Publications

Publications

Practical Covert Channels for WiFi Systems
Classen, Jiska; Schulz, Matthias; Hollick, Matthias
IEEE Conference on Communications and Network Security (CNS), p.8
[Conference Proceedings]


The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications
Classen, Jiska; Chen, Joe; Steinmetzer, Daniel; Hollick, Matthias; Knightly, Edward
2nd ACM Workshop on Visible Light Communication Systems, p.6
[Conference Proceedings]


Hide And Seek: Detecting Sensors in P2P Botnets
Böck, Leon; Karuppayah, Shankar; Grube, Tim; Fischer, Mathias; Mühlhäuser, Max
Communications and Network Security (CNS), 2015 IEEE Conference on, p.731-732
[Conference Proceedings]


Formal Accountability for Biometric Surveillance: A Case Study
Ta, Vinh-Thong; Butin, Denis; Métayer, Daniel Le
Annual Privacy Forum (APF2015)
[Conference Proceedings]


On the Systematic Drift of Physically Unclonable Functions Due to Aging
Schaller, André; Skoric, Boris; Katzenbeisser, Stefan
TrustED, p.15-20
[Conference Proceedings]


PBMC: Symbolic Slicing for the Verification of Concurrent Programs
Saissi, Habib; Bokor, Peter; Suri, Neeraj
Proceedings of the Symposium on Automated Technology for Verification and Analysis, ATVA 2015
[Conference Proceedings]


Notions of Deniable Message Authentication
Fischlin, Marc; Mazaheri, Sogol
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, p.55-64
[Conference Proceedings]


A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas
22nd ACM Conference on Computer and Communications Security (CCS 2015), p.1197-1210
[Conference Proceedings]


Automated Synthesis of Optimized Circuits for Secure Computation
Demmler, Daniel; Dessouky, Ghada; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza; Schneider, Thomas; Zeitouni, Shaza
22. ACM Conference on Computer and Communications Security (CCS'15), p.1504-1517
[Conference Proceedings]


Performance problems you can fix: a dynamic analysis of memoization opportunities
Della Toffola, Luca; Pradel, Michael; Gross, Thomas R.
Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, p.607-622
[Conference Proceedings]


It's a TRAP: Table Randomization and Protection against Function Reuse Attacks
Crane, Stephen; Volckaert, Stijn; Schuster, Felix; Liebchen, Christopher; Larsen, Per; Davi, Lucas; Sadeghi, Ahmad-Reza; Holz, Thorsten; Sutter, Bjorn De; Franz, Michael
22nd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks
Conti, Mauro; Crane, Stephen; Davi, Lucas; Franz, Michael; Larsen, Per; Liebchen, Christopher; Negro, Marco; Qunaibit, Mohaned; Sadeghi, Ahmad-Reza
22nd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


SEDA: Scalable Embedded Device Attestation
Asokan, N.; Brasser, Ferdinand; Ibrahim, Ahmad; Sadeghi, Ahmad-Reza; Schunter, Matthias; Tsudik, Gene; Wachsmann, Christian
22nd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


Rating Decomposition with Conjoint Analysis and Machine Learning
Volk, Florian; Trüschler, Nadine; Mühlhäuser, Max
CENTRIC 2015: The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, p.36-41
[Conference Proceedings]


Design Principles for HFEv- based Signature Schemes
Petzoldt, Albrecht; Cheng, Ming-Shing; Yang, Bo-Yin; Chengdong, Tao; Ding, Jintai
ASIACRYPT 2015 - Part I - 21st International Conference on the Theory and Application of Cryptology and Information Security, p.1-24
[Conference Proceedings]


On the Optimality of Differential Fault Analyses on CLEFIA
Krämer, Juliane; Kiss, Ágnes; Stüber, Anke
6. International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS'15), p.181-196
[Conference Proceedings]


Learning With Errors in the Exponent
Dagdelen, Özgür; Gajek, Sebastian; Göpfert, Florian
18th International Conference on information Security and Cryptology (ICISC) 2015
[Conference Proceedings]


jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications
Pellegrino, Giancarlo; Tschürtz, Constantin; Bodden, Eric; Rossow, Christian
Research in Attacks, Intrusions, and Defenses. 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings., p.295-316
[Conference Proceedings]


Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing
Mayer, Peter; Volkamer, Melanie
Proceedings of the 31st Annual Computer Security Applications Conference, p.431-440
[Conference Proceedings]


Detection and Forensics of Domains Hijacking
Borgwart, Andreas; Boukoros, Spyros; Shulman, Haya; Waidner, Michael; Royeen, Carel van
IEEE Global Communications Conference
[Conference Proceedings]


IOT: Using Channel State Information for Tamper Detection in the Internet of Things
Bagci, Ibrahim Ethem; Roedig, Utz; Martinovic, Ivan; Schulz, Matthias; Hollick, Matthias
Using Channel State Information for Tamper Detection in the Internet of Things, p.131-140
[Conference Proceedings]


Poster: Password Entering and Transmission Security
Canova, Gamze; Volkamer, Melanie; Weiler, Simon
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, p.1418-1420
[Conference Proceedings]


SAX-PAC (scalable and expressive packet classification)
Kogan, Kirill; Nikolenko, Sergey I.; Rottenstreich, Ori; Culhane, William; Eugster, Patrick
Proceedings of the 2014 ACM conference on SIGCOMM, p.15-26
[Conference Proceedings]


I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV
Ghiglieri, Marco
Workshop Web 2.0 Security & Privacy 2014 in conjunction with the IEEE Symposium on Security and Privacy
[Conference Proceedings]


Authentication Schemes - Comparison and Effective Password Spaces
Mayer, Peter; Volkamer, Melanie; Kauer, Michaela
Information Systems Security : International Conference on Information Systems Security (ICISS), p.204-225
[Conference Proceedings]


Adaptive Dynamic On-chip Memory Management for FPGA-based Reconfigurable Architectures
Dessouky, Ghada; Klaiber, Michael J.; Bailey, Donald G.; Simon, Svenja
24th International Conference on Field Programmable Logic and Applications (FPL)
[Conference Proceedings]


Swap and Play: Live Updating Hypervisors and Its Application to Xen
Sadeghi, Ahmad-Reza; Brasser, Ferdinand
CCSW 2014: The ACM Cloud Computing Security Workshop Proceedings
[Conference Proceedings]


A performance analysis of long-term archiving techniques
Vigil, Martín; Weinert, Christian; Braden, Kjell; Demirel, Denise; Buchmann, Johannes
IEEE - High Performace Computing and Communications (HPCC 2014), p.878-889
[Conference Proceedings]


AHP-Based Quantitative Approach for Assessing & Comparing Cloud Security
Suri, Neeraj; Taha, Ahmed; Trapero, Ruben; Luna, Jesus
Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14)
[Conference Proceedings]


Fragmentation Considered Leaking: Port Inference for DNS Poisoning.
Shulman, Haya; Waidner, Michael
International Conference on Applied Cryptography and Network Security (ACNS 2014), p.531-548
[Conference Proceedings]