Publications

Publications

CogniCrypt: Supporting Developers in using Cryptography
Krüger, Stefan; Nadi, Sarah; Reif, Michael; Ali, Karim; Mezini, Mira; Bodden, Eric; Göpfert, Florian; Günther, Felix; Weinert, Christian; Demmler, Daniel; Kamath, Ram
Automated Software Engineering (ASE'17)
[Conference Proceedings]


Towards Accelerated Usage Control based on Access Correlations
Gay, Richard; Hu, Jinwei; Mantel, Heiko; Schickel, Johannes
NordSec2017 - Nordic Conference on Secure IT Systems
[Conference Proceedings]


Privacy-Preserving Whole-Genome Variant Queries
Demmler, Daniel; Hamacher, Kay; Schneider, Thomas; Stammler, Sebastian
Cryptology and Network Security, p.71-92
[Conference Proceedings]


I Trust my Zombies: a Trust-enabled Botnet
Vasilomanolakis, Emmanouil; Wolf, Jan Helge; Böck, Leon; Mühlhäuser, Max; Karuppayah, Shankar
Blackhat Europe
[Conference Proceedings]


An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage
Sarangdhar, Ravi; Fan, Yufan; Anagnostopoulos, Nikolaos Athanasios; Gayer, Udo; Flederer, Frank; Mikschl, Tobias; Arul, Tolga; John, Philipp R.; Hierholz, Kirsten; Montenegro, Sergio; Katzenbeisser, Stefan
27th Crypto-Day
[Conference Proceedings]


More Efficient Universal Circuit Constructions
Günther, Daniel; Kiss, Ágnes; Schneider, Thomas
23. Advances in Cryptology -- ASIACRYPT 2017
[Conference Proceedings]


SIXPACK: Securing Internet eXchange Points Against Curious onlooKers
Chiesa, Marco; Demmler, Daniel; Canini, Marco; Schapira, Michael; Schneider, Thomas
CoNEXT '17: Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, p.120-133
[Conference Proceedings]


Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β
Buchmann, Johannes; Holzer, Patrick; Wunderer, Thomas
INDOCRYPT 2017 - 18th International Conference on Cryptology in India
[Conference Proceedings]


An extensive classification and analysis of attacks against Physical Unclonable Functions (PUFs)
Anagnostopoulos, Nikolaos Athanasios; Gabmeyer, Sebastian; Arul, Tolga; Katzenbeisser, Stefan
27th Crypto-Day
[Conference Proceedings]


Revisiting the Expected Cost of Solving uSVP and Applications to LWE
Albrecht, Martin; Göpfert, Florian; Vidria, Fernando; Wunderer, Thomas
ASIACRYPT 2017 - Advances in Cryptology
[Conference Proceedings]


Towards enhancing the visual analysis of interdomain routing
Ulmer, Alex; Kohlhammer, Jörn; Shulman, Haya
International Joint Conference on Computer Vision and Computer Graphics Theory and Applications (VISIGRAPP) 12, 2017, Porto>
[Conference Paper]


On the Security & Privacy of Internet of Things Architectures and Systems
E. Vasilomanolakis and J. Daubert and M. Luthra and V. Gazis and A. Wiesmaier and P. Kikiras
2015 International Workshop on Secure Internet of Things (SIoT), p.49–57
[Conference Proceedings]


Advanced Remote Firmware Upgrades Using TPM 2.0
Andreas Fuchs and Christoph Krauß and Jürgen Repp
Proceedings of the 31th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
[Conference Proceedings]


Evaluation of Lightweight TPMs for Automotive Software Updates over the Air
Richard Petri and Markus Springer and Daniel Zelle and Ira McDonald and Andreas Fuchs and Christoph Krauß
4th Embedded Security in Cars (escar) USA
[Conference Proceedings]


