Publikationen
Publikationen
Fast Rerouting Against Dynamic Failures: 2-Resilience via Ear-Decomposition and Planarity
Dai, Wenkai; Foerster, Klaus-Tycho Tycho; Schmid, Stefan
International Conference on Principles of Distributed Systems 2025
[Conference Paper]
Identifying Microcontroller Architecture Through Static Analysis of Firmware Binaries
Malaschonok, David
Workshop on Security and Privacy in Standardized IoT 2026
[Conference Paper]
IT and more: Kennzeichnungspflicht für KI-generierte Inhalte
Wache, Magdalena; Steinebach, Martin; Berchtold, Waldemar
[Journal Article]
Sicherheitsrisiken beim Client-Side-Scanning
Steinebach, Martin
[Journal Article]
Grammar as a behavioral biometric: using cognitively motivated grammar models for authorship verification
Nini, Andrea; Halvani, Oren; Graner, Lukas; Titze, Sophie; Gherardi, Valerio; Ishihara, Shunichi
[Journal Article]
Im Cybersicherheits- und Datenschutzgeflecht: Besser konsolidieren für mehr Innovation
Selzer, Annika; Kreutzer, Michael; Stummer, Sarah
Pruning the Tree: Rethinking RPKI Architecture From The Ground Up
Haya Schulmann and Niklas Vogel
33rd Annual Network and Distributed System Security Symposium
[Conference Proceedings]
All That Glitters Is Not Gold: RPKI’s Stumbling Speedrun To The Top
Mirdita, Donika and Schulmann, Haya and Waidner, Michael
IEEE Transactions on Dependable and Secure Computing, p.1-12
[Journal Article]
Resilience Meets Security in Cyber-Physical Systems and Critical Infrastructures
Förster, Anna and Hollick, Matthias and Katzenbeisser, Stefan and Krauss, Christoph
Communications of the ACM, Vol.69, p.35–38
[Journal Article]
Oil, Vinegar, and Sparks: Key Recovery from UOV via Single Electromagnetic Fault Injection
Fabio Campos and Daniel Hahn and Daniel Könnecke and Marc Stöttinger
Statistical Feature-Based Detection of Adversarial Noise and Patch Attacks in Image and Deepfake Analysis
Bunzel, Niklas; Frick, Raphael; Graner, Lukas; Göller, Nicolas; Steinebach, Martin
[Book Article]
Secure Medical Digital Twins: A Use-Case Driven Approach
Ahmad, Salmah; Bartelt, Bianca; Enzmann, Matthias; Kohlhammer, Jörn; Wesarg, Stefan; Wolf, Ruben
International Workshop on Digital Twin for Healthcare 2025
[Conference Paper]
Second Competition on Presentation Attack Detection on ID Card
Tapia, Juan E.; Nieto, Mario; Espin, Juan M.; Rocamora, Alvaro S.; Barrachina, Javier; Damer, Naser; Busch, Christoph; Ivanovska, Marija; Todorov, Leon; Khizbullin, Renat; Lazarevich, Lazar; Grishin, Aleksei; Schulz, Daniel; Gonzalez, Sebastian; Mohammadi, Amir; Kotwal, Ketan; Marcel, Sebastien; Mudgalgundurao, Raghavendra; Raja, Kiran; Schuch, Patrick; Patwardhan, Sushrut; Ramachandra, Raghavendra; Pereira, Pedro Couto; Pinto, Joao Ribeiro; Xavier, Mariana; Valenzuela, Andrés; Lara, Rodrigo; Batagelj, Borut; Peterlin, Marko; Peer, Peter; Muhammed, Ajnas; Nunes, Diogo; Gonçalves, Nuno
International Joint Conference on Biometrics 2025
[Conference Paper]
Recht und Technik - Datenschutz im Diskurs Vorwort zu den Workshopbeiträgen
Grimm, Rüdiger; Hornung, Gerrit; Sorge, Christoph; Döhmann genannt Spiecker, Indra
Gesellschaft für Informatik (Jahrestagung) 2025
[Conference Paper]
Automatisierung offensiver Cybersicherheitsmaßnahmen
Esser, Julia; Plötz, Caroline
Gesellschaft für Informatik (Jahrestagung) 2025
[Conference Paper]
Characterizing Hosting and Security Practices for Public-Facing LDAP Servers
Cesar, Gustavo Luvizotto; Öndarö, Gurur; Kaspereit, Jonas; Ising, Fabian; Schinzel, Sebastian; Jonker, Mattijs; Holz, Ralph G.
