Publications

Publications

On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax
Geihs, Matthias; Demirel, Denise; Buchmann, Johannes
Codes, Cryptology and Information Security
[Conference Proceedings]


Lattice Basis Reduction Attack against Physically Unclonable Functions
Ganji, Fatemeh; Krämer, Juliane; Seifert, Jean-Pierre; Tajik, Shahin
22nd ACM Conference on Computer and Communications Security (CCS 2015)
[Conference Proceedings]


A Distributed Reputation System for Certification Authority Trust Management
Classen, Jiska; Braun, Johannes; Volk, Florian; Hollick, Matthias; Buchmann, Johannes; Mühlhäuser, Max
14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium)
[Conference Proceedings]


A Guide to End-to-End Privacy Accountability
Butin, Denis; Métayer, Daniel Le
1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015)
[Conference Proceedings]


Real-World Post-Quantum Digital Signatures
Butin, Denis; Gazdag, Stefan-Lukas; Buchmann, Johannes
Cybersecurity & Privacy Innovation Forum (CSP Forum 2015)
[Conference Proceedings]


Zertifizierte Apps
Maseberg, Sönke; Bodden, Eric; Kus, Mehmet; Brucker, Achim; Rasthofer, Siegfried; Berger, Bernhard; Huber, Stephan; Sohr, Karsten; Gerber, Paul; Volkamer, Melanie
Risiken kennen, Herausforderungen annehmen, Lösungen gestalten, Tagungsband zum 14. Deutscher IT-Sicherheitskongress des BSI 2015, p.505-516
[Conference Proceedings]


PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices
Ghiglieri, Marco
IEEE CCNC
[Conference Proceedings]


Augmented Learning with Errors: The Untapped Potential of the Error Term
Bansarkhani, Rachid El; Dagdelen, Özgür; Buchmann, Johannes
Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015, p.20
[Conference Proceedings]


Market-driven Code Provisioning to Mobile Secure Hardware
Dmitrienko, Alexandra; Heuser, Stephan; Nguyen, Thien Duc; Ramos, Marcos da Silva; Rein, Andre; Sadeghi, Ahmad-Reza
Financial Cryptography and Data Security
[Conference Proceedings]


ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation
Demmler, Daniel; Schneider, Thomas; Zohner, Michael
22nd Annual Network and Distributed System Security Symposium (NDSS'15)
[Conference Proceedings]


Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming
Davi, Lucas; Liebchen, Christopher; Sadeghi, Ahmad-Reza; Snow, Kevin; Monrose, Fabian
22nd Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


NoPhish App Evaluation: Lab and Retention Study
Canova, Gamze; Volkamer, Melanie; Bergmann, Clemens; Reinheimer, Benjamin
NDSS Workshop on Usable Security 2015
[Conference Proceedings]


Hybrid Communication Architecture for Emergency Response - An Implementation in Firefighter’s Use Case
Nguyen, The An Binh; Englert, Frank; Farr, Simon; Gottron, Christian; Böhnstedt, Doreen; Steinmetz, Ralf
2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), p.524-529
[Conference Proceedings]


A Concept for a C2X-based Crossroad Assistant
Burgstahler, D.; Pelzer, Matthias; Lotz, Andreas; Knapp, Fabian; Pu, Hongjun; Rueckelt, Tobias; Steinmetz, Ralf
2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), p.360-364
[Conference Proceedings]


Random-Oracle Uninstantiability from Indistinguishability Obfuscation
Brzuska, Christina; Farshim, Pooya; Mittelbach, Arno
Theory of Cryptography. TCC 2015., p.428-455
[Conference Proceedings]


Evaluation of User Feedback in Smart Home for Situational Context Identification
Alhamoud, Alaa; Xu, Pei; Englert, Frank; Scholl, Philipp; Nguyen, The An Binh; Böhnstedt, Doreen; Steinmetz, Ralf
2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), p.20-25
[Conference Proceedings]


TARDIS: Software-Only System-Level Record and Replay in Wireless Sensor Networks
Tancreti, Matthew; Sundaram, Vinaitheerthan; Bagchi, Saurabh; Eugster, Patrick
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, p.286-297
[Conference Proceedings]


XiOS: Extended Application Sandboxing on iOS
Bucicoiu, Mihai; Davi, Lucas; Deaconescu, Razvan; Sadeghi, Ahmad-Reza
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
[Conference Proceedings]


More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
Asharov, Gilad; Lindell, Yehuda; Schneider, Thomas; Zohner, Michael
34. Advances in Cryptology -- EUROCRYPT 2015, p.673-701
[Conference Proceedings]


Ciphers for MPC and FHE
Albrecht, Martin; Rechberger, Christian; Schneider, Thomas; Tiessen, Tyge; Zohner, Michael
34. Advances in Cryptology -- EUROCRYPT 2015, p.430-454
[Conference Proceedings]


Extracting Configuration Knowledge from Build Files with Symbolic Analysis
Zhou, Shurui; Al-Kofahi, Jafar; Nguyen, Tien; Kaestner, Christian; Nadi, Sarah
3rd International Workshop on Release Engineering, p.4
[Conference Proceedings]


GRINDER: On Reusability of Fault Injection Tools
Winter, Stefan; Piper, Thorsten; Schwahn, Oliver; Natella, Roberto; Suri, Neeraj; Cotroneo, Domenico
Proceedings of the ICSE/AST, 23.05.-24.05.2015, Florenz
[Conference Proceedings]


TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits
Songhori, Ebrahim; Hussain, Siam; Sadeghi, Ahmad-Reza; Schneider, Thomas; Koushanfar, Farinaz
36. IEEE Symposium on Security and Privacy (IEEE S&P'15), p.411-428
[Conference Proceedings]


Tor Experimentation Tools
Shirazi, Fatemeh; Goehring, Matthias; Diaz, Claudia
International Workshop on Privacy Engineering – IWPE'15, co-located with 36th IEEE symposium on Security and Privacy
[Conference Proceedings]


Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications
Schuster, Felix; Tendyck, Thomas; Liebchen, Christopher; Davi, Lucas; Sadeghi, Ahmad-Reza; Holz, Thorsten
36th IEEE Symposium on Security and Privacy (Oakland)
[Conference Proceedings]


TypeDevil: dynamic type inconsistency analysis for JavaScript
Pradel, Michael; Schuh, Parker; Sen, Koushik
Proceedings of the 37th International Conference on Software Engineering, p.314-324
[Conference Proceedings]


SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client
Ghiglieri, Marco; Oswald, Florian
14. Deutscher IT-Sicherheitskongress
[Conference Proceedings]


Da­ten­schutz­freund­liche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten
Ghiglieri, Marco; Müller, Jan
14. Deutscher IT-Sicherheitskongress
[Conference Proceedings]


Readactor: Practical Code Randomization Resilient to Memory Disclosure
Crane, Stephen; Liebchen, Christopher; Homescu, Andrei; Davi, Lucas; Larsen, Per; Sadeghi, Ahmad-Reza; Brunthaler, Stefan; Franz, Michael
36th IEEE Symposium on Security and Privacy (Oakland)
[Conference Proceedings]


Learn To Spot Phishing URLs with the Android NoPhish App
Canova, Gamze; Volkamer, Melanie; Bergmann, Clemens; Borza, Roland; Reinheimer, Benjamin; Stockhardt, Simon; Tenberg, Ralf
Information Security Education Across the Curriculum - 9th (IFIP), p.87-100
[Conference Proceedings]