Publications
Publications
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
Schröder, Robin Leander; Gast, Stefan; Guo, Qian
33rd USENIX Security Symposium, USENIX Security 2024
[Conference Paper]
LanDscAPe: Exploring LDAP Weaknesses and Data Leaks at Internet Scale
Kaspereit, Jonas; Öndarö, Gurur; Cesar, Gustavo Luvizotto; Ebbers, Simon; Ising, Fabian; Saatjohann, Christoph; Jonker, Mattijs; Holz, Ralph G.; Schinzel, Sebastian
33rd USENIX Security Symposium, USENIX Security 2024
[Conference Paper]
Attacking with Something That Does Not Exist: ‘Proof of Non-Existence’ Can Exhaust DNS Resolver CPU
Gruza, Olivia; Heftrig, Elias; Jacobsen, Oliver; Shulman, Haya; Vogel, Niklas; Waidner, Michael
18th USENIX WOOT Conference on Offensive Technologies, WOOT 2024
[Conference Paper]
What All the Phuzz Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications
Neef, Sebastian; Kleissner, Lorenz; Seifert, Jean Pierre
19th ACM Asia Conference on Computer and Communications Security, AsiaCCS 2024
[Conference Paper]
Dynamically Generating Callback Summaries for Enhancing Static Analysis
Arzt, Steven; Miltenberger, Marc; Näumann, Julius
38th European Conference on Object-Oriented Programming, ECOOP 2024
[Conference Paper]
Toward Self-Adjusting k-Ary Search Tree Networks
Feder, Evgeniy; Paramonov, Anton; Mavrin, P. A.; Salem, Iosif; Aksenov, Vitaly E.; Schmid, Stefan
32nd Annual European Symposium on Algorithms, ESA 2024
[Conference Paper]
Musketeer: Incentive-Compatible Rebalancing for Payment Channel Networks
Avarikioti, Zeta; Schmid, Stefan; Tiwari, Samarth
6th Conference on Advances in Financial Technologies, AFT 2024
[Conference Paper]
Analyzing the Effectiveness of Image Preprocessing Defenses Under Runtime Constraints
Bunzel, Niklas; Klause, Gerrit
International Conference on Trust, Security and Privacy in Computing and Communications 2024
[Conference Paper]
The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Heftrig, Elias; Shulman, Haya; Vogel, Niklas; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]
WAPITI - A Weighted Bayesian Method for Private Information Inference on Social Ego Networks
Simo Fhom, Hervais-Clemence; Kreutzer, Michael
International Conference on Trust, Security and Privacy in Computing and Communications 2024
[Conference Paper]
Broadcast and Consensus in Stochastic Dynamic Networks with Byzantine Nodes and Adversarial Edges
El-Hayek, Antoine; Henzinger, Monika; Schmid, Stefan
International Symposium on Distributed Computing 2024
[Conference Paper]
Poster: From Fort to Foe: The Threat of RCE in RPKI
Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]
Reliability Assurance in RIS-Assisted 6G Campus Networks
Tohidi, Ehsan; Franke, Max; Phung, Cao Vien; Khan, Naveed; Drummond, André; Schmid, Stefan; Jukan, Admela; Stanczak, Slawomir
International Conference on the Design of Reliable Communication Networks 2024
[Conference Paper]
RIS as a Network Resource: User Multiplexing and Pricing Algorithms
Papadopoulos, Alexandros; Lalas, Antonios; Votis, Konstantinos; Schmid, Stefan; Katsalis, Kostas; Liaskos, Christos
International Conference on 6G Networking 2024
[Conference Paper]
Baiji: Domain Planning for CDNs under the 95th Percentile Billing Model
Vanerio, Juan; Liu, Huiran; Zhang, Qi; Schmid, Stefan
Networking Conference 2024
[Conference Paper]
L3: Latency-aware Load Balancing in Multi-Cluster Service Mesh
Michaelis, Olivier; Schmid, Stefan; Mostafaei, Habib
International Middleware Conference 2024
[Conference Paper]
HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme
Sayari, Oussama; Marzougui, Soundes; Aulbach, Thomas; Krämer, Juliane; Seifert, Jean-Pierre
International Workshop on Constructive Side-Channel Analysis and Secure Design 2024
[Conference Paper]
MAYo or MAY-not: Exploring Implementation Security of the Post-Quantum Signature Scheme MAYO Against Physical Attacks
Aulbach, Thomas; Marzougui, Soundes; Seifert, Jean-Pierre; Ulitzsch, Vincent Quentin
Workshop on Fault Detection and Tolerance in Cryptography 2024
[Conference Paper]
Poster: Kill Krill or Proxy RPKI
Cattepoel, Luis; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]
Poster: Security of Login Interfaces in Modern Organizations
Nsieyanji Tchokodeu, Kevin; Schulmann, Haya; Sobol, Gil; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]
Recommendations for Implementing Independent Individual Verifiability in Internet Voting
Moser, Florian; Grimm, Rüdiger; Hilt, Tobias; Kirsten, Michael; Niederbudde, Christoph; Volkamer, Melanie
International Joint Conference on Electronic Voting 2024
[Conference Paper]
Recht und Technik - Datenschutz im Diskurs. Vorwort zu den Workshopbeiträgen
Grimm, Rüdiger; Hornung, Gerrit; Sorge, Christoph; Döhmann, Indra Spiecker genannt
Gesellschaft für Informatik (GI Jahrestagung) 2024
[Conference Paper]
Datenverarbeitungen in der Gesundheitsbranche
Stummer, Sarah
[Paper]
Comparative Study: Legal Framework of Offensive Cybersecurity Research in Denmark and Sweden
Folschweiller, Maxine Joanne
Gesellschaft für Informatik (GI Jahrestagung) 2024
[Conference Paper]
Der Einsatz von Open Source Intelligence im Darknet: Eine strafrechtliche Bewertung
Schlindwein, Lisa; Kriegel, Jessica
Gesellschaft für Informatik (GI Jahrestagung) 2024
[Conference Paper]
Compliance - Ein Überblick über wichtige Rechtsvorschriften für kleine und mittlere Unternehmen
Stummer, Sarah
[Paper]
Maßnahmen aktiver Cyberabwehr
Boll, Alina; Gärtner, Tanya; Hacke, Tim Maximilian; Köcke, Denise
[Paper]
Unvorhersehbare, unplanbare personenbezogene Datenverarbeitungen
Boll, Alina; Esser, Julia; Schröder, Lilly
Gesellschaft für Informatik (GI Jahrestagung) 2024
[Conference Paper]
Neue Technologien: Chancen nutzen, Risiken vermeiden
Selzer, Annika; Timm, Ingo J.
Gesellschaft für Informatik (GI Jahrestagung) 2024
[Conference Paper]
Rechtlicher Schutz im Metaverse
Geissler, Ines
Gesellschaft für Informatik (GI Jahrestagung) 2024
[Conference Paper]


