Publications

Publications

Renouncing Privacy in Crisis Management? People's View on Social Media Monitoring and Surveillance
Aldehoff, Larissa; Dankenbring, Meri; Reuter, Christian
Proceedings of the 16th ISCRAM Conference : Information Systems for Crisis Response and Management
[Conference Proceedings]


Social Media Use in Emergencies of Citizens in the United Kingdom
Spielhofer, Thomas; Hahne, Anna Sophie; Reuter, Christian; Kaufhold, Marc-André; Schmid, Stefka
Proceedings of the 16th ISCRAM Conference : Information Systems for Crisis Response and Management, p.620-632
[Conference Proceedings]


Privacy-preserving speech processing via STPC and TEEs (Poster)
Bayerl, Sebastian P.; Brasser, Ferdinand; Busch, Christoph; Frassetto, Tommaso; Jauernig, Patrick; Kolberg, Jascha; Nautsch, Andreas; Riedhammer, Korbinian; Sadeghi, Ahmad-Reza; Schneider, Thomas; Stapf, Emmanuel; Treiber, Amos; Weinert, Christian
2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop
[Conference Proceedings]


In Hardware We Trust: Gains and Pains of Hardware-assisted Security
Batina, Lejla; Jauernig, Patrick; Mentens, Nele; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
Proceedings of the 56th Annual Design Automation Conference 2019
[Conference Proceedings]


Judge: Identifying, Understanding, and Evaluating Sources of Unsoundness in Call Graphs
Reif, Michael; Kübler, Florian; Eichberg, Michael; Helm, Dominik; Mezini, Mira
28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'19)
[Conference Proceedings]


Improved multiplication triple generation over rings via RLWE-based AHE
Rathee, Deevashwer; Schneider, Thomas; Shukla, K. K.
18. International Conference on Cryptology And Network Security (CANS'19)
[Conference Proceedings]


Investigating Next Steps in Static API-Misuse Detection
Amann, Sven; Nguyen, Hoan Anh; Nadi, Sarah; Nguyen, Tien N.; Mezini, Mira
Proceedings of the 16th International Conference on Mining Software Repositories
[Conference Proceedings]


Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange
Bindel, Nina; Brendel, Jacqueline; Fischlin, Marc; Goncalves, Brian; Stebila, Douglas
PQCrypto 2019: Post-Quantum Cryptography, p.206-226
[Conference Proceedings]


Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids
Brendel, Jacqueline; Fischlin, Marc; Günther, Felix
ESORICS 2019: Computer Security - ESORICS 2019, p.521-541
[Conference Proceedings]


How to Sign with White-Boxed AES
Fischlin, Marc; Haagh, Helene
LATINCRYPT 2019: Progress in Cryptology - LATINCRYPT 2019, p.259-279
[Conference Proceedings]


A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link
Stute, Milan; Narain, Sashank; Mariotto, Alex; Heinrich, Alexander; Kreitschmann, David; Noubir, Guevara; Hollick, Matthias
28th USENIX Security Symposium (USENIX Security '19)
[Conference Proceedings]


Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles
Kohnhäuser, Florian; Püllen, Dominik; Katzenbeisser, Stefan
IEEE Workshop on the Internet of Safe Things
[Conference Proceedings]


A Practical Attestation Protocol for Autonomous Embedded Systems
Kohnhäuser, Florian; Büscher, Niklas; Katzenbeisser, Stefan
4th IEEE European Symposium on Security and Privacy (EuroS&P'19)
[Conference Proceedings]


Vision: Shining Light on Smart Homes – Supporting Informed Decision-Making of End Users.
Zimmermann, Verena; Dickhaut, Ernestine; Gerber, Paul; Vogt, Joachim
4th European Workshop on Usable Security (EuroUSEC 2019)
[Conference Proceedings]


Why Johnny Fails to Protect his Privacy
Gerber, Nina; Zimmermann, Verena; Volkamer, Melanie
4th European Workshop on Usable Security (EuroUSEC 2019)
[Conference Proceedings]


