Publications

Publications

A Post-Quantum Secure Subscription Concealed Identifier for 6G
Ulitzsch, V.Q.; Park, S.; Marzougui, S.; Seifert, Jean-Pierre
Conference on Security and Privacy in Wireless and Mobile Networks 2022
[Conference Paper]


The Hijackers Guide to the Galaxy: Off-Path Taking Over Internet Resources
Dai, Tianxiang; Jeitner, Philipp; Shulman, Haya; Waidner, Michael
[Paper]


Android Data Storage Locations and What App Developers do with it from a Security and Privacy Perspective
Heid, Kris; Tefke, Tobias; Heider, Jens; Staudemeyer, Ralf C.
International Conference on Information Systems Security and Privacy (ICISSP) 2022
[Conference Paper]


Local Power Grids at Risk
Zhdanova, Maria; Urbansky, Julian; Hagemeier, Anne; Zelle, Daniel; Herrmann, Isabelle Frederike; Höffner, Dorian
Annual Computer Security Applications Conference 2022
[Conference Paper]


Messung der Datenminimierung für den Beschäftigtendatenschutz am Beispiel von Standortdaten
Schleper, Janine; Kohn, Matthias; Jo Pesch, Paulina; Waldmann, Ulrich; Kunz, Thomas
Gesellschaft für Informatik (Jahrestagung) 2022
[Conference Paper]


Towards Image Hashing Robust Against Cropping and Rotation
Steinebach, Martin; Berwanger, Tiberius; Liu, Huajian
International Conference on Availability, Reliability and Security 2022
[Conference Paper]


Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3
Paul, S.; Kuzovkova, Y.; Lahr, Norman; Niederhagen, R.
Asia Conference on Computer and Communications Security 2022
[Conference Paper]


Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS
Jeitner, Philipp; Shulman, Haya
USENIX Security Symposium 2021
[Paper]


Smart RPKI Validation: Avoiding Errors and Preventing Hijacks
Hlavacek, Tomas; Shulman, Haya; Waidner, Michael
European Symposium on Research in Computer Security 2022
[Conference Paper]


Issues of Verifying Anonymity: An Overview
Stummer-Diel, Sarah
Gesellschaft für Informatik (Jahrestagung) 2022
[Conference Paper]


Simplifying multimodal journeys: An authentication and data sharing framework in the mobility service domain
Gadacz, Henry
[Paper]


Towards a Privacy-Aware Electric Vehicle Architecture
Plappert, Christian; Stancke, Jonathan; Jäger, Lukas
International Conference on Parallel, Distributed and Network-Based Processing 2022
[Conference Paper]


Stalloris: RPKI Downgrade Attack
Hlavacek, Tomas; Jeitner, Philipp; Mirdita, Donika; Shulman, Haya; Waidner, Michael
USENIX Security Symposium 2022
[Paper]


Compliance: Ein Überblick über wichtige Rechtsvorschriften für Startups in der Cybersicherheit
Stummer-Diel, Sarah
[Paper]


XDRI Attacks - and - How to Enhance Resilience of Residential Routers
Jeitner, Philipp; Shulman, Haya; Teichmann, Lucas Andreas; Waidner, Michael
USENIX Security Symposium 2022
[Conference Paper]


Transformer-based Extraction of Deep Image Models
Battis, Verena; Penner, Alexander
European Symposium on Security and Privacy 2022
[Conference Paper]


ML-basierte Klassifizierung von E-Mails für die datenschutzkonforme Löschung und Archivierung
Kunz, Thomas; Waldmann, Ulrich
Gesellschaft für Informatik (Jahrestagung) 2022
[Conference Paper]


Using Telegram as a carrier for image steganography: Analysing Telegrams API limits
Bunzel, Niklas; Chen, Tobias; Steinebach, Martin
International Conference on Availability, Reliability and Security 2022
[Conference Paper]


Analysis and Evaluation of Hardware Trust Anchors in the Automotive Domain
Plappert, Christian; Fuchs, Andreas; Heddergott, Ronald
International Conference on Availability, Reliability and Security 2022
[Conference Paper]


A Synopsis of Critical Aspects for Darknet Research
Platzer, Florian; Lux, Alexandra
International Conference on Availability, Reliability and Security 2022
[Conference Paper]


How (Not) to Deploy Cryptography on the Internet
Shulman, Haya
Conference on Data and Application Security and Privacy 2022
[Conference Paper]


REGRETS: A New Corpus of Regrettable (Self-) Disclosures on Social Media
Simo Fhom, Hervais-Clemence; Kreutzer, Michael
Conference on Computer Communications 2022
[Conference Paper]


From IP to transport and beyond: Cross-layer attacks against applications
Dai, Tianxiang; Jeitner, Philipp; Shulman, Haya; Waidner, Michael
[Paper]


SECPAT: Security Patterns for Resilient Automotive E / E Architectures
Plappert, Christian; Fenzl, Florian; Rieke, Roland; Matteucci, Ilaria; Costantino, Gianpiero; Vincenzi, Marco de
International Conference on Parallel, Distributed and Network-Based Processing 2022
[Conference Paper]


Zulässigkeit von Open Source-Ermittlungen zur Strafverfolgung im Darknet
Wittmer, Sandra; Platzer, Florian
Gesellschaft für Informatik (Jahrestagung) 2022
[Conference Paper]


Natural Language Processing (NLP) und der Datenschutz - Chancen und Risiken für den Schutz der Privatheit
Vogel, Inna; Setz, Tahireh; Choi, Jeong-Eun; Steinebach, Martin
Gesellschaft für Informatik (Jahrestagung) 2022
[Conference Paper]


Mehr Sicherheit durch Farbe - Digitale Siegel und der neue internationale JAB-Code Standard
Thenée, Nicolas; Schnattinger, Thomas; Berchtold, Waldemar; Liu, Huajian
Deutscher IT-Sicherheitskongress 2022
[Conference Paper]


Decision Tree-Based Rule Derivation for Intrusion Detection in Safety-Critical Automotive Systems
Buschlinger, Lucas; Rieke, Roland; Sarda, Sanat; Krauß, Christoph
International Conference on Parallel, Distributed and Network-Based Processing 2022
[Conference Paper]


Context, Prioritization, and Unexpectedness: Factors Influencing User Attitudes About Infographic and Comic Consent
Doan, Xengie Cheng; Selzer, Annika; Rossi, Arianna; Botes, Wilhelmina Maria; Lenzini, Gabriele
International Workshop on Consent Management in Online Services, Networks and Things 2022
[Conference Paper]


Stalloris: RPKI Downgrade Attack
Hlavacek, Tomas; Jeitner, Philipp; Mirdita, Donika; Shulman, Haya; Waidner, Michael
USENIX Security Symposium 2022
[Conference Paper]