Publications

Publications

FedCRI: Federated Mobile Cyber-Risk Intelligence
Fereidooni, Hossein; Dmitrienko, Alexandra; Rieger, Phillip; Miettinen, Markus; Sadeghi, Ahmad-Reza; Madlener, Felix
Network and Distributed Systems Security (NDSS) Symposium 2022
[Conference Proceedings]


Usability stumm geschaltet? Usable Security und Privacy in Videokonferenzsystemen
Balthasar, Mandy; Gerber, Nina; Schmitt, Hartmut
Mensch und Computer 2021 - Usability Professionals
[Conference Proceedings]


AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices
Heinrich, Alexander; Bittner, Niklas; Hollick, Matthias
WiSec '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.26-38
[Conference Proceedings]


WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens
Jiang, Yan; Ji, Xiaoyu; Wang, Kai; Yan, Chen; Mitev, Richard; Sadeghi, Ahmad-Reza; Xu, Wenyuan
Proceedings: 43rd IEEE Symposium on Security and Privacy (SP 2022), p.984-1001
[Conference Proceedings]


GhostTouch: Targeted Attacks on Touchscreens without Physical Touch
Wang, Kai; Mitev, Richard; Yan, Chen; Ji, Xiaoyu; Sadeghi, Ahmad-Reza; Xu, Wenyuan
Proceedings of the 31st USENIX Security Symposium
[Conference Proceedings]


The Nerd Factor: The Potential of S&P Adepts to Serve as a Social Resource in the User’s Quest for More Secure and Privacy-Preserving Behavior
Gerber, Nina; Marky, Karola
Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), p.57-76
[Conference Proceedings]


Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M
Sadeghi, Ahmad-Reza; Mitev, Richard; Saß, Marvin
25th Black Hat USA
[Conference Proceedings]


Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures
Dessouky, Ghada; Gruler, Alexander; Mahmoody, Pouya; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
Network and Distributed Systems Security (NDSS) Symposium 2022
[Conference Proceedings]


Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany
Haunschild, Jasmin; Kaufhold, Marc-André; Reuter, Christian
Proceedings der 15. Internationalen Tagung Wirtschaftsinformatik 2020 : Ent­wicklungen, Chancen und Herausforderungen der Digitalisierung : WI 2020 : Zentrale Tracks
[Conference Proceedings]


Financially Backed Covert Security
Faust, Sebastian; Hazay, Carmit; Kretzler, David; Schlosser, Benjamin
International Conference on Practice and Theory of Public-Key Cryptography 2022
[Conference Proceedings]


CiFi: Versatile Analysis of Class and Field Immutability
Roth, Tobias; Helm, Dominik; Reif, Michael; Mezini, Mira
Software Engineering 2022: Fachtagung des GI-Fachbereichs Softwaretechnik, p.81-82
[Conference Proceedings]


Proceedings of the 2nd Workshop on Mobile Resilience: Designing Interactive Systems for Crisis Response
2nd Workshop on Mobile Resilience: Designing Interactive Systems for Crisis Response
[Conference Proceedings]


SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities
Zeitouni, Shaza; Dessouky, Ghada; Sadeghi, Ahmad-Reza
6th IEEE European Symposium on Security and Privacy (Euro S&P 2021)
[Conference Proceedings]


EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts
Rodler, Michael; Li, Wenting; Karame, Ghassan O.; Davi, Lucas
30th USENIX Security Symposium
[Conference Proceedings]


SoK: Efficient Privacy-preserving Clustering
Hedge, Aditya; Möllering, Helen; Schneider, Thomas; Yalame, Mohammad Hossein
21st Privacy Enhancing Technologies Symposium (PETS 2021)
[Conference Proceedings]


FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants
Chen, Yanjiao; Bai, Yijie; Wang, Kaibo; Mitev, Richard; Xu, Wenyuan; Sadeghi, Ahmad-Reza
ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


CURE: A Security Architecture with CUstomizable and Resilient Enclaves
Bahmani, Raad; Brasser, Ferdinand; Dessouky, Ghada; Jauernig, Patrick; Klimmek, Matthias; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
30th USENIX Security Symposium (USENIX Security'21)
[Conference Proceedings]


BlindOR: An Efficient Lattice-Based Blind Signature Scheme from OR-Proofs
Alkeilani Alkadri, Nabil; Harasser, Patrick; Janson, Christian
20th International Conference on Cryptology and Network Security (CANS 2021)
[Conference Proceedings]


The Cost of Path Information: Routing in Anonymous Communication
Grube, Tim; Egert, Rolf; Daubert, Jörg; Mühlhäuser, Max
Consumer Communications & Networking Conference (CCNC 2021)
[Conference Proceedings]


SAFELearn: Secure Aggregation for private FEderated Learning
Fereidooni, Hossein; Marchal, Samuel; Miettinen, Markus; Mirhoseini, Azalia; Möllering, Helen; Nguyen, Thien Duc; Rieger, Phillip; Sadeghi, Ahmad-Reza; Schneider, Thomas; Yalame, Mohammad Hossein; Zeitouni, Shaza
4th Deep Learning and Security Workshop (DLS'21)
[Conference Proceedings]


Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation
Demmler, Daniel; Katzenbeisser, Stefan; Schneider, Thomas; Schuster, Tom; Weinert, Christian
18th International Conference on Security and Cryptography (SECRYPT'21)
[Conference Proceedings]


Who are Vulnerability Reporters? A Large-scale Empirical Study on FLOSS
Alexopoulos, Nikolaos; Meneely, Andy; Arnouts, Dorian; Mühlhäuser, Max
15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM '21)
[Conference Proceedings]


The Security of ChaCha20-Poly1305 in the Multi-User Setting
Degabriele, Jean Paul; Govinden, Jérôme; Günther, Felix; Paterson, Kenneth G.
CCS´21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, p.1981-2003
[Conference Proceedings]


An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records
Fejrskov, Martin; Pedersen, Jens Myrup; Böck, Leon; Vasilomanolakis, Emmanouil
IEEE Conference on Communications and Network Security, CNS 2021, Tempe, AZ, USA, October 4-6, 2021, p.164-172
[Conference Proceedings]


LOKI: Development of an interface for task-based, privacy-friendly smart home control through LOCal Information Processing
Gerber, Paul; Heidinger, Marvin; Stiegelmayer, Julia; Gerber, Nina
Mensch und Computer 2021, p.578-581
[Conference Proceedings]


Evaluating a Smart Car Interface in Terms of Usability, User Experience and User Acceptance
Avramidis, Mario; Kellner, Christiane; Staudt, Josefine; Zimmermann, Verena; Gerber, Nina
Mensch und Computer 2021 - Workshopband
[Conference Proceedings]


PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Heinrich, Alexander; Hollick, Matthias; Schneider, Thomas; Stute, Milan; Weinert, Christian
30th USENIX Security Symposium
[Conference Proceedings]


BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures
Cremers, Cas; Düzlü, Samed; Fiedler, Rune; Fischlin, Marc; Janson, Christian
Proceedings: 2021 IEEE Symposium on Security and Privacy (SP 2021), p.1696-1714
[Conference Proceedings]


Multipath TLS 1.3
Fischlin, Marc; Müller, Sven-Andre; Münch, Jean-Pierre; Porth, Lars
Computer Security - ESORICS 2021, p.86-105
[Conference Proceedings]


Revisiting Hybrid Private Information Retrieval
Günther, Daniel; Schneider, Thomas; Wiegand, Felix
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, p.2408-2410
[Conference Proceedings]