Publications

Publications

Statistical Feature-Based Detection of Adversarial Noise and Patch Attacks in Image and Deepfake Analysis
Bunzel, Niklas; Frick, Raphael; Graner, Lukas; Göller, Nicolas; Steinebach, Martin
[Book Article]


Pruning the Tree: Rethinking RPKI Architecture From The Ground Up
Schulmann, Haya; Vogel, Niklas
[Conference Proceedings]


All That Glitters Is Not Gold: RPKI’s Stumbling Speedrun To The Top
Mirdita, Donika; Schulmann, Haya; Waidner, Michael
IEEE Transactions on Dependable and Secure Computing, p.1-12
[Journal Article]


Secure Medical Digital Twins: A Use-Case Driven Approach
Ahmad, Salmah; Bartelt, Bianca; Enzmann, Matthias; Kohlhammer, Jörn; Wesarg, Stefan; Wolf, Ruben
International Workshop on Digital Twin for Healthcare 2025
[Conference Paper]


Are Morphed Periocular Iris Images a Threat to Iris Recognition?
J. Tapia, S. Gonzalez, D. Benalcazar; Busch, C.
IEEE Trans. on Information Forensics and Security, Vol.20, p.12417-12428
[Journal Article]


Are Morphed Periocular Iris Images a Threat to Iris Recognition?
J. Tapia, D. Schulz; Busch, C.
IEEE Trans. on Information Forensics and Security, Vol.20, p.12417-12428
[Journal Article]


Iris Liveness Detection Competition (LivDet-Iris)
Mahsa Mitcheff, Afzal Hossain, Samuel Webster, Siamul Khan, Katarzyna Roszczewska, Juan E. Tapia, Fabian Stockhardt, Lazaro J. Gonzalez-Soler,Ji-Young Lim, Mirko Pollok, Felix Kreuzer, Caiyong Wang, Lin Li, Fukang Guo, Jiayin Gu, Debasmita Pal, Parisa Farmanifard, Renu Sharma, Arun Ross, Geetanjali Sharma, Shubham Ashwani, Aditya Nigam, Raghavendra Ramachandra, Lambert Igene, Jesse Dykes, Ada Sawilska, Aleksandra Dzieniszewska, Jakub Januszkiewicz, Ewelina Bartuzi-Trokielewicz, Alicja Martinek, Mateusz Trokielewicz, Adrian Kordas, Kevin Bowyer, Stephanie Schuckers, Adam Czajka
Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


De-Anonymisierungsstrategien: Empirische Analyse und normative Implikationen
Stummer, Sarah; Hähle, Phillip
Gesellschaft für Informatik (Jahrestagung) 2025
[Conference Paper]


Weiterbildung zur Cybersicherheit
Schneider, Markus; Heftrig, Elias; Dukanovic, Sinisa; Dexheimer, Thomas
[Journal Article]


When Voices Deceive: Evaluating and Improving the Robustness of Audio Deepfake Detectors Under Adversarial Attacks
Schäfer, Karla; Ludwig, Leon
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]


Real-World Audio Deepfake Detection Using SSL-Based Speech Models and Diverse Training Data
Schäfer, Karla; Neu, Matthias
International Conference on Tools with Artificial Intelligence 2025
[Conference Paper]


Machine Learning-Based Detection of AI-Generated Text via Stylistic and Statistical Feature Modeling
Schäfer, Karla; Steinebach, Martin
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]


Learning to Identify Conflicts in RPKI
Schulmann, Haya; Zhao, Shujie
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, p.1490-1505
[Conference Proceedings]


ValidaTor: Domain Validation over Tor
Frieß, Jens; Schulmann, Haya; Waidner, Michael
22nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 25), p.1367-1380
[Conference Proceedings]


SoK: An Introspective Analysis of RPKI Security
Mirdita, Donika; Schulmann, Haya; Waidner, Michael
34th USENIX Security Symposium (USENIX Security 25), p.3649-3665
[Journal Article]


Stealth BGP Hijacks with uRPF Filtering
Schulmann, Haya; Zhao, Shujie
19th USENIX WOOT Conference on Offensive Technologies (WOOT 25), p.129-138
[Conference Proceedings]


Poster: Exploring the Landscape of RPKI Relying Parties
Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4773-4775
[Conference Proceedings]


Poster: We must talk about RPKI Repositories
Schulmann, Haya; Vogel, Niklas
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4755-4757
[Conference Proceedings]


Poster: The Rocky Road Towards RPKI Algorithm Agility
Miesch, Katharina; Schulmann, Haya; Vogel, Niklas
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4767-4769
[Conference Proceedings]


Demo: Stopping Production Testing: A Graphical RPKI Test-Suite
Kirsch, Tobias; Schulmann, Haya; Vogel, Niklas
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4722-4723
[Conference Proceedings]


Comparative Analysis of Threat Assumptions in Field Level Protocol Security
Peters, Ludger; Gkoktsis, George; Cäsar, Matthias; Eckel, Michael
Standardization Workshop on Industrial Automation and Control Systems 2025


A Close Look at RMP Entry Caching and Its Security Implications in SEV-SNP
Bagia, Alexis; Ulitzsch, Vincent Quentin; Trujillo, Daniël; Li, Mengyuan; Yan, Mengjia; Seifert, Jean-Pierre
International Workshop on Hardware and Architectural Support for Security and Privacy 2025
[Conference Paper]


Demand-aware multi-source IP-multicast: Minimal congestion via link weight optimization
Bentert, Matthias; Franke, Max; Melnyk, Darya; Pourdamghani, Arash; Schmid, Stefan
Networking Conference 2025
[Conference Paper]


Uncovering linux desktop espionage
Schmidt, Lukas; Strasda, Sebastian; Schinzel, Sebastian
Annual Digital Forensics Research Conference 2025
[Journal Article]


DamFlow: Preventing a Flood of Irrelevant Data Flows in Android Apps
Alecci, Marco; Samhi, Jordan; Miltenberger, Marc; Arzt, Steven; Bissyandé, Tegawendé F.; Klein, Jacques
[Journal Article]


Securing Product Identity With Digital Fingerprinting
Berchtold, Waldemar; Steinebach, Martin
[Journal Article]


BIOSIG 2025, 24th International Conference of the Biometrics Special Interest Group. Proceedings
Gesellschaft für Informatik, Special Interest Group Biometrics (BIOSIG International Conference) 2025
[Conference Proceeding]


SVC '25: Proceedings of the 1st International Workshop & Challenge on Subtle Visual Computing
International Workshop & Challenge on Subtle Visual Computing 2025
[Conference Proceeding]


CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP
Gast, Stefan; Weissteiner, Hannes; Schröder, Leander; Gruss, Daniel
Network and Distributed System Security Symposium 2025
[Conference Paper]


S/MINE: collecting and analyzing S/MIME certificates at scale
Öndarö, Gurur; Kaspereit, Jonas; Umezulike, Samson; Saatjohann, Christoph; Ising, Fabian; Schinzel, Sebastian
USENIX Security Symposium 2025
[Conference Paper]