems
[Conference Proceedings]


Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite
Fischlin, Marc; Sanina, Olga
Advances in Cryptology - ASIACRYPT 2021, p.696-725
[Conference Proceedings]


On Message-based Consensus and Network Coding
Braun, M.; Wiesmaier, A.; Alnahawi, N.; Geißler, J.
NoF 2021 —- 12th International Conference on Network of the Future
[Conference Proceedings]


On the State of Post-Quantum Cryptography Migration
Alnahawi, N.; Wiesmaier, A.; Graßmeyer, T.; Geißler, J.; Zeier, A.; Bauspieß, P.; Heinemann, A.
INFORMATIK 21 —- PQKP-Workshop, p.907-941
[Conference Proceedings]


Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods
Zelle, Daniel; Lauser, Timm; Kern, Dustin; Krauß, Christoph
The 16th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]


Implementing a Security Architecture for Safety-Critical Railway Infrastructure
Eckel, Michael; Kuzhiyelil, Don; Krauß, Christoph; Zhdanova, Maria; Katzenbeisser, Stefan; Cosic, Jasmin; Drodt, Matthias; Pitrolle, Jean-Jacques
International Symposium on Secure and Private Execution Environment Design (SEED), p.215-226
[Conference Proceedings]


Analysis of E-Mobility-Based Threats to Power Grid Resilience
Kern, Dustin; Krauß, Christoph
Computer Science in Cars Symposium
[Conference Proceedings]


On the State of Post-Quantum Cryptography Migration
Alnahawi, Nouri; Grasmeyer, Alexander WiesmaierAND Tobias; Geißler, Julian; Zeier, Alexander; Bauspieß, Pia; Heinemann, Andreas
INFORMATIK 2021 —- PQKP-Workshop, p.907-941
[Conference Proceedings]


It is not as simple as that: Playing out password security trainings in order to nudge password changes
Sterk, Fabian; Heinemann, Andreas
EICC 21: European Interdisciplinary Cybersecurity Conference, Virtual Event, Romania, November 10-11, 2021, p.20-25
[Conference Proceedings]


The Exact Security of BIP32 Wallets
Das, Poulami; Erwig, Andreas; Faust, Sebastian; Loss, Julian; Riahi, Siavash
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, p.1020-1042
[Conference Proceedings]


Evaluating a Smart Car Interface in Terms of Usability, User Experience and User Acceptance
Avramidis, Mario; Kellner, Christiane; Staudt, Josephine; Zimmermann, Verena; Gerber, Nina
i-com, p.161-175
[Conference Proceedings]


Taking on driving tasks yourself? That was yesterday! How drivers would like to be supported by assistance systems
Zankel, Lisa Marie; Gerber, Paul; Zimmermann, Verena; Gerber, Nina
Adjunct Proceedings: 13th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, p.71-76
[Conference Proceedings]


On Derandomizing Yao’s Weak-to-Strong OWF Construction
Brzuska, Christina; Couteau, Geoffrey; Karanko, Phila; Rohrbach, Felix
Theory of Cryptography, p.429-456
[Conference Proceedings]


RealSWATT: Remote Software-Based Attestation for Embedded Devices under Realtime Constraints
Surminski, Sebastian; Niesler, Christian; Brasser, Ferdinand; Davi, Lucas; Sadeghi, Ahmad-Reza
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, p.2890-2905
[Conference Proceedings]


IT-Rettung 2017: IT-Unterstützung in Emergency Management & Response
Pottebaum, Jens; Erfurth, Christian; Reuter, Christian
Informatik 2017 : 25.- 29. September 2017 Chemnitz, p.1281-1282
[Conference Proceedings]


Social Media Analytics: Eine Marktstudie im Krisenmanagement
Kaufhold, Marc-André; Reuter, Christian; Ludwig, Thomas; Scholl, Simon
Informatik 2017 : 25.- 29. September 2017 Chemnitz, p.1325-1338
[Conference Proceedings]


User-Centered Design of Visualizations for Software Vulnerability Reports
Reynolds, Steven Lamarr; Mertz, Tobias; Arzt, Steven; Kohlhammer, Jörn
Symposium on Visualization for Cyber Security (VizSec) 18, 2021, Online>
[Conference Paper]


Resilience in Security and Crises through Adaptions and Transitions
Kalle, Timo; Kaufhold, Marc-André; Kuntke, Franz; Reuter, Christian; Rizk, Amr; Steinmetz, Ralf
50 Jahre Gesellschaft für Informatik - Informatik für Gesellschaft : Workshopbeiträge der 49. Jahrestagung der Gesellschaft für Informatik, p.571-584
[Conference Proceedings]


Python Crypto Misuses in the Wild
Wickert, Anna-Katharina; Baumgärtner, Lars; Breitfelder, Florian; Mezini, Mira
15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM ’21)
[Conference Proceedings]


On Security Guidelines and Policy Compliance: Considering Users’ Need for Autonomy
Olt, Christian M.; große Deters, Fenne
[Conference Proceedings]


SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation
Patra, Arpita; Schneider, Thomas; Suresh, Ajith; Yalame, Mohammad Hossein
IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
[Conference Proceedings]


Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography
Weber, Alexandra; Nikiforov, Oleg; Sauer, Alexander; Schickel, Johannes; Alber, Gernot; Mantel, Heiko; Walther, Thomas
26th European Symposium on Research in Computer Security (ESORICS)
[Conference Proceedings]


Privacy-preserving density-based clustering
Bozdemir, Beyza; Canard, Sebastian; Ermis, Orhan; Möllering, Helen; Önen, Melek; Schneider, Thomas
16th ACM ASIA Conference on Computer and Communications Security (ASIACCS'21)
[Conference Proceedings]


Verifying Post-Quantum Signatures in 8kB of RAM
Gonzalez, Ruben; Hülsing, Andreas; Kannwischer, Matthias; Krämer, Juliane; Lange, Tanja; Stöttinger, Marc; Waitz, Elisabeth; Wiggers, Thom; Yang, Bo-Yin
Post-Quantum Cryptography, p.215-233
[Conference Proceedings]


Quantum Indistinguishability for Public Key Encryption
Gagliardoni, Tommaso; Krämer, Juliane; Struck, Patrick
Post-Quantum Cryptography : 12th International Workshop, PQCrypto 2021 Proceedings
[Conference Proceedings]


FastZIP: faster and more secure zero-interaction pairing
Fomichev, Mikhail; Hesse, Julia; Almon, Lars; Lippert, Timm; Han, Jun; Hollick, Matthias
MobiSys '21: Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services, p.440-452
[Conference Proceedings]