Publications

Publications

Stalloris: RPKI Downgrade Attack
Hlavacek, Tomas; Jeitner, Philipp; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
31st USENIX Security Symposium (USENIX Security 22), p.4455-4471
[Conference Proceedings]


Smart RPKI Validation: Avoiding Errors and Preventing Hijacks
Hlavacek, Tomas; Schulmann, Haya; Waidner, Michael
Computer Security — ESORICS 2022, p.509-530
[Conference Proceedings]


How (Not) to Deploy Cryptography on the Internet
Schulmann, Haya
Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy, p.1
[Conference Proceedings]


Poster: DNS in Routers Considered Harmful
Schulmann, Haya; Waidner, Michael
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3471-3473
[Conference Proceedings]


Poster: Insights into Global Deployment of RPKI Validation
Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3467-3469
[Conference Proceedings]


Poster: RPKI Kill Switch
Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3423-3425
[Conference Proceedings]


Poster: The Unintended Consequences of Algorithm Agility in DNSSEC
Heftrig, Elias; Schulmann, Haya; Waidner, Michael
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3363-3365
[Conference Proceedings]


Behind the Scenes of RPKI
Hlavacek, Tomas; Jeitner, Philipp; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.1413-1426
[Conference Proceedings]


$crypto_lib$: Comparing and Selecting Cryptography Libraries
Wohlwender, J.; Huesmann, R.; Heinemann, A.; Wiesmaier, A.
European Interdisciplinary Cyber­security Conference (EICC 22), p.6-11
[Conference Proceedings]


Decision Tree-Based Rule Derivation for Intrusion Detection in Safety-Critical Automotive Systems
Buschlinger, Lucas; Rieke, Roland; Sarda, Sanat; Krauß, Christoph
2022 30th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), p.246-254
[Conference Proceedings]


On the State of Crypto-Agility
Alnahawi, N.; Schmitt, N.; Wiesmaier, A.; Heinemann, A.; Graßmeyer, T.
18. Deutscher IT-Sicherheitskongress, p.103-126
[Conference Proceedings]


Alcohol Consumption Detection from Periocular NIR Images Using Capsule Network
Tapia, J.; Lopez-Droguett, E.; Busch, C.
26th Intl. Conf. on Pattern Recognition (ICPR), p.959-966
[Conference Proceedings]


Identity Documents Image Quality Assessment
Schulz, D.; Maureira, J.; Tapia, J.; Busch, C.
30th European Signal Processing Conf. (EUSIPCO), p.1017-1021
[Conference Proceedings]


Evaluating Face Image Quality Score Fusion for Modern Deep Learning Models
Schlett, T.; Rathgeb, C.; Tapia, J.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-8
[Conference Proceedings]


Crowd-powered Face Manipulation Detection: Fusing Human Examiner Decisions
Rathgeb, C.; Nichols, R.; Ibsen, M.; Drozdowski, P.; Busch, C.
Intl. Conf. on Image Processing (ICIP), p.181-185
[Conference Proceedings]


Hybrid Protection of Biometric Templates by Combining Homomorphic Encryption and Cancelable Biometrics
Otroshi-Shahreza, H.; Rathgeb, C.; Osorio-Roig, D.; ca, V. Krivoku\; Marcel, S.; Busch, C.
Proc. of the 2022 Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


Exploring Quality Scores for Workload Reduction in Biometric Identification
Osorio-Roig, D.; Schlett, T.; Rathgeb, C.; Tapia, J.; Busch, C.
Proc. Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]


Analysis of Minutiae Quality for Improved Workload Reduction in Fingerprint Identification
Osorio-Roig, D.; Rohwedder, T.; Rathgeb, C.; Busch, C.
Proc. Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-11
[Conference Proceedings]


Indexing Protected Deep Face Templates by Frequent Binary Patterns
Osorio-Roig, D.; Rathgeb, C.; Otroshi-Shahreza, H.; Busch, C.; Marcel, S.
Proc. of the 2022 Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


Explainable Visualization for Morphing Attack Detection
Myhrvold, H.; Zhang, H.; Tapia, J.; Raghavendra, R.; Busch, C.
Norwegian Information Security Conf. (NISK)
[Conference Proceedings]


Modelling Frequent Imperfections of Contactless Fingerprints
Lorenz, S.; Priesnitz, J.; Rathgeb, C.; Busch, C.
Proc. of the 2022 Intl. Joint Conf. on Biometrics (IJCB), p.1-8
[Conference Proceedings]


The Influence of Gender and Skin Colour on the Watchlist Imbalance Effect in Facial Identification Scenarios
Kolberg, J.; Rathgeb, C.; Busch, C.
Intl. Conf. on Pattern Recognition (ICPR), p.1-13
[Conference Proceedings]


EGAIN: Extended GAn INversion
Kabbani, W.; Grimmer, M.; Busch, C.
European Workshop on Visual Information Processing (EUVIP)
[Conference Proceedings]


When Facial Recognition Systems become Presentation Attack Detectors
Gonzalez-Soler, J.; Barhaugen, K.; Gomez-Barrero, M.; Busch, C.
Proc. Intl. Conf. of the Special Interest Group on Biometrics (BIOSIG), p.1-8
[Conference Proceedings]


Dual-Stream Temporal Convolutional Neural Network for Voice Presentation Attack Detection
Gonzalez-Soler, J.; Gomez-Barrero, M.; Kamble, M.; Todisco, M.; Busch, C.
Proc. Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]


Towards Refining ID Cards Presentation Attack Detection Systems using Face Quality Index
Gonzalez, S.; Tapia, J.
Proc. of the 30th European Signal Processing Conf. (EUSIPCO), p.1027-1031
[Conference Proceedings]


Are Average Faces Master Faces?
Dörsch, A.; Rathgeb, C.; Ibsen, M.; Busch, C.
Proc. Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]


Improved Homomorphically Encrypted Biometric Identification Using Coefficient Packing
Bauspieß, P.; Olafsson, J.; Kolberg, J.; Drozdowski, P.; Rathgeb, C.; Busch, C.
Proc. Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]


On Actively Secure Fine-Grained Access Structures from Isogeny Assumptions
Campos, Fabio; Muth, Philipp
International Conference on Post-Quantum Cryptography (PQCrypto), p.375-398
[Conference Proceedings]


Patient Zero \& Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKE
Campos, Fabio; Meyer, Michael; Reijnders, Krijn; Stöttinger, Marc
International Conference on Selected Areas in Cryptography (SAC), p.234-262
[Conference Proceedings]