Publikationen

Publikationen

Identifying Microcontroller Architecture Through Static Analysis of Firmware Binaries
Malaschonok, David
Workshop on Security and Privacy in Standardized IoT 2026
[Conference Paper]


IT and more: Kennzeichnungspflicht für KI-generierte Inhalte
Wache, Magdalena; Steinebach, Martin; Berchtold, Waldemar
[Journal Article]


Sicherheitsrisiken beim Client-Side-Scanning
Steinebach, Martin
[Journal Article]


Grammar as a behavioral biometric: using cognitively motivated grammar models for authorship verification
Nini, Andrea; Halvani, Oren; Graner, Lukas; Titze, Sophie; Gherardi, Valerio; Ishihara, Shunichi
[Journal Article]


Im Cybersicherheits- und Datenschutzgeflecht: Besser konsolidieren für mehr Innovation
Selzer, Annika; Kreutzer, Michael; Stummer, Sarah


Pruning the Tree: Rethinking RPKI Architecture From The Ground Up
Haya Schulmann and Niklas Vogel
33rd Annual Network and Distributed System Security Symposium
[Conference Proceedings]


All That Glitters Is Not Gold: RPKI’s Stumbling Speedrun To The Top
Mirdita, Donika and Schulmann, Haya and Waidner, Michael
IEEE Transactions on Dependable and Secure Computing, p.1-12
[Journal Article]


Resilience Meets Security in Cyber-Physical Systems and Critical Infrastructures
Förster, Anna and Hollick, Matthias and Katzenbeisser, Stefan and Krauss, Christoph
Communications of the ACM, Vol.69, p.35–38
[Journal Article]


Oil, Vinegar, and Sparks: Key Recovery from UOV via Single Electromagnetic Fault Injection
Fabio Campos and Daniel Hahn and Daniel Könnecke and Marc Stöttinger


Statistical Feature-Based Detection of Adversarial Noise and Patch Attacks in Image and Deepfake Analysis
Bunzel, Niklas; Frick, Raphael; Graner, Lukas; Göller, Nicolas; Steinebach, Martin
[Book Article]


Secure Medical Digital Twins: A Use-Case Driven Approach
Ahmad, Salmah; Bartelt, Bianca; Enzmann, Matthias; Kohlhammer, Jörn; Wesarg, Stefan; Wolf, Ruben
International Workshop on Digital Twin for Healthcare 2025
[Conference Paper]


Photonic Side-Channel Analyzer: Enabling Security-Aware Physical Design Methodology
Wang, Meizhi; Chen, Yi-Ru; Nibhanupudi, S.S. Teja; Amini, Elham; Saavedra, Antonio; Wang, Yinan; Wasserman, Daniel; Seifert, Jean-Pierre; Kulkarni, Jaydeep P.
International Symposium on Physical Design 2025
[Conference Paper]


Disinformation Analysis on Telegram: A Metadata-Centered, Privacy-Aware Dataset
Choi, Jeong-Eun; Schäfer, Karla; Yannikos, York; Steinebach, Martin
International Conference on Big Data 2025
[Conference Paper]


Towards Interpretable Suicide Risk Prediction: A Hybrid Approach with Feature Extraction and Sequential Binary Classification
Choi, Jeong-Eun; Fan, Shiying
International Conference on Big Data 2025
[Conference Paper]


Exploring the Relationship Between Network Similarity and Transferability of Adversarial Attacks
Klause, Gerrit; Bunzel, Niklas
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]


Trade-offs in Cross-Domain Generalization of Foundation Model Fine-Tuned for Biometric Applications
Chettaoui, Tahar; Damer, Naser; Boutros, Fadi
International Joint Conference on Biometrics 2025
[Conference Paper]


SwitchAR: Enabling Perceptual Manipulations in Augmented Reality Leveraging Change Blindness and Inattentional Blindness
Wombacher, Jonas; Li, Zhipeng; Gugenheimer, Jan
CHI EA '25: Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems
[Conference Proceedings]


SwitchAR: Perceptual Manipulations in Augmented Reality
Wombacher, Jonas; Li, Zhipeng; Gugenheimer, Jan
UIST '25: Proceedings of the 38th Annual ACM Symposium on User Interface Software and Technology
[Conference Proceedings]


LightShed: Defeating Perturbation-based Image Copyright Protections
Foerster, Hanna; Behrouzi, Sasha; Rieger, Phillip; Jadliwala, Murtuza; Sadeghi, Ahmad-Reza
Proceedings of the 34th USENIX Security Symposium, p.7271-7290
[Conference Proceedings]


ZORRO: Zero-Knowledge Robustness and Privacy for Split Learning
Sheybani, Nojan; Pegoraro, Alessandro; Knauer, Jonathan; Rieger, Phillip; Mollakuqe, Elissa; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza
CCS '25: Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.321-334
[Conference Proceedings]


Learning to Identify Conflicts in RPKI
Haya Schulmann and Shujie Zhao
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, p.1490–1505
[Conference Proceedings]


ValidaTor: Domain Validation over Tor
Jens Frieß and Haya Schulmann and Michael Waidner
22nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 25), p.1367–1380
[Conference Proceedings]


SoK: An Introspective Analysis of RPKI Security
Donika Mirdita and Haya Schulmann and Michael Waidner
34th USENIX Security Symposium (USENIX Security 25), p.3649–3665
[Journal Article]


Stealth BGP Hijacks with uRPF Filtering
Haya Schulmann and Shujie Zhao
19th USENIX WOOT Conference on Offensive Technologies (WOOT 25), p.129–138
[Conference Proceedings]


Poster: Exploring the Landscape of RPKI Relying Parties
Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4773–4775
[Conference Proceedings]


Poster: We must talk about RPKI Repositories
Haya Schulmann and Niklas Vogel
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4755–4757
[Conference Proceedings]


Poster: The Rocky Road Towards RPKI Algorithm Agility
Katharina Miesch and Haya Schulmann and Niklas Vogel
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4767–4769
[Conference Proceedings]


Demo: Stopping Production Testing: A Graphical RPKI Test-Suite
Tobias Kirsch and Haya Schulmann and Niklas Vogel
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4722–4723
[Conference Proceedings]


Künstliche Intelligenz bei Webanwendungen
Wilmer, Thomas
Datenschutz und Internet


Rechtsgrundlagen der Verarbeitung in der Datenschutz-Grundverordnung
Wilmer, Thomas
Datenschutz und Internet