Publikationen

Publikationen

Parallel (Probable) Lock-Free Hash Sieve: A Practical Sieving Algorithm for the SVP
Mariano, Artur; Laarhoven, Thijs; Bischof, Christian
ICPP 2015 - The 44th Annual Conference 2015 International Conference on Parallel Processing
Sprache: German
[Conference Proceedings]

PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation
Germanus, Daniel; Ismail, Hatem; Suri, Neeraj
InProceedings of the 34th International Symposium on Reliable Distributed Systems, 28.09.2015-01.10.2015, Montreal
Sprache: German
[Conference Proceedings]

PBMC: Symbolic Slicing for the Verification of Concurrent Programs
Saissi, Habib; Bokor, Peter; Suri, Neeraj
Proceedings of the Symposium on Automated Technology for Verification and Analysis, ATVA 2015
Sprache: German
[Conference Proceedings]

Performance problems you can fix: a dynamic analysis of memoization opportunities
Della Toffola, Luca; Pradel, Michael; Gross, Thomas R.
Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, p.607-622
Sprache: German
[Conference Proceedings]

Personalized face reference from video: Key-face selection and feature-level fusion
Damer, Naser; Samartzidis, Timotheos; Nouak, Alexander
International Workshop on Face and Facial Expression Recognition from Real World Videos (FFER) <2014, Stockholm>
Sprache: English
[Conference Paper]

Phasing: Private Set Intersection using Permutation-based Hashing
Pinkas, Benny; Schneider, Thomas; Segev, Gil; Zohner, Michael
24. USENIX Security Symposium (USENIX Security'15), p.515-530
Sprache: English
[Conference Proceedings]

Practical Covert Channels for WiFi Systems
Classen, Jiska; Schulz, Matthias; Hollick, Matthias
IEEE Conference on Communications and Network Security (CNS), p.8
Sprache: 1
[Conference Proceedings]

PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices
Ghiglieri, Marco
IEEE CCNC
Sprache: 1
[Conference Proceedings]

Private Membership Test for Bloom Filters
Meskanen, Tommi; Ramezanian, Sara; Liu, Jian; Niemi, Valtteri
The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)
Sprache: German
[Conference Proceedings]

PUF-based Software Protection for Low-end Embedded Devices
Kohnhäuser, Florian; Schaller, André; Katzenbeisser, Stefan
8th International Conference on Trust and Trustworthy Computing (TRUST 2015), p.3-21
Sprache: 1
[Conference Proceedings]

Pulse-controlled quantum gate sequences on a strongly coupled qubit chain
Frydrych, Holger; Marthaler, Michael; Alber, Gernot
Phys. Rev. A, American Physical Society, p.10
Sprache: German
[Journal Article]

Random-Oracle Uninstantiability from Indistinguishability Obfuscation
Brzuska, Christina; Farshim, Pooya; Mittelbach, Arno
Theory of Cryptography. TCC 2015., p.428-455
Sprache: German
[Conference Proceedings]

Rating Decomposition with Conjoint Analysis and Machine Learning
Volk, Florian; Trüschler, Nadine; Mühlhäuser, Max
CENTRIC 2015: The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, p.36-41
Sprache: German
[Conference Proceedings]

Readactor: Practical Code Randomization Resilient to Memory Disclosure
Crane, Stephen; Liebchen, Christopher; Homescu, Andrei; Davi, Lucas; Larsen, Per; Sadeghi, Ahmad-Reza; Brunthaler, Stefan; Franz, Michael
36th IEEE Symposium on Security and Privacy (Oakland)
Sprache: German
[Conference Proceedings]

Real-World Post-Quantum Digital Signatures
Butin, Denis; Gazdag, Stefan-Lukas; Buchmann, Johannes
Cybersecurity & Privacy Innovation Forum (CSP Forum 2015)
Sprache: 1
[Conference Proceedings]

Response to emergency situations in a traffic management system
Othmane, Lotfi ben; Cerqueus, Thomas; Thiery, Adrien; Salehie, Mazeiar; Noel, Nicolas; Labaere, Anthony; Domingues, Remi; Cordier, Arnaud; Ventresque, Anthony; Pasquale, Liliana; Perry, Philip; Nuseibeh, Bashar
World Congress on Computer Applications and Information Systems (WCCAIS) <2, 2015, Hammamet>
Sprache: English
[Conference Paper, Electronic Publication]

Return to Where? You Can't Exploit What You Can't Find
Crane, Stephen; Liebchen, Christopher; Homescu, Andrei; Davi, Lucas; Larsen, Per; Sadeghi, Ahmad-Reza; Brunthaler, Stefan; Franz, Michael
Blackhat USA
Sprache: German
[Conference Proceedings]

Robust 2D face recognition under different illuminations using binarized partial face features: Towards protecting ID documents
Butt, Moazzam; Alkhatib, Wael
International Workshop on Computational Forensics (IWCF) <5, 2012, Tsukuba>
Sprache: English
[Conference Paper]

Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)
Fehr, Victoria; Fischlin, Marc
IACR Cryptology ePrint Archive, p.765
Sprache: English
[Journal Article]

Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing
Mayer, Peter; Volkamer, Melanie
Proceedings of the 31st Annual Computer Security Applications Conference, p.431-440
Sprache: English
[Conference Proceedings]

Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? - Keynote -
Sadeghi, Ahmad-Reza; Davi, Lucas; Larsen, Per
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
Sprache: German
[Conference Proceedings]

Security analysis of OpenRadio and SoftRAN with STRIDE framework: Presentation held at International Workshop on Manageability and Security of Network Function Virtualization and Software Defined Network (MASONS) at ICCCN 2015
Magin, Daniel; Khondoker, Rahamatullah; Bayarou, Kpatcha
International Conference on Computer Communications and Networks (ICCCN) <24, 2015, Las Vegas/Nev.>
Sprache: English
[Conference Paper, Electronic Publication, Presentation]

Security analysis of software defined networking applications for monitoring and measurement. sFlow and BigTap
Dauer, Pascal; Khondoker, Rahamatullah; Marx, Ronald; Bayarou, Kpatcha
International Conference on Future Internet (CFI) <10, 2015, Seoul>
Sprache: English
[Conference Paper, Electronic Publication]

Security Analysis of TrueCrypt
Baluda, Mauro; Fuchs, Andreas; Holzinger, Philipp; Nguyen, L.; Othmane, Lotfi ben; Poller, Andreas; Repp, Jürgen; Späth, Johannes; Steffan, Jan; Triller, Stefan; Bodden, Eric
Sprache: English
[Study, Electronic Publication]

Security and business situational awareness
Rieke, Roland; Zhdanova, Maria; Repp, Jürgen
Cyber Security and Privacy Innovation Forum (CSP) <4, 2015, Brussels>
Sprache: English
[Conference Paper]