Publications
Publications
Measuring the Uptaking of Digital Health Platforms on AAL/AHA Domain
Juiz, Carlos; Bermejo, Belen; Nikolov, Alexander; Rus, Silvia; Carboni, Andrea; Russo, Dario; Moroni, Davide; Karanastasis, Efstathios; Andronikou, Vassiliki; Lievens, Frederic; Berlo, Ad van; Staalduinen, Willeke van; Samuelsson, Christina; Cabrera-Umpierrez, Maria Fernanda
International Congress on Information and Communication Technology 2022
[Conference Paper]
XDRI Attacks - and - How to Enhance Resilience of Residential Routers
Philipp Jeitner and Haya Schulmann and Lucas Teichmann and Michael Waidner
31st USENIX Security Symposium (USENIX Security 22), p.4473–4490
[Conference Proceedings]
Stalloris: RPKI Downgrade Attack
Tomas Hlavacek and Philipp Jeitner and Donika Mirdita and Haya Schulmann and Michael Waidner
31st USENIX Security Symposium (USENIX Security 22), p.4455–4471
[Conference Proceedings]
Smart RPKI Validation: Avoiding Errors and Preventing Hijacks
Tomas Hlavacek and Haya Schulmann and Michael Waidner
Computer Security – ESORICS 2022, p.509–530
[Conference Proceedings]
How (Not) to Deploy Cryptography on the Internet
Haya Schulmann
Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy, p.1
[Conference Proceedings]
Poster: DNS in Routers Considered Harmful
Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3471–3473
[Conference Proceedings]
Poster: Insights into Global Deployment of RPKI Validation
Haya Schulmann and Niklas Vogel and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3467–3469
[Conference Proceedings]
Poster: RPKI Kill Switch
Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3423–3425
[Conference Proceedings]
Poster: The Unintended Consequences of Algorithm Agility in DNSSEC
Elias Heftrig and Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3363–3365
[Conference Proceedings]
Behind the Scenes of RPKI
Tomas Hlavacek and Philipp Jeitner and Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.1413–1426
[Conference Proceedings]
crypto_lib: Comparing and Selecting Cryptography Libraries
J. Wohlwender and R. Huesmann and A. Heinemann and A. Wiesmaier
European Interdisciplinary Cybersecurity Conference (EICC'22), p.6 – 11
[Conference Proceedings]
Decision Tree-Based Rule Derivation for Intrusion Detection in Safety-Critical Automotive Systems
Lucas Buschlinger and Roland Rieke and Sanat Sarda and Christoph Krauß
2022 30th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), p.246-254
[Conference Proceedings]
On the State of Crypto-Agility
N. Alnahawi and N. Schmitt and A. Wiesmaier and A. Heinemann and T. Graßmeyer
18. Deutscher IT-Sicherheitskongress, p.103 – 126
[Conference Proceedings]
Alcohol Consumption Detection from Periocular NIR Images Using Capsule Network
J. Tapia and E. Lopez-Droguett and C. Busch
26th Intl. Conf. on Pattern Recognition (ICPR), p.959–966
[Conference Proceedings]
Identity Documents Image Quality Assessment
D. Schulz and J. Maureira and J. Tapia and C. Busch
30th European Signal Processing Conf. (EUSIPCO), p.1017–1021
[Conference Proceedings]
Evaluating Face Image Quality Score Fusion for Modern Deep Learning Models
T. Schlett and C. Rathgeb and J. Tapia and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–8
[Conference Proceedings]
Crowd-powered Face Manipulation Detection: Fusing Human Examiner Decisions
C. Rathgeb and R. Nichols and M. Ibsen and P. Drozdowski and C. Busch
Intl. Conf. on Image Processing (ICIP), p.181–185
[Conference Proceedings]
Hybrid Protection of Biometric Templates by Combining Homomorphic Encryption and Cancelable Biometrics
H. Otroshi-Shahreza and C. Rathgeb and D. Osorio-Roig and V. Krivokuća and S. Marcel and C. Busch
Proc. of the 2022 Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]
Exploring Quality Scores for Workload Reduction in Biometric Identification
D. Osorio-Roig and T. Schlett and C. Rathgeb and J. Tapia and C. Busch
Proc. Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]
Analysis of Minutiae Quality for Improved Workload Reduction in Fingerprint Identification
D. Osorio-Roig and T. Rohwedder and C. Rathgeb and C. Busch
Proc. Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–11
[Conference Proceedings]
Indexing Protected Deep Face Templates by Frequent Binary Patterns
D. Osorio-Roig and C. Rathgeb and H. Otroshi-Shahreza and C. Busch and S. Marcel
Proc. of the 2022 Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]
Explainable Visualization for Morphing Attack Detection
H. Myhrvold and H. Zhang and J. Tapia and R. Raghavendra and C. Busch
Norwegian Information Security Conf. (NISK)
[Conference Proceedings]
Modelling Frequent Imperfections of Contactless Fingerprints
S. Lorenz and J. Priesnitz and C. Rathgeb and C. Busch
Proc. of the 2022 Intl. Joint Conf. on Biometrics (IJCB), p.1–8
[Conference Proceedings]
The Influence of Gender and Skin Colour on the Watchlist Imbalance Effect in Facial Identification Scenarios
J. Kolberg and C. Rathgeb and C. Busch
Intl. Conf. on Pattern Recognition (ICPR), p.1–13
[Conference Proceedings]
EGAIN: Extended GAn INversion
W. Kabbani and M. Grimmer and C. Busch
European Workshop on Visual Information Processing (EUVIP)
[Conference Proceedings]
When Facial Recognition Systems become Presentation Attack Detectors
J. Gonzalez-Soler and K. Barhaugen and M. Gomez-Barrero and C. Busch
Proc. Intl. Conf. of the Special Interest Group on Biometrics (BIOSIG), p.1–8
[Conference Proceedings]
Dual-Stream Temporal Convolutional Neural Network for Voice Presentation Attack Detection
J. Gonzalez-Soler and M. Gomez-Barrero and M. Kamble and M. Todisco and C. Busch
Proc. Intl. Workshop on Biometrics and Forensics (IWBF), p.1–6
[Conference Proceedings]
Towards Refining ID Cards Presentation Attack Detection Systems using Face Quality Index
S. Gonzalez and J. Tapia
Proc. of the 30th European Signal Processing Conf. (EUSIPCO), p.1027–1031
[Conference Proceedings]
Are Average Faces Master Faces?
A. Dörsch and C. Rathgeb and M. Ibsen and C. Busch
Proc. Intl. Workshop on Biometrics and Forensics (IWBF), p.1–6
[Conference Proceedings]
Improved Homomorphically Encrypted Biometric Identification Using Coefficient Packing
P. Bauspieß and J. Olafsson and J. Kolberg and P. Drozdowski and C. Rathgeb and C. Busch
Proc. Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]