International Conference on Network and Service Management 2025
[Conference Paper]
Terminator: Enabling Efficient Fuzzing of Closed-Source GUI Programs by Automatic Coverage-Guided Termination
Zabel, Jonas; Kolvenbach, Philip; Arzt, Steven
International Conference on Automated Software Engineering 2025
[Conference Paper]
Photonic Side-Channel Analyzer: Enabling Security-Aware Physical Design Methodology
Wang, Meizhi; Chen, Yi-Ru; Nibhanupudi, S.S. Teja; Amini, Elham; Saavedra, Antonio; Wang, Yinan; Wasserman, Daniel; Seifert, Jean-Pierre; Kulkarni, Jaydeep P.
International Symposium on Physical Design 2025
[Conference Paper]
Disinformation Analysis on Telegram: A Metadata-Centered, Privacy-Aware Dataset
Choi, Jeong-Eun; Schäfer, Karla; Yannikos, York; Steinebach, Martin
International Conference on Big Data 2025
[Conference Paper]
Towards Interpretable Suicide Risk Prediction: A Hybrid Approach with Feature Extraction and Sequential Binary Classification
Choi, Jeong-Eun; Fan, Shiying
International Conference on Big Data 2025
[Conference Paper]
Exploring the Relationship Between Network Similarity and Transferability of Adversarial Attacks
Klause, Gerrit; Bunzel, Niklas
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]
Trade-offs in Cross-Domain Generalization of Foundation Model Fine-Tuned for Biometric Applications
Chettaoui, Tahar; Damer, Naser; Boutros, Fadi
International Joint Conference on Biometrics 2025
[Conference Paper]
SwitchAR: Enabling Perceptual Manipulations in Augmented
Reality Leveraging Change Blindness and Inattentional Blindness
Wombacher, Jonas; Li, Zhipeng; Gugenheimer, Jan
CHI EA '25: Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems
[Conference Proceedings]
SwitchAR: Perceptual Manipulations in Augmented Reality
Wombacher, Jonas; Li, Zhipeng; Gugenheimer, Jan
UIST '25: Proceedings of the 38th Annual ACM Symposium on User Interface Software and Technology
[Conference Proceedings]
LightShed: Defeating Perturbation-based Image Copyright Protections
Foerster, Hanna; Behrouzi, Sasha; Rieger, Phillip; Jadliwala, Murtuza; Sadeghi, Ahmad-Reza
Proceedings of the 34th USENIX Security Symposium, p.7271-7290
[Conference Proceedings]
ZORRO: Zero-Knowledge Robustness and Privacy for Split Learning
Sheybani, Nojan; Pegoraro, Alessandro; Knauer, Jonathan; Rieger, Phillip; Mollakuqe, Elissa; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza
CCS '25: Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.321-334
[Conference Proceedings]
Learning to Identify Conflicts in RPKI
Haya Schulmann and Shujie Zhao
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, p.1490–1505
[Conference Proceedings]
ValidaTor: Domain Validation over Tor
Jens Frieß and Haya Schulmann and Michael Waidner
22nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 25), p.1367–1380
[Conference Proceedings]
SoK: An Introspective Analysis of RPKI Security
Donika Mirdita and Haya Schulmann and Michael Waidner
34th USENIX Security Symposium (USENIX Security 25), p.3649–3665
[Journal Article]
Stealth BGP Hijacks with uRPF Filtering
Haya Schulmann and Shujie Zhao
19th USENIX WOOT Conference on Offensive Technologies (WOOT 25), p.129–138
[Conference Proceedings]


