Publications
Publications
Stalloris: RPKI Downgrade Attack
Hlavacek, Tomas; Jeitner, Philipp; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
31st USENIX Security Symposium (USENIX Security 22), p.4455-4471
[Conference Proceedings]
Smart RPKI Validation: Avoiding Errors and Preventing Hijacks
Hlavacek, Tomas; Schulmann, Haya; Waidner, Michael
Computer Security — ESORICS 2022, p.509-530
[Conference Proceedings]
How (Not) to Deploy Cryptography on the Internet
Schulmann, Haya
Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy, p.1
[Conference Proceedings]
Poster: DNS in Routers Considered Harmful
Schulmann, Haya; Waidner, Michael
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3471-3473
[Conference Proceedings]
Poster: Insights into Global Deployment of RPKI Validation
Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3467-3469
[Conference Proceedings]
Poster: RPKI Kill Switch
Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3423-3425
[Conference Proceedings]
Poster: The Unintended Consequences of Algorithm Agility in DNSSEC
Heftrig, Elias; Schulmann, Haya; Waidner, Michael
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3363-3365
[Conference Proceedings]
Behind the Scenes of RPKI
Hlavacek, Tomas; Jeitner, Philipp; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.1413-1426
[Conference Proceedings]
$crypto_lib$: Comparing and Selecting Cryptography Libraries
Wohlwender, J.; Huesmann, R.; Heinemann, A.; Wiesmaier, A.
European Interdisciplinary Cybersecurity Conference (EICC 22), p.6-11
[Conference Proceedings]
Decision Tree-Based Rule Derivation for Intrusion Detection in Safety-Critical Automotive Systems
Buschlinger, Lucas; Rieke, Roland; Sarda, Sanat; Krauß, Christoph
2022 30th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), p.246-254
[Conference Proceedings]
On the State of Crypto-Agility
Alnahawi, N.; Schmitt, N.; Wiesmaier, A.; Heinemann, A.; Graßmeyer, T.
18. Deutscher IT-Sicherheitskongress, p.103-126
[Conference Proceedings]
Alcohol Consumption Detection from Periocular NIR Images Using Capsule Network
Tapia, J.; Lopez-Droguett, E.; Busch, C.
26th Intl. Conf. on Pattern Recognition (ICPR), p.959-966
[Conference Proceedings]
Identity Documents Image Quality Assessment
Schulz, D.; Maureira, J.; Tapia, J.; Busch, C.
30th European Signal Processing Conf. (EUSIPCO), p.1017-1021
[Conference Proceedings]
Evaluating Face Image Quality Score Fusion for Modern Deep Learning Models
Schlett, T.; Rathgeb, C.; Tapia, J.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-8
[Conference Proceedings]
Crowd-powered Face Manipulation Detection: Fusing Human Examiner Decisions
Rathgeb, C.; Nichols, R.; Ibsen, M.; Drozdowski, P.; Busch, C.
Intl. Conf. on Image Processing (ICIP), p.181-185
[Conference Proceedings]
Hybrid Protection of Biometric Templates by Combining Homomorphic Encryption and Cancelable Biometrics
Otroshi-Shahreza, H.; Rathgeb, C.; Osorio-Roig, D.; ca, V. Krivoku\; Marcel, S.; Busch, C.
Proc. of the 2022 Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]
Exploring Quality Scores for Workload Reduction in Biometric Identification
Osorio-Roig, D.; Schlett, T.; Rathgeb, C.; Tapia, J.; Busch, C.
Proc. Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]
Analysis of Minutiae Quality for Improved Workload Reduction in Fingerprint Identification
Osorio-Roig, D.; Rohwedder, T.; Rathgeb, C.; Busch, C.
Proc. Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-11
[Conference Proceedings]
Indexing Protected Deep Face Templates by Frequent Binary Patterns
Osorio-Roig, D.; Rathgeb, C.; Otroshi-Shahreza, H.; Busch, C.; Marcel, S.
Proc. of the 2022 Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]
Explainable Visualization for Morphing Attack Detection
Myhrvold, H.; Zhang, H.; Tapia, J.; Raghavendra, R.; Busch, C.
Norwegian Information Security Conf. (NISK)
[Conference Proceedings]
Modelling Frequent Imperfections of Contactless Fingerprints
Lorenz, S.; Priesnitz, J.; Rathgeb, C.; Busch, C.
Proc. of the 2022 Intl. Joint Conf. on Biometrics (IJCB), p.1-8
[Conference Proceedings]
The Influence of Gender and Skin Colour on the Watchlist Imbalance Effect in Facial Identification Scenarios
Kolberg, J.; Rathgeb, C.; Busch, C.
Intl. Conf. on Pattern Recognition (ICPR), p.1-13
[Conference Proceedings]
EGAIN: Extended GAn INversion
Kabbani, W.; Grimmer, M.; Busch, C.
European Workshop on Visual Information Processing (EUVIP)
[Conference Proceedings]
When Facial Recognition Systems become Presentation Attack Detectors
Gonzalez-Soler, J.; Barhaugen, K.; Gomez-Barrero, M.; Busch, C.
Proc. Intl. Conf. of the Special Interest Group on Biometrics (BIOSIG), p.1-8
[Conference Proceedings]
Dual-Stream Temporal Convolutional Neural Network for Voice Presentation Attack Detection
Gonzalez-Soler, J.; Gomez-Barrero, M.; Kamble, M.; Todisco, M.; Busch, C.
Proc. Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]
Towards Refining ID Cards Presentation Attack Detection Systems using Face Quality Index
Gonzalez, S.; Tapia, J.
Proc. of the 30th European Signal Processing Conf. (EUSIPCO), p.1027-1031
[Conference Proceedings]
Are Average Faces Master Faces?
Dörsch, A.; Rathgeb, C.; Ibsen, M.; Busch, C.
Proc. Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]
Improved Homomorphically Encrypted Biometric Identification Using Coefficient Packing
Bauspieß, P.; Olafsson, J.; Kolberg, J.; Drozdowski, P.; Rathgeb, C.; Busch, C.
Proc. Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]
On Actively Secure Fine-Grained Access Structures from Isogeny Assumptions
Campos, Fabio; Muth, Philipp
International Conference on Post-Quantum Cryptography (PQCrypto), p.375-398
[Conference Proceedings]
Patient Zero \& Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKE
Campos, Fabio; Meyer, Michael; Reijnders, Krijn; Stöttinger, Marc
International Conference on Selected Areas in Cryptography (SAC), p.234-262
[Conference Proceedings]