RIP-RH: Preventing Rowhammer-based Inter-Process Attacks
Bock, Carsten; Brasser, Ferdinand; Gens, David; Liebchen, Christopher; Sadeghi, Ahmad-Reza
ACM Asia Conference on Computer and Communications Security (AsiaCCS)
[Conference Proceedings]


Sustainable Security & Safety: Challenges and Opportunities
Paverd, Andrew; Völp, Marcus; Brasser, Ferdinand; Schunter, Matthias; Asokan, N.; Sadeghi, Ahmad-Reza; Esteves-Verissimo, Paulo; Steininger, Andreas; Holz, Thorsten
4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS)
[Conference Proceedings]


Privacy-Preserving Speaker Recognition with Cohort Score Normalisation
Nautsch, Andreas; Patino, Jose; Treiber, Amos; Stafylakis, Themos; Mezira, Petr; Todisco, Massimiliano; Schneider, Thomas; Evans, Nicholas
Interspeech 2019
[Conference Proceedings]


PAtt: Physics-based Attestation of Control Systems
Ghaeini, Hamid Reza; Chan, Matthew; Bahmani, Raad; Brasser, Ferdinand; Garcia, Luis; Zhou, Jianying; Sadeghi, Ahmad-Reza; Tippenhauer, Nils Ole; Zonouz, Saman A.
22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
[Conference Proceedings]


CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems
Dessouky, Ghada; Zeitouni, Shaza; Ibrahim, Ahmad; Davi, Lucas; Sadeghi, Ahmad-Reza
2019 International Conference On Computer Aided Design (ICCAD)
[Conference Proceedings]


Web Application for Privacy-Preserving Scheduling using Secure Computation
Kiss, Ágnes; Schick, Oliver; Schneider, Thomas
16. International Conference on Security and Cryptography (SECRYPT'19)
[Conference Proceedings]


Poster: Automated Evaluation of Fuzzers
Surminski, Sebastian; Rodler, Michael; Davi, Lucas
NDSS 2019 : 26th Annual Network and Distributed System Security Symposium
[Conference Proceedings]


HardScope: Hardening Embedded Systems Against Data-Oriented Attacks
Nyman, Thomas; Dessouky, Ghada; Zeitouni, Shaza; Lehikoinen, Aaro; Paverd, Andrew; Asokan, N.; Sadeghi, Ahmad-Reza
Design Automation Conference (DAC)
[Conference Proceedings]


Too Confident to Care: Investigating Overconfidence in Privacy Decision Making
Wagner, Amina; Mesbah, Neda
European Conference on Information Systems - ECIS 2019
[Conference Proceedings]


Weary of Watching Out? - Cause and Effect of Security Fatigue
Olt, Christian M.; Mesbah, Neda
European Conference on Information Systems - ECIS 2019
[Conference Proceedings]


Mobile Private Contact Discovery at Scale
Kales, Daniel; Rechberger, Christian; Schneider, Thomas; Senker, Matthias; Weinert, Christian
28. USENIX Security Symposium (USENIX Security'19)
[Conference Proceedings]


On the Meaning and Purpose of Attack Trees
Mantel, Heiko; Probst, Christian
The 32nd IEEE Computer Security Foundations Symposium (CSF)
[Conference Proceedings]


Function-Dependent Commitments from Homomorphic Authenticators
Schabhüser, Lucas; Butin, Denis; Buchmann, Johannes
24th Australasian Conference, ACISP 2019
[Conference Proceedings]


Language Support for Multiple Privacy Enhancing Technologies
Oak, Aditya; Mezini, Mira; Salvaneschi, Guido
Conference Companion of the 3rd International Conference on Art, Science, and Engineering of Programming
[Conference Proceedings]


p3Enum: A new Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver
Burger, Michael; Bischof, Christian; Krämer, Juliane
19th INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, p.535-542
[Conference Proceedings]