Zur Benutzbarkeit der AusweisApp2
Jörg Willomitzer and Andreas Heinemann and Marian Margraf
Mensch & Computer Workshopband
[Conference Proceedings]


Usability-Untersuchung eines Papierprototypen für eine mobile Online-Ausweisfunktion des Personalausweises
Sandra Kostic and Andreas Heinemann and Marian Margraf
GI-Jahrestagung, p.519–527
[Conference Proceedings]


Workshop: Nutzerzentrierte Sicherheit - NzS 2016
Andreas Heinemann and Steffen Lange and Marian Margraf and Jörg Willomitzer
GI-Jahrestagung, p.485–486
[Conference Proceedings]


Ludo - kids playing Distributed Denial of Service
J. Steinberger and J. Santanna and E. Spatharas and H. Amler and N. Breuer and others
TERENA Networking Conf. (TNC16)
[Conference Proceedings]


Collaborative DDoS defense using flow-based security event information
J. Steinberger and B. Kuhnert and A. Sperotto and H. Baier and A. Pras
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, p.516–522
[Conference Proceedings]


A Binarization Scheme for Face Recognition Based on Multi-Scale Block Local Binary Patterns
T. Schlett and C. Rathgeb and C. Busch
2016 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–4
[Conference Proceedings]


Unit-Selection Attack Detection Based on Unfiltered Frequency-Domain Features
U. Scherhag and A. Nautsch and C. Rathgeb and C. Busch
Proc. of the Annual Conf. of the Intl. Speech Communication Association (INTERSPEECH), p.2209–2213
[Conference Proceedings]


How to apply Binarized Statistical Image Features to Near-Infrared Iris Recognition effectively
C. Rathgeb and F. Struck and C. Busch
Sixth Intl. Conf. on Image Processing Theory, Tools and Applications (IPTA 2016)
[Conference Proceedings]


TripleA: Accelerated accuracy-preserving alignment for iris-codes
C. Rathgeb and H. Hofbauer and A. Uhl and C. Busch
2016 Intl. Conf. on Biometrics (ICB), p.1–8
[Conference Proceedings]


Multi-Bit Allocation: Preparing Voice Biometrics for Template Protection
M. Paulini and C. Rathgeb and A. Nautsch and H. Reichau and H. Reininger and C. Busch
Proc. Odyssey 2016: The Speaker and Language Recognition Workshop, p.291–296
[Conference Proceedings]


Robustness of Quality-based Score Calibration of Speaker Recognition Systems with respect to low-SNR and short-duration conditions
A. Nautsch and R. Saeidi and C. Rathgeb and C. Busch
Proc. Odyssey 2016: The Speaker and Language Recognition Workshop, p.358–365
[Conference Proceedings]


Towards PLDA-RBM based speaker recognition in mobile environment: Designing stacked/deep PLDA-RBM systems
A. Nautsch and H. Hao and T. Stafylakis and C. Rathgeb and C. Busch
Proc. of 2016 IEEE Intl. Conf. on Acoustics, Speech and Signal Processing (ICASSP), p.5055–5059
[Conference Proceedings]


HDA NIST SRE'16 Systems (CRISP & I4U)
Nautsch, A. and Isadskiy, S. and Rathgeb, C. and Busch, C.
Proc. of the NIST SRE workshop
[Conference Proceedings]


Decision Robustness of Voice Activity Segmentation in Unconstrained Mobile Speaker Recognition Environments
A. Nautsch and R. Bamberger and C. Busch
Proc. of 2016 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–7
[Conference Proceedings]


Correlation-resistant fuzzy vault for fingerprints
J. Merkle and M. Butt and U. Korte and C. Busch
Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, p.125–136
[Conference Proceedings]


The I4U Submission to the 2016 NIST Speaker Recognition Evaluation
K.A. Lee and Sun, H. and Sizov, A. and Wang, G. and Nguyen, T.H. and others
Proc. of the NIST SRE workshop
[Conference Proceedings]