Publications
Publications
Benchmarking the Benchmarks
Miltenberger, Marc; Arzt, Steven; Holzinger, Philipp; Näumann, Julius
Asia Conference on Computer and Communications Security 2023
[Conference Paper]
An Analysis of PhotoDNA
Steinebach, Martin
International Conference on Availability, Reliability and Security 2023
[Conference Paper]
Tracing Cryptographic Agility in Android and iOS Apps
Heid, Kris; Heider, Jens; Ritscher, Matthias; Stotz, Jan-Peter
International Conference on Information Systems Security and Privacy 2023
[Conference Paper]
Users' Privacy Literacy, Motivation to use Tor and Further Privacy Protecting Behavior
Platzer, Florian; Lux, Alexandra
International Symposium on Technikpsychologie 2023
[Conference Paper]
Asymptotically Tight Bounds on the Time Complexity of Broadcast and its Variants in Dynamic Networks
El-Hayek, Antoine; Henzinger, Monika; Schmid, Stefan
Innovations in Theoretical Computer Science Conference 2023
[Conference Paper]
The Time Complexity of Consensus Under Oblivious Message Adversaries
Winkler, Kyrill; Paz, Ami; Galeana, Hugo Rincon; Schmid, Stefan; Schmid, Ulrich
Innovations in Theoretical Computer Science Conference 2023
[Conference Paper]
On the Feasibility of Single-Trace Attacks on the Gaussian Sampler Using a CDT
Marzougui, Soundes; Kabin, Ievgen; Krämer, Juliane; Aulbach, Thomas; Seifert, Jean-Pierre
International Workshop on Constructive Side-Channel Analysis and Secure Design 2023
[Conference Paper]
Towards detecting device fingerprinting on iOS with API function hooking
Heid, Kris; Andrae, Vincent; Heider, Jens
European Interdisciplinary Cybersecurity Conference 2023
[Conference Paper]
Dynamic Maintenance of Monotone Dynamic Programs and Applications
Henzinger Rauch, Monika; Neumann, Stefan; Räcke, Harald; Schmid, Stefan
International Symposium on Theoretical Aspects of Computer Science 2023
[Conference Paper]
Duo: A High-Throughput Reconfigurable Datacenter Network Using Local Routing and Control
Zerwas, Johannes; Györgyi, Csaba; Blenk, Andreas; Schmid, Stefan; Avin, Chen
International Conference on Measurement and Modeling of Computer Systems 2023
[Conference Paper]
Deep Fake - Visuelle Manipulation medialer Inhalte
Steinebach, Martin
Tagung "Interkommunale Zusammenarbeit (IKZ) im Bereich der Cybersicherheit" 2022
[Conference Paper]
Deepfakes Erstellen und Erkennen in Echtzeit
Steinebach, Martin
Hamburger Sicherheitsrechtstag 2022
[Conference Paper]
Coverage-Guided Fuzzing of Embedded Systems Leveraging Hardware Tracing
Beckmann, Maximilian; Steffan, Jan
European Symposium on Research in Computer Security 2022
[Conference Paper]
EM-Fault it Yourself: Building a Replicable EMFI Setup for Desktop and Server Hardware
Kühnapfel, Niclas; Buhren, Robert; Jacob, Hans Niklas; Krachenfels, Thilo; Werling, Christian; Seifert, Jean-Pierre
International Conference on Physical Assurance and Inspection of Electronics 2022
[Conference Paper]
Short Paper: A Centrality Analysis of the Lightning Network
Zabka, Philipp; Foerster, Klaus-Tycho Tycho; Decker, Christian; Schmid, Stefan
International Conference on Financial Cryptography and Data Security 2022
[Conference Paper]
3. Interdisciplinary Privacy & Security at Large Workshop
Selzer, Annika; Timm, Ingo J.
Gesellschaft für Informatik (Jahrestagung) 2022
[Conference Paper]
Brief Announcement: Temporal Locality in Online Algorithms
Pacut, MacIej; Parham, Mahmoud; Rybicki, Joel; Schmid, Stefan; Suomela, Jukka; Tereshchenko, Aleksandr
International Symposium on Distributed Computing 2022
[Conference Paper]
XMSS-based Chain of Trust
Marzougui, Soundes; Seifert, Jean-Pierre
International Workshop on Security Proofs for Embedded Systems 2021
[Conference Paper]
Streaming SPHINCS+ for Embedded Devices Using the Example of TPMs
Niederhagen, Ruben; Roth, Johannes; Wälde, Julian
International Conference on Cryptology in Africa 2022
[Conference Paper]
Rechtliche Implikationen von Cybersicherheitsvorfällen in der kommunalen Verwaltung
Schreiber, Linda
Gesellschaft für Informatik (Jahrestagung) 2022
[Conference Paper]
DeTox: A Comprehensive Dataset for German Offensive Language and Conversation Analysis
Demus, Christoph; Pitz, Jonas; Schütz, Mina; Probol, Nadine; Siegel, Melanie; Labudde, Dirk
Workshop on Online Abuse and Harms 2022
[Conference Paper]
Towards Automated Detection and Prevention of Regrettable (Self-) Disclosures on Social Media
Simo Fhom, Hervais-Clemence; Kreutzer, Michael
International Conference on Trust, Security and Privacy in Computing and Communications 2022
[Conference Paper]
CAHOOT: a Context-Aware veHicular intrusiOn detectiOn sysTem
Micale, Davide; Costantino, Gianpiero; Matteucci, Ilaria; Fenzl, Florian; Rieke, Roland; Patanè, Giuseppe
International Conference on Trust, Security and Privacy in Computing and Communications 2022
[Conference Paper]
Design Space Exploration of DICE
Lorych, Dominik; Jäger, Lukas
International Conference on Availability, Reliability and Security 2022
[Conference Paper]
A Resilient Network Node for the Industrial Internet of Things
Jäger, Lukas; Lorych, Dominik; Eckel, Michael
International Conference on Availability, Reliability and Security 2022
[Conference Paper]
The augmentation-speed tradeoff for consistent network updates
Henzinger, Monika; Paz, Ami; Pourdamghani, Arash; Schmid, Stefan
Symposium on SDN Research 2022
[Conference Paper]
Model-Based Insights on the Performance, Fairness, and Stability of BBR
Scherrer, Simon; Legner, Markus; Perrig, Adrian; Schmid, Stefan
Internet Measurement Conference 2022
[Conference Paper]
A Post-Quantum Secure Subscription Concealed Identifier for 6G
Ulitzsch, V.Q.; Park, S.; Marzougui, S.; Seifert, Jean-Pierre
Conference on Security and Privacy in Wireless and Mobile Networks 2022
[Conference Paper]
The Hijackers Guide to the Galaxy: Off-Path Taking Over Internet Resources
Dai, Tianxiang; Jeitner, Philipp; Shulman, Haya; Waidner, Michael
[Paper]
Android Data Storage Locations and What App Developers do with it from a Security and Privacy Perspective
Heid, Kris; Tefke, Tobias; Heider, Jens; Staudemeyer, Ralf C.
International Conference on Information Systems Security and Privacy (ICISSP) 2022
[Conference Paper]